Analysis Of Offline Credential-Cheating Attacks

Improved Essays
Authentication
With the rapid growth of Web-based applications, the Internet is a perfect target for hackers. Attacking an individual person or a multi-billionaire company is achievable in a click of a button. Today, almost everything is done by means of using the Internet, from simple email access to paying bills online, managing online banking, filling out taxes, shopping, and so on. As a result, the Internet has become a feeding ground for hackers. These presents a great deal of concerns and challenges for the organization’s security. Users are constantly demanding new applications and features with easy to use interfaces. Conversely, they are worried about increasing dangers. These demands from users creates a wide range of attack from
…show more content…
Two of the most common attacks are offline credential-stealing attacks and online channel-breaking attacks. “Offline credential-stealing attacks aim to fraudulently gather a user’s credential either by invading an insufficiently protected PC via malicious software (such as a virus or Trojan horse) or by tricking a user into voluntarily revealing his or her credentials via phishing” (Hiltgen, Kramp, Weigold, p.g, 21). Online channel-breaking attacks is known to be more sophisticated. It is done by a malicious man in the middle. In this type of attacks, “the intruder unnoticeably intercepts messages between the client PC and the banking server by masquerading as the server to the client and vice versa” (Hiltgen, Kramp, Weigold, p.g, 21). Even though servers are authenticated by a public-key certificate when an SSL/TLS session is established, the user sometimes trustingly ignores messages about invalid or untrusted certificates. To make matters worse, the user is even fooled into trusting online-generated fake server certificates from a nested intruder certification authority. As a result, a hacker could hijack the authenticated banking session or unnoticeably manipulate transaction data (Hiltgen, Kramp, Weigold, p.g, 21,22). With such vulnerabilities in online banking systems, sooner or later, users and banks will have to adopt various secure authentication

Related Documents

  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Security Ecommerce site Phishing, “brand spoofing” or “carding”, is not a “pass-time” process but is a business-like on which organized crime groups extensively use and make a big deal of money. Phishing, being one of the most security challenges, is a hacking technique of malicious and fraudulent mass mailing, masquerade as emails from government agencies, business partners or even company executives using modern way such as social media, phone calls and any other communications to get access to usernames and passwords, credit cards or other sensitive information to steal valuable data. According to Anti-Phishing Working Group (APWG), an increase of 86% of phishing attacks in companies from 2013 to 2015 has been analyzed (source: Forbes).…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    If identity and security authorization with compromised credentials being a significant enabler in successful attacks. Organizations are required to implement reliable…

    • 1456 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    Information Security Risk Assessment for Zappos.com Zappos.com (http://www.zappos.com/) formerly known as Shoesite.com is a retail industry founded in the year 1999 originally established to offer shopping services for footwear. This public company has grown to offer other services as accessories, clothing, eyewear, housewares and beauty products, bags and handbags and gift cards. System Characterization The company locations are in Las Vegas, Shpherdsville and San Francisco. The types of data, information transmitted in Zappos.com include passwords and credit card numbers for online transactions.…

    • 1774 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Insider Attack Essay

    • 564 Words
    • 3 Pages

    Although in today’s media we hear a plethora of reports regarding hackers and attacks on government agencies, multi-million dollar organizations and small business; it’s rarely brought to our attention that many compromises are made possible by insider threats. Without a doubt it is instantly assumed that a majority of insider attacks are intentional; however, it’s the unintentional insider threats that pose a bigger danger to security. Why is the unintentional insider threat a bigger threat? Because more than likely, the user is unaware they are the threat and/or are not well trained and are more likely to repeat their poor security habits. Also research has shown working long hours and multitasking are red flags for risk” ("Survey Finds Employee…

    • 564 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Phishing Attacks

    • 2262 Words
    • 9 Pages

    This article would be useful for a literature review on the effects of cyber-hacking of US financial institutions/banks on the US…

