CBS - Unit 2.2
CBS - Unit 2.2
CBS - Unit 2.2
pg. 1
Cyber Security Rohini Sharma
Lack of security updates: Mobile device manufacturers and app developers regularly release security
updates to address vulnerabilities and protect against emerging threats. However, many users fail to
install these updates in a timely manner, leaving their devices vulnerable to attack.
Bring Your Own Device (BYOD) policies: Many organizations allow employees to use their personal
mobile devices for work purposes through BYOD policies. While this can increase productivity and
flexibility, it also introduces security risks, as personal devices may not meet the same security standards
as company-owned devices.
pg. 2
Cyber Security Rohini Sharma
• Keep their devices and apps updated with the latest security patches.
• Install antivirus and antimalware software.
• Be cautious when downloading apps or clicking on links from unknown sources.
• Use strong passwords or biometric authentication to secure their devices.
• Avoid connecting to unsecured Wi-Fi networks and disable unnecessary wireless connections
when not in use.
• Regularly back up important data and enable remote wipe capabilities in case the device is lost
or stolen.
Additionally, organizations should implement mobile device management (MDM) solutions, enforce
security policies, and provide security awareness training to employees to reduce the risk of mobile-
related security incidents.
pg. 3
Cyber Security Rohini Sharma
1. Botnet:
A combination of the words “robot” and “network”, a Botnet is a group of private computers infected
with malicious software and controlled as a group without the owners' knowledge. They’re often used
to deliver large volumes of spam, carryout DDoS attacks (see below), and steal data/credentials. Botnets
have the collective computing power to act as a force multiplier for groups looking to disrupt or break
into targets’ systems.
2. Cryptojacking:
Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Hackers
usually trick the victim into clicking on a malicious email link which loads cryptomining code on the
computer, or by infecting a website or online ad with code that auto-executes once loaded in the victim’s
browser. The cryptomining code then works in the background as unsuspecting victims use their
computers normally. The victim may notice the computer’s slower performance while they’re working,
but otherwise it can go undetected.
pg. 4
Cyber Security Rohini Sharma
Cryptojacking is an illegal form of cryptomining. In simple terms, cryptomining is the operation that
generates new cryptocurrency, a type of digital currency created and encrypted on the record-keeping
technology called blockchain.
Blockchain transactions generate complex mathematical puzzles that must be solved before the
transaction can be authenticated and completed. Cryptocurrency miners are the people who solve the
encrypted puzzles, validate the transaction and earn cryptocurrency for their efforts. The cryptomining
process is the only way to create and encrypt new coins on the blockchain.
3. Ransomware:
Ransomware is malicious malware that threatens to publish or steal victims’ data or prevents users from
accessing their systems until a ransom is paid. Ransomware has grown to be one of the biggest problems
in network security because it can paralyze large organizations and even whole cities,
with Atlanta and Baltimore as recent examples. The infection often starts with someone clicking on
what looks like an innocent link or attachment, then turns into a disaster for companies of all sizes when
vital files and documents are suddenly inaccessible and held for ransom.
However, sometimes paying the ransom won’t fix the problem. Sometimes cybercriminals demand
ransom even though the data they took is already destroyed.
4. Worms:
A worm is self-replicating malware that duplicates itself to spread to uninfected computers. Its primary
function is to infect other computers while remaining active on infected systems. Worms spread by
exploiting vulnerabilities in operating systems; this kind of attack literally worms its way into systems
by finding cracks and replicating itself over and over.
pg. 5
Cyber Security Rohini Sharma
5. Phishing:
A phishing attack involves using email to trick employees into believing a message is from a legitimate,
trustworthy source. Then, when they click a link in the email or open an attachment, their computer
becomes infected. The phisher could be someone pretending to be from the employee’s company, or
perhaps a company he/she does business with. Sometimes the message will describe something the
employee either wants or needs, or thinks they are expecting— a request from their bank, for instance.
Whatever the masquerade, a sophisticated phishing attempt has the appearance of genuine
communication but contains genuine harm.
pg. 6
Cyber Security Rohini Sharma
In a DDoS attack, the perpetrator seeks to make a machine or network resource unavailable to its
intended users by temporarily or indefinitely disrupting services of a host connected to the internet.
DDoS is typically accomplished by flooding the targeted machine from many different sources with
superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from
being fulfilled.
APT is an undercover, ongoing computer network attack in which a person or group gains unauthorized
access to a network with the goal of going undetected for the longest period possible in order to spy,
place custom malicious code on multiple computers for specific tasks, gather information, and access
sensitive, classified information. Traditionally, APT was associated with governments, but over the last
few years there have been multiple examples of non-state sponsored large groups conducting large-
scale targeted intrusions for other reasons.
pg. 7
Cyber Security Rohini Sharma
Define acceptable use of mobile devices for work-related activities. Specify prohibited activities, such
as downloading unauthorized apps, visiting unsafe websites, or using personal devices for unauthorized
purposes.
Clarify ownership and responsibility for mobile devices, especially in Bring Your Own Device (BYOD)
environments. Outline the organization's rights to monitor, manage, and control devices used for work
purposes.
Specify mandatory security controls and settings for mobile devices, such as screen locks, encryption,
and biometric authentication. Require regular security updates and patches for operating systems and
applications.
Data Protection:
Define protocols for protecting sensitive data stored on mobile devices, including customer information,
intellectual property, and confidential business data.
Require encryption of data at rest and in transit, as well as secure storage and transmission of sensitive
information.
Require remote wipe and lock capabilities to erase data and prevent unauthorized access to corporate
information on lost or stolen devices.
BYOD Policy:
If allowing BYOD, outline requirements for device registration, security controls, and user
responsibilities. Specify which devices and operating systems are supported and eligible for use in the
workplace.
Define policies for managing and securing mobile applications used for work purposes. Specify
requirements for app vetting, whitelisting, and blacklisting, as well as guidelines for downloading and
installing apps.
pg. 8
Cyber Security Rohini Sharma
Provide regular training and awareness programs to educate employees about mobile device security
best practices. Ensure employees understand their roles and responsibilities in safeguarding
organizational data on mobile devices.
Communicate consequences for non-compliance with mobile device security policies, including
disciplinary actions and termination of access privileges. Regularly audit and enforce policy compliance
through monitoring, reporting, and enforcement measures.
Establish procedures for periodic review and updates to mobile device security policies to address
emerging threats, technological advancements, and regulatory changes.
Ensure policies remain relevant and effective in mitigating risks associated with mobile device usage
in the organization.
pg. 9