Software written to infect, damage or gain
unauthorized access to computer systems
Used to commit crimes such as
fraud and identity theft
Exploits vulnerabilities and affects
all components of the OS
Types of Malware
Viruses - Attaches itself to programs or files on a computer or server
Worms - Replicates itself through a computer network to spread to
other computers; it does not need to attach to a program
Trojan Horses - Designed to access a computer by misleading users of its intent e.g.
Fake message telling you to download something 'for the greater good'
Phishing
A form of 'social' engineering' (Human interaction used on people to break normal
security procedures) used to entice people to disclose personal information
Used to try and steal personal
information such as usernames,
passwords credit card details etc.
Usually done by email
Can also be done by phone to trick people into entering bank
detials
Brute Force
A trial and error method used by
programs to decode encrypted data
such as passwords and pin numbers etc.
Normally done through exhausted effort
with a lot of generated guesses instead of
employing forms of intellect
Denial of Service (DoS)
Floods a sever (website) with useless traffic, overloading it via infected machines in a
network so it cannot respond to legitimate requests by the user and would go offline
Some forms of DoS attacks (Teardrop Attacks, Ping of Death) exploit
limitations in the TCP/IP (Transmission Control Protocol/Internet Protocol)
DDoS (Distributed DoS) is where multiple systems, already infected with
'Trojans', are used to infect a singular system; this causes a DDoS to occur
Used as a 'botnet' (a number of Internet-connected devices, each
of which is running one or more bots to do any purpose needed)
Data Interception and Theft
The unauthorised act of stealing and
obtaining confidential information and
compromising privacy in computer systems
Data streams and packets that travel can be intercepted into in order to obtain
plain text passwords, configuration information or the data itself
Data can also be intercepted physically a.k.a.
stealing a hard drive or other external
hardware
SQL Injection
A code injection technique used to attack data-driven applications and access databases
Insecure code in the database programs can be 'injected' (changed) with new
coding that could do harmful things when executed by the server
If successful in gaining access to the database, they can alter, expose or
delete data at will; they can also impersonate specific users of the database
SQL - Programming language
Database using SQL is needed
Threats Posed to Networks
People as a 'weak point'
Not installing OS (Operating System) updates &
keeping anti-malware software up-to-date
Not locking doors to computer rooms
Leaving printouts on desk
Writing down passwords and sharing them out in the open
Losing memory stick/laptops
Not applying security to wireless networks or encrypting data
Poor Network Policy
Well managed networks will have
procedures in place to be more secure
What well-managed networks should have
A Data Protection Act
Acceptable Use
Agreements
Permissions set to access
servers, files, systems and
databases
Network managers who understand, identify
and actively protect against invulnerabilities
Files are deleted, become corrupt or encrypted, Computers crash, refresh
spontaneously and slow down, Internet connections become slow
Accessing the victim's account to withdraw money or purchase items, Opens bank accounts, credit cars and illegitimate cheques, Can
gain access to corporate data, Finacial services can blacklist the company, resulting in damage to brand reputation
Theft of data, Access to corporate systems
Loos of access to a server of customers, Lost revenue, Lower productivity, Damage to reputation
Usernames and passwords compromised, allowing unauthorised access to systems, Disclosure of corporate data
Contents of databases can be outputed, revealing private data, Data in the database can be
amended or deleted,, New rogue records can be added into the database
AUP (Acceptable Use Policy) is a common policy which outlines rules for network access
Identifying and Preventing
Vulnerabilities
Anti-Malware Software - Prevents malware from entering the system
Encryption - Where data is translated into code so mthat only authorised users, or users
with the key can decrypt it; users must need the key inn order to decrypt the coded file
Network lockout policy: Locks account after 3 attempts, Using progressive delays, Staff Training (using effective
passwords with numbers and symbols etc.), Using challenger response e.g. I am not a bot and reCAPTCHA
Firewall - Performs a barrier between a attacker and the computer system; has the
ability to block access from certain computer users and diable processes etc.
Network Forensics - Examines data sent across a network via 'packet sniffing' (involves
intercepting packets being sent around a network, allowing to see what is being sent at all times
Penetration Testing - Person checks current vulnerabilities and potential ones
in order to avoid weaknesses which can be exploited by malicious people
Network Policies - Certain rules to secure computer systems
User Access Levels/System Access Rights - Selects a hierarchy of users: lower
level users have limited information, higher level users have more sensitive data
Biometric Security - Alternates
to password e.g. Retina Scan,
Fingerprint, Voice, Facial
Recognition