CS QUIZ 2_Slide and sln merged
CS QUIZ 2_Slide and sln merged
Humaira 092
Zombie Trojans infect a host and wait for their originating attacker’s commands telling
them to attack other hosts. The attacker installs a series of zombie Trojans, sometimes
numbering in the thousands. With one predefined command, the attacker can cause all
the zombies to begin to attack another remote system with a distributed denial of service
(DDoS) attack. DDoS attacks flood the intended victim computer with so much traffic,
legitimate or malformed, that it becomes overutilized or locks up, denying legitimate
connections.
\
Cybersecurity: The protection of digital devices and their communication channels to
keep them stable, dependable and reasonably safe from danger or threat. Usually, the
required protection level must be sufficient to prevent or address unauthorized access or
before it can lead to substantial personal, professional, organizational, financial and/or
political harm.
Digital Device: Any electronic appliance that can create, modify, archive, retrieve or
transmit information in an electronic format. Desktop computers, laptops, tablets,
smartphones and Internet-connected home devices are all examples of digital devices.
Cyber Crime: Any tradition crime that can happen using ICT can be regarded as a cyber-
crime.
Cyber Warfare: Cyberwarfare is the use of digital attacks to attack a nation, causing
comparable harm to actual warfare and/or disrupting the vital computer systems. Cyber
warfare involves the actions by a nation-state or international organization to attack and
attempt to damage another nation's computers or information networks through, for
example, computer viruses or denial-of-service attacks.
Cyber Espionage: The use of computer networks to gain illicit access to confidential
information, typically that held by a government or other organization. Cyber espionage
is a form of cyber-attack that steals classified, sensitive data or intellectual property to
gain an advantage over a competitive company or government entity.
Cyber Insecurity: Suffering from a concern that weaknesses in one’s cyber security are
going to cause one’s personal or professional harm.
Hacker: A person who engages in attempts to gain unauthorized access to one or more
digital devices.
Ethical Hacking: The process by which supportive penetration testing experts assist in
finding security weaknesses and vulnerabilities.
Red Team: When testing for potential exploits affecting any critical or sensitive system,
infrastructure or website, a team of penetration testers is usually used. This term (red
team) is used to describe the group of penetration testers working together on this type
of objective.
Malware: Shortened version of malicious software. A term used to describe the insertion
of disruptive, subversive or hostile programs onto a digital device. These types of
programs can be intentional or unintentional. Intentional versions are usually disguised
or embedded in a file that looks harmless. There are many types of malwares; adware,
botnets, computer viruses, ransomware, scareware, spyware, trojans and worms are all
examples of intentional malware. Hackers often use malware to mount cybersecurity
attacks.
Spyware: A form of malware that covertly gathers and transmits information from the
device on which it is installed. Example: Pegasus
Spear Phishing: A more targeted form of phishing. This term describes the use of an
electronic communication (for example, email or instant messaging) that targets a
particular person or group of people (for example, employees at a location) and pretends
to come from a legitimate source. In this case, the source may also pretend to be someone
known and trusted to the recipient, in an attempt to obtain sensitive information (for
example, a password or credit card number).
The act of constructing relationships, friendships or other human interactions for the
purpose of enticing the recipient to perform an action or reveal information. The
individual(s) doing the social engineering use the victim’s action or information for the
hidden purpose of achieving a nefarious objective, such as acquiring intelligence about
the security, location or vulnerability of assets, or even gaining the person’s trust to open
an Internet link or document that will result in a malware foothold being created.
Vector: Another word for 'method' – as in 'They used multiple vectors for the attack.'
Zero-day: It refers to the very first time a new type of exploit or new piece of malware is
discovered. At that point in time, none of the anti-virus, anti-malware or other defenses
may be set up to defend against the new form of exploit.
Backdoor: A covert method of accessing software or a device that bypasses the normal
authentication requirements.
Threat Actors: An umbrella term to describe the collection of people and organizations
that work to create cyber-attacks. Examples of threat actors can include cyber criminals,
hacktivists and nation states.
Anti-malware: It is a computer program designed to look for specific files and behaviors
(signatures) that indicate the presence or the attempted installation of malicious
software. If or when detected, the program seeks to isolate the attack (quarantine or
block the malware), remove it, if it can, and also alert appropriate people to the attempt
or to the presence of the malware. The program can be host-based (installed on devices
that are directly used by people) or network-based (installed on gateway devices through
which information is passed). Older forms of this software could detect only specific, pre-
defined forms of malicious software using signature files. Newer forms use machine
learning and make use of additional techniques including behavior monitoring.
