SlideShare a Scribd company logo
1 of 48
1
CompTIA Security+ Guide to Network
Security Fundamentals, Sixth Edition
Chapter 2
Malware and Social Engineering Attacks
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use
as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use.
Objectives
2.1 Define malware
2.2 List the different types of malware
2.3 Identify payloads of malware
2.4 Describe the types of psychological social
engineering attacks
2.5 Explain physical social engineering attacks
© 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain
product or service or otherwise on a password-protected website for classroom use.
3
Attacks Using Malware (1 of 2)
• Malicious software (malware)
• Enters a computer system without the owner’s knowledge or consent
• Uses a threat vector to deliver a malicious “payload” that performs a
harmful function once it is invoked
• Malware is a general term that refers to a wide variety of damaging or
annoying software
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
4
Attacks Using Malware (2 of 2)
• Malware can be classified by the using the primary trait that the malware
possesses:
• Circulation - spreading rapidly to other systems in order to impact a
large number of users
• Infection - how it embeds itself into a system
• Concealment - avoid detection by concealing its presence from
scanners
• Payload capabilities - what actions the malware performs
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
5
Circulation
• Two types of malware have the primary traits of circulation:
• Viruses
• Worms
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
6
Virus (1 of 6)
• Computer virus - malicious computer code that reproduces itself on
the same computer
• Program virus - infects an executable program file
• Macro - a series of instructions that can be grouped together as a
single command
• Common data file virus is a macro virus that is written in a script
known as a macro
• Virus infection method:
• Appender infection - virus appends itself to end of a file
-Easily detected by virus scanners
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
7
Virus (2 of 6)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
8
Virus (3 of 6)
• Most viruses today go to great lengths to avoid detection (called an armored virus)
• Some armored virus infection techniques include:
• Swiss cheese infection - viruses inject themselves into executable code
- Virus code is “scrambled” to make it more difficult to detect
• Split infection - virus splits into several parts
- Parts placed at random positions in host program
- The parts may contain unnecessary “garbage” doe to mask their true purpose
• Mutation – some viruses can mutate or change
- An oligomorphic virus changes its internal code to one of a set of number of
predefined mutations whenever executed
- A polymorphic virus completely changes from its original form when executed
- A metamorphic virus can rewrite its own code and appear different each time it
is executed
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
9
Virus (4 of 6)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
10
Virus (5 of 6)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
11
Virus (6 of 6)
• Viruses perform two actions:
• Unloads a payload to perform a malicious action
• Reproduces itself by inserting its code into another file on the same
computer
• Examples of virus actions
• Cause a computer to repeatedly crash
• Erase files from or reformat hard drive
• Turn off computer’s security settings
• Viruses cannot automatically spread to another computer
• Relies on user action to spread
• Viruses are attached to files
• Viruses are spread by transferring infected files
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
12
Worm (1 of 2)
• Worm - malicious program that uses a computer network to replicate
• Sends copies of itself to other network devices
• Worms may:
• Consume resources or
• Leave behind a payload to harm infected systems
• Examples of worm actions
• Deleting computer files
• Allowing remote control of a computer by an attacker
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
13
Worm (2 of 2)
Action Virus Worm
What does it do?
Inserts malicious code into
a program or data file
Exploits a vulnerability in an
application or operating
system
How does it spread
to other computers?
User transfers infected files
to other devices
Uses a network to travel from
one computer to another
Does it infect a file? Yes No
Does there need to
be user action for it
to spread?
Yes No
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
14
Infection
• Three examples of malware that have the primary trait of infection:
• Trojans
• Ransomware
• Crypto-malware
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
15
Trojans
• Trojan - an executable program that does something other than
advertised
• Contain hidden code that launches an attack
• Sometimes made to appear as data file
• Example
• User downloads “free calendar program”
-Program scans system for credit card numbers and passwords
-Transmits information to attacker through network
• Special type of Trojan:
• Remote access Trojan (RAT) – gives the threat actor unauthorized
remote access to the victim’s computer by using specially configured
communication protocols
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
16
Ransomware (1 of 3)
• Ransomware - prevents a user’s device from properly operating until
a fee is paid
• Is highly profitable
• A variation of ransomware displays a fictitious warning that a software
license has expired or there is a problem and users must purchase
additional software online to fix the problem
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
17
Ransomware (2 of 3)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
