Week 14 - Malware, Social Effects and Threat Modelling Flashcards

(33 cards)

1
Q

Weakest Link Principle

A

People often represent the weakest link in the security chain and are chronically responsible for the failure of security systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How weakest link principle is exploited

A
  • Human factors: social engineering, unintentional errors.
  • Technology vulnerabilities: outdated or insecure apps, operating system defects.
  • Exposed personal traits: oversharing on social media (e.g., sensitive interests or habits).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Malware

A
  • Any software designed to cause harm to computer systems, networks, or users.
  • It is designed to harm and exploit your computer or network by stealing sensitive information, disrupting systems operations or gaining unauthorised access to your device.
  • Short for Malicious software.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of malware - virus

A
  • Malicious executable code attached to another executable file.
  • Spreads through infected files.
  • Can corrupt files, slow down systems or cause crashes.
  • Can be prevented by using antivirus and avoiding untrusted files.
  • 2 types:
    − Resident virus: stays in memory.
    − Non-resident virus: does not stay in memory after execution.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of malware - worm

A
  • Self-replicating malware that doesn’t require a host to spread.
  • Spreads by exploiting security flaws to spread over networks.
  • Disrupts networks and consumes bandwidths.
  • Can be prevented through regular updates and firewall use.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of malware - trojan

A
  • Malware disguised as legitimate software to trick users to install them.
  • Spreads by delivering itself through phishing or malicious downloads.
  • Steals data or provides unauthorized access.
  • Can be prevented by applying caution with emails and downloads.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of malware - ransomware

A
  • Infects computer, encrypts files or locks systems for ransom.
  • Spreads through phishing emails or infected websites.
  • Causes data loss, financial distortion and system downtime.
  • Can be prevented by backing up important files and avoiding suspicious links.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Types of malware - zombie

A
  • A compromised computer controlled by hackers to perform malicious acts.
  • Spreads through other types of malware like trojans or worms.
  • Used in botnets for spam or Distributed Denial of Service (DDoS) attacks.
  • Can be prevented through regular updates, monitoring unusual activity and strong authentication.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of malware - botnet

A
  • A network of zombies controlled remotely by cybercriminals.
  • Spreads by malware infiltrating devices and turning them into a bot/zombie that can be used for malicious purposes.
  • Used to launch DDOs attacks, send spam emails or steal sensitive information.
  • Can be prevented with secure IoT devices, use of firewalls and antivirus software.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Distributed Denial of Service (DDoS) attacks

A

A hacker making a website or other service inaccessible by flooding it with requests from many different devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does malware gain access

A
  • Phishing emails: malicious attachments or links trick users into downloading malware.
  • Exploiting vulnerabilities: malware often takes advantage of unpatched software/ system weaknesses.
  • Social engineering: attackers manipulate victims into revealing sensitive
    information or executing malicious code.
  • Malicious Websites/Ads: Malware is delivered through compromised or fake websites and ads.
  • Infected Software/Downloads: Malware can hide in seemingly legitimate software or files.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Effects of Malware

A
  • Data Theft: Personal, financial, or business data is stolen for malicious use.
  • System Damage: Malware can corrupt or delete files, slow down or crash systems.
  • Loss of Privacy: Sensitive information such as passwords or browsing history may be exposed.
  • Financial Loss: Ransomware and data breaches can lead to direct financial damage.
  • Performance Issues: Malware can reduce system speed or disrupt normal operation.
  • Reputation Damage: Organizations or individuals may suffer from compromised trust and credibility.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malware Practitioners

A
  • Cybercriminals: individuals or groups who create and distribute malware for financial gain.
  • Hacktivists: people or organisations who use malware as a tool for political or social causes.
  • State-sponsored actors: government or military organisations that use malware for sabotage, warfare etc.
  • Script kiddies: less skilled attackers who use pre-made malware for fun or attention.
  • Cybersecurity researchers: ethical hackers who analyse malware to develop protections or solutions.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Other types of malevolent practice

A
  • Phishing and spear phishing
  • Social engineering
  • Grooming
  • Online stalking
  • Doxing
  • Deepfakes
  • Misinformation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phishing and spear phishing

A
  • Phishing: spam emails that look legitimate that trick users into entering personal info or even confirming if they click a link so could receive spam in the future.
  • Spear phishing: similar to phishing but is more targeted and personalised type where attackers tailor their fraudulent messages to a specific individual or organization.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Grooming

A

Gaining trust of a victim by being nice, often over a long period of time. Once trust is established, perpetrator either gets the victim to reveal personal info or unknowingly involves them.

