COMPUTER THREATS 1
COMPUTER THREATS 1
Definition
A computer system threat is anything that leads to loss or corruption of data or physical
damage to the hardware and/or infrastructure. Knowing how to identify computer security
threats is the first step in protecting computer systems. The threats could be intentional,
accidental or caused by natural disasters.
Types of Threats:
A security threat is a threat that has the potential to harm computer systems and organizations.
The cause could be physical, such as a computer containing sensitive information being
stolen. It’s also possible that the cause isn’t physical, such as a viral attack.
1. Physical Threats: A physical danger to computer systems is a potential cause of an
occurrence/event that could result in data loss or physical damage. It can be classified as:
• Internal: Short circuit, fire, non-stable supply of power, hardware failure due to
excess humidity, etc. cause it.
• External: Disasters such as floods, earthquakes, landscapes, etc.
• Human: Destroying of infrastructure and/or hardware, thefts, disruption, and
unintentional/intentional errors are among the threats.
To protect computer systems from the above-mentioned physical threats, an organization must
have physical security control measures. The following list shows some of the possible
measures that can be taken:
• Internal: Fire threats could be prevented by the use of automatic fire detectors and
extinguishers that do not use water to put out a fire. The unstable power supply can be
prevented by the use of voltage controllers. An air conditioner can be used to control
the humidity in the computer room.
• External: Lightning protection systems can be used to protect computer systems
against such attacks. Lightning protection systems are not 100% perfect, but to a certain
extent, they reduce the chances of Lightning causing damage. Housing computer
systems in high lands are one of the possible ways of protecting systems against floods.
• Humans: Threats such as theft can be prevented by use of locked doors and restricted
access to computer rooms.
These non-physical threats include malware, Denial of sevice attacks, phishing etc.
Malware
Short for Malicious Software, malware is any code that can be used to steal data, bypass access
controls, or cause harm to, or compromise a system. In other words it is a type of computer
1
program that infiltrates and damages systems without the users’ knowledge. Malware tries to
go unnoticed by either hiding or not letting the user know about its presence on the system.
Below are a few common types of malwares:
➢ Spyware
This malware is design to track and spy on the user. Spyware often includes activity trackers,
keystroke collection, and data capture. In an attempt to overcome security measures, spyware
often modifies security settings. Spyware often bundles itself with legitimate software or with
Trojan horses. An example of a spyware are keyloggers (they can monitor a user’s computer
activity in real-time. Keylogger is a program that runs in the background and records every
keystroke made by a user, then sends the data to a hacker with the intent of stealing passwords
and financial information).
➢ Adware
➢ Bot
From the word robot, a bot is malware designed to automatically perform action, usually online.
While most bots are harmless, one increasing use of malicious bots are botnets. Several
computers are infected with bots which are programmed to quietly wait for commands provided
by the attacker.
➢ Ransomware
This malware is designed to hold a computer system or the data it contains captive until a
payment is made. Ransomware usually works by encrypting data in the computer with a key
unknown to the user. Some other versions of ransomware can take advantage of specific system
vulnerabilities to lock down the system. Ransomware is spread by a downloaded file or some
software vulnerability.
➢ Scareware
This is a type of malware designed to persuade the user to take a specific action based on fear.
Scareware forges pop-up windows that resemble operating system dialogue windows. These
windows convey forged messages stating the system is at risk or needs the execution of a
specific program to return to normal operation. In reality, no problems were assessed or
detected and if the user agrees and clears the mentioned program to execute, his or her system
will be infected with malware.
➢ Rootkit
This malware is designed to modify the operating system to create a backdoor. Attackers then
use the backdoor to access the computer remotely. Most rootkits take advantage of software
vulnerabilities to perform privilege escalation and modify system files. It is also common for
2
rootkits to modify system forensics and monitoring tools, making them very hard to detect.
Often, a computer infected by a rootkit must be wiped and reinstalled.
➢ Trojan horse
A Trojan horse is malware that carries out malicious operations under the guise of a desired
operation. This malicious code exploits the privileges of the user that runs it. Often, Trojans
are found in image files, audio files or games. A Trojan horse differs from a virus because it
binds itself to non-executable files.
➢ Worms
➢ Phishing
Phishing is a type of attack that is frequently used to obtain sensitive information from users,
such as login credentials and credit card details. They deceive users into giving critical
information, such as bank and credit card information, or access to personal accounts, by
sending spam, malicious Web sites, email messages, and instant chats.
