Cyber Security
Cyber Security
(21ADH57)
Artificial Intelligence and Data Science
Nitte Meenakshi Institute Of Technology
Bengaluru - 560064
1
Contents
1 CYBERCRIME AND INFORMATION SECURITY 3
1.1 Cybercrime and Information Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2 Classificiation of Cybercrimes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3 legal Perspectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.4 Indian Perspectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.5 Hacking and Indian Laws . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.6 A Global Perspectives on Cybercrimes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.7 Cybercrime Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2
1 CYBERCRIME AND INFORMATION SECURITY
What is Cybercrime?
1. Cybercrime is criminal activity that either targets or uses a computer, a computer network or a
networked device.
2. Cybercrime can be carrier out by individuals or organizations
3. In the year 1834 the first cyber attack took place in France. Attackers stole financial market
information by accessing the French telegraph system
Cyberspace:
• Cyberspace is a network of computer networks or devices that communicates via TCP and IP
protocols to make data transfer and exchange easier.
• This term was coined by William Gibson. A Science fiction writer, in his Sci-Fi novel "Neuo-
mancer".
Cyber squatting:
• Cyber squatting is the practice of buying domain names taht have existing buiness names.
• It is donw with the intent to sell these domain name to earn profit
3
1.1 Cybercrime and Information Security
• Information security protects sensitive data from unauthorized actions such as inspection, modifi-
cation, recording, and any interruption or destruction.
• Cybersecurity refers to the protection of information, equipment, computers, computer resources,
communication devices, and data stores from illegal access, use, disclosure, modification, or de-
struction.
Causes of Cybercrime:
• Ease of Access: The ease of access to digital tools and the internet allows people to participate in
cybercrime without the need for advanced technical knowledge. Potential hackers find it easier to
access websites like the dark web, online forums, and hacking tools that are easy to use.
• Negligence: When people or organizations act carelessly or irresponsibly with regard to their
digital security, it’s referred to as negligence. Poor security measures, outdated software, and
weak passwords are a few examples of this. Cybercriminals frequently use these flaws to gain
unauthorized access or launch attacks.
• Revenge or Motivation: Some cybercrimes are motivated by ideological beliefs, revenge, or anger.
Hacking, harassment, and other harmful operations can be carried out by individuals or groups in
order to take revenge or further a specific cause. Personal conflicts, political disagreements, and
ideological differences are examples of motivations.
• Poor Law Enforcing Bodies: The frequency of cybercrime activities may be related to the lack of
enforcement of cybercrime legislation. Cybercriminals believe they may operate with freedom in an
environment where law enforcement agencies lack the tools, knowledge, or authority to successfully
combat cybercrimes.
4
1.2 Classificiation of Cybercrimes
Cybercrime is generally can be classified into four categories:
1. Cybercrime against Individual: Cybercrimes that specifically target individuals belong under this
category. Identity theft, cyberbullying, phishing attempts to obtain personal data, and financial
fraud directed at specific people are a few examples. To commit these crimes, cybercriminals
may take advantage of weaknesses in a person’s social media profiles, personal gadgets, or online
presence.
2. Cybercrime against Property: Malicious actions that try to destroy or damage with digital assets,
such data, networks, or computer systems, are the main focus of cybercrimes against property.
A denial-of-service (DoS) attack for tampering with online services, breaking into a company’s
database to steal intellectual property, or spreading malware that harms computer systems are a
few examples. Often, the goal is to injure finances or obtain a competitive edge.
3. Cybercrime against Organization: Cybercrimes that target companies, governmental bodies, or
other organizational structures fall under this category. Examples include financial fraud targeting
company accounts, ransomware attacks that demand payment for data recovery, data breaches
that expose sensitive information, and corporate spying. These crimes can have a variety of effects,
such as reputational harm and financial losses.
4. Cybercrime agains Society: Cybercrimes against society include actions that impact the gen-
eral well-being of communities or countries and have wider social consequences. Examples include
attacks on vital infrastructure (such power grids or communication networks), the spread of misin-
formation or propaganda, cyberterrorism, and massive financial frauds that have an effect on the
economy. The public’s safety and national security are frequently seriously threatened by these
acts.
Cybercime Against Individual:
This type is targeting individuals. It includes:
1. E-mail Spoofing: An attacker can use the method known as "email spoofing" to mimic the appear-
ance of an email from a trustworthy or authentic source by manipulating the email header.
