2. Learning Outcomes
1. Understand network threat
2. Explain methods of attacks
3. Implement security measures to
protect networks
3. Introduction
• People use network to exchange sensitive
information with each other.
• Network security is a shared responsibility
that each person must accept when they
connect to the network.
• This chapter: you will learn about threats that
exist and how to protect your computer &
information.
5. Threats??
• Threat is a possible danger that might exploit
a vulnerability to breach security and cause possible
harm.
• Vulnerability is a weakness which allows attacker to
reduce a system's information assurance.
• “Ancaman”
6. Intrusion??
• Intrusion is an attacks to a network can be cause the
result in a loss of time and money due to damage or
theft of important information or assets.
• Intruders can hack the software vulnerabilities,
hardware attacks or any method to modifying software
or exploiting software vulnerabilities
• “Pencerobohan”
7. Types of Threats and Intrusions
Threats &
Intrusions
Malicious
Code
Hacking
Data Loss/
Manipulation
Disruption
of Service
Natural
Disaster
Theft
Information
Theft
Identity
Theft
8. Malicious Code (Malware/Malcode)
1. Malicious code is code causing damage to
a computer or system.
2. It also can get into networks and spread.
3. It can also send messages through email
and steal information.
4. Example: Virus, Trojan, Spyware, Adware,
and etc.
9. Hacking
1. Hacking is any technical effort to
manipulate the normal behavior of network
connections and connected systems.
2. Hackers gain access to the network and
may arise:
i. Data Loss / Data Manipulation
ii. Disruption of Service
10. Hacking (cont…)
Data Loss / Data Manipulation
• Breaking into a computer to destroy / alter
data records.
• Example of data loss:
– Sending virus the reformats a computer’s hard
drive.
• Example of data manipulation:
– Breaking into a records system to change
information such as price item.
11. Hacking (cont…)
Disruption of Service
• Preventing legitimate users from
accessing services to which they should
be entitled.
• Example:
– Disruption of PTSS user login to check
examination result system.
12. Natural Disaster
1. Natural disaster causes by flood, fire, storm
and etc.
2. Disaster recovery planning - how data
would be recovered.
3. Example of recovery planning:
• On-site standby – duplicate system/data
• Off-site standby – duplicate across the site
• Reciprocal agreements – hire the firm that
offer commercial recovery as a service
13. Theft
1. Theft is the taking of another
person's property without that person's
permission / crimes against property.
2. Types of Theft:
i. Information theft
ii. Identity theft
14. Theft (cont…)
Information Theft
• Breaking into a computer to obtain
confidential information.
• Information can be used or sold for
various purposes.
• Example:
– Stealing a organization’s proprietary
information such as design, research and
development info.
15. Theft (cont…)
Identity Theft
• A form of information theft where personal
information is stolen for the purpose of
taking over someone’s identity.
• Example:
– Stole information an individual to use her/his
legal documents.
– Apply credit and make unauthorized online
purchases.
18. Source of network intrusion
Security threats from network intruders can come
from both internal and external sources
19. External Sources
• External threats arise from individuals
working outside of an organization.
• They do not have authorized access to the
computer systems or network.
• External attackers work their way into a
network mainly from the Internet, wireless
links or dialup access servers.
20. Internal Sources
• Internal threats occur when someone has
authorized access to the network through a
user account or have physical access to the
network equipment.
• The internal attacker knows the internal
politics and people.
• They often know what information is both
valuable and vulnerable and how to get to it.
22. Social Engineering
• SE methods of exploiting human
weaknesses.
• Social engineering is a term that refers to the
ability of something or someone to influence
the behavior of a group of people.
• SE is collection of techniques used to deceive
internal users into performing specific actions
or revealing confidential information.
24. Social Engineering (cont…)
• Attacker takes advantage of unsuspecting
legitimate users to gain access to internal
resources and private information, such as
bank account numbers or passwords.
• Three of the most commonly used techniques
in social engineering are: pretexting, phishing,
and vishing.
26. I don’t stop when I’m tired.
I only stop when I’m done…
27. Group presentation
• Each group need to present about
threat and intrusion. From the topic
given, each group must prepare slide
presentation to describe detail about
the topic. Content in your slide follow
as above :
• 1. Definition
• 2. Advantage and disadvantage
• 3. Example