Man-In-The-Middle (MitM) – MitM allows the attacker to take control over a device without
the user’s knowledge. With that level of access, the attacker can intercept and capture user
information before relaying it to its intended destination. MitM attacks are widely used to steal
financial information. Many malware and techniques exist to provide attackers with MitM
capabilities.
➢ Virus
A virus is malicious executable code that is attached to other executable files, often legitimate
programs. Most viruses require end-user activation and can activate at a specific time or date.
Viruses can be harmless and simply display a picture or they can be destructive, such as those
3
that modify or delete data. Viruses can also be programmed to mutate to avoid detection. Most
viruses are now spread by USB drives, optical disks, network shares, or email.
• Boot Sector Virus – It is a type of virus that infects the boot sector of floppy disks or
the Master Boot Record (MBR) of hard disks. The Boot sector comprises all the files
which are required to start the Operating system of the computer. The virus either
overwrites the existing program or copies itself to another part of the disk.
• Direct Action Virus – When a virus attaches itself directly to a .exe or .com file and
enters the device while its execution is called a Direct Action Virus. If it gets installed
in the memory, it keeps itself hidden. It is also known as Non-Resident Virus.
• Resident Virus – A virus which saves itself in the memory of the computer and then
infects other files and programs when its originating program is no longer working.
This virus can easily infect other files because it is hidden in the memory and is hard to
be removed from the system.
• Multipartite Virus – A virus which can attack both, the boot sector and the executable
files of an already infected computer is called a multipartite virus. If a multipartite virus
attacks your system, you are at risk of cyber threat.
• Overwrite Virus – One of the most harmful viruses, the overwrite virus can completely
remove the existing program and replace it with the malicious code by overwriting it.
Gradually it can completely replace the host’s programming code with the harmful
code.
• Polymorphic Virus – Spread through spam and infected websites, the polymorphic
virus are file infectors which are complex and are tough to detect. They create a
modified or morphed version of the existing program and infect the system and retain
the original code.
• File Infector Virus – As the name suggests, it first infects a single file and then later
spreads itself to other executable files and programs. The main source of this virus are
games and word processors.
• Spacefiller Virus – It is a rare type of virus which fills in the empty spaces of a file
with viruses. It is known as cavity virus. It will neither affect the size of the file nor can
be detected easily.
• Macro Virus – A virus written in the same macro language as used in the software
program and infects the computer if a word processor file is opened. Mainly the source
of such viruses is via emails.
❖ Symptoms of Malware
Regardless of the type of malware a system has been infected with, these are common malware
symptoms:
Your computing devices store your data and are the portal to your online life. Below is a short
list of steps you can take to protect your computing devices from intrusion:
5
❖ Confidentiality, Integrity, and Availability
Confidentiality, integrity and availability, known as the CIA triad, is a guideline for
information security for an organization. Confidentiality ensures the privacy of data by
restricting access through authentication encryption. Integrity assures that the information is
accurate and trustworthy. Availability ensures that the information is accessible to authorized
people.
• Confidentiality
Another term for confidentiality would be privacy. Company policies should restrict access to
the information to authorized personnel and ensure that only those authorized individuals view
this data. The data may be compartmentalized according to the security or sensitivity level of
the information. For example, a Java program developer should not have to access to the
personal information of all employees. Furthermore, employees should receive training to
understand the best practices in safeguarding sensitive information to protect themselves and
the company from attacks. Methods to ensure confidentiality include data encryption, username
ID and password, two factor authentication, and minimizing exposure of sensitive information.
• Integrity
Integrity is accuracy, consistency, and trustworthiness of the data during its entire life cycle.
Data must be unaltered during transit and not changed by unauthorized entities. File
permissions and user access control can prevent unauthorized access. Version control can be
used to prevent accidental changes by authorized users. Backups must be available to restore
any corrupted data, and checksum hashing can be used to verify integrity of the data during
transfer.
• Availability
Maintaining equipment, performing hardware repairs, keeping operating systems and software
up to date, and creating backups ensure the availability of the network and data to the
authorized users. Plans should be in place to recover quickly from natural or man-made
disasters. Security equipment or software, such as firewalls, guard against downtime due to
attacks such as denial of service (DoS). Denial of service occurs when an attacker attempts to
overwhelm resources so the services are not available to the users.