EX: A cybercriminal may send an email that appears to be from a bank, requesting the recipient
to provide sensitive information such as passwords or credit card details.
2. Phishing: Phishing is a kind of cybercrime in which attackers fool victims into revealing private
information, including usernames, passwords, or bank account information, by sending them false
emails, messages, or webpages.
EX: A phishing email might mimic a popular online service, prompting the user to click on a link
and enter login credentials on a fake website
3. Cyberdefamation: The act of spreading false and harmful information about a person or organi-
zation via digital media, frequently with the intention of hurting their reputation, is known as
cyberdefamation.
EX: Posting false and defamatory statements about an individual on social media or other online
platforms.
4. Cyberstalking: Cyberstalking is the practice of continuously harassing or stalking someone via
electronic means in an effort to cause fear or mental distress.
EX: Continuously sending threatening emails, messages, or comments on social media platforms
to a specific person.
5. Pornographic Offenses: When it comes to cybercrime, pornographic offenses are defined as using
digital platforms to create, distribute, or view explicit or illegal information.
EX: Sharing, distributing, or producing child pornography using online platforms.
6. Password Sniffing: Passwords can be intercepted and captured by an attacker using a technique
called "password sniffing" when they are sent over a network.
EX: Using a network sniffing tool to capture login credentials sent over an unsecured Wi-Fi network,
allowing unauthorized access to the victim’s accounts.
5
Cybercrime Against Organization:
1. Unauthorized Accessing of Computer: Unauthorized access occurs when an individual gains entry
to a computer system, network, or data without permission.
EX: A hacker exploits a weak password to gain unauthorized access to a company’s server and
extract sensitive information.
2. Denial-Of-Service Attacks: DoS attacks overload a system, network, or website, making it unavail-
able to users either permanently or just temporarily.
EX: A flood of traffic is directed towards a website, causing it to become slow or unavailable for
legitimate users.
3. Virus Attack: Malicious software that attaches itself to trustworthy programs and spreads when
those programs are run is known as a virus.
EX: Opening an infected email attachment that contains a virus, leading to the spread of the virus
throughout the user’s system.
4. E-Mail Bombing: The act of flooding a target’s inbox with a large number of emails is known as
"email bombing."
EX: sending a person’s email address hundreds of emails in a short amount of time, overcrowding
their email server.
5. Salami Attacks: A salami attack involves an attacker quietly taking small sums from multiple
transactions in the hopes that the errors would go undiscovered.
EX: A financial system is manipulated by a programmer to round down fractions of a penny from
multiple transactions and transfer the whole amount to their account.
6. Logic Bomb: A logic bomb is a malicious piece of code that is introduced into a system or program
to cause it to operate maliciously under specific conditions.
EX: An employee includes code in a software program that will erase critical data if they are
terminated from their job.
7. Trojan Horse: Malware that acts as trustworthy software and gains illegal access to a computer
system is known as a Trojan horse.
EX: Downloading and installing a seemingly harmless software application that, unbeknownst to
the user, contains a hidden Trojan horse.
8. Data Diddling: Data diddling is the practice of modifying data to manipulate or falsify information
before or during input into a computer system.
EX: An employee modifies financial records in a database to divert funds to their account without
raising suspicion.
1. Credit Card Frauds: Credit card fraud involves the unauthorized use of someone else’s credit card
information to make purchases or withdraw funds.
EX: A criminal gains access to a person’s credit card details through phishing or hacking and uses
the information to make fraudulent online purchases.
2. Intellectual Property (IP) Crimes: The illegal use, duplication, or distribution of another person’s
intellectual property—such as trade secrets, patents, trademarks, or copyrights—contains intellec-
tual property offenses.
EX: A business violates the intellectual property rights of the original creator when it makes unau-
thorised copies of a patented product and sells it.
3. Internet Time Theft: Internet time theft occurs when employees use company time and resources
for personal internet activities during working hours.
EX: An employee spends work hours browsing social media, playing online games, or conducting
personal business instead of performing their job duties.
6
Cybercrime Against Society:
1. Forgery: Forgery involves creating, altering, or imitating documents, signatures, or other items
with the intent to deceive or defraud.
EX: : Creating a fake passport, altering a check, or forging a signature on a legal document are
instances of forgery.
2. Cyberterrorism: Cyberterrorism involves using digital means to carry out attacks that result in
terror, fear, or harm to individuals, governments, or societies.