Signatures: Signatures (in the context of cybersecurity) are the unique attributes – for
example, file size, file extension, data usage patterns and method of operation – that
identify a specific computer program. Traditional anti- malware and other security
technologies can make use of this information to identify and manage some forms of
rogue software or communications.
Defense in Depth: The use of multiple layers of security techniques to help reduce the
chance of a successful attack. The idea is that if one security technique fails or is bypassed,
there are others that should address the attack. The latest (and correct) thinking on
defense in depth is that security techniques must also consider people and operations
factors and not just technology.
Incident Response: A prepared set of processes that should be triggered when any
known or suspected event takes place that could cause material damage to an
organization. The typical stages are
• verify the event is real and identify the affected areas,
• contain the problem (usually by isolating, disabling or disconnecting the affected
pieces),
• understand and eradicate the root cause,
• restore the affected components to their fixed state and
• review how the process went to identify improvements that should be made.
Secure Configuration: It is a process ensuring that when settings are applied to any item
(device or software), appropriate steps are always taken to ensure
• default accounts are removed or disabled,
• shared accounts are not used and
• all protective and defensive controls in the item use the strongest appropriate
setting(s).
Penetration Test: Checks and scans on any application, system or website to identify
any potential security gaps (vulnerabilities) that could be exploited. Once the
vulnerabilities are identified, this process then goes on to identify the extent to which
these vulnerabilities could be leveraged in an attack (the penetration possibilities).
Usually, these checks are performed in a test area and emulate the same techniques that
could be used by an attacker. This is to prevent any inadvertent operational disruption.
The checks are typically conducted before any application or site is first used, and also on
a periodic (repeating) basis; for example, each time the program is updated or every 6
months. Any significant gaps must be addressed (fixed) in a timeframe appropriate to the
scale of the risk. Not to be confused with the term vulnerability assessment, which only
identifies gaps without examining how they could be leveraged. Penetration tester is the
person who performs simulated attempts at attack on a target system or application on
behalf of the organization that owns or controls it.
Technical Disaster Recovery Plan: An operational document that describes the exact
process, people, information and assets required to put any electronic or digital system
back in place within a timeline defined by the business continuity plan.
Policy:
• A high-level statement of intent, often a short document, that provides guidance
on the principles an organization follows. For example, a basic security policy
document could describe the intention for an enterprise to ensure that all
locations (physical and electronic) where information for which they are
accountable must remain secure from any unauthorized access. A policy does not
usually describe the explicit mechanisms or specific instructions that would be
used to achieve or enforce the intentions it expresses; this would be described in
a procedure.
• Alternatively, it can also be used to mean the settings (including security settings)
inside a software program or operating system.
Jurisdiction: Power of a court to adjudicate cases and issue orders. Territory within
which a court or government agency may properly exercise its power.
It is also known as the authority given by law to a court to try cases and rule on legal
matters within a particular geographic area and/or over certain types of legal cases. It is
vital to determine before a lawsuit is filed which court has jurisdiction. State courts have
jurisdiction over matters within that state, and different levels of courts have jurisdiction
over lawsuits involving different amounts of money.
Virtual Private Network (VPN)
VPN stands for the Virtual Private Network. A virtual private network (VPN) is a
technology that creates a safe and encrypted connection over a less secure network. A
Virtual Private Network is a way to extend a private network using a public network.
A VPN tunnel is an encrypted connection between a device and a VPN server. It's
uncrackable without a cryptographic key, so neither hackers nor Internet Service
Provider (ISP) could gain access to the data. This protects users from attacks and hides
what they're doing online.
Effectively, VPN tunnels are a private route to the internet via intermediary servers.
That's why VPNs are popular among privacy-cautious individuals.
In a sense, a VPN acts as a middleman between a device and remote servers, and carries
data over existing networks without exposing it to the public Internet.
Let’s look at an example of how visiting Amazon would work without a VPN. The user
enters the Amazon homepage, it loads, and he/she can do shopping. Here’s how it works
in more technical terms:
− The user’s browser contacts a Domain Name Server (DNS) assigned by his/her
ISP, asking it to translate the website domain into an IP address.
− Knowing the Amazon server’s IP address, the user’s device can now send a request
and retrieve the website.
− The user’s ISP routes his/her request to the Amazon server and returns a
response.
This is very simplified, but that’s essentially how any connection works if VPN is not
being used. In this example, the Amazon website is secure and uses HTTPS, so the
connection is encrypted. If the user visits an insecure website that doesn’t use HTTPS,
his/her data won’t be encrypted. But despite the encryption, this type of session still isn’t
completely private. By sending a DNS request to the ISP, the user is telling his/her ISP
that he/she wants to visit Amazon.com. Amazon also knows the user’s IP address and
can therefore determine the user’s location as well as, potentially, his/her identity.
Now let’s look at an example of how visiting Amazon would work if the user was using a
VPN:
− Firstly, the user would connect to a VPN server in a country of choosing, let's say
the UK.
− The VPN app uses a tunneling protocol to create an encrypted connection to the
VPN server.
− The user heads over to Amazon’s homepage. Yet this time, the DNS query is
resolved by the VPN, denying the ISP knowledge of what he/she is doing.
− The VPN establishes a connection between their server and the Amazon.com
server.
− Traffic goes from the user to the VPN server, then to Amazon’s server, and back.
Technically, VPN can slow down Internet connection, as there’s an extra step in the
process – Internet traffic going through a VPN server. On the bright side, the impact won’t
be noticeable.
VPNs can have vulnerabilities. There are no perfect cybersecurity products, and using a
VPN comes with some risks as well. Here are some potential VPN vulnerabilities that one
should be aware of:
− Some VPN services still use outdated protocols with known vulnerabilities.
− Hackers can impersonate VPN servers and intercept data if the VPN itself is
insecure.
− A user’s real IP address can get leaked if a VPN server goes down while he/she is
connected and privacy can be compromised. Premium VPNs offer kill switch
features to disable the Internet connection when the VPN drops.
− The user’s data is probably being sold if a VPN service is free. The maintenance of
server fleets costs money. Hence, when the service is free, the money has to come
from somewhere. In many cases, the VPN is collecting the data and selling it off to
third parties.
− Some VPNs log user data, even though the logging may not be extensive. There
have been instances of several VPN providers handing over user data to
governments when asked. That’s why it’s important to make sure that the chosen
provider is a no-logs VPN.
− VPN doesn’t protect from malware. For enhanced protection from viruses,
malware, trojans, or bots, one should use antivirus software.
Computer Security
Standards Organizations
The objective of a security program is to mitigate risks. Mitigating risks does not mean
eliminating them; it means reducing them to an acceptable level. To make sure that the
security controls are effectively controlling the risks in the environment, it is important
to anticipate what kinds of incidents may occur. It is also needed to identify what one is
trying to protect, and from whom. That’s where risk analysis, threat definition, and
vulnerability analysis come in.
Threat
A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data,
or disrupt digital life in general. Threats can take many forms, and in order to be
successful, a security strategy must be comprehensive enough to manage the most
significant threats.
Threat Vector
A threat vector is a term used to describe where a threat originates and the path it takes
to reach a target. An example of a threat vector is an e-mail message sent from outside
the organization to an inside employee, containing an irresistible subject line along with
an executable attachment that happens to be a Trojan program, which will compromise
the recipient’s computer if opened.
Any computer that is accessible from the Internet will be attacked. It will constantly be
probed by attackers and malicious programs intending to exploit vulnerabilities. There
can be different types of attacks, such as:
• Malicious Mobile Code
• Advanced Persistence Threat (APT)
• Manual Attacks
Malicious Mobile Code
There are three generally recognized variants of malicious mobile code: viruses, worms,
and Trojans. In addition, many malware programs have components that act like two or
more of these types, which are called hybrid threats or mixed threats. The lifecycle of
malicious mobile code looks like this:
− Find
− Exploit
− Infect
− Repeat
Computer Viruses
A virus is a self-replicating program that uses other host files or code to replicate. Most
viruses infect files so that every time the host file is executed, the virus is executed too.
A virus infection is simply another way of saying the virus made a copy of itself
(replicated) and placed its code in the host in such a way that it will always be executed
when the host is executed.
The damage routine of a virus (or really of any malware program) is called the payload.
The vast majority of malicious program files do not carry a destructive payload beyond
the requisite replication. This means they aren’t intentionally designed by their creators
to cause damage. However, their very nature requires that they modify other files and
processes without appropriate authorization, and most end up causing program crashes
of one type or another.
