Time
8 hours 33 minutes
Difficulty
Beginner
CEU/CPE
9

Video Transcription

00:05
the importance of cybersecurity can almost be summed up with one word. Information.
00:10
Social Security or credit card numbers. Trade secrets Classified national security information are just a few examples of information that malicious actors seek out for financial, political or personal gain.
00:23
Protecting access to this data is critical.
00:25
Malicious actors may use code scripts or other applications to breach systems in an attempt to obtain restricted data.
00:33
The shorthand term for any malicious software designed to damage or disrupt a computer system is known as malware. There are several types of male where each with its own purpose.
00:43
One of the most common types of Miller is a virus. A virus is a self replicating program that requires user activation to spread. Viruses are most commonly sent through email, removable media drives, Microsoft Office files and Adobe pdf files.
00:58
When a user executes the infected file, the virus performs desired actions on the system, including infecting other files.
01:06
Worms are self replicating programs that don't require user intervention to spread
01:11
worms, exploit vulnerabilities and operating systems and applications, and they use the networks to send copies of themselves to other computers. Worms cause harm by consuming band with the leading files or installing backdoors, enabling hidden access into a computer.
01:26
A Trojan horse is malicious code that sneaks past security monitoring by pretending to be a normal file.
01:32
However, when a user executes the Trojan file, it establishes a backdoor into the user system.
01:38
When activated, a Trojan enables a hacker to spy, steal data and perform virtually any function on the system. Spyware. As the term implies spies on user activity. It can capture information such as what programs and Web sites appear on the screen. What is in view of a webcam
01:56
and records keystrokes without the user's knowledge or consent.
01:59
A rook. It seeks to gain elevated privileges or root access on a system by using a kit or collection of software that implements malicious code with root level access to a system that hacker essentially owns. That system.
02:14
Ransom. Worrying Crips files on a computer and holds the data hostage Until the ransom is paid by the user, ransomware can restrict access the system data or resource is or display inappropriate images. A ransom must be paid within a set amount of time for the attacker to release their hold.
02:29
This type of male wear, which has steadily grown in notoriety, and the number of victims takes advantage of unpatched systems.
02:36
Another threat commonly leveraged. Buy malware are botnets. Botnets are a collection of computers that are used in a malicious way, such as attempting to connect to a computer over and over overwhelming it until it is rendered unresponsive, causing a denial of service attack an infected system, maybe participating as a body,
02:54
and one of these attacks without the user. Being aware.
02:58
This is known as a zombie
03:00
brute force is another attack carried out against the computer.
03:02
This attack uses a script or other application toe automate many consecutive guesses of a password or pin. One type of brute force is a dictionary attack where all words and a dictionary are used as guesses. Attacks like these are why password policies like requiring complex combinations or limiting the number of tries after unsuccessful attempts
03:23
are important.
03:23
While many of these attacks can be prevented by keeping system's updated and patched, hackers are always one step ahead, making tweaks to Mel, where changing its signature where anti virus and intrusion detection systems wouldn't recognize or alert on the new form of the infected file.
03:39
This is known as a zero day attack and attack, where patches, updates or mitigation strategies do not yet exist. Other threats target the people in an organization the most commonly known is social engineering. Social engineering is particularly dangerous, as it has a very high success rate,
03:58
does not require sophisticated technology to carry out,
04:00
and even the most secure environments cannot prevent it. In a social engineering attack, a malicious actor praise upon an unsuspecting individual to trick them into providing access to information. A system network were even a restricted area.
04:15
Social engineering attacks come in several forms, with many terms to describe them, starting with physical entry into a building or secure area where a key card or pen is needed for entry.
04:27
When an individual provides the means of authentication to be granted access into a restricted area and then allows another individual to follow behind them without authenticating that is known as tailgating. The tell gator may appear to have their hands full or provide a reasonable excuse as to why they don't have their access card, and the unwitting victim,
04:45
intended to be helpful has just provided unauthorized access.
04:48
Another tactic is shoulder surfing, just as it sounds, is when an unwelcomed prior is looking over someone's shoulder as they enter a password, a pen or reviewing sensitive information and attempt to learn that passcode or information. Arguably the most popular and successful social engineering scheme is fishing.
05:06
Fishing is when an attacker creates an email that looks legitimate
05:10
but actually contains an exploit, whether an attachment containing an infected file or linked to a malicious website
05:16
that a user unwittingly clicks and executes again. The human element is preyed upon by convincing the user to believe it's an email that needs their attention, such as a message from the bank or human resource is spearfishing is similar, but it is more narrowly focused, targeting a specific individual or organization
05:33
by containing details relating to the victim and may include spoofing a legitimate source,
05:39
convincing the victim the emails. Actually, from that source, year after year, security breach reports highlight that humans are the weakest link and security the vast majority of security breaches Were successful duty users falling victim to a social engineering attack, primarily fishing, but also the use of weak passwords and not keeping systems patched and up to date
05:59
security. Best practices, including routine trainings and awareness programs, are crucial to mitigating these threats
06:04
and protecting the security posture of an organization.

Up Next