EX: Cyberterrorism would be the result of a planned cyberattack on vital infrastructure, including
power grids, with the goal of causing widespread disruption or fear.
3. Web Jacking: Web jacking, also known as website defacement, occurs when an attacker gains
unauthorized access to a website and alters its content for malicious purposes
EX: A hacker gains access to a company’s website and replaces the homepage with their own
messages, often expressing political or ideological views, causing reputational damage to the orga-
nization.
7
1.6 A Global Perspectives on Cybercrimes
1. In Australia, cybercrime has narrow statutory meaning as used in the Cyber Crime Act 2001, which
details offenses against computer data and systems.
2. In the Council of Europe’s (CoE) Cyber-crime Treaty, cybercrime is used as an umbrella term
to refer to an array of criminal activity including offenses against computer data and systems,
computer-related offenses, content offenses and copyright offenses.
3. The spam legislation scenario mentions “none” about India as far as E-mail legislation in India is
concerned.
4. The legislation refers to India as a “loose” legislation, although there is a mention in Section 67 of
ITA 2000.
8. As there are no national boundaries to such crimes under cybercrime realm, it requires international
cooperation between those who seek to enforce anti-spam laws.
• Extended enterprise represents the concept that a company is made up of not just its employees, its
board members and executives, but also its business partners, its suppliers and even its customers.
• An extended enterprise is a “loosely coupled, self-organizing network” of firms that combine their
economic output to provide products and services offerings to the market.
• Due to the interconnected features of information and communication technologies, security overall
can only be fully promoted when the users have full awareness of the existing threats and dangers.
• Governments, business and the international community must, therefore, proactively help users
access information on how to protect themselves.
• International cooperation at the levels of government, industry, consumer, business and technical
groups to allow a global and coordinated approach to achieving global cybersecurity is the key.
8
1.7 Cybercrime Era
1. The term “Netizen” was coined by Michael Hauben.
2. Netizen means internet users.
3. Five netizen mantra (5P) for online security are: (i) Precaution (ii) Prevention (iii) Protection (iv)
Preservation (v) Persevarance
4. NASSCOM urges that cybercrime awareness is important, and any matter should be reported at
once.
5. Some agencies have been advocating for the need to address protection of the rights of netizens.
6. There are agencies that are trying to provide guidance to innocent victims of cybercrimes, But
they are unable to get necessary support from the police.
9
2 CYBERCRIME MOBILE AND WIRELESS DEVICES
Introduction
1. In the recent years, the use of laptops, PDAs and mobile phones became an integral part of business.
2. This brings many challenges to secure these devices from being victim of cybercrime.
3. Managing these devices outside the walls of the office is challenging for the IT departments.
4. Now-a-days a simple hand-held mobile device provides enough computing power to run small
applications, play games, google search’s etc. . . .
10
2.1 Credit Card Frauds
1. New trends in mobile computing: (i) M-Commerce (ii) M-Banking
2. Credit card frauds are becoming a common place for increase in cybercrime.
3. Mobile credit card transactions are very common nowadays, new technologies combine low-cost
mobile phone technologies with the capabilities of point-of-scale(POS) terminal.
4. Wireless credit card processing allows a customer to process transactions from anywhere and any-
time.
• There are two types of techniques of credit card frauds: (i) Traditional Techniques (ii) Modern
Techniques
• Traditional Techniques are paper based fraud-application fraud, where criminal uses stolen or
fake documents such as bank statements or utility bills that can build personally Identifiable
Information(PII) to open an account in someone else name.
• Application fraud can be divided into: (i) ID theft (ii) Financial fraud
• Modern Techniques enable criminals to produce fake and doctored cards. There are two types: (i)
Triangulation
11
Australian company “Alacrity” called closed loop environment for wireless(CLEW)
12
Technical Challenges
1. Authentication service security
2. Cryptography security
1. Security of device: This refers to the measures taken to protect the mobile device (such as smart-
phones, tablets, or wearables) from unauthorized access, data breaches, malware, and physical
theft.
EX: Passcodes and Biometric, Device Encryption, Remote Wipes, App Permissions
2. Security in networks: This involves safeguarding the communication between the mobile device
and the networks it connects to, such as cellular networks, Wi-Fi, or mobile data networks.
EX: VPN (Virtual Private Network), Firewalls, Secure Wi-Fi Connections, Mobile Device Man-
agement (MDM), Two-Factor Authenticaion (2FA)
Types of attack on mobile devices
1. Push Attacks: In the push attack, the attacker creates a malicious code at the user’s mobile device
by hacking it and then he/she may spread it to affect other elements of the network.
