3.6 Cybersecurity

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Cybersecurity refers to the practice of protecting systems, networks, programs, and data from

digital attacks, damage, or unauthorized access. It encompasses a variety of measures designed to


safeguard the integrity, confidentiality, and availability of information.

Main Purposes of Cybersecurity:

1. Confidentiality: Ensuring that sensitive information is only accessible to authorized


individuals or systems. This involves encryption, access controls, and measures to
prevent unauthorized data disclosure.
2. Integrity: Maintaining the accuracy and consistency of data. This ensures that
information cannot be altered or tampered with without detection, using mechanisms like
hashing and digital signatures.
3. Availability: Ensuring that data and systems are accessible to authorized users whenever
needed. This involves protecting against threats like Denial of Service (DoS) attacks and
ensuring system uptime.
4. Authentication: Verifying the identity of users or systems before granting access to
resources. This involves using credentials like passwords, multi-factor authentication
(MFA), and biometrics.
5. Non-repudiation: Ensuring that a party cannot deny the authenticity of their actions or
communications. This is typically achieved through digital signatures and audit trails.
6. Risk Management: Identifying, assessing, and mitigating risks related to cyber threats.
This involves implementing security measures and creating contingency plans for
potential security breaches.

Cybersecurity is essential for protecting personal, financial, and governmental data, maintaining
business operations, and ensuring trust in digital environments.

Cybersecurity Threats:

1. Social Engineering Techniques:


o Social engineering involves manipulating individuals into divulging confidential
information or performing certain actions that compromise security. Techniques
include:
 Phishing: Deceptive emails or messages that appear legitimate but trick
users into sharing sensitive information or clicking malicious links.
 Pretexting: Creating a fabricated scenario to deceive someone into
providing information or access.
 Baiting: Offering something enticing (e.g., free software) to trick
individuals into downloading malware or revealing information.
 Tailgating: Following an authorized person into a restricted area without
proper credentials.
2. Malicious Code (Malware):
o Malware refers to any software intentionally designed to cause damage to a
system, steal data, or disrupt operations. Common types include:
 Viruses: Programs that attach themselves to legitimate files and spread
when those files are executed.
 Trojans: Malicious programs disguised as legitimate software, which give
attackers control over a system.
 Ransomware: Locks users out of their systems or encrypts data until a
ransom is paid.
 Spyware: Secretly monitors user activity and collects sensitive
information without consent.
3. Pharming:
o A technique where attackers redirect users from legitimate websites to malicious
ones by compromising DNS servers or exploiting vulnerabilities. The goal is to
steal personal data such as login credentials or credit card information.
4. Weak and Default Passwords:
o Weak passwords are easily guessable or too short, making it easy for attackers to
gain access to accounts. Default passwords, which are often preset on devices and
software, are common knowledge and easily exploited if not changed.
5. Misconfigured Access Rights:
o Granting excessive or inappropriate privileges to users can lead to unauthorized
access to sensitive data or systems. Misconfigurations, such as leaving sensitive
data exposed, can lead to data breaches.
6. Removable Media:
o Devices like USB drives or external hard drives can introduce malware into a
system if they are infected. They also pose a risk of data theft if lost or stolen and
can be used to bypass network security controls.
7. Unpatched and/or Outdated Software:
o Software vulnerabilities, if left unpatched, can be exploited by attackers. Outdated
software often lacks the security measures of current versions, making systems
more susceptible to attacks.

Penetration Testing:

Penetration testing (or pen testing) is a cybersecurity practice where authorized professionals
simulate attacks on a system, network, or application to identify vulnerabilities and weaknesses.
The goal is to discover security flaws before malicious attackers can exploit them.

