0% found this document useful (0 votes)
58 views37 pages

Cyber Security

The document discusses cybercrime, its classifications, and the legal perspectives surrounding it, particularly focusing on the impact of cybercrime on individuals, organizations, and society. It outlines various types of cybercrimes, including identity theft, phishing, and cyber terrorism, and emphasizes the importance of information security in protecting sensitive data. Additionally, it highlights the challenges posed by mobile devices and the tools and methods used by cybercriminals.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views37 pages

Cyber Security

The document discusses cybercrime, its classifications, and the legal perspectives surrounding it, particularly focusing on the impact of cybercrime on individuals, organizations, and society. It outlines various types of cybercrimes, including identity theft, phishing, and cyber terrorism, and emphasizes the importance of information security in protecting sensitive data. Additionally, it highlights the challenges posed by mobile devices and the tools and methods used by cybercriminals.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

Cyber Security Ethics Laws

(21ADH57)
Artificial Intelligence and Data Science
Nitte Meenakshi Institute Of Technology
Bengaluru - 560064

1
Contents
1 CYBERCRIME AND INFORMATION SECURITY 3
1.1 Cybercrime and Information Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2 Classificiation of Cybercrimes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
1.3 legal Perspectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.4 Indian Perspectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.5 Hacking and Indian Laws . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.6 A Global Perspectives on Cybercrimes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.7 Cybercrime Era . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

2 CYBERCRIME MOBILE AND WIRELESS DEVICES 10


2.1 Credit Card Frauds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.2 Security Challenges Posed by Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.3 Authentication Service Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.4 Attacks on Mobile Phones and Security Implications . . . . . . . . . . . . . . . . . . . . . 18
2.5 Organizational Measures for Handling Mobile . . . . . . . . . . . . . . . . . . . . . . . . . 19

3 Tools and Methods used in Cybercrime 21


3.1 Proxy Servers and Anonymizers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
3.2 Phishing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3.3 Password Cracking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.4 Key loggers and Spywares . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3.5 Virus and Worms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
3.6 Steganography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.7 DoS and DDoS Attacks: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.8 SQL Injection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
3.9 Buffer Overflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.10 Attacks on Wireless Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

2
1 CYBERCRIME AND INFORMATION SECURITY
What is Cybercrime?
1. Cybercrime is criminal activity that either targets or uses a computer, a computer network or a
networked device.
2. Cybercrime can be carrier out by individuals or organizations
3. In the year 1834 the first cyber attack took place in France. Attackers stole financial market
information by accessing the French telegraph system

Cybercrime can be generally divided into two categories:


Crimes that aim at computer networks or devices: These types of crimes involve different threats
(like bugs, virus etc) and Denial-Of-Services (DoS) Attacks.
Crimes that use computer networks to commit other criminal: These types of crime includes
cyber stalking, financial fraud or identity thefts
Cyber Terrorism:
• It is described as the use of the Internet to carry out violent crimes that cause or threaten serious
physical harm or death in order to advance political or ideological goals by creating a threat.
• This term was coined by Barry Collin, a senior research fellow at the Institute for Security and
Intelligence in California.
Cyber Warfare:
Cyberwarfare is believed to be a collection of activities taken by a country or organizations against other
countries or institutions’ computer networks with the goal of causing infrastructure damage or destruc-
tion through the deployment of computer viruses or denial-of-service attacks.

Cyberspace:
• Cyberspace is a network of computer networks or devices that communicates via TCP and IP
protocols to make data transfer and exchange easier.
• This term was coined by William Gibson. A Science fiction writer, in his Sci-Fi novel "Neuo-
mancer".
Cyber squatting:
• Cyber squatting is the practice of buying domain names taht have existing buiness names.
• It is donw with the intent to sell these domain name to earn profit

3
1.1 Cybercrime and Information Security
• Information security protects sensitive data from unauthorized actions such as inspection, modifi-
cation, recording, and any interruption or destruction.
• Cybersecurity refers to the protection of information, equipment, computers, computer resources,
communication devices, and data stores from illegal access, use, disclosure, modification, or de-
struction.

Causes of Cybercrime:

• Ease of Access: The ease of access to digital tools and the internet allows people to participate in
cybercrime without the need for advanced technical knowledge. Potential hackers find it easier to
access websites like the dark web, online forums, and hacking tools that are easy to use.
• Negligence: When people or organizations act carelessly or irresponsibly with regard to their
digital security, it’s referred to as negligence. Poor security measures, outdated software, and
weak passwords are a few examples of this. Cybercriminals frequently use these flaws to gain
unauthorized access or launch attacks.
• Revenge or Motivation: Some cybercrimes are motivated by ideological beliefs, revenge, or anger.
Hacking, harassment, and other harmful operations can be carried out by individuals or groups in
order to take revenge or further a specific cause. Personal conflicts, political disagreements, and
ideological differences are examples of motivations.
• Poor Law Enforcing Bodies: The frequency of cybercrime activities may be related to the lack of
enforcement of cybercrime legislation. Cybercriminals believe they may operate with freedom in an
environment where law enforcement agencies lack the tools, knowledge, or authority to successfully
combat cybercrimes.

• Cybercrimes Committed for Publicity or Recognition: Cybercriminals sometimes commit their


crimes with the goal of becoming well-known or famous. This could be high-profile hacking assaults
on well-known companies or people in order to show off one’s abilities or spread a specific message.
Such cybercrimes may be motivated by a desire for fame or recognition.

