Chapter 8 Flashcards
One of the most publicized threats to security is the ____
Intruder
- Individuals or members of an organized crime group with a goal of financial reward
Intruders
Intruders’ activities are
- identity theft
- theft of financial credentials
- corporate espionage
- data theft
- Data ransoming
- are either individuals, usually working as insiders, or members of a larger group of outsider attackers, who are motivated by social or political causes
- also known as hacktivists (low skill level)
- aim of their attacks is often to promote and publicize their cause
Activists ( Class of Intruders )
- groups of hackers sponsored by governments to conducts espionage or sabotage activities
- Also known as Advanced Persistent Threats (APTs) due to the covert nature and persistence over extended periods involved with any attacks in this class
- Widespread nature and scope of these activities by a wide range of countries
State-Sponsored Organization ( Class of Intruders )
- hackers with minimal technical skill who primarily use existing attack
- they likely comprise the largest number of attackers, including many criminal and activist attackers
- Given their use of existing known tools, these attackers are the easiest to defend against
- also know as “script-kiddies” due to their existing scripts (tool)
Apprentice
- Hackers with sufficient technical skills to modifyand extend attack toolkits to use newly discovered, or purchased, vulnerabilities
- They may be able to locate new vulnerabilities to exploit that are similar to some already known
- Hackers with suck skills are likely found in all intruder classes
- adapt tools for use by ohers
- Journeyman
- Hackers with high-level technical skills capable of discovering brand new categories of vulnerabilities
- Write new powerful attack toolkits
- Some of the better known classical hackers are of this level
- some are employed by state-sponsored organizations
- defending against these attacks is of the highest difficulty
Master
Examples of intrusion
Remote root compromise
Web server defacement
Guessing/cracking passwords
Copying databases containing credit card numbers
Viewing sensitive data without authorization
Running a packet sniffer
Distributing pirated software
Using an unsecured modem to access internal network
Impersonating an executive to get information
Using an unattended workstation
intruder behaviour
- Target acquisition and information gathering
- Initial access
- Privilege escalation
- Information gathering or system exploit
- Maintaining access
- Covering tracks
a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts to gain, access to a system without having authorization
Security Intrusion
A security service that monitors and analyzes system events for the purpose of finding, and providing real-time or near real-time warning of, attempts to access system resources in an authorized manner
- Intrusion Detection
Kinds of Intrusion Detection System (IDS)
- Host-based IDS
- Network-based IDS
- Distributed or hybrid IDS
Monitors the characteristics of a single host for suspicious activity
Host-based IDS
Monitors network traffic and analyzes network, transport, and application protocols to identify suspicious activity
Network-based IDS