Podcast
Questions and Answers
Which of the following best describes a threat in the context of information security?
Which of the following best describes a threat in the context of information security?
- The potential occurrence of an undesirable event that can damage or disrupt an organization. (correct)
- A set of policies and procedures to mitigate risks.
- A weakness in a system that can be exploited.
- An individual or group attempting to exploit vulnerabilities.
Which of the following is an example of an unintentional threat source?
Which of the following is an example of an unintentional threat source?
- A terrorist group launching a cyberattack.
- An unskilled administrator misconfiguring a server. (correct)
- A disgruntled employee intentionally deleting files.
- A hacker exploiting a software vulnerability
Which of the following describes the actions of a 'black hat' hacker?
Which of the following describes the actions of a 'black hat' hacker?
- Using hacking skills for defensive purposes with permission.
- Compromising systems for malicious or destructive activities. (correct)
- Aiming to bring down critical infrastructure regardless of personal consequences
- Working both offensively and defensively, sometimes assisting hackers.
Which threat actor is most likely motivated by religious or political beliefs to cause large-scale disruption?
Which threat actor is most likely motivated by religious or political beliefs to cause large-scale disruption?
Which threat vector involves attackers injecting malicious code into cloud resources to access user information?
Which threat vector involves attackers injecting malicious code into cloud resources to access user information?
What is the primary function of malware?
What is the primary function of malware?
Which of the following is a common technique attackers use to distribute malware by tricking users into clicking on seemingly harmless links?
Which of the following is a common technique attackers use to distribute malware by tricking users into clicking on seemingly harmless links?
A software program used to conceal the existence of malware, helping it evade antivirus detection, is known as a:
A software program used to conceal the existence of malware, helping it evade antivirus detection, is known as a:
Which type of malware disguises itself as a legitimate program to trick users into executing it?
Which type of malware disguises itself as a legitimate program to trick users into executing it?
Which of the following is a common symptom of a Trojan infection?
Which of the following is a common symptom of a Trojan infection?
What activity might a hacker perform using a Trojan after it has infected a system?
What activity might a hacker perform using a Trojan after it has infected a system?
What is the primary characteristic that differentiates a virus from a worm?
What is the primary characteristic that differentiates a virus from a worm?
Which of the following actions is a typical stage in the lifecycle of a virus?
Which of the following actions is a typical stage in the lifecycle of a virus?
Which type of virus infects files without changing the file and directing the disk read point to the virus code instead of the actual program?
Which type of virus infects files without changing the file and directing the disk read point to the virus code instead of the actual program?
Which of the follow steps is involved in creating a simple virus program?
Which of the follow steps is involved in creating a simple virus program?
A type of malware that restricts access to the computer system's files and demands an online payment to the malware creator(s) to remove the restrictions is known as what?
A type of malware that restricts access to the computer system's files and demands an online payment to the malware creator(s) to remove the restrictions is known as what?
All of the following are ransomware families except:
All of the following are ransomware families except:
Which of the following is a characteristic of computer worms?
Which of the following is a characteristic of computer worms?
Which action can a worm perform?
Which action can a worm perform?
What function do rootkits perform on an infected system?
What function do rootkits perform on an infected system?
Which activity does a rootkit enable on a compromised system?
Which activity does a rootkit enable on a compromised system?
What characterizes Potentially Unwanted Applications (PUAs)?
What characterizes Potentially Unwanted Applications (PUAs)?
Which of the following is an example of a PUA that makes use of the victims' personal assets and financial data to perform digital mining of cryptocurrencies?
Which of the following is an example of a PUA that makes use of the victims' personal assets and financial data to perform digital mining of cryptocurrencies?
What is a key characteristic of adware?
What is a key characteristic of adware?
What is the primary purpose of spyware?
What is the primary purpose of spyware?
What is the role of a keylogger?
What is the role of a keylogger?
What is the defining characteristic of a botnet?
What is the defining characteristic of a botnet?
Why do attackers use botnets?
Why do attackers use botnets?
Which of the following is an accurate description of fileless malware?
Which of the following is an accurate description of fileless malware?
A key reason fileless malware is a threat is that it:
A key reason fileless malware is a threat is that it:
What is the purpose of vulnerability?
What is the purpose of vulnerability?
Which of the following is a common reason for the existence of vulnerabilities?
Which of the following is a common reason for the existence of vulnerabilities?
