WEEK3 LESSON 1

Cards (9)

  • MODEM – SOFTWARE

    at RISK:
    Direct connections (exploits) to targets inside the network can be made

    Worst Case:
    Compromised software and devices inside the network
    Stolen information

    Attack Types: OS / Service exploitation

    Prevention Techniques
    ❖ Always update your software and OS
    ❖ Use a firewall
  • Operating System (or Service) Exploitation occurs when an attacker can use a known exploit within an operating system or other program to gain access to a system.
  • OS/ Service Exploitation

    The attacker can gain
    (a) full control over a user’s device,
    (b) monitor the user, or
    (c) read all information of the device.
  • A firewall is a piece of software that blocks incoming malicious requests to networks or computers. Firewalls can be enabled at a network or device level and typically do not block outgoing connections
  • WIFI MODEM SOFTWARE
    at RISK:
    Any information that flows through the modem, whether wireless or not
    Worst Case:
    Stolen credentials for any websites
    Fraudulent information provided to the user
    Attack Types :
    Man-in-the-Middle
    Prevention Techniques
    Encrypt WI-FI network using a password and secure mechanisms
    ❖ Only allow trusted sources in your network
  • In man-in-the-middle attack, the attacker sits between two people in a transaction. The attacker can not only view all the information sent or received but could modify the same.
  • DATABASE SOFTWARE
    at RISK:
    Any information stored in the database (such as usernames / passwords / credit card details)

    Worst Case:
    The attacker can trick the system into providing all of the data which could then be sold to the highest bidder.

    Attack Types:
    SQL injection
    Service exploitation

    Prevention:
    Up-to-date software
    ❖ Software security audits
  • COMPUTER SOFTWARE
    What is at Risk?
    ❖ Any information that is stored on or put into the computer
    ❖ Other devices inside the network
    Monitoring a user through webcam and microphone
    Worst Case:
    Stolen information including usernames / passwords and personal data
    Attack Types
    Malware
    OS / Service exploitation
    Prevention Techniques
    Use an up-to-date antivirus and firewall
  • COMPUTER SOFTWARE
    Attack Types:
    Malware
    Viruses - designed to spread from host to host, and has the ability to replicate itself.
    Worms - spread copies of itself from computer to computer
    ❖ Trojans - looks legitimate but can take control of your computer
    ❖ Bots
    ❖ Spyware
    Adware
    ❖ Keyloggers
    ❖ Ransomware