Uploaded by Duc Thien

Buổi 1. Cybersecurity Fundamentals

advertisement
Cybersecurity Fundamentals
Security Terms
Basic Concepts of
Network Security
Types of Security Controls
Administrative Access Control
Physical Access Controls
Technical Access Controls
Common Information Security Attacks
Directory Travesal
SQL Injection Attack
Cookies/Session Poisoning Attacks
What is a cookie?
Cookies/Session Poisoning Attacks
(Cont)
Cross-site Scripting (XSS) Attacks
• Cross-site scripting (‘XSS’ or ‘CSS’) attacks exploit vulnerabilities in dynamically
generated Web pages, which enables malicious attackers to inject client-site script into
web pages viewed by other users.
• It occurs when invalidated input data is included in dynamic content that is sent to a
user’s web browser for rendering.
• Attackers inject malicious JavaScript, VBScript, ActiveX, HTML, or Flash for execution on
a victim’s system by hiding it within legitimate requests.
• The malicious script can access any cookies, session tokens, or other sensitive
information retained by the browser and used with that site. These scripts can even
rewrite the content of the HTML page
Cross-site Scripting Attack Scenarior:
XSS Attack in Comment Field
XSS - Cross Site Scripting Explained
Cross-site Request Forgery (CSRF) Attack
• Cross-site Request Forgery (CSRF) attacks exploit web
page vulnerabilities that allow an attacker to force an
unsuspecting user's browser to send malicious requests
they did not intent.
• This victim user holds an active session with a trusted
site and simultaneously visits a malicious site, which
insject an HTTP request for the trusted site into the
victim user's session, compromising its integrity.
Cross-site Request Forgery (CSRF) Attack
(Cont)
Cross Site Request Forgery (CSRF or XSRF) Explained
Denial-Of-Service (DoS) Attack
Distributed
Denial-of-Service Attack (DDoS)
Social Engineering Attacks
Password Attacks
Network Sniffing
Man-in-the-Middle Attacks
Privilege Escalation
DNS Poisoning
DNS Cache Poisoning
ARP Poisoning
DHCP Starvation Attacks
DHCP Spoofing Attacks
MAC Spoofing/Duplicating
Malware
Writing a Simple Virus Program
Computer Worm
How Attackers Deploy a Trojan
How Attackers Using Trojans
Botnet Trojans
Remote Access Trojans
Proxy Server Trojans
Covert Channel Trojans
Data Hiding Trojans (Encrypted Trojans)
Buffer Overflow Attacks
Buffer Overflow Attacks
(Cont)
Security Policy Overview
Security Policy
Security Policy Audience
Security Policy Hierarchy
Governing Policy
A governing policy includes:
•
•
•
•
•
Statement of the issue that the policy addresses
How the policy applies in the environment
Roles and responsibilities of those affected by the policy
Actions, activities, and processes that are allowed (and not allowed)
Consequences of noncompliance
Technical Policies
Technical components:
•
•
•
•
•
•
General policies
Telephony policy
Email and communication policy
Remote access policy
Network policy
Application policy
End User Polices
Security Policy Documents
Policy, Standards, Procedures
Security Awareness Program
Thank you.
Download