Unit 2: Cybercrime
30 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

The most common type of access credential are the username and ______.

passwords

Compromised credentials refer to cases where user credentials are exposed to ______.

unauthorized entities

Usernames and passwords are examples of access ______.

credentials

The exposure of user credentials can lead to ______ breaches.

<p>security</p> Signup and view all the answers

When credentials are compromised, they are vulnerable to ______ exploitation.

<p>unauthorized</p> Signup and view all the answers

Recent malware attacks such as ______ highlight this threat.

<p>Mirai</p> Signup and view all the answers

Malware attacks pose a significant security threat for both managed devices and ______ connected devices.

<p>IoT</p> Signup and view all the answers

Keep an eye out for disgruntled ______

<p>employees</p> Signup and view all the answers

Apps and protocols sending ______ credentials over your network pose a significant security threat.

<p>login</p> Signup and view all the answers

______ connected devices are at risk from recent malware attacks.

<p>IoT</p> Signup and view all the answers

Monitor data and network ______ for every device and user

<p>access</p> Signup and view all the answers

The threat from malware is not limited to traditional devices, but also affects ______ devices.

<p>IoT</p> Signup and view all the answers

This vigilance is necessary to ______ insider risk

<p>expose</p> Signup and view all the answers

Disgruntled employees can pose a significant ______ to an organization

<p>risk</p> Signup and view all the answers

Every ______ and user should be monitored to ensure security

<p>device</p> Signup and view all the answers

In this section, we look at famous examples of different types of ______ attack used by cybercriminals.

<p>cybercrime</p> Signup and view all the answers

Read on to understand what counts as ______.

<p>cybercrime</p> Signup and view all the answers

Cybercriminals use various methods in their ______ attacks.

<p>cybercrime</p> Signup and view all the answers

Famous examples help illustrate different types of ______ committed online.

<p>cybercrime</p> Signup and view all the answers

Understanding cybercrime is crucial to develop effective ______ strategies.

<p>defense</p> Signup and view all the answers

Human detection is when a user notices some unusual or suspect ______ during their normal occupations.

<p>activity</p> Signup and view all the answers

Technical detection happens thanks to an automated analysis of all the data collected about the Information system and its ______.

<p>activity</p> Signup and view all the answers

There are two main ways to detect a security ______: technical and human.

<p>incident</p> Signup and view all the answers

Technical detection happens thanks to an automated analysis of data from servers, firewalls, proxies, and ______.

<p>antivirus</p> Signup and view all the answers

The two main ways to detect security incidents are ______ and human.

<p>technical</p> Signup and view all the answers

All equipment linked to the information systems of a company transmits data about their activity to a tool named ______.

<p>SIEM</p> Signup and view all the answers

SIEM is considered the heart of ______ performance.

<p>SOC</p> Signup and view all the answers

The full form of SIEM is Security Incident and Event ______.

<p>Manager</p> Signup and view all the answers

Companies utilize SIEM to gather data about their ______.

<p>activity</p> Signup and view all the answers

The function of a SOC relies on data transmitted by ______ to the SIEM.

<p>equipment</p> Signup and view all the answers

Study Notes

Unit 2: Cybercrime

  • Agenda
    • Cybercrime organization (2.1)
    • Main attack vectors (2.2)
    • Classification of cyber threats and cybercrimes (2.3)
    • Agencies for combating cybercrime (2.4)
    • SOC/CERT/CSIRT concept and major agencies (2.5)
  • What is Cybercrime?
    • Criminal activity targeting or using computers, networks, or devices
    • Primarily for financial gain, but occasionally due to political or personal motives
    • Committed by organized individuals with advanced skills, or novice hackers
  • Types of Cybercrime
    • Email and Internet fraud
    • Identity fraud (stealing and using personal information)
    • Theft of financial/card payment data
    • Theft and sale of corporate data
    • Cyber-extortion (demanding money to prevent attacks)
    • Ransomware attacks (a type of cyber-extortion)
    • Cryptojacking (mining cryptocurrency using resources not owned)
    • Cyber espionage (accessing government or company data)
  • Cybercrime that targets computers
    • Involves viruses and malware
    • Used to damage devices, stop them from working, delete data
    • Denial-of-Service (DoS) attack (stops users using a machine or network, or prevents a business from providing a service to customers)
    • Can be used to spread malware, illegal information, or illegal images
  • Distributed Denial-of-Service (DDoS) attack
    • Similar to a DoS but uses numerous compromised computers
  • Malware Attacks:
    • Attack where a computer system or network is infected with malware
    • Used by cybercriminals for various purposes, including stealing data, carrying out other crimes, damaging data
    • WannaCry ransomware attack (2017)
      • Global cybercrime
      • Targeted a vulnerability in Microsoft Windows on 230,000 computers across 150 countries
      • Users were locked out of their files and demanded a Bitcoin ransom
      • Estimated to have caused $4 billion in financial losses
  • Phishing
    • Spam emails or other communication to trick recipients
    • Objective is to perform actions that undermine security
    • Can contain infected attachments or malicious links to websites
    • Often used to obtain confidential information
  • Main attack vectors
    • Attack surface: Sum of points on networks where unauthorized users can manipulate, extract data
    • Attack vectors: Methods used to breach the network, such as weak and default passwords, phishing, social engineering, etc.
  • Security Breach
    • Any incident where sensitive data is accessed by unauthorized parties
    • Incidents include DDoS attacks, Bitcoin mining and others
    • Data breaches are most common but not all security incidents involve data theft.
  • 8 Common Cyber Attack Vectors and How to Avoid:
    • Compromised Credentials:
      • Phishing attacks can expose user credentials
      • Stolen/lost credentials can allow intruders access
    • Weak and Stolen Credentials:
      • Weak passwords allow attacker access
      • Attackers can steal and exploit credentials
    • Malicious Insiders:
      • Unhappy employees can expose company information/exploit vulnerabilities
    • Missing / Poor Encryption:
      • Sensitive data is vulnerable without adequate encryption
    • Misconfiguration:
      • Default usernames & passwords, enabled setup pages may create vulnerabilities
      • Attackers can take advantage of these
    • Ransomware:
      • Users unable to access their data until a ransom is paid
    • Phishing:
      • Deception to gain sensitive user information
  • Trust Relationships:
    • A trust relationship exists between two domains or users
    • A breach can allow attacker access
  • SOC/CERT/CSIRT
    • SOC (Security Operations Center)
      • Manages security incidents
      • Tracks activity on a system and notifies CSIRT of abnormalities
      • Uses SIEM (security incident and event manager) Centralizes and correlates log data
    • CERT (Computer Emergency Response Team)
      • Responds to security incidents within an organization
    • CSIRT (Community Emergency Response Team)
      • Responds to security incidents within community.
  • Cybercrime Classification (Additional note)
    • Detailed taxonomy of threats
    • Used for better threat identification and prevention

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Unit 2. Cybercrime PDF

Description

Explore the various facets of cybercrime in this unit. Learn about the organizations involved, main attack vectors, and types of cyber threats. Examine the agencies combating these crimes and the impact on society.

More Like This

Cybercrime Prevention
9 questions

Cybercrime Prevention

SignificantAndradite avatar
SignificantAndradite
Introduction to Cybercrime
24 questions

Introduction to Cybercrime

IntuitiveAmazonite avatar
IntuitiveAmazonite
Use Quizgecko on...
Browser
Browser