cyber security notres module 1
cyber security notres module 1
In this article, you will discover some social engineering risks and how to
recognize and avoid them.
## Understanding Cybersecurity Risks
Cybersecurity risks have emerged as a crucial concern for IT companies.
They can lead to the loss of confidentiality, integrity, or availability of
information and can adversely impact an organization's operations, including
its mission, functions, image, or reputation. Therefore, understanding and
managing cybersecurity risk is fundamental to cybersecurity strategy.
## What are Vulnerabilities?
Vulnerabilities are weaknesses in a computer or network that leave it
susceptible to exploitation, such as unauthorized access. These can include
weaknesses in security procedures, internal controls, or physical
configurations, as well as bugs that allow attackers to bypass security
measures.
## What are Vulnerability Threats?
A threat is anything capable of harming an asset or organization. Threats can
be adversarial (from individuals or groups), accidental (from users or
administrators), structural (from IT equipment or software), or environmental
(natural disasters or infrastructure failures).
## Social Engineering
Social engineering is a non-technical intrusion that relies heavily on human
interaction. Attackers often trick individuals into not following normal
security procedures, exploiting the natural human tendency to trust others.
### Common Social Engineering Techniques
1. Simple Direct Request: An attacker may directly ask for information or
data. While this method is not the most successful, it is still used.
2. Dumpster Diving: This involves searching through trash to find
discarded information that can be used for identity theft.
3. Raiding Mailboxes: Illegally opening and stealing contents from
someone else's mailbox can provide additional information to use against
them.
4. Phishing: A type of online scam where criminals send emails that appear
to be from legitimate companies, asking for sensitive information.
5. Impersonation: Attackers pretend to be someone in authority, such as IT
support or a trusted vendor, to gain access to information.
6. Surfing Company Websites: Many corporate details can be gathered
from company websites, including employee contact information and
organizational charts.
### Staying Vigilant
Social engineering techniques are constantly evolving, so it's essential to
remain vigilant to avoid becoming a victim.
## An Intruder's Tool Kit
Hackers frequently post new tools online, making it easier for them to exploit
systems. Awareness of these tools can help you implement preventive
measures and recognize hacking attempts.
### Common Hacking Tools
- Vulnerability Scanning: Hackers scan networks to identify vulnerabilities.
- Password Cracker: Programs that attempt to log in using guessed
passwords.
- Network Spoofing: Programs that impersonate legitimate systems to
collect passwords.
- Viruses and Worms: Malicious programs that infect files and spread
across networks.
- Ransomware: Malicious software that encrypts files and demands a
ransom for decryption.
- Denial of Service Attacks: Attacks that disrupt services by overwhelming
systems with requests.
## Social Engineering Defense
The human factor is often the weakest link in security. To protect against
social engineering, you must be aware of potential risks and follow security
protocols.
### Best Practices for Internet Safety
- Maintain strong security controls on network servers and desktops.
- Use firewalls to filter internet traffic.
- Regularly update IT resources with the latest patches.
- Be aware of cybersecurity risks and how to manage them.
Email and messenger attacks, such as spoofing, phishing, etc., can harm
many users. An attachment might contain a "reverse-connected shellcode"
in encoded form so that antivirus/EDR tools cannot identify it as a threat.
However, when you click on it, the shellcode "reverse-connects" to the
attacker's computer, thereby creating a valid session.
You will find one interesting phishing attempt using email in the screenshot
below.
❌ DON'T
You may receive emails even from your bank user asking you
to update your account by clicking a link. The link in such
emails will likely take you to a malicious website. Do not click
such links!
Do not open attachments or run macros if you have opened an
email from an unknown sender.
Do not respond to suspicious emails.
Do not forward suspicious emails.
Do not enter your credentials after clicking links.
Do not share your government ID information (passport
number, driver's license number, etc.) with others.
Do not click links embedded in spam emails, even if they seem
secure or correct.
✅ DO
The best way to deal with a suspicious or unwanted email is to
report it by clicking the "Check SPAM/Malicious" button in
Outlook or the "Report Phish" button in Outlook for
Windows/Mac/iOS/Android and Outlook Web Access.
You can delete the malicious email after the Report Phish action is
completed. Data Privacy
Quickly learn about Data Privacy and potential threats
🌐⚠️External Threats
External threats generally relate to potential risks and vulnerabilities that
originate outside the organization. When connected to the internet, all
computers and networks—including Test IO's network—are susceptible
to external attacks and unauthorized use or access by intruders
(hackers). They aim to steal, corrupt, or disrupt our resources, often using
techniques like phishing, malware, ransomware, SQL injection and
distributed denial of service (DDoS) attacks.
One compromised computer can affect every other computer on the
network.
👤⚠️Insider Threats
Insider threats typically refer to potential risks and vulnerabilities that
originate within the organization:
Inadvertent mistakes by personnel
Intentional misuse (e.g., access by a malicious employee
outside the scope of their duties)
Bugs in automated test scripts where the test data is a
copy of production data
These can come from employees, contractors, or anyone with
internal access to the system or data. These threats, whether
made intentionally or unintentionally, can lead to unauthorized
access, data leakage, misuse of data, alteration, or even
deletion of data.
Confidentiality classes:
Public—Freely shared information
Confidential—Any nonpublic and non-strictly confidential data
that, if leaked, lost, or damaged, can cause harm to the data
originator, owner, company, or customer. This class includes
most of the information at Test IO.
Strictly confidential—Any data that, if leaked, lost, or
damaged, can cause significant harm to the data originator,
owner, company, or customer. This class of information must
be protected and accessed with utmost care.