    • 2262 Words
    • 9 Pages
    Improved Essays
  • Improved Essays

    Professional Safety

    • 1508 Words
    • 6 Pages

    With the increased size and usage of the internet, it is hard to imagine this demand has done anything but increase. Therefore this article serves well as a snapshot of the state of passwords at the time while also offering astute observations and predictions that have stood the test of time. It is a well written and worthy article for anyone interested in password issues which clearly shows that users are being overwhelmed with too many…

    • 1508 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Security Life Cycle

    • 1189 Words
    • 5 Pages

    Web Server and Security Development Life Cycle Most organizations use web applications through the use of the internet as part of their business process and functions to fulfill their objectives, business requirements and needs of their company. When implementing these applications, they have to make sure that security is a part of each step that they follow in the development lifecycle. If security is not implemented, then such software or applications, such as web server or web application, can be detrimental to the organization and cost in money, time, production, and many other areas of the business. There is so much information that is used and passed along within an organization that it is imperative that the correct information is used…

    • 1189 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    These policies are often public and, therefore, available to hackers as well. In fact, Dr. Gordon also noted in her findings that “security experts [became] tempting targets for hackers” due to their possession of security tools and their influence on policy (Gordon, 1995). Moreover, not only are security experts targets, but the protections they implement serve as a mental challenge for…

    • 1563 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Characteristics of Good Risk Scenarios It is very important for risk scenarios to be realistic and unbiased so that the management feel assured while taking decisions. According to COBIT (2014), a risk scenario should have the following characteristics to add real value to risk analysis. • Relevance – Scenarios should be result in derivation of meaningful information that would help support decision making.…

    • 917 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Firewall Vs Firewall

    • 1167 Words
    • 5 Pages

    Computers have become widespread in the modern world. Almost everyone now owns a computer, unlike the past where only a few people used a computer. Computers have become a necessity due to their increased usage. More threats arise with the widespread usage of the computers and hence they should be protected from the malware attacks to make sure that they are safe and efficient. These malware attacks are caused by a third party trying to access personal data from the computer as people tend to use computers to save their personal information.…

    • 1167 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    The History Of Passwords

    • 1495 Words
    • 6 Pages

    Employees are an important asset of any organization. In today’s digital world, employees must be educated on the important of security and how they can protect their organization’s information systems data. To do this, user access and identity must be managed properly to control the risks associated with confidential information and user data falling into the wrong hands. One way to manage user access is by using passwords to establish a user 's identity to gain access.…

    • 1495 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Abstract- Modern technological advancement made our current internet on the pinnacle of everything related to information technology. However, it is always threatened by various types of security issues, which are mostly due to hackers, their bots and malicious scripts. They attacks, corrupts, collects and destroys the essential information in the system of the valuable organizations. To stop their such harmful and hazardous activities or to take preventive measures, most organizations now started to keep their own hackers who are known as ethical hackers or white hat hackers. This paper is based on what exactly an ethical hacker does, his protective system from illegal trespassing and on the field of ethical hacking with its various aspects.…

    • 1032 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Internet Banking Security

    • 1002 Words
    • 5 Pages

    However, not all online banking users know the risks of online banking and how to use it in a safe way. Thus, people lose millions of dollars annually because of online fraud (Al Zaabi & Tubaishat, 2015, p.80). Online fraud is becoming a serious problem. Online banking users are expected to have enough knowledge and protection from hackers and they responsible for all of their online banking wrong usage. Thus, any online fraud happens to the customer because of his fault, the bank, unfortunately, will not refund for him (Al Zaabi & Tubaishat, 2015, p.83).…

    • 1002 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Americans have laid cheek and jowl with terrorism for many years, especially since the events of September 11, 2001. While terrorism is usually concerned with bombings, kidnappings or hijackings, some forms of terrorism are much more costly regarding monetary expense. It is estimated that cyber terrorism costs the consumers at least 100 billion dollars a year, although that is only a rough estimate. Company costs for cybercrime can come from the following areas: loss of intellectual property or confidential information, service interruptions that prevent businesses from conducting business on the Internet, damage to business or personal reputations, adding networks, and insurance and recovery to thwart cybercrime (McAfee4). This paper will discuss aspects of cyber…

    • 2920 Words
    • 12 Pages
    Great Essays