Ed Ferrara, MSIA, CISSP eferrara@temple.edu. Fox School of Business

Similar documents
Course Content: Session 1. Ethics & Hacking

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

Ethical Hacking & Cyber Security Workshop

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

CEH Version8 Course Outline

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Certified Ethical Hacker (CEH)

Payment Card Industry (PCI) Executive Report. Pukka Software

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Detailed Description about course module wise:

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Locking down a Hitachi ID Suite server

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Certified Cyber Security Analyst VS-1160

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

CRYPTUS DIPLOMA IN IT SECURITY

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

FORBIDDEN - Ethical Hacking Workshop Duration

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Global Partner Management Notice

CYBERTRON NETWORK SOLUTIONS

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Client logo placeholder XXX REPORT. Page 1 of 37

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

CS5008: Internet Computing

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Cybercrime in Canadian Criminal Law

Vulnerability Assessment and Penetration Testing

Vinny Hoxha Vinny Hoxha 12/08/2009

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

SecurityMetrics Vision whitepaper

EC Council Certified Ethical Hacker V8

Malicious Network Traffic Analysis

V ISA SECURITY ALERT 13 November 2015

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

Cyber Security An Exercise in Predicting the Future

Network Incident Report

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Payment Card Industry (PCI) Executive Report 10/27/2015

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Payment Card Industry (PCI) Executive Report 08/04/2014

Build Your Own Security Lab

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

"This is a truly remarkable attack, but not. just in its scope hackers successfully. penetrated one of the most secure

Loophole+ with Ethical Hacking and Penetration Testing

2012 Data Breach Investigations Report

COB 302 Management Information System (Lesson 8)

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Tespok Kenya icsirt: Enterprise Cyber Threat Attack Targets Report

Penetration Testing Service. By Comsec Information Security Consulting

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

GUJARAT TECHNOLOGICAL UNIVERSITY MASTER OF COMPUTER APPLICATIONS (MCA) SEMESTER: V

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

IT Security Risks & Trends

Penetration Testing: Lessons from the Field

Workshop Designed & Powered by TCIL IT, Chandigarh

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Topics in Network Security

Aiming at Higher Network Security Levels Through Extensive PENETRATION TESTING. Anestis Bechtsoudis. abechtsoudis (at) ieee.

FSP-201: Ethical Hacking & IT Security

Ethical Hacking Course Layout

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

The Top Web Application Attacks: Are you vulnerable?

Penetration Testing with Kali Linux

Web App Security Audit Services

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Hacking Database for Owning your Data

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Web security. Live hacking demo. Rick van Tol Arthur Donkers Paul van Maaren Eilko Bos.

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

Worms, Trojan Horses and Root Kits

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Security Awareness For Website Administrators. State of Illinois Central Management Services Security and Compliance Solutions

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and Advanced Persistent Threats

Quick Start Guide to Ethical Hacking

MEASURES TO ENHANCE MARITIME SECURITY. Industry guidelines on cyber security on board ships. Submitted by ICS, BIMCO, INTERTANKO and INTERCARGO

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Overview of the Penetration Test Implementation and Service. Peter Kanters

Transcription:

MIS 5208 Week 4 Cybersecurity & Fraud Ed Ferrara, MSIA, CISSP eferrara@temple.edu

Hacking Source: www.youtube.com

Computer Crime A cyber breach is any event that intentionally or unintentionally causes an unplanned increase in cost or decrease in revenue. Who are the players and why? Persons with repressed criminal behavior have a propensity to commit crime in cyberspace due ti their status and position. Identity flexibility and dissociative anonymity and lack of deterrence contribute to the choice to commit cybercrime. Persons from a close society are more likely to commit cyber crime. Types of Crime Personal Cyber stalking, Facebook Rape (FRAPE) Theft Organized Crime, Nation State, Gifted Individuals (Kingpin) Terrorism Cyber attacks in support of terrorist goals

The Nature of Attacks is Changing

Breaches - How 29% Involved physical attacks (+14%) 50% Utilized some form of hacking (+10%) 49% Incorporated malware (+11%) 17% Resulted from privilege misuse (-31%) 11 % Employed social tactics (- 17%) Source: Baker, W., Alexander, H., Hylender, D. C., Pamula, J., Porter, C., & Spitler, M. (2011). 2011 Data Breach Investigations Report. Retrieved from http://www.verizonbusiness.com/resources/reports/rp_data-breachinvestigations-report-2011_en_xg.pdf

Breaches Who? < 1% from business partners (- 10%) 92% from external agents (+22%) 17% implicated insiders (- 31%) 9% multiple parties (- 18%) Source: Baker, W., Alexander, H., Hylender, D. C., Pamula, J., Porter, C., & Spitler, M. (2011). 2011 Data Breach Investigations Report. Retrieved from http://www.verizonbusiness.com/resources/reports/rp_data-breachinvestigations-report-2011_en_xg.pdf

Breaches Commonalities 76% of all data was compromised from servers (- 22%) 92% of attacks were not highly difficult (+7%) 86% discovered by third parties (+25%) 96% of breaches were avoidable using simple controls (<>) 83% were targets of opportunity (<>) 89% of victims subject to PCI were not compliant (+10%) Source: Baker, W., Alexander, H., Hylender, D. C., Pamula, J., Porter, C., & Spitler, M. (2011). 2011 Data Breach Investigations Report. Retrieved from http://www.verizonbusiness.com/resources/reports/rp_data-breachinvestigations-report-2011_en_xg.pdf

The Five Steps of Hacking Reconnaissance Scanning Gaining Access Maintaining Access Covering Tracks

Reconnaissance Google, Twitter, Facebook & LinkedIn Phishing Preliminary Step to Social Engineering Social Engineering Exploits weakness of human element of information systems Contact employees via e- mail or telephone pretending to be: Employee Customer Supplier HTML Code Review, SQL Injection Probes, Whois Database Physical Break-In Network Attack Physical Property Theft Dumpster Diving Intelligence is the work of obtaining information, either passively or actively.

Phishing Reconnaissance Technique

Social Engineering & Physical Penetration

Scanning Vulnerabilities IP Addresses Phone Numbers Technical Contacts War Driving (WiFi) Port Scanning TCP/IP 65,536 TCP Ports 65,536 UDP Ports Open ports show running applications Identifying Systems that are running and the services that are active on them. Source: http://packetlife.net/media/library/23/common-ports.pdf

Gaining Access Buffer Overflow Password Attacks - Brute Force Password Attacks Rainbow Tables Social Engineering Password Leakage Credentials Physical Access Exploiting identified vulnerabilities to gain unauthorized access.

Application & OS Attacks

Maintain Access Trojans (Remote Access Trojans) Black Orifice keystroke logging, HTTP file browsing, registry editing, audio and video capture, password dumping, TCP/IP port redirection, message sending, remote reboot, remote lockup, packet encryption, and file compression. SubSeven key logger, packet sniffer, port redirector, registry modifier, and Trojan Name Port BO jammerkillahv 121 NukeNabber 139 Intruders Paradise 456 Stealth Spy 555 Phase0 555 NeTadmin 555 Satanz Backdoor 666 Attack FTP 666 AIMSpy 777 Der Spaeher 1000

RAT Demo Back Orifice Video

Back Orifice

Covering Tracks Exit the System Delete modify system data Log files Registry entries Temporary files Trojan or similar malware agents. Onion Routing (TOR) Web Proxy Access Activities to hide malicious behavior.

Things to Remember

Thank You