Threats to Technology
Threats to Technology
DAMOLA O.
Remember?
❑Threats: Something that can cause harm to assets
Threat Actor
✓ Also known as malicious actors or adversaries, are individuals, groups,
or entities that initiate, execute, or orchestrate the threats.
✓ They are responsible for activities aimed at causing harm, damage, or
unauthorised access.
Common Threats & Threat Actors
Threats
▪Malware: Malware simply means malicious software, designed to disrupt, damage,
or gain unauthorised access to information systems and assets. Common types
include viruses, worms, Trojans, ransomware, and spyware.
▪Actors:
▪Control: ?
Threats
▪Phishing Attacks: Phishing attacks use deceptive emails, messages, or websites to trick
users into revealing sensitive information, such as login credentials or financial data.
▪Actors:
▪Control: ?
Threats
▪Denial-of-Service (DoS) Attacks: DoS attacks aim to overwhelm or disable a target
system or network, making it inaccessible to legitimate users by flooding it with
excessive traffic or resource requests.
▪Example: An attacker launches a DoS attack against a company's web server, causing
it to crash, and rendering the website unavailable to customers.
▪Actors:
▪Control: ?
DDoS
Threats
▪Insider Threats: Insider threats come from within an organization and can be
accidental or malicious. Employees or contractors may leak sensitive data or misuse
their access privileges.
▪Example: An employee with access to sensitive customer data leaks the information
to a competitor for personal gain.
▪Actors:
▪Control: ?
Threats
▪Social Engineering: Social engineering involves manipulating
people into revealing confidential information or performing certain
actions. Attackers use psychological tactics to gain trust or deceive
individuals.
▪Example: An attacker impersonates an IT technician over the
phone, convincing an employee to share their login credentials,
claiming it's for a system upgrade.
▪Actors:
▪Control: ?
Threats
▪Man-in-the-middle Attack: attacker intercepts and potentially
alters the communication between two parties who believe they
are communicating directly with each other. In this type of
attack, the attacker secretly positions themselves between the
two parties, acting as an unauthorised intermediary. The primary
goal of a man-in-the-middle attacker is to eavesdrop on the
communication, manipulate it, or both, without the knowledge or
consent of the legitimate parties involved.
▪Example: Attackers manipulate DNS requests, redirecting users to
malicious websites that impersonate legitimate ones.
▪Actors:
▪Control: ?
Threats
▪Zero-Day Exploits: Zero-day exploits target software vulnerabilities that vendors are
unaware of or haven't yet released a patch for. Attackers use these vulnerabilities to
gain unauthorised access.
▪Actors:
▪Control: ?
Threats
▪Insider Data Theft: This threat involves authorised individuals stealing sensitive
information for personal gain or to sell to external parties.
▪Actors:
▪Control: ?
Threats
▪Advanced Persistent Threats (APTs): APTs are sophisticated, long-term cyber-attacks
launched by skilled attackers who aim to infiltrate and remain undetected within a
target organization to extract valuable information.
▪Actors:
▪Control: ?
Threats
▪Physical Security Breaches: Physical security breaches occur when
unauthorised individuals gain physical access to information assets, such
as servers or data centres.
▪Actors:
▪Control: ?
Threats
▪Supply Chain Attacks: Supply chain attacks target vulnerabilities in the supply chain
process, aiming to compromise hardware, software, or firmware before reaching
end-users.
▪Example: Attackers inject malicious code into a software update, which is then
distributed to customers, infecting their systems when installed.
▪Actors:
▪Control: ?
https://www.techtarget.com/whatis/feature/SolarWinds-hack-explained-Everything-you-need-to-know
Recall…
▪ IDS solutions like Snort and Suricata use signature-based detection to identify specific
patterns or signatures of known attacks in network traffic.
Threat/Intrusion Detection
▪Anomaly-based: establishes a baseline of normal network or
system behaviour. It then identifies deviations from this baseline,
flagging activities that are unusual or potentially malicious.
▪ User and Entity Behaviour Analytics (UEBA) solutions such as Exabeam and Splunk
detect anomalies in user and entity behaviour by analysing historical data to identify
deviations from normal patterns.
▪ Email filtering systems, like those used by Gmail and Microsoft Outlook, employ
heuristics to analyse incoming emails for suspicious content, attachments, or links
that may indicate phishing attempts.
▪ Web Application Firewalls (WAFs) like ModSecurity use heuristic analysis to detect
and block web application attacks based on known attack patterns.
Threat/Intrusion Detection
▪Behaviour-Based Detection: Behaviour-based detection focuses on
the behaviour of software or users. It monitors patterns of
activities and flags deviations that indicate malicious behaviour.
▪ Endpoint Detection and Response (EDR) solutions like CrowdStrike and Carbon Black
monitor the behaviour of endpoints (e.g., computers) and alert administrators to
unusual activities, such as file modifications or unauthorised access attempts.
▪ Also used in user authentication systems to flag suspicious login attempts, such as
multiple failed logins or login attempts from unusual locations.
Security Measures
✓ Hardware
✓ Software
✓ Processes and Procedures
✓ Best Practices
Must Know!
Best Practices
▪Principle of least privilege!
▪Principle of need-to-know
▪Defence-in-depth/Layered security
▪System Hardening
▪SETA Programs
▪Network Segmentation
▪Keeping Systems Up-to-date
▪Clean Desk Policy
Processes/Procedures
▪Backups
▪Patch and Change Management
▪Vulnerability & Penetration Tests
▪Continuous Monitoring
▪Asset Inventory
▪Secure Coding
▪Input validation
▪Background check/Security Clearance
▪Access Control
Hardware/Software
▪Firewalls
▪DMZ
▪Intrusion Detection (Prevention) Systems {IDS/IDPS}
▪Proxy/VPN Servers
▪Secure Web Gateways {SWG}
▪Security Information and Event Mgt {SIEM}
▪Security Orchestration, Automation and Response {SOAR}
▪Antivirus Program
▪Data Loss Prevention Systems {DLP}
Categorising Security Controls
Categorising By Purpose,
▪Preventative: aim to stop disasters or security incidents
▪Detective: uses IoCs or sensors to identify likely attacks or attempts
▪Recovery: after an incident has taken place (i.e., after a successful breach or attack)
A control can be a combination of both. E.g., IDS is a combo of Detective & Technical. IPS is a combo of ___??
System Hardening
Disabling Unnecessary Strong Password Implementing Access Appropriate and correct
Updates and Patches
Services & Ports Policies Control Firewall Configuration
[email protected]
@L_damola_