8 Most Common Cybersecurity Threats | Types of Cyber Attacks | Cybersecurity for Beginners | Edureka

edureka!
18 Jul 201822:04

Summary

TLDRThis video script by Aria delves into the realm of cybersecurity threats, outlining eight common types including malware, phishing, password attacks, DDoS, man-in-the-middle, drive-by downloads, malvertising, and rogue software. It provides insights into how these threats operate and offers practical advice on prevention, emphasizing the importance of security measures, software updates, and user vigilance to safeguard against the ever-evolving landscape of cyber attacks.

Takeaways

  • 😷 Cybersecurity threats are a modern consequence of increased internet connectivity, similar to how pollution arose from the Industrial Revolution.
  • 🔒 Malware is an umbrella term for various cyber attacks, including viruses, Trojans, worms, and botnets, which aim to steal data or damage systems.
  • 🛡️ Prevention of malware involves avoiding suspicious links and attachments, using updated firewalls, and keeping operating systems current with security patches.
  • 🎣 Phishing attacks deceive users into revealing personal information through emails that appear to come from trusted sources but are actually fraudulent.
  • 🕵️‍♂️ Identifying phishing emails can be done by scrutinizing the sender's address, the content's tone, and hovering over links to reveal their true destination.
  • 🗝️ Password attacks involve methods like brute force, dictionary attacks, and keyloggers to gain unauthorized access to user accounts.
  • 🔄 Regularly updating passwords, using complex combinations, and avoiding common dictionary words can strengthen security against password attacks.
  • 🚫 DDoS (Distributed Denial of Service) attacks overwhelm networks with traffic, rendering them inoperable, and can be mitigated by monitoring traffic and maintaining system security.
  • 🕴️ Man-in-the-middle attacks intercept data transfers by impersonating both parties in a communication, highlighting the need for encrypted connections.
  • 🌐 Drive-by downloads occur when visiting a compromised website can automatically infect a device without user interaction, emphasizing the importance of updated software and cautious browsing.
  • 📰 Malvertising involves malware hidden in seemingly normal ads, which can be countered by using ad blockers and maintaining vigilance against suspicious online ads.
  • 🤖 Rogue security software tricks users into installing fake antivirus programs that claim to find threats, which can be prevented by skepticism and reliable security measures.

Q & A

  • What is the relationship between the Industrial Revolution and the current cybersecurity landscape?

    -The Industrial Revolution introduced pollution as a byproduct, similarly, the increased Internet connectivity has led to many security vulnerabilities, which in turn has given rise to various cyber attacks exploiting those vulnerabilities.

  • What is the purpose of the 'Threat Cloud' site mentioned in the script?

    -The 'Threat Cloud' site is a platform that visualizes real-time cyber attacks happening globally, showing compromised areas in red and the origin of attacks in yellow, helping users understand the scale and scope of ongoing cyber threats.

  • What are the eight common cybersecurity threats discussed in the script?

    -The script discusses malware, phishing, password attacks, DDoS attacks, man-in-the-middle attacks, drive-by downloads, malvertising, and rogue software as the eight common cybersecurity threats.

  • What is malware and how does it function?

    -Malware is an encompassing term for various cyber attacks, including Trojans, viruses, and worms. It is code with malicious intent, typically designed to steal data or destroy something on the computer. Malware can function in different ways, such as viruses attaching to clean files, Trojans disguising as legitimate software, worms spreading through networks, and botnets working under an attacker's control.

  • How can individuals and businesses protect themselves against malware?

    -Protection against malware involves avoiding clicking on unknown links or downloading attachments from untrusted sources, deploying a robust and updated firewall, and ensuring the computer's operating system is up-to-date with the latest security patches.

  • What is phishing and how has it evolved?

    -Phishing is a cyber attack that often poses as a request for data from a trusted third party, sent via email, asking users to click on a link and enter their personal data. It has evolved to become more sophisticated, making it difficult for users to discern legitimate requests from false ones.

  • What steps are involved in a phishing attack?

    -A phishing attack involves planning, setup, execution, recording of victim-entered information, and identity theft/fraud. The attacker decides on a target, gathers email addresses, creates methods for message delivery and data collection, sends the deceptive message, records the entered data, and uses it for illegal activities.

  • How can users protect themselves from phishing attacks?

    -Users can protect themselves from phishing by being aware of how phishing emails work, checking the sender's email address, hovering over links to see where they redirect, and reporting suspicious emails to administrators.

  • What are the different types of password attacks?

    -There are three common types of password attacks: brute-force attacks, which try possible password combinations systematically; dictionary attacks, which use common words or variations; and keylogger attacks, which record all keystrokes to capture login credentials.

  • What is a DDoS attack and how does it work?

    -A DDoS (Distributed Denial of Service) attack is an attempt to disrupt the service to a network by overwhelming it with traffic. Attackers use multiple computers to send a high volume of data, overloading the system until it can no longer function.

  • How can organizations prevent DDoS attacks?

