Project4 Acmegrade Internship
Project4 Acmegrade Internship
Email attachments: One of the most common attack vectors, email attachments can
contain malicious code that executes after a user opens the file. In recent years,
multiple major ransomware attacks have used this threat vector,
including Ryuk attacks (A type of encryption attack that targets big organisations for
ransom amount in the form of bitcoin).
Account takeover: Attackers can use a number of different methods to take over a
legitimate user's account. They can steal a user's credentials (username and
password) via phishing attack, brute force attack or purchasing them on the
underground market. Attackers can also try to intercept and use a session cookie to
impersonate the user to a web application.
Lack of encryption: Unencrypted data can be viewed by anyone who has access to
it. It can be intercepted in transit between networks, as in an on-path attack or simply
viewed inadvertently by an intermediary along the network path.
: An insider threat is when a known and trusted user accesses and distributes
confidential data, or enables an attacker to do the same. Such occurrences can be
either intentional or accidental on the part of the user. External attackers can try to
create insider threats by contacting insiders directly and asking, bribing, tricking, or
threatening them into providing access. Sometimes malicious insiders act of their
own accord, out of dissatisfaction with their organization or for some other reason.
Vulnerability exploits: A vulnerability is a flaw in software or hardware — think of it
as being like a lock that does not work properly, enabling a thief who knows where
the faulty lock is to enter a secured building. When an attacker successfully uses a
vulnerability to enter a system, this is called a vulnerability "exploit." Applying the
software or hardware vendor's updates can fix most vulnerabilities. But some
vulnerabilities are "zero-day" vulnerabilities — unknown vulnerabilities for which
there is no known fix.
Open ports: A port is a virtual entryway into a device. Ports help computers and
servers associate network traffic with a given application or process. Ports that are
not in use should be closed. Attackers can send specially crafted messages to open
ports to try to compromise the system, just as a car thief might try opening doors to
see if any are unlocked.
There is no way to eliminate attack vectors altogether. But these approaches can help
stop both internal and external attacks.
Good security practices: Many attacks succeed due to user error: users
fall for phishing attacks, open malicious email attachments, or provide
access to an unauthorized person. Training users to avoid these errors can
go a long way toward eliminating several major attack vectors.
Secure access service edge (SASE): As reliance on the cloud has changed
corporate computing models, many organizations find their networking
and security models need to change as well. Secure access service edge
(SASE) is one method of integrating networking and security. SASE
includes a number of security safeguards that close off the attack vectors
described above.