Search for notes by fellow students, in your own course and all over the country.

Browse our notes for titles which look like what you need, you can preview any of the notes via a sample of the contents. After you're happy these are the notes you're after simply pop them into your shopping cart.

My Basket

You have nothing in your shopping cart yet.

Title: Security 1
Description: Security concepts

Document Preview

Extracts from the notes are below, to see the PDF you'll receive please use the links above


Delwin Thermtus
Cyber Security

Security 1

-

-

CIA Triad
o Confidentiality
o Integrity
o Availability
Malware
o Spyware
o Viruses/worms/rootkits
o Ransomware
o Bots/Botnets

-

Malware overview
o Specifically designed to compromise some(or all) facets of the CIA Triad
...
Spyware
a
...
Compromises confidentiality
b
...
Tracking cookies
ii
...
Keyloggers/Webcams
i
...
Records video/audio
d
...
Behavior tracking
ii
...
Workflow/ browsing habits
2
...
Malware designed to specifically to spread to other systems
i
...
Each has a specific signature
iii
...
It can compromise all facets of CIA depending on the specific
Virus/Worms/Rootkits
c
...
Local file system(Viruses)
ii
...
The operating system(Rootkits)
-

-

-

-

Viruses
▪ The user needs to run(or execute) a program for a virus to spread
o Viruses can be very bad or can be very annoying
o Trojans
▪ A virus that disguises itself as a non – malicious program
▪ Come into our mahcines unintentionally
▪ Anti – virus do not always detect the signature Trojan
Worms
o Malware that can reproduce itself
▪ Does not require a user to run(or execute) a program
▪ Leverages a vulnerability that allows it to self – execute
o Commonly requires an active network connection to spread
▪ Can infect multiple networked machines extremely fast
o Almost always BAD
Rootkits
o Malware that affects the Kernel
▪ The kernel connects hardware to software and is part of the OS
▪ A Rootkit can modify core OS files
▪ Those modified files can install additional malware
o A Rootkit can be installed in the BIOS
▪ A BIOS is what boots the hardware and start the OS
o Tough to detect and remove
Ransomware
o Data Theft
▪ Compromises confidentiality
▪ Company Data/Intellectual property and personal identifiable
information

o Hold the Data hostage
▪ Compromises AVAILABILITY
• Attacker Encrypts the Data
• Force the company/person to pay a Ransome to be able to
decrypt their Data
o An abuse of Encryption
▪ Hard to break strong Encryption
▪ Brute Force can take decades to guess the Decryption Key
▪ Important to have back – ups to restore from
o Extortion
▪ Force the company/person to pay a Ransome to keep their data from
being leaked
-

Bots/ Botnets
o Malware running on a machine executing tasks
▪ Without the users knowledge
o A Botnet is a network of Bot – infected machines reporting to a command and
control server(Cnc)
▪ Bots reach out at regular intervals to the Cnc(Beaconing)
o Botnets can combine their resources to accomplish task(s)

-

DDOS
▪ Distributed Denial Of Service
▪ Compromises AVAILABILITY
▪ Crashing a server w/ requests
o Cryptocurrency Mining
▪ Infected machines mine crypto
▪ Compromises INTEGRITY


Title: Security 1
Description: Security concepts