    -Organizations can prevent DDoS attacks by keeping their systems secure with regular software updates, monitoring online security and data flow for unusual traffic spikes, and ensuring physical security of network connections.

  • What is a man-in-the-middle attack and how can it be prevented?

    -A man-in-the-middle attack is when a hacker impersonates both parties in a communication to intercept sensitive data. It can be prevented by using encrypted wireless access points, checking the security of connections, and using a virtual private network (VPN).

  • What is drive-by downloading and how can it be avoided?

    -Drive-by downloading is when malicious code is unintentionally downloaded onto a device just by visiting a compromised webpage, without the need for user interaction. It can be avoided by not visiting suspicious websites, keeping the browser and operating system updated, using safe search protocols, and employing comprehensive security software.

  • What is malvertising and how can users protect themselves from it?

    -Malvertising is the practice of injecting malware into seemingly normal advertisements. Users can protect themselves by using ad blockers, keeping their browser and related software updated, and exercising caution when encountering suspicious ads.

  • What is rogue software and how can it be prevented?

    -Rogue software is a type of scareware that tricks users into believing their computer is infected and prompts them to pay for a fake malware removal tool. Prevention includes having an updated firewall, using trusted antivirus or anti-spyware software, and maintaining a general level of skepticism on the internet.

Outlines

00:00

🔒 Introduction to Cybersecurity Threats

The video script introduces the concept of cybersecurity threats as a modern-day consequence of increased internet connectivity, similar to how pollution arose from the Industrial Revolution. The presenter, Aria, outlines the session's structure, which includes an examination of eight common cybersecurity threats and strategies to mitigate them. Aria also demonstrates the real-time nature of cyber attacks using the 'Threat Cloud' website, emphasizing the ubiquity and immediacy of these threats.

05:02

🐴 Understanding Malware and Its Impact

This paragraph delves into the specifics of malware, an umbrella term for various cyber attacks like Trojans, viruses, and worms. Malware is defined as malicious code designed to steal data or cause damage to computer systems. The paragraph explains how different types of malware operate, including viruses that infect clean files, Trojans that disguise themselves as legitimate software, worms that propagate through networks, and botnets that coordinate infected machines. Strategies to combat malware include avoiding suspicious links and attachments, deploying robust firewalls, and keeping operating systems and software up to date with the latest security patches.

10:04

🎣 Phishing Attacks: Deception and Identity Theft

Phishing is the focus of this paragraph, which describes it as a sophisticated method of cyber attack where fraudsters impersonate trusted entities to trick users into revealing sensitive information. The paragraph outlines the five steps of a phishing scam, from planning to execution, and the subsequent identity theft and fraud. Aria provides tips to identify phishing attempts, such as inspecting email addresses and hovering over links to reveal their true destination. A demonstration of a phishing attack is also included, showing how easily users can be deceived into entering their credentials on a fake website.

15:04

🔑 Password Attacks: Techniques and Prevention

The paragraph discusses password attacks, where hackers attempt to obtain or decrypt user passwords for unauthorized access. It describes three common methods: brute-force attacks that systematically guess passwords, dictionary attacks that use common words, and keylogger attacks that record keystrokes. The paragraph emphasizes the importance of best practices for password security, such as regular updates, using complex combinations of characters, and avoiding dictionary words to enhance protection against such attacks.

20:06

📡 DDoS and DoS Attacks: Disrupting Services

This paragraph explains Distributed Denial of Service (DDoS) and Denial of Service (DoS) attacks, which aim to overwhelm a network with traffic, rendering it non-functional. It details how attackers use multiple computers to flood a system with data and the potential consequences of such attacks, including severe legal repercussions. Prevention strategies include maintaining system security with updates, monitoring data flow for unusual traffic, and ensuring physical connections to the internet are secure.

🕵️‍♂️ Man-in-the-Middle Attacks: Intercepting Communications

Man-in-the-Middle (MITM) attacks are the subject of this paragraph, which describes how attackers impersonate both parties in a communication to intercept sensitive data. The paragraph discusses how MITM attacks exploit unencrypted wireless access points and manipulate address resolution protocols. Prevention measures include using encrypted wireless access points, verifying connection security, and employing a Virtual Private Network (VPN) to safeguard internet browsing.

🚗 Drive-by Downloads: Unintentional Malware Infections

Drive-by downloads are explored in this paragraph, highlighting how simply visiting a compromised website can lead to the unintentional downloading of malware. The paragraph explains the technical process behind these downloads and offers advice on avoiding them, such as staying away from suspicious websites, keeping browsers and operating systems updated, and using security software to protect devices.

📰 Malvertising: The Threat of Criminal Ads

Malvertising, or malicious advertising, is the focus of this paragraph, which describes how criminals use seemingly normal ads to infect users with malware. The paragraph explains the technical sophistication behind malvertising and the simplicity of its presentation to the user. It advises using ad blockers, keeping software updated, and exercising caution when encountering suspicious ads to prevent infection.

