Module 5and6
Module 5and6
Virus is a software or computer Worms replicate itself to Trojan Horse rather than replicate
program that connect itself to cause slow down the capture some important information
another software. computer system about a computer system or a
computer network.
Virus replicates itself. Worms are also replicates But Trojan horse does not replicate
itself. itself.
Virus can’t be controlled by remote. Worms can be controlled by Like worms, Trojan horse can also
remote. be controlled by remote.
Spreading rate of viruses are While spreading rate of And spreading rate of Trojan horse
moderate. worms are faster than virus is slow in comparison of both virus
and Trojan horse. and worms.
The main objective of virus to The main objective of worms The main objective of Trojan horse
modify the information. to eat the system resources. to steal the information.
Viruses are executed via Worms are executed via Trojan horse executes through a
executable files. weaknesses in system. program and interprets as utility
software.
Spyware
● This type of malicious software, spies on you, tracks your internet activities. It
helps the hacker in gathering information about the victim’s system, without
the consent of the victim. This spyware’s presence is typically hidden from the
host and it is very difficult to detect.
● For example, some spywares like keyloggers save your keystrokes to a text
file. When you type in the address of something like a banking website and
then type in your username and password, the keylogger captures that
information and sends it back home.
Adware
● Adware is a form of malware that hides on your device and designed to throw
advertisements up on your screen, most often within a web browser.
● Adware is known as as advertising-supported software.
● It shows advertisements for the purpose of generating revenue for its author.
● Adware is programmed to examine which Internet sites, the user visits
frequently and to present and feature related advertisements.
● Not all adware has malicious intent, but it becomes a problem anyway
because it harms computer performance and can be annoying.
Ransomware
● Ransomware is a particularly nasty type of malware that doesn’t destroy your
data but locks it behind strong encryption. Following this, the creators of the
malware demand a ransom from you in order to get your data back.
Wannacry Attack
● The WannaCry ransomware attack was a worldwide cyberattack in May 2017
which targeted computers running the Microsoft Windows operating system
by encrypting data and demanding ransom payments in the Bitcoin
cryptocurrency.
WannaCry
● The WannaCry attack (in 2017) targetted computers running Windows by
encrypting data and demanding ransom
○ “Ransomware” attack
○ NHS and FedEx servers were affected
● WannaCry propagates using a buffer overflow vulnerability in the SMB (Sever
Message Block) protocol
● Once the ransomware infects a system, it tries to contact an obscure server
and proceeds to encrypt the system if the server was not reachable
● Once it infects a system, it searches for other systems on the network and
spreads using the SMB protocol
Incident Response
Event Vs Response
It is important to know the difference between a security event and a security
incident. A security event is an occurrence in the network that might lead to a
security breach. If a security event is confirmed to have resulted in a breach, the
event is termed a security incident. A security incident results in risk or damage
to the resources and assets of an enterprise. Based on the breach detected,
sufficient action has to be taken to limit the damage and prevent the incident from
getting worse.
Event
● Security events are the first step towards identifying a threat or a complete attack.
An enterprise might run into thousands of security events per day. However, not all
security events indicate a cyberattack. Some of the most common sources of
security events that should be analyzed in a network are explained below.
● Security events related to Firewall
○ Spike in incoming or outgoing traffic:
○ Configuration changes to firewall policies:
○ Modification to firewall settings:
● Security events to Critical Servers (file servers, web servers, and domain
controllers)
○ User logins.
○ User permission changes to access the servers.
○ Changes to system settings.
○ Changes to security configurations.
Event vs Incident
A security incident is a security event that damages network resources or data as part
of an attack or security threat. An incident doesn’t always cause direct damage, but it
still puts the enterprise's security at risk. For example, a user clicking on a link in a
spam email is a security incident. This incident doesn't directly cause any damage, but it
could install malware that causes a ransomware attack.
Some of the security incidents that you should be monitoring in your network include:
○ Traffic from known malicious IP addresses:
○ Suspicious malware installations on endpoints:
○ Unauthorized changes to configurations of critical devices:
○ Malware infection through removable media:
○ Data manipulation in databases:
Incident Response