0% found this document useful (0 votes)
80 views13 pages

3 Security Concepts

The document discusses different types of malware and cyber threats including viruses, worms, Trojans, ransomware, spyware, and botnets. It provides definitions and examples of each type of malware or threat. On-premises solutions refer to software and technology located within a company's physical infrastructure versus cloud solutions which are hosted remotely by third-party vendors.

Uploaded by

shahrukh khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
80 views13 pages

3 Security Concepts

The document discusses different types of malware and cyber threats including viruses, worms, Trojans, ransomware, spyware, and botnets. It provides definitions and examples of each type of malware or threat. On-premises solutions refer to software and technology located within a company's physical infrastructure versus cloud solutions which are hosted remotely by third-party vendors.

Uploaded by

shahrukh khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

On-Premises:

o On-premises solutions are physically located at an organization’s office site such as DC.
o On-premises solutions are physically hosting location of their choice such is Data Center.
o On-premises is software & technology that is located within the physical company's DC.
o By installing & running software on hardware located within the premises of the company.
o The IT staff has physical access to the data and can directly control the configuration.
o The IT staff has to management and security of the computing infrastructure and data.
o Uses own physical servers and IT infrastructure to install and host the solution locally.

Cloud:
o Cloud is hosted on servers which are maintained by a vendor the hosting company.
o Cloud is such as Microsoft Azure and accessed through an Internet connected device.
o Where third parties are responsible for managing & securing the infrastructure severs.
o The cloud Computing is the alternatives to On-Premises software and technologies.
o Cloud is frequently considered for their potential cost savings and reduced expenses.
o Cloud also considered to reduce the power consumption, maintenance and security.
o Security is one of the biggest reasons organizations not to use cloud network solutions.

1 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717


Malware:
o Malware is a term which is short for “Malicious Software” is a file or code or application.
o Malware (Malicious Software) is any program or file, that is harmful to a computer user.
o Malicious Software typically delivered over a network that infects, explores and steals.
o Malware (Malicious Software) can be conducts virtually any behavior an attacker wants.
o Malware (Malicious Software) is an inclusive term, for all types of malicious software.
o Malicious Software is terms for all as Viruses, Worms, Trojans, Rootkits, and Spyware.
o Malware is also terms for Adware, Scareware, Botnets, Logic Bombs, Key loggers etc.
o Many tools can identify Malware on the network such as Packet Captures to analyzing.
o In addition, tools Snort, NetFlow, IPS, Advanced Malware Protection, Cisco FirePOWER etc.

2 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717


Virus:
o Malicious code that attached to executable files that are often regular application.
o Viruses require some type of human or any other application interaction to activate.
o Entire category of viruses are designed to damage or destroy a system or the data.

Worm:
o Worms are malware that replicate themselves and spread to infect other systems.
o Think of worms as small programs that replicate themselves in a computer network.
o A worm can travel from system to system without human or application interaction.
o When worm executes, it can replicate again & infect even more systems or computer.
o Worms destroy the files and data on user’s computer or system or Computer network.
o Worms usually target the operating system (OS) files to make them empty & destroy.
o Worms typically cause harm to the computer network and consuming the bandwidth.

3 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717


Adware:
o Adware is computer term, which is stand for Advertising-Supported Malware.
o Adware works by executing advertisements to generate revenue for the hackers.
o Adware (Advertising-Supported Malware) is any type of advertising-supported software.
o Adware will play, display, or download advertisements automatically on a user's computer.
o Adware will play once the software has been installed or the application is in the use.

Ransomware:
o Its propagate like worm but is designed to encrypt personal files on victim’s hard drive.
o Ransomware works by encrypting the hard drive and all files on a system or Computer.
o Ransomware can encrypt specific files in your system or all your files or mast boot record.
o Ransomware then asks for a payment in exchange for giving the decryption key.
o Major Ransomware like Reveton, CryptoLocker, CryptoWall, Pyeta, Nyeta, Bad Rabbit.
o More recently Ransomware 2017 WannaCry attack was lunched which destroy many PCs.
o Ransomware caused no small amount of destruction, but it caused huge destruction .

4 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717


Trojan:
o Trojans are malicious programs that appear like regular applications or programs.
o Trojans are malicious programs that appear like media files or other computer files.
o Trojans contain a malicious payload; the payload can be anything malicious acts etc.
o Trojans payload provide backdoor that allows attackers unauthorized access to system.
o Trojans pretend to do one thing but, when loaded, actually perform another malicious.
o Few Trojan categories are command-shell Trojans, graphical user interface (GUI) Trojans.
o HTTP/HTTPS Trojans, document Trojans, defacement Trojans, botnet Trojans, VNC Trojans.
o Remote-Access Trojans, data-hiding Trojans, banking Trojans, DoS Trojans, FTP Trojans.
o Software-Disabling Trojans, and covert-channel Trojans are few examples of trojans.
o Remote-access Trojans (RATs) allow the attacker full control over the system or PC.
o Idea behind this type of Trojan is to hide user’s data sometimes known as ransomware.
o Security-software disablers Trojans are designed to attack and kill antivirus or firewalls.
o Denial of Service (DoS), These Trojans are designed to cause a DoS Denial of Service.
o They can be designed to knock out specific service or to bring an entire system offline.
o Trojans are dangerous, they represent a loss of confidentiality, integrity, and availability.
o Common targets of Trojans Credit card data & banking info have become huge targets.
o Passwords are always a big target of second common targets of trojans malware.

o P2P networks and file-sharing sites such as The Pirate Bay are generally unmonitored.
o And allow anyone to spread any programs they want, legitimate or not like trojans.
o Instant Messaging, Internet Relay Chat, Email attachments, and browser extension etc.

5 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717


Spyware:
o Spyware computer network term, which is common types of malware.
o Spyware monitors the activities performed by a computer user on the PC.
o The main intention of a spyware is to collect the private information of PC user.
o Spyware normally come from internet while user download freeware software.
o Spyware is another form of malicious code that is similar to a Trojan horse malware.

Rootkits:
o A rootkit is a collection of software specifically designed to permit malware.
o Rootkits gathers information, into your system, Computer, or computer network.
o These work in the background so that a user may not notice anything suspicious.
o Rootkits in the background permit several types of malware to get into the system.
o The term rootkit is derived from the combination of two words – "root" and "kit".
o Root refers to the administrator account in Unix and Linux operating systems etc.
o Kit refers to programs allow threat actor to obtain unauthorized root/admin access.

Keyloggers:
o Keylogger is network term which is Keystroke loggers software or Hardwar.
o Software, which records all the information that is typed using a keyboard.
o Keyloggers store the gathered information and send it to the attacker.
o Attacker extract sensitive information like password or credit card details.

6 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717


Scareware:
o Scareware is a type of malware, which is designed to trick victims.
o Scareware trick victims into purchasing and downloading useless software.
o Scareware trick victims into download potentially dangerous software.
o Scareware, which generates pop-ups that resemble Windows system messages.
o Scareware usually purports to be antivirus or antispyware software or malwares.
o Scareware also usually popup a firewall application or a registry cleaner.
o The messages typically say that a large number of problems such as infected files.
o The user is prompted to purchase software to fix Computer or system problems.
o In reality, no problems were detected, and the suggested software contain malware.

Logic Bomb:
o A Logic Bomb is malware that is triggered by a response to an event.
o Such as launching an application or when a specific date/time is reached.
o Attackers can use logic bombs in a variety of ways to destroy data or system.
o They can embed arbitrary code within a fake application, or Trojan horse.
o Logic Bomb will be executed whenever you launch the fraudulent software.
o Attackers can also use a combination of spyware and logic bombs to steal identity.

7 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717


Botnet:
o Basically, the word botnet is made up of two words: bot and net.
o So, Bot is short for robot and Net comes from the network, Robot Network.
o People who write and operate malware cannot manually log onto every computer.
o They have infected, instead they use botnets to manage a large number of systems.
o A botnet is a network of infected computers, used by the malware to spread.
o Cybercriminals use special Trojan viruses to breach the security of several users’ PCs.
o Cybercriminals take control of each computer & organize all of the infected PCs.
o Cybercriminals remotely manage and organize all infected computer bot.

DoS (Denial of Service) Attack:


o DoS Attack is a type of attack to network server with large number of service requests.
o DoS Attack can cause server to crash the server & legitimate users are denied the service.
o DDoS stand for (Distributed Denial of Service) an Attack, which is one type of DoS attack.
o DDoS originating from many attacking computers from different geographical regions.
o Zombies and Botnets are mainly used in DDoS (Distributed Denial of Service) attacks.
o Both type of attack DoS and DDoS can cause the services to become unavailable to users.
o Such as Ping of Death, Smurf Attack, TCP SYN , CDP Flood, Buffer Overflow, ICMP Flood.
o Cloud is more vulnerable to DoS attacks because it is shared by many users & organizations.
DOS Attack

Servers

DDOS Attack

8 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717


SQL Injection:
o SQL injection is a code injection technique that might destroy your database.
o SQL injection is one of the most common web hacking techniques to gain access.
o SQL injection is placement of malicious code in SQL statements, via web page input.
o SQL Injection is injection attack makes possible to execute malicious SQL statements.
o Attackers can use SQL Injection vulnerabilities to bypass application security measures.
o SQL Injection (SQLi) also used to add, modify, and delete records in the database.
o SQL injection attack exploits vulnerable cloud-based applications allow pass SQL commands.

Cross Site Scripting:


o XSS is term, which stand for Cross-Site Scripting Errors, are a type of coding error.
o Where a malicious party can trigger execution of software from their browser.
o Cross-site scripting is a type of security vulnerability found in web applications.
o XSS enables attackers to inject client-side scripts into web pages viewed by other users.
o Common purpose of XSS attack is to collect cookie data such as session IDs or login info.
o XSS used to steal cookies exploited to gain access as authenticated user to a cloud-based.
o Three major categories are Reflected XSS, Stored(Persistent) XSS, and DOM-Based XSS.

9 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717


Phishing:
o Phishing is a type of social engineering attack often used to steal user data or info.
o Phishing is social engineering attack to steal login credentials & credit card numbers.
o Phishing is method of trying to gather personal info using deceptive e-mails & websites.
o Phishing is a cyber-attack that uses disguised email as a weapon to steal user data or info.

10 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717


Man-In-The-Middle:
o MITM (Man in The Middle) means man in the middle of your conversation.
o In a Man-in-The-Middle attack, attackers place themselves between two devices.
o MITM attack to intercept or modify communications between the two devices.
o MITM cyberattacks allow attackers to secretly intercept communications.
o MITM attack happens when hacker inserts themselves between a user & apps.
o Attackers have many different reasons and methods for using a MITM attack.
o MITM is used to steal something, like credit card numbers or user login credentials.
o MITM attacks involve interception of communication between two digital systems.

Data Breach:
o Data breach can involve data that was not supposed to be released to the public.
o Which includes financial information, personal health information & trade secrets.
o Which includes. Personally, identifiable information and other intellectual property.
o Value of the organization’s cloud-based data might be different for different people.
o Data Breach happen if organization lacks managing authentication & identity properly.
o The Businesses need to properly allocate access to data as per every user’s job role.
o One-time passwords & phone-based authentications are the two factor authentications.
o That help securing cloud services by making it tough for the attacks to steal the credentials.

11 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717


Insecure APIs:
o API stand for Application Programming Interface are used by cloud service providers.
o To allow customers to interact, manage, and extract information from cloud services.
o APIs use to gather logs from an application, to provide integration with databases.
o APIs is sets of functions & variables enable software components to communicate.
o APIs is used to integration with storage components & to control specific cloud resources.
o APIs are also often the way that a mobile application can interact with the website.
o Or back end services, and can provide the ability to authenticate users, as well as query.
o In cloud technology, Application Programming Interface is important software components.
o Several cloud services use APIs is a feature beyond the trusted organizational boundary.
o When a cloud API is exploited, it gives the cyber attackers huge access to your cloud apps.
o Public front door is offered your applications with Cloud APIs and so, securing is important.
o Developers manage & interact with their service with APIs offered by most cloud services.
o When the APIs are weak, enterprises are at risks of being exposed to security vulnerabilities.
o Attacker take advantage of API misconfigurations to modify or delete data in applications.

12 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717


API (Application Programming Interface):
o To interact with applications or network devices, use an Application Programming Interface.
o API is software interface which allows other applications to communicate with application.
o Application Programming Interface are found almost everywhere such as Amazon Web.
o Home automation devices such as thermostats, refrigerators, and wireless lighting systems.
o Application Programming Interface are used for build programmable network automation.
o API is software that allows other applications to access its data or services smoothly.
o API is set of rules and regulation describing how one application can interact with another.
o Application Programming Interface API is the instructions to allow the interaction to occur.
o User sends API request to server asking for specific information & receives an API response.
o User receives an API response in return from the server along with requested information.
o The XML and the JSON are two of the most common data formats that are used with APIs.
o An Application Programming Interface (API) is similar to a waiter in a restaurant or hotels.
o A customer in a restaurant or in hotel would like to have some food delivered to the table.
o The food is in the restaurant or in hotel kitchen where it is cooked and prepared to serve.
o The waiter is the messenger, similar to an Application Programming Interface (API).
o Waiter (API) is the person who takes the customer’s order (the request) & tells kitchen.
o When food is read, the waiter will then deliver the food (the response) back to customer.
o In basic terms, APIs is just allow the applications to communicate with one another apps.
o API is a product middle person that enables two applications to converse with one another.
o It is a request between two connection i.e The Sender Request and The Receiver Response.
o An API brokers access to a different application to provide functionality or access to data.
o To interact with application or network devices, we use Application Programming Interface.
o A method and way of communicating with and configuring a network is the use of APIs.

13 | P a g e Created by Ahmad Ali E-Mail: ahmadalimsc@gmail.com , Mobile: 056 430 3717

You might also like