[BreachExchange] From botnet to malware: A guide to decoding cyber security buzzwords

Audrey McNeil audrey at riskbasedsecurity.com
Fri Jun 2 18:55:35 EDT 2017


http://www.smartcompany.com.au/technology/botnet-malware-
guide-decoding-cyber-security-buzzwords/

Words like worm, trojan horse and zombie may seem like the stuff of science
fiction, but they’re part of the reality of life online.

Now that we communicate, work and entertain ourselves on the internet,
these familiar terms start to take on new meaning. They’re just a few of
the cyber security threats we face.

While most of us would rather leave the problem to the IT department, it’s
essential we all have an understanding of cyber security so we can protect
ourselves, and that means understanding some key terms.

This glossary, which is by no means exhaustive, is a first step.

The cyber security glossary

Backup: Ensuring all important data is stored in a secure, offline location
to protect it from being lost, if a computer is hacked. It’s important to
routinely copy files to a USB flash drive, for example, or secure them in
cloud storage.

Blackhat hacker: A person who uses programming skills to cause damage to a
computer system, steal data and in general conduct illegal cyber activities.

Botnet: A grouping of computer systems, potentially anywhere in the world,
that has been infected by a malicious piece of software. This software
allows them to be networked together by the hacker (or bot-herder), giving
them full control of all the “bots” in the network to conduct malicious
tasks, including denial of service attacks (see below).

Breach: The moment a hacker successfully exploits a vulnerability in a
computer or device, and gains access to its files and network.

Brute force attack: A technique a hacker can use to break into a computer
system. They do this by trying to “guess” its password (either manually or
with a computer application).

Cloud: A technology that allows us to access our files through the internet
from anywhere in the world. More technically, it is a collection of
computers with large storage capabilities that remotely serve customer file
requests.

Command-and-control server: An application that controls all bots in a
botnet (see above). The hacker will send a command through this server,
which then relays it to all compromised computers in the network.

DDoS: An acronym that stands for distributed denial of service — a form of
cyber attack. This attack aims to make a service such as a website unusable
by “flooding” it with malicious traffic or data from multiple sources
(often botnets).

Domain: The networking of computers and devices. A domain is a group of
computers, printers and devices that are interconnected and governed as a
whole. Your computer is usually part of a domain at your workplace.

Encryption: An algorithmic technique that takes a file and changes its
contents into something unreadable to those outside the chain of
communication. If we use a Caesar cipher on the word “hello”, for example,
we can replace each letter with a fixed number of places in the alphabet.
The encrypted form of “hello” would become “ifmmp”.

Exploit: A malicious application or script that can be used to take
advantage of a computer’s vulnerability.

Firewall: A defensive technology focused on keeping the bad guys out. A
“wall” or filter is created that judges each attempted interaction with a
user’s computer and internet connection to determine “should this be
allowed entry or not?” Firewalls can be hardware or software-based.

Honeypot: A defensive cybersecurity technique. This technology is
essentially a computer (server) that is set up to look like a legitimate
and high value target on a network. The aim is to entice hackers to focus
on this computer and not on actual high value computers or data. The bonus
is that administrators can watch hackers in the act and learn to protect
against their techniques.

HTTPS versus HTTP: Two online standards that allow computers to communicate.

HTTP is defined as Hypertext Transfer Protocol. Its most popular use is
online to help internet browsers communicate. For example, to send you web
pages from the associated computer hosting the web site you’re visiting.

HTTPS is similar, but it adds security, hence the “s”. It encrypts all data
by creating a secure tunnel between you and the website you’re visiting,
and is commonly seen in online shopping stores where security is required.

IP Address: An internet version of a home address for your computer, which
identifies it when it’s connected to the internet.

Patch or update: Most software requires thousands of lines of programming
language to create, so it’s difficult for a developer to ensure all
possible vulnerabilities are covered. When entry points are discovered by
hackers or the developer themselves, software vendors will often release
new pieces of software as a fix.

Phishing or spear phishing: A technique used by hackers to obtain sensitive
information, including passwords, bank accounts or credit cards.

Often an unexpected email is received disguised as being from a legitimate
source. In many cases, the hacker will attempt to trick you into either
replying with the information they seek, like bank details, or tempt you to
click a malicious link or run an attachment.

Spear phishing is a variant of this technique, but the hacker targets a
business or person specifically, instead of taking a blanket approach.

Malware: An umbrella term that describes all forms of malicious software
designed to cause havoc on a computer. Typical forms include viruses,
trojans, worms and ransomware.
Ransomware: A form of malware that deliberately prevents you from accessing
files on your computer. If a computer is infected by malware designed for
this purpose, it will typically encrypt files and request that a ransom be
paid in order to have them decrypted.

Spoofing: A technique hackers use to hide their identity, pretend to be
someone else or simply try to fool you over the internet.

There a number of spoofing methods, such as making a hack look like it’s
coming from another source, sending emails that appear to come from a
different person, and website spoofing, where hackers set up a fake website
to trick users into entering sensitive information.

Software: A set of instructions that tell a computer to perform a task.
These instructions are compiled into a package that users can install and
use. Software is broadly categorised into system software like Microsoft
Windows and application software like Microsoft Office.

Trojan horse: A piece of malware that often allows a hacker to gain remote
access to a computer. The system will be infected by a virus that sets up
an entry point for the perpetrator to download files or watch the user’s
keystrokes.

Virtual Private Network: A tool that allows the user to remain anonymous
while using the internet. It does this by masking location and encrypting
traffic as it travels between the user’s computer and the website they’re
visiting.

Virus: A type of malware for personal computers, dating back to the days of
floppy disks. Viruses typically aim to corrupt, erase or modify information
on a computer before spreading to others. However, in more recent years,
viruses like Stuxnet have caused physical damage.

Vulnerability: A weakness in computer software. Eventually, if you do not
keep your systems up to date, you will have vulnerabilities. Say you’re
using Microsoft Windows 7 but are failing to install updates — your system
could exhibit vulnerabilities that can be attacked by a hacker because
security safeguards are out of date.

Worm: A piece of malware that can replicate itself in order to spread the
infection to other connected computers. It will actively hunt out weak
systems in the network to exploit and spread.

Whitehat hacker: A person who uses their hacking skills for an ethical
purpose, as opposed to a blackhat hacker, who typically has a malicious
intent. Businesses will often hire these individuals to test their cyber
security capabilities.

Zero Day: A particular form of software exploit, usually malware. What
makes a zero day exploit unique is that they are unknown to the public or
the software vendor. In other words, because few people are aware of the
vulnerability, they have “zero days” to protect themselves from its use.

Zombie: A computer system that has been infected by malware and is now part
of a hacker’s botnet.

There are still many cyber security terms to tackle, but this will get you
started. Next time someone mentions “phishing”, you’ll know they are not
talking about the water-related hobby.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.riskbasedsecurity.com/pipermail/breachexchange/attachments/20170602/1df14d7a/attachment.html>


More information about the BreachExchange mailing list