{"id":64,"date":"2010-05-20T03:35:24","date_gmt":"2010-05-20T03:35:24","guid":{"rendered":"http:\/\/www.technogypsie.com\/science\/?p=64"},"modified":"2010-05-20T03:35:24","modified_gmt":"2010-05-20T03:35:24","slug":"security-security-threats-social-engineering-cyber-attacks","status":"publish","type":"post","link":"https:\/\/technotink.net\/science\/security-security-threats-social-engineering-cyber-attacks\/","title":{"rendered":"Security+: Security Threats, Social Engineering, Cyber-Attacks"},"content":{"rendered":"<p>\u00a0<\/p>\n<p><strong>Security+: Security Threats, Social Engineering, Cyber-Attacks<\/strong><\/p>\n<p>With the advance of the internet, cyber-hacking, cracking, and digital mischief &#8230; threats to computer systems, networks, and the internet is growing an an exponential rate. These threats range from social engineering, to actual attacks on hardware, software, and networks. Unsecured systems and networks can lose data from these attacks and therefore lose revenue. The attacks manifest in phishing, viruses, worms, trojans, spyware, adware, rootkits, botnets, and logic bombs. Vulnerabilities exist with network devices, back doors, weak passwords, and privilege escalations. These threats come in through back doors, ports, protocols, weak firewalls, and appear as TCP\/IP hijacking, spoofing, man-in-the-middle attacks, eavesdropping, replay, DOS, DDOS, DNS and ARP poisoning. Peripheral data storage items have become deadly tools for introducing these methods for damaging systems, stealing data, and wreaking havock. The user and people associated with data systems are amongst the weakest links and succomb often to attacks known as &#8216;social engineering&#8217; which are actual threats against the human factors in the technology environment. Social engineering relies on deception and trickery to convince unsuspecting users to provide sensitve data or to violate security protocols or rules. These come in via person-to-person, through the internet, over email, or over the phone. Attackers posing as bank representatives asking for a user&#8217;s password, sales representatives fooling the user into giving away personal data, emails with executables hosting bombs, worms, or viruses. The most common forms of social engineering attacks are pretexting (someone pretending they are someone they are not), shoulder surfing (someone spying on what you are doing and capturing private data), dumpster diving (someone taking private data from your physical trash), theft (someone blatantly stealing info and resources), trojan horses (malicious code masquerading as a harmless file), spoofing (faking emails, IP addresses, or MAC addresses), and phishing (email trying to gain personal information). Hackers and Attackers utilize these tools to get into systems, networks, and to break security. There are two types of hackers &#8211; the white hats (those to discover and expose security flaws) and the black hats (those who break into systems for fun or a malicious purpose). Attackers can be summed up as disgruntled employees within the organization, electronic activists (Hacktivists), data thieves, script kiddies, electronic vandals, and cyberterrorists. Attacks also come in through software via software attacks going after operating systems, applications, protocols, and files with the goal of disrupting, disabling, or exploiting the target system. Malicious code attacks are where an attackere places malware or undesirable software into a system. Viruses are a common type of malware as are worms, trojans, logic bombs, spyware, adware, rootkits, and botnets. Software exploitation attacks is where an attacker gets in by a known flaw or feature in an application, such as an email client or database system. These manifest as buffer overflows, mathematical, or weak keys. Other attacks come from the misuse of privilege &#8211; where legitimate users make inappropriate use of their system privileges to steal sensitivie data, delete or modify data, create users or groups, or to provide inappropriate access to others and\/or to disrupt network operations by disabling accounts, services, and user access. These will often show up in the system audit logs which also get attacked by a attacker covering his\/her tracks by appearance of empty audit logs, gaps in audit logs, and audit entries that have been erased. Password attacks are where attackers attempt to obtain and make use of passwords illegitimately by guessing, stealing, or cracking encrypted password files. These are often cracked by guessing, stealing, dictionary attacks, brute force attacks, rainbow tables, hybrid password attacks, and birthday attacks. Other attacks come in through the backdoor where developers or an attacker creates a software mechanism called a backdoor to gain access to a system.<\/p>\n<p><!