ADV105
ADV105
-Virus: They can replicate themselves by hooking them to the program on the host computer like songs,
videos etc and then they travel all over the Internet. The Creeper Virus was first detected on ARPANET.
Examples include File Virus, Macro Virus, Boot Sector Virus, Stealth Virus etc. trojan
- I love you virus
-Worms: Worms are also self-replicating in nature but they don’t hook themselves to the program on
host computer. Biggest difference between virus and worms is that worms are network-aware. They can
easily travel from one computer to another if network is available and on the target machine, they will
not do much harm, they will, for example, consume hard disk space thus slowing down the computer.
- EXPANDING FILES
2. Botnets- Bots can be seen as advanced form of worms. They are automated processes that are
designed to interact over the internet without the need for human interaction. They can be good or bad.
The malicious bot can infect one host and after infecting will create a connection to the central server
which will provide commands to all infected hosts attached to that network called Botnet.
-
3. Drive-by-download attacks-
In a drive-by download attack, malicious code is downloaded from a website via a browser,
application or integrated OS without a user's permission or knowledge. A user doesn't have to click on
anything to activate the download. Just accessing or browsing a website can start a download.
o MP3-MP4 CONVERSION
Cybercriminals can use drive-by downloads to inject banking Trojans, steal and collect personal
information as well as introduce exploit kits or other malware to endpoints.
4. Phishing- SMS, EMAIL, PHONE
Phishing attacks are a type of information security threat that employs social engineering to
trick users into breaking normal security practices and giving up confidential information, including
names, addresses, login credentials, Social Security numbers, credit card information, and other financial
information.
-scatter
6. Ransomware
- In a ransomware attack, the victim's computer is locked, typically by encryption, which
keeps the victim from using the device or data that's stored on it. To regain access to the device or data,
the victim has to pay the hacker a ransom, typically in a virtual currency such as Bitcoin. Ransomware
can be spread via malicious email attachments, infected software apps, infected external storage devices
and compromised websites.
- fake ransomware
- Encrypting
- Screen locking
7. Exploit Kits
-An exploit kit is a programming tool that enables a person without any experience writing
software code to create, customize, and distribute malware. Exploit kits are known by a variety of
names, including infection kits, crimeware kits, DIY attack kits, and malware toolkits. (wire shark)
Cybercriminals use these toolkits to attack system vulnerabilities to distribute malware or engage in
other malicious activities, such as stealing corporate data, launching denial of service attacks, or building
botnets.
-
8. APT- An advanced persistent threat (APT) is a targeted cyberattack in which an unauthorized intruder
penetrates a network and remains undetected for an extended period. Rather than causing damage to a
system or network, the goal of an APT attack is to monitor network activity and steal information to gain
access, including exploit kits and malware.
-
Cybercriminals typically use APT attacks to target high-value targets, such as large enterprises and
nation-states, stealing data over a long period.
9. Malvertising is a malicious attack that involves injecting harmful code into legitimate online
advertising networks.
These deceptive ads are then unknowingly displayed to users, leading them to unsafe
destinations. The embedded malicious code often redirects users to harmful websites, risking their
online security.
- Spotify-
10. Social engineering is the tactic of manipulating, influencing, or deceiving a victim to gain control over
a computer system or to steal personal CONFIDENTIAL and financial information. It uses psychological
manipulation to trick users into making security mistakes or giving away sensitive information.
11.Man-in-the-middle attacks
- A man-in-the-middle (MITM) attack is a cyberattack where an attacker secretly intercepts
communication between two parties. The attacker's goal is to steal data or trick the victim into
taking a specific action.
The attacker positions themselves between the two parties, such as a user and a website
The attacker listens in on the conversation or impersonates one of the parties
The attacker may modify the data being exchanged
The victim believes they are communicating directly with the other party
What the attacker can do
Steal passwords, banking details, or other sensitive data
Convince the victim to change their login credentials
Convince the victim to make a purchase or transfer funds
Access or control the victim's account
How to prevent MITM attacks
Use strong cryptographic protocols that include endpoint authentication
Implement SSL/TLS encryption
Avoid using outdated or under-secured ciphers
Examples of MITM attacks Equifax's 2017 data breach, The 2015 Superfish adware on Lenovo
computers, The 2011 DigiNotar breach, and The NSA's 2013 attack on Google users' search
records.
12. Spyware
-Spyware is a type of malware that collects information about a user or device without their
consent. It can steal passwords, bank account numbers, and other sensitive information. Spyware can
also slow down a device, alter its security settings, and download more malware.
Activities:
o Interactive lecture
o Vulnerability assessment exercise
o Group presentation on a recent security incident
Week 5-6: Risk Management
Objectives: Learn about risk management processes and techniques.
Topics:
o Risk assessment and analysis
o Risk mitigation strategies
o Developing a risk management plan
Activities:
o Lecture and Q&A session
o Risk assessment workshop
o Case study on risk management in a real organization
This table matches the OSI levels to the corresponding type of network
security.
Layers (ISO 7498-1) ISO 7498-2 Security Model
Application Authentication
Session Nonrepudiation
Network Confidentiality
Antivirus and antimalware. Antivirus and antimalware are software designed to detect, remove
or prevent viruses and malware, such as Trojan horses, ransomware and spyware, from infecting
a computer and, consequently, a network.
Antivirus software is a tool that helps you scan, detect and remove viruses. It
acts as a shield for your device, protecting it from viruses (a kind of
malicious software). Viruses can replicate themselves and spread throughout
your computer system, causing damage and stealing information. Think of
them like a digital illness — they can corrupt files, disrupt programs and
even give hackers access to your personal data.
Malware protection is a great way to deal with such threats. A good anti-
malware software program can help you:
Application security. It is crucial to monitor and protect applications that organizations use to
run their businesses. This is true whether an organization creates that application or buys it, as
modern malware threats often target Open Source code and containers that organizations use to
build software and applications.
Behavioral analytics. This method analyzes network behavior and automatically detects and
alerts organizations to abnormal activities.
Cloud security. Cloud providers often sell add-on cloud security tools that provide security
capabilities in their cloud. The cloud provider manages the security of its overall infrastructure
and offers tools for the user to protect their instances within the overall cloud infrastructure. For
example, Amazon Web Services provides security groups that control the incoming and outgoing
traffic associated with an application or resource.
Session 8: Firewalls and VPNs
This plan provides a comprehensive overview of IT Security and Management, ensuring students gain
both theoretical knowledge and practical skills. Let me know if you need any adjustments or additional
details!