Uses of Penetration Testing:

1. Identify Vulnerabilities: Uncover security gaps that could be exploited.


2. Test Security Controls: Ensure firewalls, intrusion detection systems, and other security
measures are functioning as expected.
3. Assess Compliance: Check whether the organization meets regulatory security standards
(e.g., GDPR, PCI DSS).
4. Improve Security Posture: Provide insights into how to strengthen the overall security
infrastructure.
Pen testing helps organizations understand their risks and take preemptive action to mitigate
potential threats

Definition of Social Engineering:

Social engineering is the manipulation of individuals into revealing confidential information or


performing actions that compromise security, typically by exploiting trust, fear, or urgency rather
than technical hacking methods.

What Social Engineering Is and How to Protect Against It:

Social engineering relies on human psychology to trick victims into divulging sensitive
information (such as passwords, personal details, or financial information) or performing actions
(like clicking malicious links or granting access). It often involves impersonation, deception, and
manipulation.

Protection Against Social Engineering:

1. Education and Awareness: Regular training on recognizing common social engineering


tactics like phishing emails or fake phone calls.
2. Multi-Factor Authentication (MFA): Requires more than one verification method,
making it harder for attackers to gain unauthorized access.
3. Strong Security Policies: Implementing policies for handling sensitive information,
verifying identities, and reporting suspicious activities.
4. Be Skeptical of Unsolicited Communications: Encouraging employees and users to
question unexpected requests for sensitive information.
5. Regular Software Updates: Keeping systems updated to reduce vulnerabilities that can
be exploited by social engineers.

Forms of Social Engineering:

1. Blagging (Pretexting):
o Definition: Blagging, or pretexting, involves creating a fabricated scenario or
false identity to trick a target into providing sensitive information. The attacker
often pretends to be someone in a position of authority or trust.
o Example: A scammer pretending to be from a bank asks for account details to
“verify” a suspicious transaction.
o Protection: Train employees to verify the authenticity of the person asking for
information, require identification, and encourage caution when divulging
information over phone or email.
2. Phishing:
oDefinition: Phishing is a technique where attackers send deceptive emails,
messages, or websites that appear legitimate to trick individuals into revealing
personal information or clicking malicious links.
o Example: An email that looks like it's from a well-known company asking the
recipient to reset their password using a malicious link.
o Protection: Use email filtering, warn users about phishing attempts, and verify
URLs before clicking. Never provide sensitive information through unsolicited
communication.
3. Shouldering (Shoulder Surfing):
o Definition: Shouldering, or shoulder surfing, involves spying on someone’s
physical actions to obtain sensitive information, such as observing someone
entering their PIN at an ATM or typing a password.
o Example: An attacker looks over someone's shoulder to capture their password or
PIN number.
o Protection: Encourage individuals to cover their hand while entering PINs or
passwords and be mindful of their surroundings when accessing sensitive
information in public spaces.

Definition of Malware:

Malware (short for malicious software) is any software intentionally designed to harm, exploit,
or otherwise compromise the integrity of computer systems, networks, or data.

What Malware Is and How to Protect Against It:

Malware is created by cybercriminals to disrupt normal operations, steal information, or gain


unauthorized access to systems. It can spread through malicious downloads, email attachments,
compromised websites, or removable media.

Protection Against Malware:

1. Antivirus Software: Use reputable antivirus programs to detect and remove malware.
2. Firewalls: Set up strong firewalls to prevent unauthorized access to systems.
3. Keep Software Updated: Regularly update operating systems and applications to patch
vulnerabilities that malware can exploit.
4. Avoid Suspicious Links and Downloads: Educate users to avoid clicking on unverified
links or downloading files from unknown sources.
5. Regular Backups: Frequently back up important data to minimize damage in case of a
malware attack.