Which vulnerability arises from the insecure transmission of user account details, such as usernames and passwords, over a network?
Which vulnerability arises from the insecure transmission of user account details, such as usernames and passwords, over a network?
Which vulnerability is defined as a flaw that is exploited by attackers before being known and addressed by software developers or security analysts?
Which vulnerability is defined as a flaw that is exploited by attackers before being known and addressed by software developers or security analysts?
What type of risk involves failures in third-party services or components compromising financial data, customer information, or other processes?
What type of risk involves failures in third-party services or components compromising financial data, customer information, or other processes?
Which of the following describes the potential impact of vulnerabilities in network device configurations?
Which of the following describes the potential impact of vulnerabilities in network device configurations?
When assessing risk, what elements are combined?
When assessing risk, what elements are combined?
Which of the following scenarios exemplifies a threat to an organization's information security?
Which of the following scenarios exemplifies a threat to an organization's information security?
What distinguishes an 'internal' intentional threat source from an 'external' intentional threat source?
What distinguishes an 'internal' intentional threat source from an 'external' intentional threat source?
How do 'structured' external threats differ from 'unstructured' external threats in the context of information security?
How do 'structured' external threats differ from 'unstructured' external threats in the context of information security?
Which type of threat actor is most likely to utilize advanced persistent threats (APTs) to steal sensitive information over an extended period?
Which type of threat actor is most likely to utilize advanced persistent threats (APTs) to steal sensitive information over an extended period?
Which of the following attributes is most characteristic of 'insider' threat actors?
Which of the following attributes is most characteristic of 'insider' threat actors?
Which threat vector is primarily associated with attackers attempting to compromise a target by exploiting vulnerabilities in resources supplied by a third-party vendor?
Which threat vector is primarily associated with attackers attempting to compromise a target by exploiting vulnerabilities in resources supplied by a third-party vendor?
Which of the following techniques is used by attackers to increase the ranking of malicious web pages in search engine results?
Which of the following techniques is used by attackers to increase the ranking of malicious web pages in search engine results?
What is the primary function of a 'crypter' in the context of malware?
What is the primary function of a 'crypter' in the context of malware?
Which malware component is responsible for exploiting a bug or vulnerability in a system to breach its security?
Which malware component is responsible for exploiting a bug or vulnerability in a system to breach its security?
What is the key characteristic that differentiates a 'remote access trojan' (RAT) from other types of trojans?
What is the key characteristic that differentiates a 'remote access trojan' (RAT) from other types of trojans?
What actions might a hacker perform using a 'destructive trojan' after it has compromised a system?
What actions might a hacker perform using a 'destructive trojan' after it has compromised a system?
What is the initial step involved in creating a simple virus program that can spread via email?
What is the initial step involved in creating a simple virus program that can spread via email?
What security measure can be implemented to mitigate the risk associated with the Autorun.inf file?
What security measure can be implemented to mitigate the risk associated with the Autorun.inf file?
Which of the following actions is a typical stage in the lifecycle of a virus AFTER it has replicated on a system?
Which of the following actions is a typical stage in the lifecycle of a virus AFTER it has replicated on a system?
Which of the following describes a 'sparse infector' virus?
Which of the following describes a 'sparse infector' virus?
Viruses and Worms have a set of shared characteristics, but also key distinctives that differentiate them. What is the MAIN difference between a Computer Virus and Computer Worm?
Viruses and Worms have a set of shared characteristics, but also key distinctives that differentiate them. What is the MAIN difference between a Computer Virus and Computer Worm?
Which action is most likely to be performed by a computer worm?
Which action is most likely to be performed by a computer worm?
What is the primary purpose behind using a rootkit on a compromised system?
What is the primary purpose behind using a rootkit on a compromised system?
Which of the following is a typical method to launch a Rootkit on to a computer?
Which of the following is a typical method to launch a Rootkit on to a computer?
How is Dharma ransomware typically distributed to victims?
How is Dharma ransomware typically distributed to victims?
Which of the following is a defining characteristic of computer worms?
Which of the following is a defining characteristic of computer worms?
What functionality can a worm perform on an infected system?
What functionality can a worm perform on an infected system?
What action does a worm typically perform to spread to other systems?
What action does a worm typically perform to spread to other systems?
What actions do Potentially Unwanted Applications (PUAs) typically perform?
What actions do Potentially Unwanted Applications (PUAs) typically perform?
