Malware, Online Social Effects, Threat Modelling

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/37

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards

The Weakest Link Principle

People often represent the weakest link in the security chain and are chronically responsible for the failure of security systems” (Bruce Schneier, 2000, p. 149)

  • Exploitation of software and information systems often targets the weakest link: 

    • Human factors: Social engineering, unintentional errors

    • Technology vulnerabilities: 

      • Outdated or insecure apps

      • Operating system defects

    • Exposed personal traits: 

      • Oversharing on social media (e.g., sensitive interests or habits) 

    • Role of Designers (i.e., You!):

      • Anticipate and mitigate potential threats

      • Build systems that prioritize security and user awareness

2
New cards

What is Malware?

  • Malware is short for Malicious software

  • Any software designed to cause harm to computer systems, networks, or users 

  • Malware can take many forms

3
New cards

What does Malware do?

  • Malware is designed to harm and exploit your computer or network

  • Steal sensitive information like passwords and credit card numbers

  • Disrupt system’s operations

  • Allow attackers to gain unauthorized access to your device

4
New cards

Virus

  • Malicious executable code attached to another executable file

    • Resident Virus (stays in memory) vs. Non-Resident Virus (Don’t stay after execution)

  • How It Spreads: Through infected files

  • Impact: Can corrupt files, slow down systems, or cause crashes

  • Prevention: Use antivirus and avoid untrusted files

5
New cards

Virus Example

  • Conficker (2008)

    • Virus that exploited Win32 weaknesses to create a distributed remote-controlled botnet

    • It worked by killing the tasks associated with antivirus software before it could be detected 

    • 15,000,000 computers affected

6
New cards

Worm

  • Self-replicating malware that doesn’t require a host to spread

    • Compared to a virus they don’t need a host program, can run by themselves 

  • How It Spreads: Exploits security flaws to propagate over networks

  • Impact: Disrupts networks and consumes bandwidth

  • Prevention: Regular updates and firewall use 

7
New cards

Worm Example

  • ILOVEYOU Worm (2000)

    • Email attachments containing Visual Basic Script that damaged the computer by overwriting files 

    • Opening the attachment sent the email to the user’s contacts

8
New cards

Trojan

  • Malware disguised as legitimate software to trick users to install them 

    • Normally something you want

  • How It Spreads: Delivered through phishing or malicious downloads

  • Impact: Steals data or provides unauthorized access 

  • Prevention: Be cautious with emails and downloads 

9
New cards

Trojan Example

  • Back Orifice (1998):

    • User installs server-side program

    • 3rd party can then control/access the machine via client

10
New cards

Ransomware

  • Infects computer, encrypts files or locks systems for ransom

  • How It Spreads: Typically, via phishing emails or infected websites 

  • Impact: Data loss, financial extortion, and system downtime 

  • Prevention: Backup important files and avoid suspicious links 

11
New cards

Ransomware Example

  • WannaCry (2017) 

    • Exploited a vulnerability in Windows systems 

    • Encrypted files demanding Bitcoin payments

    • Spread across the globe, affecting thousands of organizations, including the NHS in the UK

12
New cards

Zombie

  • A compromised computer controlled by hackers to perform malicious acts 

  • How It Spreads: Zombies can be created by any malware, i.e., Trojans or worms

  • Impact: Used in botnets for spam or Distributed Denial of Service (DDoS) attacks

  • Prevention: Regular updates, monitor, unusual activity, and strong authentication

13
New cards

Zombie Example

  • Zeus Trojan (2007) 

    • The Zeus Trojan is notorious for turning infected systems into zombies for use in a botnet

    • Typically for stealing banking credentials and launching DDoS attacks

14
New cards

Botnet

  • A network of zombies controlled remotely by cybercriminals

  • How It Spreads: Malware infiltrates devices, turning them into bots that can be used for malicious purposes

  • Impact: Used to launch attacks like DDoS, send spam emails, or steal sensitive information

