SlideShare a Scribd company logo
1 of 27
Proprietary & Confidential
@GoCyberSec | January, 2020
Chapter 6
Comparing Threats, Vulnerabilities, and
Common Attacks
CompTIA Security +
Proprietary & Confidential
@GoCyberSec | January, 2020
Introduction
• Understanding threat actors
• Determining malware types
• Recognizing common attacks
• Blocking malware and other attacks
• Educating users
Proprietary & Confidential
@GoCyberSec | January, 2020
Threat Actors
• Open-source intelligence
– Info freely available (such as from web sites and social media)
• Script kiddie
– Little expertise, sophistication, or funding
• Hacktivist
– Part of an activist movement
• Insider
– Employee (can become a malicious insider)
• Organized crime
– Typically motivated by money
• Competitor
Proprietary & Confidential
@GoCyberSec | January, 2020
Threat Actors
• Nation state/advanced persistent threat (APT)
–Identify a target and persistently attack until they
gain access
–Often remain in network for months or years
–China APT1
–Russia APT 28 (Fancy Bear)
–Russia APT 29 (Cozy Bear)
Proprietary & Confidential
@GoCyberSec | January, 2020
Determining Malware Types
• Viruses
–Replication mechanism
–Activation mechanism
–Payload mechanism
Proprietary & Confidential
@GoCyberSec | January, 2020
Determining Malware Types
• Worms
–Self replicating
• Logic bombs
–Executes in response to an event
• Backdoors
–Provides an alternate method of access
–Many types of malware create backdoors
Proprietary & Confidential
@GoCyberSec | January, 2020
Understanding Malware
• Trojan Horse
– Appears to be useful but is malicious
– Pirated software, rogueware, or games
– Also infect systems via USB drives
• Drive-by downloads
– Attackers compromise a web site to gain control of it
– Attackers install a Trojan embedded in the web site’s code
– Attackers attempt to trick users into visiting the site
– When users visit, the web site attempts to download the Trojan onto the
users’ systems
• Remote access Trojan (RAT)
Proprietary & Confidential
@GoCyberSec | January, 2020
Determining Malware Types
• Ransomware
–Takes control of user’s system
–Typically encrypts user’s data
–Attempts to extort payment
Proprietary & Confidential
@GoCyberSec | January, 2020
Determining Malware Types
• Keylogger
–Capture’s keystrokes
• Spyware
–Can access a user’s private data and result in loss of
confidentiality
• Adware
–Pop-ups that market products to users
–Blocked with pop-up blockers
Proprietary & Confidential
@GoCyberSec | January, 2020
Bots and Botnets
• Bots – software robots
• Botnets
– Controlled by criminals (bot herders)
– Manage command and control centers
– Malware joins computers to robotic network
• Zombies or clones
– Computers within botnet
– Join after becoming infected with malware
Proprietary & Confidential
@GoCyberSec | January, 2020
Determining Malware Types
• Rootkits
• System level or kernel access
• Can modify system files and system access
• Hide their running processes to avoid detection with hooking
techniques
• File integrity checker can detect modified files
• Inspection of RAM can discover hooked processes
Proprietary & Confidential
@GoCyberSec | January, 2020
Social Engineering
• Flattery and conning
• Assuming a position of authority
• Encouraging someone to:
• Perform a risky action
• Reveal sensitive information
• Impersonating
• Tailgating
Proprietary & Confidential
@GoCyberSec | January, 2020
Social Engineering
• Impersonating
–Such as an authorized technician
• Shoulder Surfing
–Can be in person looking at a computer
–Can be with a remote camera
• Tricking users with hoaxes
Proprietary & Confidential
