Security Chapter 9 Updated January 2009 boXU Zhengchuan Fudan University
Chapter 9 Updated January 2009 XU Zhengchuan Fudan University Security
The Threat Environment
The Threat Environment
Figure 9-1: CSI/FBI Survey Companies face many Attacks There are many Viruses(and other malware) types of attacks Insider abuse of net access In Order of Laptop theft Decreasing Frequency Unauthorized access by insiders Denial-of-service attacks System penetration Sabotage Theft of proprietary information Fraud Telecoms eavesdropping and active wiretaps
3 Figure 9-1: CSI/FBI Survey • Companies Face Many Attacks – Viruses (and other malware) – Insider abuse of net access – Laptop theft – Unauthorized access by insiders – Denial-of-service attacks – System penetration – Sabotage – Theft of proprietary information – Fraud – Telecoms eavesdropping and active wiretaps In Order of Decreasing Frequency There are many types of attacks
Figure 9-1: CSI/FBI Survey Very Common Successful Incidents Viruses and other malware Insider abuse of net access Laptop theft LOW-Frequency /High-Damage Attacks Theft of proprietary information($2.7 M per incident) Denial-of-service attacks ($1.4 M per incident)
4 Figure 9-1: CSI/FBI Survey • Very Common Successful Incidents – Viruses and other malware – Insider abuse of net access – Laptop theft • Low-Frequency / High-Damage Attacks – Theft of proprietary information ($2.7 M per incident) – Denial-of-service attacks ($1.4 M per incident)
Figure 9-2: Malware Malware A general name for evil software Viruses Pieces of code that attach to other programs When infected programs execute, the virus executes Infect other programs on the computer Spread to other computers by e-mail attachments, IM peer-to-peer file transfers, etc Antivirus programs are needed to scan arriving files Also scans for other malware 5
5 Figure 9-2: Malware • Malware – A general name for evil software • Viruses – Pieces of code that attach to other programs – When infected programs execute, the virus executes – Infect other programs on the computer – Spread to other computers by e-mail attachments, IM, peer-to-peer file transfers, etc. – Antivirus programs are needed to scan arriving files • Also scans for other malware