4
1.2 Classificiation of Cybercrimes
Cybercrime is generally can be classified into four categories:
1. Cybercrime against Individual: Cybercrimes that specifically target individuals belong under this
category. Identity theft, cyberbullying, phishing attempts to obtain personal data, and financial
fraud directed at specific people are a few examples. To commit these crimes, cybercriminals
may take advantage of weaknesses in a person’s social media profiles, personal gadgets, or online
presence.
2. Cybercrime against Property: Malicious actions that try to destroy or damage with digital assets,
such data, networks, or computer systems, are the main focus of cybercrimes against property.
A denial-of-service (DoS) attack for tampering with online services, breaking into a company’s
database to steal intellectual property, or spreading malware that harms computer systems are a
few examples. Often, the goal is to injure finances or obtain a competitive edge.
3. Cybercrime against Organization: Cybercrimes that target companies, governmental bodies, or
other organizational structures fall under this category. Examples include financial fraud targeting
company accounts, ransomware attacks that demand payment for data recovery, data breaches
that expose sensitive information, and corporate spying. These crimes can have a variety of effects,
such as reputational harm and financial losses.
4. Cybercrime agains Society: Cybercrimes against society include actions that impact the gen-
eral well-being of communities or countries and have wider social consequences. Examples include
attacks on vital infrastructure (such power grids or communication networks), the spread of misin-
formation or propaganda, cyberterrorism, and massive financial frauds that have an effect on the
economy. The public’s safety and national security are frequently seriously threatened by these
acts.
Cybercime Against Individual:
This type is targeting individuals. It includes:
1. E-mail Spoofing: An attacker can use the method known as "email spoofing" to mimic the appear-
ance of an email from a trustworthy or authentic source by manipulating the email header.
EX: A cybercriminal may send an email that appears to be from a bank, requesting the recipient
to provide sensitive information such as passwords or credit card details.
2. Phishing: Phishing is a kind of cybercrime in which attackers fool victims into revealing private
information, including usernames, passwords, or bank account information, by sending them false
emails, messages, or webpages.
EX: A phishing email might mimic a popular online service, prompting the user to click on a link
and enter login credentials on a fake website
3. Cyberdefamation: The act of spreading false and harmful information about a person or organi-
zation via digital media, frequently with the intention of hurting their reputation, is known as
cyberdefamation.
EX: Posting false and defamatory statements about an individual on social media or other online
platforms.
4. Cyberstalking: Cyberstalking is the practice of continuously harassing or stalking someone via
electronic means in an effort to cause fear or mental distress.
EX: Continuously sending threatening emails, messages, or comments on social media platforms
to a specific person.
5. Pornographic Offenses: When it comes to cybercrime, pornographic offenses are defined as using
digital platforms to create, distribute, or view explicit or illegal information.
EX: Sharing, distributing, or producing child pornography using online platforms.

6. Password Sniffing: Passwords can be intercepted and captured by an attacker using a technique
called "password sniffing" when they are sent over a network.
EX: Using a network sniffing tool to capture login credentials sent over an unsecured Wi-Fi network,
allowing unauthorized access to the victim’s accounts.

5
Cybercrime Against Organization:
1. Unauthorized Accessing of Computer: Unauthorized access occurs when an individual gains entry
to a computer system, network, or data without permission.
EX: A hacker exploits a weak password to gain unauthorized access to a company’s server and
extract sensitive information.
2. Denial-Of-Service Attacks: DoS attacks overload a system, network, or website, making it unavail-
able to users either permanently or just temporarily.
EX: A flood of traffic is directed towards a website, causing it to become slow or unavailable for
legitimate users.

3. Virus Attack: Malicious software that attaches itself to trustworthy programs and spreads when
those programs are run is known as a virus.
EX: Opening an infected email attachment that contains a virus, leading to the spread of the virus
throughout the user’s system.

4. E-Mail Bombing: The act of flooding a target’s inbox with a large number of emails is known as
"email bombing."
EX: sending a person’s email address hundreds of emails in a short amount of time, overcrowding
their email server.
5. Salami Attacks: A salami attack involves an attacker quietly taking small sums from multiple
transactions in the hopes that the errors would go undiscovered.
EX: A financial system is manipulated by a programmer to round down fractions of a penny from
multiple transactions and transfer the whole amount to their account.
6. Logic Bomb: A logic bomb is a malicious piece of code that is introduced into a system or program
to cause it to operate maliciously under specific conditions.
EX: An employee includes code in a software program that will erase critical data if they are
terminated from their job.
7. Trojan Horse: Malware that acts as trustworthy software and gains illegal access to a computer
system is known as a Trojan horse.
EX: Downloading and installing a seemingly harmless software application that, unbeknownst to
the user, contains a hidden Trojan horse.

8. Data Diddling: Data diddling is the practice of modifying data to manipulate or falsify information
before or during input into a computer system.
EX: An employee modifies financial records in a database to divert funds to their account without
raising suspicion.

Cybercrime Against Property:

1. Credit Card Frauds: Credit card fraud involves the unauthorized use of someone else’s credit card
information to make purchases or withdraw funds.
EX: A criminal gains access to a person’s credit card details through phishing or hacking and uses
the information to make fraudulent online purchases.
2. Intellectual Property (IP) Crimes: The illegal use, duplication, or distribution of another person’s
intellectual property—such as trade secrets, patents, trademarks, or copyrights—contains intellec-
tual property offenses.
EX: A business violates the intellectual property rights of the original creator when it makes unau-
thorised copies of a patented product and sells it.
3. Internet Time Theft: Internet time theft occurs when employees use company time and resources
for personal internet activities during working hours.
EX: An employee spends work hours browsing social media, playing online games, or conducting
personal business instead of performing their job duties.