At the very least, a “harmless” virus takes up CPU cycles and storage space. Of course,
payloads can be intentionally destructive, deleting files, corrupting data, copying
confidential information, formatting hard drives, and removing security settings. Some
viruses are devious. Many send out random files from the user’s hard drive to everyone
in the user’s e-mail address list.
If the virus executes, does its damage, and terminates until the next time it is executed,
it is known as a nonresident virus. A nonresident virus may, for example, look for and
infect five EXE files on the hard disk and then terminate until the next time an infected
file is executed. These types of viruses are easier for novice malicious coders to write. If
the virus stays in memory after it is executed, it is called a memory-resident virus.
Memory-resident viruses insert themselves as part of the operating system or
application and can manipulate any file that is executed, copied, moved, or listed.
If the virus overwrites the host code with its own code, effectively destroying much of
the original contents, it is called an overwriting virus.
If the virus inserts itself into the host code, moving the original code around so the host
programming still remains and is executed after the virus code, the virus is called a
parasitic virus. Viruses that copy themselves to the beginning of the file are called
prepending viruses, and viruses placing themselves at the end of a file are called
appending viruses. Viruses appearing in the middle of a host file are labeled mid-
infecting viruses. The modified host code doesn’t always have to be a file—it can be a
disk boot sector or partition table, in which case the virus is called a boot sector or
partition table virus.
Computer Worms
A computer worm uses its own coding to replicate, although it may rely on the existence
of other related code to do so. The key to a worm is that it does not directly modify other
host code to replicate. A worm may travel the Internet trying one or more exploits to
compromise a computer, and if successful, it then writes itself to the computer and
begins replicating again. An example of an Internet worm is Bugbear. Bugbear was
released in June 2003, arriving as a file attachment in a bogus e-mail.
E-mail worms are a curious intersection of social engineering and automation. They
appear in people’s inboxes as messages and file attachments from friends, strangers, and
companies. They pose as games, official patches from Microsoft, or unofficial
applications found in the digital marketplace. There cannot be a computer user in the
world who has not been warned multiple times against opening unexpected e-mail
attachments, but often the attachments are simply irresistible.
Trojans
Trojan horse programs, or Trojans, work by posing as legitimate programs that are
activated by an unsuspecting user. After execution, the Trojan may attempt to continue
to pose as the other legitimate program (such as a screensaver) while doing its malicious
actions in the background. Many people are infected by Trojans for months and years
without realizing it.
If the Trojan simply starts its malicious actions and doesn’t pretend to be a legitimate
program, it’s called a direct-action Trojan. Direct-action Trojans don’t spread well
because the victims notice the compromise and are unlikely, or unable, to spread the
program to other unsuspecting users.
A powerful type of Trojan program called a remote access Trojan (RAT) is very popular
in today’s attacker circles. Once installed, a RAT becomes a back door into the
compromised system and allows the remote attackers to do virtually anything they want
to the compromised PC. Password-stealing Trojans look for saved passwords on the
computer and email them to the hackers. Some can even steal passwords cached in the
browser history. Destructive Trojans destroy and delete files from the computer.
Antivirus killer Trojans detect and kill the antivirus and firewall programs to give the
attacker easier access to computer.
Zombie Trojans infect a host and wait for their originating attacker’s commands telling
them to attack other hosts. The attacker installs a series of zombie Trojans, sometimes
numbering in the thousands. With one predefined command, the attacker can cause all
the zombies to begin to attack another remote system with a distributed denial of service
(DDoS) attack. DDoS attacks flood the intended victim computer with so much traffic,
legitimate or malformed, that it becomes overutilized or locks up, denying legitimate
connections.
APTs rely on targeted attacks to achieve success. While malware and phishing attacks
are not new, the APT is a new way to commit these types of attacks. The APT attacks are
generally targeted towards specific organizations, often including high-level executives,
to gain access to proprietary information or trade secrets.
Detection of APT
Manual Attacks
While automated attacks may satisfy virus writers, typical attackers want to test their
own mental wits and toolkits against a foreign computer, changing their attack plan as
the host exposes its weaknesses. They love the challenge manual hacking gives. An
example of such attack is ARP poisoning.
Risk Analysis
A risk analysis needs to be a part of every security effort. It should analyze and categorize
the assets that need to be protected and the risks that need to be avoided, and it should
facilitate the identification and prioritization of protective elements. It can also provide
a means to measure the effectiveness of the overall security architecture, by tracking
those risks and their associated mitigation over time to observe trends.