🛡 Rogue Security Software: The Scam of Fake Antivirus

The final paragraph addresses rogue security software, a type of scareware that tricks users into believing their computer is infected and prompts them to pay for a fake malware removal tool. The paragraph outlines the tactics used by rogue software, such as deceptive ads, pop-ups, and manipulated search engine results. Prevention strategies include having an updated firewall, installing trusted antivirus software, and maintaining a general level of skepticism when encountering unsolicited warnings or offers online.

Mindmap

Keywords

💡Cybersecurity Threats

Cybersecurity threats refer to a wide range of malicious activities that aim to exploit vulnerabilities in computer systems or networks to steal, corrupt, or delete sensitive information. In the video, cybersecurity threats are the central theme, with eight common types being discussed, illustrating the importance of understanding and mitigating these risks to protect personal and business data.

💡Malware

Malware, short for malicious software, encompasses a variety of cyber attacks including viruses, Trojans, worms, and botnets. The script defines malware as code with malicious intent that typically steals data or destroys computer functions. Examples in the script include viruses that infect clean files and worms that propagate through networks, emphasizing the need for robust cybersecurity measures.

💡Phishing

Phishing is a type of cyber attack where perpetrators disguise themselves as a trusted entity to trick individuals into revealing sensitive information. The video explains how phishing emails have become sophisticated, often mimicking legitimate requests from businesses like banks or online retailers. The script provides an example of a phishing email claiming to be from Amazon, highlighting the need for vigilance against such scams.

💡Password Attack

A password attack is an attempt to obtain or decrypt a user's password for unauthorized access. The video outlines three common methods: brute-force attacks, dictionary attacks, and keylogger attacks. The script emphasizes the importance of using strong, unique passwords and multi-factor authentication to protect against these threats.

💡DDoS Attack

Distributed Denial of Service (DDoS) attacks aim to disrupt the normal traffic of a targeted server, service, or network by overwhelming it with a flood of internet traffic. The script describes how attackers use multiple computers to send high volumes of data, leading to system overload and inaccessibility, illustrating the potential impact on businesses and the importance of preparedness.

💡Man-in-the-Middle Attack

A man-in-the-middle attack involves an attacker intercepting communications between two parties to read, modify, or inject malicious data. The video script explains how this can occur through unencrypted wireless access points and ARP spoofing, emphasizing the need for encrypted connections and secure protocols to prevent such attacks.

💡Drive-by Downloads

Drive-by downloads are a type of cyber attack where malicious software is downloaded and installed on a user's device without their knowledge, often by simply visiting a compromised website. The script describes how this can exploit outdated browsers or apps, underscoring the importance of keeping software up-to-date and using security software to prevent infections.

💡Malvertising

Malvertising, a portmanteau of 'malicious advertising,' refers to criminals using deceptive online ads to spread malware. The video script describes how these ads may appear normal but contain hidden code that redirects users to malicious servers, highlighting the need for ad blockers and caution when encountering unexpected ads.

💡Rogue Software

Rogue software, also known as scareware, is a type of malware that tricks users into believing their computer is infected and prompts them to pay for a fake malware removal tool. The script explains how these scams use various tactics, including pop-ups and manipulated search engine results, to deceive users, emphasizing the importance of skepticism and the use of trusted security software.

💡Multi-Factor Authentication

Multi-factor authentication (MFA) is a security measure that requires users to provide two or more verification factors to gain access to a resource. The video script mentions MFA as a best practice for enhancing password security, making it more difficult for attackers to gain unauthorized access, even if they have compromised a password.

💡Firewall

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. The script highlights the importance of deploying a robust and updated firewall to prevent the transfer of potentially harmful data files and to protect against various types of cyber threats, including malware and DDoS attacks.

Highlights

Pollution and security vulnerabilities are likened as side effects of the Industrial Revolution and increased Internet connectivity, respectively.

Cyber attacks exploit vulnerabilities and individuals/ businesses use various security measures and common sense to counter them.

The session will cover eight common cybersecurity threats and methods to avoid them.

Demonstration of 'Threat Cloud' shows real-time cyber attacks globally.

Malware is defined and categorized into viruses, Trojans, worms, and botnets.

Preventing malware involves avoiding suspicious links/attachments and deploying updated firewalls and OS security updates.

Phishing is explained as a sophisticated scam often mimicking trusted entities to steal personal data.

Phishing emails are identified by generic addresses, suspicious email origins, and redirect links.

Demonstration of a phishing attack using a fake Facebook login page to harvest credentials.

Password attacks are attempts to obtain or decrypt user passwords using various methods like brute force, dictionary attacks, and keyloggers.

Best practices for passwords include regular updates, use of alphanumeric characters, and avoiding dictionary words.

DDoS (Distributed Denial of Service) attacks explained and how they overload networks causing service disruption.

Prevention of DDoS attacks involves secure systems, software updates, and monitoring data flow for unusual traffic.

Man-in-the-middle attacks explained as intercepting communications to steal sensitive information.

Preventing MITM attacks requires encrypted wireless access points and secure connections.

Drive-by downloads are unintentional malware downloads from visiting compromised websites without user interaction.