6
Cybercrime Against Society:
1. Forgery: Forgery involves creating, altering, or imitating documents, signatures, or other items
with the intent to deceive or defraud.
EX: : Creating a fake passport, altering a check, or forging a signature on a legal document are
instances of forgery.
2. Cyberterrorism: Cyberterrorism involves using digital means to carry out attacks that result in
terror, fear, or harm to individuals, governments, or societies.
EX: Cyberterrorism would be the result of a planned cyberattack on vital infrastructure, including
power grids, with the goal of causing widespread disruption or fear.
3. Web Jacking: Web jacking, also known as website defacement, occurs when an attacker gains
unauthorized access to a website and alters its content for malicious purposes
EX: A hacker gains access to a company’s website and replaces the homepage with their own
messages, often expressing political or ideological views, causing reputational damage to the orga-
nization.

1.3 legal Perspectives


1. In the first comprehensive presentation of computer crime: Criminal Justice Resource Manual
(1979). It defined cybercrime as "Any illegal act for which knowledge of computer technology is
essential for a successful prosecution.
2. International legal aspects of computer crime were studied in 1983. In that study computer crime
was defined as "Encompasses any illegal act for which knowledge of computer technology is essential
for its perpetration.
3. Globalized information systems accommodate an increasing number of transnational offences.
4. The network context of cybercrime makes it one of the most globalized offenses of the present and
the most modernised threats of the future.
5. There are two ways to resolve this problem: (i) To divide information system into segments bordered
by state boundaries. (ii) To incorporate the legal system into an integrated entity.

1.4 Indian Perspectives


1. India has the second highest number of internet users in the world (in 2022).
2. Most of the internet access happen from cyber cafes.
3. The age group of most of Indian internet users In between 18 to 35 years.
4. It is reported that compared to the year 2006, cybercrime under the information Technology (IT)
Act recorded a whopping 50
5. Majority of offenders were under 30 years. The Indian government is doing its best to control
cybercrime

1.5 Hacking and Indian Laws


1. In India, the information technology Act, ITA 2000 was enacted after the United nation General
Assembly Resolution A/RES/51/162 in January 30, 1997 by adopting the “Model Law on Electronic
Commerce” adopted by the United Nations Commission on International Trade Law(UNICITRAL).
2. This was the first step toward the law relating to E-Commerce at international level to regulate an
alternative form of commerce and to give legal status in the area of E-Commerce.
3. It was enacted taking into consideration UNICITRAL model of Law on Electronic Commerce(1996).
4. Cybercrimes are punishable under two categories: (i) The ITA 2000 (ii) Indian penal Code(IPC)
5. A total of 207 cases of cybercrime were registered under the IT Act in 2007 compared to 142 cases
registered in 2006
6. Under the IPC, 339 cases were recorded in 2007 compared to 311 cases in 2006

7
1.6 A Global Perspectives on Cybercrimes
1. In Australia, cybercrime has narrow statutory meaning as used in the Cyber Crime Act 2001, which
details offenses against computer data and systems.
2. In the Council of Europe’s (CoE) Cyber-crime Treaty, cybercrime is used as an umbrella term
to refer to an array of criminal activity including offenses against computer data and systems,
computer-related offenses, content offenses and copyright offenses.

3. The spam legislation scenario mentions “none” about India as far as E-mail legislation in India is
concerned.
4. The legislation refers to India as a “loose” legislation, although there is a mention in Section 67 of
ITA 2000.

5. About 30 countries have enacted some form of anti-spam legislation.


6. There are also technical solutions by ISPs and end-users. Inspite of this, so far there has been no
significant impact on the volume of spam.
7. Spam is used to support fraudulent and criminal activities.

8. As there are no national boundaries to such crimes under cybercrime realm, it requires international
cooperation between those who seek to enforce anti-spam laws.

Cybercrime and the Extended Enterprise

• Extended enterprise represents the concept that a company is made up of not just its employees, its
board members and executives, but also its business partners, its suppliers and even its customers.
• An extended enterprise is a “loosely coupled, self-organizing network” of firms that combine their
economic output to provide products and services offerings to the market.

• Due to the interconnected features of information and communication technologies, security overall
can only be fully promoted when the users have full awareness of the existing threats and dangers.
• Governments, business and the international community must, therefore, proactively help users
access information on how to protect themselves.

• International cooperation at the levels of government, industry, consumer, business and technical
groups to allow a global and coordinated approach to achieving global cybersecurity is the key.

8
1.7 Cybercrime Era
1. The term “Netizen” was coined by Michael Hauben.
2. Netizen means internet users.
3. Five netizen mantra (5P) for online security are: (i) Precaution (ii) Prevention (iii) Protection (iv)
Preservation (v) Persevarance

4. NASSCOM urges that cybercrime awareness is important, and any matter should be reported at
once.
5. Some agencies have been advocating for the need to address protection of the rights of netizens.
6. There are agencies that are trying to provide guidance to innocent victims of cybercrimes, But
they are unable to get necessary support from the police.

9
2 CYBERCRIME MOBILE AND WIRELESS DEVICES
Introduction

1. In the recent years, the use of laptops, PDAs and mobile phones became an integral part of business.
2. This brings many challenges to secure these devices from being victim of cybercrime.
3. Managing these devices outside the walls of the office is challenging for the IT departments.

4. Now-a-days a simple hand-held mobile device provides enough computing power to run small
applications, play games, google search’s etc. . . .

10
2.1 Credit Card Frauds
1. New trends in mobile computing: (i) M-Commerce (ii) M-Banking
2. Credit card frauds are becoming a common place for increase in cybercrime.
3. Mobile credit card transactions are very common nowadays, new technologies combine low-cost
mobile phone technologies with the capabilities of point-of-scale(POS) terminal.