@GoCyberSec | January, 2020
Social Engineering
• Tailgating
- Closely following authorized personnel without
providing credentials
- Mitigated with mantraps
• Dumpster diving
- Searching through trash looking for information
- Mitigated by shredding or burning papers
Proprietary & Confidential
@GoCyberSec | January, 2020
Social Engineering
• Watering hole attack
- Attacker identifies websites trusted by group of users
- Attacker infects these websites
- Users go to infected (but trusted) websites
- Prompted to download files
Proprietary & Confidential
@GoCyberSec | January, 2020
Recognizing Other Attacks
• Spam – unwanted email
• Phishing – malicious spam
- Attempt to trick users into revealing sensitive or personal
information
- Links within email can also lead unsuspecting users to install
malware
- Often spoof email address with your friend’s names
- Phishing to Validate E-mail Addresses
- Phishing to Get Money
Proprietary & Confidential
@GoCyberSec | January, 2020
Recognizing Other Attacks
• Spear phishing
• Targets specific groups of users
• Could target employees within a company or customers of a
company
• Whaling
• Targets high-level executives
• Digital signatures provide assurances to
recipients about who sent an email
• Digital signatures can reduce the success
of spear phishing and whaling
• Vishing – Uses phone or VoIP
Proprietary & Confidential
@GoCyberSec | January, 2020
Recognizing Other Attacks
Proprietary & Confidential
@GoCyberSec | January, 2020
Recognizing Other Attacks
Proprietary & Confidential
@GoCyberSec | January, 2020
Privilege Escalation
• Occurs when a user or process accesses elevated rights and
permissions
• Attackers attempt to gain more privileges
• Malware attempts to gain more privileges
• Administrators have two accounts
- One account for regular use
- One for administrative use
- Goal is to mitigate privilege escalation attempts
Proprietary & Confidential
@GoCyberSec | January, 2020
Blocking Malware
• Spam filter on mail gateways
• Anti-malware software on mail gateways
• Anti-malware software on all systems
• Block at boundaries
–Firewalls
–UTM systems
Proprietary & Confidential
@GoCyberSec | January, 2020
Blocking Malware
• Antivirus software
– Signature-based detection
• Detects known malware based on signature definitions
• Heuristic-based detection
– Detects unknown malware based on behavior
• Checking file integrity with hashes
• Data Execution Prevention (DEP)
Proprietary & Confidential
@GoCyberSec | January, 2020
Blocking Malware
• Advanced malware tools
– AMP
• Spam filters can block spam
– Network-based spam filters block into network
– End-user spam filters restrict spam on user’s system
Proprietary & Confidential
@GoCyberSec | January, 2020
Educating Users
• Helps prevent incidents
• Educating users about
–New viruses
–Phishing attacks
–Zero-day exploits
Proprietary & Confidential
@GoCyberSec | January, 2020
Best Practices
• Don’t click on links within emails from unknown sources
• Don’t open attachments from unknown sources
• Be wary of free downloads from the Internet
• Limit information you post on social media sites
• Back up your data regularly
• Keep computer up to date with current patches
• Keep antivirus software up to date
Proprietary & Confidential
@GoCyberSec | January, 2020
Why Social Engineering Works
• Authority
• Intimidation
• Consensus/Social Proof
• Scarcity
• Urgency
• Familiarity/Liking
• Trust
Proprietary & Confidential
@GoCyberSec | January, 2020
Chapter 6 Summary
• Understanding threat actors
• Determining malware types
• Recognizing common attacks
• Blocking malware and other attacks
• Educating users

