Cybear Attack For Job
Cybear Attack For Job
professionals
Transferable skills
Skills from other areas that can apply to different careers.
Technical skills
Skills that require knowledge of specific tools, procedures, and policies.
INTERNAL
to different careers. Technical skills may apply to several professions, as well; however, they
typically require knowledge of specific tools, procedures, and policies. In this reading, you’ll explore
both transferable skills and technical skills further.
Transferable skills
You have probably developed many transferable skills through life experiences; some of those skills
will help you thrive as a cybersecurity professional. These include:
Technical skills
There are many technical skills that will help you be successful in the cybersecurity field. You’ll learn
and practice these skills as you progress through the certificate program. Some of the tools and
concepts you’ll need to use and be able to understand include:
INTERNAL
might use an IDS to monitor networks for signs of malicious activity, like unauthorized access
to a network.
Threat landscape knowledge: Being aware of current trends related to threat actors,
malware, or threat methodologies is vital. This knowledge allows security teams to build
stronger defenses against threat actor tactics and techniques. By staying up to date on
attack trends and patterns, security professionals are better able to recognize when new
types of threats emerge such as a new ransomware variant.
Incident response: Cybersecurity analysts need to be able to follow established policies
and procedures to respond to incidents appropriately. For example, a security analyst might
receive an alert about a possible malware attack, then follow the organization’s outlined
procedures to start the incident response process. This could involve conducting an
investigation to identify the root issue and establishing ways to remediate it.
CompTIA Security+
In addition to gaining skills that will help you succeed as a cybersecurity professional, the Google
Cybersecurity Certificate helps prepare you for the CompTIA Security+ exam, the industry leading
certification for cybersecurity roles. You’ll earn a dual credential when you complete both, which can
be shared with potential employers. After completing all eight courses in the Google Cybersecurity
Certificate, you will unlock a 30% discount for the CompTIA Security+ exam and additional practice
materials.
Key takeaways
Understanding the benefits of core transferable and technical skills can help prepare you to
successfully enter the cybersecurity workforce. Throughout this program, you’ll have multiple
opportunities to develop these and other key cybersecurity analyst skills.
The importance of
cybersecurity
Personally Identifiable
Information (PII)
Any information used to infer an individual’s identity
Sensitive Personally
Identifiable Information (SPII)
A Specific type of PII that falls under stricter handling guidelines
INTERNAL
The value of cybersecurity
Now that you’ve learned about what cybersecurity is and how cybersecurity professionals protect
people and organizations, it’s time to consider your own role in cybersecurity. Imagine that it’s your
first day as a cybersecurity professional, and consider the following:
Please write one to two paragraphs (100-200 words) outlining your responses to the prompts. Then,
visit the discussion forums to read what other learners have written, and respond to at least two
other posts with your own thoughts.
Participation is optional
Cybersecurity (or security): The practice of ensuring confidentiality, integrity, and availability of
information by protecting networks, devices, people, and data from unauthorized access or criminal
exploitation
Cloud security: The process of ensuring that assets stored in the cloud are properly configured and
access to those assets is limited to authorized users
Internal threat: A current or former employee, external vendor, or trusted partner who poses a
security risk
Network security: The practice of keeping an organization's network infrastructure secure from
unauthorized access
Personally identifiable information (PII): Any information used to infer an individual’s identity
Security posture: An organization’s ability to manage its defense of critical assets and data and
react to change
Sensitive personally identifiable information (SPII): A specific type of PII that falls under stricter
handling guidelines
Technical skills: Skills that require knowledge of specific tools, procedures, and policies
Threat: Any circumstance or event that can negatively impact assets
Threat actor: Any person or group who presents a security risk
Transferable skills: Skills from other areas that can apply to different careers
INTERNAL
Welcome to module 2
What you’ll learn
Viruses
Malware
Social engineering
Digital age
To better understand attacks in the digital age, we'll discuss two notable attacks that relied on the
internet: the LoveLetter attack and the Equifax breach.
Phishing
The use of digital communications to trick people into revealing sensitive
data or deploring malicious software.
INTERNAL
outcome was the establishment of response teams, which are now commonly referred to as
computer security incident response teams (CSIRTs). In this reading, you will learn more about
common methods of attack. Becoming familiar with different attack methods, and the evolving tactics
and techniques threat actors use, will help you better protect organizations and people.
Phishing
Phishing is the use of digital communications to trick people into revealing sensitive data or
deploying malicious software.
Some of the most common types of phishing attacks today include:
Business Email Compromise (BEC): A threat actor sends an email message that seems to
be from a known source to make a seemingly legitimate request for information, in order to
obtain a financial advantage.
Spear phishing: A malicious email attack that targets a specific user or group of users. The
email seems to originate from a trusted source.