Which activity is commonly associated with Cryptomining PUAs?
Which activity is commonly associated with Cryptomining PUAs?
What is a typical indication of an adware infection?
What is a typical indication of an adware infection?
Which of the following is the main objective of spyware?
Which of the following is the main objective of spyware?
How do keyloggers primarily compromise user security?
How do keyloggers primarily compromise user security?
What is the purpose that makes botnets so effective in supporting complex cyberattacks such as Distributed Denial of Service (DDoS)?
What is the purpose that makes botnets so effective in supporting complex cyberattacks such as Distributed Denial of Service (DDoS)?
What is a distinctive characteristic of fileless malware?
What is a distinctive characteristic of fileless malware?
Why are fileless malware attacks considered particularly stealthy?
Why are fileless malware attacks considered particularly stealthy?
Which of the following represents a 'Hardware or Software Misconfiguration' vulnerability?
Which of the following represents a 'Hardware or Software Misconfiguration' vulnerability?
What is 'Inherent Technology Weakness' in Cybersecurity?
What is 'Inherent Technology Weakness' in Cybersecurity?
What does an 'Unsecure protocol' represent in CyberSecurity?
What does an 'Unsecure protocol' represent in CyberSecurity?
Which security policy vulnerability arises from the absence of documented security policies?
Which security policy vulnerability arises from the absence of documented security policies?
What does 'The system sprawl vulnerability' arise within an organizational network?
What does 'The system sprawl vulnerability' arise within an organizational network?
Which statement describes the key effect and impact of a data exfiltration vulnerability?
Which statement describes the key effect and impact of a data exfiltration vulnerability?
What elements do you combine to assess the level of network risk?
What elements do you combine to assess the level of network risk?
What distinguishes 'Insecure or Poor Design of Network and Application' as a common reason for vulnerabilities?
What distinguishes 'Insecure or Poor Design of Network and Application' as a common reason for vulnerabilities?
Which of the following statements accurately describes a characteristic of 'End-user Carelessness' as a common reason for the existence of vulnerabilities?
Which of the following statements accurately describes a characteristic of 'End-user Carelessness' as a common reason for the existence of vulnerabilities?
Which of the following is an example of a vulnerability related to technological configurations?
Which of the following is an example of a vulnerability related to technological configurations?
What is a key characteristic of unwritten security policies as a network security vulnerability?
What is a key characteristic of unwritten security policies as a network security vulnerability?
How does the failure to change default settings on network devices contribute to vulnerabilities?
How does the failure to change default settings on network devices contribute to vulnerabilities?
Which action exemplifies unauthorized access resulting from a vulnerability?
Which action exemplifies unauthorized access resulting from a vulnerability?
What impact directly affects customers, sales and profit as a result of vulnerabilities?
What impact directly affects customers, sales and profit as a result of vulnerabilities?
What elements combine to create Risk?
What elements combine to create Risk?
What distinguishes DELME's Batch Virus Maker from other tools?
What distinguishes DELME's Batch Virus Maker from other tools?
If a program is described as a stealthy program that records user's interaction with the computer and the internet without their knowledge, what type of Potentially Unwanted Program is this?
If a program is described as a stealthy program that records user's interaction with the computer and the internet without their knowledge, what type of Potentially Unwanted Program is this?
After a system encounters slow internet, frequent system lag, and many pop-up advertisements, which of these Potentially Unwanted Applications is most-likely the culprit?
After a system encounters slow internet, frequent system lag, and many pop-up advertisements, which of these Potentially Unwanted Applications is most-likely the culprit?
A user downloads Game.exe from an email attachment labeled "Free Game!". What is MOST-likely the type of malware used in this threat vector?
A user downloads Game.exe from an email attachment labeled "Free Game!". What is MOST-likely the type of malware used in this threat vector?
For each replication in a Polymorphic Virus what process does it undergo, to avoid detection?
For each replication in a Polymorphic Virus what process does it undergo, to avoid detection?
An organization discovers unsupported technical assets within their environment, with limited or outdated patching capabilities; which type of vulnerability is present?
An organization discovers unsupported technical assets within their environment, with limited or outdated patching capabilities; which type of vulnerability is present?
After performing scanning and reconnaissance, an Attacker places a rootkit by installing into corporate computers using Social Engineering tactics. What is the next objective of the attacker?
