UNIT-4
UNIT-4
Cybersecurity threats refer to any potential attacks, vulnerabilities, or dangers that could lead
to unauthorized access, data breaches, or damage to digital systems, networks, and data.
These threats can be both active and passive, with each having its own characteristics,
methods of execution, and consequences.
Passive Attacks:
Passive attacks are those where the attacker monitors or eavesdrops on the
communication or system without actively disrupting or altering it.
Purpose: The main aim is to gather information (e.g., passwords, private
conversations, sensitive data).
Example: Sniffing or Traffic Analysis.
Active Attacks:
Active attacks involve an attacker actively trying to alter, disrupt, or damage the
system or network.
Purpose: The aim is to steal, modify, or destroy data, or disrupt system operations.
Example: Denial-of-Service (DoS) or Man-in-the-Middle (MITM) attacks.
1. Computer Virus:
o Definition: A computer virus is malicious software that attaches itself to a
legitimate program or file and spreads to other files and programs when
executed.
o Effect: Corrupts files, disrupts system operations, and can cause data loss or
system crashes.
o Example: ILOVEYOU virus, which spread via email in 2000.
2. Malware (Malicious Software):
o Definition: Malware is a broad category of harmful software designed to
exploit or damage systems. It includes viruses, worms, Trojans, spyware,
adware, etc.
o Effect: Malware can damage files, steal data, monitor user activities, or
disrupt system functioning.
o Example: Conficker, a well-known worm that infected millions of computers
globally.
3. Adware:
o Definition: Adware is software that automatically displays or downloads
unwanted advertisements on a user's computer.
o Effect: Slows down the system and floods the user with unwanted ads. It may
also track online behavior.
o Example: Unwanted pop-up ads that appear during internet browsing.
4. Ransomware:
o Definition: Ransomware is a type of malware that encrypts the user's files or
locks their system and demands a ransom to restore access.
o Effect: Critical data is held hostage until the victim pays the ransom, often
leading to financial and reputational damage.
o Example: WannaCry ransomware attack that affected computers worldwide
in 2017.
5. Spyware:
o Definition: Spyware is software that secretly monitors and collects
information from a user’s system without their consent.
o Effect: It can steal sensitive information like passwords, credit card details, or
track browsing habits.
o Example: Keyloggers, which record keystrokes to capture passwords.
6. Emotet:
o Definition: Emotet is a type of malware that functions as a loader, spreading
other types of malicious payloads like ransomware and stealing sensitive data.
o Effect: It spreads via phishing emails and can lead to massive data breaches
and financial loss.
o Example: Emotet campaigns often disguise malicious links or attachments in
emails.
7. Identity Theft:
o Definition: Identity theft occurs when cybercriminals steal someone’s
personal information to commit fraud or impersonate the individual.
o Effect: Affected individuals may suffer financial losses, credit damage, and
loss of reputation.
o Example: Using stolen personal information to open credit accounts in
another person’s name.
10. Phishing:
o Definition: Phishing is a type of cyberattack where attackers trick users into
divulging personal information, usually through fake emails or websites.
o Effect: The victim may provide sensitive information, which is then used for
fraudulent activities.
o Example: A fake email claiming to be from a bank asking for account details.
Risk Assessment:
Security Measures:
Security measures are the protocols, tools, and practices used to protect a network
from cyber threats.
Examples include firewalls, encryption, antivirus software, multi-factor authentication
(MFA), etc.
1. Data:
oSensitive information stored or transmitted across the network (e.g., personal
data, financial records).
o Security Measure: Use of encryption, access controls, and secure data
transmission protocols.
2. Applications:
o Software programs used on the network that may contain vulnerabilities.
o Security Measure: Regular application updates, secure software development
practices, and vulnerability scanning.
3. Systems:
o Hardware and operating systems that support network infrastructure.
o Security Measure: Installing security patches, using strong authentication
mechanisms, and securing endpoints.
4. Network:
o The actual physical and virtual communication pathways that allow data to
flow.
o Security Measure: Network segmentation, firewall rules, and intrusion
detection/prevention systems (IDS/IPS).
Firewall:
A firewall is a network security device that monitors and controls incoming and
outgoing network traffic based on predetermined security rules.
Function: It acts as a barrier between a trusted internal network and untrusted
external networks (e.g., the internet).
Types:
o Packet Filtering Firewalls
o Stateful Inspection Firewalls
o Proxy Firewalls
o Next-Generation Firewalls (NGFW)
Encryption/Decryption:
4. Prevention Measures