Lecture 1 Cybersecurity and crime Flashcards
C,I,A
Confidentiallity = only authorized party can access the information
Integrity = info/resource in correct state and complete
Availability = info/resource is available for use
Different parts of a system
Operating system
The network
The Application
Enterprise
Zawinskis law
“Every program attempts to expand until it can read mail. Those programs which cannot so expand are replaced by ones which can.”
second system effect
“When one is designing the successor to a relatively small, elegant, and successful system, there is a tendency to become grandiose in one’s success and design an elephantine feature-laden monstrosity.”
building bloat ware
1-we have a problem
2-software built to fix issue
3-requirements change to fix a new problem
4-old code is refused to help fix something else
5- new company takes over and integrates their stuff
6- done
how legacy comes to be
1- develop a tool
2- build on top of it
3- do nothing and wait until environment changes (innovation)
4- done
incentives classic approach
- most businesses want to optimize time to market
- start ups want to test ideas
- software developers are rewarded for new features, change and as fast as possible
- system administrators are rewarded for a stable system, being conservative and maintaining availability
- this incentive structure entails friction and tension by design
project management triangle
quality provided by
scope
cost
time
Threats (types of malware)
virus trojan spyware adware worms rootkit remote access trojan polymorphism
social engineering
the impersonation of someone else in order to get someone or to get privileged information
eg; phishing = mass targeted social engineering attack
spear phishing = targeted social eng attack
CEO fraud - soc eng attack trying to get someone to do something by pretending to be CEO
Botnet + DDOS
botnet is a network of infected computers which can be controlled by some actor. (used for ddos attacks). distributed denial of service used to exhaust the resources of the target, making it unavailable for service
Ransomeware
type of malware infection which denies access to a computer until a ransome is paid
eg cryptoblockers
nation state actors
motives = cause chaos, undermine other countries
capability = extended resources and persuation
methods= advanced well planned attacks
insider threats
Who- employees (mostly)
Motives- unintentional by mistake, money, revenge, espionage
Capability - substantial damage depending on role in organisation
Methods- give out sensitive corporate data, sabotage systems
hacktivists
Who- online groups like anonymous
Motives- reactionary (act when upset)
Capability- alot of time and resources at their disposal
Methods- DDOS, persistent online hate mobs