After performing scanning and reconnaissance, an Attacker places a rootkit by installing into corporate computers using Social Engineering tactics. What is the next objective of the attacker?
An IT auditor finds out that a server containing a web application's database had the older and not upgraded version for over 4 months. Which software management is the cause for this effect?
An IT auditor finds out that a server containing a web application's database had the older and not upgraded version for over 4 months. Which software management is the cause for this effect?
A software developer ships a product that encrypts user data, but uses a fast hash that easily can be cracked with enough resources. Is this an example of a design flaw?
A software developer ships a product that encrypts user data, but uses a fast hash that easily can be cracked with enough resources. Is this an example of a design flaw?
A bot refers to a program used for what?
A bot refers to a program used for what?
What is typically the first stage of fileless malware's attempt to perform malicous activity?
What is typically the first stage of fileless malware's attempt to perform malicous activity?
What key step MUST be taken in order to make a device or system protected against attacks, from Default Passwords
What key step MUST be taken in order to make a device or system protected against attacks, from Default Passwords
Flashcards
What is a Threat?
What is a Threat?
Possible occurence of an undesirable event that can eventually damage and disrupt the functional activities of an organization
Examples of Threats
Examples of Threats
Stealing sensitive data, causing server shutdowns, tricking employees, infecting systems with malware, spoofing identities
Natural Threats
Natural Threats
Natural factors like fires and floods
Internal Threats
Internal Threats
Signup and view all the flashcards
External Threats
External Threats
Signup and view all the flashcards
Structured external threats
Structured external threats
Signup and view all the flashcards
Unstructured external threats
Unstructured external threats
Signup and view all the flashcards
Black Hats
Black Hats
Signup and view all the flashcards
White Hats
White Hats
Signup and view all the flashcards
Gray Hats
Gray Hats
Signup and view all the flashcards
Suicide Hackers
Suicide Hackers
Signup and view all the flashcards
Script Kiddies
Script Kiddies
Signup and view all the flashcards
Cyber Terrorists
Cyber Terrorists
Signup and view all the flashcards
State-Sponsored Hackers
State-Sponsored Hackers
Signup and view all the flashcards
Hacktivist
Hacktivist
Signup and view all the flashcards
Hacker Teams
Hacker Teams
Signup and view all the flashcards
Industrial Spies
Industrial Spies
Signup and view all the flashcards
Insider Threats
Insider Threats
Signup and view all the flashcards
Criminal Syndicates
Criminal Syndicates
Signup and view all the flashcards
Organized Hackers
Organized Hackers
Signup and view all the flashcards
What is a Threat Vector?
What is a Threat Vector?
Signup and view all the flashcards
Examples of Threat Vectors
Examples of Threat Vectors
Signup and view all the flashcards
Threat Vector: Direct Access
Threat Vector: Direct Access
Signup and view all the flashcards
Threat Vector: Removable Media
Threat Vector: Removable Media
Signup and view all the flashcards
Threat Vector: Wireless
Threat Vector: Wireless
Signup and view all the flashcards
Threat Vector: Email
Threat Vector: Email
Signup and view all the flashcards
Threat Vector: Cloud
Threat Vector: Cloud
Signup and view all the flashcards
Threat Vector: Ransomware/Malware
Threat Vector: Ransomware/Malware
Signup and view all the flashcards
Threat Vector: Supply Chain
Threat Vector: Supply Chain
Signup and view all the flashcards
Threat Vector: Business Partners
Threat Vector: Business Partners
Signup and view all the flashcards
What is Malware?
What is Malware?
Signup and view all the flashcards
Malware Uses
Malware Uses
Signup and view all the flashcards
Malware Entry Points
Malware Entry Points
Signup and view all the flashcards
Crypter Component
Crypter Component
Signup and view all the flashcards
Downloader Component
Downloader Component
Signup and view all the flashcards
Dropper Component
Dropper Component
Signup and view all the flashcards
Exploit Component
Exploit Component
Signup and view all the flashcards
Injector Component
Injector Component
Signup and view all the flashcards
Obfuscator Component
Obfuscator Component
Signup and view all the flashcards
Packer Component
Packer Component
Signup and view all the flashcards
Payload
Payload
Signup and view all the flashcards
Malicious Code Component
Malicious Code Component
Signup and view all the flashcards
Trojan
Trojan
Signup and view all the flashcards
Trojan Attack Indications
Trojan Attack Indications
Signup and view all the flashcards
How Hackers Use Trojans
How Hackers Use Trojans
Signup and view all the flashcards
Types of Trojans
Types of Trojans
Signup and view all the flashcards
Remote Access Trojans
Remote Access Trojans
Signup and view all the flashcards
Backdoor Trojans
Backdoor Trojans
Signup and view all the flashcards
Botnet Trojans
Botnet Trojans
Signup and view all the flashcards
Rootkit Trojans
Rootkit Trojans
Signup and view all the flashcards
E-Banking Trojans
E-Banking Trojans
Signup and view all the flashcards
Point-of-Sale Trojans
Point-of-Sale Trojans
Signup and view all the flashcards
Study Notes
What is a Threat?