Avoiding drive-by downloads includes staying away from suspicious websites and keeping browsers updated.

Malvertising is the use of malicious ads that infect users' devices without their knowledge.

Preventing malvertising includes using ad blockers and avoiding clicking on suspicious ads.

Rogue software is a type of scareware that tricks users into believing their computer is infected and requires payment for a fake removal tool.

Preventing rogue software involves having a firewall, trusted antivirus, and maintaining a healthy level of internet skepticism.

Transcripts

play00:00

[Music]

play00:06

just as pollution was a side effect of

play00:09

the Industrial Revolution so are the

play00:11

many security vulnerabilities that come

play00:13

with the increased Internet connectivity

play00:14

cyber attacks are exploitations of those

play00:17

vulnerabilities for the most part

play00:19

individuals and businesses have found

play00:21

ways to counter cyber attacks using a

play00:23

variety of security measures and just

play00:26

good old common sense hi guys my name is

play00:28

Aria and today's session is all about

play00:30

cyber security threats we are going to

play00:32

examine eight of the most common cyber

play00:34

security threats that your business

play00:36

could face and the ways to avoid them so

play00:39

before we actually jump into the session

play00:40

let me give you how the session will

play00:42

actually work we are going to discuss

play00:44

the most eight common cyber threats

play00:46

we're going to discuss in particular

play00:47

what they are how the threat works and

play00:49

how to protect yourself okay so now

play00:52

let's jump in now cyber attacks are

play00:54

taking place all the time even as we

play00:56

speak

play00:57

the security of some organization big or

play00:59

small is being compromised for example

play01:02

if you visit the site out here that is

play01:04

threat cloud you can actually view all

play01:06

the cyber attacks that are actually

play01:08

happening right now let me just give you

play01:10

a quick demonstration of how that looks

play01:12

like okay so as you guys can see out

play01:14

here these are all the places that are

play01:17

being compromised right now the red

play01:18

parts actually show us the part that is

play01:21

being compromised and the yellow places

play01:24

actually show us from where it's being

play01:26

compromised strong ok as you guys can

play01:28

see now that someone from the

play01:30

Netherlands is actually attacking this

play01:32

place and someone from USA was attacked

play01:34

in Mexico it's a pretty interesting site

play01:36

and actually gives you a scale of how

play01:38

many cyber attacks are actually

play01:39

happening all the time in the world

play01:41

ok now getting back I think looking at

play01:43

all these types of cyber attacks it's

play01:45

only necessary that we educate ourselves

play01:47

about all the types of cyber threats

play01:49

that we have so these are the 8 cyber

play01:52

threats that we are going to be

play01:53

discussing today firstly we're going to

play01:55

start with malware so malware is an

play01:58

all-encompassing term for a variety of

play02:00

cyber attacks including Trojans viruses

play02:03

and bombs malware is simply defined as

play02:06

code with malicious intent that

play02:08

typically steals data or destroy

play02:10

something on the computer the way

play02:12

malware

play02:13

about doing its damage can be helpful in

play02:15

categorizing what kind of malware you

play02:17

are dealing with so let's discuss it so

play02:19

first of all viruses like the biological

play02:22

namesakes viruses attach themselves to

play02:24

clean files and infect other clean files

play02:26

and they can spread uncontrollably

play02:27

damaging a systems core functionality

play02:30

and deleting or corrupting files they

play02:32

usually appear as executable file is

play02:34

that you might have downloaded from the

play02:35

internet then there are also Trojans now

play02:37

this kind of malware disguises itself as

play02:40

legitimate software or is included in

play02:42

legitimate software that can be tampered

play02:44

with it tends to act as creat lis and

play02:46

creates backdoors in your security to

play02:48

let other malware sin' then we have

play02:50

worms worms in fact entire networks of

play02:53

devices either local or across the

play02:55

internet by using the network's

play02:56

interfaces it uses each consecutive

play02:59

infected machine to infect more and then

play03:01

we have botnets and such where botnets

play03:03

are networks of infected computers that

play03:05

are made to work together under the

play03:07

controller of an attacker so basically

play03:09

you can encounter malware if you have

play03:11

some OS vulnerabilities or if you

play03:13

download some L legitimate software from

play03:15

somewhere or you have some other email

play03:17

attachment that was compromised with

play03:20

okay so how exactly do you remove

play03:22

malware or how exactly do you fight

play03:24

against it well each form of malware has

play03:27

its own way of infecting and damaging

play03:29

computers and data and so each one

play03:31

requires a different malware removal

play03:32

method the best way to prevent malware

play03:35

is to avoid clicking on links or

play03:36

downloading attachments from unknown

play03:38

senders and this is sometimes done by

play03:40

deploying a robust and updated firewall

play03:42

which prevents the transfer of large

play03:44

data files over the network in a hope to

play03:46

weed out attachments that may contain

play03:48

malware it's also important to make sure

play03:50

your computer's operating system whether

play03:52

it be Windows Mac OS Linux uses the most

play03:55

up-to-date security updates and software

play03:57

programmers update programs frequently

play03:59

