Module 2 & 3 Threats, Harms and Vulnerabilities
Module 2 & 3 Threats, Harms and Vulnerabilities
The world is now more reliant on technology than ever before. The emergence and growth of technology has
had a positive impact on human life, but the convenience has, however, come with the risk of cyber-attacks. If
you use a tech device for whatever reason, then you’re highly likely to be exposed to a cyber-attack. You’ll need
to be protected, and that’s where cyber security comes in.
Cyber security is the protection of electronic data and information. It’s the defense of electronic systems on
devices, like computers, cell phones, servers, and networks, from malicious attacks. Regardless of who you are,
it’s important to keep your data safe from unauthorized access.
There are many risks, some more serious than others. Among these dangers are malware erasing your entire
system, an attacker breaking into your system and altering files, an attacker using your computer to attack
others, or an attacker stealing your credit card information and making unauthorized purchases. There is no
guarantee that even with the best precautions some of these things won't happen to you, but there are steps
you can take to minimize the chances.
Cybersecurity is important because it protects you or your company from potential cyber threats. The
advancement of technology has left many people vulnerable to cybercriminal activities, such as hacking, data
theft and damage, and industrial espionage. Cybercrime rate is increasing; hence, without cyber security, you
could lose sensitive information, money, or reputation. Cyber security is as important as the need for
technology.
1. There Are Different Types of Cyber Attacks. No one is safe from the threat of cyber-attacks. These
attacks include malware, phishing, man-in-the-middle, and drive-by attacks. Scary right? Wait till you
hear about crypto-jacking. This is where criminals could compromise your computer and use it to steal
resources, such as Bitcoins and other digital currencies. If they can get to your computer, then they
could easily steal your data. You need cyber security if you want to stand a chance against these threats.
2. Increase In Cybercrimes. The fast development of technology, such as fast broadband, better gadgets,
and cloud computing, has led to an increase in the number of connected devices. According to some
surveys, there’ll be about 21.1 billion networked devices in the world in 2021. This, with the
development of the dark web, has created a fertile ground for cybercrime activities. Cyber security can,
nonetheless, minimize your exposure. This link explains some ways of reducing risk in organizations.
3. Tech Users Are Vulnerable. The fact that almost everyone on this planet is now more reliant on
information and communication technology means, for cybercriminals, that there’s a booming criminal
opportunity. Factors like the enhancement of cloud storage and social media growth have left many
exposed to cyber-attacks. This makes cyber security more important than ever.
4. Cloud Storage Needs Protection. Sensitive information, like banking details and passwords, can now be
stored on the cloud, increasing their risk of theft. Also, the growth of social media has led to an increase
in identity fraud. The truth is that whether you’re an individual, a small business, a large organization, or
even a government, you’re at risk of being targeted for cybercrime. You may, therefore, want to
consider cyber security.
5. It Could Save Millions Of Dollars. According to recent studies, the average cost of cybercrimes for an
organization was about USD$13 million last year. Research also revealed a sharp increase in information
breaches, including financial information, health records, trade secrets, personal data, and intellectual
property. You’d rather pay a little for cyber security and save big on your organization’s protection than
lose a fortune through industrial espionage.
6. Enables Credibility. Cyber attacks often make online platforms, like websites, unpleasant or inaccessible.
That could result in a bad reputation, which might be difficult to undo. Cyber security is, hence,
important for the protection of your platform from such risks. It could also help protect customers from
potential hackers.
7. Viruses Can Harm You Or Business. Computer viruses can spread like wildfire. These could cause severe
problems for you and your business if not controlled. Computer viruses are capable of corrupting your
files and systems. It’s essential, therefore, to take cyber security seriously as it could save your computer
systems from viruses.
8. The Dark Web. The growth and development of technology haven’t left the dark web behind. The dark
web is a secret collaboration of Internet sites, and which is only accessible through specialized web
browsers. It’s mainly used for hiding Internet activities and keeping users anonymous and private. The
dark web can be utilized legally, but it has also been known for being the host of numerous illegal
operations. Crimes, like drug and human trafficking, illegal weapons distribution, software distribution,
illegal auctions, piracy, and many more unlawful activities, including the unthinkable, have been known
to use the dark web. As technology has developed, so has the dark web strengthened its sophistication.
It has provided a haven for cybercriminals and resulted in an increased threat on surface Internet use.
These vulnerabilities have heightened the significance of cyber security.
