Cybersecurity Essentials 3.0-Module01
Cybersecurity Essentials 3.0-Module01
Threats, Vulnerabilities,
and Attacks
Cybersecurity Essentials 3.0
Module Objectives
Module Title: Cybersecurity Threats, Vulnerabilities, and Attacks
Module Objective: Explain how threat actors execute some of the most common types of cyber attacks.
Explain the threats, vulnerabilities, and attacks that occur in the various
Common Threats
domains.
Identify the different deception methods used by attackers to deceive
Deception
their victims.
Cyber Attacks Describe some common types of network attacks.
Wireless and Mobile
Describe common types of wireless and mobile device attacks.
Device Attacks
Application Attacks Describe types of application attacks.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
1.1 Common Threats
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Common Threats
Threat Domains
A ‘threat domain’ is considered an area of control, authority, or protection that attackers can exploit to
gain access to a system.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Common Threats
Types of Cyber Threats
Category Types of Cyber Threats
Software Attacks • A successful denial-of-service (DoS attack).
• A computer virus.
Software Errors • A software bug.
• An application going offline.
• A cross-site script or illegal file server share.
Sabotage • An authorized user compromising an organization’s primary database.
• The defacement of an organization’s website.
Human Error • Inadvertent data entry errors.
• A firewall misconfiguration.
Theft • Laptops or equipment being stolen from an unlocked room.
Hardware Failures • Hard drive crashes
Utility Interruption • Electrical power outages.
• Water damage resulting from sprinkler failure.
Natural Disasters • Severe storms such as hurricanes or tornados.
• Earthquakes.
• Floods.
• Fires. © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Common Threats
Internal vs External Threats
Valuable, sensitive information is personnel records,
intellectual property, and financial data.
Internal threats
• Accidentally or intentionally carried out by current or
former employees and other contract partners.
•Operation of servers or network infrastructure
devices are compromised by connecting infected
media or by accessing malicious emails or websites.
External threats
•It usually comes from amateur or skilled attackers.
•Attacks can exploit vulnerabilities in networked
devices or can use social engineering techniques.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Common Threats
User Threats and Vulnerabilities
A user domain includes anyone accessing an organization’s information system, including employees,
customers, and contract partners. Users are the weakest link in information security systems, posing a
significant threat to the confidentiality, integrity, and availability of an organization’s data.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Common Threats
Threats to Devices
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Common Threats
Threats to the Local Area Network
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Common Threats
Threats to the Private Cloud
The private cloud domain includes any private servers, resources, and IT infrastructure available to
members of a single organization via the Internet.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
Common Threats
Threats to the Public Cloud
The public cloud domain is the entire computing services hosted by a cloud, service, or Internet
provider that are available to the public and shared across organizations.
Three subscription-based models of public cloud services that organizations may choose to use:
• Software as a Service (SaaS): provides organizations with software (stored in the cloud) that is
centrally hosted and accessed by users via a web browser, app, or other software.
• Platform as a Service (PaaS): It allows an organization to develop, run and manage its
applications on the service's hardware using its tools.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Common Threats
Threats to Applications
The application domain includes all the critical systems, applications, and data used by an
organization to support operations.
• Someone gaining unauthorized access to data centers, computer rooms, wiring closets or
systems.
• Server downtime during maintenance periods.
• Network operating system software vulnerabilities.
• Data loss.
• Client-server or web application development vulnerabilities.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Common Threats
Threat Complexity
Software vulnerabilities occur because of programming mistakes, protocol vulnerabilities, or system
misconfigurations.
• Advanced persistent threat (APT): a continuous attack that uses elaborate espionage tactics
involving multiple actors and sophisticated malware.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Common Threats
Backdoors and Rootkits
Cybercriminals also use many different types of malware to carry out their attacks. Some common
types are:
Backdoors
• Cybercriminals use programs to gain unauthorized access to a system by bypassing the standard
authentication procedures.
• A remote administrative tool (RAT) program runs on the user's machine to install a backdoor to
provide administrative control over a target computer.
Rootkits
• Modify the operating system to create a backdoor, which attackers can use to access the
computer remotely.
• Most use software vulnerabilities to access resources that should not be accessible (privilege
escalation) and modify system files.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Common Threats
Threat Intelligence and Research Sources
The United States Computer Emergency Readiness Team (US-CERT) and the U.S. Department of
Homeland Security sponsored a dictionary of common vulnerabilities and exposures (CVE). Some
other threat intelligence sources are:
• The dark web: An encrypted web content that requires specific software, authorization, or
configurations to access, which is not indexed by conventional search engines.
