Lecture 3 - Threats and Attacks On Endpoints
Lecture 3 - Threats and Attacks On Endpoints
2. Define application
attacks
3. Explain how threat actors
use application attacks
4. Define adversarial
artificial intelligence attacks
Malware is software that enters a computer system
without the user’s knowledge or consent and then
performs an unwanted and harmful action
Malware is most often used as the general term that
refers to a wide variety of damaging software programs
Malware is continually evolving to avoid detection by
improved security measures
One attempt at classifying the diverse types of
Attacks Using malware can be to examine the primary action that the
Malware malware performs:
Imprison
Launch
Snoop
Deceive
Evade
Some types of malware attempt to take away the
freedom of the user to do what they want
Types of malware that imprisons are ransomware and
crypto malware
Ransomware
Keylogger
Snoop A keylogger silently captures and stores each keystroke
that a user types on the computer’s keyboard
The threat actor can then search the captured text for
any useful information such as passwords, credit card
numbers, or personal information
A keylogger can be a software program or a small
hardware device
Snoop
Some malware attempts to deceive the user and hide
its true intentions
Examples include potentially unwanted programs
(PUPs), Trojans, and remote access Trojans (RATs)
Potentially Unwanted Program (PUP)
Deceive A PUP is software that the user does not want on their
computer
Examples of PUPs:
Advertising that obstructs content or interferes with web
browsing, pop-up windows, pop-under windows, search
engine hijacking, home page hijacking, etc
Trojan
A computer Trojan is an executable program that
masquerades as performing a benign activity but also
does something malicious
Remote Access Trojan (RAT)
Learning (ML)? ML also involves learning through repeated experience
If something attempted does not work, then it determines
how it could be changed to make it work
Cybersecurity AI allows organizations to detect, predict,
and respond to cyberthreats in real time using ML
Virtually all email systems use some type of AI to block
phishing attacks
The prime advantages of using AI to combat threats are
continual learning and greater speed in response
Uses in AI can predict and prevent future attacks
Cybersecurity About one in five organizations used cybersecurity AI
before 2022
Increasing to two out of three organizations planning to
deploy it by the end of 2025
Uses in
Cybersecurity
Ukeje, N., Gutierrez, J., & Petrova, K. (2024). Information security and privacy challenges of cloud
computing for government adoption: a systematic review. International Journal of Information Security, 1-
17.
Ali, A. S., Zaaba, Z. F., & Singh, M. M. (2024). The rise of “security and privacy”: bibliometric analysis of
computer privacy research. International Journal of Information Security, 23(2), 863-885.
Farayola, O. A., Olorunfemi, O. L., & Shoetan, P. O. (2024). Data privacy and security in IT: a review of
techniques and challenges. Computer Science & IT Research Journal, 5(3), 606-615.