4. Wireless credit card processing allows a customer to process transactions from anywhere and any-
time.

Types and Techniques of credit card Frauds:

• There are two types of techniques of credit card frauds: (i) Traditional Techniques (ii) Modern
Techniques
• Traditional Techniques are paper based fraud-application fraud, where criminal uses stolen or
fake documents such as bank statements or utility bills that can build personally Identifiable
Information(PII) to open an account in someone else name.
• Application fraud can be divided into: (i) ID theft (ii) Financial fraud
• Modern Techniques enable criminals to produce fake and doctored cards. There are two types: (i)
Triangulation

(ii) Credit card generators: This technique re-


quire specialized hardware to generate duplicate credit cards with our details

11
Australian company “Alacrity” called closed loop environment for wireless(CLEW)

2.2 Security Challenges Posed by Mobile Devices


1. There are two major challenges in using mobile and wireless device namely: (i) Information goes
outside physically controlled environment (ii) Remote access back to protected environment.
2. As the number of mobile device users increase, two challenges are presented: (i) Micro chal-
lenge(device level) (ii) Macro challenge(organizational level)

12
Technical Challenges
1. Authentication service security
2. Cryptography security

3. Lightweight Directory Access Protocol (LDAP) security


4. Remotes Access Server(RAS) security
5. Media player control security

6. Networking application program interface(API) security

2.3 Authentication Service Security


Two components of security in mobile computing

1. Security of device: This refers to the measures taken to protect the mobile device (such as smart-
phones, tablets, or wearables) from unauthorized access, data breaches, malware, and physical
theft.
EX: Passcodes and Biometric, Device Encryption, Remote Wipes, App Permissions

2. Security in networks: This involves safeguarding the communication between the mobile device
and the networks it connects to, such as cellular networks, Wi-Fi, or mobile data networks.
EX: VPN (Virtual Private Network), Firewalls, Secure Wi-Fi Connections, Mobile Device Man-
agement (MDM), Two-Factor Authenticaion (2FA)
Types of attack on mobile devices

1. Push Attacks: In the push attack, the attacker creates a malicious code at the user’s mobile device
by hacking it and then he/she may spread it to affect other elements of the network.

13
2. Pull Attacks: The pull attack is a type of attack where the attacker controls the device and handles
it in his/her way. He can decide which emails they want to receive. In this attack, the user can
decide about the obtained data by the device itself.

3. Crash Attacks: A cyberthreat known as a "crash attack" uses a vulnerability to cause a system to
crash. A crash attack aims at making a monitor unusable by overloading its resources or producing
an error.

14
Types of attack on mobile devices through wireless networks
1. DoS Attacks: Denial of Service attacks attempt to disrupt the normal operation of a system,
network, or service, making it unavailable to users temporarily or indefinitely.

2. Traffic Analysis: Instead of the content of the messages, traffic analysis entails intercepting and
examining communication patterns or metadata. Its goal is to collect data on who is communicat-
ing, when, and how frequently.

15
3. Eavesdropping: The unauthorized interception of electronic communications, such as chats, emails,
or data transmissions, with the aim to listen in or obtain access to sensitive information is referred
to as eavesdropping.

4. Man-in-the-Middle(MITM): An unauthorized third party can intercept and possibly change com-
munication between two parties without the parties’ knowledge in a Man-in-the-Middle attack.

16
5. Session Hijacking: In order to steal the identity of the user, an attacker must obtain unauthorized
access to the session token or session ID. This technique is referred to as session hijacking, session
stealing, or session sniffing.

Security measures against attacks


1. Wireless Application Protocol (WAP): WAP is a technical standard for accessing information over
a mobile wireless network. It provides a framework for the delivery of web content and services
to mobile devices, making it easier to browse the internet using mobile phones and other wireless
devices.
2. Virtual Private Networks (VPN): A VPN is a technology that creates a secure and encrypted
connection over a less secure network, such as the internet. It allows users to access and transmit
data over public networks as if their devices were directly connected to a private network.

3. Media Access Control (MAC) Address Filtering: MAC address filtering is a security measure used
in network devices (such as routers) to control which devices are allowed or denied access to a
network based on their unique MAC addresses.
4. Development in 802.xx Standards: The 802.xx standards refer to a family of IEEE standards
for local area networks (LANs) and metropolitan area networks (MANs). These standards cover
various aspects of network protocols and technologies.

17
2.4 Attacks on Mobile Phones and Security Implications
Attacks on mobile phones are of six types
1. Mobile Phone Theft: Factors contributing for attacks on mobile phones
(i) Enough Terminals (Devices): The rise of mobile devices, such as smartphones, tablets, and
other linked devices, provides cybercriminals with a greater attack surface. With more devices in
use, attackers have a larger pool of potential targets to choose from.
(ii) Enough Functionality: As mobile phones get more advanced and offer a wider range of features
and functionalities, the software becomes more complex. Because of its complexity, attackers may
exploit possible weaknesses.
(iii) Enough Connectivity: The ability of mobile phones to connect to numerous networks, such
as Wi-Fi, cellular, and Bluetooth, expands the attack surface. Each connecting point is a possible
point of entry for attackers.
2. Mobile Viruses:
(i) Mobile virus is similar to computer virus
(ii) First mobile virus was detected in 2004
(iii) Mobile viruses get spread through two dominant communication mechanisms : Bluetooth,
Wi-Fi
(iv) Protecting from mobile malware attacks:
- Download or accept programs and content only from trusted sources
- Turn off Bluetooth when it is not needed
- Download and install antivirus software for mobile devices
3. Mishing: Mishing is a combination of mobile phone and Phishing. Mishing attacks are attempted
using mobile phone technology. M-Commerce is fast becoming a part of everyday life. If you use
your mobile phone for purchasing goods/services and for banking, you could be more vulnerable
to a Mishing scam
4. Vishing: "Vishing" is a type of social engineering attack carried out over the phone, specifically
Voice over Internet Protocol (VoIP) conversations. The phrase "vishing" is derived from the words
"voice" and "phishing." Vishing attacks involve phone calls to trick victims into revealing sensitive
information such as personal identification numbers (PINs), passwords, credit card details, or other
confidential information.

HOW IT WORKS?
- Caller Impersonation
- Urgency or Threat
- Request for information
- Call spoofing

Tips for protection against vishing


- Be suspicious about all the unknown calls.
- Do not trust caller ID, it does not provide correct information.
- Question the person who is asking for your personal details or information
- Report vishing to the nearest cyberpolice cell.

18
5. Smishing: "Smishing" refers to a kind of phishing attack that takes place over SMS (Short Message
Service) or text messages. The name "smishing" is derived from the words "SMS" and "phishing."
The attacker uses false text messages in a smishing attack to fool people into disclosing sensitive
information, clicking on harmful websites, or downloading dangerous malware onto their mobile
devices.

HOW IT WORKS?
- Deceptive Message
- Phishing Content
- Malicious Links
- Malicious Downloads

Tips for protection against smishing


- Don’t answer unknown text messages.
- Avoid calling any unknown numbers written in unknown text messages.
- Never click a link in unknown messages.

6. Bluetooth Hacking:
- Bluetooth is an open wireless technology standard used for communication over short distances.
Communication done using radio waves.
- Bluetooth uses 2.4GHz frequency. The transfer speed of Bluetooth 2.0 is 3Mbps.
- The attacker installs special software and a Bluetooth antenna which scans for Bluetooth con-
nection
- Common attacks on mobiles using Bluetooth: Bluejacking, Bluesnarfing, Bluebugging, Car whis-
perer

2.5 Organizational Measures for Handling Mobile


Mobile Devices: Security Implications for Organisations
1. Managing diversity and proliferation of hand-held devices:
- Use MDM tools to manage and secure a diverse range of handheld devices. This includes enforcing
security policies, applying updates, and remotely managing devices.
- Clearly define the rules and guidelines for employees using their personal devices for work. Specify
security requirements, acceptable use policies, and procedures for accessing company resources.
2. Unconventional/Stealth Storage Devices:
- Restrict or disable the use of USB ports to prevent the connection of unauthorized storage devices.
- Employ network monitoring tools to detect and identify unconventional storage devices or suspi-
cious activities on the network.
- Raise awareness among employees about the risks associated with using unauthorized storage
devices and the importance of following security policies.
3. Threats Through Lost and Stolen Devices:
- Implement full-disk encryption to protect data in case a device is lost or stolen.
- Ensure that devices can be remotely wiped to erase sensitive data in the event of loss or theft.
- Implement tracking features to locate lost or stolen devices and, if possible, recover them.
4. Protecting Data on Lost Devices:
- Enforce the use of strong passwords, PINs, or biometrics to access devices.
- Ensure that sensitive apps have additional security layers, such as biometric authentication or
two-factor authentication.
- Encourage users to regularly back up their data to a secure and authorized location.

19
Organizational Measures for Mobile Security Issues
1. Encrypting Organizational Databases:
(i) Implement data-at-rest encryption for databases, ensuring that the data stored on disks or other
storage media is encrypted. This protects the data even if physical access to the storage devices is
gained.
(ii) Consider implementing field-level encryption for sensitive data within the database. This
means that specific fields containing sensitive information are individually encrypted, providing an
additional layer of protection.
(iii) Explore the use of Transparent Data Encryption, a technology that encrypts the entire database
at the storage level. TDE helps safeguard the entire database without requiring changes to the
applications accessing the data.
(iv) Establish robust key management practices to securely store and manage encryption keys. The
security of encrypted data relies heavily on the protection of encryption keys.
2. Including Mobile Devices in Security Strategy:
(i) Deploy a Mobile Device Management (MDM) solution to manage and secure mobile devices
within the organization. MDM enables organizations to enforce security policies, monitor device
health, and remotely manage devices.
(ii) Develop and enforce clear security policies specifically addressing mobile devices. These poli-
cies should cover aspects such as device authentication, access controls, application usage, and data
protection.
(iii) Treat mobile devices as endpoints and incorporate them into the organization’s overall end-
point security strategy. This includes antivirus protection, endpoint detection and response (EDR)
solutions, and vulnerability management.
(iv) Implement strong access controls for mobile devices, including multi-factor authentication
(MFA) and device-level authentication. This ensures that only authorized users with secure de-
vices can access organizational resources.

Laptop Security measures


1. Cables and Hardwired Locks: Cables and hardwired locks are physical security measures that
involve securing laptops to a fixed object using a cable and lock. This helps prevent theft or
unauthorized removal of laptops from a specific location.

2. Laptop Safes: Laptop safes provide a secure and lockable storage space for laptops. These safes are
typically used in hotel rooms, offices, or other locations where users need a secure place to store
their laptops temporarily.
3. Motion Sensors and Alarms: Motion sensors and alarms are electronic security measures that can
detect movement or unauthorized access to a laptop. When triggered, they can activate an alarm
or alert system.
4. Warning Labels and Stamps: Warning labels and stamps indicate that a laptop is protected or
monitored. They serve as a deterrent by alerting potential thieves or unauthorized users that
security measures are in place.