• Indicator of compromise (IOC): IOCs such as malware signatures or domain names provide
evidence of security breaches and details about them.
• Automated Indicator Sharing (AIS): Cybersecurity and Infrastructure Security Agency (CISA)
capability enable the real-time exchange of cybersecurity threat indicators using a standardized
and structured language called STIX and TAXII.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
1.2 Deception
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Deception
Social Engineering
Social engineering is a non-technical strategy that attempts to manipulate individuals into performing
specific actions or divulging confidential information.
• Pretexting: This occurs when an individual lies to gain access to confidential data.
• Something for something (quid pro quo): Involves a request for personal information in exchange
for something, like a gift.
• Identity fraud: Uses a person’s stolen identity to obtain goods or services by deception.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Deception
Social Engineering Tactics
Cybercriminals rely on several social engineering tactics to gain access to sensitive information:
• Authority
• Intimidation
• Consensus
• Scarcity
• Urgency
• Familiarity
• Trust
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Deception
Shoulder Surfing and Dumpster Diving
Shoulder Surfing
• A simple attack involves observing or looking over a target's shoulder to gain valuable information
such as PINs, access codes, or credit card details.
• Criminals do not always have to be near their victim-to-shoulder surf — they can use binoculars or
security cameras to obtain this information.
Dumpster Diving
• The process of going through a target's trash to see discarded information.
• Documents containing sensitive information should be shredded or stored in burn bags until
destroyed by fire after a certain period.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Deception
Impersonation and Hoaxes
Impersonation
• Act of tricking someone into doing something they would not ordinarily do by pretending to be
someone else.
Hoax
• An act intended to deceive or trick someone can cause just as much disruption as an actual
security breach.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Deception
Piggybacking and Tailgating
They occur when a criminal follows an authorized person to gain physical entry into a secure location
or a restricted area.
• Giving the appearance of being escorted into the facility by an authorized person.
• Joining and pretending to be part of a large crowd that enters the facility.
• Targeting an authorized person who is careless about the rules of the facility.
One way of preventing this is to use two sets of doors (mantrap) which means individuals enter
through an outer door and must close before gaining access through an inner door.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
Deception
Other Methods of Deception
Be aware that attackers have many more tricks up their sleeve to deceive their victims.
• Invoice scam
• Watering hole attack
• Typosquatting
• Prepending
• Influence campaigns
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Deception
Defending Against Deception
Organizations must promote awareness of social engineering tactics and adequately educate
employees on prevention measures. Here are some top tips:
• Never disclose confidential information or credentials via email, chat, text messages, in-person, or
phone to unknown parties.
• Resist the urge to click on enticing emails and web links.
• Be wary of uninitiated or automatic downloads.
• Establish and educate employees on key security policies.
• Encourage employees to take ownership of security issues.
• Do not give in to pressure from unknown individuals.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Deception
Lab - Explore Social Engineering Techniques
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
1.3 Cyber Attacks
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Cyber Attacks
What's the Difference?
Virus
• Type of computer program that, when executed, replicates and attaches itself to other files, such
as a legitimate program, by inserting its code into it.
Worms
• It replicates by independently exploiting vulnerabilities in networks.
Trojan horse
• It carries out malicious operations by masking its true intent. It might appear legitimate but is, in
fact, very dangerous.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Cyber Attacks
Logic Bombs
• A malicious program that waits for a trigger, such as a specified date or database entry, to set off
the malicious code. Until this trigger event happens, the logic bomb will remain inactive.
• Once activated, it implements a malicious code that causes harm to a computer in various ways.
It can sabotage database records, erase files and attack operating systems or applications.
• Logic bombs attack and destroy the hardware components in a device or server, including the
cooling fans, CPU, memory, hard drives, and power supplies were recently discovered.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Cyber Attacks
Ransomware
• Designed to hold a computer system or the data it contains captive until completed payment.
• A demanded ransom paid through an untraceable payment system, the cybercriminal provides a
program that decrypts files or sends an unlock code – but many victims do not gain access to
their data even after paying.
• Some versions of ransomware can take advantage of specific system vulnerabilities to lock it
down.
