0% found this document useful (0 votes)
24 views43 pages

Chapter 3 Cybersecurity Threats, VulnerabilitiesAttacks

The document provides an overview of various types of malware, cyber deception tactics, and cyberattack methods. It categorizes malware into types such as viruses, worms, trojans, and ransomware, and discusses social engineering techniques like phishing and pretexting. Additionally, it outlines different cyberattack strategies including denial-of-service attacks, sniffing, and man-in-the-middle attacks.

Uploaded by

ken ayson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views43 pages

Chapter 3 Cybersecurity Threats, VulnerabilitiesAttacks

The document provides an overview of various types of malware, cyber deception tactics, and cyberattack methods. It categorizes malware into types such as viruses, worms, trojans, and ransomware, and discusses social engineering techniques like phishing and pretexting. Additionally, it outlines different cyberattack strategies including denial-of-service attacks, sniffing, and man-in-the-middle attacks.

Uploaded by

ken ayson
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

SeanXJean09

bing home social games movies & tv music apps preview settin

Open Tray Transformers: Th…


Open Tray

My Pins Rocket League S…

Recent Cybersecurity Threa… - Info. Assurance and Security 1 Dance Central 3

A Select
Sections and Objectives
3.1 Malware and Malicious Code
• Differentiate the types of malware and malicious code.
3.2 Deception
• Describe the tactics, techniques and procedures used by cyber criminals.
3.3 Attacks
• Compare the different methods used in social engineering.
• Compare different types of cyberattacks.

A Select B Back
Malware and Malicious Code
Cybersecurity Threats, Vulnerabilities, and Attacks Part 1

A Select B Back
What is Malware?
• Malware (short for “malicious software”) is a file or code,
typically delivered over a network, that infects,
explores, steals or conducts virtually any behavior an
attacker wants.
• Because malware comes in so many variants, there are
numerous methods to infect computer systems one can
only imagine.
• Though varied in type and capabilities, malware usually
has one of the following objectives:
• Provide remote control for an attacker to use an infected
machine.
• Send spam from the infected machine to unsuspecting
targets.
• Investigate the infected user’s local network.
• Steal sensitive data.

A Select B Back
What is Malware?
• As software designed to interfere with a
computer's normal functioning, malware is a
blanket term for viruses, trojans, and other
destructive computer programs threat actors
use to infect systems and networks in order to
gain access to sensitive information.

A Select B Back
Types of Malware
• Viruses - A virus is malicious executable code attached
to another executable file, such as a legitimate program.
• Most viruses require end-user initiation and can activate
at a specific time or date. From there, it replicates itself to
the computer, infecting other programs and files

• Worms - Worms are malicious code that replicates by


independently exploiting vulnerabilities in networks.
• Worms usually slow down networks. Whereas a virus
requires a host program to run, worms can run by
themselves.
• Other than the initial infection, worms no longer require
user participation.

A Select B Back
Types of Malware
• Trojan Horse - A Trojan horse is malware that carries out
malicious operations under the guise of a desired
operation such as playing an online game.
• This malicious code exploits the privileges of the user
that runs it. A Trojan horse differs from a virus because
the Trojan binds itself to non-executable files, such as
image files, audio files, or games.

• Logic Bomb - A logic bomb is a malicious program that


uses a trigger to awaken the malicious code. For
example, triggers can be dates, times, other programs
running, or the deletion of a user account.
• The logic bomb remains inactive until that trigger event
happens. Once activated, a logic bomb implements a
malicious code that causes harm to a computer.

A Select B Back
Types of Malware
• Ransomware- Ransomware holds a computer system, or
the data it contains, captive until the target makes a
payment.
• Ransomware usually works by encrypting data in the
computer with a key unknown to the user.

• Backdoor and Rootkits - A backdoor or rootkit refers to


the program or code introduced by a criminal who has
compromised a system.
• The backdoor bypasses the normal authentication used
to access a system. A rootkit modifies the operating
system to create a backdoor. Attackers then use the
backdoor to access the computer remotely.

A Select B Back
Types of Malware
• Fileless Malware - a type of malware that uses software,
applications, and protocols already built-in or native to
device operating systems to install and execute malicious
activities.
• In other words, no files are needed to download this
type of malware, hence the name fileless malware.
Fileless malware is memory-based, not file-based.
• Once installed, fileless malware piggybacks on legitimate
scripts by executing malicious activity while the
legitimate programs continue to run. Thanks to this
stealthy nature, fileless malware is tough to spot.

