Please enable JavaScript.
Coggle requires JavaScript to display documents.
Summary: Malware & Social Engineering Attacks, Cryptography - Coggle…
Summary: Malware & Social Engineering Attacks
Malware Fundamentals ✓
What is Malware? ✓
Definition ✓
Key Traits (Stealth, Unauthorized, Persistence) ✓
Impacts (Data theft, Disruption, Financial loss) ✓
How Malware Spreads ✓
Email attachments / Phishing links
Infected USB drives
Malicious downloads / Fake updates
Network propagation (worms)
How Malware Works ✓
Entry / Infection
Concealment (rootkits, obfuscation,
Encrypted Viruses
)
Payload execution (damage, theft, spying)
Types of Malware ✓
Viruses ✓
Examples: Melissa,
Worms ✓
Example: CodeRed
Trojans ✓
Example: Zeus Trojan
Ransomware ✓
Encrypts files, demands payment
Example: CryptoLocker, WannaCry
Spyware / Adware ✓
Keyloggers, info stealers, pop-up ads
Rootkits / Logic Bombs ✓
Hide presence / Trigger on condition
Social Engineering Attacks ✓
Phishing ✓
Email scams, spear phishing, whaling, vishing
Spam ✓
Malware distribution via bulk emails
Typo-Squatting ✓
Fake domains (e.g., goggle.com)
Tailgating / Dumpster Diving ✓
Physical intrusion, info from trash
Shoulder Surfing ✓
Observing passwords/pins
Real-World Case Studies ✓
Carbanak APT ✓
Bank theft via spear phishing & malware
Virus ✓
Email worm causing $10B damages
CodeRed Worm ✓
Self-replicating, DoS, website defacement
Stuxnet ✓
Targeted SCADA/ICS, cyber-weapon
Cryptography
Cryptanalysis
Exhaustive key search
Brute Force Search
Frequency analysis
Classical Encryption Techniques
Substitution Cipher
ROT-13 Cipher
Caesar Cipher
Afine and vigenere cipher etc
Transposition Techniques
Rail Fence Cipher
Single Columnar Transposition