13
2. Pull Attacks: The pull attack is a type of attack where the attacker controls the device and handles
it in his/her way. He can decide which emails they want to receive. In this attack, the user can
decide about the obtained data by the device itself.
3. Crash Attacks: A cyberthreat known as a "crash attack" uses a vulnerability to cause a system to
crash. A crash attack aims at making a monitor unusable by overloading its resources or producing
an error.
14
Types of attack on mobile devices through wireless networks
1. DoS Attacks: Denial of Service attacks attempt to disrupt the normal operation of a system,
network, or service, making it unavailable to users temporarily or indefinitely.
2. Traffic Analysis: Instead of the content of the messages, traffic analysis entails intercepting and
examining communication patterns or metadata. Its goal is to collect data on who is communicat-
ing, when, and how frequently.
15
3. Eavesdropping: The unauthorized interception of electronic communications, such as chats, emails,
or data transmissions, with the aim to listen in or obtain access to sensitive information is referred
to as eavesdropping.
4. Man-in-the-Middle(MITM): An unauthorized third party can intercept and possibly change com-
munication between two parties without the parties’ knowledge in a Man-in-the-Middle attack.
16
5. Session Hijacking: In order to steal the identity of the user, an attacker must obtain unauthorized
access to the session token or session ID. This technique is referred to as session hijacking, session
stealing, or session sniffing.
3. Media Access Control (MAC) Address Filtering: MAC address filtering is a security measure used
in network devices (such as routers) to control which devices are allowed or denied access to a
network based on their unique MAC addresses.
4. Development in 802.xx Standards: The 802.xx standards refer to a family of IEEE standards
for local area networks (LANs) and metropolitan area networks (MANs). These standards cover
various aspects of network protocols and technologies.
17
2.4 Attacks on Mobile Phones and Security Implications
Attacks on mobile phones are of six types
1. Mobile Phone Theft: Factors contributing for attacks on mobile phones
(i) Enough Terminals (Devices): The rise of mobile devices, such as smartphones, tablets, and
other linked devices, provides cybercriminals with a greater attack surface. With more devices in
use, attackers have a larger pool of potential targets to choose from.
(ii) Enough Functionality: As mobile phones get more advanced and offer a wider range of features
and functionalities, the software becomes more complex. Because of its complexity, attackers may
exploit possible weaknesses.
(iii) Enough Connectivity: The ability of mobile phones to connect to numerous networks, such
as Wi-Fi, cellular, and Bluetooth, expands the attack surface. Each connecting point is a possible
point of entry for attackers.
2. Mobile Viruses:
(i) Mobile virus is similar to computer virus
(ii) First mobile virus was detected in 2004
(iii) Mobile viruses get spread through two dominant communication mechanisms : Bluetooth,
Wi-Fi
(iv) Protecting from mobile malware attacks:
- Download or accept programs and content only from trusted sources
- Turn off Bluetooth when it is not needed
- Download and install antivirus software for mobile devices
3. Mishing: Mishing is a combination of mobile phone and Phishing. Mishing attacks are attempted
using mobile phone technology. M-Commerce is fast becoming a part of everyday life. If you use
your mobile phone for purchasing goods/services and for banking, you could be more vulnerable
to a Mishing scam
4. Vishing: "Vishing" is a type of social engineering attack carried out over the phone, specifically
Voice over Internet Protocol (VoIP) conversations. The phrase "vishing" is derived from the words
"voice" and "phishing." Vishing attacks involve phone calls to trick victims into revealing sensitive
information such as personal identification numbers (PINs), passwords, credit card details, or other
confidential information.
HOW IT WORKS?
- Caller Impersonation
- Urgency or Threat
- Request for information
- Call spoofing
18
5. Smishing: "Smishing" refers to a kind of phishing attack that takes place over SMS (Short Message
Service) or text messages. The name "smishing" is derived from the words "SMS" and "phishing."
The attacker uses false text messages in a smishing attack to fool people into disclosing sensitive
information, clicking on harmful websites, or downloading dangerous malware onto their mobile
devices.
HOW IT WORKS?
- Deceptive Message
- Phishing Content
- Malicious Links
- Malicious Downloads
6. Bluetooth Hacking:
- Bluetooth is an open wireless technology standard used for communication over short distances.