Terrorist groups
Terrorist groups are increasingly using cyber attacks to damage national interests. They are less developed in
cyber attacks and have a lower propensity to pursue cyber means than nation-states. It is likely that terrorist
groups will present substantial cyber threats as more technically competent generations join their ranks.
Hacktivists
Hacktivists activities range across political ideals and issues. Most hacktivist groups are concerned with
spreading propaganda rather than damaging infrastructure or disrupting services. Their goal is to support their
political agenda rather than cause maximum damage to an organization.
Disgruntled insiders
Disgruntled insiders are a common source of cyber crime. Insiders often don't need a high degree of computer
knowledge to expose sensitive data because they may be authorized to access the data. Insider threats also
include third-party vendors and employees who may accidentally introduce malware into systems or may log
into a secure S3 bucket, download its contents and share it online resulting in a data breach. Check your S3
permissions or someone else will.
Hackers
Malicious intruders could take advantage of a zero-day exploit to gain unauthorized access to data. Hackers
may break into information systems for a challenge or bragging rights. In the past, this required a high level of
skill. Today, automated attack scripts and protocols can be downloaded from the Internet, making sophisticated
attacks simple.
Natural disasters
Natural disasters represent a cyber threat because they can disrupt your key infrastructure just like a cyber
attack could.
Accidental actions of authorized users
An authorized user may forget to correctly configure S3 security, causing a potential data leak. Some of
the biggest data breaches have been caused by poor configuration rather than hackers or disgruntled insiders.
Malware
Malware, short for malicious software, is software that does malicious tasks on a device or network such as
corrupting data or taking control of a system. It is designed to damage your computer it may be a virus, worm
or Trojan.
Spyware
Spyware is a form of malware that hides on a device providing real-time information sharing to its host,
enabling them to steal data like bank details and passwords.
Phishing attacks
Phishing is when a cybercriminal attempts to lure individuals into providing sensitive data such as personally
identifiable information (PII), banking and credit card details and passwords.
Ransomware
Ransomware is a type of malware that denies access to a computer system or data until a ransom is paid.
Zero-day exploits
A zero-day exploit is a flaw in software, hardware or firmware that is unknown to the party or parties
responsible for patching the flaw.
Wiper attacks
A wiper attack is a form of malware whose intention is to wipe the hard drive of the computer it infects.
Intellectual property theft
Intellectual property theft is stealing or using someone else's intellectual property without permission.
Theft of money
Cyber attacks may gain access to credit card numbers or bank accounts to steal money.
Data manipulation
Data manipulation is a form of cyber attack that doesn't steal data but aims to change the data to make it
harder for an organization to operate.
Data destruction
Data destruction is when a cyber attacker attempts to delete data.
Drive-by downloads
A drive-by download attack is a download that happens without a person's knowledge often installing a
computer virus, spyware or malware.
Malvertising
Malvertising is the use of online advertising to spread malware.
Rogue software
Rogue software is malware that is disguised as real software.
Unpatched software
Unpatched software is software that has a known security weakness that has been fixed in a later release but
not yet updated.
Here's a list of the most pernicious cyber threats you must aware of in 2021.
Covid-19 themed phishing attacks
During a phishing attack, victims are presented with seemingly innocuous emails or websites that are infected
with malicious links. Interacting with these links initiates a credential theft process. These attacks have the
highest success rates when fear is used as a motivator for interaction. Since the coronavirus pandemic, covid-
themed phishing attacks have spiked, preying upon the virus-related anxieties of the public.
The following chart demonstrates the colossal spike in coronavirus-themed website domain registrations since
the pandemic was announced. This is very unusual activity that raises glaring red flags.
Insider threats
According to a Verizon report from 2019, 57% of all database breaches involved insider threats. Unlike phishing
attacks, this type of security-bypassing cyber threat cannot be mitigated with a control strategy.
To best defend against insider threats, access to sensitive resources should be restricted to those that
absolutely require it. Securing Privileged Access Management (PAM) can help achieve this.
Ransomware attacks
Ransomware attacks are one of the most frightening cyber threats. During these attacks, a victim's sensitive
data is encrypted and only decrypted if a ransom price is paid. Victims only become aware that they've been
compromised when they're presented with a formidable message announcing the successful attack.
Polyglot files
Polyglot files that can have multiple file type identities. For example, some polyglot files can be classified as
both PPT and JS and they can be opened by applications that read both file types.