18
Ransomware (3 of 3)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
19
Crypto-malware (1 of 2)
• Crypto-malware – a more malicious form of ransomware where threat
actors encrypt all files on the device so that none of them could be opened
• Once infected with crypto-malware:
• The software connects to the threat actor’s command and control (C&C)
server to receive instructed or updated data
• A locking key is generated for the encrypted files and that key is
encrypted with another key that has been downloaded from the C&C
• Second key is sent to the victims once they pay the ransom
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
20
Crypto-malware (2 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
21
Concealment (1 of 2)
• Rootkits - software tools used by an attacker to hide actions or presence
of other types of malicious software
• Hide or remove traces of log-in records, log entries
• May alter or replace operating system files with modified versions that
are specifically designed to ignore malicious activity
• Users can no longer trust their computer that contains a rootkit
• The rootkit is in charge and hides what is occurring on the computer
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
22
Concealment (2 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
23
Payload Capabilities
• The destructive power of malware can be found in its payload capabilities
• Primary payload capabilities are to:
• Collect data
• Delete data
• Modify system security settings
• Launch attacks
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
24
Collect Data (1 of 6)
• Different types of malware are designed to collect important data from
the user’s computer and make it available at the attacker
• This type of malware includes:
• Spyware
• Adware
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
25
Collect Data (2 of 6)
• Spyware - software that gathers information without user consent
• Uses the computer’s resources for the purposes of collecting and
distributing personal or sensitive information
• Keylogger - captures and stores each keystroke that a user types on the
computer’s keyboard
• Attacker searches the captured text for any useful information such as
passwords, credit card numbers, or personal information
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
26
Collect Data (3 of 6)
• A keylogger can be a small hardware device or a software program
• As a hardware device, it is inserted between the computer keyboard
connection and USB port
• Software keyloggers are programs installed on the computer that
silently capture information
• An advantage of software keyloggers is that they do not require physical
access to the user’s computer
• Often installed as a Trojan or virus, can send captured information back
to the attacker via Internet
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
27
Collect Data (4 of 6)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
28
Collect Data (5 of 6)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
29
Collect Data (6 of 6)
• Adware - program that delivers advertising content in manner
unexpected and unwanted by the user
• Typically displays advertising banners and pop-up ads
• May open new browser windows randomly
• Users disapprove of adware because:
• Adware can display objectionable content
• Frequent popup ads can interfere with a user’s productivity
• Popup ads can slow a computer or even cause crashes and the
loss of data
• Unwanted advertisements can be a nuisance
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
30
Delete Data
• The payload of other types of malware deletes data on the computer
• Logic bomb - computer code that lies dormant until it is triggered by a
specific logical event
• Difficult to detect before it is triggered
• Often embedded in large computer programs that are not routinely
scanned
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
31
Modify System Security
• Backdoor - gives access to a computer, program, or service that
circumvents normal security to give program access
• When installed on a computer, they allow the attacker to return
at a later time and bypass security settings
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
32
Launch Attacks (1 of 2)
• Bot or zombie - an infected computer that is under the remote control of
an attacker
• Groups of zombie computers are gathered into a logical computer
network called a botnet under the control of the attacker (bot herder)
• Infected zombie computers wait for instructions through a command and
control (C&C) structure from bot herders
• A common C&C mechanism used today is HTTP, which is more difficult
to detect and block
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
33
Launch Attacks (2 of 2)
Type of attack Description
Spamming Botnets are widely recognized as the
primary source of spam email. A botnet
consisting of thousands of bots enables an
attacker to send massive amounts of spam.
Spreading
malware
Botnets can be used to spread malware and
create new bots and botnets. Bots can
download and execute a file sent by the
attacker.
Manipulating
online polls
Because each bot has a unique Internet
Protocol (IP) address, each “vote” by a bot
will have the same credibility as a vote cast
by a real person.
Denying services Botnets can flood a web server with
thousands of requests and overwhelm it to
the point that it cannot respond to legitimate
requests.
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
34
Social Engineering Attacks
• Social engineering - a means of gathering information for an attack by
relying on the weaknesses of individuals
• Social engineering attacks can involve psychological approaches as well
as physical procedures
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
