PACE-IT: Common Security Threats - YouTube

Channel: unknown

[15]
Hello, I'm Brian Ferrill, and welcome to PACE I T's session on common security threats.
[22]
Today, we're going to discuss directed security threats and then we will move on to security
[28]
threats that are more along the lines of opportunity attacks. With that, let's go ahead and begin
[34]
this session. I'm going to begin by stating that not all
[39]
attacks fall into a neatly confined category. Many times, different attacks are combined
[46]
to increase their effectiveness. Now, let's move on to directed security threats.
[54]
Now, directed security threats are those security threats, or those attacks, that are intentional in nature.
[62]
The first one that we'll mention is shoulder surfing. That is where someone
[68]
is looking over your shoulder in an attempt to gain access to information that they're
[73]
not supposed to have. That's where they watch you type in your password or your PIN.
[78]
As a side note, the user doesn't need to be present for shoulder surfing to occur, you can just
[85]
leave your PC running without a screensaver. Then there's social engineering. This is where
[93]
social pressure is applied to get a user to divulge information or secrets. Social engineering
[99]
can occur in person, over the phone, through email, fake memos, so on and so forth-anything
[106]
that tricks the user into divulging information that they shouldn't.
[112]
Now, there are several different types of social engineering attacks. The first one
[117]
we're going to mention is phishing. Phishing is an attempt to get the end user to divulge
[122]
sensitive information, as in usernames and passwords or bank account numbers. Phishing
[128]
always occurs through electronic media, through email or through websites.
[134]
Which brings us to pharming-pharming is closely related to phishing, but it can be more passive in nature.
[141]
Pharming specifically uses a Web page or site to glean sensitive information.
[148]
The attacker develops a fake website and entices the end user into putting in their credentials,
[155]
and then the attacker gleans that information. Now, let's move on to opportunity security threats.
[163]
These are more along the lines of threats by opportunity. They exploit weaknesses
[169]
and vulnerabilities. The first opportunity security threat we're going to mention is malware.
[176]
Malware is a broad category. It's usually defined as malicious software that
[181]
has the intent of causing harm. But it can also describe legitimate code that is written poorly.
[189]
It's so broad that it actually covers any code based security threat.
[194]
The first one that we're going to mention is rootkits. Rootkits are stealth software
[200]
that take over the root account-the administrative account. Rootkits attempt to hide their presence
[206]
from the end user and antivirus through their authority level. Rootkits can be extremely
[212]
difficult to remove because of their level of access to the system. They may actually
[217]
overwrite the boot sector, so that you can't remove them easily and need to actually reformat
[223]
the whole hard drive. Another type of malware is spyware.
[229]
Spyware is software that installs itself with the intent of collecting user data or information
[235]
on habits without the user's consent. It's often configured to collect this information
[243]
and then send it to a remote site at a specified time, or it can just store it in a hidden
[249]
file and wait for the attacker to come by and collect it. It has to have a host file
[255]
in order to operate. When the host file is run, the virus is executed, and then whatever
[261]
payload is there is also executed. Now, there are different types of viruses.
[267]
There's a program or application virus, and it attaches itself to a program or application
[272]
of course. There's a boot sector virus. Now, this attaches itself to the boot sector of
[277]
the PC. When the PC boots up, the payload is delivered. There are polymorphic viruses.
[285]
They attempt to hide their presence by changing their signature on a regular basis. There
[290]
are stealth viruses. That would be like your rootkit. Then there are multipartite viruses.
[296]
They combine several components into one packet. None of the components on their own are effective.
[302]
Now, viruses can combine several of these into one package and it would still be called a virus.
[310]
Now, worms are different than viruses.
[313]
Worms are malware that do not need a host file. They exploit network resources and services
[320]
to propagate and to move. They are self-replicating, unlike viruses. Worms mainly consume network
[327]
resources, often resulting in a downed network. Now, Trojans are malware that hides its purpose
[335]
by disguising itself as something that the end user desires. They often come in games,
[340]
free games in particular. The end user gets tricked into downloading the Trojan and the
[346]
virus package is delivered. This is often the attack vector that is used to establish
[352]
botnets or zombie nodes. That concludes this session on common security threats.
[359]
We briefly discussed directed security threats and then threats of opportunity.
[365]
Now, on behalf of PACE I T, thank you for watching this
[368]
session and I'm sure we will do some more soon.