CSC1032 - Threats and Attacks (2024)
CSC1032 - Threats and Attacks (2024)
CSC1032- Introduction to
Cybersecurity
1 2 3
Know the different Understand the Understand how
categories of different attacks and vulnerabilities can be
vulnerabilities vulnerabilities and how mitigated
they are exploited
Vulnerability
• NIST Definition: Weakness in an information system, system security procedures, internal controls, or
implementation that could be exploited or triggered by a threat source.
• ISO27005 Information Security Risk Management in the following areas:
• Organization
• Processes and procedures
• Management routines
• Personnel
• Physical environment
• Information system configuration
• Hardware, software or communications equipment Dependence on external parties
• We are mainly interested in the last 2
Vulnerability Scoring (by NIST)
https://owasp.org/www-project-top-ten/
DoS and DDoS Attacks
• A denial-of-service (DoS) is designed to overwhelm the resources of a system to the point where it is unable to reply to
legitimate service requests.
• A distributed denial-of-service (DDoS) attack is initiated by a vast array of malware-infected host machines controlled by
the attacker.
• With a DoS attack, the target system gets flooded with illegitimate requests
• A DoS attack can also be used to create vulnerability for another type of attack. With a successful DoS or DDoS attack,
the system often has to come offline, which can leave it vulnerable to other types of attacks.
• One common way to prevent DoS attacks is to use a firewall that detects whether requests sent to your site are
legitimate. Imposter requests can then be discarded, allowing normal traffic to flow without interruption.
• An example of a major internet attack of this kind occurred in February 2020 to Amazon Web Services (AWS).
Man-in-the-middle Attacks
• A phishing attack occurs when a malicious actor sends emails in an attempt to grab sensitive information
from the target. Phishing attacks combine social engineering and technology
• Whale-phishing Attacks are so-named because it goes after the “big fish” or whales of an organization.
These individuals are likely to possess information that can be valuable to attackers, such as proprietary
information about the business or its operations.
• Spear-phishing Attacks: The attacker takes the time to research their intended targets and gather
information to tailor efficient phishing
• Similar to regular phishing attacks, spear-phishing-attacks can be prevented by carefully checking the
details in all fields of an email and making sure users do not click on any link whose destination cannot
be verified as legitimate.
Quiz
Phases
• Probing è Exploitation è Replication è Payload
Sample Worms:
• Love Bug worm (ILOVEYOU worm) (2000):
• May 3, 2000: 5.5 to 10 billion dollars in damage
• Some social media messages-based attacks
• Stuxnet
Virus, Worm and Trojan
Virus Worm Trojan Horse
A connects to another software/program A Worm is a program that does not Trojan Horse is a hidden piece of malware
to execute unanticipated tasks when the communicate with other system that steals sensitive information/data
system's actual program is running. programs but multiplies and runs itself from a user's system and sends it to
another location across the network.
Viruses cannot be operated remotely; Worms can be controlled remotely; Trojan Horse can be operated remotely,
they are installed on the target machine they can open a back door much like worms via the network.
Viruses cannot replicate themselves. Worms replicate themselves in the A Trojan Horse spreads slowly and do not
system and propagate quickly replicate itself.
The primary goal of a virus is to alter or Worms aim to degrade system The Trojan horse disguises itself as normal
erase system data. performance and slow it down software and steals crucial information
Announcement (Assessment2)
• Ransomware is malicious software that blocks access to a computer system or files unless a
sum of money is paid.
• An infected PC can spread the ransomware to other computers on your network
• Holds a computer system, or the data it contains, hostage against its user by demanding a
ransom.
• Encrypts some of the user's personal files, originally referred to as cryptoviruses, or
cryptoworms
• grew 41% in the last year
SQL Injection
• Insertion or “injection” of a SQL query via the input data from the client to the
application.
• SQL commands are injected into data-plane input in order to affect the execution of
predefined SQL commands.
• A successful SQL injection exploit can read sensitive data from the database, modify
database data (Insert/Update/Delete), execute administration operations on the
database (such as shutdown the DBMS), etc.
SQL Injection-- Demo
• SQL injection:
Power Electromagnetic
EM Consumption
Emissions
0110 1001
1001
Acoustic
1011
1011 0110
Input Victim System Output
0010 0010
1110 1110
Power
Timing Sound Heat
… etc
Power Side Channel Attack
Security
Controls
Security
Controls
Locked
safe
Firewall
Network Access
Controls
Server Access
Controls
Data Access
Controls
Application Access
Controls
Implementing Controls