Professional Documents
Culture Documents
chapter_1_cyber_security_b3_44
chapter_1_cyber_security_b3_44
co
1
www.gradeup.co
1 CYBER SECURITY
Active Attacker: Can see the data and they can modify the content of data.
Passive Attacker: Can only see the data, can not change the content of the data.
2
www.gradeup.co
3
www.gradeup.co
4
www.gradeup.co
5
www.gradeup.co
Broken Authentication
Also referred to as broken authentication and session management, these vulnerabilities involve
hackers gaining unauthorized access to user credentials and falsely getting into databases and
programs.
Security Misconfiguration
This vulnerability is a common occurrence in security systems that are poorly configured and managed.
As it can take place at any level of the security infrastructure, it is very common and can be detected
and mitigated with ease.
Broken Access Control
This vulnerability generally takes place when a user is able to perform certain functions or gain access
to files and information without having genuine access. Two earlier vulnerabilities called 'insecure
direct object references' and 'missing function level access control' were combined to be known as
broken access control.
Cross-Site Scripting (XSS)
The cross-site scripting vulnerability takes place when a trusted site extends its permissions to an
unknown or malicious third-party site. In general, users give certain permissions to trusted sites.
Hackers somehow modify the pages of those trusted sites to extend those permissions to some
untrusted third-party and gain access to sensitive information and spread malicious content.
Sensitive Data Exposure
It is one of the most serious security vulnerabilities and causes a lot of damage to individuals and
businesses worldwide. Any web application dealing with sensitive business or user information is
vulnerable to data exposure issues.
XML External Entities (XXE)
Whenever an external file is specified in an XML document, XML processors are used in order to load
their contents. However, attackers use this opportunity to get the contents of local files in the system,
access remotely located files, and also develop executable code using the XML processor.
Insecure Deserialization
Serialization and deserialization are generally used to turn objects to data and transmit and recreate
it in the same state at another place or at another time. In the case of insecure deserialisation,
attackers send malicious objects which upon deserialization provide special privileges to them or let
them execute malicious code at the target places.
Using Components with Known Vulnerabilities
It is surprisingly common in web apps to have components with known security vulnerabilities. That
component could be the operating system, web server, CMS, or some library or associated plugins.
Using these components without having a backup plan can prove detrimental to any security system.
6
www.gradeup.co
7
www.gradeup.co
• Since there's no international standard of compatibility for IoT, it's difficult for devices from
different manufacturers to communicate with each other.
8
www.gradeup.co
Miners use special software to solve the incredibly complex math problem of finding a nonce that
generates an accepted hash.
Nodes:
One of the most important concepts in blockchain technology is decentralization. No one computer or
organization can own the chain. Instead, it is a distributed ledger via the nodes connected to the
chain. Nodes can be any kind of electronic device that maintains copies of the blockchain and keeps
the network functioning.
Use Of AI In Cyber Security:
Artificial intelligence techniques can be used to learn how to remove noise or unwanted data and to
enable security experts to understand the cyber environment in order to detect abnormal activity.
Artificial Intelligence is able to analyze massive amounts of data and allow the development of existing
systems and software in an appropriate way to reduce cyber attacks.
types of artificial intelligence applications are being used in cyber security solutions?
• Spam Filter Applications (spamassassin)
• Network Intrusion Detection and Prevention
• Fraud detection
• Credit scoring and next-best offers
• Botnet Detection
• Secure User Authentication
• Cyber security Ratings
• Hacking Incident Forecasting
Here, are some features to use in analyzation of a software:
• Accessed APIs,
• Accessed fields on the disk,
• Accessed environmental products (camera, keyboard etc),
• Consumed processor power.
• Consumed bandwidth.
• Amount of data transmitted over the internet.
By using the distinguished features, the system is built. Once you give a test software to the system,
it tries to detect whether the software is a malware or not by analyzing these distinguished features.
****
9
www.gradeup.co
10