More Related Content

What's hot

Mobile signaling threats and vulnerabilities - real cases and statistics from...
Mobile signaling threats and vulnerabilities - real cases and statistics from...Mobile signaling threats and vulnerabilities - real cases and statistics from...
Mobile signaling threats and vulnerabilities - real cases and statistics from...DefCamp
 
Diameter Presentation
Diameter PresentationDiameter Presentation
Diameter PresentationBeny Haddad
 
Intrusion Detection System using Snort
Intrusion Detection System using Snort Intrusion Detection System using Snort
Intrusion Detection System using Snort webhostingguy
 
Best Network Performance Monitoring Tool
Best Network Performance Monitoring ToolBest Network Performance Monitoring Tool
Best Network Performance Monitoring ToolJoe Shestak
 
MikroTik MTCNA
MikroTik MTCNAMikroTik MTCNA
MikroTik MTCNAAli Layth
 
SIEM - Varolan Verilerin Anlamı
SIEM - Varolan Verilerin AnlamıSIEM - Varolan Verilerin Anlamı
SIEM - Varolan Verilerin AnlamıBGA Cyber Security
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Asad Ali
 
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-idAlberto Rivai
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA FirepowerAnwesh Dixit
 
VoLTE Flows and CS network
VoLTE Flows and CS networkVoLTE Flows and CS network
VoLTE Flows and CS networkKarel Berkovec
 
20 common port numbers and their purposes
20 common port numbers and their purposes 20 common port numbers and their purposes
20 common port numbers and their purposes salamassh
 
Mitigating Layer2 Attacks
Mitigating Layer2 AttacksMitigating Layer2 Attacks
Mitigating Layer2 Attacksdkaya
 

What's hot (20)

Mobile signaling threats and vulnerabilities - real cases and statistics from...
Mobile signaling threats and vulnerabilities - real cases and statistics from...Mobile signaling threats and vulnerabilities - real cases and statistics from...
Mobile signaling threats and vulnerabilities - real cases and statistics from...
 
Wireless Cracking using Kali
Wireless Cracking using KaliWireless Cracking using Kali
Wireless Cracking using Kali
 
Diameter Presentation
Diameter PresentationDiameter Presentation
Diameter Presentation
 
Intrusion Detection System using Snort
Intrusion Detection System using Snort Intrusion Detection System using Snort
Intrusion Detection System using Snort
 
Dhcp Snooping
Dhcp SnoopingDhcp Snooping
Dhcp Snooping
 
Best Network Performance Monitoring Tool
Best Network Performance Monitoring ToolBest Network Performance Monitoring Tool
Best Network Performance Monitoring Tool
 
CCNP Security-VPN
CCNP Security-VPNCCNP Security-VPN
CCNP Security-VPN
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
MikroTik MTCNA
MikroTik MTCNAMikroTik MTCNA
MikroTik MTCNA
 
SIEM - Varolan Verilerin Anlamı
SIEM - Varolan Verilerin AnlamıSIEM - Varolan Verilerin Anlamı
SIEM - Varolan Verilerin Anlamı
 
Vpn
VpnVpn
Vpn
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
 
Domain Name System ppt
Domain Name System pptDomain Name System ppt
Domain Name System ppt
 
User expert forum user-id
User expert forum   user-idUser expert forum   user-id
User expert forum user-id
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
VoLTE Flows and CS network
VoLTE Flows and CS networkVoLTE Flows and CS network
VoLTE Flows and CS network
 
Cracking WPA/WPA2 with Non-Dictionary Attacks
Cracking WPA/WPA2 with Non-Dictionary AttacksCracking WPA/WPA2 with Non-Dictionary Attacks
Cracking WPA/WPA2 with Non-Dictionary Attacks
 
20 common port numbers and their purposes
20 common port numbers and their purposes 20 common port numbers and their purposes
20 common port numbers and their purposes
 
Mitigating Layer2 Attacks
Mitigating Layer2 AttacksMitigating Layer2 Attacks
Mitigating Layer2 Attacks
 

Similar to 501 ch 6 threats vulnerabilities and common attacks

501 ch 8 risk managment tool
501 ch 8 risk managment tool501 ch 8 risk managment tool
501 ch 8 risk managment toolgocybersec
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iamgocybersec
 
501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacksgocybersec
 
501 ch 1 mastering security basics
501 ch 1 mastering security basics501 ch 1 mastering security basics
501 ch 1 mastering security basicsgocybersec
 