--more--><br \/>\nAttacks take place on networks as well by means of IP spooking attacks where the attacker creates IP packets with a forged IP source; eavesdropping or sniffing where special monitoring software is used to gain access; hijacking software that takes control of TCP-IP network sessions after the session is authenticated, gaining access via the identity of a legitimate user. Replay attacks are done via software to capture network traffic and then going after a specific host or network. Man-in-the-middle attacks are when an attacker inserts himself between two hosts to gain access to their data transmissions. DOS or Denial of Service attacks is where attackers try to disrupt or disable systems by flooding network links with data to consume bandwidth, sending data designed to exploit known application flaws, or sending multiple service requests to consume a system&#8217;s resources. DDOS or Distributed Denial of Service attacks use multiple computers on disparate networks to launch the attack from simultaneous sources by means of zombies or drones that direct the computers to launch the attacks. ICMP Floods, UDP flods, SYN floods, and reflected Dos attacks are also commonplace. ARP Poisoning is where individual hardware MAC addresses are matched to an IP addresss on a network and the attacker gains access to the target network by redirecting IP addresses to the MAC address of a computer that is not the intended recipient and captures or alters the network traffic before forwarding it to the correct destination causing a denial of service condition pointing the selected IP address to non-existent MAC addresses. A similar attack is done with the DNS called DNS Poisoning as well as DNS hijacking. Hardware threats come in through computer components such as thumb drives, storage media, and plug-in peripherals introducing viruses, hijacks, spyware, worms, trojans, or by stealing data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0 Security+: Security Threats, Social Engineering, Cyber-Attacks With the advance of the internet, cyber-hacking, cracking, and digital mischief &#8230; threats to computer systems, networks, and the internet is growing an an exponential rate. These threats range from social engineering, to &hellip; <a href=\"https:\/\/technotink.net\/science\/security-security-threats-social-engineering-cyber-attacks\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[25,47],"tags":[],"class_list":["post-64","post","type-post","status-publish","format-standard","hentry","category-computer-science","category-information-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security+: Security Threats, Social Engineering, Cyber-Attacks - Naturally Science and Lore<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/technotink.net\/science\/security-security-threats-social-engineering-cyber-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security+: Security Threats, Social Engineering, Cyber-Attacks - Naturally Science and Lore\" \/>\n<meta property=\"og:description\" content=\"\u00a0 Security+: Security Threats, Social Engineering, Cyber-Attacks With the advance of the internet, cyber-hacking, cracking, and digital mischief &#8230; threats to computer systems, networks, and the internet is growing an an exponential rate. These threats range from social engineering, to &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/technotink.net\/science\/security-security-threats-social-engineering-cyber-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Naturally Science and Lore\" \/>\n<meta property=\"article:published_time\" content=\"2010-05-20T03:35:24+00:00\" \/>\n<meta name=\"author\" content=\"technotink\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"technotink\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/security-security-threats-social-engineering-cyber-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/security-security-threats-social-engineering-cyber-attacks\\\/\"},\"author\":{\"name\":\"technotink\",\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/#\\\/schema\\\/person\\\/7d9cbe7291739e15ff8d989e506857fd\"},\"headline\":\"Security+: Security Threats, Social Engineering, Cyber-Attacks\",\"datePublished\":\"2010-05-20T03:35:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/security-security-threats-social-engineering-cyber-attacks\\\/\"},\"wordCount\":931,\"commentCount\":0,\"articleSection\":[\"Computer Science\",\"Information Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/technotink.net\\\/science\\\/security-security-threats-social-engineering-cyber-attacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/security-security-threats-social-engineering-cyber-attacks\\\/\",\"url\":\"https:\\\/\\\/technotink.net\\\/science\\\/security-security-threats-social-engineering-cyber-attacks\\\/\",\"name\":\"Security+: Security Threats, Social Engineering, Cyber-Attacks - Naturally Science and Lore\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/#website\"},\"datePublished\":\"2010-05-20T03:35:24+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/#\\\/schema\\\/person\\\/7d9cbe7291739e15ff8d989e506857fd\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/security-security-threats-social-engineering-cyber-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/technotink.net\\\/science\\\/security-security-threats-social-engineering-cyber-attacks\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/security-security-threats-social-engineering-cyber-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/technotink.net\\\/science\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security+: Security Threats, Social Engineering, Cyber-Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/#website\",\"url\":\"https:\\\/\\\/technotink.net\\\/science\\\/\",\"name\":\"Naturally Science and Lore\",\"description\":\"Science, Natural Wonders and