CSC - 407
INFORMATION SECURITY
ASSIGNMENT - 01
BSCS – 8A
Solution
Security Attack
Attack Mechanism CIA Category Attack Threat
Details of Attack References
Type/Name (to Triad (Active/ Sub-Category (Among Four Kinds)
Prevent/Detect) Passive)
UNIX_PIMINE, a malware bot which was
designed to target Raspberry Pi but later Signature Confidentiality, https://sci-hub.ru/
it was modified to target other IoT Intrusion Availability 10.1109/
UNIX_PIMINE Active Trojan Usurpation
devices too. It is capable of creating IRC Detection DESSERT.2019.8770027
bots allowing attacker to remotely Systems (SIDS)
control pi.
Known to be world’s first cyberweapon, https://
Confidentiality,
Stuxnet is a multi-part computer worm. Intrusion dergipark.org.tr/en/
Integrity, Malware
Stuxnet Stuxnet targeted Programmable Logic Detection Active Disruption download/article-file/
Availability Injection
Controller of the SCADA systems. System 2160183
Mirai botnet (a malware) is used to
https://
launch DDoS attack on the Dyn (which is
Availability dergipark.org.tr/en/
an Internet Service Provider) servers. IP fast hopping/ Denial Of
Dyn DDoS Attack Active Disruption download/article-file/
Mirai botnet took over the servers and IP bouncing Service (DoS)
2160183
turned them into bots which can be
controlled remotely.
The water distribution system in the
https://
Department of Water & Sewerage was
dergipark.org.tr/en/
Water Distribution penetrated by attackers. They were able Confidentiality, Unauthorized
Access Control Active Disruption download/article-file/
System Hacking to gain unauthorized access and Integrity, access
2160183
manipulate its settings to cause damage Availability
to the water pumps.
https://
www.researchgate.net/
The attacker sets a position between the
publication/
web and the user. The attacker tries to Confidentiality, Deception,
Man-in-the-Middle Two-factor 334427558_Defending_
interrupts the communication between Integrity Active Interception Unauthorized
(MitM) Attacks authentication. Against_Cyber-
two of them, and tries to intercept data disclosure
Attacks_on_the_Internet
and information.
_of_Things
https://
www.researchgate.net/
Sender Policy
Phishing is a cyberattack. It Deceptively publication/
Framework
sends messages and emails that lure Confidentiality, 334427558_Defending_
Phishing (SPF),DomainKey Active Smishing Deception
individuals to disclose sensitive Integrity Against_Cyber-
s Identified Mail
information or download malware. Attacks_on_the_Internet
(DKIM)
_of_Things
https://
www.researchgate.net/
Confidentiality,
Zero-Day exploits vulnerabilities in Patch publication/
Integrity, Usurpation,
software that are not known to the Management, 334427558_Defending_
Zero-Day Exploits Availability Active Malware Unauthorized
developer, which allows attackers to gain Threat Against_Cyber-
disclosure
unauthorised access. Intelligence Attacks_on_the_Internet
_of_Things
This attack is a theft of information. The
https://
attack exploits the lack of secure Security
Confidentiality, Unauthorized www.mdpi.com/2079-
Eavesdropping network communication so that it is Verification Passive Sniffing
Integrity disclosure 9292/12/18/3958
possible to obtain data when a user Framework
sends or receives this information.
https://sci-hub.ru/
SDN-based
DDoS floods large targeted systems and 10.1109/
Honeypot, Availability Denial Of
DDoS servers with overwhelming traffic to Active Disruption ComComAp46287.2019.
Moving Target Service (DoS)
cause unavailability. 9018775
Defense (MTD)
This attack compromises the security of
hospital data. It encrypts the data which https://sci-hub.ru/
blocks the hospital staff from accessing Network Confidentiality, 10.1109/
Wannacrypt Active Ransomware Disruption
the crucial database and information Segmentation Availability CSNET.2018.8602974
which can delay and hinder the patient
treatment.
Mole attack is done by an insider within
https://
an organization which leaks the sensitive
Confidentiality Insider Unauthorized www.mdpi.com/2079-
Mole Attack data and information. The attacker Vigilance Passive
Threat disclosure 9292/12/18/3958
interrupt and disturb the operations for
personal intent.
IP spoofing the creation of an IP address https://
that impersonates another user, the Network www.mdpi.com/2079-
IP Spoofing Filtering Integrity, Active Deception
attacker disguise to conduct Spoofing 9292/12/18/3958
Availability
unauthorized and illegal activies.
Reverse engineering involves analyzing
software application or system to get to https://
Reverse know about the systems design, Confidentiality, Unauthorized www.mdpi.com/2079-
Obfuscation Integrity Passive Code Analysis
Engineering functionality and code structure to disclosure 9292/12/18/3958
identify and exploit the vulnerabilities of
the system.
A malicious SQL code is injected to input
fields to execute unauthorized database https://
commands. This allows the attacker to Confidentiality, Injection Unauthorized www.mdpi.com/2079-
SQL Injection Sanitization Integrity Active
gain access to all the sensitive Attacks disclosure 9292/12/18/3958
information that wasn’t supposed to be
displayed.