Communication done using radio waves.
- Bluetooth uses 2.4GHz frequency. The transfer speed of Bluetooth 2.0 is 3Mbps.
- The attacker installs special software and a Bluetooth antenna which scans for Bluetooth con-
nection
- Common attacks on mobiles using Bluetooth: Bluejacking, Bluesnarfing, Bluebugging, Car whis-
perer
19
Organizational Measures for Mobile Security Issues
1. Encrypting Organizational Databases:
(i) Implement data-at-rest encryption for databases, ensuring that the data stored on disks or other
storage media is encrypted. This protects the data even if physical access to the storage devices is
gained.
(ii) Consider implementing field-level encryption for sensitive data within the database. This
means that specific fields containing sensitive information are individually encrypted, providing an
additional layer of protection.
(iii) Explore the use of Transparent Data Encryption, a technology that encrypts the entire database
at the storage level. TDE helps safeguard the entire database without requiring changes to the
applications accessing the data.
(iv) Establish robust key management practices to securely store and manage encryption keys. The
security of encrypted data relies heavily on the protection of encryption keys.
2. Including Mobile Devices in Security Strategy:
(i) Deploy a Mobile Device Management (MDM) solution to manage and secure mobile devices
within the organization. MDM enables organizations to enforce security policies, monitor device
health, and remotely manage devices.
(ii) Develop and enforce clear security policies specifically addressing mobile devices. These poli-
cies should cover aspects such as device authentication, access controls, application usage, and data
protection.
(iii) Treat mobile devices as endpoints and incorporate them into the organization’s overall end-
point security strategy. This includes antivirus protection, endpoint detection and response (EDR)
solutions, and vulnerability management.
(iv) Implement strong access controls for mobile devices, including multi-factor authentication
(MFA) and device-level authentication. This ensures that only authorized users with secure de-
vices can access organizational resources.
2. Laptop Safes: Laptop safes provide a secure and lockable storage space for laptops. These safes are
typically used in hotel rooms, offices, or other locations where users need a secure place to store
their laptops temporarily.
3. Motion Sensors and Alarms: Motion sensors and alarms are electronic security measures that can
detect movement or unauthorized access to a laptop. When triggered, they can activate an alarm
or alert system.
4. Warning Labels and Stamps: Warning labels and stamps indicate that a laptop is protected or
monitored. They serve as a deterrent by alerting potential thieves or unauthorized users that
security measures are in place.
20
3 Tools and Methods used in Cybercrime
3.1 Proxy Servers and Anonymizers
Proxy Servers
1. The proxy server is a computer on the internet that accepts the incoming requests from the client
and forwards those requests to the destination server
2. it works as a gateway between the end-user and the internet. It has its own IP address. It separates
the client system and web server from the global network.
Functions:
• Anonymity: Proxies can hide the user’s IP address, providing a degree of anonymity.
• Content Filtering: Proxies can be used to filter or block specific types of content.
• Transparent Proxy - A transparent proxy is a proxy that does not modify the request or response,
but simply passes the traffic along
• Anonymous Proxy: An additional degree of privacy is offered by a proxy that hides the user’s IP
address.
21
Anonymizers
When using the internet, one can hide their identity by using an anonymizer. By hiding the user’s IP
address, anonymizers make it more difficult for websites to follow their online activities.
Functions:
• IP Masking: Anonymizers hide the user’s IP address, making it difficult to trace their online
activities
• Encrypted Connections: Some anonymizers provide encrypted connections to enhance security.
• Browsing Anonymously: Users can browse websites without revealing personal information.
Types:
• VPN - A Virtual Private Network (VPN) is a type of anonymizer that creates an encrypted con-
nection between the user’s device and the internet. All traffic between the device and the internet
is routed through the VPN, which hides the user’s IP address and provides an additional layer of
security.
• TOR - The Onion Router (TOR) is a free software program that is used to hide a user’s online
activity by routing their traffic through a network of servers. TOR is designed to be extremely
difficult to trace, making it a popular choice for users who need to mask their identity.
• Web-based anonymizers - Web-based anonymizers are online tools that allow users to browse the
internet without revealing their IP address. These tools work by routing traffic through a third-
party server, making it difficult for websites to track the user’s online activity.
Use Cases:
• Privacy: Anonymizers are used by individuals who want to protect their online privacy.
• Bypassing Restrictions: Users in censored regions may use anonymizers to access restricted content.