  • Prevention: Secure IoT devices, use firewalls, and antivirus software

15
New cards

Botnet Example

  • Mirai Botnet (2016)

    • The Mirai botnet exploited unsecured IoT devices like cameras and routers 

    • Turned them into bots for large-scale DDoS attacks that brought down major websites and services

16
New cards

DDoS (Distributed Denial of Service) Attack

  • When a hacker makes a website or other service inaccessible by flooding it with requests from many different devices - involves zombies

17
New cards

How Malware Gains Access

  • Phishing Emails: Malicious attachments or links trick users into downloading malware

  • Exploiting Vulnerabilities: Malware often takes advantage of unpatched software or system weaknesses

  • Social Engineering: Attackers manipulate victims into revealing sensitive information or executing malicious code

  • Malicious Websites/Ads: Malware is delivered through compromised or fake websites and ads

  • Infected Software/Downloads: Malware can hide in seemingly legitimate software or files

18
New cards

Effects of Malware

  • Data Theft: Personal, financial, or business data is stolen for malicious use

  • System Damage: Malware can corrupt or delete files, slow down or crash systems

  • Loss of Privacy: Sensitive information such as passwords or browsing history may be exposed

  • Financial Loss: Ransomware and data breaches can lead to direct financial damage

  • Performance Issues: Malware can reduce system speed or disrupt normal operation 

  • Reputation Damage: Organizations or individuals may suffer from compromised trust and credibility

19
New cards

Malware Practitioners

  • Cybercriminals: Individuals or groups who create and distribute malware for financial gain

  • Hacktivists: People or organizations who use malware as a tool for political or social causes

  • State-Sponsored Actors: Governments or military organizations that use malware for espionage, sabotage, or warfare

  • Script Kiddies: Less skilled attackers who use pre-made malware for fun or to gain attention

  • Cybersecurity Researchers: Ethical hackers who analyse malware to develop protections or solutions (often the counterforce to malicious actors) 

20
New cards

Malevolent Online Practices

  • Creation and use of malware is NOT the only malevolent practice on the Web…

    • Rise of social networks & digital communication → New malicious practices

    • Often target vulnerable groups:

      • Elderly people

      • Single men and women

      • Children

21
New cards

Phishing

  • Spam emails containing a convincing hyperlink

    • Looks like it’s from a trusted source

    • Actual address may be foreign or suspicious 

    • Victims tricked into entering personal info

    • Clicking confirms your email is active → more spam

  • Examples: Banks, tax agencies, social media 25

  • Compare with spear-phishing

    • A more targeted and personalized form of phishing where attackers tailor their fraudulent messages to a specific individual or organization

22
New cards

Social Engineering

  • Social engineering is often described as “hacking without code” 

  • Based on the principle of trust

  • The perpetrator collects data through:

    • Dumpster diving (that’s why you should always shred documents)

    • Monitoring social media e.g., Facebook and Twitter

    • Shoulder surfing (peeking at screen in public)

  • The perpetrator convinces the victim to trust them, ask for money/details:

    • Via a dating site - Serious Organized Crime Agency reported 200k victims in the UK up to 2011

  • Contact methods: email, telephone, social networking sites

23
New cards

Grooming

  • Gaining trust of a victim by being nice over time

    • Often a long process of building rapport 

  • Once trust has been gained and established:

    • Get the victim to reveal information about themselves 

      • i.e. key personal data for online banking 

    • Involve them in a crime unknowingly 

      • Handling stolen goods, provision of alibis

  • Not just restricted to paedophiles:

    • Romance scams con single adults out of money

24
New cards

Online Stalking

  • Stalking: obsessively following or watching a person without their knowledge

    • Often “lateral” (covert) surveillance

    • Increase due to social networks:

      • Checking a former partner’s statuses or updates

  • Lateral surveillance: viewing someone’s online presence without their knowledge 

    • Employers do background checks online

  • Doxing: publishing private data (addresses, phone numbers) with malicious intent