• Spread through phishing emails that encourage downloading malicious attachments or a software
vulnerability.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Cyber Attacks
Denial of Service Attacks
The type of network attack is relatively simple to conduct, even for an unskilled attacker. They usually
result in some interruption to network services, causing a significant loss of time and money.
• The overwhelming quantity of traffic: When a network, host, or application sends an enormous
amount of data at a rate it cannot handle, it causes a slow transmission or response or causes the
device or service to crash.
• Maliciously formatted packets: Sends a maliciously formatted packet, and the receiver will be
unable to handle it.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Cyber Attacks
Domain Name System
• Many essential technical services are needed for a network to operate, such as routing, addressing,
and domain naming. These are prime targets for attack.
• Cybercriminals can take advantage of vulnerabilities in DNS services to launch the following attacks:
Domain reputation The DNS is used by DNS servers to translate a domain name into a numerical
IP address so that computers can understand it. If a DNS server does not know
an IP address, it will ask another DNS server. An organization needs to monitor
its domain reputation, including its IP address, to help protect against malicious
external domains.
DNS spoofing (DNS cache Attack in which false data is introduced into a DNS resolver cache — the
poisoning) temporary database on a computer’s operating system that records recent visits
to websites and other Internet domains. These poison attacks exploit a
weakness in the DNS software that causes the DNS servers to redirect traffic
for a specific domain to the attacker’s computer.
Domain hijacking When an attacker wrongfully gains control of a target’s DNS information, they
can make unauthorized changes to it.
Uniform resource location A unique identifier for finding a specific resource on the Internet. Redirecting a
(URL) URL commonly happens for legitimate purposes.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Cyber Attacks
Layer 2 Attacks
Spoofing
• MAC address spoofing
• ARP spoofing
• IP spoofing
MAC Flooding
• It compromises the data transmitted to a device. An attacker floods the network with fake MAC
addresses, compromising the security of the network switch.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Cyber Attacks
Man-in-the-Middle and Man-in-the-Mobile Attacks
Attackers can intercept or modify communications between two devices to steal information from or
impersonate one of the devices.
MitM (Man-in-the-Middle)
• It happens when a cybercriminal takes control of a device without the user’s knowledge.
• With this level of access, an attacker can intercept, manipulate and relay false information
between the sender and the intended destination.
MitMO (Man-in-the-Mobile)
• A MitMO variation is a type of attack used to take control of a user’s mobile device.
• When infected, the mobile device instructs to exfiltrate user-sensitive information and send it to
the attackers.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Cyber Attacks
Zero-Day Attacks
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Cyber Attacks
Keyboard Logging
• Cybercriminals log keystrokes via software installed on a computer system or through hardware
devices that are physically attached to a computer and configure the keylogger software to send
the log file to the criminal.
• Because it has recorded all keystrokes, this log file can reveal usernames, passwords, websites
visited, and other sensitive information.
• Many anti-spyware suites can detect and remove unauthorized key loggers.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Cyber Attacks
Defending Against Attacks
Organizations can take several steps to defend against various attacks. These include:
• Configure firewalls to remove any packets from outside the network with addresses indicating that
they originated inside the network.
• Network devices use ICMP packets to send error and control messages. Organizations can block
external ICMP packets with their firewalls to prevent DoS and DDoS attacks.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
1.4 Wireless and Mobile
Device Attacks
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Wireless and Mobile Device Attacks
Grayware and Smishing
Grayware
• Any unwanted application that behaves in an annoying or undesirable manner.
• And while grayware may not carry any recognizable malware, it may still pose a risk to the user
by, for example, tracking your location or delivering unwanted advertising.
• Fake text messages prompt you to visit a malicious website or call a fraudulent phone number,
which may result in malware being downloaded onto your device or sharing personal information.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Wireless and Mobile Device Attacks
Rogue Access Points
A rogue access point is a wireless access point installed on a secure network without explicit
authorization.
• An attacker often uses social engineering tactics to gain physical access to an organization’s
network infrastructure and install the rogue access point.
• The access point can be set up as a MitM device to capture your login information.
• An evil twin attack describes a situation where the attacker’s access point is set up to look like a
better connection option. Once you connect to the evil access point, the attacker can analyze your
network traffic and execute MitM attacks.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Wireless and Mobile Device Attacks
Radio Frequency Jamming
• Attackers can take advantage of this fact by deliberately jamming the transmission of a radio or
satellite station to prevent a wireless signal from reaching the receiving station.