- Threats are potential occurrences of undesirable events which can damage and disrupt activities in an organization.
- Attackers use cyber threats to infiltrate and steal data, such as personal information, financial data, and login credentials.
Examples of Threats
- Attackers stealing sensitive data from an organization.
- Attackers causing a server shutdown.
- Attackers tricking employees into revealing sensitive information.
- Attackers infecting systems with malware.
- Attackers spoofing the identity of authorized personnel for unauthorized access.
- Attackers modifying/tampering with transferred data over a network.
- Attackers remotely altering data in a database server.
- Attackers performing URL redirection or URL forwarding.
- Attackers performing privilege escalation for unauthorized access.
- Attackers executing denial-of-service (DoS) attacks, rendering resources unavailable.
- Attackers eavesdropping on communication channels without authorized access.
Threat Sources
- Threat sources can be natural, unintentional, or intentional.
Natural Threats
- Natural factors can threaten organizational assets.
- Fires, floods, power failures, lightning, meteor strikes, and earthquakes are natural threats.
- These cause severe physical damage to computer systems.
Unintentional Threats
- Unintentional errors can incite threats.
- Insider-originating security breaches, operator errors, negligence, unskilled administrators, lazy or untrained employees and accidents can be unintentional threats
Intentional Threats
- Internal and external threats are two sources of intentional threats.
- Internal threats includes computer and Internet-related crimes are from insiders or internal attacks.
- Disgruntled or negligent employees are internal threats that harm an organization intentionally or not, they often have privileged network access.
- External threats leverage network vulnerabilities without insider's help, and the severity of these identified network weaknesses dictates the harm caused..
External Threats Further Classified
- Structred Threats: implemented by technically skilled attackers to disrupt services.
- Motivations include bribes, racism, terrorism, and politics.
- Examples: distributed ICMP floods, spoofing executing attacks from multiple sources.
- Attackers are difficult to identify
- Motivations include bribes, racism, terrorism, and politics.
- Unstructred Threats: implemented by unskilled attackers, to access networks.
- Untrained attackers use available online tools for network attacks or crashing public websites.
- They are primarily motivated by curiosity, not criminal intent.
- Prevented with port-scanning and address-sweeping tools.
Threat Actors/Agents
- Hackers and other malicious actors are categorized into Black Hats, White Hats, Gray Hats, Suicide Hackers, and Script Kiddies.
Black Hats
- They use extraordinary computing skills for illegal or malicious purposes.
- Often involved in criminal activities.
White Hats
- Penetration testers use hacking skills for defensive purposes.
- Security analysts secure networks and systems against malicious attacks with system owner’s permission.
Gray Hats
- Individuals work both offensively and defensively.
- They help hackers discover network vulnerabilities, and help vendors by checking limitations making them secure.
Suicide Hackers
- Aim to disrupt critical infrastructure for a "cause".
- Not concerned about punishment.
Script Kiddies
- Unskilled hackers use scripts, tools, and pre-made software.
- They focus on quantity over quality of attacks performed.
- They aim to gain popularity or prove technical skills.
Other Types of Threat Actors/Agents:
- Cyber Terrorists.
- State-Sponsored Hackers.
- Industrial Spies.
- Insiders.
- Hacker Teams.
- Criminal Syndicates.
- Hacktivists.
- Organized Hackers.
Cyber Terrorists
- Motivated by political/religious beliefs to create fear through large-scale network disruptions.
State-Sponsored Hackers
Skilled hackers used by governments to obtain secret information/damage systems of other governments/military organizations.
- They are detecting/exploiting nation's infrastructure and gathering intelligence
Industrial Spies
- Illegally spy on competitors focusing on designs and stealing corporate secrets.