Polyglot files are not hostile by nature. Cybercriminals package malicious code into polyglot files to bypass file-
type security controls. Some applications only permit certain file extensions to be uploaded and/or opened.
These are usually DOC, GIF, and JPEG files.
A Phar-JPEG polyglot file would be permitted with such filters since it's attributed with a JPEG identity, but
when executed, the Phar file can be used to launch PHP object injection attacks.
DDoS attacks
As the adoption rate of IoT devices in both the home and office continue to rise, the risk of DDoS attack rises
accordingly.
During a DDoS attack, cybercriminals direct a high concentration of network requests from multiple
compromised IoT devices at a targeted website. This causes the victim's servers to overload, forcing them
offline.
All forms of DDoSing are illegal, even if it's used to gain an advantage during a friendly online gaming session.
Social engineering
Social engineering, in the context of cyber threats, is an effort to obtain login credentials through manipulation
and trickery. Phishing campaigns are the usual attack vectors of social engineering, but these cyber threats can
also be presented in person. For example, threat actors posing as IT professionals asking for your password.
Malvertising
Malvertising (malicious advertising) is the process of embedding malicious codes into advertisement links.
Malvertising can occur on websites that permit third-party advertising networks and even in social media feeds.
An example of a malvertising attack is the Latin American banking trojan known as MIspadu. In The trojan was
embedded in a Facebook ad campaign for McDonalds coupons. When users interacted with the ad, a zip file
containing the bank credential-stealing trojan was downloaded and installed on their system.
Zero-day exploits
Zero-day exploits are security vulnerabilities that are exploited by cybercriminals before a patch is released for
them. These exposures are usually associated with ubiquitous software providers. A recent example is a zero-
day exploit impacting Microsoft Exchange servers.
Defending against such threats is difficult because they're usually not discovered until the cyberattacks abusing
them have been discovered.
An attack surface monitoring solution offers advanced awareness of ecosystem vulnerabilities so that they can
be remedied before developing into zero-day exploits.
Malwares
There are multiple other types of malware can infect not only desktops, laptops, and servers, but also
smartphones. Malware categories include the following:
• Virus. Virus is a program written to enter to your computer and damage/alter your files/data. A virus might
corrupt or delete data on your computer. A computer Virus is more dangerous than a computer worm as it
makes changes or deletes your files while worms only replicates itself without making changes to your
files/data. (Refer to Difference Between Malware and Virus)
• Worms. A worm is a standalone program that can self-replicate and spread over a network. Unlike a virus, a
worm spreads by exploiting a vulnerability in the infected system or through email as an attachment
masquerading as a legitimate file. A graduate student created the first worm (the Morris worm) in 1988 as
an intellectual exercise. Unfortunately, it replicated itself quickly and soon spread across the internet.
• Ransomware. As the name implies, ransomware demands that users pay a ransom—usually in bitcoin or
other cryptocurrency—to regain access to their computer. The most recent category of malware is
ransomware, which garnered headlines in 2016 and 2017 when ransomware infections encrypted the
computer systems of major organizations and thousands of individual users around the globe.
• Trojan Horse. A trojan creates a backdoor in your system, allowing the attacker to gain control of your
computer or access confidential information. It uses false and fake name for mislead users from its true
intent and executing them. Trojan Horses generally install on the system as legitimate and useful software
that can give unauthorized access and control of the system to the hackers. Back orifice, Rootkit and Beast
Trojan are some of the common Trojan horse which is more harmful.
• Scareware. Many desktop users have encountered scareware, which attempts to frighten the victim into
buying unnecessary software or providing their financial data. Scareware pops up on a user's desktop with
flashing images or loud alarms, announcing that the computer has been infected. It usually urges the victim
to quickly enter their credit card data and download a fake antivirus program.
• Adware and spyware. Adware pushes unwanted advertisements at users and spyware secretly collects
information about the user. Spyware may record the websites the user visits, information about the user's
computer system and vulnerabilities for a future attack, or the user’s keystrokes. Spyware that records
keystrokes is called a keylogger. Keyloggers steal credit card numbers, passwords, account numbers, and
other sensitive data simply by logging what the user types.
• Keylogger. Keylogger records everything the user types on his/her computer system to obtain passwords
and other sensitive information and send them to the source of the keylogging program.