501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacksgocybersec
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdfZeeshanMajeed15
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0Q Fadlan
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
The Shifting Landscape of PoS MalwareOutput
The Shifting Landscape of PoS MalwareOutputThe Shifting Landscape of PoS MalwareOutput
The Shifting Landscape of PoS MalwareOutputSilas Cutler
 
Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Nicholas Davis
 
Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking Theko Moima
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maalHarsimran Walia
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud ComputingMitesh Katira
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & securityPriyab Satoshi
 

Similar to 501 ch 6 threats vulnerabilities and common attacks (20)

501 ch 8 risk managment tool
501 ch 8 risk managment tool501 ch 8 risk managment tool
501 ch 8 risk managment tool
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iam
 
501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks501 ch 6 threats vulnerabilities attacks
501 ch 6 threats vulnerabilities attacks
 
501 ch 1 mastering security basics
501 ch 1 mastering security basics501 ch 1 mastering security basics
501 ch 1 mastering security basics
 
501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks501 ch 7 protecting against advanced attacks
501 ch 7 protecting against advanced attacks
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdf
 
Cyber Security Predictions 2016
Cyber Security Predictions 2016Cyber Security Predictions 2016
Cyber Security Predictions 2016
 
Web hacking 1.0
Web hacking 1.0Web hacking 1.0
Web hacking 1.0
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
The Shifting Landscape of PoS MalwareOutput
The Shifting Landscape of PoS MalwareOutputThe Shifting Landscape of PoS MalwareOutput
The Shifting Landscape of PoS MalwareOutput
 
Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy Cybersecurity, Hacking, and Privacy
Cybersecurity, Hacking, and Privacy
 
Security.ppt
Security.pptSecurity.ppt
Security.ppt
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
ch08.ppt
ch08.pptch08.ppt
ch08.ppt
 
Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking Computer security chapter 2: About Hacking
Computer security chapter 2: About Hacking
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
I haz you and pwn your maal
I haz you and pwn your maalI haz you and pwn your maal
I haz you and pwn your maal
 
Forensic And Cloud Computing
Forensic And Cloud ComputingForensic And Cloud Computing
Forensic And Cloud Computing
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 

More from gocybersec

501 ch 3 network technologies and tools
501 ch 3 network technologies and tools501 ch 3 network technologies and tools
501 ch 3 network technologies and toolsgocybersec
 
501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pkigocybersec
 
501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assetsgocybersec
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and datagocybersec
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies toolsgocybersec
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacksgocybersec
 
501 ch 11 operational security
501 ch 11 operational security501 ch 11 operational security
501 ch 11 operational securitygocybersec
 
501 ch 9 implementing controls
501 ch 9 implementing controls501 ch 9 implementing controls
501 ch 9 implementing controlsgocybersec
 
501 ch 8 risk management tools
501 ch 8 risk management tools501 ch 8 risk management tools
501 ch 8 risk management toolsgocybersec
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacksgocybersec
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and datagocybersec
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your networkgocybersec
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies toolsgocybersec
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iamgocybersec
 
501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basicsgocybersec
 

More from gocybersec (15)

501 ch 3 network technologies and tools
501 ch 3 network technologies and tools501 ch 3 network technologies and tools
501 ch 3 network technologies and tools
 
501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki501 ch 10 understanding cryptography and pki
501 ch 10 understanding cryptography and pki
 
501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets501 ch 9 implementing controls to protect assets
501 ch 9 implementing controls to protect assets
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
 
501 ch 11 operational security
501 ch 11 operational security501 ch 11 operational security
501 ch 11 operational security
 
501 ch 9 implementing controls
501 ch 9 implementing controls501 ch 9 implementing controls
501 ch 9 implementing controls
 
501 ch 8 risk management tools
501 ch 8 risk management tools501 ch 8 risk management tools
501 ch 8 risk management tools
 