22
3.2 Phishing
Phishing is a kind of cyberattack in which attackers utilize clever techniques to fool victims into revealing
private information, including credit card numbers, usernames, and passwords.
Types:
• Spear Phishing: Targeted phishing attacks where the attacker customizes the phishing messages
for a specific individual or organization.
• Phishing via Email: The most common form of phishing where attackers use deceptive emails to
trick individuals into revealing sensitive information.
• Vishing (Voice Phishing): Phishing attacks conducted over the phone, where attackers use social
engineering techniques to manipulate individuals into providing sensitive information.
• Smishing (SMS Phishing): Phishing attacks conducted via text messages (SMS) on mobile devices.
• Clone Phishing: Creating a nearly identical copy such as an email or a website, and replacing the
original with the malicious version.
• Attack: Write false emails that use threatening or urgent language, frequently using a fake email
account to appear to be from a reliable source, like a bank or respectable business.
• Collection: When users connect with the harmful links or files in phishing emails, they are directed
to fake websites. Attackers gather the sensitive data that users are asked to input in this specific
case.
• Identity Theft or Fraud: Attackers uses the information that they have gathered to make illegal
purchases, or commit fraud
23
3.3 Password Cracking
The process of trying to retrieve passwords from transmitted or stored data is known as password crack-
ing. Attackers frequently utilize it to get illegal access to user accounts or systems. Password cracking
involves a variety of tactics and strategies, and it’s crucial to remember that trying to break passwords
without permission is against the law and immoral. These methods are commonly used by security
experts for penetration testing, ethical hacking, or security enhancement.
3. Password Policies: Enforce strict password policies, including regular password changes and re-
strictions on common passwords.
4. Monitor and Detect: Implement systems to monitor for suspicious activity, such as multiple failed
login attempts, and promptly detect and respond to potential breaches.
5. Encryption: Ensure that passwords are stored using strong encryption algorithms, making it diffi-
cult for attackers to reverse engineer them.
24
3.4 Key loggers and Spywares
Key Loggers
Keyloggers, short for keystroke loggers, are malicious software or hardware devices designed to record
and monitor the keystrokes typed on a computer or mobile device. The primary purpose of keyloggers
is to capture sensitive information, such as passwords, usernames, credit card numbers, and other confi-
dential data, without the user’s knowledge.
Types:
1. Software Keyloggers: hese are programs or malicious software installed on a computer or device
without the user’s knowledge.
2. Hardware Keyloggers: Physical devices connected between the computer’s keyboard and the com-
puter itself.
3. Memory-injecting Keyloggers: These keyloggers inject themselves into the computer’s memory
(RAM).
4. Wireless Keyloggers: Keyloggers that transmit captured data wirelessly to an attacker.
Antikeylogger:
It is a tool that can detect keylogger insatlled on the computer system and also can remove the tool.
Advantages of Antikeyloggers:
• Firewalls cannot detect the installation of keyloggers, but anti-keyloggers can.
• Prevents internet banking fraud. Passwords can be easily gained by using a keyloggers
• It prevents ID theft
• It secures E-Mail and instant messaging / chatting
Spyware
Spyware refers to software that secretly monitors and collects user information without the user’s knowl-
edge or consent. This type of software is often malicious in nature and can compromise the privacy and
security of individuals and organizations. Spyware is typically designed to gather sensitive information,
track user activities, or deliver unwanted advertisements.
3. Browser Tracking: Spyware often monitors web browsing activities, such as visited websites, search
queries, and online transactions.
4. Keylogging: Some spyware includes keyloggers, which record keystrokes on a keyboard. This can
capture sensitive information like usernames and passwords.
5. Screen Capture: Some advanced spyware can capture screenshots of the user’s desktop, providing
visual information about the user’s activities.
6. Adware: Some spyware variants function as adware, delivering unwanted advertisements or redi-
recting users to advertising websites.
25
3.5 Virus and Worms
Virus:
Computer viruses are malicious software programs designed to replicate and spread to other computers
and systems. They can cause a variety of harmful effects, ranging from disrupting system functionality
to stealing sensitive information.
1. File Infector Virus: These viruses attach themselves to executable files (e.g., .exe or .dll) and
activate when the infected file is executed.
2. Boot Sector Virus: These viruses infect the master boot record (MBR) or boot sector of a com-
puter’s hard drive or removable media.