to address any holes or weak points and

play04:02

it's important to install all these

play04:03

updates as well as to decrease your own

play04:05

system weaknesses so next up on our list

play04:08

of cyber threats we have phishing

play04:10

so what exactly is phishing well often

play04:13

posing as a request for data from a

play04:15

trusted third party phishing attacks are

play04:18

sent via email and ask users to click on

play04:20

a link and enter their personal data

play04:22

phishing emails have gotten much more

play04:25

sophisticated in recent

play04:26

and making it difficult for some people

play04:28

to discern a legitimate request for an

play04:31

information from a false one

play04:33

now phishing emails often fall into the

play04:35

same category as spam but are way more

play04:37

harmful than just a simple ad so how

play04:40

exactly does phishing book well most

play04:43

people associate phishing with email

play04:45

message that spoof or mimic bank credit

play04:48

card companies or other businesses like

play04:50

Amazon eBay and Facebook these messages

play04:53

look authentic and attempt to get

play04:55

victims to reveal their personal

play04:56

information but email messages are only

play04:59

one small piece of a phishing scam from

play05:01

beginning to end the process involves

play05:03

five steps the first step is planning

play05:05

the fissure must decide which business

play05:07

to target and determine how to get email

play05:09

addresses for the customers of that

play05:11

business then they must go through the

play05:14

setup phase once they know which

play05:16

business to spoof and who their victims

play05:18

are Fisher's create methods for

play05:20

delivering the messages and collecting

play05:21

the data then they have to execute the

play05:23

attack and this is the step most people

play05:26

are familiar with that is the Fisher

play05:27

sends the phony message that appears to

play05:29

be from a reputable source

play05:31

after that the Fisher records the

play05:33

information the victims enter into the

play05:35

webpage or pop-up windows and in the

play05:37

last step which is basically identity

play05:39

theft and fraud the Fisher's use the

play05:41

information they've gathered to make

play05:42

illegal purchases or otherwise commit

play05:44

fraud and as many as 1/4 of the victims

play05:47

never fully recover so how exactly can

play05:50

you be actually preventing yourself from

play05:52

getting fished well the only thing that

play05:55

you can do is being aware of how

play05:56

phishing emails actually work so first

play05:59

of all a phishing email has some very

play06:01

specific properties so firstly you will

play06:04

have something like a very generalized

play06:06

way of addressing someone like your

play06:07

client then your message will not be

play06:11

actually from a very reputable source so

play06:13

out here as you can see it's written as

play06:16

Amazon on the label but if you actually

play06:18

inspect the email address that it came

play06:20

from its from management at maison

play06:22

canada dot CA which is not exactly your

play06:24

legitimate Amazon address third you can

play06:26

actually hover over the redirect links

play06:29

and see where they actually redirect you

play06:30

to now this redirects me to wwf/e

play06:34

amazon.com as you can see out here so

play06:37

basically you know this is actually a

play06:39

phishing

play06:40

and you should actually report this

play06:42

email to your administrators or anybody

play06:44

else that you think is supposed to be

play06:46

concerned with this also let me give you

play06:48

guys a quick demonstration on how

play06:50

phishing actually works from the

play06:52

perspective of an attacker so first of

play06:56

all I have actually created a phishing

play06:59

website for harvesting Facebook

play07:01

credentials I simply just took the

play07:05

source code of the facebook login page

play07:07

and pasted it and then made a back-end

play07:09

code in PHP which makes a log file of

play07:12

all the Facebook passwords that get

play07:15

actually entered onto the phishing page

play07:16

now I've also sent myself an email as to

play07:20

make sure this looks legitimate but this

play07:23

is only for spreading awareness so

play07:25

please don't use this method for

play07:26

actually harvesting credentials that's

play07:29

actually a very legal thing to do so

play07:31

let's get started first of all you will

play07:33

go to your email and see that you get

play07:36

some email saying the our Facebook

play07:38

credentials has been compromised

play07:39

so when you open it it looks pretty

play07:42

legit well I haven't made it look all

play07:44

that legit it should look legit but the

play07:47

point out here is to actually make you

play07:48

aware of how this works

play07:49

so as you guys can see it says dear

play07:51

client we have strong reasons to believe

play07:53

that your credentials may have been

play07:54

compromised and might have been used by

play07:56

someone else we have locked your

play07:58

Facebook account please click here to

play08:00

unlock sincerely Facebook associate team

play08:03

so if we actually click here we are

play08:06

actually redirected to a nice-looking

play08:09

Facebook page which is exactly how

play08:11

Facebook looks like when you're logging

play08:13

in now suppose I were to actually log in

play08:16

to my Facebook account which I won't

play08:18

I'll just use some random ID like this

play08:20

is an email address email com and let's

play08:25

put password as admin one two three and

play08:28

we click login now since my facebook is

play08:32

actually already logged in it'll just

play08:34

redirect to facebook.com and you might

play08:36

just see me logged in but on a normal

play08:38

computer it'll just redirect you to

play08:40

www.facebook.com which should just show