501 ch 7 advanced attacks
501 ch 7 advanced attacks501 ch 7 advanced attacks
501 ch 7 advanced attacks
 
501 ch 5 securing hosts and data
501 ch 5 securing hosts and data501 ch 5 securing hosts and data
501 ch 5 securing hosts and data
 
501 ch 4 securing your network
501 ch 4 securing your network501 ch 4 securing your network
501 ch 4 securing your network
 
501 ch 3 network technologies tools
501 ch 3 network technologies tools501 ch 3 network technologies tools
501 ch 3 network technologies tools
 
501 ch 2 understanding iam
501 ch 2 understanding iam501 ch 2 understanding iam
501 ch 2 understanding iam
 
501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics501 ch-1-mastering-security-basics
501 ch-1-mastering-security-basics
 

Recently uploaded

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

501 ch 6 threats vulnerabilities and common attacks

  • 1. Proprietary & Confidential @GoCyberSec | January, 2020 Chapter 6 Comparing Threats, Vulnerabilities, and Common Attacks CompTIA Security +
  • 2. Proprietary & Confidential @GoCyberSec | January, 2020 Introduction • Understanding threat actors • Determining malware types • Recognizing common attacks • Blocking malware and other attacks • Educating users
  • 3. Proprietary & Confidential @GoCyberSec | January, 2020 Threat Actors • Open-source intelligence – Info freely available (such as from web sites and social media) • Script kiddie – Little expertise, sophistication, or funding • Hacktivist – Part of an activist movement • Insider – Employee (can become a malicious insider) • Organized crime – Typically motivated by money • Competitor
  • 4. Proprietary & Confidential @GoCyberSec | January, 2020 Threat Actors • Nation state/advanced persistent threat (APT) –Identify a target and persistently attack until they gain access –Often remain in network for months or years –China APT1 –Russia APT 28 (Fancy Bear) –Russia APT 29 (Cozy Bear)
  • 5. Proprietary & Confidential @GoCyberSec | January, 2020 Determining Malware Types • Viruses –Replication mechanism –Activation mechanism –Payload mechanism
  • 6. Proprietary & Confidential @GoCyberSec | January, 2020 Determining Malware Types • Worms –Self replicating • Logic bombs –Executes in response to an event • Backdoors –Provides an alternate method of access –Many types of malware create backdoors
  • 7. Proprietary & Confidential @GoCyberSec | January, 2020 Understanding Malware • Trojan Horse – Appears to be useful but is malicious – Pirated software, rogueware, or games – Also infect systems via USB drives • Drive-by downloads – Attackers compromise a web site to gain control of it – Attackers install a Trojan embedded in the web site’s code – Attackers attempt to trick users into visiting the site – When users visit, the web site attempts to download the Trojan onto the users’ systems • Remote access Trojan (RAT)
  • 8. Proprietary & Confidential @GoCyberSec | January, 2020 Determining Malware Types • Ransomware –Takes control of user’s system –Typically encrypts user’s data –Attempts to extort payment
  • 9. Proprietary & Confidential @GoCyberSec | January, 2020 Determining Malware Types • Keylogger –Capture’s keystrokes • Spyware –Can access a user’s private data and result in loss of confidentiality • Adware –Pop-ups that market products to users –Blocked with pop-up blockers
  • 10. Proprietary & Confidential @GoCyberSec | January, 2020 Bots and Botnets • Bots – software robots • Botnets – Controlled by criminals (bot herders) – Manage command and control centers – Malware joins computers to robotic network • Zombies or clones – Computers within botnet – Join after becoming infected with malware
  • 11. Proprietary & Confidential @GoCyberSec | January, 2020 Determining Malware Types • Rootkits • System level or kernel access • Can modify system files and system access • Hide their running processes to avoid detection with hooking techniques • File integrity checker can detect modified files • Inspection of RAM can discover hooked processes