20
3 Tools and Methods used in Cybercrime
3.1 Proxy Servers and Anonymizers
Proxy Servers
1. The proxy server is a computer on the internet that accepts the incoming requests from the client
and forwards those requests to the destination server
2. it works as a gateway between the end-user and the internet. It has its own IP address. It separates
the client system and web server from the global network.

Functions:
• Anonymity: Proxies can hide the user’s IP address, providing a degree of anonymity.
• Content Filtering: Proxies can be used to filter or block specific types of content.

• Access Control: They can control access to certain resources or websites.


Types:
• Forward Proxy - A forward proxy is a server that sits between a client and the internet. The client
sends a request to the forward proxy, which then sends the request to the internet on behalf of the
client.
• Reverse Proxy - A reverse proxy is a server that sits between the internet and a server. The reverse
proxy receives requests from the internet and then forwards those requests to the appropriate
server.

• Transparent Proxy - A transparent proxy is a proxy that does not modify the request or response,
but simply passes the traffic along
• Anonymous Proxy: An additional degree of privacy is offered by a proxy that hides the user’s IP
address.

21
Anonymizers
When using the internet, one can hide their identity by using an anonymizer. By hiding the user’s IP
address, anonymizers make it more difficult for websites to follow their online activities.

Functions:
• IP Masking: Anonymizers hide the user’s IP address, making it difficult to trace their online
activities
• Encrypted Connections: Some anonymizers provide encrypted connections to enhance security.

• Browsing Anonymously: Users can browse websites without revealing personal information.
Types:
• VPN - A Virtual Private Network (VPN) is a type of anonymizer that creates an encrypted con-
nection between the user’s device and the internet. All traffic between the device and the internet
is routed through the VPN, which hides the user’s IP address and provides an additional layer of
security.
• TOR - The Onion Router (TOR) is a free software program that is used to hide a user’s online
activity by routing their traffic through a network of servers. TOR is designed to be extremely
difficult to trace, making it a popular choice for users who need to mask their identity.

• Web-based anonymizers - Web-based anonymizers are online tools that allow users to browse the
internet without revealing their IP address. These tools work by routing traffic through a third-
party server, making it difficult for websites to track the user’s online activity.
Use Cases:
• Privacy: Anonymizers are used by individuals who want to protect their online privacy.

• Bypassing Restrictions: Users in censored regions may use anonymizers to access restricted content.

22
3.2 Phishing
Phishing is a kind of cyberattack in which attackers utilize clever techniques to fool victims into revealing
private information, including credit card numbers, usernames, and passwords.

Types:
• Spear Phishing: Targeted phishing attacks where the attacker customizes the phishing messages
for a specific individual or organization.
• Phishing via Email: The most common form of phishing where attackers use deceptive emails to
trick individuals into revealing sensitive information.
• Vishing (Voice Phishing): Phishing attacks conducted over the phone, where attackers use social
engineering techniques to manipulate individuals into providing sensitive information.
• Smishing (SMS Phishing): Phishing attacks conducted via text messages (SMS) on mobile devices.
• Clone Phishing: Creating a nearly identical copy such as an email or a website, and replacing the
original with the malicious version.

How Phishing Works?


• Planning: Attackers start by selecting their targets based on specific criteria, such as the value of
information, vulnerability, or relevance to their goals
• Setup: Attackers select targets, then examine them to obtain information about them from multiple
sources, customizing the phishing attack for maximum impact.

• Attack: Write false emails that use threatening or urgent language, frequently using a fake email
account to appear to be from a reliable source, like a bank or respectable business.
• Collection: When users connect with the harmful links or files in phishing emails, they are directed
to fake websites. Attackers gather the sensitive data that users are asked to input in this specific
case.
• Identity Theft or Fraud: Attackers uses the information that they have gathered to make illegal
purchases, or commit fraud

23
3.3 Password Cracking
The process of trying to retrieve passwords from transmitted or stored data is known as password crack-
ing. Attackers frequently utilize it to get illegal access to user accounts or systems. Password cracking
involves a variety of tactics and strategies, and it’s crucial to remember that trying to break passwords
without permission is against the law and immoral. These methods are commonly used by security
experts for penetration testing, ethical hacking, or security enhancement.

Password cracking methods:


1. Brute Force attacks: Brute force attacks involve systematically trying all possible combinations of
passwords until the correct one is found.
2. Dictionary Attacks: In a dictionary attack, attackers use a precompiled list of words (dictionary)
and commonly used passwords to attempt to crack passwords.
3. Rainbow Table Attacks: Precomputed hashed password tables are known as rainbow tables. An
attacker uses a rainbow table attack to compare hashed password entries with table entries.
4. Phishing: Instead of directly cracking a password, attackers may use phishing to trick individuals
into revealing their passwords voluntarily.
5. Keylogging: Keyloggers record keystrokes on a user’s device, capturing passwords as they are
typed.
6. Soical Engineering: Social engineering involves manipulating individuals into revealing confidential
information, including passwords.

Purpose for Password Cracking:


• To recover a forgotten password
• To gain unauthorized access to system

Examples of Guessable Passwords:


• The passwords like "password", "passcode", "admin",
• series for letters from "QWERTY" keyboard.
• User’s name or login name

• Name of User’s friend, pet, relatives


• User’s birthplace or date of birth or vehicle number
• Name of celebrity or User’s idol

Preventive Measures Against Password Cracking:


1. Use Strong Passwords: Encourage users to create strong, complex passwords that include a mix of
letters, numbers, and symbols.
2. Implement Multi-Factor Authentication (MFA): MFA adds an extra layer of security, requiring
users to provide more than one form of identification.