play08:43

this site again okay so once I click log

play08:46

in out here all that the backend code

play08:48

that I've written in PHP out here will

play08:50

do

play08:51

is that it's gonna take all the

play08:54

parameters that have entered into this

play08:55

website that is my email address and

play08:58

password and just generate a log file

play09:00

about so let's just hit login and see

play09:02

what happens so as you guys can see I've

play09:04

been redirected to the original Facebook

play09:07

page that is not meant for phishing and

play09:09

on my system out here I have a log file

play09:14

and this log file will show exactly as

play09:17

you can see I've fished out the email

play09:19

address this is an email address email

play09:21

comm and it's also showed the password

play09:23

that is admin one two three so this is

play09:26

how exactly phishing works you enter an

play09:28

email address and you're entering the

play09:31

email address on a phishing website and

play09:33

then it just redirects you to the

play09:35

original site but by this time you've

play09:37

already compromised your credentials so

play09:39

always be careful when dealing with such

play09:41

emails so now jumping back to our

play09:43

session the next type of cyber attacks

play09:45

we are going to discuss is pass with the

play09:47

docs so an attempt to obtain or decrypt

play09:50

a user's password for illegal use is

play09:53

exactly what a password attack is

play09:55

hackers can use cracking programs

play09:57

dictionary attacks and password sniffers

play09:59

and password attacks password cracking

play10:01

refers to various measures used to

play10:03

discover computer passwords this is

play10:05

usually accomplished by recovering

play10:07

passwords from data stored in or

play10:09

transported from a computer system

play10:10

password cracking is done by either

play10:13

repeatedly guessing the password usually

play10:15

through a computer algorithm in which

play10:16

the computer tries numerous combinations

play10:18

until the password is successfully

play10:20

discovered now password attacks can be

play10:22

done for several reasons but the most

play10:24

malicious reason is in order to gain

play10:26

unauthorized access to a computer with

play10:28

the computer's owners awareness not

play10:30

being in place now this results in

play10:32

cybercrime such as stealing passwords

play10:34

for the purpose of accessing bank

play10:36

information now today there are three

play10:38

common methods used to break into a

play10:40

password-protected system the first is a

play10:42

brute-force attack a hacker uses a

play10:44

computer program or script to try to log

play10:47

in with possible password combinations

play10:49

usually starting with the easiest to

play10:50

guess password so just think if a hacker

play10:52

has a company list he or she can easily

play10:55

guess user names if even one of the

play10:57

users has a password one two three he

play10:59

will quickly be able to get in the next

play11:01

our dictionary attacks now a hacker uses

play11:03

a program or script

play11:05

try to login by cycling through the

play11:06

combinations of common woods in contrast

play11:09

with brute-force attacks where a large

play11:10

proportion key space is searched

play11:12

systematically a dictionary attack try

play11:15

is only those possibilities which are

play11:17

most likely to succeed

play11:18

typically derive from a list of words

play11:20

for example a dictionary generally

play11:22

dictionary attacks succeed because most

play11:24

people have a tendency to choose

play11:26

passwords which are short or such as

play11:29

single words found in the dictionaries

play11:30

or simple easy predicted variations on

play11:32

words such as appending a digit also now

play11:35

the last kind of password attacks are

play11:37

used by keylogger attacks a hacker uses

play11:40

a program to track all of the user's

play11:41

keystrokes so at the end of the day

play11:43

everything the user has typed including

play11:45

the login IDs and passwords have been

play11:47

recorded a key logger attack is

play11:49

different than a brute-force or

play11:50

dictionary attack in many ways not the

play11:52

least of which the key login program

play11:55

used is a malware that must first make

play11:57

it onto the user's device and the key

play12:00

logger attacks are also different

play12:01

because stronger passwords don't provide

play12:03

much protection against them which is

play12:05

one reason that multi-factor

play12:06

authentication is becoming a must-have

play12:08

for all businesses and organizations now

play12:11

the only way to stop yourself from

play12:13

getting killed in the whole password

play12:15

attack conundrum is by actually

play12:17

practicing the best practices that are

play12:19

being discussed in the whole industry

play12:21

about passwords so basically you should

play12:23

update your password regularly you

play12:25

should use alpha numerics in your

play12:27

password and you should never use words

play12:29

that are actually in the dictionary it's

play12:30

always advisable to use garbage words

play12:33

that makes no sense for passwords as

play12:35

they just increase your security so

play12:38

moving on we're going to discuss DDoS

play12:40

attacks so what exactly is a DDoS or a

play12:44

DOS attack well first of all it stands

play12:47

for distributed denial of service and a

play12:50

dos attacks focuses on disrupting the

play12:52

service to a network as the name

play12:53

suggests attackers send high volume of

play12:55

data of traffic through the network

play12:57

until the network becomes overloaded and

play12:59

can no longer function so there are a

play13:01

few different ways attackers can achieve

play13:03

dos attack but the most common is the

play13:05

distributed denial of service attack

play13:07

