Technical and Non-Technical Threats to Organizations

Technical and Non-Technical Threats to Organizations

Several threats to organizations are capable of doing large damage. These are either technical or non-technical (environmental, human, and procedural).

Technical Threats

  • Botnets: A botnet is a collection of hacked computers operated by cybercriminals. Bot herders scan for vulnerabilities, infect systems, and use them for malicious activities, such as DDoS (Distributed Denial-of-Service) attacks. EG the Mirai botnet in 2016 that infected IoT devices, leading to a massive DDoS attack.
  • Denial-of-Service (DoS) & Distributed Denial-of-Service (DDoS) Attacks: These attacks overwhelm a system with requests, making it unavailable for the average person to use, it can be:
    • Application-layer flooding: In this attack type, an attacker simply floods the service with requests from a spoofed IP address in an attempt to slow or crash the service
    • Unintended DoS (accidental overuse)
    • DDoS (many computers attacking one target) EG The 2018 DDoS attack on GitHub flooded the site with 1.35 Tbps traffic.
      • Mitigation: Firewalls, anti-DDoS software, network traffic analysis.
  • Hacking:
    • Cross-Site Scripting (XSS): Injecting malicious scripts on trusted sites. Mitigation: Input validation, secure cookies.
    • Password Cracking: Cracking passwords with software. Mitigation: Secure password policies.
    • SQL Injection: Placing bad SQL code in databases. Example: 7-Eleven hack exposed 130 million credit card numbers. Mitigation: Secure coding standards.
    • Waterhole Attacks: Contaminating widely used areas (e.g., coffee shops' Wi-Fi). Mitigation: Avoid public Wi-Fi, use VPNs.
    • Fake Wireless Access Points (WAPs): Setting up rogue Wi-Fi hotspots to intercept data. Mitigation: Use VPNs, avoid foreign networks.
    • Eavesdropping: Passive interception of data (emails, calls). Mitigation: Use encrypted communications.
    • Clickjacking: Hiding malicious buttons on legitimate sites. Mitigation: Firewall HTTP scanning.
    • Cookie Theft: Stealing session cookies to impersonate users. Mitigation: Secure HTTPS encryption.
    • Bait-and-Switch: Tricking users into installing malware through fake ads. Mitigation: Download from trusted sources only.
  • Malware Attacks:
    • Viruses: Replicating code that spreads over networks.
    • Trojans: Malware pretending to be legitimate software.
    • Worms: Self-propagating malware that spreads automatically.
    • Remote Access Trojans (RATs): Allow attackers remote control of a device. Example: FlawedAmmyy RAT.
    • Keyloggers: Record keystrokes to steal passwords. Example: Wolfeye Keylogger.
    • Ransomware: Encrypts and demands money to decrypt. Example: WannaCry hit UK's NHS in 2017.
    • Spyware: Quietly collects data from infected systems. Example: CoolWebSearch.
    • Adware: Displays intrusive pop-ups and collects user data. Example: Fireball infected 250 million machines.
    • Mitigation: Antivirus, OS patching, good browsing practices.
  • Malicious Spam Attacks:
    • Phishing: Fake emails tricking users into providing credentials. Example: Netflix account suspension phishing.
    • Spear Phishing: Targeted attacks that impersonate known contacts. Example: Fake Microsoft 365 login page phishing.
    • Smishing: SMS message-based attack. Example: Fake banking alert.
    • Vishing: Voice phishing attacks. Example: Fake government calls for personal info.
    • Pharming: Redirecting users to fake sites. Example: Fake banking website.
    • Buffer Overflow: Overflowing memory buffers to execute malicious code. Mitigation: Secure coding practices.

Non-Technical errors

  • Human Error: employee mistakes can lead to security breaches. Examples: Opening a phishing email, security setting misconfiguration. Mitigation: Employee training, good policies, regular audits.
  • Malicious Employees: insiders misuse their access for personal gain. Examples: Selling company data, leaking trade secrets. Mitigation: Employee monitoring, strict access controls, security training.
  • Disguised Criminals & Social Engineering: attackers impersonate employees or contractors to gain access. Examples: Fake electricians entering secure areas. Mitigation: Strict ID verification, background checks.
  • Natural Disasters: Floods, earthquakes, and fires disrupting IT facilities. Mitigation: Data backup, disaster recovery plan, cloud storage.

Comments

Popular posts from this blog

ESP overview

Stakeholder roadmap

hw 12/5