3. Macro Virus: Macro viruses infect document files that support macros, such as Microsoft Word or
Excel. They use the macro scripting language to execute malicious actions.
4. Polymorphic Viruses: Polymorphic viruses change their code or appearance each time they infect
a new file or system, making it challenging for antivirus programs to detect them.
5. Resident Viruses: Resident viruses embed themselves in a computer’s memory, allowing them to
infect files and applications as they are opened or executed.
6. Multipartite Viruses: Multipartite viruses can infect both files and the master boot record, making
them more complex and potentially more damaging.
Famous computer viruses:
• WannaCry - 2017
26
Worms
Computer worms are a type of malicious software (malware) that can replicate and spread independently
across computer networks, often without requiring any user interaction. Unlike viruses, worms don’t need
to attach themselves to host files or programs to propagate. Instead, they exploit vulnerabilities in net-
worked systems, allowing them to self-replicate and spread from one computer to another.
• File Sharing
• USB Drives
Types of Worms:
1. Email Worm: Spread through email attachments or links. Users unknowingly execute the worm
by opening infected attachments or clicking on malicious links.
2. Network Worm: Exploit vulnerabilities in network protocols or services to spread from one system
to another. Often propagate autonomously without user interaction.
3. File-sharing Worms: Propagate through shared files and folders on local networks. Exploit vulner-
abilities in file-sharing protocols to move from one computer to another.
4. Instant Messaging Worms: Spread through instant messaging platforms. May send malicious links
or files to contacts in the infected user’s contact list.
5. USB Worms: Exploit the auto-run feature on removable media, such as USB drives, to infect
systems when the media is connected.
Comparison between computer viruses and worms
27
Trojan Horse:
A Trojan Horse, often known as a Trojan, is a kind of malicious software (malware) that appears as
something trustworthy or innocent but, when it is executed, takes control of a computer system and uses
it to carry out illegal and frequently destructive tasks. The term "Trojan Horse" refers to a story from
Greek mythology in which the Greeks entered Troy by using a wooden horse that was trickery. Trojan
software can fools people by pretending to be harmless or even helpful.
Types:
1. Zeus(Zbot): A notorious banking Trojan designed to steal financial information, particularly tar-
geting online banking credentials.
2. SpyEye: Similar to Zeus, SpyEye is a banking Trojan that focuses on stealing sensitive financial
data.
3. Back orifice: A remote access Trojan that allows unauthorized users to control a system remotely
4. SubSeven (Sub7):A popular backdoor Trojan that provides attackers with control over infected
systems.
5. DarkTequila: A sophisticated Trojan designed to steal financial information and login credentials,
primarily targeting users in Latin America.
Backdoors:
In computer security context, a backdoor is a hidden, frequently unapproved entry point into a system,
program, or network. It makes it possible to gain hidden or remote access to a computer or network
without the owner or user’s knowledge or approval. Backdoors are frequently purposefully constructed
by attackers or, occasionally, by programmers for good reasons.
Types:
1. Software Backdoors: Intentionally created by software developers for legitimate purposes (e.g.,
system maintenance tools) or inserted maliciously into software.
2. Hardware Backdoors: Unauthorized access points intentionally built into hardware components,
allowing for persistent access.
3. Rootkits: Software or firmware that provides unauthorized access while concealing its presence by
modifying or replacing system components.
4. Trojan Backdoors: Backdoors that are part of Trojan Horse malware, which may disguise itself as
legitimate software to trick users into installing it.
5. Network Backdoors: Hidden entry points within network infrastructure, allowing attackers to by-
pass security measures and gain access to sensitive data.
28
3.6 Steganography
The process of hiding one piece of information inside another so that it is challenging or practically
impossible to identify is known as steganography. Steganography attempts to hide the message’s very
existence, as compared to cryptography, which is more concerned with protecting a message’s contents.
Use Cases:
• Secure Communication: Steganography can be used to hide messages in plain sight, allowing for
covert communication without attracting attention.
29
Difference between Steganography and cryptography
30
3.7 DoS and DDoS Attacks:
DoS Attack:
Attacks known as denial-of-service (DoS) attempts are malicious attempts to cause disruption with a
network’s, service’s, or website’s normal operation by flooding it with an excessive amount of unautho-
rized requests or traffic. A denial-of-service (DoS) attack aims to prevent authorized users from accessing
the targeted system or network.
Characteristics:
1. TCP/IP Protocol Exploits: SYN/ACK attacks, TCP/IP stack exploits, or resource exhaustion
attacks targeting network protocols.
