3.6 Cyber Security Flashcards
Cyber security
Cyber security consists of the processes, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorised access.
Threats to cyber security
• Social engineering techniques
• Malicious code
• Weak and default passwords
• Misconfigured access rights
• Removable media
• Unpatched and/or outdated software
Social engineering techniques
The art of manipulating people to give up confidential information.
4 types of social engineering techniques
• Blagging
• Phishing
• Pharming
• Shouldering
Blagging
Inventing a scenario to convince people to divulge confidential information.
Phishing
Sending a message (usually email) that pretends to be from a legitimate source. The message normally contains a link that the victim is encouraged to follow. Can be made to appear very realistic.
Pharming
Redirecting users to a fake website by either:
• Changing the hosts file on the client computer or
• Changing compromising (poisoning) the DNS server
Shouldering
Shouldering is looking at someone’s information over their shoulder.
Malicious code
• Wants to harm your computer or systems.
• Wants to steal confidential information.
• Wants to take control of your system and hold you to ransom.
• Is used as a “weapon” to cause damage
How?
• It might be an email with a link you are asked to click on
Malware
Malicious code is also referred to as Malware and refers to a variety of forms of hostile or intrusive software.
You need to know about:
• Computer virus
• Trojans
• Spyware
• Adware
Computer virus
• Its installed without your knowledge, with the purpose of doing harm.
• A virus is a program which infect other programs or data files.
• It is commonly replicated to send onto someone else and It is easily spread if a user innocently sends an infected filed to someone else.
• It is commonly found in email attachments with macros.
Trojans
This is a program which misleads the user into thinking it’s another piece of software which, when run, executes another program.
Spyware
A program which records data such as usernames and passwords on a host system and forwards the information to a third party.
Adware
Code embedded or attached to program files which will persistently show adverts.
Weak and default passwords
Weak:
• 8 characters is considered too weak
• Upper, lower case, numbers, special characters
• Not dictionary words - use initials of a phrase known to you
• Don’t use previous passwords
Default:
• Manufacturers often use the same UN and PW for their hardware eg “admin” and 0000
• Many users do not change the default password
What hardware might this apply too?
• This may become more prevalent as we use more “internet of things” devices
Misconfigured access right
There are four main levels of access rights to data!
• Read-only a user can read data
• Create a user can create new data
• Write a user can make changes to data
• Delete a user can delete data
Misconfigured access rights can cause legislation breaches
What is GDPR? (General data protection regulation)
Data should be kept secure - appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
Removable media
• Any storage medium that can be removed can be lost or stolen.
• If the data is stolen then personal or confidential information could be given away.
• For an organisation storing data about people, this could be in breach of the Data Protection Act.
• Or the media could contain infected files and malware.
Unpatched and/or outdated software
• Software can be very complex and can contain security flaws that hackers can take advantage of.
• When a hacker discovers a security flaw in software, they can often use it to gain unauthorised access to a computer system.
• They may also share information about the security flaw with other hackers, or ask for payment for the information.
• Software manufacturers can issue patches to patch up the loophole
• However, this replies upon users installing the updates.
• Some software becomes outdated and the manufacturer will no longer provide patches.
• Many computers are not set up automatically to instal software updates.
Penetration testing
Penetration testing is the practice of deliberately trying to find security holes in your own systems.
The goal of penetration testing is to:
• Identify the targets of potential attacks
• Identify possible entry points
• Attempt to break in
• Report back the findings
White-box and black-box penetration testing?
Way to highlight weaknesses in defence:
• White-box penetration testing:
Simulate a malicious insider
• Black-box penetration testing:
Stimulate an external hack or cyber warfare
Methods to detect and prevent cyber security threats?
• Biometrics
• Password systems
• CAPTCHA
• Email confirmation of users identity
• Automatic software update
Authentication
Checking that the user is allowed to access content. Some applications use a pin pattern instead of a username and password.
Biometric authentication
Voice, fingerprint, face or iris recognition can be used to identify individuals.
How to set a secure password?
• Minimum of eight characters.
• Mixture of numbers, lowercase and uppercase characters.
• Do not include your name or personal details.