framework-welcome-peopleemichedu框架-欢迎-peopleemichedu

上传人:tian****1990 文档编号:81496554 上传时间:2019-02-21 格式:PPT 页数:54 大小:917KB
返回 下载 相关 举报
framework-welcome-peopleemichedu框架-欢迎-peopleemichedu_第1页
第1页 / 共54页
framework-welcome-peopleemichedu框架-欢迎-peopleemichedu_第2页
第2页 / 共54页
framework-welcome-peopleemichedu框架-欢迎-peopleemichedu_第3页
第3页 / 共54页
framework-welcome-peopleemichedu框架-欢迎-peopleemichedu_第4页
第4页 / 共54页
framework-welcome-peopleemichedu框架-欢迎-peopleemichedu_第5页
第5页 / 共54页
点击查看更多>>
资源描述

《framework-welcome-peopleemichedu框架-欢迎-peopleemichedu》由会员分享,可在线阅读,更多相关《framework-welcome-peopleemichedu框架-欢迎-peopleemichedu(54页珍藏版)》请在金锄头文库上搜索。

1、Introduction & Framework,Chapter 1 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Revised by Huei Lee,2,Critical Infrastructure,3,Figure 1-1: CSI/FBI Computer Crime and Security Survey,Survey conducted by the Computer Security Institute (http:/). Based on replies from 50

2、3 U.S. Computer Security Professionals.,4,Figure 1-1: CSI/FBI Computer Crime and Security Survey,5,Figure 1-1: CSI/FBI Computer Crime and Security Survey,6,Figure 1-1: CSI/FBI Computer Crime and Security Survey,7,Figure 1-1: CSI/FBI Computer Crime and Security Survey,8,What is new in CSI Survey 2007

3、?,Some of the preliminary key findings from the 2007 Survey include: The average annual loss reported more than doubled, from $168,000 in last years report to $350,424 in this years survey. Reported losses have not been this high in the last five years. Financial fraud overtook virus attacks as the

4、source of the greatest financial loss. Virus losses, which had been the leading cause of loss for seven straight years, fell to second place. Almost one-fifth of those respondents who suffered one or more kinds of security incident said theyd suffered a “targeted attack,“ i.e. a malware attack aimed

5、 exclusively at a specific organization or at a small group of organizations.,9,Identity Theft,The stealing of another persons information for financial gain. See the video http:/ that covertly gathers information about a user is called _.,Adware Malware Spyware Shareware Freeware,Spyware is sometim

6、es hidden within freeware or shareware programs. In other instances, it is embedded within a Web site and is downloaded to the users computer, without the users knowledge, in order to track data about the user for marketing and advertisement purposes,11,When receiving warnings of viruses, or request

7、s to donate money to victims of some disaster, you should always check if it is a _ before reacting to it.,Trick Hoax Prank Joke Spam,Some spam e-mails are hoaxes, asking you to donate money to nonexistent causes or warning you of viruses and other Internet dangers that do not exist. You should alwa

8、ys check before forwarding such messages to your friends,12,Figure 1-2: Other Empirical Attack Data,Riptech Analyzed 5.5 billion firewall log entries in 300 firms in five-month period Detected 128,678 attacksan annual rate of 1,000 per firm Only 39% of attacks after viruses were removed were directe

9、d at individual firms,13,Figure 1-2: Other Empirical Attack Data,SecurityFocus Data from 10,000 firms in 2001 Attack Frequency 129 million network scanning probes (13,000 per firm) 29 million website attacks (3,000 per firm) 6 million denial-of-service attacks (600 per firm),14,Figure 1-2: Other Emp

10、irical Attack Data,SecurityFocus Attack Targets 31 million Windows-specific attacks 22 million UNIX/LINUX attacks 7 million Cisco IOS attacks All operating systems are attacked!,15,Figure 1-3: Attack Trends,Growing Incident Frequency Incidents reported to the Computer Emergency Response Team/Coordin

11、ation Center 1997: 2,134 1998: 3,474 (75% growth from previous year) 1999: 9,859 (164% growth) 2000: 21,756 (121% growth) 2001: 52,658 (142% growth) Tomorrow?,16,Attack Trends,17,Figure 1-3: Attack Trends,Growing Randomness in Victim Selection In the past, large firms were targeted Now, targeting is

12、 increasingly random No more security through obscurity for small firms and individuals,18,Figure 1-3: Attack Trends,Growing Malevolence Most early attacks were not malicious Malicious attacks are becoming the norm,19,Figure 1-3: Attack Trends,Growing Attack Automation Attacks are automated, rather

13、than humanly-directed Essentially, viruses and worms are attack robots that travel among computers Attack many computers in minutes or hours,20,Why You need to take this course?,Most network software is designed for security. This course teaches you fundamental concepts of security and infrastructur

14、e. Some governmental IT jobs requires that you have security training.,21,Figure 1-4: Framework for Attackers,Elite Hackers Hacking: intentional access without authorization or in excess of authorization Some call this cracking, not hacking, which they equate to any skilled computer use Characterize

15、d by technical expertise and dogged persistence, not just a bag of tools Use attack scripts to automate actions, but this is not the essence of what they do Deviants and often part of hacker groups that reinforce deviant behavior,22,Figure 1-4: Framework for Attackers,You may hear the terms “white h

16、at” (good guys) and “black hat” bad guys Black hat hackers break in for their own purposes “White hat” can mean multiple things Strictest: Hack only by invitation as part of vulnerability testing Some who hack without permission but report vulnerabilities (not for pay) also call themselves white hat hackers,23,Figure 1-4: Framework for Attackers,You will also hear the term “ethical hacker” Some hack only by i

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 高等教育 > 大学课件

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号