Lore\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/technotink.net\\\/science\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/technotink.net\\\/science\\\/#\\\/schema\\\/person\\\/7d9cbe7291739e15ff8d989e506857fd\",\"name\":\"technotink\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9185dfebad3afe044322ea6774c750b2b758decb9edeffc0898a26f39def320c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9185dfebad3afe044322ea6774c750b2b758decb9edeffc0898a26f39def320c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9185dfebad3afe044322ea6774c750b2b758decb9edeffc0898a26f39def320c?s=96&d=mm&r=g\",\"caption\":\"technotink\"},\"url\":\"https:\\\/\\\/technotink.net\\\/science\\\/author\\\/technotink\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security+: Security Threats, Social Engineering, Cyber-Attacks - Naturally Science and Lore","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/technotink.net\/science\/security-security-threats-social-engineering-cyber-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Security+: Security Threats, Social Engineering, Cyber-Attacks - Naturally Science and Lore","og_description":"\u00a0 Security+: Security Threats, Social Engineering, Cyber-Attacks With the advance of the internet, cyber-hacking, cracking, and digital mischief &#8230; threats to computer systems, networks, and the internet is growing an an exponential rate. These threats range from social engineering, to &hellip; Continue reading &rarr;","og_url":"https:\/\/technotink.net\/science\/security-security-threats-social-engineering-cyber-attacks\/","og_site_name":"Naturally Science and Lore","article_published_time":"2010-05-20T03:35:24+00:00","author":"technotink","twitter_card":"summary_large_image","twitter_misc":{"Written by":"technotink","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/technotink.net\/science\/security-security-threats-social-engineering-cyber-attacks\/#article","isPartOf":{"@id":"https:\/\/technotink.net\/science\/security-security-threats-social-engineering-cyber-attacks\/"},"author":{"name":"technotink","@id":"https:\/\/technotink.net\/science\/#\/schema\/person\/7d9cbe7291739e15ff8d989e506857fd"},"headline":"Security+: Security Threats, Social Engineering, Cyber-Attacks","datePublished":"2010-05-20T03:35:24+00:00","mainEntityOfPage":{"@id":"https:\/\/technotink.net\/science\/security-security-threats-social-engineering-cyber-attacks\/"},"wordCount":931,"commentCount":0,"articleSection":["Computer Science","Information Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/technotink.net\/science\/security-security-threats-social-engineering-cyber-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/technotink.net\/science\/security-security-threats-social-engineering-cyber-attacks\/","url":"https:\/\/technotink.net\/science\/security-security-threats-social-engineering-cyber-attacks\/","name":"Security+: Security Threats, Social Engineering, Cyber-Attacks - Naturally Science and Lore","isPartOf":{"@id":"https:\/\/technotink.net\/science\/#website"},"datePublished":"2010-05-20T03:35:24+00:00","author":{"@id":"https:\/\/technotink.net\/science\/#\/schema\/person\/7d9cbe7291739e15ff8d989e506857fd"},"breadcrumb":{"@id":"https:\/\/technotink.net\/science\/security-security-threats-social-engineering-cyber-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/technotink.net\/science\/security-security-threats-social-engineering-cyber-attacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/technotink.net\/science\/security-security-threats-social-engineering-cyber-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/technotink.net\/science\/"},{"@type":"ListItem","position":2,"name":"Security+: Security Threats, Social Engineering, Cyber-Attacks"}]},{"@type":"WebSite","@id":"https:\/\/technotink.net\/science\/#website","url":"https:\/\/technotink.net\/science\/","name":"Naturally Science and Lore","description":"Science, Natural Wonders and Lore","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/technotink.net\/science\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/technotink.net\/science\/#\/schema\/person\/7d9cbe7291739e15ff8d989e506857fd","name":"technotink","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9185dfebad3afe044322ea6774c750b2b758decb9edeffc0898a26f39def320c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9185dfebad3afe044322ea6774c750b2b758decb9edeffc0898a26f39def320c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9185dfebad3afe044322ea6774c750b2b758decb9edeffc0898a26f39def320c?s=96&d=mm&r=g","caption":"technotink"},"url":"https:\/\/technotink.net\/science\/author\/technotink\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/technotink.net\/science\/wp-json\/wp\/v2\/posts\/64","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technotink.net\/science\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technotink.net\/science\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technotink.net\/science\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/technotink.net\/science\/wp-json\/wp\/v2\/comments?post=64"}],"version-history":[{"count":0,"href":"https:\/\/technotink.net\/science\/wp-json\/wp\/v2\/posts\/64\/revisions"}],"wp:attachment":[{"href":"https:\/\/technotink.net\/science\/wp-json\/wp\/v2\/media?parent=64"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technotink.net\/science\/wp-json\/wp\/v2\/categories?post=64"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technotink.net\/science\/wp-json\/wp\/v2\/tags?post=64"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}