Technical notes module 2
Technical notes module 2
Technical notes
Phishing Attacks
Phishing is a type of cyberattack where attackers use fake digital
communication, like emails, messages, or calls, to trick people into revealing
sensitive information or installing malicious software.
Types of Phishing Attacks:
1. Business Email Compromise (BEC):
Attackers send fake emails pretending to be from trusted sources like a
boss or a company, asking for financial information or money transfers.
Example: An email that looks like it's from your manager asking you to
transfer funds.
2. Spear Phishing:
A targeted attack on a specific person or group where the attacker uses
personal details to make the email look trustworthy.
Example: An email saying, "Hey [Your Name], here’s the file you asked
for," with a malicious attachment.
3. Whaling:
A type of spear phishing where high-profile individuals like CEOs or
executives are targeted.
Example: An email to a CEO asking to confirm sensitive financial details.
4. Vishing (Voice Phishing):
Attackers use phone calls to trick victims into revealing sensitive
information.
Example: A fake bank call asking for your card details.
5. Smishing (SMS Phishing):
Attackers send text messages with malicious links or requests for
sensitive details.
Example: "Your account is locked. Click here to verify your credentials."
Malware
Malware, short for malicious software, is any software designed to harm,
exploit, or disrupt devices, networks, or systems. It can steal data, slow down
devices, or even take control of systems.
Types of Malware:
1. Viruses:
Malicious code that attaches itself to files or programs and spreads when
the file is opened. A virus needs human action to activate.
Example: Downloading a fake attachment that corrupts your files.
2. Worms:
Malware that spreads on its own without user interaction. Worms move
across devices in the same network and replicate themselves.
Example: A worm infecting all devices in an office network.
3. Ransomware:
Locks or encrypts your data and demands a ransom to restore access.
Attackers aim to make money, not harm the data.
Example: An attack where your files are encrypted, and a payment is
demanded for decryption.
4. Spyware:
Secretly tracks your activities to collect sensitive data like passwords,
browsing history, or location.
Example: A program monitoring your keystrokes to steal login
credentials.
5. Trojan Horses:
Disguises itself as legitimate software but performs malicious activities
once installed.
Example: A fake antivirus program that steals your data.
o When an infected floppy disk was inserted, the virus activated and
spread to other floppies.
o It displayed a message with the brothers’ contact info, claiming
they wanted to prevent piracy.
Impact: It slowed down systems but wasn’t highly destructive
The next four security domains are critical in ensuring the protection of an
organization’s data and operations. Here’s a breakdown of each domain:
1. Identity and Access Management (IAM):
o Focuses on authenticating users and managing their access to
physical and logical assets (e.g., networks, applications).
o Ensures only authorized individuals have access to sensitive data
and systems.
o Example: As a security analyst, you might be tasked with setting up
keycard access for employees to ensure they can only access the
areas they are authorized for.
2. Security Assessment and Testing:
o Involves testing security controls and regularly auditing systems
to find risks and vulnerabilities.
o Analysts conduct security audits and assess user permissions to
ensure there is no unauthorized access.
o Example: An analyst might audit access to payroll information to
ensure only authorized personnel can view it.
3. Security Operations:
o Focuses on incident response and investigation when a
potential threat is detected.
o Security analysts monitor for attacks, investigate suspicious
activity, and ensure preventive measures are in place.
o Example: If an unknown device is connected to the company
network, the security analyst would investigate and stop the
potential threat.
4. Software Development Security:
o Ensures secure coding practices are used during the
development of software and applications.
o Analysts collaborate with software teams to incorporate security
measures during the software development life cycle.
o Example: When a new mobile app is being developed, a security
analyst might advise on password policies or ensure that user
data is securely managed.