Info - Sec 2
Info - Sec 2
What is Malware?
Answer:
Malware, short for "malicious software," refers to any software intentionally designed to cause
damage to a computer, server, network, or device, or to gain unauthorized access to systems, steal
data, or disrupt operations. Malware comes in various forms and can execute a wide range of
harmful activities.
How do malware infections happen?
Malware infections can occur through various methods and vectors. Here are some common ways
through which malware can infiltrate systems:
o Phishing Attacks: Cybercriminals use deceptive emails, messages, or websites to trick
users into clicking on malicious links or downloading infected attachments. These phishing
attempts often appear legitimate and can lead to malware infections when users
unknowingly interact with them.
o Drive-by Downloads: Visiting compromised or malicious websites can lead to automatic
downloads and installations of malware without the user's knowledge or consent. These
drive-by downloads exploit vulnerabilities in browsers or plugins to initiate the malware
installation process.
o Infected External Devices: Malware can spread through infected USB drives, external
hard disks, or other removable media. When users connect these devices to their systems,
the malware may execute and infect the host system.
o Software Vulnerabilities: Exploiting vulnerabilities in software, operating systems, or
applications is another way malware gains access. Cybercriminals develop malware to
exploit known weaknesses in software that have not been patched or updated, allowing
them to infiltrate systems.
o Social Engineering: Cybercriminals manipulate individuals through social engineering
tactics to install malware. This can include fake tech support calls, misleading messages
claiming system infections, or enticing users to download seemingly harmless software
that contains malware.
o Malvertising: Malicious advertisements, known as malvertising, can infect systems when
users click on or interact with these ads. They may redirect users to malicious websites or
initiate downloads of malware onto the user's device.
o Exploiting Weak Passwords: Cybercriminals can gain access to systems by exploiting
weak, default, or easily guessable passwords. Once inside, they may install malware or
conduct further attacks.
o Software Bundling: Some legitimate software may come bundled with additional,
unwanted programs or malware. Users might unknowingly install malware while installing
the desired software.
What does malware do?
Malware, or malicious software, can execute a wide range of harmful activities on infected
systems. The specific actions taken by malware depend on its type, design, and the intentions of
the cybercriminals who created it. Here are some common actions that malware can perform:
o Data Theft: Malware may be designed to steal sensitive information, such as personal
data, financial details, login credentials, intellectual property, or other valuable data stored
on the infected system. This stolen data can be used for identity theft, sold on the black
market, or exploited for various malicious purposes.
o Ransomware Encryption: Ransomware encrypts files on the infected system, rendering
them inaccessible to the user. Cybercriminals demand a ransom payment in exchange for
providing the decryption key, allowing victims to regain access to their files.
o System Disruption or Damage: Some malware can cause significant disruption or
damage to the infected system. This may involve deleting files, corrupting data, modifying
system settings, or making the system inoperable, leading to downtime and financial losses.
o Botnet Creation: Malware can turn infected devices into part of a botnet—a network of
compromised computers under the control of cybercriminals. These botnets can be used
for various malicious activities, such as launching DDoS (Distributed Denial of Service)
attacks, sending spam emails, or mining cryptocurrencies.
o Remote Access and Control: Certain types of malware, like remote access Trojans
(RATs), provide cybercriminals with unauthorized access to infected systems. This allows
them to remotely control the system, monitor user activity, steal information, or perform
additional malicious actions.
o Spying and Surveillance: Spyware and surveillance-oriented malware can monitor user
activities, capture keystrokes, record audio or video, take screenshots, and gather sensitive
information without the user's knowledge or consent.
o Propagation and Self-Replication: Some malware types, like viruses and worms, are
designed to replicate and spread across networks or to other devices. They exploit
vulnerabilities to infect additional systems and continue their malicious activities.
o Adware and Unwanted Pop-ups: Adware displays unwanted advertisements, pop-ups, or
redirects the user's browser to malicious websites, disrupting the user experience and
potentially leading to further malware installations.