Whaling: A form of spear phishing. Threat actors target company executives to gain access
to sensitive data.
Vishing: The exploitation of electronic voice communication to obtain sensitive information
or to impersonate a known source.
Smishing: The use of text messages to trick users, in order to obtain sensitive information or
to impersonate a known source.
Malware
Malware is software designed to harm devices or networks. There are many types of malware. The
primary purpose of malware is to obtain money, or in some cases, an intelligence advantage that
can be used against a person, an organization, or a territory.
Some of the most common types of malware attacks today include:
Viruses: Malicious code written to interfere with computer operations and cause damage to
data and software. A virus needs to be initiated by a user (i.e., a threat actor), who transmits
the virus via a malicious attachment or file download. When someone opens the malicious
attachment or download, the virus hides itself in other files in the now infected system. When
the infected files are opened, it allows the virus to insert its own code to damage and/or
destroy data in the system.
Worms: Malware that can duplicate and spread itself across systems on its own. In contrast
to a virus, a worm does not need to be downloaded by a user. Instead, it self-replicates and
spreads from an already infected computer to other devices on the same network.
Ransomware: A malicious attack where threat actors encrypt an organization's data and
demand payment to restore access.
Spyware: Malware that’s used to gather and sell information without consent. Spyware can
be used to access devices. This allows threat actors to collect personal data, such as private
emails, texts, voice and image recordings, and locations.
Social Engineering
Social engineering is a manipulation technique that exploits human error to gain private
information, access, or valuables. Human error is usually a result of trusting someone without
INTERNAL
question. It’s the mission of a threat actor, acting as a social engineer, to create an environment of
false trust and lies to exploit as many people as possible.
Some of the most common types of social engineering attacks today include:
Social media phishing: A threat actor collects detailed information about their target from
social media sites. Then, they initiate an attack.
Watering hole attack: A threat actor attacks a website frequently visited by a specific group
of users.
USB baiting: A threat actor strategically leaves a malware USB stick for an employee to find
and install, to unknowingly infect a network.
Physical social engineering: A threat actor impersonates an employee, customer, or
vendor to obtain unauthorized access to a physical location.
Social engineering is incredibly effective. This is because people are generally trusting and
conditioned to respect authority. The number of social engineering attacks is increasing with every
new social media application that allows public access to people's data. Although sharing personal
data—such as your location or photos—can be convenient, it’s also a risk.
Reasons why social engineering attacks are effective include:
Authority: Threat actors impersonate individuals with power. This is because people, in
general, have been conditioned to respect and follow authority figures.
Intimidation: Threat actors use bullying tactics. This includes persuading and intimidating
victims into doing what they’re told.
Consensus/Social proof: Because people sometimes do things that they believe many
others are doing, threat actors use others’ trust to pretend they are legitimate. For example,
a threat actor might try to gain access to private data by telling an employee that other
people at the company have given them access to that data in the past.
Scarcity: A tactic used to imply that goods or services are in limited supply.
Familiarity: Threat actors establish a fake emotional connection with users that can be
exploited.
Trust: Threat actors establish an emotional relationship with users that can be exploited
over time. They use this relationship to develop trust and gain personal information.
Urgency: A threat actor persuades others to respond quickly and without questioning.
Key takeaways
In this reading, you learned about some common attacks and their impacts. You also learned about
social engineering and why it’s so successful. While this is only a brief introduction to attack types,
you will have many opportunities throughout the program to further develop your understanding of
how to identify and defend against cybersecurity attacks.
INTERNAL
Identify: Methods of attack
Review various methods of attack
On each flashcard, review a common type of attack. Guess the definition,
then, select Flip to find out if you’re right. Be sure to review all 15 cards.
Malware
Definition
A software designed to harm devices or networks
Virus
Definition
A malware program that modifies other computer programs by inserting its
own code to damage and/or destroy data
Worm
INTERNAL
Definition
Malware that self-replicates, spreading across the network and infecting
computers
Ransomware
Definition
A malicious attack during which threat actors encrypt an organization's data
and demand payment to restore access
Definition
Malicious software installed on a user’s computer without their permission,
which is used to spy on and steal user data
INTERNAL
Example of: Malware
Definition
The use of digital communications to trick people into revealing sensitive
data or deploying malicious software
Definition
A malicious email attack targeting a specific user or group of users that
appears to originate from a trusted source
INTERNAL
Whaling
Definition
A form of spear phishing during which threat actors target executives in
order to gain access to sensitive data
Definition
An attack in which a threat actor impersonates a known source to obtain a
financial advantage
INTERNAL
Vishing
Definition
The exploitation of electronic voice communication to obtain sensitive
information or to impersonate a known source
Social engineering
Definition
A manipulation technique that exploits human error to gain unauthorized
access to sensitive, private, and/or valuable data
INTERNAL
Social media phishing
Definition
An attack in which a threat actor collects detailed information about their
target on social media sites before initiating an attack
Definition
An attack in which a threat actor compromises a website frequently visited
by a specific group of users
Definition
An attack in which a threat actor impersonates an employee, customer, or
vendor to obtain unauthorized access to a physical location
USB baiting
Definition
An attack in which a threat actor strategically leaves a malware USB stick for
an employee to find and unknowingly infect a network
INTERNAL
Example of: Social engineering
security and risk management. Security and risk management focuses on defining security
goals and objectives, risk mitigation, compliance, business continuity, and the law. For
example, security analysts may need to update company policies related to private health
information if a change is made to a federal compliance regulation such as the Health Insurance
Portability and Accountability Act, also known as HIPAA.