this involves the attacker using

play13:09

multiple computers to send the traffic

play13:11

or data that will overload the system in

play13:13

many instances a person may not even

play13:16

realize that his or her computer has

play13:18

been hijacked and a

play13:19

contributing to the DOS attack now

play13:21

disrupting services can have serious

play13:23

consequences relating to security and

play13:25

online access many instances of

play13:27

large-scale dos attacks have been

play13:28

implemented as a single sign of protests

play13:31

towards governments or individuals and

play13:33

have led to severe punishment including

play13:34

major jail time so how can you prevent

play13:37

dos attacks against yourself well

play13:40

firstly unless your company is huge it's

play13:42

rare that you would be even targeted by

play13:44

an outside group or attackers for a DOS

play13:46

attack your site or network could still

play13:48

fall victim to one however if another

play13:50

organization on your network is targeted

play13:52

now the best way to prevent an

play13:54

additional breach is to keep your system

play13:56

as secure as possible with regular

play13:58

software updates online security

play14:00

monitoring and monitoring of your data

play14:02

flow to identify any unusual or

play14:04

threatening spikes in traffic before

play14:06

they become a problem

play14:07

dos attacks can also be perpetrated by

play14:10

simply cutting a table or dislodging a

play14:12

plug that connects your website server

play14:14

to the Internet so due diligence in

play14:16

physically monitoring your connections

play14:18

is recommended as well okay so next up

play14:21

on a list is man-in-the-middle attacks

play14:23

so by impersonating the endpoints in an

play14:28

online information exchange the

play14:30

man-in-the-middle attack can obtain

play14:31

information from the end user and the

play14:33

entity he or she is communicating with

play14:36

for example if you are banking online

play14:39

the man in the middle would communicate

play14:40

with you by impersonating your bank and

play14:43

communicate with the bank by

play14:44

impersonating you the man in the middle

play14:46

would then receive all of the

play14:48

information transferred between both

play14:49

parties which could include sensitive

play14:51

data such as bank accounts and personal

play14:53

information so how does it exactly work

play14:56

normally an MIT M gains access through a

play14:59

non encrypted wireless access point

play15:01

which is basically one that doesn't use

play15:04

WEP WPA or any of the other security

play15:06

measures then they would have to access

play15:09

all the information being transferred

play15:11

between both parties by actually

play15:13

spoofing something called address

play15:15

resolution protocol that is the protocol

play15:17

that is used when you are actually

play15:19

connecting to your gateway from your

play15:20

computer so how can you exactly prevent

play15:23

MIT M attacks from happening against you

play15:25

firstly you have to use an encrypted W

play15:28

AP that is an encrypted wireless access

play15:30

point

play15:32

next you should always check the

play15:33

security of your connection because when

play15:36

somebody is actually trying to

play15:37

compromise your security he will try to

play15:39

actually strip down the SC DPS or SSDs

play15:42

that is being injected in the website

play15:44

which is basically the security

play15:46

protocols so if something like this

play15:48

HTTPS is not appearing in your website

play15:50

you're on an insecure website where your

play15:52

credentials or your information can be

play15:54

compromised and the last and final

play15:57

measure that you can actually use is by

play15:59

investing in a virtual private network

play16:01

which spoofs your entire IP and you can

play16:04

just browse the Internet

play16:05

with perfect comfort next up on our list

play16:08

is drive-by downloads so gone are the

play16:11

days where you have to click to accept a

play16:13

download or install a software update in

play16:15

order to become infected

play16:16

now just opening a compromised webpage

play16:19

could allow dangerous code to install on

play16:22

your device you just need to visit or

play16:24

drive by a webpage without stopping or

play16:27

to click accept any software add the

play16:29

malicious code can download in the

play16:31

background to your device a drive-by

play16:33

download refers to the unintentional

play16:35

download of a virus or malicious

play16:37

software onto your computer or mobile

play16:39

device a drive-by download will usually

play16:41

take advantage or exploit a browser or

play16:44

app or operating system that is out of

play16:45

date and has security flaws this initial

play16:48

code that is downloaded it is often very

play16:50

small and since this job is often simply

play16:53

to contact another computer of where it

play16:55

can pull down the rest of the code onto

play16:56

your smartphone tablet or other

play16:58

computers often a web page will contain

play17:01

several different types of malicious

play17:02

code in hopes that one of them will

play17:04

match a weakness on your computer so how

play17:07

does this exactly work

play17:08

well first you visit the site and during

play17:11

the 3-way handshake connection of the

play17:13

tcp/ip protocol a Bacchan script is

play17:16

triggered as soon as a connection is

play17:18

made vile the last ACK packet is sent a

play17:20

download is also triggered and the

play17:23

malware is basically injected into your

play17:25

system now the best advice I can share

play17:27

about avoiding drive-by downloads is to

play17:29

avoid visiting websites that could be

play17:31

considered dangerous or malicious this

play17:33

includes adult content file sharing

play17:35

websites or anything that offers you a