35
Psychological Approaches
• Psychological approaches goal: to persuade the victim to provide
information or take action
• Attackers use a variety of techniques to gain trust without moving quickly:
• Provide a reason
• Project confidence
• Use evasion and diversion
• Make them laugh
• Psychological approaches often involve:
• Impersonation, phishing, spam, hoaxes, and watering hole attacks
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
36
Impersonation
• Impersonation - attacker pretends to be someone else:
• Help desk support technician
• Repairperson
• IT support
• Manager
• Trusted third party
• Fellow employee
• Attacker will often impersonate a person with authority because victims
generally resist saying “no” to anyone in power
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
37
Phishing (1 of 2)
• Phishing - sending an email claiming to be from legitimate source
• Tries to trick user into giving private information
• The emails and fake websites are difficult to distinguish from those
that are legitimate
• Variations on phishing attacks:
• Spear phishing – targets specific users
• Whaling – targets the “big fish”
• Vishing – instead of using email, uses a telephone call instead
• About 97% of all attacks start with phishing
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
38
Phishing (2 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
39
Spam (1 of 2)
• Spam - unsolicited e-mail
• Primary vehicles for distribution of malware
• Sending spam is a lucrative business
-Cost spammers very little to send millions of spam messages
• Filters look for specific words and block the email
• Image spam - uses graphical images of text in order to circumvent
text-based filters
• Often contains nonsense text so it appears legitimate
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
40
Spam (2 of 2)
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
41
Hoaxes
• Hoaxes - a false warning, usually claiming to come from the IT
department
• Attackers try to get victims to change configuration settings on their
computers that would allow the attacker to compromise the system
• Attackers may also provide a telephone number for the victim to
call for help, which will put them in direct contact with the attacker
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
42
Watering Hole Attack
• Watering hole attack - a malicious attack that is directed toward a
small group of specific individuals who visit the same website
• Example:
• Major executives working for a manufacturing company may visit
a common website, such as a parts supplier to the manufacturer
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
43
Physical Procedures
• Two of the most common physical procedures are:
• Dumpster diving
• Tailgating
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
44
Dumpster Diving (1 of 2)
• Dumpster diving
• Digging through trash to find information that can be useful in an attack
• An electronic variation of dumpster diving is to use Google’s search
engine to look for documents and data posted online
• Called Google dorking
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
45
Dumpster Diving (2 of 2)
Item retrieved Why useful
Calendars A calendar can reveal which employees are out
of town at a particular time
Inexpensive computer hardware,
such as USB flash drives or portal
hard drives
Often improperly disposed of and might contain
valuable information
Memos Seemingly unimportant memos can often
provide small bits of useful information for an
attacker who is building an impersonation
Organizational charts These identify individuals within the organization
who are in positions of authority
Phone directories Can provide the names and telephone numbers
of individuals in the organization to target or
impersonate
Policy manuals These may reveal the true level of security within
the organization
System manuals Can tell an attacker the type of computer system
that is being used so that other research can be
conducted to pinpoint vulnerabilities
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
46
Tailgating
• Tailgating
• Following behind an authorized individual through an access door
• An employee could conspire with an unauthorized person to allow him
to walk in with him (called piggybacking)
• Watching an authorized user enter a security code on a keypad is
known as shoulder surfing
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
47
Chapter Summary (1 of 2)
• Malware is malicious software that enters a computer system without the
owner’s knowledge or consent
• Malware that spreads include computer viruses and worms
• Ransomware prevents a user’s device from properly and fully functioning
until a fee is paid
• A rootkit can hide its presence or the presence of other malware on the
computer by accessing lower layers of the OS
• Different types of malware are designed to collect data from the user’s
computer and make it available to the attacker
• Spyware, keylogger, and adware
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.
48
Chapter Summary (2 of 2)
• A logic bomb is computer code that is typically added to a legitimate
program but lies dormant until triggered by a specific logical event
• A backdoor gives access to a computer, program, or service that
circumvents any normal security protections
• A popular payload of malware is software that will allow the infected
computer to be placed under the remote control of an attacker (known
as a bot)
• Multiple bot computers can be used to created a botnet
• Social engineering is a means of gathering information for an attack
from individuals
• Types of social engineering approaches include phishing, dumpster
diving, and tailgating
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use.

