Outside Attackers
Hackers, crackers:
Motives: challenge, self esteem, rebellion status money
Types
Script Kiddies
Intelligence agencies (on behalf of governments)
Terrrorist (blackmail, destruction, revenge, political motives, media coverage)
Industrial espionage (competitive advantage, disruption)
Inside perpetrators (self esteem, espionage, money, revenge, accidents)
Attacks Example
Eavesdropping (Key-Logger installed)
Unauthorized access to data
Password sniffing: Stealing passwords as man in the middle attack
spoofing: pretend different identity to gain advantage phishing
denial of service: Try to make server unavailable by sending too many request e.g. DDOS by bot nets
ransomware: lock the computer by a malware
social engineering: try to get information to exploit Security Questions for password resets (nowadays not that easy as then because of 2FA and notifications)
identify theft: people creating fake accounts to defame a real person
Online fraud: Selling products in advance without ever getting the product
Disclosure and Sharing of Information Sec.
An increasing number of organizations disclose practices regarding information security (e.g. annual report)
Information sharing among firms can reduce security breaches
certifications as signals
organization can have there processes audited and certified
this signals information security activities to partners, customers, and other entities ( e.g Attackers)
e.g ISO270001, IT Grundschutz (BSI)
Individuals can obtain certificates as well ( certified information systems security professional)