Cyber Espionage, Infiltration and Combating Techniques: - by Atul Agarwal & CERT-IN
Cyber Espionage, Infiltration and Combating Techniques: - by Atul Agarwal & CERT-IN
Cyber Espionage, Infiltration and Combating Techniques: - by Atul Agarwal & CERT-IN
- Wikipedia
How?
• Done using exploitation methods on
the Internet, networks or individual
computers through the use of cracking
techniques and malicious software
including Trojan horses and spyware.
- Wikipedia
Attacking techniques
While targeting the end users, the following
attack techniques are commonly seen:
• Phishing
• Exploits
– Drive-by downloads
– Attachments
• Social Engineering
– USB Drive
– Trojan horses / backdoored software
Attack Types : By motive
• Generally, cyber attacks could be
categorized into two groups:
• Disabling Autorun
• Using Email Safely
• Using online document readers
• Using safe document readers (Sumatra, OpenOffice)
• Disable Javascript on PDF Readers
• Using safe browsers + NoScript
• Using OpenDNS
• Identifying Phishing (Phishtank)
• Identifying Executable extensions