W7 Cybersecurity
W7 Cybersecurity
W7 Cybersecurity
01 02 03
Define Understand the Enumerate
cybersecurity. major activities of specific examples
a cybercrime. of the major
activities of a
cybercrime.
Cybersecurity
Weaponization
• Coupling exploit with backdoor into deliverable payload.
Delivery
• Delivering the weaponized bundle to the victim via email, web, USB, etc.
Exploitation
• Exploiting a vulnerability to execute code on a victim’s system.
Installation
1. Hacking
• someone exploiting a computer system or private network through a
computer to gain access to digital files or systems without permission
Hacking Activity Categories
• Unauthorized access - person gaining logical or physical access or entry to a
network, application, data, website, program, server, service, or other system,
without obtaining the proper permission or credentials to do so.
• Modification of data - act of changing, inserting, removing, and/or otherwise
altering data without authorization to do so.
Cyber-dependent crimes
1. Hacking
Hacking Activity Categories
• Impairment of data - transmission or communication of data is
disrupted.
• Data attenuation impairment – degradation of signal strength over a
transmission link because of distance.
• Delay distortion impairment - receiver clock deviates from an incoming
transmission signal at random making significant delays and early
transmission.
• Noise impairment - unwanted signal is inserted between transmission and
reception.
Cyber-dependent crimes
1. Hacking
Hacking Activity Categories
• Interception of data - data is intercepted during transmission,
allowing a hacker to gain access to data being transmitted
between machines.
• allow unauthorized users to access applications, network systems, and
environments.
• i.e. applications that examines data packets in the network and send
data to hackers, malware installation to execute cyberattack
Cyber-dependent crimes
2. Attacking (Cyber)
• any attempt—using one or more computers
against a single or multiple computers or
networks—to expose, alter, disable, destroy, steal
or gain information through unauthorized access
to or make unauthorized use of an asset, often in
the form of protected computers or networks.
• disable computers, steal data and information,
use breach computer as a launch point for
attacks.
Cyber-dependent crimes
2. Attacking (Cyber)
• Active attack - attempts to alter system
resources or affect their operation.
• Passive attack - attempts to learn or
make use of information from the
system but does not affect system
resources i.e. wiretapping, installation of
keystroke software
Cyber-dependent crimes
3. Malware (malicious software)
• types of software-based hacking and attacking
tools including adware, ransomware, spyware,
trojans, viruses, worms, and other types of harmful
software.
• Viruses - designed to spread outwardly from one
program to another and it has the ability to self-replicate.
• Worm - uses a computer network to spread itself, relying
on security failures on the target computer to access it.
Cyber-dependent crimes
Destruction
Disinformation
Defacement of Websites