Planning Principles
Risk Analysis
Comprehensive
Security
Defence in depth
Minimum Permissions
What is Malware?
– A general name for evil software
– software intentionally designed to cause damage to
a computer, server, client, or computer network
Difference between Vulnerability-Specific and Universal Malware
– Vulnerability-specific malware requires a specific
vulnerability to be effective.
– Universal malware does not require a specific
vulnerability to be effectivere
What is Riskware?
What is Social Engineering?
Tricking the victim into doing something against his
or her interests
What is Fraud?
Lying to the user to get the user to do something
against his or her financial self-interest
What is Spam?
– Unsolicited
commercial e-mail
– Often fraudulent
What are E-Mail Attachments used for?
– link to a Website with
Malware
– This may complete
the fraud or download
software to the victim
What are Phishing Attacks?
– Sophisticated social
engineering attacks
– authentic-looking e-
mail or Website
What do Phishers do?
Credit Card Number Theft
– Performed by “carders”
– Make purchases with stolen credit card
Identity Theft
– Collecting enough data to impersonate
the victim in large financial transactions
– Can cause greater harm than carding
– May take a long time to restore the victim’s credit
rating
What is vandalism/sabotage?
Deliberate damage to hardware, software and/or
data, including companies’ websites
Why are Disgruntled and Ex-Employees dangerous?
– Extensive access to systems, with privileges
– Knowledge about how systems work
– Knowledge about how to avoid detection
What is a Logic Bomb?
– Destructive computer program that activates at a
certain time or in reaction to a specific event
What is a Back Door
Section of program code that allows a user to
circumvent security procedures and gain full access
to the system
What is hacking?
Hacking is intentionally using a computer
resource
– totally without authorisation
– or in excess of authorisation
What is Ransomware?
Ransomware Sequence
What is a Denial of Service (DOS) Attack?
– Install bots in devices e.g. IOT