3. Password Policies: Enforce strict password policies, including regular password changes and re-
strictions on common passwords.
4. Monitor and Detect: Implement systems to monitor for suspicious activity, such as multiple failed
login attempts, and promptly detect and respond to potential breaches.

5. Encryption: Ensure that passwords are stored using strong encryption algorithms, making it diffi-
cult for attackers to reverse engineer them.

24
3.4 Key loggers and Spywares
Key Loggers
Keyloggers, short for keystroke loggers, are malicious software or hardware devices designed to record
and monitor the keystrokes typed on a computer or mobile device. The primary purpose of keyloggers
is to capture sensitive information, such as passwords, usernames, credit card numbers, and other confi-
dential data, without the user’s knowledge.

Types:
1. Software Keyloggers: hese are programs or malicious software installed on a computer or device
without the user’s knowledge.
2. Hardware Keyloggers: Physical devices connected between the computer’s keyboard and the com-
puter itself.
3. Memory-injecting Keyloggers: These keyloggers inject themselves into the computer’s memory
(RAM).
4. Wireless Keyloggers: Keyloggers that transmit captured data wirelessly to an attacker.

Antikeylogger:
It is a tool that can detect keylogger insatlled on the computer system and also can remove the tool.
Advantages of Antikeyloggers:
• Firewalls cannot detect the installation of keyloggers, but anti-keyloggers can.

• Prevents internet banking fraud. Passwords can be easily gained by using a keyloggers
• It prevents ID theft
• It secures E-Mail and instant messaging / chatting
Spyware
Spyware refers to software that secretly monitors and collects user information without the user’s knowl-
edge or consent. This type of software is often malicious in nature and can compromise the privacy and
security of individuals and organizations. Spyware is typically designed to gather sensitive information,
track user activities, or deliver unwanted advertisements.

Functions and Characteristics:

1. Information Gathering: Spyware is designed to collect various types of information, including


keystrokes, login credentials, browsing habits, and personal details.
2. Data Transmission: Collected data is transmitted to a remote server controlled by the attacker.
This data may include sensitive and personally identifiable information.

3. Browser Tracking: Spyware often monitors web browsing activities, such as visited websites, search
queries, and online transactions.
4. Keylogging: Some spyware includes keyloggers, which record keystrokes on a keyboard. This can
capture sensitive information like usernames and passwords.

5. Screen Capture: Some advanced spyware can capture screenshots of the user’s desktop, providing
visual information about the user’s activities.
6. Adware: Some spyware variants function as adware, delivering unwanted advertisements or redi-
recting users to advertising websites.

25
3.5 Virus and Worms
Virus:
Computer viruses are malicious software programs designed to replicate and spread to other computers
and systems. They can cause a variety of harmful effects, ranging from disrupting system functionality
to stealing sensitive information.

Virus Can take some typical action:


• Display a message to prompt an action which may set to a action.
• Delete the files inside the system
• Scramble data on a hard disk

• Halt the system


• Just replicate themselves to propagate further harm
Types of Computer Viruses:

1. File Infector Virus: These viruses attach themselves to executable files (e.g., .exe or .dll) and
activate when the infected file is executed.
2. Boot Sector Virus: These viruses infect the master boot record (MBR) or boot sector of a com-
puter’s hard drive or removable media.
3. Macro Virus: Macro viruses infect document files that support macros, such as Microsoft Word or
Excel. They use the macro scripting language to execute malicious actions.
4. Polymorphic Viruses: Polymorphic viruses change their code or appearance each time they infect
a new file or system, making it challenging for antivirus programs to detect them.
5. Resident Viruses: Resident viruses embed themselves in a computer’s memory, allowing them to
infect files and applications as they are opened or executed.
6. Multipartite Viruses: Multipartite viruses can infect both files and the master boot record, making
them more complex and potentially more damaging.
Famous computer viruses:

• ILOVEYOU (Bug) - 2000


• Code Red - 2001
• Nimda - 2001
• Blaster - 200e

• WannaCry - 2017

26
Worms
Computer worms are a type of malicious software (malware) that can replicate and spread independently
across computer networks, often without requiring any user interaction. Unlike viruses, worms don’t need
to attach themselves to host files or programs to propagate. Instead, they exploit vulnerabilities in net-
worked systems, allowing them to self-replicate and spread from one computer to another.

Common Methods of Propagation:


• Network Vulnerabilities
• Email and Messaging

• File Sharing
• USB Drives
Types of Worms:

1. Email Worm: Spread through email attachments or links. Users unknowingly execute the worm
by opening infected attachments or clicking on malicious links.
2. Network Worm: Exploit vulnerabilities in network protocols or services to spread from one system
to another. Often propagate autonomously without user interaction.
3. File-sharing Worms: Propagate through shared files and folders on local networks. Exploit vulner-
abilities in file-sharing protocols to move from one computer to another.
4. Instant Messaging Worms: Spread through instant messaging platforms. May send malicious links
or files to contacts in the infected user’s contact list.
5. USB Worms: Exploit the auto-run feature on removable media, such as USB drives, to infect
systems when the media is connected.
Comparison between computer viruses and worms

27
Trojan Horse:
A Trojan Horse, often known as a Trojan, is a kind of malicious software (malware) that appears as
something trustworthy or innocent but, when it is executed, takes control of a computer system and uses
it to carry out illegal and frequently destructive tasks. The term "Trojan Horse" refers to a story from
Greek mythology in which the Greeks entered Troy by using a wooden horse that was trickery. Trojan
software can fools people by pretending to be harmless or even helpful.