play17:38

free trip to the Bahamas now some other

play17:40

tips to stay protected include keep your

play17:43

internet browser and operating system

play17:44

up-to-date

play17:45

use a safe search protocol that warns

play17:47

you when to navigate to a malicious site

play17:49

and use comprehensive security software

play17:51

on all your devices like McAfee

play17:53

all-access and keeping it up to date

play17:56

okay so that was it about drive-by

play17:58

downloads next up is my lad vert icing

play18:01

or malvert icing so malvert icing is the

play18:04

name we in the security industry give to

play18:06

criminally controlled advertisements

play18:08

which intentionally infect people and

play18:10

businesses these can be any ad on any

play18:13

site often ones which you use as a part

play18:16

of your everyday internet usage and it

play18:18

is a growing problem as is evident by a

play18:20

recent US Senate report and the

play18:23

establishment of bodies like trust in

play18:25

ads now whilst the technology being used

play18:27

in the background is very advanced the

play18:30

way it presents to the person being

play18:31

infected is simple to all intents and

play18:34

purposes the advertisement looks the

play18:37

same as any other but has been placed by

play18:39

criminal like you can see the mint ad

play18:41

out here it's really out of place so you

play18:44

could say it's been made by a criminal

play18:45

now without your knowledge a tiny piece

play18:48

of code hidden deep in the advertisement

play18:50

is making your computer go to the

play18:52

criminal servers these and catalog

play18:55

details about your computer and its

play18:56

location before choosing which piece of

play18:58

malware to send you and this doesn't

play19:00

need a new browser window and you won't

play19:02

know about it so basically you're

play19:04

redirected to some criminal server the

play19:07

malware injection takes place and voila

play19:09

you're infected it's a pretty dangerous

play19:11

thing to be in so how exactly can you

play19:14

stop magnetising well first of all you

play19:17

need to use an ad blocker which is a

play19:19

very must in this day and age you can

play19:22

have ad blocker extensions installed on

play19:25

your browser whether it be Chrome Safari

play19:26

or Mozilla also regular software updates

play19:29

of your browser and other software's

play19:31

that work peripheral to your browser

play19:32

always help and next is some common

play19:36

sense any advertisement that is about

play19:38

lottery that's offering you free money

play19:40

is probably going to scam you and inject

play19:42

malware too so never click on those ads

play19:45

so the last kind of cyberattacks we are

play19:48

going to discover today and discuss

play19:50

about is rogue software so rogue

play19:52

security software is a form of malicious

play19:54

software and Internet fraud that

play19:56

misleads users into believing that there

play19:59

is a virus on their computer and

play20:00

manipulates them into paying money for a

play20:03

fake malware removal tool it is a form

play20:06

of scare that manipulates users through

play20:08

fear and a form of ransomware rogue

play20:10

security software has been a serious

play20:12

security threat in desktop computing

play20:14

since 2008 so now how does a rogue

play20:16

security software book these scams

play20:19

manipulating users into download the

play20:21

program through a variety of techniques

play20:22

some of these methods include ads

play20:24

offering free or trial versions of

play20:26

security programs often pricey upgrades

play20:28

are encouraging the purchase of the

play20:30

deluxe versions then also pop-ups

play20:33

warning that your computer is infected

play20:34

with the virus which encourages you to

play20:36

clean it by clicking on the program and

play20:38

then manipulated SEO rankings that put

play20:41

infected website as the top hits when

play20:43

you search these links then read

play20:45

directly to a landing page that claims

play20:47

your machine is infected and encourages

play20:49

you a free trial of the rogue security

play20:51

program

play20:51

now once the scareware is installed it

play20:54

can steal all your information slow your

play20:56

computer or corrupt your files disable

play20:59

updates for Less limit antivirus

play21:00

software or even prevent you from

play21:02

visiting less timet security software

play21:04

vendor sites while talking about

play21:06

prevention the best defense is a good

play21:08

offense and in this case an updated

play21:11

firewall makes sure that you have a

play21:12

working one in your office that protects

play21:15

you and your employees from these type

play21:16

of attacks it is also a good idea to

play21:19

install a trusted antivirus or anti

play21:21

spyware software program that can detect

play21:23

threats like these and also a general

play21:26

level of distrust on the internet and

play21:28

not actually believing anything right

play21:30

off the bat is the way to go ok guys so

play21:32

that was me about all the a different

play21:34

types of cyber threats and how they

play21:36

actually work and how you could prevent

play21:38

them I also hope you enjoyed the

play21:40

demonstration I showed about phishing

play21:42

that's it for me goodbye

play21:44

I hope you have enjoyed listening to

play21:46

this video please be kind enough to like

play21:49

it and you can comment any of your

play21:51

doubts and queries and we will reply

play21:53

them at the earliest do look out for

play21:56

more videos in our playlist and

play21:57

subscribe to any rekha channel to learn

play22:00

more happy learning

Rate This

5.0 / 5 (0 votes)

Related Tags
Cybersecurity ThreatsInternet SecurityMalware ProtectionPhishing AwarenessPassword SafetyDDoS AttacksMan-in-the-MiddleDrive-by DownloadsMalvertisingRogue Software