Play video starting at :1:57 and follow transcript1:57
The second domain is asset security. This domain focuses on securing digital and physical
assets. It's also related to the storage, maintenance, retention, and destruction of data. When
working with this domain, security analysts may be tasked with making sure that old equipment is
properly disposed of and destroyed, including any type of confidential information.
Play video starting at :2:25 and follow transcript2:25
The third domain is security architecture and engineering. This domain focuses on optimizing
data security by ensuring effective tools, systems, and processes are in place. As a security
analyst, you may be tasked with configuring a firewall. A firewall is a device used to monitor and filter
incoming and outgoing computer network traffic. Setting up a firewall correctly helps prevent attacks
that could affect productivity.
Play video starting at :2:57 and follow transcript2:57
The fourth security domain is communication and network security. This domain focuses on
managing and securing physical networks and wireless communications. As a security
analyst, you may be asked to analyze user behavior within your organization.
Play video starting at :3:15 and follow transcript3:15
INTERNAL
Imagine discovering that users are connecting to unsecured wireless hotspots. This could leave the
organization and its employees vulnerable to attacks. To ensure communications are secure, you
would create a network policy to prevent and mitigate exposure.
Play video starting at :3:34 and follow transcript3:34
Maintaining an organization's security is a team effort, and there are many moving parts. As an
entry-level analyst, you will continue to develop your skills by learning how to mitigate risks to keep
people and data safe.
Familiarizing yourself with these domains will allow you to navigate the complex world of security.
The domains outline and organize how a team of security professionals work together. Depending
on the organization, analyst roles may sit at the intersection of multiple domains or focus on one
specific domain. Knowing where a particular role fits within the security landscape will help you
prepare for job interviews and work as part of a full security team.
Play video starting at ::50 and follow transcript0:50
Let's move into the fifth domain: identity and access management. Identity and access
management focuses on keeping data secure, by ensuring users follow established policies
to control and manage physical assets, like office spaces, and logical assets, such as networks
and applications. Validating the identities of employees and documenting access roles are essential
to maintaining the organization's physical and digital security. For example, as a security analyst,
you may be tasked with setting up employees' keycard access to buildings.
Play video starting at :1:27 and follow transcript1:27
The sixth domain is security assessment and testing. This domain focuses on conducting
security control testing, collecting and analyzing data, and conducting security audits to
monitor for risks, threats, and vulnerabilities. Security analysts may conduct regular audits of user
permissions, to make sure that users have the correct level of access. For example, access to
payroll information is often limited to certain employees, so analysts may be asked to regularly audit
permissions to ensure that no unauthorized person can view employee salaries.
Play video starting at :2:6 and follow transcript2:06
The seventh domain is security operations. This domain focuses on conducting investigations
and implementing preventative measures. Imagine that you, as a security analyst, receive an
alert that an unknown device has been connected to your internal network. You would need to follow
the organization's policies and procedures to quickly stop the potential threat.
Play video starting at :2:31 and follow transcript2:31
The final, eighth domain is software development security. This domain focuses on using
secure coding practices, which are a set of recommended guidelines that are used to create
secure applications and services. A security analyst may work with software development teams to
ensure security practices are incorporated into the software development life-cycle. If, for example,
one of your partner teams is creating a new mobile app, then you may be asked to advise on the
password policies or ensure that any user data is properly secured and managed.
Play video starting at :3:9 and follow transcript3:09
That ends our introduction to CISSP's eight security domains. Challenge yourself to better
understand each of these domains and how they affect the overall security of an organization. While
they may still be a bit unclear to you this early in the program, these domains will be discussed in
greater detail in the next course. See you there!
INTERNAL
Determine the type of attack
Previously, you learned about the eight Certified Information Systems Security Professional (CISSP)
security domains. The domains can help you better understand how a security analyst's job duties
can be organized into categories. Additionally, the domains can help establish an understanding of
how to manage risk. In this reading, you will learn about additional methods of attack. You’ll also be
able to recognize the types of risk these attacks present.
