PPT - Types of SyberSecurity
PPT - Types of SyberSecurity
Malware
● Malware, or malicious software, is a blanket term for any kind of computer software with malicious intent.
● It refers to any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or
destroy computers and computer systems.
● Examples of common malware include viruses, worms, Trojan, spyware, adware, and ransomware.
1
Virus
● Virus stands for Vital Information Resources under Siege
● Virus is any type of malicious software or malware that can cause damage to your data, files,
and software through replication. A computer virus replicates itself by modifying other
computer programs and inserting its own code into those programs. Computer viruses generally
require a host program.
● Computer Virus
○ In 1983, the term "computer virus" was coined by Fred Cohen
○ Virus stands for Vital Information Resources under Siege
○ The first known computer virus appeared in 1971 and was dubbed the "Creeper virus” made by Bob
Thomas. This computer virus infected Digital Equipment Corporation's (DEC) PDP-10 mainframe
computers running the TENEX operating system.
○ The Creeper virus was eventually deleted by a program created by Ray Tomlinson and known as "The
Reaper".
2
● Every time a user boots up, the virus-infected code automatically runs as well. This gives
hackers full control of an entire system. They can also prevent your computer from
booting up properly, resulting in a blue or black screen error message.
● Richard Skrenta created the first boot sector virus, called Elk Cloner, in 1981.
● First boot sector virus in India - Brain (computer virus) in 1986, it affected IBM personal
computers. Brain was developed by Pakistani brothers Basit and Amjad Farooq Alvi.
■ Resident Virus
● A resident virus is malware that embeds in the computer memory, enabling it to infect
other computer files without even being executed. It does this by loading its replication
module into the RAM.
■ Polymorphic Virus
● A polymorphic virus can change its code or signature while maintaining its malicious
function. It creates numerous slightly different copies of itself, making it more
challenging to detect and remove by antivirus software.
3
■ Macro Virus
● A macro virus is a computer virus written in the same macro language used to create
software programs or Applications such as Microsoft Excel or Word. Macro viruses
work by adding their code to the macros associated with documents, spreadsheets and
other data files. It centers on software applications and does not depend on the operating
system (OS). Most macro viruses are VBA viruses.
○ VBA is Visual Basic for Applications and is the language used by Microsoft for
its applications like Word and Excel.
■ Multipartite Virus
● A multipartite virus is a type of fast-acting malware that attacks a device's boot sector
and executable files simultaneously.
● Multipartite viruses are often considered more problematic than traditional computer
viruses due to their ability to spread in multiple ways.
● In the history of computer viruses, The Multipartite party virus is the first virus of its
kind to attack both boot sector and self-executable files at the same time, causing more
damage than any other virus.
■ Script Viruses
● Script Viruses (VBA, VBS, JS) use programming languages present on your system to
attack it.
● VBA is Visual Basic for Applications and is the language used by Microsoft for its
applications like Word and Excel.
● VBS is Visual Basic Script edition and is used for scripting in web applications like
Internet Explorer.
● JS is JavaScript, a variation on the Java programming language. Unlike the other script
languages here JavaScript cannot itself be used to harm your system as it works in a
"sandbox" or protected area of your computer. Instead, JavaScript is used to exploit
security problems in other programs such as web browsers. This is known as a Browser
exploit.
4
Ransomware
● As the name suggests, ransomware takes your device, files, and folders hostage by locking you out
and demanding a ransom to regain access. Ransomware attacks often request payment in bitcoin or
other types of cryptocurrency.
● The first documented ransomware was the 1989 AIDS Trojan, also known as PS Cyborg1 developed by Joseph
Popp.
5
Adware (or advertising software)
● It is the term used for various pop-up advertisements that show up on your computer or mobile
device. Adware has the potential to become malicious and harm your device by slowing it down,
hijacking your browser and installing viruses and/or spyware.
● Adware installs itself on your device and displays unwanted advertisements and pop-ups.
Rootkit
● A rootkit is a software program, typically malicious, that provides privileged, root-level (i.e.,
administrative) access to a computer while concealing its presence on that machine.
● A rootkit is an app that hides itself, or other forms of malware, deep within your system.
Rootkits are very difficult to detect for average anti-malware software. Working stealthily in
the background, rootkits do their damage gradually. Hackers can use rootkit attacks to steal
personal data, install malware and spam, perform a DDOS attack, or gain remote access to a system
6
Spyware
● Malware designed to track user activity and log behavior is known as spyware. Spyware is used to
spy on your system, record your conversations, log your browsing habits, and even steal your
credit card info, passwords, and other private data through the use of keyloggers.
