Presentation is loading. Please wait.

Presentation is loading. Please wait.

LO1 - Know about aspects of cyber security

Similar presentations


Presentation on theme: "LO1 - Know about aspects of cyber security"— Presentation transcript:

1 LO1 - Know about aspects of cyber security
Level 2 Technical IT Unit 2: Essentials of Cyber Security

2 Types of Attacker and their motivations
Lesson 3

3 Objectives Be able to explain the different types attackers in relation to cyber attacks Be able to identify what the motivations each type of attacker may have.

4 Types of attacker Cyber Criminals Cyber Terrorists Hackers Phishers
Scammers

5 Cyber Criminals A cybercriminal is an individual who commits cybercrimes, where they make use of the computer either as a tool, a target or both. They use computers in 3 broad ways: Select a computer as their target – These criminals attack other people’s computers to perform malicious activities (eg. Spreading viruses, data theft, identify theft etc.) Use a computer as their weapon – They use the computer to carry out “convential crime” (eg. Span, fraud, illegal gambling) User a computer as their accessory – Use a computer to save stolen or illiegal data

6 Cyber Criminals – organised Groups
Cyber criminals can often work in organised groups. If working within an organised group they will no doubt have a specific role: Programmer – Write code or programs used in cyber attacks Distributors – Distribute and sell stolen data/goods from cyber attacks and other cyber criminals IT Experts – Maintain the cyber criminal organisation’s IT infrastructure (eg servers, encryption technologies and databases) Hackers – Exploit systems, applications and network vulnerabilities Fraudsters – Create and deploy schemes like spam and phishing System hosts and providers – Host sites and server that possess illegal contents. Cashiers – Provide account names to cybercriminals and control drop accounts. Money Mules – Manage bank account wire transfers Tellers – Transfer and launder illegal money via digital and foreign exchange methods Leaders – Often connected to big bosses of large criminal organisations. Assemble and direct cybercriminal teams and usual lack technical knowledge.

7 Cyber Terrorists These are people who use the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm. Normally to achieve political gains through intimidation. Can also be referred to as the act of Internet terrorism where the aim is to disrupt computer networks on a large scale. Cyber terrorism is normally premeditated attacks on computer systems, computer data, programs and other information. Their sole aim is violence, harm and destruction. With the development of the internet, individuals or groups are misusing the anonymity to threaten individuals, certain groups, religions, ethnicities or beliefs. Cyber terrorism can be placed into 3 categories: Simple – Basic attacks (eg. Hacking an individual system) Advanced – More sophisticated attacks and can involve hacking multiple systems and/or networks. Complex – These are coordinated attacks that can have a large-scale impact and make use of sophisticated tools.

8 Hackers A hacker is a person who breaks codes or passwords in order to gain unauthorised entry to computer systems. Hackers can do an enormous amount of damage if they break into a computer system. Some hackers look to cause harm or intent to destroy, change or edit data, but other don’t. Some hackers break into systems because they enjoy the challenge. Hacker types include: Black Hat – Break into computer systems illegally and cause harm by stealing or destroying data (eg. Banking system to seal money) White Hat – Use their skills to help enterprises create strong computer systems Grey Hat – Perform illegal hacking activities to show off their skills, rather than to achieve personal gain.

9 Phishers These are people who try and acquire private and sensitive information (eg. Credit card numbers, personal identification and account usernames/passwords) They use social engineering techniques and computer programming expertise in order to lure recipients and web user into believing that a spoof website is legitimate and genuine. Actually what they are doing is using this spoof to then actually steal or expose personal identity and/or other vital information. They use link manipulation, image filter evasion and website forgery to fool people.

10 Scammers Scammers are those who try and lure people with often “too good to be true” styles offers. (eg. Lottery wins, surprise inheritance, unsolicited job offers). This is normally a way of tricking you into giving them money and encourage you to reply to their communication, normally via . They will use a unknown and will ask for payment of a purchase. These are now becoming more common with the idea of new products for good value and purchasing using an unsecured website.

11 Motivations behind attacks
Financial Gain Attackers may make money directly from the attack they arrange or may receive payment indirectly by selling the malware etc.) In some cases organisations, terrorists or other criminals may pay money to those who perform the act. Publicity In some cases attackers complete their act by giving themselves publicity. The more dangerous the attack or more coverage their attack gets in the news gives people a sense of achievement. In some cases the publicity could strike fear and in others the fun of it might show their skills. Fraud This could be to commit fraud on individuals or organisations/companies/corporations. Be able to pretend to be that company or individual in order to steal identity for future acts or to be able to use information by posing as the company to change monetary exchanges or to manipulate other areas. Espionage Some attackers will use their cyber attacks in order to spy on governments, companies or individuals in order to gather intel or information. This means that this information could be used in a variety of ways. For example, they could use the information to blackmail organisations, be able to reveal secrets into the public domain or even give the information for use by other individuals.

12 hacktivism Hacktivism is the act of hacking a website or computer network in an effort to convey a social or political message. The person who carries out the act of hacktivism is known as a hacktivist.  In contrast to a malicious hacker who hacks a computer with the intent to steal private information or cause other harm, hacktivists engage in similar forms of disruptive activities to highlight political or social causes. For the hacktivist, hacktivism is an Internet-enabled strategy to exercise civil disobedience. Acts of hacktivism may include website defacement, denial- of-service attacks (DoS), redirects, website parodies, information theft, virtual sabotage and virtual sit-ins. Hacktivism addresses a variety of acts that are active and passive - as well as violent and non-violent - and may be falsely interpreted as cyberterrorism.  Anonymous

13 Task Create a document or make notes in your books on:
Each of the different types of attackers mentioned. What motivations each type of attacker might have Examples of attackers and what their motivations are from the news. You may wish to do this as a table like so: Any work done electronically will need to be printed and stuck into your book. Type of Attacker Motive Examples


Download ppt "LO1 - Know about aspects of cyber security"

Similar presentations


Ads by Google