Attack types
Password attack
Brute force
Rainbow table
Password attacks fall under the communication and network security domain.
Social engineering attack
Social engineering is a manipulation technique that exploits human error to gain private
information, access, or valuables. Some forms of social engineering attacks that you will continue to
learn about throughout the program are:
Phishing
Smishing
Vishing
Spear phishing
Whaling
Social media phishing
Business Email Compromise (BEC)
Watering hole attack
USB (Universal Serial Bus) baiting
Physical social engineering
INTERNAL
Social engineering attacks are related to the security and risk management domain.
Physical attack
A physical attack is a security incident that affects not only digital but also physical environments
where the incident is deployed. Some forms of physical attacks are:
Birthday
Collision
Downgrade
Cryptographic attacks fall under the communication and network security domain.
Key takeaways
The eight CISSP security domains can help an organization and its security team fortify against and
prepare for a data breach. Data breaches range from simple to complex and fall under one or more
domains. Note that the methods of attack discussed are only a few of many. These and other types
of attacks will be discussed throughout the certificate program.
Resources for more information
To view detailed information and definitions of terms covered in this reading, visit the National
Institute of Standards and Technology (NIST) glossary.
Pro tip: If you cannot find a term in the NIST glossary, enter the appropriate search term (e.g.,
“cybersecurity birthday attack”) into your preferred search engine to locate the definition in another
reliable source such as a .edu or .gov site.
INTERNAL
Understand attackers
Previously, you were introduced to the concept of threat actors. As a reminder, a threat actor is any
person or group who presents a security risk. In this reading, you’ll learn about different types of
threat actors. You will also learn about their motivations, intentions, and how they’ve influenced the
security industry.
Threat actor types
Advanced persistent threats (APTs) have significant expertise accessing an organization's network
without authorization. APTs tend to research their targets (e.g., large corporations or government
entities) in advance and can remain undetected for an extended period of time. Their intentions and
motivations can include:
Damaging critical infrastructure, such as the power grid and natural resources
Gaining access to intellectual property, such as trade secrets or patents
Insider threats
Insider threats abuse their authorized access to obtain data that may harm an organization. Their
intentions and motivations can include:
Sabotage
Corruption
Espionage
Unauthorized data access or leaks
Hacktivists
Hacktivists are threat actors that are driven by a political agenda. They abuse digital technology to
accomplish their goals, which may include:
Demonstrations
Propaganda
Social change campaigns
Fame
INTERNAL
Hacker types
A hacker is any person who uses computers to gain access to computer systems, networks, or data.
They can be beginner or advanced technology professionals who use their skills for a variety of
reasons. There are three main categories of hackers:
Authorized hackers are also called ethical hackers. They follow a code of ethics and adhere
to the law to conduct organizational risk evaluations. They are motivated to safeguard people
and organizations from malicious threat actors.
Semi-authorized hackers are considered researchers. They search for vulnerabilities but
don’t take advantage of the vulnerabilities they find.
Unauthorized hackers are also called unethical hackers. They are malicious threat actors
who do not follow or respect the law. Their goal is to collect and sell confidential data for
financial gain.
Note: There are multiple hacker types that fall into one or more of these three categories.
New and unskilled threat actors have various goals, including:
Other types of hackers are not motivated by any particular agenda other than completing the job
they were contracted to do. These types of hackers can be considered unethical or ethical hackers.
They have been known to work on both illegal and legal tasks for pay.
There are also hackers who consider themselves vigilantes. Their main goal is to protect the world
from unethical hackers.
Key takeaways
Threat actors are defined by their malicious intent and hackers are defined by their technical skills
and motivations. Understanding their motivations and intentions will help you be better prepared to
protect your organization and the people it serves from malicious attacks carried out by some of
these individuals and groups.
INTERNAL
Resources for more information
To learn more about how security teams work to keep organizations and people safe, explore the
Hacking Google series of videos.
What we covered
Viruses
Malware
Social engineering
Digital age
Security domains
INTERNAL
Spear phishing: A malicious email attack targeting a specific user or group of users, appearing to
originate from a trusted source
Supply-chain attack: An attack that targets systems, applications, hardware, and/or software to
locate a vulnerability where malware can be deployed
USB baiting: An attack in which a threat actor strategically leaves a malware USB stick for an
employee to find and install to unknowingly infect a network
Virus: refer to “computer virus”
Vishing: The exploitation of electronic voice communication to obtain sensitive information or to
impersonate a known source
Watering hole attack: A type of attack when a threat actor compromises a website frequently
visited by a specific group of users
INTERNAL