IT 304 - WK 2
IT 304 - WK 2
3. Human Factors
Why Computer Incidents Are So Prevalent?
3. Human Factors
● Human Error: Many incidents are the result of mistakes or
negligence by users, such as using weak passwords, falling
for phishing scams, or improperly configuring security
settings.
● Lack of Awareness: Inadequate training and awareness
about security practices can lead to vulnerabilities. Users
who are not educated about cybersecurity risks are more
likely to fall victim to attacks.
Why Computer Incidents Are So Prevalent?
4. Evolving Threat Landscape
Why Computer Incidents Are So Prevalent?
4. Evolving Threat Landscape
● Sophistication of Attacks: Cyberattacks have become more
sophisticated over time, with attackers using advanced
techniques such as artificial intelligence, machine learning,
and zero-day exploits.
● Emerging Threats: New types of threats and attack vectors
continue to emerge, such as ransomware and advanced
persistent threats (APTs), requiring constant vigilance and
adaptation.
Why Computer Incidents Are So Prevalent?
5. Economic Incentives
Why Computer Incidents Are So Prevalent?
5. Economic Incentives
● Profit Motives: Cybercriminals often have financial
incentives for their actions, such as stealing data for
ransom, committing fraud, or selling stolen information
on dark web marketplaces.
● Low Risk for Attackers: The anonymity of the internet
and the global reach of cyberattacks mean that
attackers often face minimal risk of being caught or
prosecuted.
Why Computer Incidents Are So Prevalent?
7. Social Engineering
Why Computer Incidents Are So Prevalent?
7. Social Engineering
● Manipulation Techniques: Attackers use social
engineering tactics to manipulate individuals into
divulging confidential information or performing
actions that compromise security, such as clicking on
malicious links or providing login credentials.
Why Computer Incidents Are So Prevalent?
2011
Worms
Worms
A computer worm is a subset of the Trojan horse malware
that can propagate or self-replicate from one computer to
another without human activation after breaching a
system.
Typically, a worm spreads across a network through your
Internet or LAN (Local Area Network) connection.
Spam
Abuse of email systems to send unsolicited email to large numbers of people
Low-cost commercial advertising for questionable products
Method of marketing also used by many legitimate organizations
u
u
u
u
u
u
u
uCAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
Phishing
● Phishing is a type of social engineering attack often used to steal user
data, including login credentials and credit card numbers.
● Act of using email fraudulently to try to get the recipient to reveal
personal data
● Legitimate-looking emails lead users to counterfeit
2015
Ransomware
uAtype of malicious software designed to block access to a
computer system until a sum of money is paid.
uA type of malware that prevents or limits users from accessing their
system, either by locking the system's screen or by locking the users'
files unless a ransom is paid.
2021
Types of Perpetrators
Perpetrators include:
● Thrill seekers wanting a challenge
● Common criminals looking for financial gain
● Industrial spies trying to gain an advantage
● Terrorists seeking to cause destruction
Types of Perpetrators
Perpetrators include:
● Thrill seekers wanting a challenge
● Common criminals looking for financial gain
● Industrial spies trying to gain an advantage
● Terrorists seeking to cause destruction
Hackers and Crackers
Hackers
A hacker is a person who breaks into a computer system.
The reasons for hacking can be many: installing malware,
stealing or destroying data, disrupting service, and more
uCrackers
U Cracking is a form of hacking
U Clearly criminal activity
Malicious Insiders
A malicious insider is an individual within
your organization who decides to use their
access credentials to steal, share, or leak
sensitive information or privileged accounts
outside your organization
Industrial spy
Industrial spying describes a series of covert
activities in the corporate world such as the theft of
trade secrets by the removal, copying, or recording of
confidential or valuable information in a company
Cybercriminal
Cybercriminals are individuals or teams of people
who use technology to commit malicious activities
on digital systems or networks with the intention of
stealing sensitive company information or personal
data, and generating profit.
Hacktivists and Cyberterrorists
uHacktivism
Hacking to achieve a political or social goal
uCyberterrorist
Attacks computers or networks in an attempt to intimidate or
coerce a government in order to advance certain political or social
objectives
Seeks to cause harm rather than gather information
U Uses techniques that destroy or disrupt services
Establishing a Security Policy
Must implement multilayer process for managing security vulnerabilities,
including:
Assessment of threats
Identifying actions to address vulnerabilities
User education
uIT must lead the effort to implement:
Security policies and procedures
Hardware and software to prevent security breaches
Establishing a Security Policy
Educating Individuals
● Help protect information systems by:
● Guarding passwords
● Not allowing sharing of passwords
● Applying strict access controls to protect data
● Reporting all unusual activity
● Protecting portable computing and data storage devices
Preventions
● Implement a layered security solution
● Make computer break-ins harder
● Installing a corporate firewall
● Limits network access
● Intrusion prevention systems
● Block viruses, malformed packets, and other threats
● Installing antivirus software
● Scans for sequence of bytes or virus signature
Establishing a Security Policy
uA security policy defines:
U Organization’s security requirements
U Controls and sanctions needed to meet the requirements
Delineates responsibilities and expected behavior
Outlines what needs to be done
Not how to do it
Automated system policies should mirror written policies
Computer Forensics
● Combines elements of law and computer science to identify,
collect, examine, and preserve data and preserve its integrity
so it is admissible as evidence
● Computer forensics investigation requires extensive training and
certification and knowledge of laws that apply to gathering of
criminal evidence
● Computer forensics is key to fighting computer crime in a court
of law