2. Volumetric Attacks: Flood the target with a high volume of traffic, such as ICMP flood (Ping
flood) or UDP flood.
3. Application Layer Attacks: Target web servers or applications using techniques like HTTP floods,
slowloris attacks, or application-specific exploits.
4. DNS Amplifications: Exploit open DNS resolvers to amplify the volume of attack traffic directed
at the target.
5. Smurf Attack: ICMP Echo Request packets are sent to broadcast addresses, causing multiple
systems to respond to the victim, amplifying the attack.
6. NTP Amplification: Exploit Network Time Protocol (NTP) servers to amplify attack traffic di-
rected at the target.d
Tools for DoS Attacks:
• Jolt2
• Nemesy
• Targa
• Crazy Pinger
• SomeTrouble
31
DDoS Attacks
A distributed denial-of-service (DDoS) attack is a malicious attempt aimed at disrupting the regular op-
eration of a network, service, or webpage by flooding it with an excessive volume of traffic coming from
various sources. DDoS attacks, compared with traditional DoS attacks, are the result of a coordinated
effort utilizing several compromised devices to create a botnet.
• Find DDoS
• DDoSPing
• Security Auditor’s Research Assistant (SARA)
32
3.8 SQL Injection
SQL injection is a type of cyber attack where an attacker inserts malicious SQL (Structured Query
Language) code into input fields or commands, exploiting vulnerabilities in a web application’s database
layer. This can lead to unauthorized access, manipulation, or disclosure of sensitive data
33
3.9 Buffer Overflow
A buffer overflow is a type of software vulnerability that occurs when a program writes more data to a
buffer—temporary data storage area in computer memory—than it was allocated, leading to the overflow
of excess data into adjacent memory locations. This overflow can potentially overwrite other critical data
structures, causing unexpected behavior and security issues
EXAMPLE:
2. Excessive Data Input: The program receives input that exceeds the allocated buffer size, causing
the excess data to overflow into adjacent memory regions.
3. Memory Corruption: The overflowed data can corrupt adjacent memory structures, including func-
tion pointers, return addresses, or control data.
4. Exploitation: An attacker can craft malicious input to exploit the overflow, potentially gaining
unauthorized access, executing arbitrary code, or causing a denial of service.
Types of Buffer Overflows:
1. Stack-Based Buffer Overflow: Occurs when the overflowed data affects the stack memory, poten-
tially altering function return addresses.
2. Heap-Based Buffer Overflow: Involves overflowing buffers in the heap memory, impacting dynam-
ically allocated memory regions.
3. Integer Overflow: Results from arithmetic operations causing an overflow, leading to unintended
behavior.
34
Prevention and Mitigation:
1. Bounds Checking: Implement bounds checking to ensure that data written to a buffer does not
exceed its allocated size.
2. Input Validation: Validate and sanitize user input to prevent input that could trigger buffer over-
flows.
3. Runtime Checks: Use runtime checks and monitoring tools to detect buffer overflows and other
memory-related issues.
4. Regular Software Updates: Keep software and systems up to date with the latest security patches
to address known vulnerabilities.
5. Static Code Analysis: Perform static code analysis to identify and eliminate potential buffer over-
flow vulnerabilities during development.
Tools to Prevent from Bufferoverflow
• StackGuard
• ProPolice
• LibSafe
35
3.10 Attacks on Wireless Networks
Explain the traditional attacks on wireless networks mention any two tools used to protect
wireless network.
**Traditional Attacks on Wireless Networks:**
1. **Wireless Eavesdropping (Sniffing):**
- *Description:* Unauthorized interception of wireless communications to capture sensitive information.
- *Description:* Sending frames to force clients or access points to disconnect, causing disruptions or
creating opportunities for other attacks.
- *Description:* Implementing WPA3 for strong encryption, safeguarding data from eavesdropping.
- *Description:* Monitoring network traffic, detecting and preventing attacks, including deauthenti-
cation attacks.
- *Tool:* Snort - Open-source IDPS for network behavior analysis and proactive security measures.
36
How do you secure wireless network from attacks
**Key Steps to Secure a Wireless Network:**
1. **Encryption:**
2. **Strong Passwords:**
- Employ unique and strong passwords for both the network and router.
6. **Firmware Updates:**
7. **Firewall Protection:**
9. **VLAN Implementation:**
37