Cybersecurity Fundamentals: Threats, Attacks, and Defenses

Posted by Anonymous and classified in Technology

Written on in English with a size of 7.65 KB

Threat Actors: Who Are the Attackers?

Threat ActorMotivationTraitsExamples
Nation-State HackersEspionage, cyber warfareHighly skilled, stealthy, well-fundedFancy Bear (Russia), APT Groups
Organized Crime GroupsFinancial gain (ransomware, theft)Professional, use Ransomware-as-a-ServiceConti ransomware gang
HacktivistsIdeological or political disruptionVaried skill levelsAnonymous
Insider ThreatsRevenge, profit, carelessnessAlready have access, dangerousDisgruntled employees stealing data
Script KiddiesFun, curiosity, fameUnskilled, use pre-made hacking toolsIndividuals using automated exploit kits
Shadow ITConvenience, speedEmployees using unauthorized techUnapproved cloud apps in a workplace

Threat Vectors: How Attacks Occur

Threat VectorHow It WorksExamples
Message-Based AttacksPhishing emails, SMS scams, fake callsMalicious emails trick users into revealing credentials
File-Based AttacksMalware hidden in PDFs, executablesInfected attachments in emails
Web-Based AttacksDrive-by downloads, fake websitesVisiting a compromised site installs malware
Removable Media AttacksInfected USBs, rogue devicesPlugging in a USB auto-installs a keylogger
Supply Chain AttacksCompromised vendor software/hardwareBackdoor injected into a trusted software update
Network AttacksEavesdropping, Man-in-the-Middle (MITM)Hackers intercept unencrypted Wi-Fi communications

Tip: Attackers often combine vectors for maximum impact (e.g., Phishing → Malware Download → Remote Access).

Common Vulnerabilities: Identifying Weak Spots

Vulnerability CategoryExamplesHow It’s Exploited
Application VulnerabilitiesSQL Injection, Cross-Site Scripting (XSS), Buffer OverflowsInjecting malicious input into web forms
Operating System (OS) VulnerabilitiesUnpatched software, privilege escalation flawsExploiting outdated system configurations
Hardware/Firmware WeaknessesDefault passwords, unpatched firmwareUsing factory-set credentials to gain access
Cloud/Virtualization WeaknessesMisconfigured storage, VM escapePublic cloud storage exposes sensitive data
Configuration IssuesOpen ports, weak firewall rulesAttackers find unsecured services to exploit
Zero-Day VulnerabilitiesNewly discovered flaws with no patch yetHackers attack before vendors release security fixes

Tip: If an exam scenario mentions poor configurations, unpatched systems, or weak security settings, it’s likely a vulnerability issue.

Indicators of Malicious Activity: Spotting an Attack

IndicatorPossible Attack
Unusual Outbound TrafficData exfiltration or malware communication
High CPU/Memory UsageCryptomining malware or excessive bot activity
Unknown Running ProcessesMalware persistence in the system
Strange Account BehaviorAccount compromise, credential theft
Disabled Security ToolsRootkits, insider sabotage
Unauthorized Configuration ChangesPrivilege escalation or tampering

Tip: Exam scenarios will often require recognizing an attack based on its symptoms in logs or system behavior.

Malware Types and Attack Techniques

Malware TypeHow It Works
VirusAttaches to files and spreads when opened
WormSelf-replicates across networks automatically
Trojan HorseDisguises as legitimate software to install malware
RansomwareEncrypts files and demands payment
RootkitHides deep in the system to evade detection
SpywareSecretly collects user data
Logic BombActivates malicious code when triggered
KeyloggerRecords keystrokes to steal passwords
Attack TechniqueWhat It Does
DDoS AttackFloods a network or service to make it crash
DNS PoisoningRedirects users to fraudulent websites
ARP PoisoningManipulates network traffic flow
Brute Force AttackRepeatedly guesses passwords until one works
Dictionary AttackUses pre-defined wordlists to crack passwords
Password SprayingTries common passwords across many accounts

Defense Strategies: Preventing Cyber Attacks

Mitigation StrategyHow It Helps
Network SegmentationLimits malware spread within different zones
Access Control Lists (ACLs)Restricts network traffic based on rules
Patch ManagementFixes security vulnerabilities with updates
Application AllowlistingPrevents unauthorized programs from running
Isolation & SandboxingLimits risk by executing suspicious files separately
EncryptionProtects sensitive data at rest and in transit
Monitoring & Detection (SIEM, IDS/IPS)Detects security threats in real-time
Least Privilege EnforcementRestricts user access to only essential permissions
Configuration ManagementKeeps security settings standardized
Incident Response PlanningEnables fast action in case of breaches

Related entries: