Lesson 2 Security Threats and Vulnerabilities
Lesson 2 Security Threats and Vulnerabilities
In Information Assurance and Security, security threats and vulnerabilities are key concepts that focus
on identifying, assessing, and mitigating risks to systems, data, and assets. Below are some common
topics related to these concepts
a. Cybersecurity Threats
1. Malware (Malicious Software)
Software designed to damage, disrupt, or gain unauthorized access to systems (e.g., viruses,
worms, ransomware, trojans).
Types of Malware
1. Viruses
2. Worms
3. Trojans (Trojan Horses)
4. Ransomware
5. Spyware
6. Adware
7. Rootkits
8. Keyloggers
9. Bots and Botnets
10. Fileless Malware
5. SQL Injection
Exploiting vulnerabilities in web applications by injecting malicious SQL code into input fields to
access or manipulate databases.
7. Zero-Day Attacks
Attacks that exploit previously unknown vulnerabilities before they are patched.
b. Insider Threats
1. Malicious Insiders
Employees or contractors intentionally exploiting their access to systems to cause harm (e.g.,
stealing sensitive data or sabotaging operations).
2. Negligent Insiders
Individuals who unintentionally expose systems to risks due to lack of awareness or improper
handling of sensitive information (e.g., sending sensitive data to the wrong person).
a. Software Vulnerabilities
• Unpatched Software
Systems running outdated software with known security flaws that can be exploited by attackers.
• Buffer Overflow
A vulnerability that occurs when a program writes more data to a buffer than it can hold,
allowing attackers to execute arbitrary code.
• Insecure APIs
Vulnerabilities in poorly designed or insecure application programming interfaces (APIs) that
attackers can exploit to gain unauthorized access to backend systems.
• Improper Authentication
Weak authentication mechanisms (e.g., default or easily guessable passwords) that allow
unauthorized users to access systems.
• Lack of Encryption
Sensitive data that is transmitted or stored without proper encryption, making it vulnerable to
interception or unauthorized access.
b. Network Vulnerabilities
• Unsecured Networks
Open or poorly secured Wi-Fi networks that are susceptible to eavesdropping or unauthorized
access.
• Open Ports
Unnecessary open network ports that attackers can use to gain access to systems.
c. Human Vulnerabilities
• Social Engineering
Manipulating individuals into revealing confidential information (e.g., via phishing, pretexting, or
baiting).
d. Hardware Vulnerabilities
• Side-Channel Attacks
Exploiting physical characteristics (e.g., power consumption, electromagnetic leaks) to gain
access to information in hardware devices.
• Hardware Backdoors
Hidden vulnerabilities intentionally built into hardware devices that can be exploited by attackers
for malicious purposes.
How Hardware Backdoors Work
Key characteristics of hardware backdoors include
• Firmware Vulnerabilities
Weaknesses in the firmware of devices, such as routers or IoT devices, that attackers can exploit.
Vulnerabilities related to the lack of centralized visibility and control over cloud
environments.
Types of CASBs
1. API-Based CASBs
2. Proxy-Based CASBs
3. Hybrid CASBs
• Adversarial Attacks
Attacks that manipulate AI/ML models to produce incorrect outputs or predictions.
• Data Poisoning
Feeding malicious or biased data to train AI/ML models, which can impact decision-making
processes.
1. Insertion Poisoning
2. Label Poisoning
3. Targeted Poisoning
4. Backdoor Poisoning
• Smart Contract Vulnerabilities Weaknesses in blockchain smart contracts that attackers can
exploit to steal funds or disrupt operations.
1. Reentrancy Attack
2. Integer Overflow and Underflow
3. Gas Limit and Block Size Manipulation
4. Unprotected Self-Destruct
5. Front-running (Transaction Ordering Dependence)
6. Time Dependency and Oracle Manipulation
7. Inadequate Access Control
8. Unchecked External Calls
9. Delegate call Vulnerability
10. Insufficient Input Validation
4. Best Practices for Mitigating Security Threats and Vulnerabilities
• Encryption
Encrypt sensitive data both in transit and at rest to protect it from unauthorized access.
• Penetration Testing
Regularly conduct penetration testing and vulnerability assessments to identify and address
weaknesses before they can be exploited.
References;
OpenAI. (2025). ChatGPT (Mar 14 version) [Large language model]. https://chat.openai.com/chat
Perplexity AI. (2025). How to reference an AI assistant. Perplexity AI https://www.perplexity.ai/.