• In order to successfully jam the signal, the frequency, modulation, and power of the RF jammer
need to be equal to that of the device that the attacker is seeking to disrupt.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
Wireless and Mobile Device Attacks
Bluejacking and Bluesnarfing
Due to the limited range of Bluetooth, an attacker must be within range of their target.
Some ways that they can exploit a target’s device without their knowledge are:
• Bluesnarfing occurs when an attacker copies information, such as emails and contact lists, from a
target’s device using a Bluetooth connection.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Wireless and Mobile Device Attacks
Attacks Against Wi-Fi Protocols
Wired equivalent privacy (WEP) and Wi-Fi protected access (WPA) are
security protocols designed to secure wireless networks.
• WEP used a key for encryption, but WEP had no provision for key
management giving criminals access to a large amount of traffic data.
• To address this and replace WEP, WPA and then WPA2 was
developed as improved security protocols.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Wireless and Mobile Device Attacks
Wi-Fi and Mobile Defense
There are several steps that organizations and users need to take to defend against wireless and
mobile device attacks:
• Take advantage of basic wireless security features such as authentication and encryption by
changing the default configuration settings.
• Restrict access point placement by placing these devices outside the firewall or within a
demilitarized zone — a perimeter network that protects an organization’s LAN from untrusted
devices.
• Use WLAN tools such as NetStumbler to detect rogue access points or unauthorized
workstations.
• Employees in an organization should use a remote access VPN for WLAN access.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
1.5 Application Attacks
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Application Attacks
Cross-Site Scripting
Cross-site scripting (XSS) is a common vulnerability in many web
applications. This is how it works:
• The victim accesses the web page, and the malicious scripts
unknowingly pass to their browser.
• The malicious script can access any cookies, session tokens, or other
sensitive information about the user, which is sent back to the
cybercriminal.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Application Attacks
Code Injection
• Injection attacks exploit weaknesses in databases such as Structured Query Language (SQL) or
an Extensible Markup Language (XML) that modern websites use to store and manage data.
• A buffer overflow occurs when data is written beyond the limits of a buffer. By changing data
beyond the boundaries of a buffer, the application can access memory allocated to other
processes.
• This can lead to a system crash, data compromise, or provide escalation of privileges.
• These memory flaws can also give attackers complete control over a target’s device.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 57
Application Attacks
Remote Code Executions
• The Metasploit Project is a computer security project that provides information about security
vulnerabilities and aids penetration testing.
• Among the tools, they developed the Metasploit Framework, which can be used to create and
execute exploit code against a remote target.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
Application Attacks
Other Application Attacks
• Every piece of information that an attacker receives about a targeted system or application can be
used as a valuable weapon for launching a dangerous attack.
• Some other types of application attacks are:
Cross-site request forgery (CSRF) It describes the malicious exploit of a website where unauthorized
commands are submitted from a user’s browser to a trusted web
application.
Race condition attack (time of This attack happens when a computing system that is designed to
check – TOC or time of use - handle tasks in a specific sequence is forced to perform two or more
TOU) operations simultaneously.
Improper input handling attack Data inputted by a user that is not properly validated can affect the data
flow of a program and cause critical vulnerabilities in systems and
applications that result in buffer overflow or SQL injection attacks.
Erro handling attack Attackers can use error messages to extract specific information such as
the hostnames of internal systems and directories or files that exist on a
given web server — as well as database, table and field names that can
be used to craft SQL injection attacks.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
59
Application Attacks
Other Application Attacks (Cont.)
Application An API delivers a user response to a system and sends the system’s response
programming interface back to the user. An API attack occurs when a cybercriminal abuses an API
(API) attack endpoint.
Replay attack This describes a situation where a valid data transmission is maliciously or
fraudulently repeated or delayed by an attacker, who intercepts, amends and
resubmits the data to get the receiver to do whatever they want.
Directory traversal Directory traversal occurs when an attacker read files on the webserver outside of
attack the directory of the website. An attacker can then use this information to download
server configuration files containing sensitive information, potentially expose more
server vulnerabilities or even take control of the server!
Resource exhaustion These attacks are computer security exploits that crash, hang or otherwise
attacks interfere with a targeted program or system. Rather than overwhelming network
bandwidth like a DoS attack, resource exhaustion attacks overwhelm the hardware
resources available on the target’s server instead.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Application Attacks
Defending Against Application Attacks
• Prudent programming practice involves treating and validating all input from outside of a function
as if it is hostile.
