The document discusses various types of cyberthreats including hacking, phishing, malware, and denial of service attacks. It describes the different sources of cyberthreats such as human error, environmental hazards, and computer systems failures. The document also provides examples of some of the largest data breaches in 2016 and their impacts.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
9 views
CH 05
The document discusses various types of cyberthreats including hacking, phishing, malware, and denial of service attacks. It describes the different sources of cyberthreats such as human error, environmental hazards, and computer systems failures. The document also provides examples of some of the largest data breaches in 2016 and their impacts.
Figure 5.1: Number of 2016 U.S. Data Breaches by Industry Sector. The number of cyberthreats in which data records have been stolen by hackers has increased at an alarming rate.
2016 Biggest Data Breaches Worldwide Company Type of Breach Records Breached Anthem Insurance Identity theft—healthcare 78.8 million records Turkish General Identity theft—malicious 50 million Directorate outsider (government agency) Korean Pharmaceutical Identity theft—malicious 43 million Info. Center insider U.S. Office of Personnel Personally Identifiable 22 million Management Information (PII) (government agency) Experian Identity theft—malicious 15 million outsider (credit bureau)
Major Sources of Cyberthreats (1 of 2) Unintentional cyberthreats can be caused by o Human error (a majority of internal security issues) • Poorly designed systems • Faulty programming • Neglecting to change passwords • Unaware users o Environmental hazards • Natural disasters • Faulty HVAC systems o Computer systems failure • Poor manufacturing or maintenance
Major Sources of Cyberthreats (1 of 2) Intentional Threats Examples of intentional threats include data theft such as inappropriate use of data (e.g., manipulating inputs); theft of computer time; theft of equipment and/or software; deliberate manipulation in handling, entering, programming, processing, or transferring data; sabotage; malicious damage to computer resources; destruction from malware and similar attacks; and miscellaneous computer abuses and Internet fraud.
Major Sources of Cyberthreats (1 of 2) Unintentional threats fall into three major categories: 1. Human error can occur in the design of the hardware or information system. It can also occur during programming, testing, or data entry. Neglecting to change default passwords in applications or on systems or failing to manage patches creates security holes. Human error also includes untrained or unaware users falling prey to social engineering like phishing scams or ignoring security procedures. Human errors contribute to the majority of internal control and information security problems.
Major Sources of Cyberthreats (1 of 2) 2. Environmental hazards include volcanoes, earthquakes, blizzards, floods, power failures or strong fluctuations, fires (the most common hazard), defective heating, ventilation and air- conditioning (HVAC) systems, explosions, radioactive fallout, and water-cooling-system failures. In addition to the primary damage, computer resources can be damaged by the side effects of a hazard, such as smoke and water. Such hazards may disrupt normal computer operations resulting in extended data inaccessibility and exorbitant restoration and recovery costs.
Major Sources of Cyberthreats (1 of 2) 3. Computer systems failures can occur as the result of poor manufacturing, defective materials, or poor maintenance. Unintentional malfunctions can also occur for other reasons, ranging from administrator inexperience to inadequate testing.
Major Sources of Cyberthreats (2 of 2) • Some intentional forms of cyberthreats are: o Hacking o Phishing o Crimeware o Distributed Denial of Service (DDoS) o Insider and Privilege Misuse o Physical Theft
Intentional Cyberthreats: Hacking • Hacking is broadly defined as intentionally accessing a computer without authorization or exceeding authorized access. There are three types of hackers: • White Hat: Computer security specialist who breaks into protected systems and network to test and assess their security. • They use their skills to improve security by exposing vulnerabilities before malicious hackers (black hats) can detect and exploit them.
Intentional Cyberthreats: Hacking • Black Hat: Person who attempts to find computer security vulnerabilities and exploit them for personal and/or financial gain, or other malicious reasons. • Can inflict major damage on both individual computer users and large organizations by stealing personal financial information, compromising security of major systems, or shutting down or alerting the function of websites and networks.
Intentional Cyberthreats: Hacking • Gray Hat: Person who may violate ethical standards or principles, but without the malicious intent ascribed to black hat hackers. • Can inflict major damage on both individual computer users and large organizations by stealing personal financial information, compromising security of major systems, or shutting down or alerting the function of websites and networks. • Hacktivist: is short for hacker-activist, or someone who performs hacking to promote awareness, or otherwise support a social, political, economic, or other cause.
Intentional Cyberthreats: Spear Phishing • Spear phishers often target select groups of people with something in common • Trick user into opening an infected email • Emails sent that look like the real thing • Confidential information extracted through seemingly legitimate website requests for passwords, user IDs, PINs, account numbers, and so on.
Intentional Cyberthreats: Botnets • A botnet is a group of external attacking entities and is a totally different attack method/vector from malware, which is internal to the system. • A group of infected computers, called zombies, can be controlled and organized into a network of zombies on the command of a remote botmaster (also called a bot herder).