● If you compare spyware vs viruses, they both exploit your system in potentially devastating ways, but spyware
can’t self-replicate and usually requires an action, like clicking on a link, to cause an infection.
● Example - Pegasus spyware developed by the Israeli cyber-arms company NSO Group
● What is a keylogger?
○ Short for keystroke logger, a keylogger is monitoring software or hardware designed to record what you
write.
○ It allows hackers to keep track of everything you’ve been typing. This allows hackers to steal valuable
information like: your usernames and passwords, your credit card number and verification code, your
entire chat history, a list of the websites you’ve visited etc
Worms
● Like viruses, computer worms can self-replicate and spread over a network. But when comparing
worms and viruses, a virus needs a legitimate file to latch onto while a worm doesn’t actually
need a host.
● A worm can spread by itself without a host.
● Worm Full Form - Write Once, Read Many
● The FIRST Computer Worm: The Morris Worm (1988)
● ILOVEYOU, sometimes referred to as Love Bug was a computer worm that infected over ten million Windows
personal computers on and after 5 May 2000.
○ Onel de Guzman, a then-24-year-old resident of Manila, Philippines, created it.
Trojan Horse
● A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a
legitimate program. The delivery method typically sees an attacker use social engineering to
hide malicious code within legitimate software to try and gain users' system access with their
software.
● Unlike computer viruses or worms, a Trojan horse cannot replicate.
● A Trojan virus spreads through legitimate-looking emails and files attached to emails, which are spammed to
reach the inboxes of as many people as possible. When the email is opened and the malicious attachment is
downloaded, the Trojan server will install and automatically run every time the infected device is turned on.
Retrovirus
● A retrovirus is also referred to as an anti-anti-virus virus.
● This means that it tries to attack and disable any anti-virus or protective software on the system it is trying to
infect to avoid detection.
7
Some Important Information
● Trap door or Back Door
○ The trap door program threat is one in which the designer keeps a hole in the program, so it can be
handled only by the designer.
○ A trap door is kind of a secret entry point into a program that allows anyone to gain access to any system
without going through the usual security access procedures.
○ It is a method of bypassing normal authentication methods.
● Hacker
○ A hacker is a person who breaks into a computer system. The reasons for hacking can be many: installing
malware, stealing or destroying data, disrupting service, and more. Hacking can also be done for ethical
reasons, such as trying to find software vulnerabilities so they can be fixed.
○ Black hat hackers are motivated by malicious intent, they enter the system without taking owners’
permission. They hack systems illegally.
○ Gray hat hackers operate in the nebulous area in between — they're not malicious, but they're not always
ethical either. This type of hacking is still considered illegal. But they never share information with black
hat hackers.
● Spoofing
○ Spoofing is a broad term for the type of behaviour that involves a cybercriminal masquerading as a
trusted entity or device to get you to do something beneficial to the hacker — and detrimental to you.
○ Any time an online scammer disguises their identity as something else, it’s spoofing.
○ Spoofing attacks usually involve an element of social engineering, where scammers psychologically
manipulate their victims by playing on human vulnerabilities such as fear, greed, or lack of technical
knowledge.
■ Social engineering refers to all techniques aimed at talking a target into revealing specific
information or performing a specific action for illegitimate reasons.
8
■ Spoofers often know what strings to pull to manipulate a victim into taking the desired action –
in this example, authorizing a fraudulent wire transfer – without raising suspicion.
○ A successful spoofing attack can have serious consequences – including stealing personal or company
information, harvesting credentials for use in further attacks, spreading malware, gaining unauthorized
network access, or bypassing access controls.
○ For businesses, spoofing attacks can sometimes lead to ransomware attacks or damaging and costly data
breaches.
○ There are many different types of spoofing attacks – the more straightforward ones relate to emails,
websites, and phone calls.
■ The more complex technical attacks involve IP addresses, Address Resolution Protocol (ARP),
and Domain Name System (DNS) servers.
9
○ Website spoofing
■ Website spoofing – also known as URL spoofing – is when scammers make a fraudulent website
resemble a legitimate one. The spoofed website will have a familiar login page, stolen logos and
similar branding, and even a spoofed URL that appears correct at first glance.
■ Hackers build these websites to steal your login details and potentially drop malware onto your
computer. Often, website spoofing takes place in conjunction with email spoofing – for example,
scammers might send you an email containing a link to the fake website.