  • 12. Proprietary & Confidential @GoCyberSec | January, 2020 Social Engineering • Flattery and conning • Assuming a position of authority • Encouraging someone to: • Perform a risky action • Reveal sensitive information • Impersonating • Tailgating
  • 13. Proprietary & Confidential @GoCyberSec | January, 2020 Social Engineering • Impersonating –Such as an authorized technician • Shoulder Surfing –Can be in person looking at a computer –Can be with a remote camera • Tricking users with hoaxes
  • 14. Proprietary & Confidential @GoCyberSec | January, 2020 Social Engineering • Tailgating - Closely following authorized personnel without providing credentials - Mitigated with mantraps • Dumpster diving - Searching through trash looking for information - Mitigated by shredding or burning papers
  • 15. Proprietary & Confidential @GoCyberSec | January, 2020 Social Engineering • Watering hole attack - Attacker identifies websites trusted by group of users - Attacker infects these websites - Users go to infected (but trusted) websites - Prompted to download files
  • 16. Proprietary & Confidential @GoCyberSec | January, 2020 Recognizing Other Attacks • Spam – unwanted email • Phishing – malicious spam - Attempt to trick users into revealing sensitive or personal information - Links within email can also lead unsuspecting users to install malware - Often spoof email address with your friend’s names - Phishing to Validate E-mail Addresses - Phishing to Get Money
  • 17. Proprietary & Confidential @GoCyberSec | January, 2020 Recognizing Other Attacks • Spear phishing • Targets specific groups of users • Could target employees within a company or customers of a company • Whaling • Targets high-level executives • Digital signatures provide assurances to recipients about who sent an email • Digital signatures can reduce the success of spear phishing and whaling • Vishing – Uses phone or VoIP
  • 18. Proprietary & Confidential @GoCyberSec | January, 2020 Recognizing Other Attacks
  • 19. Proprietary & Confidential @GoCyberSec | January, 2020 Recognizing Other Attacks
  • 20. Proprietary & Confidential @GoCyberSec | January, 2020 Privilege Escalation • Occurs when a user or process accesses elevated rights and permissions • Attackers attempt to gain more privileges • Malware attempts to gain more privileges • Administrators have two accounts - One account for regular use - One for administrative use - Goal is to mitigate privilege escalation attempts
  • 21. Proprietary & Confidential @GoCyberSec | January, 2020 Blocking Malware • Spam filter on mail gateways • Anti-malware software on mail gateways • Anti-malware software on all systems • Block at boundaries –Firewalls –UTM systems
  • 22. Proprietary & Confidential @GoCyberSec | January, 2020 Blocking Malware • Antivirus software – Signature-based detection • Detects known malware based on signature definitions • Heuristic-based detection – Detects unknown malware based on behavior • Checking file integrity with hashes • Data Execution Prevention (DEP)
  • 23. Proprietary & Confidential @GoCyberSec | January, 2020 Blocking Malware • Advanced malware tools – AMP • Spam filters can block spam – Network-based spam filters block into network – End-user spam filters restrict spam on user’s system
  • 24. Proprietary & Confidential @GoCyberSec | January, 2020 Educating Users • Helps prevent incidents • Educating users about –New viruses –Phishing attacks –Zero-day exploits
  • 25. Proprietary & Confidential @GoCyberSec | January, 2020 Best Practices • Don’t click on links within emails from unknown sources • Don’t open attachments from unknown sources • Be wary of free downloads from the Internet • Limit information you post on social media sites • Back up your data regularly • Keep computer up to date with current patches • Keep antivirus software up to date
  • 26. Proprietary & Confidential @GoCyberSec | January, 2020 Why Social Engineering Works • Authority • Intimidation • Consensus/Social Proof • Scarcity • Urgency • Familiarity/Liking • Trust
  • 27. Proprietary & Confidential @GoCyberSec | January, 2020 Chapter 6 Summary • Understanding threat actors • Determining malware types • Recognizing common attacks • Blocking malware and other attacks • Educating users