- Often use Advanced Persistent Threats (APTs).
- May use social engineering to steal sensitive data, which result in financial loss.
Insiders
- Trusted people in an organization who has access to critical assets.
- They use privileged access to violate rules/cause harm involving data corruption.
- Disgruntled or terminated employees, or undertrained staff members are insider threats.
Hacker Teams
- Skilled hackers have own resources and search to gain vulnerabilities.
- Team of hackers also develop advanced techniques executing attacks.
Criminal Syndicates
- They engage in criminal activities, exploiting victims in various jurisdictions.
- Illegally embezzle money with cyber attacks and money-laundering.
Hacktivist
- Form of activism in which hackers break systems as an act of protest.
- They hack to raise awareness boost their reputation with a political agenda.
- They deface websites revel information perceiving a threat unauthorized access is a crime.
Organized Hackers
- Hierarchical hacker groups are organized in criminal activities.
- Using not their own devices and botnets are rented from crimeware to attacks.
- Money is stolen and re-sold for stealing data and intellectual property to covertly penetrate the target network undetected.
Attributes of Threat Actors
- Internal, External, Level of Sophistication, Resources/Funding, Intent/Motivation
- Internal:
- Insiders are trusted with authorized systems network and resources.
- External:
- Outsiders who never have authorized access to systems/networks using physical resources.
- Level of Sophistication:
- Highly sophisticated actors are more successful.
- Resources/Funding:
- Attack support is obtained financially on software.
- Intent/Motivation:
- High level of motivation can be launched connected to attacker political, or personal goals.
Threat Vectors
- A threat vector is the method by which an attacker gains access to a system via known vulnerability.
- Vectors: Direct Access, Removable Media, Wireless, Email, Cloud, Ransomware, Supply Chain, Business Partners
Direct Access
- Attacker gains physical access and performs malicious activities, such as OS change/Keyloggers/software worms
- Attackers download data backup media/portable devices
Removable Media
- USB drives, phones and printers is a threat when plugged in.
- Steals or corrupts files with data with malware on host systems.
- Data leakage through removable media can be difficult to prevent/detect
Wireless
- Unsecured wireless corporate hotspots is open to attack
- Attackers can use authentication credits or spoofing to gain access for the corporate network attack
- Attachments may perform phishing campaigns with malware, or to get information to infect systems
Cloud
- Injecting malware to gain information of user data by decepting cloud systems.
- Accounts are exploited with weak credential, also with access to data in target cloud services
Ransomware/Malware
- Advantage can be extracted using attacks from trojans/file-less/ad/malware to exploit/infiltrate organization
Supply chain
- Vulnerabilities can exploit data or resources to use 3rd party vender.
- Introduce a solution to the use attacks.
Business Partner
- Attacks with 3rd party attacks is for accesses.
- transparency is neeed for introducing cybersecurity is needed to have a solid mutual understanding of trust on mitigating
Intro to Malware
- Malware: Malicious software that damages/disables systems and grants control theft or fraud
- Malware Used for:
- Attack browsers, Track websites visits, slow down systems, Hardware failure, Steal personal information
Ways for Malware to Enter a System
- Instant Messenger applications; Portable hardware removable media devices; Browsers and software bugs; Untrusted sites; Downloading files Internet; Email attachments are different ways
- Installation by other malware; bluetooth wireless networks
Autorun
- Turn off autoplay to mitigate setup.exe.
- Computer Configuration > expand Admin > Windows Components > Autoplay Policies.
- "Turn off Autoplay" and enable "All Drives".
Techniques to Distribute Malware on the Web
- Black Hat SEO, social-engineering/click jacking; Spear phishing sites; malvertising; compromised websites downloads.
- Emails
Black Hat SEO
- Ranking by aggressive keyword stuffing.
Social Engineered Click-jacking
- Inject malware to execute websites to click malware.
Spear Phishing Sites
- Steal credentials, bank accounts, mimicking institutions
Malvertising
- Embedding illegitimate ads with malware advertisements on systems
Downloads/Infections, Spam
- A website is simply visiting, downloading unintentionally software.
- When using users websites that have system infections their computers perform malicious actives.
- Use emails to send viruses compromised attached
Components of Malware:
- Crypter; Downloader; Dropper; Exploit; Injector; Obfuscator; Packer; Payload
- Java, Activex, Plug installions, and pushed web servers.