1. Viruses:
Viruses attach themselves to legitimate programs and replicate when the infected program runs.
They can corrupt or delete files, steal data, or render a system inoperable.
2. Worms:
Worms are standalone malware that replicate themselves to spread across networks, exploiting
vulnerabilities to infect other devices. They can consume network bandwidth and cause systems
to slow down or crash.
3. Trojans:
Trojans disguise themselves as legitimate software but contain malicious code. They often create
backdoors for hackers, steal sensitive information, or provide remote access to the compromised
system.
4. Ransomware:
Ransomware encrypts files or locks users out of their systems, demanding a ransom for the
decryption key. It can severely disrupt operations and cause financial losses.
5. Spyware:
Spyware secretly gathers sensitive information like passwords, browsing habits, or personal data
and sends it to third parties without the user's consent.
6. Adware:
Adware displays unwanted advertisements and pop-ups, often disrupting user experience and
sometimes leading to further malware installations.
7. Logic Bombs
A logic bomb is a malicious program that uses a trigger to activate the malicious code. The logic
bomb remains non-functioning until that trigger event happens. Once triggered, a logic bomb
implements a malicious code that causes harm to a computer.
8. Rootkits
A rootkit modifies the OS to make a backdoor. Attackers then use the backdoor to access the
computer distantly. Most rootkits take advantage of software vulnerabilities to modify system files.
9. Backdoors
A backdoor bypasses the usual authentication used to access a system. The purpose of the backdoor
is to grant cyber criminals future access to the system even if the organization fixes the original
vulnerability used to attack the system.
How to protect Malware?
To protect against malware, individuals and organizations employ various cybersecurity measures:
Antivirus/Anti-malware Software: These programs detect and remove known malware,
often using signature-based detection methods.
Firewalls: Firewalls monitor and control incoming and outgoing network traffic, blocking
suspicious activity and unauthorized access.
Regular Updates and Patches: Keeping software, operating systems, and security
systems up-to-date helps protect against known vulnerabilities.
User Education and Awareness: Training users to identify phishing attempts, avoid
suspicious links, and practice good cybersecurity habits is crucial in preventing malware
infections.
Backup Systems: Regularly backing up data ensures that if infected by ransomware or
other malware, data can be restored without paying the ransom.
Question # 2
What is Firewalls?
Answer:
A firewall is a network security device or software that monitors and controls incoming and
outgoing network traffic based on predetermined security rules. Its primary function is to establish
a barrier between a trusted internal network and an untrusted external network (such as the internet)
to prevent unauthorized access while allowing legitimate data to pass through.
o Packet Inspection: When data packets travel across a network, the firewall examines them
based on predefined rules. These rules specify criteria such as source and destination IP
addresses, ports, protocols, and other attributes.
o Traffic Filtering: Based on the inspection, the firewall makes decisions about whether to
allow or block each packet. For example, if a packet matches an established rule that
permits its passage, the firewall allows it to continue its journey through the network.
Conversely, if it matches a rule that blocks it, the firewall prevents it from reaching its
destination.
o Stateful Inspection: Stateful inspection firewalls keep track of the state of active
connections. They maintain information about established connections, which allows them
to distinguish between legitimate incoming packets and potentially malicious ones. This
helps in preventing certain types of attacks, such as unauthorized access attempts or packet
manipulation.
o Proxying and Network Address Translation (NAT): Some firewalls act as proxies,
intercepting and inspecting traffic before allowing it to pass through. They may also
perform Network Address Translation (NAT), changing the source or destination IP
addresses of packets as they traverse between internal and external networks for security
and privacy reasons.
o Application Awareness (in Next-Generation Firewalls): Next-Generation Firewalls
(NGFW) can identify specific applications within network traffic. This allows for more
granular control over which applications are permitted or blocked, providing enhanced
security against threats that might use legitimate applications to infiltrate a network.
o Logging and Reporting: Firewalls often keep logs of network traffic and security events.
