Want to create interactive content? It’s easy in Genially!
Security and privacy
maria isabel arevalo paz
Created on May 22, 2023
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Akihabara Microsite
View
Essential Microsite
View
Essential CV
View
Practical Microsite
View
Akihabara Resume
View
Tourism Guide Microsite
View
Online Product Catalog
Transcript
Security and privacy
María Isabel Arévalo Paz
1.Ransomware
2. Keylogger
3. Trojan
4. ChameleonMini
business policy
5. Screencrab
case of infection
Malware
How they work Ransomware spreads via emails and malicious websites. Once it infects a device, it encrypts the files and displays a message demanding a ransom payment to recover them. Payment is usually requested in cryptocurrencies to make it difficult to track down the attacker. How to prevent It's important to keep operating systems and programs up to date, avoid opening suspicious emails or links, and make regular backup copies of important files. It is also recommended to use strong passwords and not use the same one for different accounts.
Ransomware is a type of malicious software that blocks access to files on a device and demands a ransom to be released.
Subtítulo aquí
RANSOMWARE
How they workKeyloggers work by recording keystrokes and storing that information in a file or sending it over the internet to a third party. In this way, they can capture passwords, usernames, and other sensitive information. How to prevent Some additional measures to prevent Keylogger infections include avoiding clicking on suspicious links or downloading files from unknown sources, using strong passwords and changing them regularly, and keeping system software and applications up to date. It's also important to be security conscious when using public Wi-Fi networks and avoid entering sensitive information on untrusted devices.
Malware
Keyloggers are computer programs designed to record the keystrokes of a computer without the user noticing.
KEYLOGGER
Malware
How they work Trojans work by hiding inside legitimate programs or by tricking users into downloading and installing them. Once active on a device, they can open a back door for attackers to gain access to the device or to steal user information. How to prevent It is important not to download software or files from untrusted sources, not to open suspicious emails or messages, not to click on unsolicited links, to keep updating, to use strong passwords, and to disable "autorun" on external devices.
Trojan horses are a type of malicious software that disguises itself as a legitimate program to trick users into gaining unauthorized access to their devices or information.
TROJAN
How they work ChameleonMini works by emulating smart cards, RFID tags, and NFC readers. The device can be programmed to simulate different types of cards or tags. ChameleonMini is a legitimate security tool, however, if used maliciously, it can be used to clone cards or access contactless access systems in an unauthorized manner. How to prevent It is important to take measures such as physically protecting contactless access systems, limiting access to these areas to authorized persons only, and regularly monitoring access logs for any suspicious activity.
Devices
ChameleonMini is an open source hardware device used for security and penetration testing on contactless access systems using RFID and NFC technology. You can simulate smart cards, RFID tags, and NFC readers.
CHAMELEON MINI
Devices
How they work Screencrabs work by hiding themselves in the device's operating system and capturing screen images. These images or information are sent to a remote server controlled by the attackers. Screencrabs can be installed via malware downloads, phishing emails, or through installed applications. How to prevent It is important to follow the basic guidelines, disable the "autorun" option on removable devices, and use additional security software such as anti-malware programs. In addition, privacy tools such as screen savers or built-in features in some operating systems can be used to block screen capture.
Screencrabs are malicious programs used to capture images of a device's screen without the user's knowledge or permission. These programs can be used to spy on users, steal sensitive information, or perform other malicious activities.
SCREENCRAB
SCREENCRAB
SCREENCRAB
SCREENCRAB
CHAMELEON MINI
1. Prohibit the use of unauthorized software and applications on company-owned devices. 2. Educate employees on the risks associated with downloading software or opening email attachments from unknown sources. 3. Use strong passwords and two-factor authentication to protect against unauthorized access to sensitive information. 4. Regularly update operating systems and applications with the latest security patches to protect against known vulnerabilities. 5. Use firewalls, intrusion detection systems, and antivirus software to detect and prevent unauthorized access attempts. 6. Monitor employee activity on company-owned devices to identify potential security threats. 7. Use tools that can block screen capturing software or disable screen sharing when working with sensitive information.