📁🔒Personal Data
The fundamental principle of data privacy is safeguarding personal
information from unauthorized or unlawful access and misuse.
So, understanding what constitutes personal information helps you better
recognize it and apply appropriate safeguards when handling such data,
ensuring it is stored, used, and shared securely and in compliance with
relevant privacy laws and company policies.
At Test IO, PII is divided into two different levels, with different internal
processes and controls regarding their usage.
🔒🚫 Strictly Confidential
Information
Special categories of data, such as personal health information (PHI),
payment card information (PCI), and customer intellectual property,
involve highly sensitive information that, if lost, compromised, or disclosed
without authorization, could cause significant harm.
Due to the sensitive nature of this data, it is subject to specific legal and
regulatory protections. Improper handling can lead to significant penalties
and reputational damage for the company. Therefore, these categories of
data are usually classified as strictly confidential and require high levels of
protection from all parties involved.
Strong Passwords
o Use strong, unique passwords for all your accounts.
o Avoid using easily guessable information such as names
or birthdays.
o Enable two-factor authentication (2FA) whenever
possible.
o If you are in a public place, shield your device while
entering the password. You never know who is watching
or recording your activity.
Educate Yourself
o Stay informed about common phishing techniques and
scams to recognize and avoid them.
Additional Tips
Review App Permissions
o Regularly review and manage app permissions on your
mobile device to limit unnecessary access to your data.
✅ DOs:
Set strong passwords.
Lock your devices when not in use.
Keep your software up to date, including your
operating system and browser.
Restrict access to your computer when you’re not
using it.
Be cautious online: Be careful about what you
receive and who you talk to.
❌ DON’Ts:
Don’t share passwords or any sensitive
information.
Don’t leave your devices unattended.
Don’t use outdated/unsupported software.
Don’t allow others to access your computer
when you're not using it.
Don’t open suspicious emails or click on
unfamiliar attachments or links.
⛔ Prohibited Activities
You are not allowed to use, store, or transmit any of the
following:
Peer-to-peer (P2P) software, like torrent clients,
unless it’s authorized.
Software for sharing copyrighted material,
like music or movies, without permission.
Pornography software or viewing pornography
websites.
Key generators and cracking software,
including tools for hacking Wi-Fi.
Anonymizers and software that bypass network
monitoring or tracking systems.
Outdated or unsupported software that is
vulnerable.
Non-standard encryption tools.
Cryptocurrency mining software or using
company resources for personal profit.
Hacking software for attacking infrastructure or
applications.
Screenshot or
screencast?
In general, functional bugs require a screencast to be
illustrated properly and effectively. Unless the
instructions or the team leader asks for specific
attachments, use the following rule of thumb to
determine whether a screenshot or a screencast is
required for your bug:
Whenever an action is required to trigger a bug or
when a process needs to be illustrated, upload a
screencast. Screenshots as static images are
snapshots and cannot illustrate the root cause.
Functional bugs will always require a screencast for
that reason.
When the nature of a bug is static, e.g. for static
GUI problems, a screenshot is enough and a better
visualization than a video. Screenshots should be
enough for Content or Visual issues.
General attachment
requirements
New attachments have to be created for every bug
report or reproduction.
It is prohibited to copy attachments from other bug
reports or reproductions.
Attachments must show all relevant bug
information to serve as proof.
All relevant information must be displayed in
English (or optional German if the bug report
language is German), e.g. the date, time system
information, and error messages.
You should select only one device or browser when
you are reporting the bug, and upload only
attachment for it. If you are able to reproduce the
bug in other devices or browsers, please mention
this in your Actual result.
Don’t show any information about other Test IO
customers that can be related to Test IO (e.g.
invitation emails or browser tab names). Showing
installed apps of other customers is permitted.
Don't show any personal information or
unprofessional data such as pictures, videos or
autocorrect bad word suggestions. Remember your
attachments will be available to other testers, to
the test IO staff and to the customer so be careful
with what you're showing on them.
For website tests, the URL field must be visible on
attachments.
The resolution must be high enough so that the text
and elements can be easily identified.
Please always record your whole screen.
A crash log is mandatory for bug reports and
positive reproductions of app crashes. The video
that documents the crash has to correspond to the
attached crash log, i.e. timings must be coherent.
What needs to be
included in a screenshot?
Screenshot-specific rules:
The screenshot has to be in JPG or PNG file format.
Highlight the bug on your screenshot.
We recommend recording tools and best practices in the
following article: Screenshots
Screencast-specific rules
for Streaming devices:
Always record your whole TV Screen.
Screencast should have high resolution and good
quality.
The ambient light should not be dark.
Your TV Remote must be visible in the screencast.
Also, the remote must be fully and clearly visible.
The current date and time must be shown in the
attachment. You can show the current date on the
TV itself, or on some external device such as a PC,
phone, or tablet.
For Bug Reports, the maximum time for a
screencast is 60 seconds, while for Bug
Reproductions and User Story Attachments, the
maximum time is 15 seconds.
Don't record any noise (baby screaming,
conversations, TV, music, pets, etc.).
Screencast should always look professional, do not
record your legs, messy TV stand, or similar.
Screencasts
How do I record my screen?
Creating Screencasts
You’re free to choose any tool to create screencasts. It’s
important, that you provide a .mp4 video of appropriate
quality (resolution and presentation).
Bandicam (free)
Windows only
Videos can be created as .mp4 files
Has mouse click effects (need to be enabled in
Options)
Optional upgrade with more functions
The free version leaves a watermark
Tools on different OS
Windows
Mac OS
Android
iOS/iPadOS
Taking a screenshot on your Apple Device is as
easy as pressing two buttons (literally!):