These logs are valuable for monitoring network activity, analyzing potential security
breaches, and generating reports for auditing and compliance purposes.
Functions of Firewall
As stated above, the firewall works as a gatekeeper. It analyzes every attempt coming to gain
access to our operating system and prevents traffic from unwanted or non-recognized sources.
Since the firewall acts as a barrier or filter between the computer system and other networks (i.e.,
the public Internet), we can consider it as a traffic controller. Therefore, a firewall's primary
function is to secure our network and information by controlling network traffic, preventing
unwanted incoming network traffic, and validating access by assessing network traffic for
malicious things such as hackers and malware.
Firewalls have become so powerful, and include a variety of functions and capabilities with built-
in features:
o Network Threat Prevention
o Application and Identity-Based Control
o Hybrid Cloud Support
o Scalable Performance
o Network Traffic Management and Control
o Access Validation
o Record and Report on Events
Types of Firewalls:
There are several types of firewalls, each with its own method of filtering network traffic:
1. Packet Filtering Firewall:
This type of firewall examines packets of data as they travel through the network. It enforces access
control rules based on parameters like source and destination IP addresses, ports, and protocols. It
either blocks or allows packets based on these predefined rules.
2. Stateful Inspection Firewall:
This type of firewall keeps track of the state of active connections and uses this information to
determine whether to allow or deny traffic. It not only examines individual packets but also the
context of the traffic flow. This makes it more effective than packet filtering firewalls in detecting
and preventing certain types of attacks.
3. Proxy Firewall:
A proxy firewall acts as an intermediary between a local network and the internet. It intercepts all
incoming and outgoing traffic and acts on behalf of the client to establish connections. It inspects
the data before forwarding it, providing an additional layer of security by hiding the internal
network's IP addresses.
4. Next-Generation Firewall (NGFW):
NGFW integrates traditional firewall functionalities with additional features such as intrusion
prevention, application awareness, and deep packet inspection. It can identify applications and
users, allowing for more granular control and better protection against advanced threats.
Firewalls are an essential part of a comprehensive cybersecurity strategy, providing a crucial layer
of defense against various threats, including unauthorized access, malware, viruses, and other
cyber attacks. However, they are not a standalone solution and should be combined with other
security measures like antivirus software, intrusion detection systems, regular updates, and user
training to create a robust security posture.
Question # 3
What is Intrusion Detection?
Answer:
Intrusion Detection refers to the process of monitoring a network or system for malicious
activities or policy violations and identifying unauthorized access, misuse, or anomalies that could
compromise the confidentiality, integrity, or availability of data or resources.
It is software that checks a network or system for malicious activities or policy violations. Each
illegal activity or violation is often recorded either centrally using a SIEM system or notified to an
administration. IDS monitors a network or system for malicious activity and protects a computer
network from unauthorized access from users, including perhaps insiders. The intrusion detector
learning task is to build a predictive model (i.e. a classifier) capable of distinguishing between ‘bad
connections’ (intrusion/attacks) and ‘good (normal) connections’.
How does an IDS work?
An Intrusion Detection System (IDS) works by monitoring and analyzing network traffic or system
activities to detect signs of potential security threats or unauthorized access. The primary goal is
to identify anomalies, suspicious patterns, or known attack signatures that could indicate a security
breach.
o An IDS (Intrusion Detection System) monitors the traffic on a computer network to detect
any suspicious activity.
o It analyzes the data flowing through the network to look for patterns and signs of abnormal
behavior.
o The IDS compares the network activity to a set of predefined rules and patterns to identify
any activity that might indicate an attack or intrusion.
o If the IDS detects something that matches one of these rules or patterns, it sends an alert to
the system administrator.
o The system administrator can then investigate the alert and take action to prevent any
damage or further intrusion.