0% found this document useful (0 votes)
9 views35 pages

Files

The document covers various aspects of information security, including types of security threats such as malware, unauthorized access, and social engineering, as well as methods for mitigating these threats through physical, technical, and administrative controls. It also categorizes different types of hackers and threat actors, and discusses threat intelligence and hunting techniques. Additionally, it introduces core security principles of confidentiality, integrity, and availability, along with strategies for ensuring these principles in computer security.

Uploaded by

maah092881
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views35 pages

Files

The document covers various aspects of information security, including types of security threats such as malware, unauthorized access, and social engineering, as well as methods for mitigating these threats through physical, technical, and administrative controls. It also categorizes different types of hackers and threat actors, and discusses threat intelligence and hunting techniques. Additionally, it introduces core security principles of confidentiality, integrity, and availability, along with strategies for ensuring these principles in computer security.

Uploaded by

maah092881
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

CHAPTER 2 INFORMATION SECURITY

SECURITY THREATS ELECTRONIC CRIMES COMP 2410


OUTLINE
➢ Security Threats
➢Mitigating Threats
➢Types of Hackers
➢Threat Actors
➢Threat Intelligence and Sources
➢Threat Hunting
Security Threats
❑ Malware : Short-hand term for malicious software

❑ Unauthorized Access : Occurs when access to computer resources and


data occurs without the consent of the owner

❑ System Failure :Occurs when a computer crashes or an individual


application fails

❑ Social Engineering : Act of manipulating users into revealing


confidential information or performing other detrimental actions
Mitigating Threats
o Physical Controls
Alarm systems, locks, surveillance cameras, identification cards, and security guards .

o Technical Controls
Smart cards, encryption, access control lists (ACLs), intrusion
detection systems (IDS), and network authentication

o Administrative Controls
Policies, procedures, security awareness training, contingency
planning, and disaster recovery plans .
User training is the most cost-effective security control to use
Types of Hackers
❑ White Hats : Non-malicious hackers who attempt to break into a company’s systems at
their request

❑ Black Hats : Malicious hackers who break into computer systems and networks without
authorization or permission

❑ Gray Hats :Hackers without any affiliation to a company who attempt to break into a
company’s network for the purpose of challenge or vulnerability discovery, but risk the
law by doing so.

❑ Blue Hats : Hackers who attempt to hack into a network with permission of the company
but are not employed by the company .

❑ Elite :Hackers who find and exploit vulnerabilities before anyone else does , 1 in 10,000
are elite
Threat Actors
❑ Script Kiddies :Hackers with little to no skill who only use the tools and exploits written
by others .

❑ Hacktivists :Hackers who are driven by a cause like social change, political agendas, or
terrorism .

❑ Organized Crime : Hackers who are part of a crime group that is well-funded and highly
sophisticated .

❑ Advanced Persistent Threats : Highly trained and funded groups of hackers (often by
nation states) with covert and open-source intelligence at their disposal .
Threat Actors
Threat Intelligence and Sources
• Open-Source
▪ Data that is available to use without subscription, which may include threat
feeds similar to the commercial providers and may contain reputation lists and
malware signature databases .

• Open-Source Intelligence (OSINT)


▪ Methods of obtaining information about a person or organization through
public records, websites, and social media .
Threat Hunting
❑ A cyber security technique designed to detect presence of threat that have not been
discovered by a normal security monitoring Threat Hunting is potentially less
disruptive that penetration testing

❑ Establishing a hypothesis, a hypothesis is derived from the threat modelling and is


based on potential events with higher likelihood and higher impact.

❑ Profiling Threat Actors and Activities Involves the creation of scenario that show how
a prospective attacker might attempt an intrusion and what their objectives might be
Threat Hunting
❑ Threat hunting relies on the usage of the tools developed for regular security
monitoring and incident response
➢ Analyze network traffic
➢ Analyze the executable process list
➢ Analyze other infected host
➢ Identify how the malicious process was executed

❑ Threat hunting consumes a lot of resources and time to conduct, but can yield a lot of
benefits
➢ improve detection capabilities
➢ integrate intelligence
➢ reduces attack surface
➢ Block attack vectors
➢ identify critical assets
Chapter 3 Malware
INFORMATION SECURITY
COMP 2410
Outline

Malware

Viruses

Worms

Trojan horses

Ransomware

Spyware

Rootkits

Spam

Keylogger
Malware & Viruses

Malware

Software designed to infiltrate a computer system and


possibly damage it without the user's knowledge or consent

Viruses
Malicious code that runs on a machine without the user's
knowledge and infects the computer when executed

Viruses require a user action in order to reproduce and


spread

Boot sector

Macro

Program

Multipartite

Encrypted

Polymorphic
Worms & Trojans

Worms Trojans
Malicious software, like a virus, but is able to replicate itself Trojan Horse: Malicious software that is disguised as a piece
without user interaction of harmless or desirable software

Worms self-replicate and spread without a user's consent or Trojans perform desired functions and malicious functions
action
Remote Access Trojan (RAT): Provides the attacker with
Worms can cause disruption to normal network traffic and remote control of a victim computer and is the most
computing activities commonly used type of Trojan

Example: 2009: 9-15 million computers infected with conficker


Ransomware & Spyware

Ransomware Spyware
Malware that restricts access to a victim's computer system Malware that secretly gathers information about the user
until a ransom is received without their consent

Ransomware uses a vulnerability in your software to gain Captures keystrokes made by the victim and takes
access and then encrypts your files screenshots that are sent to the attacker

