Common Security Threats & Best Practices
Common Security Threats & Best Practices
A hacker is an individual who uses computer, networking, or other skills to overcome a technical problem.
The term also may refer to anyone who uses their abilities to gain unauthorized access to systems or
networks in order to commit crimes. A hacker may, for example, steal information to hurt people via
identity theft or bring down a system and, often, hold it hostage in order to collect a ransom.
Attacker is a term that always represents a malicious system intruder.
White Hat - These types of hackers are purely Ethical hacker, who discovers and exposes security flaws in
applications and operating systems so that manufacturers can fix them before they become widespread
problems. It is sometimes called an ethical hack.
Black Hat - hacker who discovers and exposes security vulnerabilities for financial gain or for some
malicious purpose.
Grey Hat Hacker - They are some in between white hat hacker and black hat hacker. They gains
unauthorized access to computers and target weakness of a computer for fun. Their intent is to bring the
weakness to the attention of the owners and getting appreciation or a little bounty from the owners.
Basically, hacking is to identify the weakness in computer systems, different networks or finding loopholes
in website coding and exploit its weakness to gain excess.
Although, there are some Miscellaneous hackers like Blue Hat Hacker, Green Hat Hacker, Red Hat
Hacker.
Disclaimer: This is an unofficial handout document made purely for educational purposes and may only be used for personal uses. Content may not
properly cite sources from respective authors and publishers. By accessing, you acknowledge its purpose, origin, and unprofessional structure.
Living in the Information Technology Era Gutierrez, Jhamil G.
Common Security Threats & Best Practices Educational Handout
Malware
Any unwanted software that has the potential to damage a system, impede performance, or create a
nuisance condition.
Worm A piece of code that spreads from one computer to another on its own, not by
attaching itself to another file. Like a virus, a worm can enable further attacks,
transmit data, corrupt, or erase files.
Trojan Horse An insidious type of malware that is itself a software attack and can pave the way for
a number of other types of attacks. There is a social engineering component to a
Trojan horse attack since the user has to be fooled into executing it.
Logic Bomb A piece of code that sits dormant on a target computer until it is triggered by a
specific event, such as a specific date. Once the code is triggered, the logic bomb
detonates, and performs whatever actions it was programed to do. Often, this
includes erasing and corrupting data on the target system.
Spyware Surreptitiously installed malicious software that is intended to track and report the
usage of a target system, or to collect other data the author wishes to obtain. Data
collected can include web browsing history; personal information; banking and other
financial information; as well as usernames and passwords.
Rootkit Code that is intended to take full or partial control of a system at the lowest levels.
Rootkits often attempt to hide themselves from monitoring or detection and modify
low-level system files when integrating themselves into a system. Rootkits can be
used for non-malicious purposes such as virtualization; however, most rootkit
infections install backdoors, spyware, or other malicious code once they have control
of the target system.
Ransomware Ransomware is malicious software that prevents you from using your computer. It
usually displays a message stating that you must pay a fee or face some other
penalty before you can access your files and computer again. Paying the ransom
doesn’t necessarily mean that you will regain access to your files or computer.
2
Page
Disclaimer: This is an unofficial handout document made purely for educational purposes and may only be used for personal uses. Content may not
properly cite sources from respective authors and publishers. By accessing, you acknowledge its purpose, origin, and unprofessional structure.
Living in the Information Technology Era Gutierrez, Jhamil G.
Common Security Threats & Best Practices Educational Handout
Social Engineering
Social engineering attacks are a type of cybercrime wherein the attacker fools the target through
impersonation.
Type of attack that uses deception and trickery to convince unsuspecting users to provide sensitive data or
to violate security guidelines. It is often a precursor to another type of attack.
Shoulder Surfing - This is a human-based attack where the goal is to look over the shoulder of an
individual as he or she enters password information or a PIN.
Spoofing - This is a human-based or software-based attack where the goal is to pretend to be someone else
for the purpose of identity concealment.
Hoax - This is an email-based or web-based attack that is intended to trick the user into performing
undesired actions, such as deleting important system files in an attempt to remove a virus.
Phishing - This is a common type of email-based social engineering attack. In a phishing attack, the
attacker sends an email that seems to come from a respected bank or other financial institution.
Vishing - This is a human-based attack where the goal is to extract personal, financial, or confidential
information from the victim by using services such as the telephone system and IP-based voice messaging
services (Voice over Internet Protocol [VoIP]) as the communication medium. This is also called voice
phishing.
Whaling - This is a form of phishing that targets individuals who are known to possess a good deal of
wealth. It is also known as spear phishing.
Spam and Spim - Spam is an email-based threat that presents various advertising materials, promotional
content, or get-rich-quick schemes to users. Spim is an Internet messaging (IM)-based attack similar to spam
that is propagated through IM instead of through email.