More Related Content

What's hot

Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application SecurityDr. Ahmed Al Zaidy
 
Chapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K IChapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K IDr. Ahmed Al Zaidy
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 PresentationAmy McMullin
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentationMahmoud Ibra
 
How to Test for The OWASP Top Ten
 How to Test for The OWASP Top Ten How to Test for The OWASP Top Ten
How to Test for The OWASP Top TenSecurity Innovation
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Umesh Mahawar
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itlavakumar Thatisetti
 
Network security
Network securityNetwork security
Network securityEstiak Khan
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresAung Thu Rha Hein
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissanceNishaYadav177
 
Understanding Application Threat Modelling & Architecture
 Understanding Application Threat Modelling & Architecture Understanding Application Threat Modelling & Architecture
Understanding Application Threat Modelling & ArchitecturePriyanka Aash
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 PresentationAmy McMullin
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 

What's hot (20)

Chapter 9 Client and application Security
Chapter 9 Client and application SecurityChapter 9 Client and application Security
Chapter 9 Client and application Security
 
Chapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K IChapter 4 Advanced Cryptography and P K I
Chapter 4 Advanced Cryptography and P K I
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
OWASP TOP 10 VULNERABILITIS
OWASP TOP 10 VULNERABILITISOWASP TOP 10 VULNERABILITIS
OWASP TOP 10 VULNERABILITIS
 
Software security
Software securitySoftware security
Software security
 
Chapter 2 Presentation
Chapter 2 PresentationChapter 2 Presentation
Chapter 2 Presentation
 
Brute force-attack presentation
Brute force-attack presentationBrute force-attack presentation
Brute force-attack presentation
 
How to Test for The OWASP Top Ten
 How to Test for The OWASP Top Ten How to Test for The OWASP Top Ten
How to Test for The OWASP Top Ten
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
Network security
Network securityNetwork security
Network security
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & Countermeasures
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
 
Understanding Application Threat Modelling & Architecture
 Understanding Application Threat Modelling & Architecture Understanding Application Threat Modelling & Architecture
Understanding Application Threat Modelling & Architecture
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Chapter 1 Presentation
Chapter 1 PresentationChapter 1 Presentation
Chapter 1 Presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Similar to Chapter 2 Malware and Social Engineering Attacks

Chapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityChapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityDr. Ahmed Al Zaidy
 
Lecture 8- information technology slides
Lecture 8- information technology slidesLecture 8- information technology slides
Lecture 8- information technology slidesAiman Niazi
 
ITT450 Chapter 1.pptx
ITT450 Chapter 1.pptxITT450 Chapter 1.pptx
ITT450 Chapter 1.pptxAliffDarfriz
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimenidhidgowda185
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - KloudlearnKloudLearn
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Introduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf fileIntroduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf filedebmajumder741249
 
Chapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and TechnologyChapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and TechnologyDr. Ahmed Al Zaidy
 
Computer security: hackers and Viruses
Computer security: hackers and VirusesComputer security: hackers and Viruses
Computer security: hackers and VirusesWasif Ali Syed
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMohsin Dahar
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptxvamshimatangi
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networksjayussuryawan
 

Similar to Chapter 2 Malware and Social Engineering Attacks (20)

Chapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data SecurityChapter 13 Vulnerability Assessment and Data Security
Chapter 13 Vulnerability Assessment and Data Security
 
Lecture 5.pptx
Lecture 5.pptxLecture 5.pptx
Lecture 5.pptx
 
Malicious
MaliciousMalicious
Malicious
 
Lecture 8- information technology slides
Lecture 8- information technology slidesLecture 8- information technology slides
Lecture 8- information technology slides
 
ITT450 Chapter 1.pptx
ITT450 Chapter 1.pptxITT450 Chapter 1.pptx
ITT450 Chapter 1.pptx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Introduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf fileIntroduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf file
 
Chapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and TechnologyChapter 6Network Security Devices, Design, and Technology
Chapter 6Network Security Devices, Design, and Technology
 