A Select B Back
Types of Malware
• How Fileless Malware work:

A Select B Back
Email and Browser Attacks
• Spam - Spam, also known as junk mail, is unsolicited
email. In most cases, spam is a method of advertising.
However, spam can send harmful links, malware, or
deceptive content.

• Spyware - Spyware is software that enables a criminal to


obtain information about a user’s computer activities.
Spyware often includes activity trackers, keystroke
collection, and data capture. In an attempt to overcome
security measures, spyware often modifies security
settings.

A Select B Back
Email and Browser Attacks
• Adware - Adware typically displays annoying pop-ups to
generate revenue for its authors. The malware may
analyze user interests by tracking the websites visited. It
can then send pop-up advertising pertinent to those
sites.

• Scareware - Scareware persuades the user to take a


specific action based on fear. Scareware forges pop-up
windows that resemble operating system dialogue
windows.

A Select B Back
Email and Browser Attacks
• Phishing - Phishing is a form of fraud. Cyber criminals
use email, instant messaging, or other social media to
try to gather information such as login credentials or
account information by masquerading as a reputable
entity or person.
• Phishing occurs when a malicious party sends a
fraudulent email disguised as being from a legitimate,
trusted source.
• The message intent is to trick the recipient into
installing malware on his or her device or into sharing
personal or financial information.

A Select B Back
Email and Browser Attacks
• Spear Phishing - Spear phishing is a highly targeted
phishing attack. While phishing and spear phishing both
use emails to reach the victims, spear phishing sends
customized emails to a specific person.
• Vishing - Vishing is phishing using voice
communication technology. Criminals can spoof calls
from legitimate sources using voice over IP (VoIP)
technology. Victims may also receive a recorded message
that appears legitimate.
• Pharming - Pharming is the impersonation of a
legitimate website in an effort to deceive users into
entering their credentials.
• Whaling - Whaling is a phishing attack that targets
high profile targets within an organization such as
senior executives.

A Select B Back
Email and Browser Attacks
• SEO Poisoning - Search engines such as Google work by
ranking pages and presenting relevant results based on
users’ search queries.
• Depending on the relevancy of web site content, it may
appear higher or lower in the search result list. SEO,
short for Search Engine Optimization, is a set of
techniques used to improve a website’s ranking by a
search engine.
• While many legitimate companies specialize in
optimizing websites to better position them, SEO
poisoning uses SEO to make a malicious website
appear higher in search results.

A Select B Back
Email and Browser Attacks
• Browser Hijacker - A browser hijacker is malware that
alters a computer's browser settings to redirect the user
to websites paid for by the cyber criminals'
customers. Browser hijackers usually install without the
user's permission and is usually part of a drive-by
download.

A Select B Back
Deception
Cybersecurity Threats, Vulnerabilities, and Attacks Part 2

A Select B Back
The Art of Deception
• Social Engineering - Social engineering is a
completely non-technical means for a
criminal to gather information on a target.
• Social engineering is an attack that attempts
to manipulate individuals into performing
actions or divulging confidential information.
• Social engineers often rely on people’s
willingness to be helpful but also prey on
people’s weaknesses.

A Select B Back
The Art of Deception
• Pretexting - This is when an attacker calls an
individual and lies to them in an attempt to
gain access to privileged data.
• An example involves an attacker who pretends
to need personal or financial data in order to
confirm the identity of the recipient.

• Something for Something (Quid pro quo) -


This is when an attacker requests personal
information from a party in exchange for
something, like a gift.

A Select B Back
The Art of Deception
• Shoulder Surfing and Dumpster Diving – refers
to picking up PINs, access codes or credit card
numbers. An attacker can be in close proximity to
his victim or the attacker can use binoculars or
closed circuit cameras to shoulder surf.

• Impersonation and Hoaxes - Impersonation is


the action of pretending to be someone else. For
example, a recent phone scam targeted
taxpayers. A criminal, posing as an IRS employee,
told the victims that they owed money to the IRS.

A Select B Back
The Art of Deception
• Piggybacking and Tailgating - Piggybacking
occurs when a criminal tags along with an
authorized person to gain entry into a secure
location or a restricted area. Tailgating is another
term that describes the same practice.

