GEE LIE - Cyber Attacks Notes

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

GEE – LIE (Living in IT Era)

CYBER ATTACKS
PHISHING
 A form of social engineering and a scam where attackers deceive people into revealing sensitive
information or installing malware such as viruses, worms, adware, or ransomware.
 Phishing happens when a victim acts on a fraudulent email that demands urgent action.
 Examples of requested actions in a phishing email include:
1. Clicking an attachment
2. Enabling macros in a Word document

 Cybercriminals sent SMS messages that told recipients they should click a link to view important
information about an upcoming USPS delivery. The malicious link actually took victims to various web
pages designed to steal their Google account credentials.

Animation
Characters:
 Little Mermaid
 Bad Mermaid
 Good Mermaid
 Friendly Fish
Scene 1 Beach
2 Ocean
3 Palace
4 Beach
Types of phishing attacks
 Email Phishing
 Trap Phishing
 Spear Phishing
 Angler Phishing
 Voice Phishing, aka "Vishing"
 Text Phishing aka "Smishing"
 Pharming
PROTECT FROM PHISHING ATTEMPTS
 Email Filtering
 Use a secure web browser
 Install anti-phishing and account security tools
 Never click on links from pop-ups
1|Page
 Never connect to a public Wi-Fi hotspot without VPN

MALWARE
 Protecting against malware involves having robust cybersecurity measures in place; such as antivirus
software, firewalls, regular software updates, and user awareness training to prevent infections and
mitigate potential risks to computer systems and networks.

1. Antivirus software: Install reputable antivirus software on all devices to detect and remove malware
2. Firewalls: Utilize firewalls to monitor and control incoming and outgoing network traffic.
3. Regular Software Updates: keep operating systems applications and security software up to date
with the latest patches and updates.
4. Email Security: Avoid clicking on links or downloading attachments from unsolicited emails.
5. Secure Passwords: Implement strong password practices, such as using complex passwords and
enabling multi-factor authentication to add an extra layer of security.
6. User Education: Train employees on cybersecurity best practices, including how to recognize
phishing attempts, avoid downloading unknown software, and report any suspicious activities
7. Backup Data: Regularly back up important data to an external storage device or a secure cloud
service.
8. Access Control: Limit user access to sensitive data and systems based on their roles.
9. Network Segmentation: Divide the network into separate segments to contain malware outbreaks
and prevent them from spreading to other parts of the network.

SNOOPING
 is a broad term that can include casual observance of an email that appears on another person's computer
screen or watching that someone else is typing. More sophisticated snooping uses software to remotely
monitor activity on a computer or as communications data travels a network.
 Example: Electronic snooping is a keylogger, a program that monitors and captures keystrokes,
including passwords and login information, and can intercept email and other private communications
and data transmissions. Keyloggers are commonly installed on endpoint devices, such as pas and
laptops, and operate without user knowing. The keylogger creates a text file that captures every
keyboard command issued. Later, hackers who installed the keylogger retrieve the keystroke file and
analyze it to find information they can use for other malicious purposes, including accessing other
protected resources, bribery, or identity theft.
How to prevent electronic snooping attacks?
There are several methods users can practice to help reduce the chance of electronic snooping. Some common
examples are the following:
 Avoid using public Wi-Fi networks.
 Use secure Wi-Fi authentication techniques
 Conduct rogue Wi-Fi access point searches.
 Keep antivirus software updated.
2|Page
 Use strong passwords, and change them frequently
 Use encryption when transmitting and storing sensitive data.
 Know your surroundings, and turn computer screens away from surveillance cameras.

PHARMING
 An online fraud that involves the use of malicious code to direct victims to spoofed websites in an
attempt to steal their credentials and data.
 A two-step process that begins with an attacker installing malicious code on a victim’s computer or
server.

How Pharming works?


 Pharming works by exploiting the mechanics that enable people to browse the internet.
 The Domain Name System (DNS) translates the domain names or web addresses that people type in
their web browsers into Internet Protocol (IP) addresses, which enable computers to read them. An IP
address tells computer what a website’s location is then their web browser connects to a DNS server that
holds the IP address. When an internet user visits a specific website, their web browser stores a DNS
cache of that website, so it does not have to revisit the DNS server every time the user wants to visit the
same website in the future. The DNS cache and DNS servers are both vulnerable to planning attacks by
cyber criminals.
TYPES OF PHARMING ATTACK
1. Malware-based Pharming
2. DNS server poisoning
How to Protect Yourself from Pharming?
1. Deploy a reputable anti-virus solution.
2. Trust a trusted anti-virus.
3. Use a trusted internet provider.
4. Use secure websites.
5. Avoid suspicious websites.
6. Check website URLs for mistakes.
7. Avoid unknown links.
8. Avoid unusual e-commerce deals.
9. Use secure VPNS.
10. Change default passwords.
11. Enable authentication.
How to know if you are pharmed?
1. Unsecure connections
2. A website feels wrong
3. Security alerts

3|Page
SPOOFING
How to protect IP spoofing – tips for website owners:
 Monitor networks for unusual activity
 Use packet filtering systems capable of detecting inconsistencies
- Outgoing packets with source IP Addresses
 Use verification methods for all remote access
 Authentic all IP Addresses
 Use a network attack blocker
 Ensure at least some computer resources are behind a firewall

4|Page

You might also like