Information Security 101 – Student Guide - AlienVault · PDF fileinformation security...
Transcript of Information Security 101 – Student Guide - AlienVault · PDF fileinformation security...
![Page 1: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/1.jpg)
INFORMATION SECURITY
101 – STUDENT GUIDE
![Page 2: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/2.jpg)
Copyright© 2017 AlienVault. All rights reserved 1
Information Security 101
![Page 3: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/3.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 2
Information Security 101
What motivates attackers?
Review common system vulnerabilities.
Examine how attacks are delivered.
Consider attack types.
•
•
•
•
![Page 4: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/4.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 3
What motivates attackers?
Governments
Surveillance
Steal Secrets
Cause Harm
Activists
Further Cause
Steal Data
Cause Harm
Credit Cards
Personal Data
Resources
Criminals
![Page 5: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/5.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
![Page 6: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/6.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 4
Common System Vulnerabilities
Internet
WWW
![Page 7: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/7.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
![Page 8: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/8.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 5
How Attacks are Delivered
People / SocialBotnets
Internet
Direct
![Page 9: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/9.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
![Page 10: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/10.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 6
Types of attack
Malware Attacks
Denial of Service Attacks
**** Brute force Attacks
**** Cryptographic Attacks
Network AttacksWWW Web Application Attacks
![Page 11: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/11.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
![Page 12: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/12.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 7
Malware Attacks
![Page 13: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/13.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 8
What is a Virus?
Copy with File or EXE
Code injected into programs and files.
User intervention is required.
Spread through sharing.
![Page 14: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/14.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 9
What is a Worm?
Copy over Network
Exploits operating system vulnerabilities.
No user interaction is required.
Reproduce/duplicate and spreads by itself.
![Page 15: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/15.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 10
What is a Trojan?
Free Word Processor
Masquerades as a not-malicious application.
User intervention is required.
Can cause damage but often stealthy.
![Page 16: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/16.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 11
Malware Attacks
Botnet Ransomware
Adware / Spyware
/ Keylogger
Rootkit / Backdoor
![Page 17: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/17.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
![Page 18: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/18.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 12
Web Application Attacks
![Page 19: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/19.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 13
Web Application Attacks (SQL Injection)
Exploits of a Mom: https://xkcd.com/327/
![Page 20: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/20.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 14
Web Application Attacks (SQL Injection)
SQL – Structured Query Language
![Page 21: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/21.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 15
Web Application Attacks (SQL Injection)
Steal Information
Execute Server Commands
Delete Database / Data
![Page 22: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/22.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 16
Web Application Attacks (Cross Site Scripting)
Reflected Stored
Cross Site Scripting is also known as XSS.
Reflected XSS: Link is crafted, the user is tricked into clicking it.
Stored XSS: Impacts all visitors to an exploited page.
PersistentNon-Persistent
![Page 23: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/23.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
![Page 24: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/24.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 17
Web Application Attacks (Cross Site Scripting)
Cookies
![Page 25: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/25.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 18
Web Application Attacks (Cross Site Scripting)
Impersonate Users
Collect Information
Browser Exploits
![Page 26: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/26.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 19
Web Application Attacks (Broken Authentication)
Username / Password / Session ID
Unencrypted Connection
Session values don’t expire
Session IDs in the URL
![Page 27: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/27.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 20
Web Application Attacks (Broken Authentication)
Username / Password / Session ID
http://www.mytestsite.com/login.jsp?sessionid=XXXXXX
![Page 28: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/28.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 21
Denial of Service Attacks
![Page 29: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/29.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 22
Denial of Service Attacks
Denial of Service
Distributed Denial of Service
![Page 30: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/30.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 23
Denial of Service Attacks
ICMP Flood Attack
Smurf Attack
TCP SYN Flood Attack
CPU
Memory
Network
![Page 31: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/31.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
![Page 32: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/32.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 24
Brute Force Attack
![Page 33: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/33.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 25
Brute Force Attack
SSH
FTP
HTTP
…and so on
Attempts every combination
Time-consuming
Guaranteed to work given enough time
![Page 34: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/34.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 26
Dictionary Attack
Uses a file with common usernames and passwords
Faster than an exhaustive brute force attack
Not exhaustive and not guaranteed to succeed
SSH
FTP
HTTP
…and so on?