25
New cards

Deep Fakes and Synthetic Media

  • Deep Fakes: AI‐generated images, videos, or audio that appear real 

    • Technology uses machine learning to mimic faces, voices, or actions 

  • Applications in Cybercrime: 

    • Impersonating executives for fraud (e.g., fake calls or emails) 

    • Creating fake evidence for blackmail or manipulation

    • Spreading misinformation or fake political speeches 

  • Broader Implications: 

    • Challenges in verifying authentic media 

26
New cards

Misinformation and Propaganda

  • Misinformation: Sharing false or misleading information unintentionally 

  • Disinformation: Deliberate spread of false information to manipulate or deceive

  • Techniques:

    • Fake news, doctored images, AI-generated content 

    • Bots and fake accounts amplifying narratives

    • Deepfakes used to fabricate speeches or events

  • Impacts:

    • Erodes trust in media and institutions

    • Polarizes society and amplifies echo chambers 

    • Influences political outcomes and public opinion

27
New cards

Threat Modelling

A technique within the security lifecycle to analyse a system’s security & privacy concerns

28
New cards

Why Threat Model?

  • Recognize potential failures or attacks

  • Identify design & implementation flaws early

  • Inform decisions throughout development, testing, & deployment

29
New cards

Phases of Threat Modelling

  • Asset Identification

    • Determine what you’re trying to protect

  • Threat Analysis 

    • Identify potential attacks or events that could compromise these assets

  • Vulnerability Analysis 

    • Pinpoint the weaknesses in the setup–both technical and organizational

  • Risk Assessment 

    • Evaluate the likelihood and impact of each threat

  • Risk Communication

    • Share the findings with stakeholders (developers, management, end-users) 

These phases identify:

  • Which assets need protection

  • Relevant threats & vulnerabilities

  • Risk level for each threat 

  • Mitigation & contingency priorities

30
New cards

What is a Threat Agent

  • Natural threats and/or accidents 

    • Non-intentional threat agents (e.g., floods, fires, user mistakes)

  • Malicious agents

    • Intentional actions, the ones everyone thinks of

    • Characteristics

      • Motivation

      • Capability

      • Access

      • Amplifiers 

      • Inhibitors

31
New cards

Natural Threats

  • Well-studied (insurance data, actuarial tables)

  • Relatively predictable in terms of frequency so organizations can plan accordingly

32
New cards

Accidental Threats

  • Come from human error with no malicious intent

    • lost or stolen devices, misconfigurations, or employees clicking on phishing links

  • Hard to track

  • Implement awareness training, strict policies around data handling, and proper incident reporting

33
New cards

Malicious Agents

  • An agent can be an individual or group that implements a threat

    • Influenced by amplifiers(motivators, resources, alliances) or inhibitors (legal risk, limited access, fear of exposure)

  • Characteristics:

    • Motivation: Why do they act?

    • Capability: Skills & resources

    • Catalyst: What triggered the action? 

    • Inhibitors: What might deter them? 

    • Amplifiers: What might push them forward?

  • Success Factors: 

    • An exploitable vulnerability and a system worth attacking

34
New cards

Sequence of Factors

35
New cards

Threat Modelling Frameworks

  • STRIDE and DREAD threat models are frameworks used in threat modeling

  • They are systematic processes to identify and assess security risks in a system

36
New cards

STRIDE

  • A mnemonic that categorizes potential threats based on the types of attacks they represent

    • Each letter corresponds to a specific category of threat:

37
New cards

DREAD

  • A risk assessment model that evaluates threats based on five criteria

    • It’s a scoring system designed to prioritize and quantify risks

38
New cards

Key Takeaways

  • Understanding malware types is essential for effective prevention and response

  • Cybercriminals exploit trust and human behaviour via phishing, grooming, social engineering, and stalking

  • Threat Modelling is a proactive method to building secure systems

  • Core Message

    • Cybersecurity is a balance of addressing technical vulnerabilities (e.g., malware, system weaknesses) and human factors (e.g., phishing, social engineering)