Week 14 - Malware, Social Effects and Threat Modelling Flashcards
(33 cards)
Weakest Link Principle
People often represent the weakest link in the security chain and are chronically responsible for the failure of security systems.
How weakest link principle is exploited
- Human factors: social engineering, unintentional errors.
- Technology vulnerabilities: outdated or insecure apps, operating system defects.
- Exposed personal traits: oversharing on social media (e.g., sensitive interests or habits).
Malware
- Any software designed to cause harm to computer systems, networks, or users.
- It is designed to harm and exploit your computer or network by stealing sensitive information, disrupting systems operations or gaining unauthorised access to your device.
- Short for Malicious software.
Types of malware - virus
- Malicious executable code attached to another executable file.
- Spreads through infected files.
- Can corrupt files, slow down systems or cause crashes.
- Can be prevented by using antivirus and avoiding untrusted files.
- 2 types:
− Resident virus: stays in memory.
− Non-resident virus: does not stay in memory after execution.
Types of malware - worm
- Self-replicating malware that doesn’t require a host to spread.
- Spreads by exploiting security flaws to spread over networks.
- Disrupts networks and consumes bandwidths.
- Can be prevented through regular updates and firewall use.
Types of malware - trojan
- Malware disguised as legitimate software to trick users to install them.
- Spreads by delivering itself through phishing or malicious downloads.
- Steals data or provides unauthorized access.
- Can be prevented by applying caution with emails and downloads.
Types of malware - ransomware
- Infects computer, encrypts files or locks systems for ransom.
- Spreads through phishing emails or infected websites.
- Causes data loss, financial distortion and system downtime.
- Can be prevented by backing up important files and avoiding suspicious links.
Types of malware - zombie
- A compromised computer controlled by hackers to perform malicious acts.
- Spreads through other types of malware like trojans or worms.
- Used in botnets for spam or Distributed Denial of Service (DDoS) attacks.
- Can be prevented through regular updates, monitoring unusual activity and strong authentication.
Types of malware - botnet
- A network of zombies controlled remotely by cybercriminals.
- Spreads by malware infiltrating devices and turning them into a bot/zombie that can be used for malicious purposes.
- Used to launch DDOs attacks, send spam emails or steal sensitive information.
- Can be prevented with secure IoT devices, use of firewalls and antivirus software.
Distributed Denial of Service (DDoS) attacks
A hacker making a website or other service inaccessible by flooding it with requests from many different devices.
How does malware gain access
- Phishing emails: malicious attachments or links trick users into downloading malware.
- Exploiting vulnerabilities: malware often takes advantage of unpatched software/ system weaknesses.
- Social engineering: attackers manipulate victims into revealing sensitive
information or executing malicious code. - Malicious Websites/Ads: Malware is delivered through compromised or fake websites and ads.
- Infected Software/Downloads: Malware can hide in seemingly legitimate software or files.
Effects of Malware
- Data Theft: Personal, financial, or business data is stolen for malicious use.
- System Damage: Malware can corrupt or delete files, slow down or crash systems.
- Loss of Privacy: Sensitive information such as passwords or browsing history may be exposed.
- Financial Loss: Ransomware and data breaches can lead to direct financial damage.
- Performance Issues: Malware can reduce system speed or disrupt normal operation.
- Reputation Damage: Organizations or individuals may suffer from compromised trust and credibility.
Malware Practitioners
- Cybercriminals: individuals or groups who create and distribute malware for financial gain.
- Hacktivists: people or organisations who use malware as a tool for political or social causes.
- State-sponsored actors: government or military organisations that use malware for sabotage, warfare etc.
- Script kiddies: less skilled attackers who use pre-made malware for fun or attention.
- Cybersecurity researchers: ethical hackers who analyse malware to develop protections or solutions.
Other types of malevolent practice
- Phishing and spear phishing
- Social engineering
- Grooming
- Online stalking
- Doxing
- Deepfakes
- Misinformation
Phishing and spear phishing
- Phishing: spam emails that look legitimate that trick users into entering personal info or even confirming if they click a link so could receive spam in the future.
- Spear phishing: similar to phishing but is more targeted and personalised type where attackers tailor their fraudulent messages to a specific individual or organization.
Grooming
Gaining trust of a victim by being nice, often over a long period of time. Once trust is established, perpetrator either gets the victim to reveal personal info or unknowingly involves them.
Social engineering
Perpetrator collects data by dumpster diving (sorting through bins), monitoring social media or should surfing (looking at peoples screens in public) rather than gaining information through code/software.
The perpetrator convinces the victim to trust them then asks for money/details.
Online stalking
Obsessively following or watching a person without their knowledge, often through covert surveillance.
Doxing
Publishing private data (addresses, phone numbers) with malicious intent.
Deepfakes
AI‐generated images, videos, or audio that appear real. The deepfake is then used to spread misinformation, commit fraud through impersonation or create fake evidence for blackmail or manipulation.
Misinformation
- Misinformation: unintentionally sharing false or misleading information.
- Disinformation: intentionally sharing false or misleading information to manipulate or deceive.
Can be used to manipulate opinions, erode trust, influence political outcomes or create echo chambers.
Threat modelling
- A technique within the security lifecycle to analyse a system’s security & privacy concerns.
- Can allow for recognising potential failures/attacks, identifying design and implementation flaws early and informing decisions throughout development, testing and deployment.
What are the 5 key phases of threat modelling
- Asset identification.
- Threat analysis.
- Vulnerability analysis.
- Risk assessment.
- Risk communication.
Asset identification
Determine what you are trying to detect.
Identifies what assets you are trying to protect.