• Online, Email, and Web-based Trickery -


Forwarding hoax emails and other jokes, funny
movies, and non-work-related emails at work
may violate the company's acceptable use policy
and result in disciplinary actions.

A Select B Back
Attacks
Cybersecurity Threats, Vulnerabilities, and Attacks Part 3

A Select B Back
Types of Cyber Attacks
• Denial-of-Service (DoS) Attacks - are a type
of network attack. A DoS attack results in some
sort of interruption of network services to
users, devices, or applications.
• DoS attacks are a major risk because they can
easily interrupt communication and cause
significant loss of time and money. These
attacks are relatively simple to conduct, even by
an unskilled attacker.

A Select B Back
Types of Cyber Attacks
• Sniffing - Sniffing is similar to eavesdropping
on someone. It occurs when attackers examine
all network traffic as it passes through their
NIC, independent of whether or not the traffic
is addressed to them or not.
• Criminals accomplish network sniffing with a
software application, hardware device, or a
combination of the two.

A Select B Back
Types of Cyber Attacks
• Spoofing - Spoofing is an impersonation
attack, and it takes advantage of a trusted
relationship between two systems.
• If two systems accept the authentication
accomplished by each other, an individual
logged onto one system might not go through
an authentication process again to access the
other system.

A Select B Back
Types of Cyber Attacks
• Man-in-the-middle - A criminal performs a
man-in-the-middle (MitM) attack by
intercepting communications between
computers to steal information crossing the
network.
• The criminal can also choose to manipulate
messages and relay false information between
hosts since the hosts are unaware that a
modification to the messages occurred.
• MitM allows the criminal to take control over a
device without the user’s knowledge.

A Select B Back
Types of Cyber Attacks
• Zero-Day Attacks - A zero-day attack,
sometimes referred to as a zero-day threat, is a
computer attack that tries to exploit software
vulnerabilities that are unknown or undisclosed
by the software vendor.
• The term “zero hour” describes the moment
when someone discovers the exploit.

A Select B Back
Types of Cyber Attacks
• Keyboard Logging - Keyboard logging is a
software program that records or logs the
keystrokes of the user of the system.
• Criminals can implement keystroke loggers
through software installed on a computer
system or through hardware physically
attached to a computer.
• The criminal configures the key logger software
to email the log file. The keystrokes captured in
the log file can reveal usernames, passwords,
websites visited, and other sensitive
information.

A Select B Back
Wireless and Mobile Attacks
• Grayware - This includes applications that
behave in an annoying or undesirable
manner. Grayware may not have recognizable
malware concealed within, but it still may pose
a risk to the user. Grayware is becoming a
problem area in mobile security with the
popularity of smartphones.

A Select B Back
Wireless and Mobile Attacks
• SMiShing - short for SMS phishing. It uses
Short Message Service (SMS) to send fake text
messages.
• The criminals trick the user into visiting a
website or calling a phone number.
• Unsuspecting victims may then provide
sensitive information such as credit card
information.
• Visiting a website might result in the user
unknowingly downloading malware that infects
the device.

A Select B Back
Wireless and Mobile Attacks
• Rogue Access Points - A rogue access point is
a wireless access point installed on a secure
network without explicit authorization.
• RF Jamming - Wireless signals are susceptible
to electromagnetic interference (EMI), radio-
frequency interference (RFI), and may even be
susceptible to lightning strikes or noise from
fluorescent lights.
• Wireless signals are also susceptible to
deliberate jamming. Radio frequency (RF)
jamming disrupts the transmission of a radio
or satellite station so that the signal does not
reach the receiving station.

A Select B Back
Wireless and Mobile Attacks
• Bluejacking and Bluesnarfing - Bluejacking is
the term used for sending unauthorized
messages to another Bluetooth device.
• Bluesnarfing occurs when the attacker copies
the victim's information from his device. This
information can include emails and contact
lists.

A Select B Back
Wireless and Mobile Attacks
• WEP Attacks - Wired Equivalent Privacy (WEP) is a
security protocol that attempted to provide a wireless
local area network (WLAN) with the same level of
security as a wired LAN.
• Since physical security measures help to protect a wired
LAN, WEP seeks to provide similar protection for data
transmitted over the WLAN with encryption.
• WEP uses a key for encryption.
• There is no provision for key management with
WEP, so the number of people sharing the key will
continually grow.

