GEE LIE - Cyber Attacks Notes
GEE LIE - Cyber Attacks Notes
GEE LIE - Cyber Attacks Notes
CYBER ATTACKS
PHISHING
A form of social engineering and a scam where attackers deceive people into revealing sensitive
information or installing malware such as viruses, worms, adware, or ransomware.
Phishing happens when a victim acts on a fraudulent email that demands urgent action.
Examples of requested actions in a phishing email include:
1. Clicking an attachment
2. Enabling macros in a Word document
Cybercriminals sent SMS messages that told recipients they should click a link to view important
information about an upcoming USPS delivery. The malicious link actually took victims to various web
pages designed to steal their Google account credentials.
Animation
Characters:
Little Mermaid
Bad Mermaid
Good Mermaid
Friendly Fish
Scene 1 Beach
2 Ocean
3 Palace
4 Beach
Types of phishing attacks
Email Phishing
Trap Phishing
Spear Phishing
Angler Phishing
Voice Phishing, aka "Vishing"
Text Phishing aka "Smishing"
Pharming
PROTECT FROM PHISHING ATTEMPTS
Email Filtering
Use a secure web browser
Install anti-phishing and account security tools
Never click on links from pop-ups
1|Page
Never connect to a public Wi-Fi hotspot without VPN
MALWARE
Protecting against malware involves having robust cybersecurity measures in place; such as antivirus
software, firewalls, regular software updates, and user awareness training to prevent infections and
mitigate potential risks to computer systems and networks.
1. Antivirus software: Install reputable antivirus software on all devices to detect and remove malware
2. Firewalls: Utilize firewalls to monitor and control incoming and outgoing network traffic.
3. Regular Software Updates: keep operating systems applications and security software up to date
with the latest patches and updates.
4. Email Security: Avoid clicking on links or downloading attachments from unsolicited emails.
5. Secure Passwords: Implement strong password practices, such as using complex passwords and
enabling multi-factor authentication to add an extra layer of security.
6. User Education: Train employees on cybersecurity best practices, including how to recognize
phishing attempts, avoid downloading unknown software, and report any suspicious activities
7. Backup Data: Regularly back up important data to an external storage device or a secure cloud
service.
8. Access Control: Limit user access to sensitive data and systems based on their roles.
9. Network Segmentation: Divide the network into separate segments to contain malware outbreaks
and prevent them from spreading to other parts of the network.
SNOOPING
is a broad term that can include casual observance of an email that appears on another person's computer
screen or watching that someone else is typing. More sophisticated snooping uses software to remotely
monitor activity on a computer or as communications data travels a network.
Example: Electronic snooping is a keylogger, a program that monitors and captures keystrokes,
including passwords and login information, and can intercept email and other private communications
and data transmissions. Keyloggers are commonly installed on endpoint devices, such as pas and
laptops, and operate without user knowing. The keylogger creates a text file that captures every
keyboard command issued. Later, hackers who installed the keylogger retrieve the keystroke file and
analyze it to find information they can use for other malicious purposes, including accessing other
protected resources, bribery, or identity theft.
How to prevent electronic snooping attacks?
There are several methods users can practice to help reduce the chance of electronic snooping. Some common
examples are the following:
Avoid using public Wi-Fi networks.
Use secure Wi-Fi authentication techniques
Conduct rogue Wi-Fi access point searches.
Keep antivirus software updated.
2|Page
Use strong passwords, and change them frequently
Use encryption when transmitting and storing sensitive data.
Know your surroundings, and turn computer screens away from surveillance cameras.
PHARMING
An online fraud that involves the use of malicious code to direct victims to spoofed websites in an
attempt to steal their credentials and data.
A two-step process that begins with an attacker installing malicious code on a victim’s computer or
server.
3|Page
SPOOFING
How to protect IP spoofing – tips for website owners:
Monitor networks for unusual activity
Use packet filtering systems capable of detecting inconsistencies
- Outgoing packets with source IP Addresses
Use verification methods for all remote access
Authentic all IP Addresses
Use a network attack blocker
Ensure at least some computer resources are behind a firewall
4|Page