Computer security: hackers and Viruses
Computer security: hackers and VirusesComputer security: hackers and Viruses
Computer security: hackers and Viruses
 
Malware
MalwareMalware
Malware
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 

More from Dr. Ahmed Al Zaidy

Chapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingChapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingDr. Ahmed Al Zaidy
 
Chapter 13 Programming for web forms
Chapter 13 Programming for web formsChapter 13 Programming for web forms
Chapter 13 Programming for web formsDr. Ahmed Al Zaidy
 
Chapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsChapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsDr. Ahmed Al Zaidy
 
Chapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesChapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesDr. Ahmed Al Zaidy
 
Chapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsChapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsDr. Ahmed Al Zaidy
 
Chapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptChapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptDr. Ahmed Al Zaidy
 
Chapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaChapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaDr. Ahmed Al Zaidy
 
Chapter 7 Designing a web form
Chapter 7 Designing a web formChapter 7 Designing a web form
Chapter 7 Designing a web formDr. Ahmed Al Zaidy
 
Chapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsChapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsDr. Ahmed Al Zaidy
 
Chapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webChapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webDr. Ahmed Al Zaidy
 
Chapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSChapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSDr. Ahmed Al Zaidy
 
Chapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutChapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutDr. Ahmed Al Zaidy
 
Chapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSChapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSDr. Ahmed Al Zaidy
 
Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Dr. Ahmed Al Zaidy
 
testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2Dr. Ahmed Al Zaidy
 
Chapter 14 Business Continuity
Chapter 14 Business ContinuityChapter 14 Business Continuity
Chapter 14 Business ContinuityDr. Ahmed Al Zaidy
 

More from Dr. Ahmed Al Zaidy (20)

Chapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based ProgrammingChapter 14 Exploring Object-based Programming
Chapter 14 Exploring Object-based Programming
 
Chapter 13 Programming for web forms
Chapter 13 Programming for web formsChapter 13 Programming for web forms
Chapter 13 Programming for web forms
 
Chapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheetsChapter 12 Working with Document nodes and style sheets
Chapter 12 Working with Document nodes and style sheets
 
Chapter 11 Working with Events and Styles
Chapter 11 Working with Events and StylesChapter 11 Working with Events and Styles
Chapter 11 Working with Events and Styles
 
Chapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statementsChapter 10 Exploring arrays, loops, and conditional statements
Chapter 10 Exploring arrays, loops, and conditional statements
 
Chapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScriptChapter 9 Getting Started with JavaScript
Chapter 9 Getting Started with JavaScript
 
Chapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimediaChapter 8 Enhancing a website with multimedia
Chapter 8 Enhancing a website with multimedia
 
Chapter 7 Designing a web form
Chapter 7 Designing a web formChapter 7 Designing a web form
Chapter 7 Designing a web form
 
Chapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and ColumnsChapter 6 Working with Tables and Columns
Chapter 6 Working with Tables and Columns
 
Chapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile webChapter 5 Designing for the mobile web
Chapter 5 Designing for the mobile web
 
Chapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSSChapter 4 Graphic Design with CSS
Chapter 4 Graphic Design with CSS
 
Chapter 3 Designing a Page Layout
Chapter 3 Designing a Page LayoutChapter 3 Designing a Page Layout
Chapter 3 Designing a Page Layout
 
Chapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSSChapter 2 Getting Started with CSS
Chapter 2 Getting Started with CSS
 
Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5Chapter 1 Getting Started with HTML5
Chapter 1 Getting Started with HTML5
 
Integer overflows
Integer overflowsInteger overflows
Integer overflows
 
testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2testing throughout-the-software-life-cycle-section-2
testing throughout-the-software-life-cycle-section-2
 
Fundamental of testing
Fundamental of testingFundamental of testing
Fundamental of testing
 
Chapter 15 Risk Mitigation
Chapter 15 Risk MitigationChapter 15 Risk Mitigation
Chapter 15 Risk Mitigation
 
Chapter 14 Business Continuity
Chapter 14 Business ContinuityChapter 14 Business Continuity
Chapter 14 Business Continuity
 
