Cyb 211 Lecture 2 Cyber Overview 1
Cyb 211 Lecture 2 Cyber Overview 1
FACULTY OF COMPUTING
DEPARTMENT OF CYBER SECURITY
VULNERABILITY
Vulnerability—A weakness that is inherent in every network and device. E.g. routers, switches,
desktops, servers, and even security devices themselves.
A feature or bug in a system or program which enables an attacker to bypass security measures.
Vulnerabilities are the gaps or weaknesses in a system that make threats possible and tempt threat
actors to exploit them.
■ Security policy vulnerabilities - Examples: nonexistent disaster recovery plan, Lack of written
security policy, etc
Threats—the people eager, willing, and qualified to take advantage of each security weakness,
and they continually search for new exploits and weaknesses.
A cyber security threat refers to any potential danger or malicious activity that can exploit
vulnerabilities in computer systems, networks, or data.
An event, the occurrence of which could have an undesirable impact on the well-being of an
asset. (ISC)2 International Information Systems Security Certification Consortium
Any circumstances or event that has the potential to cause harm to a system or network.
These may include things like vulnerabilities in software, malware, or social engineering tactics
used by attackers. Threats do not necessarily result in actual harm but instead represent possible
dangers that should be monitored and addressed to prevent future attacks.
THREAT AGENTS
CYBER - ATTACKS
Threats are potential risks or dangers, while attacks are active attempts to exploit those risks to
cause harm or steal sensitive information.
Different motivations exist for those who attempt a cyber-attack. They are:
Financial -Many attackers are motivated by the potential to make money through cybercrime. This
can include stealing credit card information, extorting victims through ransom ware attacks, or
stealing and selling sensitive data on the dark web.
Social/Political “Hacktivism” - Some attackers are motivated by ideological or political reasons and
aim to use cyber-attacks to promote their cause or disrupt organizations they disagree with.
Espionage - State-sponsored attackers may engage in cyber espionage to gain access to sensitive
information, intellectual property, or government secrets. Nation-states may also launch cyber-
attacks for political reasons or to disrupt adversaries.
Revenge - Disgruntled employees or former employees are those that typically commit the lion’s
share of revenge-based cyber-attacks. The news is replete with stories of disgruntled former
employees attacking their former employees.
Disruption and Sabotage: Some attackers aim to disrupt operations, cause damage, or sabotage
critical infrastructure. This can include launching destructive malware or conducting denial-of-
service attacks to interrupt services.
Competitive Advantage/Stealing Trade Secrets: Business rivals might engage in cyber espionage
or attacks to gain a competitive edge, such as stealing proprietary information or disrupting a
competitor's operations.
CYBERSECURITY ATTACKS
1. Malware.
Types of malware
Trojan virus — is a type of malware that appears to be a legitimate program but contains
malicious code. Trojans are often disguised as useful software, such as games, utilities, or antivirus
programs, and can be downloaded from websites or email attachments. A Trojan can launch
an attack on a system and can establish a backdoor, which attackers can use.
Ransomware — Ransomware is a type of malware that encrypts a victim's files or locks their
device, and then demands a ransom payment in exchange for restoring access.
Worms — A computer worm is a type of malware that replicates itself and spreads to other
computers without the need for human intervention. Unlike viruses, which require a host
INTRODUCTION TO CYBER SECURITY AND STRATEGY CYB 211 Page |3
program to replicate, worms are self-contained and can propagate through networks, email,
or removable media.
Wiper malware — intends to destroy data or systems, by overwriting targeted files or
destroying an entire file system. Wipers are usually intended to send a political message, or
hide hacker activities after data exfiltration.
Spyware — Spyware is a type of malware that is designed to monitor a user's activity, collect
sensitive information, and relay it to a third party without the user's knowledge or consent.
Spyware can be difficult to detect and can compromise the security and privacy of affected
individuals or organizations.
Fileless malware — this type of malware that uses legitimate programs to infect a computer.
It does not rely on files and leaves no footprint, making it challenging to detect and remove.
It operates in a computer's memory instead of the hard drive.
Application or website manipulation — OWASP outlines the top 10 application security
risks, ranging from broken access controls and security misconfiguration through injection
attacks and cryptographic failures. Once the vector is established through service account
acquisition, more malware, credential, or APT attacks are launched.
2. Social Engineering:
Social engineering is the act of using psychological manipulation to deceive people into
performing actions or divulging confidential information. Social engineering attacks can be used
to gain unauthorized access to sensitive data, systems, or physical locations.
Phishing: Sending fake emails or texts that appear to be from a legitimate source in order to trick
the recipient into providing sensitive information or downloading malware. Email phishing, spear
phishing, vishing (voice phishing), smishing (SMS phishing).
Baiting: Offering something for free, such as a free gift or a tempting link, in order to entice the
target into providing sensitive information or downloading malware.
Pretexting: Creating a plausible scenario or story in order to gain a target's trust and convince
them to provide sensitive information or take a specific action.