![Page 35: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/35.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 27
Network Attacks
![Page 36: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/36.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 28
Network Attacks (A Brief Introduction)
Network Sniffing
Promiscuous Mode
Hubs, Switches, and Routers
Router Layer 3 (Network) Internet Protocol (IP)
Switch Layer 2 (Data Link) Media Access Control (MAC)
Hub Layer 1 (Physical)
![Page 37: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/37.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
![Page 38: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/38.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 29
Network Attacks (ARP Spoofing)
Manipulates the Address Resolution Protocol
ARP Poisoning
Used in a “Man in the middle” attack
![Page 39: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/39.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 30
Network Attacks (ARP Spoofing)
Device IP MAC
Destination 192.168.1.5 ec-08-6b-d1-1e-c4
Victim 192.168.1.10 00-50-56-C0-00-08
Attacker 192.168.1.20 00-50-56-C0-00-01
![Page 40: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/40.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 31
Network Attacks (IP Spoofing)
Source IP modified in the packet header
Trying to gain access by impersonating authorized system
Non-Blind — Uses the TCP handshake
Blind — TCP handshake with modified network packet
Non-Blind
Blind
Router (L3) Switch (L2)
![Page 41: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/41.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
![Page 42: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/42.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 32
Network Attacks (IP Spoofing — Non-Blind)
Device IP MAC
Destination 192.168.1.10 00-50-56-C0-00-10
Source 192.168.1.20 00-50-56-C0-00-08
Attacker 192.168.1.30 00-50-56-C0-00-01
SYN
SYN (ACK)
![Page 43: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/43.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 33
Network Attacks (IP Spoofing — Blind)
Device IP MAC
Destination 192.168.1.10 00-50-56-C0-00-10
Source 192.168.1.20 00-50-56-C0-00-08
Attacker 180.10.10.20 00-50-56-C0-00-01
Gateway 192.168.1.1 ec-08-6b-d1-1e-c4
SYN
SYN (ACK)
ACK (Source Routing Flag)
![Page 44: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/44.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 34
Cryptographic Attacks
![Page 45: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/45.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 35
Cryptographic Attacks
SSH
de
9f2
c7
fd2
1b
3a
fad
37
f
WEP / WPA
??
?
Hash
Password
![Page 46: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/46.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 36
Cryptographic Attacks (Man in the Middle)
SA
A
S
![Page 47: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/47.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 37
Cryptographic Attacks (WiFi Cracking)
Wired Equivalent Privacy
WEP is vulnerable to attack due to predictability
Use Wifi Protected Access instead
BSSID Channel Encryption
00:23:69:BB:.. 9 WPA-2
00:1F:33:C9:.. 5 WEP
Deauthentication of Station
Capture frames on reconnect
![Page 48: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/48.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
![Page 49: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/49.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 38
Cryptographic Attacks (Password Hash)
Attacker has obtained password files
Used against hashed passwords
Same idea as brute force authentication
passwd
shadow
Usernames
Password Hash
SHA-1: 8c599c4256f1dcf620614c8fc87ff4ab91c348e1
![Page 50: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/50.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
![Page 51: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/51.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 39
Cryptographic Attacks (Password Hash)
Dictionary Attack
Rainbow Tables
Salting the Hash
Usernames
Password Hash
SHA-512
Dictionary File
Rainbow Table
Contains common passwords and hash
![Page 52: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/52.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
![Page 53: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/53.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
Copyright© 2017 AlienVault. All rights reserved 40
Summary
We identified what motivates attackers.
We introduced some common system vulnerabilities.
We learned about attack delivery methods.
We saw several attack types.
•
•
•
•
![Page 54: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/54.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE
![Page 55: Information Security 101 – Student Guide - AlienVault · PDF fileinformation security 101 – student guide . information security 101](https://reader033.fdocuments.us/reader033/viewer/2022051320/5aa8db647f8b9a9a188c1654/html5/thumbnails/55.jpg)
INFORMATION SECURITY 101 – STUDENT GUIDE