Chapter 12 Access Management
Chapter 12 Access ManagementChapter 12 Access Management
Chapter 12 Access Management
 

Recently uploaded

ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Chapter 2 Malware and Social Engineering Attacks

  • 1. 1 CompTIA Security+ Guide to Network Security Fundamentals, Sixth Edition Chapter 2 Malware and Social Engineering Attacks © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 2. Objectives 2.1 Define malware 2.2 List the different types of malware 2.3 Identify payloads of malware 2.4 Describe the types of psychological social engineering attacks 2.5 Explain physical social engineering attacks © 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 3. 3 Attacks Using Malware (1 of 2) • Malicious software (malware) • Enters a computer system without the owner’s knowledge or consent • Uses a threat vector to deliver a malicious “payload” that performs a harmful function once it is invoked • Malware is a general term that refers to a wide variety of damaging or annoying software © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 4. 4 Attacks Using Malware (2 of 2) • Malware can be classified by the using the primary trait that the malware possesses: • Circulation - spreading rapidly to other systems in order to impact a large number of users • Infection - how it embeds itself into a system • Concealment - avoid detection by concealing its presence from scanners • Payload capabilities - what actions the malware performs © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 5. 5 Circulation • Two types of malware have the primary traits of circulation: • Viruses • Worms © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 6. 6 Virus (1 of 6) • Computer virus - malicious computer code that reproduces itself on the same computer • Program virus - infects an executable program file • Macro - a series of instructions that can be grouped together as a single command • Common data file virus is a macro virus that is written in a script known as a macro • Virus infection method: • Appender infection - virus appends itself to end of a file -Easily detected by virus scanners © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 7. 7 Virus (2 of 6) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 8. 8 Virus (3 of 6) • Most viruses today go to great lengths to avoid detection (called an armored virus) • Some armored virus infection techniques include: • Swiss cheese infection - viruses inject themselves into executable code - Virus code is “scrambled” to make it more difficult to detect • Split infection - virus splits into several parts - Parts placed at random positions in host program - The parts may contain unnecessary “garbage” doe to mask their true purpose • Mutation – some viruses can mutate or change - An oligomorphic virus changes its internal code to one of a set of number of predefined mutations whenever executed - A polymorphic virus completely changes from its original form when executed - A metamorphic virus can rewrite its own code and appear different each time it is executed © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 9. 9 Virus (4 of 6) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 10. 10 Virus (5 of 6) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 11. 11 Virus (6 of 6) • Viruses perform two actions: • Unloads a payload to perform a malicious action • Reproduces itself by inserting its code into another file on the same computer • Examples of virus actions • Cause a computer to repeatedly crash • Erase files from or reformat hard drive • Turn off computer’s security settings • Viruses cannot automatically spread to another computer • Relies on user action to spread • Viruses are attached to files • Viruses are spread by transferring infected files © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 12. 12 Worm (1 of 2) • Worm - malicious program that uses a computer network to replicate • Sends copies of itself to other network devices • Worms may: • Consume resources or • Leave behind a payload to harm infected systems • Examples of worm actions • Deleting computer files • Allowing remote control of a computer by an attacker © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 13. 13 Worm (2 of 2) Action Virus Worm What does it do? Inserts malicious code into a program or data file Exploits a vulnerability in an application or operating system How does it spread to other computers? User transfers infected files to other devices Uses a network to travel from one computer to another Does it infect a file? Yes No Does there need to be user action for it to spread? Yes No © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 14. 14 Infection • Three examples of malware that have the primary trait of infection: • Trojans • Ransomware • Crypto-malware © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 15. 15 Trojans • Trojan - an executable program that does something other than advertised • Contain hidden code that launches an attack • Sometimes made to appear as data file • Example • User downloads “free calendar program” -Program scans system for credit card numbers and passwords -Transmits information to attacker through network • Special type of Trojan: • Remote access Trojan (RAT) – gives the threat actor unauthorized remote access to the victim’s computer by using specially configured communication protocols © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 16. 16 Ransomware (1 of 3) • Ransomware - prevents a user’s device from properly operating until a fee is paid • Is highly profitable • A variation of ransomware displays a fictitious warning that a software license has expired or there is a problem and users must purchase additional software online to fix the problem © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 17. 17 Ransomware (2 of 3) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 18. 