Define information security and its importance: Ensures confidentiality, integrity, and availability of data. Protects organizations from data breaches and loss of sensitive information.
Identify common types of attackers: Hackers, cybercriminals, insider threats, etc. Each group employs different methods and tactics based on their objectives.
List the basic steps of an attack: Includes planning (reconnaissance), execution (delivery, exploitation), and aftermath (installation and command).
Describe the five basic principles of defense: This includes Layering, Limiting, Diversity, Obscurity, and Simplicity; an integrated approach to create a stronger overall security posture.
Virus: Malicious code that attaches to files, spreads when infected files are shared. Needs a host program, can be activated by users unknowingly.
Worm: Self-replicating malware that spreads across networks, does not need a host program. Can spread independently through network vulnerabilities.
Examples:
Trojans (pretend to be legitimate software)
rootkits (hide the presence of others)
logic bombs (triggered by a specific event).
spyware (tracks user activities)
adware (displays unwanted ads)
ransomware (holds data hostage)
backdoors (bypass security measures).
Psychological manipulation to trick users. Includes tactics that exploit human psyche such as flattery, urgency, or fear.
Physical Social Engineering, involves tactics like impersonation and tailgating (gaining unauthorized access through people).
Client-side attacks: Target vulnerabilities in web applications (e.g., Cross-Site Scripting - XSS).
Buffer Overflow Attacks: Exploits software's memory limits leading to crashes or unintended code execution.
Flood the victim's resources. Distributed Denial of Service (DDoS) attacks utilize multiple systems to overwhelm a target.
Interception and Poisoning Attacks: Includes Man-in-the-Middle (MitM) attacks that intercept communications, ARP Poisoning that manipulates network traffic.
Overview of Security in the 21st Century: Complexity and sophistication of attacks increase, with diverse tactics used by attackers.
Potential Vulnerabilities: Unpatched software represent significant weaknesses in an organization’s security posture.
The Rise of Smartphones as Targets: As mobile devices proliferate, they become prime targets for malware and phishing attacks.
Legal Consequences: Laws protecting electronic data include HIPAA (healthcare), Sarbanes-Oxley (financial data), and GLBA (consumer privacy).
Maintaining Productivity: Cyber attacks result in costly downtime and distract from core business activities.
Specific Targets: Focus is placed on vital sectors: Banking, military, municipal services, and critical infrastructure which can have enormous consequences if attacked.
Types:
Hackers: Black hat (criminal) vs. white hat (ethical).
Script Kiddies: Unskilled users who use existing tools.
Insider Threats: Employees with access who may cause security breaches.
Cybercriminals: Organized groups pursuing financial gain.
Cyberterrorists: Motivated by ideology, impacting national security.
Brokers: Individuals who discover and sell vulnerabilities to the highest bidder.
Reconnaissance: Gathering information about the target (surveillance).
Weaponization: Creating the exploit (pairing payload with delivery method).
Delivery: Sending the exploit via mechanisms like phishing emails or infected USB drives.
Exploitation: Executing the attack on the target system (e.g., running malicious code).
Installation: Establishing a backdoor for continued access (malware installation).
Command and Control: Attacker communicates with the compromised system (server communication).
Actions on Objective: Attacker carries out the goal of the attack (data exfiltration, destruction).
Layering: Use multiple defense mechanisms to create a resilient security posture.
Limiting: Restrict access to sensitive information and resources to reduce risks.
Diversity: Vary security measures to particularly complicate an attacker's work.
Obscurity: Keep system details hidden from potential attackers to reduce the attack surface.
Simplicity: Design user interfaces that enhance legitimate user experience while complicating attacker interactions.
Oligomorphic, polymorphic, and metamorphic malware: Designed to evade detection and analysis.
Viruses: Self-replicating code. Can propagate by attaching to files.
Worms: Exploit vulnerabilities or use social engineering for propagation.
Trojans: Disguised as legitimate software but perform malicious actions.
Rootkits: Designed to hide their presence and maintain persistent access.
Strategies to manage cyber risks:
Avoidance
Acceptance
Mitigation
Deterrence
Transference
Data Theft Prevention: Focused on protecting personal and business information effectively.
Flattery: Eliciting trust and compliance through praise.
Impersonation: Pretending to be someone else to gain access or sensitive information.
Phishing: Using deceptive emails to steal credentials.
Dumpster Diving: Searching for sensitive information in discarded materials.
Exploit victims' trust and emotional responses to gain compliance and extract sensitive information.
Malware Overview: Acts as a means to breach systems and protect against unauthorized access.
Social Engineering Approach: Relies on human interactions and psychological aspects to exploit.
Application and Network Attacks: Target vulnerabilities to gain access to sensitive systems and information.
Emergence of New Threats: Adaptation by cybercriminals and evolution of attack methodologies.