Internet Security (Lecture 1) Flashcards
What proportion of URL’s are malicious?
One in Ten
What percentage are web attacks up by?
56%
What is the average number of websites compromised with formjacking each month?
4,800
What percentage have supply chain attacks increased by
Increased by 78%
What has been the recent trend in Cryptojacking occurrence?
There have been more cryptojacking events blocked in 2018 than 2017 but it’s trending down (52% drop in occurrence between Jan and Dec 2018
What percentage of malicious email attachments are office files?
48% - up from 5% in 2017
What is the process of malicious email Powershell scripts infecting systems
Email disguised as a notification (invoice, receipt)
The attached Office file contains the malicious script
Opening the attachment executes the script and downloads the malware
What is the prime source of disruption for end users and organisations?
E-mail, in the form of
- unwanted email (spam)
- Propagation of ransomware
- Targeted Spear-phishing
What is a Business Email Compromise (BEC) Scam
A scam involving Spear-phishing emails (low tech) often pretending to be the CEO or senior employees who request large money transfers
What was the malicious email rate in 2018
1 in 412 were malicious emails with most appearing to look like they related to a bill, email delivery failure or package delivery
What were the top malicious email attachment categories in 2018
Scripts (47.5%)
Executables (25.7%)
Other (25.1%)
What are some reasons for targeted attacks? (4)
Attacks for subversive purposes (change social order, structure of power or authority)
Geopolitical - Groups affiliated with nations launch cyber attacks against nation they have grievance
Economic Espionage (Financial) - P2P sale systems in retail (credit/debit) attacked and details sold on black market
Cause Disruption - protest actions, decisions of an organisation or to serve as distraction while attackers plant something malicious in the network
List best practice methods to avoid attacks (7)
1 - Emphasise multiple, overlapping and mutually supportive defensive systems to guard against single point failures in any specific technology
2 - Use regularly updated firewalls, anti-virus software, intrusion detection or protection systems (IPS), web security gateway solutions throughout the network
3 - Receive alerts for new vulnerabilities and threats across vendor platforms and patch known vulnerabilities ASAP
4 - Implement and enforce a security policy whereby sensitive data is encrypted at rest and transit including customer data
5 - Educate employees on risks of Spear-phishing emails including exercising caution around opening attachments and emails from unfamiliar sources and use full protection stack to block email-borne threats
6 - Ensure strong passwords (10+ characters with mix of letters, numbers, symbols) and discourage reusing old passwords or sharing them.
7 - Delete unused credentials ASAP and limit administrative-level profiles
What does a full protection stack look like
Defends against email threats. Symantec Email Security Cloud blocks email-borne threats, Symantec EndPoint Protection blocks malware on the endpoint and Symantec Messaging Gateway’s disarm technology can protect from threats by removing malicious content from attached documents before they reach the user
What security challenges has the Cloud presented
Misconfiguration issues
Vulnerabilities in hardware chips
In 2018 S3 buckets emerged as an Achilles heel for organisations with more than 70 million records stollen due to poor configuration