Password cracking
Any type of attack in which the attacker attempts to obtain and make use of passwords illegitimately.
a password by entering different common password values, such as the user’s name, a spouse’s name, or a
Page
significant date.
Disclaimer: This is an unofficial handout document made purely for educational purposes and may only be used for personal uses. Content may not
properly cite sources from respective authors and publishers. By accessing, you acknowledge its purpose, origin, and unprofessional structure.
Living in the Information Technology Era Gutierrez, Jhamil G.
Common Security Threats & Best Practices Educational Handout
Stealing - Passwords can be stolen by various means, including sniffing network communications, reading
handwritten password notes or observing a user in the act of entering the password.
Brute Force Attack - the attacker uses password-cracking software to attempt every possible alphanumeric
password combination.
Hybrid Password Attack - utilizes multiple attack vectors including dictionary, brute-force, and other
attack methodologies when trying to crack a password.
External - It is impossible for any organization to fully control external security threats.
Natural - Although natural threats are easy to overlook, they can pose a significant risk to the physical
security of a facility.
Man-made - Whether intentional or accidental, people can cause a number of physical threats. Man-made
threats can be internal or external.
Hurricane and Tornadoes - major network security threats due to the magnitude of the damage they can
cause to hardware and data.
Flood - another major network security threat that can cause as much damage as fire can.
Extreme Temperature - Extreme temperatures, especially heat, can cause some sensitive hardware
components to melt and degrade, resulting in data loss.
Extreme Humidity - Extreme humidity can cause computer components, data storage media, and other
devices to rust, deteriorate, and degrade, resulting in data loss.
Theft
You must find a way to prevent theft of both data and hardware. The items most often stolen are portable
devices such as laptops, tablets, and smartphones. These pieces of hardware often have highly valuable data
on them. You can physically secure laptops and tablets by using a cable but determined thieves will cut
through a cable.
Another type of theft is theft of software and licensing. Most software has a software license agreement that
allows the user to install and use the software on a single computer.
4
Page
Disclaimer: This is an unofficial handout document made purely for educational purposes and may only be used for personal uses. Content may not
properly cite sources from respective authors and publishers. By accessing, you acknowledge its purpose, origin, and unprofessional structure.
Living in the Information Technology Era Gutierrez, Jhamil G.
Common Security Threats & Best Practices Educational Handout
Authentication
User authentication is a network security measure in which a computer user or some other network
component proves its identity in order to gain access to network resources. There are many possible
authentication methods; one of the most common is a combination of a username and a password.
▪ Avoid selecting links in emails whenever possible. Sometimes an email message looks like it came from a
legitimate source with the correct logos but look for misspellings and bad grammar. This is a good
indication that the message is not actually from specified source.
▪ If you don’t know the sender, do not open any attachments to the email message. Even if you do know the
sender, be careful of opening attachments that you weren’t expecting to receive.
▪ If you discover that your email account has been compromised, the first thing to do is change your
password and alert the network administrator. You should also perform a complete scan of your system with
antivirus software to locate and remove any malware that might have been introduced onto your system.
5
Page
Disclaimer: This is an unofficial handout document made purely for educational purposes and may only be used for personal uses. Content may not
properly cite sources from respective authors and publishers. By accessing, you acknowledge its purpose, origin, and unprofessional structure.
Living in the Information Technology Era Gutierrez, Jhamil G.
Common Security Threats & Best Practices Educational Handout
▪ As with any other service that has usernames and passwords, make sure not to share your credentials.
• Disable cookies and clear the browser cache and history of saved data whenever possible.
• When installing plug-ins and browser extensions, install only the ones required for your browsing. Disable
any plug-ins, toolbars, and extensions that you are not using.
• If you access a site with an invalid certificate, be sure to close the page unless you are 100 percent positive
that the page can be trusted.
• Avoid selecting suspicious links or banner ads. These are often the preferred method of attackers to gain
access to your computer and data.
• Be aware of spoofed web pages that appear to be the web page of another company. The page’s most likely
to be spoofed are sites such as PayPal or financial institutions.
• If your browser has been infected with adware, be sure to clear the cache and cookies, reset passwords, and
use your antivirus software to try to eradicate the infection. You might need to download additional software
to deal with the adware infection.
• Be careful to protect your personally identifiable information including your: Social Security number,
driver’s license number, financial account numbers, and log in credentials.
• If you are using a public workstation be sure to remove all traces of your activity when you are done using
the workstation.
6
Page
Disclaimer: This is an unofficial handout document made purely for educational purposes and may only be used for personal uses. Content may not
properly cite sources from respective authors and publishers. By accessing, you acknowledge its purpose, origin, and unprofessional structure.