Cyber Awareness

Types of Attackers

Industrial Competitors and Foreign Intelligence Services

These threat actors are interested in financial gain for their companies or countries.

Hackers

People who are interested in breaking into computer systems using various technics that include a wide range of skills. (OSNIT - Open Source Intelligence)

Hactivist

People who attack companies for political or ideological motives.

Employees

People who are employeed by a business or company who have legitmate access that either accidentaly or deliberate misuse of their network.

Types of Attacks

Malware

Malicous sofware such as, spyware, Ransomware, viruses and worms. When malware breaches a network it can block access to key components of the network. (ransomware) This is typical done through links sent through email attachments and files downloaded from the web.

Phishing

Sending emails to large numer of people asking for sensitive information (such as bank details) or encouraging them to visit websites.

Water Holing

Setting up a fake website or compromising a legitmate one in order to exploit visiting users.

Man-In-The-Middle-Attack

Man-in--middle-attack occurs when an attacker places themselves between two parties in order to stop the communication or filter and steal the data.
Entry Points:

Public Wifi: Scanning the network while people are using the public wi-fi.

Once the malware takes over the device, attackers can instal software to process information from the victim.

Denial-Of-Service Attack

Attacks and floods networks, systems, servers,or networks with traffic. With the traffic flooding the network this causes legitmate traffic requests are unable to process. Attackers can also use multiple devices that are ompromised. This is known as a (DDoS) or distrubted-denial-of-service attack.

Ransomware

When a hacker takes control over a device,computer, or network using malware that encrypts files and demands payment for decrypting your files

SQL Injection

Structure Query Language (SQL) injection happens when the atacker inserts malicious code into a server that uses SQL and forces the server to reveal information it normally wouldn't. SQL injections can also simply when an attacker enters malicous code in a website search box.

Zero-Day exploit

Hits after a network vulnerability is announced but before a patch or solution is implemented. Attackers target the disclosed vulnerability durning this window of time. Zero-Day vulnerability threat detection requires constant awarness.

DNS Tunneling

DNS tunneling utilizes the DNS protocol to communicate non-DNS traffic over port 53. It sends HTTP and other protocol traffic over DNS. There are various, legitimate reasons to utilize DNS tunneling. However, there are also malicious reasons to use DNS Tunneling VPN services. They can be used to disguise outbound traffic as DNS, concealing data that is typically shared through an internet connection. For malicious use, DNS requests are manipulated to exfiltrate data from a compromised system to the attacker’s infrastructure. It can also be used for command and control callbacks from the attacker’s infrastructure to a compromised system.

source

Cisco

How To Protect Yourself Online

Secure Your PC/Devices

Set a bios password on pc startup. Set A complex password for any user accounts. Manually check for Operating and software applications. I personally enjoy malewarebytes but everyone should have some antivirus/maleware removal application installed on their P.C

Secure Your Network

Configure firewall according to your network needs Use a VPN - Can be use to circumvent bad actors ability to track your online footprint as well as a way to hide from authorities. Go into your router settings by visiting its IP Adress and setting user name and password to replace default admin/admin password. Usually on the back of the router/modem has the ip address you can type that into your web browswer (it should be 192.128.0.x). Hit enter and your at the routers login page, use the login provided also on the back of the modem/router, then change username and password within the settings.

Password Manager

Able to store passwords accross multiple sites
Can generate passwords that are unique and hard to crack with brute force attacks.
There's one password to login to a password manager which provides some a single point of access to all of your passwords.

Mitigation/Prevention Technics

Try not to use the same password for multiple sites When creating a password the more characters and using a combination of special charactes and numbers will hardened your accounts. If your computer is compromised, Do not comply to demands from the attacker. Provide and contact the proper authorities if demands are threatning life as well as cash payments to decrypt your own personal files on the device.

Keeping Children Safe Online

Teach young children/brothers/sisters/nieces/nephews that a safe adult, will never ask you to keep secrets. Quoting Twitter user @FastFoaodRembrandt.onion with permision.