Introduction To Cyber Security
Introduction To Cyber Security
Trainer’s Manual
—
Deepika Sharma
Module Contents
Age of Information
Fundamental Concepts
Threats
Any potential object/person/entity that possess any danger to an
asset is called a threat. Here the point to note is that threats are only
potential circumstances that have not happened yet. If we address
them timely then the risks can be minimized.
Categories of threats –
1. Unstructured Threats – They are random threats that are
mostly not planned and the hacker has no intent of causing
harm. They are mostly for testing the security of systems/
networks/ policies. You can easily find automated scripts or
codes for these on internet. No expertise is needed for running
them.
2. Structured Threats – They are organized and pre planned
threats. Usually, the attacker hit on a specific target because
they know the weaknesses of the system. Attackers have the
technical competence to carry out the exploitation of these
weaknesses.
3. External Threats – Here the intruders are not a part of the
organization they are attacking. They are outsiders and have no
proper authorization to use the systems or the network.
4. Internal Threats - This is the most common type of threat
reported in cyber space. These threats come from persons who
work with the company. They have all the authorization and
access to the assets of the company.
Some of the weak points that can become a threat in future are:
Attacks
When a threat converts to real life actions that are taken to cause
actual damage to the user, it is called an attack. It is an attempt to get
access to any resource or services illegally.
1. Active Attacks: These attacks are an attempt to modify the data
or create false data. It can be subdivided into four categories:
a. Masquerade – when the intruder pretends to be someone
with authentic credentials and is impersonating the entity.
Here the attacker seems like genuine authority asking for
username, password, OTP etc.
b. Modification – here original message from genuine entity is
tampered or reproduced to gain access to the resource.
Example of such attack is Man-in-the-middle.
c. Replay – previously sent message is copied and transmitted
again to the user. User enters all his sensitive information
again thinking that first time failed transaction failed.
d. Denial of Service (DoS) – the attacker focuses on destroying
all communications on the network or any service. This
attack can be targeted to one particular destination or it can
target full network to degrade the performance.
2. Passive Attacks: Here the main goal of attacker is to just listen
to all the chatter and get private information being transmitted.
They do not attempt to create or modify the data being sent. It
is further divided into two categories:
a. Release of message – all that any attacker does is to just
eavesdrop on the conversations like e-mails, text messages,
file transferred etc. to learn the contents of these messages.
b. Traffic Analysis – This attack is done if the communication is
encrypted and attacker cannot see the actual message. The
adversary then observes the metadata like location of source
and destination, size of messages, duration of transmission
etc. to make a good guess about the contents.
Vulnerabilities
The underlying weakness of any system that can be attacked if found