• Keep all software, including operating systems and applications, up to date, and do not ignore
update prompts. Remember that not all programs update automatically.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
Application Attacks
Spam
• Spam (junk mail) is unsolicited email and, in most cases, is an advertising method.
• A lot of spam is sent in bulk by computers infected by viruses or worms — and often contains
malicious links, malware, or deceptive content that aims to trick recipients into disclosing sensitive
information.
• Almost all email providers filter spam, but it still consumes bandwidth. And even if you have
implemented security features, some spam might get through to you.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
Application Attacks
Spam (Cont.)
If you receive an email containing one or more indicators, you should not open the email or any
attachments.
Many organizations have an email policy that requires employees to report receipt of this type of
email to their cybersecurity team for further investigation. If in doubt, always write.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
Application Attacks
Phishing
Phishing
• It occurs when a user is contacted by email or instant message — or in any other way — by
someone masquerading as a legitimate person or organization.
• The intent is to trick the recipient into installing malware on their device or into sharing personal
information, such as login credentials or financial information.
Spear phishing
• A highly targeted attack, spear phishing sends customized emails to a specific person based on
information the attacker knows about them — which could be their interests, preferences,
activities, and work projects.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 64
Application Attacks
Vishing, Pharming and Whaling
Criminals make use of a wide range of techniques to try to gain access to your personal information.
• Vishing: This type of attack sees criminals use voice communication technology to encourage
users to divulge information, such as credit card details.
• Farming: This attack deliberately misdirects users to a fake version of an official website.
• Whaling: A phishing attack targets high-profile individuals, such as senior executives within an
organization, politicians, and celebrities.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 65
Application Attacks
Defending Against Email and Browser Attacks
Some of the important actions that you can take to defend against email and browser attacks:
It is difficult to stop spam, but there are ways to reduce its effects:
• Most Internet service providers (ISPs) filter spam before it reaches the user’s inbox.
• Many antivirus and email software programs automatically detect and remove dangerous spam
from an email inbox.
• Organizations should educate employees about the dangers of unsolicited emails and make them
aware of the risks of opening attachments.
• Always scan email attachments before opening them.
All software should be kept up-to-date, with the latest security patches, to protect against known
vulnerabilities.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 66
Application Attacks
There's More...
• Some other common attacks that cybercriminals can launch are:
Physical attacks They are intentional, offensive actions used to destroy, expose, alter, disable, steal or
gain unauthorized access to an organization’s infrastructure or hardware.
Adversarial artificial Machine learning is a method of automation that allows devices to carry out analysis
intelligence attacks and perform tasks without specifically being programmed to do so. It uses
mathematical models to predict outcomes. However, these models are dependent on
the data that is inputted. If the data is tainted, it can have a negative impact on the
predicted outcome. Attackers can take advantage of this to perpetrate attacks against
machine learning algorithms.
Supply chain Many organizations interface with a third party for their systems management or to
attacks purchase components and software. Organizations may even rely on parts or
components from a foreign source. Attackers often find ways to intercept these supply
chains.
Cloud-based Rather than developing systems on their own premises, more and more organizations
attacks are making the move toward cloud-based computing. Attackers are constantly
leveraging ways to exploit sensitive data stored on the cloud, as well as applications,
platforms and infrastructure that is cloud-based, as we saw with SaaS, PaaS and IaaS.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 67
1.6 Cybersecurity Threats,
Vulnerabilities, and Attacks
Summary
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 68
Cybersecurity Threats, Vulnerabilities, and Attacks Summary
What Did I Learn in this Module?
• A threat domain is an area of control, authority, or protection that attackers can exploit to gain
access to a system.
• Cyber threats are classified as internal and external threats. It includes software attacks and
errors, sabotage, human error, theft, hardware failures, utility interruption, and natural disasters.
• Social engineering is a non-technical strategy that attempts to manipulate individuals into
performing specific actions or divulging confidential information.
• Malware is any code that can be used to steal data, bypass access controls, or cause harm to or
compromise a system.
• Grayware is an unwanted application that behaves in an annoying or undesirable manner. To
defend against wireless and mobile device attacks: change default configurations.
• Code Injection attacks include XML, SQL, DLL, and LDAP. Write solid code to defend against an
application attack.
• Use antivirus software to defend against email and browser attacks.
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 69