Tailgating: Following an authorized individual into a secure area without proper authorization,
often by pretending to be a visitor or delivery person.
Dumpster diving: Searching through a target's trash for sensitive information, such as discarded
documents or passwords.
Volume-based attacks: Flood the target with large amounts of traffic, such as UDP or ICMP
packets.
Protocol attacks: Overwhelm the target's resources by exploiting vulnerabilities in protocols such
as TCP or HTTP.
Application-layer attacks: Target specific vulnerabilities in the target's applications or services, such
as a web server or email server.
Multivector attacks: Use a combination of different attack methods to make the attack more
difficult to defend against.
TCP SYN flood attack: attacks flood the target system with connection requests. When the target
system attempts to complete the connection, the attacker’s device does not respond, forcing the
target system to time out. This quickly fills the connection queue, preventing legitimate users from
connecting.
Intercepting and altering communications between two parties without their knowledge. A man-
in-the-middle (MITM) attack is a type of cyberattack where the attacker intercepts and relays
messages between two parties who believe they are communicating directly with each other.
Some common types of MITM attacks include:
Session hijacking: The attacker intercepts a session cookie or other authentication token and uses
it to take over a user's session.
Evil twin attacks: The attacker sets up a fake Wi-Fi access point with a legitimate-sounding name,
tricking users into connecting and revealing their credentials.
DNS spoofing: The attacker modifies DNS records to redirect traffic to a malicious server, allowing
them to intercept and modify traffic.
HTTPS stripping: The attacker intercepts an HTTPS connection and downgrades it to HTTP,
allowing them to intercept and modify the traffic.
Cross-site scripting (XSS) is a type of attack that allows an attacker to inject client-side scripts into
web pages viewed by other users.
XSS attacks occur when an attacker is able to insert malicious code, such as JavaScript, into a web
page or web application, allowing the attacker to steal cookies, hijack sessions, or perform other
malicious actions.
Reflected XSS: The attacker includes the malicious code in a URL or form submission, which is
then reflected back to the victim's browser when they visit the affected page.
Stored XSS: The attacker injects the malicious code into a database or other data store, where it
is then executed when the affected page is viewed by a victim.
DOM-based XSS: The attacker injects the malicious code into the document object model (DOM)
of the web page, rather than the HTML code itself.
6. SQL Injection.
SQL injection is a type of cyber-attack that occurs when an attacker inserts or manipulates
malicious SQL (Structured Query Language) code into input fields or parameters in a web
application's database query. Types of SQL Injection:
Classic/Static SQL Injection: Involves injecting malicious SQL code directly into user input fields.
Blind SQL Injection: Exploits vulnerabilities without directly extracting data. The attacker infers
information based on the application's response.
Time-Based Blind SQL Injection: The attacker introduces delays in the SQL query to gather
information about the database.
Error-Based SQL Injection: The attacker exploits SQL errors generated by the application to extract
information about the database structure.
7. Password attacks.
Password attacks are techniques employed by attackers to gain unauthorized access to systems
or accounts by exploiting weaknesses in password security. Here are some common password
attacks:
1. Brute Force Attack: In a brute force attack, an attacker systematically tries all possible
combinations of passwords until the correct one is found.
INTRODUCTION TO CYBER SECURITY AND STRATEGY CYB 211 Page |6
2. Dictionary Attack: Attackers use a precompiled list of commonly used passwords (dictionary)
to systematically try each one against user accounts.
3. Credential Stuffing: Attackers use previously leaked username and password combinations from
one service to gain unauthorized access to other services where users reuse passwords.
4. Phishing Attacks: Attackers trick individuals into revealing their passwords by posing as a
trustworthy entity, often through deceptive emails, websites, or messages.
Cyber security principles act as a set of instructions that help to safeguard networks and systems
against cyber threats.
They help us to govern and protect the data by detecting and responding to network
vulnerabilities.
The principles of cyber security assists organizations in creating robust frameworks to enforce strict
security of networks and data.
Purpose
These cyber security principles are grouped into four key activities: govern, protect, detect and
respond.
1. Economy of Mechanism
2. Fail-safe defaults
3. Least privilege
4. Open design
5. Separation of Privilege
6. Complete mediation
7. Least Common Mechanism
8. Work factor
9. Psychological acceptability
10. Compromise Recording
11. Principles of defense in depth
Economy of Mechanism
It states that the mechanisms employed for cyber security must be easy to design and implement.
If a security mechanism is complex, its implementation can bring a lot of challenges and at the
same time, is prone to errors.
Example of Economy of Mechanism would be the use of a single sign-on (SSO) system in an
organization. Instead of requiring separate logins for each application (email, project
management, file storage, etc.), an organization implements a single sign-on system. With SSO,
users log in once and are granted access to all approved applications. This streamlined
authentication method reduces the complexity of managing multiple passwords and access points,
which lowers the likelihood of configuration errors, reduces administrative overhead, and
minimizes security vulnerabilities across systems.