18 Ransomware (3 of 3) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 19. 19 Crypto-malware (1 of 2) • Crypto-malware – a more malicious form of ransomware where threat actors encrypt all files on the device so that none of them could be opened • Once infected with crypto-malware: • The software connects to the threat actor’s command and control (C&C) server to receive instructed or updated data • A locking key is generated for the encrypted files and that key is encrypted with another key that has been downloaded from the C&C • Second key is sent to the victims once they pay the ransom © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 20. 20 Crypto-malware (2 of 2) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 21. 21 Concealment (1 of 2) • Rootkits - software tools used by an attacker to hide actions or presence of other types of malicious software • Hide or remove traces of log-in records, log entries • May alter or replace operating system files with modified versions that are specifically designed to ignore malicious activity • Users can no longer trust their computer that contains a rootkit • The rootkit is in charge and hides what is occurring on the computer © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 22. 22 Concealment (2 of 2) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 23. 23 Payload Capabilities • The destructive power of malware can be found in its payload capabilities • Primary payload capabilities are to: • Collect data • Delete data • Modify system security settings • Launch attacks © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 24. 24 Collect Data (1 of 6) • Different types of malware are designed to collect important data from the user’s computer and make it available at the attacker • This type of malware includes: • Spyware • Adware © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 25. 25 Collect Data (2 of 6) • Spyware - software that gathers information without user consent • Uses the computer’s resources for the purposes of collecting and distributing personal or sensitive information • Keylogger - captures and stores each keystroke that a user types on the computer’s keyboard • Attacker searches the captured text for any useful information such as passwords, credit card numbers, or personal information © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 26. 26 Collect Data (3 of 6) • A keylogger can be a small hardware device or a software program • As a hardware device, it is inserted between the computer keyboard connection and USB port • Software keyloggers are programs installed on the computer that silently capture information • An advantage of software keyloggers is that they do not require physical access to the user’s computer • Often installed as a Trojan or virus, can send captured information back to the attacker via Internet © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 27. 27 Collect Data (4 of 6) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 28. 28 Collect Data (5 of 6) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 29. 29 Collect Data (6 of 6) • Adware - program that delivers advertising content in manner unexpected and unwanted by the user • Typically displays advertising banners and pop-up ads • May open new browser windows randomly • Users disapprove of adware because: • Adware can display objectionable content • Frequent popup ads can interfere with a user’s productivity • Popup ads can slow a computer or even cause crashes and the loss of data • Unwanted advertisements can be a nuisance © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 30. 30 Delete Data • The payload of other types of malware deletes data on the computer • Logic bomb - computer code that lies dormant until it is triggered by a specific logical event • Difficult to detect before it is triggered • Often embedded in large computer programs that are not routinely scanned © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 31. 31 Modify System Security • Backdoor - gives access to a computer, program, or service that circumvents normal security to give program access • When installed on a computer, they allow the attacker to return at a later time and bypass security settings © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 32. 32 Launch Attacks (1 of 2) • Bot or zombie - an infected computer that is under the remote control of an attacker • Groups of zombie computers are gathered into a logical computer network called a botnet under the control of the attacker (bot herder) • Infected zombie computers wait for instructions through a command and control (C&C) structure from bot herders • A common C&C mechanism used today is HTTP, which is more difficult to detect and block © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 33. 33 Launch Attacks (2 of 2) Type of attack Description Spamming Botnets are widely recognized as the primary source of spam email. A botnet consisting of thousands of bots enables an attacker to send massive amounts of spam. Spreading malware Botnets can be used to spread malware and create new bots and botnets. Bots can download and execute a file sent by the attacker. Manipulating online polls Because each bot has a unique Internet Protocol (IP) address, each “vote” by a bot will have the same credibility as a vote cast by a real person. Denying services Botnets can flood a web server with thousands of requests and overwhelm it to the point that it cannot respond to legitimate requests. © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 34. 34 Social Engineering Attacks • Social engineering - a means of gathering information for an attack by relying on the weaknesses of individuals • Social engineering attacks can involve psychological approaches as well as physical procedures © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 35. 