○ DNS spoofing
■ DNS spoofing – sometimes called DNS cache poisoning – is an attack in which altered DNS
records are used to redirect online traffic to a fake website that resembles its intended destination.
10
Spoofers achieve this by replacing the IP addresses stored in the DNS server with the ones the
hackers want to use.
○ IP Spoofing: An attacker disguises their IP address with a fake one to bypass security measures and gain
unauthorized access to a system.
○ Caller ID Spoofing: An attacker manipulates their caller ID to appear as a trusted source, such as a bank,
in order to trick the recipient into providing sensitive information.
● Phishing
○ Phishing is one of the most common forms of cyber attack wherein the intention is to acquire critical data
in the form of passwords, credentials, credit card numbers and so on, by sending email, messages and
links, disguised from sources which the victims have reason to trust.
○ Types of Phishing
■ Email Phishing: The phishing attack is carried out through malicious emails. It is the most
common form of phishing attack.
■ Spear Phishing: It is a form of phishing attack wherein the email is sent to specific targets such as
specific individuals, business or organizations. Intention might be to steal information or install
malware on the targeted victim’s system.
11
■ Whaling: Also known as CEO Phishing, this attack is essentially targeted towards business
leaders or senior executives of organizations. Since, it is a highly targeted form of attack and also
uses email as the primary medium for carrying out phishing; it is a combination of spear and
email phishing. In most cases, the intention is to initiate the transfer of funds.
■ Clone Phishing: As the name suggests, this attack involves the act of cloning or creating a
replica. The attacker clones/creates a replica of a legitimate or genuine email which an individual
might have had received from an authentic source. The forged email is identical to the genuine
email and is sent from a spoofed email id. It does contain malicious content like a link which if
clicked, results in the installation of malware in the victim’s system.
■ Angler Phishing: This kind of phishing attack uses social media as the medium for instigating a
cyber attack. Attempt is to steal data and information posted on social media platforms and
consequently force victims in divulging personal information.
■ Smishing: This attack makes use of text messages for tricking users. The messages usually
involve phone numbers for the user to call or a link to a website which is controlled by the
attacker.
■ Vishing (voice or VoIP phishing) is a type of cyber attack that uses voice and telephony
technologies to trick targeted individuals into revealing sensitive data to unauthorized entities.
● Spooling
○ Spooling is an acronym for simultaneous peripheral operation online. Spooling is the process of
temporary storage of data for use and execution by a device, program, or system.
○ Data is sent to and stored in main memory or other volatile storage until it is requested for execution by a
program or computer.
○ However, this temporary storage presents a potential security vulnerability.
○ Spooling attacks occur when an attacker gains unauthorised access to the spooling system and intercepts
the data while it is being processed. By accessing the spooling cyber security queue, an attacker can
capture sensitive information such as confidential documents, financial records, or intellectual property.
● Sniffing or Eavesdropping
○ “Sniffing” refers to the monitoring of internet traffic in real time. Packet sniffers are programs or
hardware devices that can spy on you and all of your internet activity.
○ Sniffers work by capturing internet traffic and analyzing the data streams to uncover the nature — or
even the specific contents — of data sent across a network. Just as cars make up road traffic, internet
traffic consists of packets of data traveling through a network.
12
○ Although we generally ignore most cars driving by, we’re likely to investigate if a truck pulls up in your
driveway.
○ Similarly, our computer ignores most traffic flowing through a network, and only inspects the specific
packets of data that are sent to it. Sniffers, then, are like a tollbooth — they are set up to inspect all cars
driving down the road, not just those that park in one driveway.
● Pharming
○ A pharming attack is a cyberattack in which victims are redirected or tricked into visiting a malicious
website. In a pharming attack, your device can be infected with malware and your personal data stolen.
13
● Skimming
○ Skimming occurs when devices illegally installed on ATMs, point-of-sale (POS) terminals, or fuel pumps
capture data or record cardholders’ PINs.
○ Criminals use the data to create fake debit or credit cards and then steal from victims’ accounts.
14
● Common Anti Viruses
○ Avast
■ HQ – Prague, Czech Republic
○ Kaspersky
■ HQ - Moscow, Russia
○ Norton by Symantec
■ HQ - Tempe, Arizona, United States
○ Bitdefender
■ HQ - Bucharest, Romania
○ McAfee
■ HQ - Santa Clara, California
15