Task 6 access_control_attacks_hong_kim_sheng_2

13
Access Control Attacks Access Control and Perimeter Prepared by: Hong Kim Sheng 1

Transcript of Task 6 access_control_attacks_hong_kim_sheng_2

Page 1: Task 6 access_control_attacks_hong_kim_sheng_2

Access Control Attacks

Access Control and Perimeter

Prepared by: Hong Kim Sheng

1

Page 2: Task 6 access_control_attacks_hong_kim_sheng_2

Agenda

In this session, we will discuss about the types of

access control attacks:

• Man-in-the Middle Attack

• Brute Force / Frequency Analysis Attack

• Trojan Horse Attack

Page 2

Page 3: Task 6 access_control_attacks_hong_kim_sheng_2

Introduction to

Access Control Attacks

3

Access Control Attacks

- Attackers intrude into the systems to

monitor/override/perform/records an activities.

- Gain unauthorized access to perform criminal activities on target

system.

- May intentionally cause damage to victim’s system depending on the

purpose of an attacks.

Page 4: Task 6 access_control_attacks_hong_kim_sheng_2

Man-in-the MiddleNormal Traffic Pattern

4

Page 5: Task 6 access_control_attacks_hong_kim_sheng_2

5

Man-in-the MiddleUnusual Traffic Pattern

Page 6: Task 6 access_control_attacks_hong_kim_sheng_2

Data Leakage and

Information Breach

6

Data Leakage

- Personal bank account

- Photos and Videos

- Documentations

Information Breach

- Customer Details

- Security policy

- Company strategy

Page 7: Task 6 access_control_attacks_hong_kim_sheng_2

Unauthorized Access

7

Unauthorized Access

- Account being hacked

- Illegal Activities

- System Vulnerability

- Spyware

- Virus

Page 8: Task 6 access_control_attacks_hong_kim_sheng_2

Brute Force

8

Brute Force Attacks

- Trying every possibility or conbinations on the text

to decrypt the possibilities of the ciphertext

- Often used to decrypt an encrypted text to reveal the

plaintext of the messages

- E.g 2 Letter combination will be

AA,AB,AC,AD,AE,AF until AZ and continued with

ZA,ZB. The brute force efforts will be permutations

of 26 letter of alphabets.

Page 9: Task 6 access_control_attacks_hong_kim_sheng_2

Frequency Analysis

Page 9

Page 10: Task 6 access_control_attacks_hong_kim_sheng_2

Monoalphabetic

Ciphertext

Page 10

- Mono alphabetic cipher is a technique where each letters are

substituted with another alphabets where the keys used for

encryption and decryption.

Page 11: Task 6 access_control_attacks_hong_kim_sheng_2

Page 11

Trojan Horse

Page 12: Task 6 access_control_attacks_hong_kim_sheng_2

Trojan Horse

• A program that is maliciously harmful to gain access or control to cause

damages such as ruining the file allocation on the hard disk

• Often harmful attacks may cause big impacts on stored data or informations

through modification or deletion of files, data corruption, formatting hard

disks or destroying contents, spread viruses across networks or spy activities

to gain access into sensitive informations. E.g customer data, bank account

details, personal informations.

Page 12

Page 13: Task 6 access_control_attacks_hong_kim_sheng_2

Thank You

13