• Fileless malware. Unlike traditional malware, fileless malware does not download code onto a computer, so
there is no malware signature for a virus scanner to detect. Instead, fileless malware operates in the
computer's memory and may evade detection by hiding in a trusted utility, productivity tool, or security
application. An example is Operation RogueRobin, which was uncovered in July 2018. RogueRobin is spread
through Microsoft Excel Web Query files that are attached to an email. It causes the computer to run
PowerShell command scripts, providing an attacker access to the system. As PowerShell is a trusted part of
the Microsoft platform, this attack typically does not trigger a security alert. Some fileless malware is also
clickless, so a victim does not need to click on the file to activate it.
• Rootkits. Rootkit is a set of application that is designed to infect a target PC and allow an attacker to install a
set of tools that grant him persistent remote access to the computer. The malware typically pretended itself
as normal files that “hide in plain sight” so your antivirus software overlooks them. It enables administrator-
level access to a computer or computer network. The motive is to steal the identity information from your
computer, often to gain control of a system. It is difficult to detect and remove, requires the specialized
tools to remove.
• Logic Bombs. A logic bomb is a malicious program that uses a trigger to activate the malicious code. The
logic bomb remains non-functioning until that trigger event happens. Once triggered, a logic bomb
implements a malicious code that causes harm to a computer. Cybersecurity specialists recently discovered
logic bombs that attack and destroy the hardware components in a workstation or server including the
cooling fans, hard drives, and power supplies. The logic bomb overdrives these devices until they overheat
or fail.
• Backdoor. A backdoor bypasses the usual authentication used to access a system. The purpose of the
backdoor is to grant the cyber criminals future access to the system even if the organization fixes the
original vulnerability used to attack the system.
• Robots. Bots, or Internet robots, are also known as spiders, crawlers, and web bots. While they may be
utilized to perform repetitive jobs, such as indexing a search engine, they often come in the form of
malware. Malware bots are used to gain total control over a computer. (Refer to Pros and Cons of Bots)
• Zombies. A Zombie is a malicious program that is installed on a device that transforms it into a “zombie”
that attacks other systems. A computer or other device transformed by zombie malware is first infected by
a virus or Trojan. It is then deprived of its intended motivations, and instead acts in the service of the
zombie (or that program’s creator). It then acts as a bot or is joined into a botnet and performs mundane
but harmful automated attacks. Zombie computers and assemblages of them, for example botnets, often
conduct e-mail spam, silent click fraud against pay-per-click (PPC) advertising, theft of financial or
personally-identifiable information (PII), and [distributed] denial-of-service (DDoS, DoS) attacks. A novel
form of zombie that arose in the early 2010s was cryptocurrency-mining malware that transformed host
computers into bitcoin-mining zombies. It hijacked the computing power of laptops, then sufficient to mine
digital currency. The coin was then sent to the zombie’s creator who profited off of others’ competing
power and electricity.
1. Malware :
Malware is a program designed to gain access to computer systems, normally for the benefit of some third
party, without the user’s permission. Malware includes computer viruses, worms, Trojan horses, ransomware,
spyware and other malicious programs.
2. Virus :
A virus is a malicious executable code attached to another executable file which can be harmless or can modify
or delete data.
The Good
One of the typical “good” bot uses is to gather information. Bots in such guises are called web crawlers. Another
“good” use is automatic interaction with instant messaging, instant relay chat, or assorted other web interfaces.
Dynamic interaction with websites is yet another way bots are used for positive purposes.
The Bad
Malicious bots are defined as self-propagating malware that infects its host and connects back to a central
server(s). The server functions as a “command and control center” for a botnet, or a network of compromised
computers and similar devices. Malicious bots have the “worm-like ability to self-propagate,” and can also
• Gather passwords
• Log keystrokes
• Obtain financial information
• Relay spam
• Capture and analyze packets
• Launch DoS attacks
• Open back doors on the infected computer
• Exploit back doors opened by viruses and worms
Bots are usually used to infect large numbers of computers. These computers form a “botnet,” or a bot
network.
Cyber Attacks
Cyber Security is procedure and strategy associated with ensuring touchy information, PC frameworks,
systems, and programming applications from digital assaults. Cyber assaults are general phrasing which
covers enormous number of themes, however, a portion of the famous are:
• Altering frameworks and information put away inside
• Abuse of assets
• Unapproved access to focused on framework and getting to delicate data
• Upsetting typical working of the business and its procedures
• Utilizing ransomware assaults to scramble information and coerce cash from casualties
The assaults are currently turning out to be increasingly inventive and complex that is equipped for disturbing
security and hacking of frameworks. So, it’s trying for each business and security expert to defeat this test
and retaliate with these assaults.