35 Psychological Approaches • Psychological approaches goal: to persuade the victim to provide information or take action • Attackers use a variety of techniques to gain trust without moving quickly: • Provide a reason • Project confidence • Use evasion and diversion • Make them laugh • Psychological approaches often involve: • Impersonation, phishing, spam, hoaxes, and watering hole attacks © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 36. 36 Impersonation • Impersonation - attacker pretends to be someone else: • Help desk support technician • Repairperson • IT support • Manager • Trusted third party • Fellow employee • Attacker will often impersonate a person with authority because victims generally resist saying “no” to anyone in power © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 37. 37 Phishing (1 of 2) • Phishing - sending an email claiming to be from legitimate source • Tries to trick user into giving private information • The emails and fake websites are difficult to distinguish from those that are legitimate • Variations on phishing attacks: • Spear phishing – targets specific users • Whaling – targets the “big fish” • Vishing – instead of using email, uses a telephone call instead • About 97% of all attacks start with phishing © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 38. 38 Phishing (2 of 2) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 39. 39 Spam (1 of 2) • Spam - unsolicited e-mail • Primary vehicles for distribution of malware • Sending spam is a lucrative business -Cost spammers very little to send millions of spam messages • Filters look for specific words and block the email • Image spam - uses graphical images of text in order to circumvent text-based filters • Often contains nonsense text so it appears legitimate © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 40. 40 Spam (2 of 2) © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 41. 41 Hoaxes • Hoaxes - a false warning, usually claiming to come from the IT department • Attackers try to get victims to change configuration settings on their computers that would allow the attacker to compromise the system • Attackers may also provide a telephone number for the victim to call for help, which will put them in direct contact with the attacker © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 42. 42 Watering Hole Attack • Watering hole attack - a malicious attack that is directed toward a small group of specific individuals who visit the same website • Example: • Major executives working for a manufacturing company may visit a common website, such as a parts supplier to the manufacturer © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 43. 43 Physical Procedures • Two of the most common physical procedures are: • Dumpster diving • Tailgating © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 44. 44 Dumpster Diving (1 of 2) • Dumpster diving • Digging through trash to find information that can be useful in an attack • An electronic variation of dumpster diving is to use Google’s search engine to look for documents and data posted online • Called Google dorking © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 45. 45 Dumpster Diving (2 of 2) Item retrieved Why useful Calendars A calendar can reveal which employees are out of town at a particular time Inexpensive computer hardware, such as USB flash drives or portal hard drives Often improperly disposed of and might contain valuable information Memos Seemingly unimportant memos can often provide small bits of useful information for an attacker who is building an impersonation Organizational charts These identify individuals within the organization who are in positions of authority Phone directories Can provide the names and telephone numbers of individuals in the organization to target or impersonate Policy manuals These may reveal the true level of security within the organization System manuals Can tell an attacker the type of computer system that is being used so that other research can be conducted to pinpoint vulnerabilities © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 46. 46 Tailgating • Tailgating • Following behind an authorized individual through an access door • An employee could conspire with an unauthorized person to allow him to walk in with him (called piggybacking) • Watching an authorized user enter a security code on a keypad is known as shoulder surfing © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 47. 47 Chapter Summary (1 of 2) • Malware is malicious software that enters a computer system without the owner’s knowledge or consent • Malware that spreads include computer viruses and worms • Ransomware prevents a user’s device from properly and fully functioning until a fee is paid • A rootkit can hide its presence or the presence of other malware on the computer by accessing lower layers of the OS • Different types of malware are designed to collect data from the user’s computer and make it available to the attacker • Spyware, keylogger, and adware © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.
  • 48. 48 Chapter Summary (2 of 2) • A logic bomb is computer code that is typically added to a legitimate program but lies dormant until triggered by a specific logical event • A backdoor gives access to a computer, program, or service that circumvents any normal security protections • A popular payload of malware is software that will allow the infected computer to be placed under the remote control of an attacker (known as a bot) • Multiple bot computers can be used to created a botnet • Social engineering is a means of gathering information for an attack from individuals • Types of social engineering approaches include phishing, dumpster diving, and tailgating © 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for classroom use.