Adware: Displays advertisements based upon its spying on you


Example: $17 million: SamSam cost the City of Atlanta
Grayware: Software that isn't benign nor malicious and tends to behave
improperly without serious consequences
Rootkits

Rootkit
Software designed to gain administrative level control over a
system without detection

DLL Injection

Malicious code is inserted into a running process on a Windows machine by


taking advantage of Dynamic Link Libraries that are loaded at runtime

Driver Manipulation

An attack that relies on compromising the kernel-mode device drivers that


operate at a privileged or system level

Rootkits are activated before booting the operating system


and are difficult to detect
Spam & Keyloggers

Spam Keyloggers
Activity that abuses electronic messaging systems, most Keyloggers are programs that capture keystrokes from
commonly through email keyboards, although keylogger applications may also capture
other input like:
Spammers often exploit a company's open mail relays to send their
messages Mouse movement

Touchscreen inputs

Credit card swipes from attached devices


Malware Infections

Malware Infection
Threat Vector
Method used by an attacker to access a victim's machine

Attack Vector
Method used by an attacker to gain access to a victim's machine in order to
infect it with malware

Common Delivery Methods


Malware infections usually start within software, messaging,
and media

Watering Holes: Malware is placed on a website that you know your


potential victims will access

Botnet: A collection of compromised computers under the control of a master node

Botnets can be utilized in other processor intensive functions and


activities
Malware Infections

Phishing Examples: Real vs. Fake URLs

[Link] [Link] [Link]

[Link] [Link] [Link]

Missing letter 't' Extra letter 's' Missing letter 'e'

Important: Always verify the URL in your browser's address bar before entering sensitive information or downloading
files. Look for subtle misspellings, extra letters, or unusual domain extensions.
CHAPTER 1 INFORMATION SECURITY
INTRODUCTION TO COMPUTER SECURITY COMP 2410
OUTLINE
➢ Computer Security
➢ Understanding Core Security Principles
➢ How to Ensure Confidentiality
➢ How to Provide Integrity
➢ How to Increase Availability
➢ Computer Security Terminology
➢ Network security
➢ Classification of Security Attacks
Computer Security
Computer Security: The protection afforded to an automated information system in
order to attain the applicable objectives of preserving the integrity, availability, and
confidentiality of information system resources (includes hardware, software,
firmware, information/data, and telecommunications).
This definition introduces three core security principles that are at the heart of
computer security:
 Confidentiality
 Integrity
 Availability
Understanding Core Security Principles
Security is based on several principles,
understanding these basic principles will
help to create a solid foundation in
security.
The basic principles of security are
confidentiality, integrity, and
availability, together they are called the
CIA Triad.
1. Confidentiality
This term covers two related concepts:
1. Data Confidentiality: Assures that private or confidential information is not made
available or disclosed to unauthorized individuals.
2. Privacy : Assures that individuals control or influence what information related to
them may be collected and stored and by whom and to whom that information
may be disclosed.
2. Integrity
This term covers two related concepts:
1. Data integrity: Assures that information has not changed or modification or
destruction.
2. System integrity: Assures that a system performs its intended function in an
unimpaired manner, free from deliberate or inadvertent unauthorized
manipulation of the system.
3. Availability
Availability: means that data and services are available when they are needed and
not denied to authorized users.
A. A loss of confidentiality is the unauthorized disclosure of
information.

B. A loss of integrity is the unauthorized modification or destruction of


information.

C. A loss of availability is the disruption of access to or use of


information or an information system.
How to Ensure Confidentiality
You can ensure confidentiality using several different methods:
1. Encryption: securing data confidentiality by making data unreadable,
along with a key used to encrypt/decrypt the data.
There are two types of encryption:
- Symmetric encryption
- Asymmetric encryption.
Ensure Confidentiality
2. Access Controls: Identification, authentication, and authorization combined provide access
controls and help ensure that only authorized personnel can access data.
• Identification: Users claim an identity with a unique username.
• Authentication: Users prove their identity with authentication, such as with a password.
• Authorization Grant or restrict access to resources.

3. Obfuscation: make something unclear or difficult to understand.


4. Steganography: hiding data within data. For example, you can embed a hidden
message in an image.
How to PROVIDE INTEGRITY
Hashing: hash is simply a number created by executing a hashing algorithm to data,
such as a file or message.
a. If the data never changes, the resulting hash will always be the same.
b. By comparing hashes created at two different times, you can determine if the original data is still the
same.
c. If the hashes are the same, the data is the same. If the hashes are different, the data has changed.

- Hashing algorithm: such as MD5


How to Increase Availability
Redundancy: allows the service to continue without interruption by duplicate the
systems.
Computer Security Terminology
1. Attack: any intentional effort to steal, expose, alter, disable, or destroy data, applications or
other assets through unauthorized access to a network, computer system or digital device.
2. Vulnerabilities: is a weakness.
• It can be a weakness in the hardware, the software, the configuration, or even the users operating the
system.
3. Threat: probability that a specific type of attack may occur by exploits a Vulnerability.
NETWORK SECURITY
Network security consists of the policies, processes and practices adopted to prevent,
detect and monitor unauthorized access, misuse, modification, or denial of a computer
network and network-accessible resources.
Classification of Security Attacks
Network security attacks can be classified passive attacks and active attacks.
1. Passive attack attempts to learn or make use of information from the system
but does not affect system resources.
➢ are difficult to detect because they don’t involve any alteration of data.

2. Active attack attempts to alter system resources or affect their operation.

You might also like