In different cases, cybercriminals will offer admittance to the botnet network, now and again known
as “zombie” organization, so different cybercriminals can utilize the organization for their own
malevolent exercises, for example, actuating spam crusade.
Cyber crime or computer-oriented crime is a crime that includes a computer and a network. The computer may
have been used in the execution of a crime or it may be the target.
Cyber crime is the use of a computer as a weapon for committing crimes such as committing fraud, identities
theft or breaching privacy. Cyber crime, especially through the Internet, has grown in importance as the
computer has become central to every field like commerce, entertainment and government. Cyber crime may
endanger a person or a nation’s security and financial health.
Cyber crime encloses a wide range of activities, but these can generally be divided into two categories:
1. Crimes that aim computer networks or devices. These types of crimes involve different threats (like
virus, bugs etc.) and denial-of-service (DoS) attacks.
2. Crimes that use computer networks to commit other criminal activities. These types of crimes
include cyber stalking, financial fraud or identity theft.
2. Cyber Extortion –
Cyber extortion occurs when a website, e-mail server or computer system is subjected to or
threatened with repeated denial of service or other attacks by malicious hackers. These hackers
demand huge money in return for assurance to stop the attacks and to offer protection.
3. Cyber Warfare –
Cyber warfare is the use or targeting in a battle space or warfare context of computers, online
control systems and networks. It involves both offensive and defensive operations concerning to the
threat of cyber attacks, espionage and sabotage.
4. Internet Fraud –
Internet fraud is a type of fraud or deceit which makes use of the Internet and could include hiding
of information or providing incorrect information for the purpose of deceiving victims for money or
property. Internet fraud is not considered a single, distinctive crime but covers a range of illegal and
illicit actions that are committed in cyberspace.
5. Cyber Stalking –
This is a kind of online harassment wherein the victim is subjected to a barrage of online messages
and emails. In this case, these stalkers know their victims and instead of offline stalking, they use the
Internet to stalk. However, if they notice that cyber stalking is not having the desired effect, they
begin offline stalking along with cyber stalking to make the victims’ lives more miserable.
Below are some points by means of which we can prevent cyber crime:
1. Use strong password –
Maintain different password and username combinations for each account and resist the temptation
to write them down. Weak passwords can be easily cracked using certain attacking methods like
Brute force attack, Rainbow table attack etc, So make them complex. That means combination of
letters, numbers and special characters.
Cybersecurity risks pervade every organization and aren't always under the direct control of your IT security
team.
Increasing global connectivity, usage of cloud services, and outsourcing mean a much larger attack vector than
in the past. Third-party risk and fourth-party risk is on the rise, making third-party risk management, vendor risk
management and cyber security risk management all the more important for reducing the risk of third-
party data breaches.
Pair this with business leaders making technology-related risk decisions every day, in every department, without
even knowing it. Imagine your CMO trials a new email marketing tool. or even anti-virus software, that has poor
security practices, this could be a huge security risk that could expose your customers' personally identifiable
information (PII) causing identity theft.
Whether you work in the public or private sector, information security cannot be left to your Chief Information
Security Officer (CISO), it must be an organizational-wide initiative.
REFERENCES
• Jonathan Reuvid, “Easy Steps to Managing Cybersecurity” ISBN: 9781787197954, Legend Press, 2018
• Julie Mehan. “Cyberwar, Cyberterror, Cybercrime & Cyberactivism (2nd Edition): An in-depth guide to the
role of standards in the cybersecurity environment”, ISBN: 9781849285735, itgovernance, 2014
• Scott Augenbaum, “The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from
Cybercrime”, ISBN: 9781948677080, Forefront Books
• geeksforgeeks.org
• hypr.com
• hakin9.org/8-reasons-cyber-security-is-important/
• us-cert.cisa.gov/ncas/tips/ST04-001
• secureworks.com/blog/cyber-threat-basics
• mcafee.com/enterprise/en-us/security-awareness/ransomware/malware-vs-
viruses.html#:~:text=viruses%20is%20an%20important%20one,its%20code%20into%20other%20programs
• norton.com/internetsecurity-malware-what-are-bots.html