16
Q

Social engineering

A

Perpetrator collects data by dumpster diving (sorting through bins), monitoring social media or should surfing (looking at peoples screens in public) rather than gaining information through code/software.
The perpetrator convinces the victim to trust them then asks for money/details.

17
Q

Online stalking

A

Obsessively following or watching a person without their knowledge, often through covert surveillance.

18
Q

Doxing

A

Publishing private data (addresses, phone numbers) with malicious intent.

19
Q

Deepfakes

A

AI‐generated images, videos, or audio that appear real. The deepfake is then used to spread misinformation, commit fraud through impersonation or create fake evidence for blackmail or manipulation.

20
Q

Misinformation

A
  • Misinformation: unintentionally sharing false or misleading information.
  • Disinformation: intentionally sharing false or misleading information to manipulate or deceive.
    Can be used to manipulate opinions, erode trust, influence political outcomes or create echo chambers.
21
Q

Threat modelling

A
  • A technique within the security lifecycle to analyse a system’s security & privacy concerns.
  • Can allow for recognising potential failures/attacks, identifying design and implementation flaws early and informing decisions throughout development, testing and deployment.
22
Q

What are the 5 key phases of threat modelling

A
  • Asset identification.
  • Threat analysis.
  • Vulnerability analysis.
  • Risk assessment.
  • Risk communication.
23
Q

Asset identification

A

Determine what you are trying to detect.
Identifies what assets you are trying to protect.

24
Threat analysis
Identify potential attacks or events that could compromise the identified assets. Identifies relevant threats and vulnerabilities.
25
Vulnerability analysis
Pinpoint the weakness, both technical and organisational. Identifies risk level for identified threats and vulnerabilities.
26
Risk assessment
Evaluate the likelihood and impact of each threat. Identifies mitigation and contingency priorities for the relevant threats and weaknesses.
27
Risk communication
Share the findings with stakeholders.
28
Natural threats
- Natural threat/ accidents: Non-intentional threat agents (e.g., floods, fires, user mistakes). - Natural threats are well studied and relatively predictable in frequency. Can plan accordingly. - Accidental threats come from human error without malicious intent. They are hard to track or predict. Need to implement training, policies and reporting to handle.
29
malicious threats
- Intentional threat agents. - Characteristics: − motivation: why do they act. − capability: skills and resources. − catalyst: what triggered the event. − inhibitors: what might deter them. − amplifiers: what might push them forward.
30
Threat modelling frameworks
- STRIDE: a systematic processes to identify and assess security risks in a system. It is a mnemonic that categorizes potential threats based on the types of attacks they represent, each letter corresponds to a specific category of threat. - DREAD: a risk assessment model that evaluates threats based on five criteria. It is a scoring system designed to prioritise and quantify risks.
31
STRIED threat modelling framework
- Spoofing: Impersonating a user, device, or system to gain unauthorized access. - Tampering: unauthorised modification of data during transit or at rest. - Repudiation: Denying performing an action, often due to a lack of proper logging or auditing. - Information disclose: Unauthorized access to sensitive data. - Denial of service: Disrupting service availability by overwhelming the system or exploiting weaknesses. - Elevation of privilege: Gaining unauthorized, higher-level access to the system.
32
DREAD threat modelling framework
- Damage potential: How bad would the impact be if the threat is realized? - Reproducibility: How easy is it for an attacker to replicate the threat? - Exploitability: How easy is it for an attacker to launch the attack? - Affected users: How many users or systems would be impacted? - Discoverability: How likely is it that the vulnerability will be found by attackers?