Forms of Malware:

1. Computer Virus:
o Definition: A virus is a type of malware that attaches itself to legitimate files or
programs and spreads when those files are executed. It can corrupt files, disrupt
system operations, or delete data.
o How It Works: Once a virus infects a system, it replicates and spreads to other
files or devices. It often requires user interaction to trigger its execution, like
opening an infected file.
o Protection: Use antivirus software, avoid downloading files from untrusted
sources, and be cautious with email attachments.
2. Trojan:
o Definition: A trojan (or trojan horse) is malware that disguises itself as legitimate
software to trick users into installing it. Once installed, it allows attackers to
access the system remotely.
o How It Works: Trojans typically hide in seemingly harmless programs or files.
Once activated, they can create backdoors, steal data, or install additional
malware.
o Protection: Avoid downloading software from untrusted sources, use reputable
antivirus programs, and monitor system behavior for unusual activities.
3. Spyware:
o Definition: Spyware is malware designed to secretly monitor user activities and
gather information, such as passwords, browsing habits, or personal data, without
consent.
o How It Works: Spyware often runs in the background, logging keystrokes,
capturing screenshots, or tracking web activity to send sensitive information to
attackers.
o Protection: Use anti-spyware tools, avoid downloading suspicious software, and
be mindful of permissions requested by apps or programs.

Methods to Detect and Prevent Cybersecurity Threats:

1. Biometric Measures (particularly for mobile devices):


o Explanation: Biometric measures use unique biological characteristics (such as
fingerprints, facial recognition, or iris scans) to verify a person’s identity.
o How They Work: These systems use sensors to capture and store biometric data.
When a user tries to access the device, their biometric data is compared to the
stored data for verification.
o Security Benefits: Biometric data is difficult to replicate, providing a high level
of security compared to traditional passwords. It prevents unauthorized access to
devices and sensitive information.
o Examples: Fingerprint scanners on smartphones, facial recognition on mobile
devices, and iris scanners.
2. Password Systems:
o Explanation: Password systems require users to create and enter a secret
combination of characters to gain access to a system or account.
o How They Work: Users create a password that is stored in a system in a hashed
and encrypted format. The password is required to verify the user’s identity
during login attempts.
oSecurity Benefits: Strong passwords (including letters, numbers, and symbols)
help prevent unauthorized access. Password systems can be enhanced by using
multi-factor authentication (MFA).
o Best Practices: Use strong, unique passwords, avoid sharing passwords, and use
password managers for secure storage.
3. CAPTCHA (or similar):
o Explanation: CAPTCHA (Completely Automated Public Turing test to tell
Computers and Humans Apart) is a challenge-response test designed to
distinguish human users from bots.
o How It Works: CAPTCHA presents a task (e.g., selecting certain images or
typing distorted characters) that is easy for humans but difficult for bots to
complete.
o Security Benefits: Prevents automated attacks, such as brute-force login attempts
or spam bots, by ensuring that only human users can proceed.
o Examples: Google reCAPTCHA, puzzle-solving tasks, or image-based
challenges.
4. Using Email Confirmations to Confirm a User’s Identity:
o Explanation: Email confirmation involves sending a verification link or code to a
user's email to confirm their identity when creating an account, making changes,
or conducting sensitive transactions.
o How It Works: When a user registers or performs a sensitive action, they receive
an email containing a confirmation link or code. The user must verify their
identity by clicking the link or entering the code on the website.
o Security Benefits: Adds an extra layer of security by ensuring the user controls
the email associated with the account, helping prevent unauthorized access or
fraudulent activities.
o Examples: Email verification during account registration or password reset
processes.
5. Automatic Software Updates:
o Explanation: Automatic software updates involve installing security patches and
new software versions automatically without requiring manual intervention from
users.
o How It Works: Software vendors release updates to fix vulnerabilities, add
features, or improve performance. Automatic updates ensure that the system is
always running the latest, most secure version.
o Security Benefits: Protects against known vulnerabilities by ensuring that the
system is always up to date. This reduces the risk of attacks exploiting outdated
software with unpatched security holes.
o Examples: Operating systems (e.g., Windows, macOS), antivirus software, and
applications like browsers frequently offer automatic updates to enhance security.

Each of these security measures plays a vital role in strengthening defenses against cyber threats
by protecting user data, preventing unauthorized access, and securing systems from potential
attacks.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy