SlideShare una empresa de Scribd logo
1 de 26
Computer security
Objectives
 Definition
 Compare different attack vectors, the reasons why
email is a popular vector
Typical symptoms of attack
Consequences of successful attack.
What is Attack surface
• The sum-total of points on a network where attacks can
occur where an unauthorized user (the “attacker”) can try
to manipulate or extract data using a myriad of breach
methods (the “cyber attack vectors”).
• If you consider a graph, where the x-axis lists all of the
devices and apps on your network (infrastructure, apps,
endpoints, IoT, etc.) and the y-axis are the different
breach methods such as weak and default passwords,
reused passwords, phishing, social engineering,
unpatched software, misconfigurations etc. – the plot is
your attack surface.
•
What is Cyber Attack vector
• The method or way by an adversary can breach or
infiltrate an entire network/system. Attack vectors
enable hackers to exploit system vulnerabilities,
including the human element.
What is Security breach
• Any security incident in which sensitive, protected,
or confidential data is accessed or stolen by an
unauthorized party, jeopardizing an organization’s
brand, customers, and assets. Incidents such as
DDoS, Bitcoin mining etc. are also security
breaches. Data breaches are the most common,
but not all security incidents concern data theft.
8 common cyber attack vectors
1. Compromised Credentials
• The username and password are most common
type of access credential.
• Compromised credentials describe a case where
user credentials, such as usernames and
passwords, are exposed to unauthorized entities.
• This typically happens when unsuspecting users fall
prey to phishing attempts and enter their login
credentials on fake websites.
Continue...
• When lost, stolen or exposed, compromised
credentials can give the intruder an insider’s
access.
• Although monitoring and analysis within the
enterprise can identify suspicious activity, these
credentials effectively bypass perimeter security
and complicate detection.
• The risk posed by a compromised credential varies
with the level of access it provides.
Compromised Credentials
continues
• Privileged access credentials, which give administrative
access to devices and systems, typically pose a higher
risk to the enterprise than consumer credentials.
Servers, network devices and security tools often have
passwords that enable integration and communication
between devices.
 In the hands of an intruder, these machine-to-machine
credentials can allow movement throughout the
enterprise, both vertically and horizontally, giving
almost unfettered access.
How to avoid it
1. The enterprise should have effective password policies that
ensure suitable password strength. it is
because common usernames and weak passwords can lead
to compromised credentials,
2. Do not reuse the same password to access multiple app and
system. Password sharing across services makes all
applications that share credentials vulnerable as a
consequence of the breach of one service or application in
the cohort.
3. Using two-factor authentication via a trusted second factor
can reduce the number of breaches that occur due to
compromised credentials within an organization.
2. Weak and Stolen Credentials
• Weak passwords and password reuse make credential exposure a
gateway for initial attacker access and propagation.
 Recent malware attacks such as Mirai highlight this threat not
only for managed devices but also IoT connected devices.
• Apps and protocols sending login credentials over your network
pose a significant security threat.
 An attacker connected to your network can easily locate and
utilize these credentials for lateral movement.
 For example, in the Target attack, adversaries were able to steal
Active Directory credentials and propagate their attack into the
enterprise payment network.
How to avoid
• Track password hygiene and use across your entire
enterprise to identify high risk users and their
devices
3. Malicious Insiders
• A malicious insider is an employee who exposes
private company information and/or exploits
company vulnerabilities.
• Malicious insiders are often unhappy employees.
• Users with access to sensitive data and networks
can inflict extensive damage through privileged
misuse and malicious intent.
How to avoid it
• Keep an eye out for disgruntled employees
• and monitor data and network access for every
device and user to expose insider risk.
4. Missing or Poor Encryption
• Data encryption translates data into another form that only
people with access to a secret key or password can read.
• The purpose of data encryption is to protect digital data
confidentiality as it is stored on computer systems and
transmitted using the internet or other computer networks.
Strong encryption must be applied to data at rest, in-motion, and
where suitable, in-processing.
• Missing / poor encryption leads to sensitive information including
credentials being transmitted either in plaintext, or using weak
cryptographic ciphers or protocols
• This implies that an adversary intercepting data storage,
communication, or processing could get access to sensitive data
using brute-force approaches to break weak encryption.
How to avoid it
• Don’t rely solely on low-level encryption or assume
that following compliance means that the data is
securely encrypted.
• Ensure that sensitive data is encrypted at rest, in-
transit, and in processing.
5. Misconfiguration
• Misconfiguration is when there is an error in system
configuration.
• For example, if setup pages are enabled or a user
uses default usernames and passwords, this can lead
to breaches.
• With setup/app server configuration not disabled,
the hacker can determine hidden flaws, and this
provides them with extra information.
• Misconfigured devices and apps present an easy
entry point for an attacker to exploit.
How to avoid it
• Put procedures and systems in place that tighten
your configuration process and use automation
wherever possible.
• Monitoring application and device settings and
comparing these to recommended best practices
reveals the threat for misconfigured devices located
across your network.
6. Ransomware
• Ransomware is a form of cyber-extortion in which
users are unable to access their data until a ransom
is paid.
• Users are shown instructions for how to pay a fee
to get the decryption key.
• The costs can range from a few hundred dollars to
thousands, payable to cybercriminals in Bitcoin.
How to avoid it
• Make sure you have systems in place that protect
all your devices from ransomware including keeping
your operating system patched and up-to-date to
ensure you have fewer vulnerabilities to exploit and
not installing software or giving it administrative
privileges unless you know exactly what it is and
what it does.
7. Phishing
• Phishing is a cybercrime tactic in which the targets
are contacted by email, telephone or text message by
someone posing as a legitimate institution to lure
individuals into providing sensitive data such as
personally identifiable information, banking and
credit card details, and passwords.
• Itsn one of the most effective social engineering
attack vectors. Some phishing schemes are incredibly
intricate and can sometimes look completely
innocent
How to avoid it
• Measuring web browsing and email click-through
behavior for users and devices provides valuable
risk insight for your enterprise.
• When in doubt, it’s best to call the organization you
received the email from to determine if it is a
phishing scam or not.
8. Trust Relationships it
• Trust relationships refer to a certain level of trust
that exists between users and systems.
• For example, trust relationships can connect two
domains, so a user only has to log in once in order
to access resources.
• The two domains in a trust relationship are the
trusted domain (the domain that authenticates the
user the first time), and the trusting domain (the
domain that relies on the trusted domain to
authenticate users and gives access to its resources
without re-authenticating the user).
Continues.....
• One common breach scenario example is when
credentials are cached on the trusted client, which
then gets breached, wreaking havoc.
How to avoid it
• Managing trust relationships can help you limit or
eliminate the impact or damage an attacker can
inflict.
• Google’s BeyondCorp is an example of zero-trust
security practice.
Typical symptoms of attack
• Increased CPU usage
• Slow computer or web browser speeds
• Problems connecting to networks
• Freezing or crashing
• Modified or deleted files
• Appearance of strange files, programs, or desktop
icons
• Programs running, turning off, or reconfiguring
themselves (malware will often reconfigure or turn off
antivirus and firewall programs)
Typing symptoms of attack
• Strange computer behavior
• Emails/messages being sent automatically and without
user’s knowledge (a friend receives a strange email from
you that you did not send)
• There seems to be a lot of network activity when you are
not using the network
• The available memory on your computer is lower than it
should be
• Programs or files appear or disappear without your
knowledge
• File names are changed
Consequences of successful attack.
• It compromises computer security goal which is
confidentiality, Integrity and availability to the
legitimate users

Más contenido relacionado

Similar a attack vectors by chimwemwe.pptx

Lec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devicesLec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devicesBilalMehmood44
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxyasirkhokhar7
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfsrtwgwfwwgw
 
презентация1
презентация1презентация1
презентация1sagidullaa01
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptxvamshimatangi
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).pptGooglePay16
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...GIRISHKUMARBC1
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxGauravWankar2
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxEthical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxGovandJamalSaeed
 

Similar a attack vectors by chimwemwe.pptx (20)

Computer security
Computer securityComputer security
Computer security
 
Lec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devicesLec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devices
 
Cyber security
Cyber securityCyber security
Cyber security
 
3-UnitV_security.pptx
3-UnitV_security.pptx3-UnitV_security.pptx
3-UnitV_security.pptx
 
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptxWeek-09-10-11-12 Fundamentals of Cybersecurity.pptx
Week-09-10-11-12 Fundamentals of Cybersecurity.pptx
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
презентация1
презентация1презентация1
презентация1
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxEthical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 

Último

Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxGry Tina Tinde
 
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...poojakaurpk09
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...Suhani Kapoor
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...Suhani Kapoor
 
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳anilsa9823
 
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...Suhani Kapoor
 
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...Niya Khan
 
CFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceCFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceSanjay Bokadia
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterHector Del Castillo, CPM, CPMM
 
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call GirlsDelhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girlsshivangimorya083
 
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service Cuttack
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service CuttackLow Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service Cuttack
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service CuttackSuhani Kapoor
 
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big BoodyDubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boodykojalkojal131
 
Booking open Available Pune Call Girls Ambegaon Khurd 6297143586 Call Hot In...
Booking open Available Pune Call Girls Ambegaon Khurd  6297143586 Call Hot In...Booking open Available Pune Call Girls Ambegaon Khurd  6297143586 Call Hot In...
Booking open Available Pune Call Girls Ambegaon Khurd 6297143586 Call Hot In...Call Girls in Nagpur High Profile
 
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...shivangimorya083
 
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home MadeDubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Madekojalkojal131
 
TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...
TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...
TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...robinsonayot
 
Final Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management InternshipFinal Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management InternshipSoham Mondal
 
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...gurkirankumar98700
 
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...Suhani Kapoor
 

Último (20)

Preventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptxPreventing and ending sexual harassment in the workplace.pptx
Preventing and ending sexual harassment in the workplace.pptx
 
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
Virgin Call Girls Delhi Service-oriented sexy call girls ☞ 9899900591 ☜ Rita ...
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
 
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
 
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
VIP Call Girls in Jamshedpur Aarohi 8250192130 Independent Escort Service Jam...
 
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...
Neha +91-9537192988-Friendly Ahmedabad Call Girls has Complete Authority for ...
 
CFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector ExperienceCFO_SB_Career History_Multi Sector Experience
CFO_SB_Career History_Multi Sector Experience
 
PM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring ChapterPM Job Search Council Info Session - PMI Silver Spring Chapter
PM Job Search Council Info Session - PMI Silver Spring Chapter
 
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Greater Noida 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call GirlsDelhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
Delhi Call Girls In Atta Market 9711199012 Book Your One night Stand Call Girls
 
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service Cuttack
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service CuttackLow Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service Cuttack
Low Rate Call Girls Cuttack Anika 8250192130 Independent Escort Service Cuttack
 
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big BoodyDubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
 
Booking open Available Pune Call Girls Ambegaon Khurd 6297143586 Call Hot In...
Booking open Available Pune Call Girls Ambegaon Khurd  6297143586 Call Hot In...Booking open Available Pune Call Girls Ambegaon Khurd  6297143586 Call Hot In...
Booking open Available Pune Call Girls Ambegaon Khurd 6297143586 Call Hot In...
 
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...Vip  Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
Vip Modals Call Girls (Delhi) Rohini 9711199171✔️ Full night Service for one...
 
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home MadeDubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
Dubai Call Girls Naija O525547819 Call Girls In Dubai Home Made
 
TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...
TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...
TEST BANK For Evidence-Based Practice for Nurses Appraisal and Application of...
 
Final Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management InternshipFinal Completion Certificate of Marketing Management Internship
Final Completion Certificate of Marketing Management Internship
 
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
(Call Girls) in Lucknow Real photos of Female Escorts 👩🏼‍❤️‍💋‍👩🏻 8923113531 ➝...
 
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
VIP Russian Call Girls Amravati Chhaya 8250192130 Independent Escort Service ...
 

attack vectors by chimwemwe.pptx

  • 1. Computer security Objectives  Definition  Compare different attack vectors, the reasons why email is a popular vector Typical symptoms of attack Consequences of successful attack.
  • 2. What is Attack surface • The sum-total of points on a network where attacks can occur where an unauthorized user (the “attacker”) can try to manipulate or extract data using a myriad of breach methods (the “cyber attack vectors”). • If you consider a graph, where the x-axis lists all of the devices and apps on your network (infrastructure, apps, endpoints, IoT, etc.) and the y-axis are the different breach methods such as weak and default passwords, reused passwords, phishing, social engineering, unpatched software, misconfigurations etc. – the plot is your attack surface.
  • 3.
  • 4. What is Cyber Attack vector • The method or way by an adversary can breach or infiltrate an entire network/system. Attack vectors enable hackers to exploit system vulnerabilities, including the human element.
  • 5. What is Security breach • Any security incident in which sensitive, protected, or confidential data is accessed or stolen by an unauthorized party, jeopardizing an organization’s brand, customers, and assets. Incidents such as DDoS, Bitcoin mining etc. are also security breaches. Data breaches are the most common, but not all security incidents concern data theft.
  • 6. 8 common cyber attack vectors 1. Compromised Credentials • The username and password are most common type of access credential. • Compromised credentials describe a case where user credentials, such as usernames and passwords, are exposed to unauthorized entities. • This typically happens when unsuspecting users fall prey to phishing attempts and enter their login credentials on fake websites.
  • 7. Continue... • When lost, stolen or exposed, compromised credentials can give the intruder an insider’s access. • Although monitoring and analysis within the enterprise can identify suspicious activity, these credentials effectively bypass perimeter security and complicate detection. • The risk posed by a compromised credential varies with the level of access it provides.
  • 8. Compromised Credentials continues • Privileged access credentials, which give administrative access to devices and systems, typically pose a higher risk to the enterprise than consumer credentials. Servers, network devices and security tools often have passwords that enable integration and communication between devices.  In the hands of an intruder, these machine-to-machine credentials can allow movement throughout the enterprise, both vertically and horizontally, giving almost unfettered access.
  • 9. How to avoid it 1. The enterprise should have effective password policies that ensure suitable password strength. it is because common usernames and weak passwords can lead to compromised credentials, 2. Do not reuse the same password to access multiple app and system. Password sharing across services makes all applications that share credentials vulnerable as a consequence of the breach of one service or application in the cohort. 3. Using two-factor authentication via a trusted second factor can reduce the number of breaches that occur due to compromised credentials within an organization.
  • 10. 2. Weak and Stolen Credentials • Weak passwords and password reuse make credential exposure a gateway for initial attacker access and propagation.  Recent malware attacks such as Mirai highlight this threat not only for managed devices but also IoT connected devices. • Apps and protocols sending login credentials over your network pose a significant security threat.  An attacker connected to your network can easily locate and utilize these credentials for lateral movement.  For example, in the Target attack, adversaries were able to steal Active Directory credentials and propagate their attack into the enterprise payment network.
  • 11. How to avoid • Track password hygiene and use across your entire enterprise to identify high risk users and their devices
  • 12. 3. Malicious Insiders • A malicious insider is an employee who exposes private company information and/or exploits company vulnerabilities. • Malicious insiders are often unhappy employees. • Users with access to sensitive data and networks can inflict extensive damage through privileged misuse and malicious intent.
