Please enable JavaScript.
Coggle requires JavaScript to display documents.
INFORMATION SECURITY IN THE NEW ERA (Zero-day vulnerability (What can you…
INFORMATION SECURITY
IN THE NEW ERA
Zero-day vulnerability
it is a software security flaw that does not have a patch to correct it and could be exploited by cybercriminals.
The term "zero day" refers to a recently discovered software vulnerability.
Why do vulnerabilities pose security risks?
Malicious software exploits a vulnerability to compromise a computer system or cause unwanted behavior
What can you do to protect yourself from zero-day vulnerabilities?
Keep software and security patches up to date
Install proactive and complete security software
Configure security options for your operating system, Internet browser and security software.
Establish safe and effective personal online safety habits.
Zero-Knowledge Proof
ZKP allows conveying the assurance that the information is in hand without revealing the information itself.
properties
Completeness
Soundness
Zero-Knowledge
Applications
Private Blockchains
Private Purchases
Authentication Systems
Secure Bitcoin Transactions
Proof of Knowledge
Hijacking Internet Traffic
false routing to redirect global internet traffic
How Do You Solve for This Security Threat?
In true end-to-end encryption, data is sealed at the start point, decrypted once it reaches the intended recipient, and encryption keys are inaccessible to anyone but their owner.
Networks may be breached, but the data is encrypted and cannot be read
DDoS attack
A Distributed Denial of Service (DDoS) attack is a malicious attempt to disrupt normal traffic from a target server, service or network
How does a DDoS attack work?
A DDoS attack requires an attacker to gain control of a network of online machines in order to carry out an attack.
Once a botnet has been established, the attacker can direct the machines by sending instructions to each bot which will possibly cause the server or network to overflow capacity, which will result in a denial of service to normal traffic.
What are common types of DDoS attacks?
Application Layer Attacks
Protocol Attacks
Volumetric Attacks
What is the process for mitigating a DDoS attack?
Black Hole Routing
Rate Limiting
Web Application Firewall
Anycast Network Diffusion
backdoors
an access to an operating system or user application that allows you to skip the security measures that it implements.
How do backdoors work?
Backdoor malware is generally classified as a Trojan
A Trojan is a malicious computer program pretending to be something it's not for the purposes of delivering malware, stealing data, or opening up a backdoor on your system.
How can I protect against backdoors?
Change your default passwords
Monitor network activity
Choose applications and plugins carefully
Use a good cybersecurity solution
Sources:
https://us.norton.com/internetsecurity-emerging-threats-how-do-zero-day-vulnerabilities-work-30sectech.html
https://medium.com/coinmonks/introduction-to-zero-knowledge-proofs-8e8261b4a48a
https://manishearth.github.io/blog/2016/03/05/exploring-zero-knowledge-proofs/
https://www.scmagazine.com/home/opinion/the-key-to-protecting-against-internet-traffic-hijacking/
https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/
https://www.malwarebytes.com/backdoor/