New Attack Vectors • Attack Vector is a path or means by which a hacker can gain access to a computer or network server in order to deliver a malicious outcome. • Mobile devices and apps, social media, and cloud services introduce even more attack vectors for malware, phishing, and hackers. • Malicious (rogue) apps can serve up Trojan attacks, other malware, or phishing attacks. • Found in Google Play Store for Andriod phones.
The Face and Future of Cyberthreats Review 1. Define and give an example of an intentional threat and an unintentional threat. 2. Why might management not treat cyberthreats as a top priority? 3. Describe the differences between distributed denial-of-service (DDoS), telephony denial-of-service (TDoS), and permanent denial-of-service (PDoS). 4. Why is social engineering a technique used by hackers to gain access to a network? 5. List and define three types of malware. 6. What are the risks caused by data tampering? 7. Define botnet and explain why they are dangerous. 8. Why is Ransomware on the rise? How might companies guard against ransomware attacks?
High Profile and Under the Radar Attacks • Advanced Persistent Threats (APT) o Launched by attacker through phishing to again access to enterprise’s network o Designed for long-term espionage o Profit-motivated cybercriminals often operate in stealth mode to continue long-term activities • Hackers and hacktivists, commonly with personal agendas, carry out high-profile attacks to further their causes. o Anonymous and LulzSec are two hacker groups who have committed daring data breaches, data compromises, data leaks, thefts, threats, and privacy invasions.
Critical infrastructure is defined as systems and assets so vital to the country that their incapacity or destruction would have a debilitating effect.
• One of the worst and most prevalent cyberthreats is
identity theft. o Made worse by electronic sharing and databases o Businesses reluctant to reveal incidents in which their customers’ personal financial information may have been stolen, lost, or compromised
Networks and Services Increase Exposure to Risk • Time-to-exploitation is the elapsed time between when vulnerability is discovered and when it is exploited o Launched by attacker through phishing to again access to enterprise’s network o Designed for long-term espionage o Profit-motivated cybercriminals often operate in stealth mode to continue long-term activities • Hackers and hacktivists, commonly with personal agendas, carry out high-profile attacks to further their causes. o Anonymous and LulzSec are two hacker groups who have committed daring data breaches, data compromises, data leaks, thefts, threats, and privacy invasions.
Cyberattack Targets and Consequences Review 1. What is a critical infrastructure? 2. List three types of critical infrastructures. 3. How do social network and cloud computing increase vulnerability? 4. Why are patches and service packs needed? 5. Why is it important to protect intellectual property? 6. How are the motives of hacktivists and APTs different? 7. Explain why data on laptops and computers need to be encrypted. 8. Explain how identity theft can occur.
IT Defenses • Some essential defenses organizations can institute to defend again cyberattacks o Antivirus Software: designed to detect malicious codes and prevent users from downloading them. o Intrusion Detection Systems (IDSs): scans for unusual or suspicious traffic (passive defense) o Intrusion Prevention Systems (IPSs): is designed to take immediate action—such as blocking specific IP addresses— whenever a traffic-flow anomaly is detected (active defense) • Security is an ongoing, unending process
Business Continuity Planning • Business continuity refers to maintaining business functions or restoring them quickly when there is a major disruption o A business continuity plan covers business processes, assets, human resources, business partners o Keeps the business running after a disaster occurs o Covers fires, earthquakes, floods, power outages, malicious attacks, and other types of disasters
o Prevention and deterrence o Detection o Contain the Damage (damage control) o Recovery o Correction o Awareness and compliance • Auditing can provide an additional layer of safeguards.
Defending Against Fraud Review 1. What defenses help prevent occupational fraud? 2. What level of employee commits the most occupational fraud? 3. What is the purpose of internal controls? 4. What federal law requires effective internal controls? 5. Explain the concepts of Intelligence Analysis and Anomaly Detection. 6. Name the major categories of general controls. 7. Explain authentication and name two methods of authentication. 8. What are the six major objectives of a defense strategy?
developed to address compliance: o Enterprise Risk Management (ERM) o Control Objectives for Information and Related Technology (COBIT) o Industry Standards, for example, Payment Card Industry Data Security Standard (PCI DSS)
Enterprise Risk Management Framework (ERM) • Risk-based approach to managing an enterprise • Developed by the Committee of Sponsoring Organizations of the Treadway Commission (COSO) ERM • Integrates internal control, the Sarbanes-Oxley Act mandates, and strategic planning • Consists of eight components, listed in Table 5.13
Frameworks, Standards, and Models Review 1. Who created the Enterprise Risk Management Framework (ERM)? What is its purpose? 2. What are the 5 principles of COBIT 5? Explain. 3. Why do industry groups have their own standards for cybersecurity? Name one standard. 4. Are measurements of direct costs sufficient to reflect total damage sustained by a cyberattack? 5. What 4 components comprise the IT Security Defense-in-Depth model? 6. What are the 4 steps in the IT Security Defense-in-Depth IT security model? 7. Explain why frameworks, standards, and models are important parts of a cybersecurity program.