  • 13. How to avoid it • Keep an eye out for disgruntled employees • and monitor data and network access for every device and user to expose insider risk.
  • 14. 4. Missing or Poor Encryption • Data encryption translates data into another form that only people with access to a secret key or password can read. • The purpose of data encryption is to protect digital data confidentiality as it is stored on computer systems and transmitted using the internet or other computer networks. Strong encryption must be applied to data at rest, in-motion, and where suitable, in-processing. • Missing / poor encryption leads to sensitive information including credentials being transmitted either in plaintext, or using weak cryptographic ciphers or protocols • This implies that an adversary intercepting data storage, communication, or processing could get access to sensitive data using brute-force approaches to break weak encryption.
  • 15. How to avoid it • Don’t rely solely on low-level encryption or assume that following compliance means that the data is securely encrypted. • Ensure that sensitive data is encrypted at rest, in- transit, and in processing.
  • 16. 5. Misconfiguration • Misconfiguration is when there is an error in system configuration. • For example, if setup pages are enabled or a user uses default usernames and passwords, this can lead to breaches. • With setup/app server configuration not disabled, the hacker can determine hidden flaws, and this provides them with extra information. • Misconfigured devices and apps present an easy entry point for an attacker to exploit.
  • 17. How to avoid it • Put procedures and systems in place that tighten your configuration process and use automation wherever possible. • Monitoring application and device settings and comparing these to recommended best practices reveals the threat for misconfigured devices located across your network.
  • 18. 6. Ransomware • Ransomware is a form of cyber-extortion in which users are unable to access their data until a ransom is paid. • Users are shown instructions for how to pay a fee to get the decryption key. • The costs can range from a few hundred dollars to thousands, payable to cybercriminals in Bitcoin.
  • 19. How to avoid it • Make sure you have systems in place that protect all your devices from ransomware including keeping your operating system patched and up-to-date to ensure you have fewer vulnerabilities to exploit and not installing software or giving it administrative privileges unless you know exactly what it is and what it does.
  • 20. 7. Phishing • Phishing is a cybercrime tactic in which the targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. • Itsn one of the most effective social engineering attack vectors. Some phishing schemes are incredibly intricate and can sometimes look completely innocent
  • 21. How to avoid it • Measuring web browsing and email click-through behavior for users and devices provides valuable risk insight for your enterprise. • When in doubt, it’s best to call the organization you received the email from to determine if it is a phishing scam or not.
  • 22. 8. Trust Relationships it • Trust relationships refer to a certain level of trust that exists between users and systems. • For example, trust relationships can connect two domains, so a user only has to log in once in order to access resources. • The two domains in a trust relationship are the trusted domain (the domain that authenticates the user the first time), and the trusting domain (the domain that relies on the trusted domain to authenticate users and gives access to its resources without re-authenticating the user).
  • 23. Continues..... • One common breach scenario example is when credentials are cached on the trusted client, which then gets breached, wreaking havoc. How to avoid it • Managing trust relationships can help you limit or eliminate the impact or damage an attacker can inflict. • Google’s BeyondCorp is an example of zero-trust security practice.
  • 24. Typical symptoms of attack • Increased CPU usage • Slow computer or web browser speeds • Problems connecting to networks • Freezing or crashing • Modified or deleted files • Appearance of strange files, programs, or desktop icons • Programs running, turning off, or reconfiguring themselves (malware will often reconfigure or turn off antivirus and firewall programs)
  • 25. Typing symptoms of attack • Strange computer behavior • Emails/messages being sent automatically and without user’s knowledge (a friend receives a strange email from you that you did not send) • There seems to be a lot of network activity when you are not using the network • The available memory on your computer is lower than it should be • Programs or files appear or disappear without your knowledge • File names are changed
  • 26. Consequences of successful attack. • It compromises computer security goal which is confidentiality, Integrity and availability to the legitimate users