A Select B Back
Types of Cyber Attacks
• WPA Attacks - Wi-Fi Protected Access (WPA) and then
WPA2 came out as improved protocols to replace WEP.
• WPA2 does not have the same encryption problems
because an attacker cannot recover the key by
observing traffic.
• WPA2 is susceptible to attack because cyber
criminals can analyze the packets going between
the access point and a legitimate user.
• Cyber criminals use a packet sniffer and then run
attacks offline on the passphrase.

A Select B Back
Types of Cyber Attacks
• There are several steps to take to defend against wireless and
mobile device attacks.
• Most WLAN products use default settings. Take advantage of the basic
wireless security features such as authentication and encryption by
changing the default configuration settings.
• Restrict access point placement with the network by placing these devices
outside the firewall or within a demilitarized zone (DMZ) which contains
other untrusted devices such as email and web servers.
• WLAN tools such as NetStumbler may discover rogue access points or
unauthorized workstations. Develop a guest policy to address the need
when legitimate guests need to connect to the Internet while visiting. For
authorized employees, utilize a remote access virtual private network
(VPN) for WLAN access.

A Select B Back
Application Attacks
• Cross-site scripting (XSS) – This is a
vulnerability found in web applications. XSS
allows criminals to inject scripts into the web
pages viewed by users. This script can contain
malicious code.
• Cross-site scripting has three participants: the
criminal, the victim, and the website.
• The cyber-criminal does not target a victim
directly. The criminal exploits vulnerability
within a website or web application.
• Criminals inject client-side scripts into web
pages viewed by users, the victims.

A Select B Back
Application Attacks
• Code Injections Attacks - One way to store
data at a website is to use a database. There are
several different types of databases such as a
Structured Query Language (SQL) database or
an Extensible Markup Language (XML)
database.
• Both XML and SQL injection attacks exploit
weaknesses in the program such as not
validating database queries properly.

A Select B Back
Application Attacks
• Buffer Overflow - A buffer overflow occurs
when data goes beyond the limits of a
buffer.
• Buffers are memory areas allocated to an
application. By changing data beyond the
boundaries of a buffer, the application accesses
memory allocated to other processes.
• This can lead to a system crash, data
compromise, or provide escalation of
privileges.

A Select B Back
Application Attacks
• Remote Code Executions - vulnerabilities
allow a cybercriminal to execute malicious code
and take control of a system with the privileges
of the user running the application.
• Remote code execution allows a criminal to
execute any command on a target machine.

A Select B Back
Application Attacks
• ActiveX Controls and Java controls provide the capability of a
plugin to Internet Explorer.
• ActiveX controls are pieces of software installed by users to
provide extended capabilities. Third parties write some
ActiveX controls and they may be malicious. They can
monitor browsing habits, install malware, or log keystrokes.
Active X controls also work in other Microsoft applications.
• Java operates through an interpreter, the Java Virtual
Machine (JVM). The JVM enables the Java program’s
functionality. The JVM sandboxes or isolates untrusted code
from the rest of the operating system. There are
vulnerabilities, which allow untrusted code to go around the
restrictions imposed by the sandbox.

A Select B Back
Application Attacks
• Defending Against Application Attacks
• The first line of defense against an application attack is to write
solid code.
• Regardless of the language used, or the source of outside input,
prudent programming practice is to treat all input from outside
a function as hostile.
• Validate all inputs as if they were hostile.
• Keep all software – including operating systems and
applications – up to date, and do not ignore update prompts.
• Not all programs update automatically, so at the very least,
always select the manual update option.

A Select B Back
Chapter Summary
Cybersecurity Threats, Vulnerabilities, and Attacks Part 4

A Select B Back
Chapter Summary
• Threats, vulnerabilities, and attacks are the central focus of the cybersecurity
specialists.
• This chapter discussed the various cybersecurity attacks that cyber criminals launch.
• The chapter explained the threat of malware and malicious code.
• The chapter discussed the types of deception involved with social engineering.
Maneuvering explained the types of attacks that both wired and wireless networks
experience.
• Finally, the chapter discussed the vulnerabilities presented by application attacks.
• Understanding the types of possible threats allows an organization to identify the
vulnerabilities that make it a target. The organization can then learn how to
defend itself against cybersecurity trickery and maneuvering.

A Select B Back

You might also like