1. Limit physical access to systems that use RFID and NFC technology. Only authorized personnel should be allowed access to these areas. 2. Educate employees on the risks associated with the use of unauthorized devices such as the ChameleonMini and prohibit their use within the organization. 3. Monitor and control the use of external devices such as USB, which can be used to introduce malware into the system. 4. Use strong passwords and two-factor authentication to protect against unauthorized access. 5. Regularly update operating systems and applications with the latest security patches to protect against known vulnerabilities. 6. Use firewalls, intrusion detection systems, and antivirus software to detect and prevent unauthorized access attempts. 7. Conduct Regular Security Audits
Lorem ipsum dolor sit ametConsectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat. Ut wisi enim ad minim veniam, quis nostrud exerci tation ullamcorper suscipit lobortis nisl ut aliquip ex ea commodo consequat. Duis autem vel eum iriure dolor in hendrerit in vulputate velit esse molestie consequat, vel illum dolore eu feugiat nulla facilisis at vero eros et accumsan et iusto odio dignissim qui blandit.
Lorem ipsum dolor sit ametConsectetuer adipiscing elit, sed diam nonummy nibh euismod tincidunt ut laoreet dolore magna aliquam erat volutpat. Ut wisi enim ad minim veniam, quis nostrud exerci tation ullamcorper suscipit lobortis nisl ut aliquip ex ea commodo consequat. Duis autem vel eum iriure dolor in hendrerit in vulputate velit esse molestie consequat, vel illum dolore eu feugiat nulla facilisis at vero eros et accumsan et iusto odio dignissim qui blandit.
SCREENCRAB
Ransomware
One famous case of infection with Ransomware is the WannaCry attack that occurred in May 2017. The attack affected over 200,000 computers in more than 150 countries and caused significant disruptions to critical infrastructure, including hospitals, banks, and government agencies. The malware was spread through a vulnerability in Microsoft Windows and used encryption to lock users out of their systems, demanding a ransom payment in Bitcoin to regain access.
SCREENCRAB
Keylogger
A famous case of infection with a keylogger was the 2014 JPMorgan Chase data breach, where hackers used a keylogger to steal login credentials and gain access to sensitive data of more than 76 million users. homes and 7 million small businesses. Once they gained access, they were able to move laterally through the network and access sensitive information.
SCREENCRAB
Trojan
One of the famous cases of infection with a Trojan is the attack on the Bangladeshi banking system in 2016, where cybercriminals used the Trojan known as "Carbanak" to infiltrate the SWIFT system, used by banks for international transactions. The attackers managed to transfer more than $81 million to bank accounts in the Philippines and Sri Lanka.
References
SCREENCRAB
-Aller, Á. (22 de 08 de 2021). QNAP. Obtenido de Conoce el screen scraping para mantener tu PC alejado de los espías: https://www.profesionalreview.com/2021/08/22/screen-scraping-que-es-virus/ -Fortinet. (s.f.). Obtenido de What is WannaCry Ransomware Attack?: https://www.fortinet.com/resources/cyberglossary/wannacry-ransomware-attack -Grace, A. (24 de 07 de 2020). Norton. Obtenido de What is a Trojan? Is it a virus or is it malware?: https://us.norton.com/blog/malware/what-is-a-trojan#:~:text=A%20Trojan%20horse%2C%20or%20Trojan%2C%20is%20a%20type,bona%20fide%20application%20or%20file%20to%20trick%20you. -IBM. (s.f.). Obtenido de What is ransomware?: https://www.ibm.com/topics/ransomware -Perlroth, N. (27 de 08 de 2014). The New York Times. Obtenido de JPMorgan and Other Banks Struck by Hackers: https://www.nytimes.com/2014/08/28/technology/hackers-target-banks-including-jpmorgan.html -Person, C. (24 de 10 de 2022). The Verge. Obtenido de The ChameleonMini is a skeleton key for RFID: https://www.theverge.com/23411372/chameleon-mini-rfid-nfc-attack-proxmark3-keyless-card-reader -Stouffer, C. (03 de 12 de 2021). Norton. Obtenido de Keyloggers 101: A definition + keystroke logging detection methods: https://us.norton.com/blog/malware/what-is-a-keylogger# -The One Brief. (s.f.). Obtenido de The Bangladesh Bank Heist: Lessons In Cyber Vulnerability: https://theonebrief.com/the-bangladesh-bank-heist-lessons-in-cyber-vulnerability/#:~:text=Over%20the%20weekend%20of%205th%20February%202016%2C%20a,of%20the%20biggest%20bank%20heists%20of%20all%20time.