TAILIEUCHUNG - Lecture notes on Computer and network security: Lecture 30 - Avinash Kak

Lecture 30, mounting targeted attacks with trojans and social engineering - Cyber espionage. The goals of this chapter are: Can a well-engineered network be broken into? Socially engineered email lures, trojans and the gh0stRAT trojan, cyber espionage, exploiting browser vulnerabilities. | Lecture 30: Mounting Targeted Attacks with Trojans and Social Engineering — Cyber Espionage Lecture Notes on “Computer and Network Security” by Avi Kak (kak@) April 20, 2016 12:23am c 2016 Avinash Kak, Purdue University Goals: • Can a well-engineered network be broken into? • Socially engineered email lures • Trojans and the gh0stRAT trojan • Cyber espionage • Exploiting browser vulnerabilities CONTENTS Section Title Page Is It Possible to Break into a Well-Engineered Network? 3 Trojans 8 The ghOstRAT Trojan 14 Cyber Espionage 22 Cyber Espionage Through Browser Vulnerabilities 28 2 Computer and Network Security by Avi Kak Lecture 30 : IS IT POSSIBLE TO BREAK INTO A WELL-ENGINEERED NETWORK? • Consider an agent X who is determined to break into a network with the intention of stealing valuable documents belonging to an organization and for the purpose of conducting general espionage on the activities of the organization. • Assume that the targeted organization is vigilant about keeping up to date with the patches and with anti-virus software updates (Lecture 22). We also assume that the organization’s network operates behind a well-designed firewall (Lectures 18 and 19). Additionally, we assume that the organization hires a security company to periodically carry out vulnerability scans and for penetration testing of all its computers (Lecture 23). • We further assume that the computers in the targeted organization’s network are not vulnerable to either the dictionary or the rainbow-table attacks (Lecture 24). • In addition, we assume that X is physically based in a different country, which is not the same country where the organization’s 3 Computer and Network Security by Avi Kak Lecture 30 network is. Therefore, it is not possible for X to gain a James Bond like physical entry into the organization’s premises and install a packet sniffer in its LAN. • Given the assumptions listed above, it would seem that

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.