P1- Explain the different security
threats that can affect the IT
systems of organsiations.
Here are 4 types of Security threats.,
• Internal
• External
• Physical
• Social Engineering and Software threats
Software threats
Malware
This is an app which sets up destructive software in the system of user. Moreover,
Software detects activity of user and gather entire classified information of user. Here
are several kinds of malwares software shown below:
• Virus – virus produces a duplicate copy of itself that expand all over the files of
computer and doesn’t bring in notice of user. It enters the duplicated print of
itself into the different computer program occurs.
• Worm – Worms are related to viruses. Worm is a duplicate code which arrives
through emails that appear authorized.
• Trojan horse – Trojan horse is another type of malware that declares itself to be
original & misguide people of its actual purpose. Additionally, it works in the
background and tries to make an entrance into user’s system.
• Ransomware – Ransomware prevents access to the system of user and force them
to pay the price to reinstall the right to have access. In 2021, a city called
Baltimore was attacked by ransomware known as Robbin hood, it was
extremely powerful that it halted all the activities in the city which includes,
property transfers, tax collection and government emails for weeks. It was an
extremely expensive attack for the city as it coted them more than $18 millions.
, • Spyware – Spyware is the type of malware that get access to the system, steal
confidential information and the data about internet usage without bringing
these events into the user’s notice.
• Bonet - Bonet are also one of the malwares. They spread the infection all over
the network which is connected by many devices altogether. They are mainly
known and used for transferring spams
• Backdoors- backdoor is type of malware makes the normal authentication
procedures ineffective to get high-level access to a system.
• Bots- bots are type of a program that works according to the set of instructions
automatically. For example., automated replies, etc.
Phishing
Phishing is one of the cybercrimes in which people are targeted through emails,
phone calls by a stranger who acts like a legitimate institution to trick people so they
can gain access to classified information such as credit cards, debit cards and
passwords.
Here is the real-life example of phishing email attack. In December 2020, a phishing
attack occurred in USA at healthcare provider. In this attack attackers attacked two
employees. Furthermore, the attacker successfully managed to gain access to the
employees’ email accounts, in result they gained access to the personal details of
over 100,000 elderly patients and these personal details included names, birth, bank
and financial information, insurance information, social security numbers, driver’s
license numbers. This unauthorised access was maintained by attackers for a whole
week.
SQL Injection
SQL is one of the dangerous cybercrimes in which an attacker uses SQL code to
dominate a database of a website and get access to valuable information.
Here is the real-life example of SQL injection happened which is known as Ghost
Shell attack. In this attack hackers belonged to APT group team Ghost Shell aimed at
53 universities using SQL injection. In result, they stole and published personal
records around 36,000 to students, staff and faculty.
Man in the Middle (MITM) Attack
MITM attack occurs when two people are having a conversation and a third party
meaning third person, interferes into the conversation and gather sensitive,
potentially valuable information. For example., Public WIFI, a third person (hacker)