BreachExchange mailing list archives
Verizon Data Breach Investigations Report
From: "Al" <macwheel99 () wowway com>
Date: Wed, 9 Dec 2009 07:42:31 -0600
Verizon Data Breach Investigations Report identified, how they typically unfold, and ranked by frequency, the top 15 types of security attacks, comparing risk factors among finance, food, retail, and tech industries.: http://www.verizonbusiness.com/resources/whitepapers/wp_supplemental-report- specifics-for-the-financial-services-food-beverage-retail-and-tech-services- industries_en_xg.pdf 1. Keylogging and spyware: Malware specifically designed to covertly collect, monitor and log the actions of a system user. 2. Backdoor or command/control: Tools that provide remote access to or control of infected systems, or both, and are designed to run covertly. 3. SQL injection: An attack technique used to exploit how Web pages communicate with back-end databases. 4. Abuse of system access/privileges: Deliberate and malicious abuse of resources, access or privileges granted to an individual by an organization. 5. Unauthorized access via default credentials: Instances in which an attacker gains access to a system or device protected by standard preset (widely known) user names and passwords. 6. Violation of acceptable use and other policies: Accidental or purposeful disregard of acceptable use policies. 7. Unauthorized access via weak or misconfigured access control lists (ACLs): When ACLs are weak or misconfigured, attackers can access resources and perform actions not intended by the victim. 8. Packet sniffer: Monitors and captures data traversing a network. 9. Unauthorized access via stolen credentials: Instances in which an attacker gains access to a protected system or device using valid but stolen credentials. 10. Pretexting or social engineering: A social engineering technique in which the attacker invents a scenario to persuade, manipulate, or trick the target into performing an action or divulging information. 11. Authentication bypass: Circumvention of normal authentication mechanisms to gain unauthorized access to a system 12. Physical theft of asset: Physically stealing an asset. 13. Brute-force attack: An automated process of iterating through possible username/password combinations until one is successful. 14. RAM scraper: A fairly new form of malware designed to capture data from volatile memory (RAM) within a system. 15. Phishing (and endless "ishing" variations): A social engineering technique in which an attacker uses fraudulent electronic communications (usually e-mail) to lure the recipient into divulging information. Overall, the 24 page pdf report details nearly 150 ways to detect and combat security threats. I found out about this, thanks to: http://www.net-security.org/secworld.php?id=8597 -Al Mac- - Allowing one's computer to be unprotected, while connected to the internet, can be compared to owning a handgun and putting it out on your doorstep every night, in case a passing robber might be in need of one. Unfortunately millions of people are doing exactly that, while thousands of them do so through networks of companies and government agencies that they manage.
_______________________________________________ Dataloss-discuss Mailing List (dataloss-discuss () datalossdb org) Archived at http://seclists.org/dataloss/ Get business, compliance, IT and security staff on the same page with CREDANT Technologies: The Shortcut Guide to Understanding Data Protection from Four Critical Perspectives. The eBook begins with considerations important to executives and business leaders. http://www.credant.com/campaigns/ebook-chpt-one-web.php
Current thread:
- Verizon Data Breach Investigations Report Al (Dec 11)