Crypter
- Conceals and protects malware from detection through reverse engineering and analysis.
Downloader
- downloads malicious code and files from the Internet to an infected device
- Attackers first gain first access to intall a downloader
Dropper
- Insides drop code need and intial intall of programs to have scanners undetected.
Exploit
- Containing code that benefits digital systems and have users breach security
Injector
- Injects exploit to change malicious execution by preventing removal injection.
Obfuscator
- Concealing malware to prevent system detection from malware
Packer
- Software compresses the malware for conversion.
Payload
- Activated Malware to effect perform open of deletion and modification to port activity
Key Malware Type:
Trojan, virus, ransomware, worms and rootkits.
Characteristics Of Trojans
- Appears to be helpful/legitimate applications, can be installed/opened by unwitting users.
- When opened, the malicious code runs in the background, gives the person a connection and transfers data
Typical Indications of a Trojan Attack:
- Erratic program behavior, new/unfamiliar icons on toolabar, and performance.
- High CPU usage are all signs to know if trojan attack
How the hackers then use trojans:
- Delete/Replace programs or OS files.
- Recording victims can't see.
- Encrypt all data with the victim doesn't have control
Common Ports Used by Trojans
- Ports 20,21,22,23,23, 68, 80 to 7789
Key Trojans Examples:
- Remote access; Backdoor ; DDoS; Point of Sale; Security Software ; Distabler
- Remoted access from the use system and accounting etc. back doors to access from network computer
Back Door
- Bypasses firewalls for undetected access by hacker leveraging accesses machine networks.
- Users may be able to download it or install without knowledge.
Worms
- They replicate with code that's independent and execute connections
- Resources don’t want use human interactions the worm has a payload that install back doors.
Worm vs Virus
- Virus infects system while worm uses OS/Applications.
- Virus change or add data, worms does not modify any stored programs.
- Worm also is easier to remove than virus
LOLJax
- Is from UEFI can be to automatically inject Malware.
- It evade traditional detections and have a persistence of OS data protection and maintains
Potentially Unwanted Applications
- PUAs; are harmful for free software.
- They are covert data monitors on software and free ware types
Adware
Display advertisement, collect data.
Torrent
- Downloading Torrent compell users.
Marketing
- Browser to apps
Cryptomining
- Financial data on bitcoin
Dialers
- Contacts without consent
Spyware
- User interface without record send data to control
Spyware types
- Spy, power spying, and monitors on a computer are some spying applications
Spyware Actions
- Collect user data and send is a prime objective.
Spytech SpyAgent
- Monitor can do ever program key stroke.
KeyLoggers
Hardware and software to monitor keystroke
- Gather confidential data. like banking and pwds that is sensitive accesss.
What they do
- record activities that users monitor like websites data.
Rootkits
- Used to hide presences attack act access is guaranteed.
Common Areas of Vulnerability
End-User Carelessness and Intentional acts are common reasons vulnerabilities arise from end-user acts.
- Natural to be taken due security. Human factor easy effect serious comes losing info.
- Account info gets the bad and loss or be a 3rd party with network on attack
Act/Ends Acts
- Acts can lead to heavy information that’s financial and heavy to get from security.
Techno Vulnerables:
TCIP is insecure/OS’s need updating/Devices need lack of auth and routing.
Configuration Vulnerabilities
- User accounts, System accounts and system
Internet Service
- Default and settings:
Impact Caused Due to Vulnerabilities
- Disclosure; Privilege Escalation; Data modification.
Risk
- Is is asset and vuls it can potential
A Risk
- Is either damage and shutting down the data of business. stealing data all that
Misconfigurations
- Network and hostile misconfiguration is the human is the cause
Default Installation
- Devices and set is needed when downloading or installing the software and the systems
Application Issues
- Buffer overflows are often by data.
- Integer and improper.
Poor Patch Management
- Application, Devices or Serves Can is unpatched to do so.
Design Flaws
- Incorrect validation has data issues for logical attacks
- Data attack have the mechanisms to be hard to see so access happens
Operating System Flaws
- Attacks use malicious code with sensitive info stolen of them.
Classificatins
- Configuration/Operational Platform/ known vulnerabilities
Summary of the Module:
- Topic discussion is about network actors with examples
- It vector info includes data for threat factors. In malware distribution. Types are explained for the cyber security reasons It covers various reasons as per vulnerabilities in different categories from classification
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.