Most Common Security Threats (cont Credit card fraud /theft a Spoofing involves attempting to hide a true identity by using someone else's email or iP address Pharming automatically directing a web link to a fake address Spam junk Web sites(ink farms) promise to offer products but are just full of ads identity fraud/ theft involves unauthorized illegal use of another person' s data Denial of service(Dos attack Hackers flood site with useless traffic to overwhelm network opy DistribiateddudenialPofh coNDos Slide5-17
Most Common Security Threats (cont.) ◼ Credit card fraud/theft ◼ Spoofing involves attempting to hide a true identity by using someone else’s email or IP address ◼ Pharming automatically directing a web link to a fake address ◼ Spam (junk) Web sites (link farms) promise to offer products but are just full of ads ◼ Identity fraud/theft involves unauthorized/illegal use of another person’s data ◼ Denial of service (DoS) attack Hackers flood site with useless traffic to overwhelm network ◼ Distributed denial of service (DDoS) attack Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-17
Most Common Security Threats (cont Denial of service Dos)attack Hackers flood site with useless traffic to overwhelm network a Distributed denial of service(DDos attack uses numerous computers to launch attacks on sites or computers systems. the attack comes from several locatⅰons Copyright C 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-18
Most Common Security Threats (cont.) ◼ Denial of service (DoS) attack Hackers flood site with useless traffic to overwhelm network ◼ Distributed denial of service (DDoS) attack uses numerous computers to launch attacks on sites or computers systems. The attack comes from several locations Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-18
Most Common Security Threats(cont) Sniffing, a sniffer is a type of eavesdropping program that monitors information traveling over a network a Insider attacks caused by employees a Poorly designed server and client software leads to SQL injection attacks by taking advantage of poorly coded applications that fails to validate data entered by web users u Zero-Day vulnerability software vulnerability that is reported but no current fix exists Social network security issues Copyright C 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide5-19
Most Common Security Threats (cont.) ◼ Sniffing, a sniffer is a type of eavesdropping program that monitors information traveling over a network ◼ Insider attacks caused by employees ◼ Poorly designed server and client software leads to SQL injection attacks by taking advantage of poorly coded applications that fails to validate data entered by web users ◼ Zero-Day vulnerability software vulnerability that is reported but no current fix exists ◼ Social network security issues Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-19
Most Common Security Threats(cont) a Mobile platform security issues o Vishing targets gullible cell ph users with verbal messages to call Smishing exploits Sms/text messages that may contain links and other personal info that may be exploited .o Madware is innocent looking apps containing adware that launches pop-up ads and text messages on you mobile device (mobile+ adware= adware) Cloud security issues example, DDoS attacks threaten the availability and viability of cloud services Copyright C 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-20
Most Common Security Threats (cont.) ◼ Mobile platform security issues ❖ Vishing targets gullible cell ph users with verbal messages to call ❖ Smishing exploits SMS/text messages that may contain links and other personal info that may be exploited ❖ Madware is innocent looking apps containing adware that launches pop-up ads and text messages on you mobile device (mobile + adware = madware) ◼ Cloud security issues example, DDoS attacks threaten the availability and viability of cloud services Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-20