Types:
1. Zeus(Zbot): A notorious banking Trojan designed to steal financial information, particularly tar-
geting online banking credentials.
2. SpyEye: Similar to Zeus, SpyEye is a banking Trojan that focuses on stealing sensitive financial
data.
3. Back orifice: A remote access Trojan that allows unauthorized users to control a system remotely

4. SubSeven (Sub7):A popular backdoor Trojan that provides attackers with control over infected
systems.
5. DarkTequila: A sophisticated Trojan designed to steal financial information and login credentials,
primarily targeting users in Latin America.
Backdoors:
In computer security context, a backdoor is a hidden, frequently unapproved entry point into a system,
program, or network. It makes it possible to gain hidden or remote access to a computer or network
without the owner or user’s knowledge or approval. Backdoors are frequently purposefully constructed
by attackers or, occasionally, by programmers for good reasons.

Types:
1. Software Backdoors: Intentionally created by software developers for legitimate purposes (e.g.,
system maintenance tools) or inserted maliciously into software.
2. Hardware Backdoors: Unauthorized access points intentionally built into hardware components,
allowing for persistent access.

3. Rootkits: Software or firmware that provides unauthorized access while concealing its presence by
modifying or replacing system components.
4. Trojan Backdoors: Backdoors that are part of Trojan Horse malware, which may disguise itself as
legitimate software to trick users into installing it.

5. Network Backdoors: Hidden entry points within network infrastructure, allowing attackers to by-
pass security measures and gain access to sensitive data.

28
3.6 Steganography
The process of hiding one piece of information inside another so that it is challenging or practically
impossible to identify is known as steganography. Steganography attempts to hide the message’s very
existence, as compared to cryptography, which is more concerned with protecting a message’s contents.

Use Cases:
• Secure Communication: Steganography can be used to hide messages in plain sight, allowing for
covert communication without attracting attention.

• Digital Watermarking: Protecting intellectual property by embedding invisible marks or informa-


tion in multimedia files.
• Covert Operations: Military and intelligence agencies may use steganography to conceal informa-
tion in images or documents for covert operations.

• Detecting Manipulation: Steganography can be used to detect unauthorized modifications to digital


content. If the hidden information is missing or altered, it may indicate tampering.
Steganalysis:
The technique of identifying steganography—the art and science of hiding information among other
seemingly innocent data—is known as stegananalysis. Steganalysis aims to detect the existence of hidden
data and, if feasible, retrieve the hidden information.

29
Difference between Steganography and cryptography

30
3.7 DoS and DDoS Attacks:
DoS Attack:
Attacks known as denial-of-service (DoS) attempts are malicious attempts to cause disruption with a
network’s, service’s, or website’s normal operation by flooding it with an excessive amount of unautho-
rized requests or traffic. A denial-of-service (DoS) attack aims to prevent authorized users from accessing
the targeted system or network.

Characteristics:

• Volume Based Attacks


• Protocol Based Attacks
• Application Layer Attacks (Layer 7)

• Distributed Denial-of-Service (DDoS)


• Amplification Attacks
• Reflection Attacks
Common Types of DoS Attacks:

1. TCP/IP Protocol Exploits: SYN/ACK attacks, TCP/IP stack exploits, or resource exhaustion
attacks targeting network protocols.
2. Volumetric Attacks: Flood the target with a high volume of traffic, such as ICMP flood (Ping
flood) or UDP flood.

3. Application Layer Attacks: Target web servers or applications using techniques like HTTP floods,
slowloris attacks, or application-specific exploits.
4. DNS Amplifications: Exploit open DNS resolvers to amplify the volume of attack traffic directed
at the target.
5. Smurf Attack: ICMP Echo Request packets are sent to broadcast addresses, causing multiple
systems to respond to the victim, amplifying the attack.
6. NTP Amplification: Exploit Network Time Protocol (NTP) servers to amplify attack traffic di-
rected at the target.d
Tools for DoS Attacks:

• Jolt2
• Nemesy
• Targa
• Crazy Pinger

• SomeTrouble

31
DDoS Attacks
A distributed denial-of-service (DDoS) attack is a malicious attempt aimed at disrupting the regular op-
eration of a network, service, or webpage by flooding it with an excessive volume of traffic coming from
various sources. DDoS attacks, compared with traditional DoS attacks, are the result of a coordinated
effort utilizing several compromised devices to create a botnet.

Tools for DDoS Attacks:


• Trinoo

• Tribe Flood Network


• Shaft
• Stracheldraht
• MStream

How to protect from DOS/ DDOS attack?


1. Implement mechanisms to distinguish legitimate from malicious traffic.
2. Apply controls to manage the rate of incoming requests.

3. Distribute traffic across multiple servers to prevent a single point of failure.


4. Deploy solutions to detect and prevent malicious traffic.
5. Develop and implement a plan for quick identification and mitigation.
6. Implement tools to identify unusual patterns indicating an attack.

7. Allow trusted IPs and block known malicious sources.


8. Regularly monitor for patterns consistent with DoS/DDoS attacks.
9. Educate staff and users about DoS/DDoS risks.
10. For web services, use CAPTCHA and rate limiting.

Tools For Detecting Attacks from DoS/DDoS Attacks:


• Zombie Zapper
• Remote Intrusion Detection (RAD)

• Find DDoS
• DDoSPing
• Security Auditor’s Research Assistant (SARA)

32
3.8 SQL Injection
SQL injection is a type of cyber attack where an attacker inserts malicious SQL (Structured Query
Language) code into input fields or commands, exploiting vulnerabilities in a web application’s database
layer. This can lead to unauthorized access, manipulation, or disclosure of sensitive data

How SQL Injection Works:


1. Input Fields Vulnerability:Web applications often use user input in SQL queries without proper
validation or sanitization.
2. Malicious SQL Code Injection: Attackers input specially crafted SQL code into vulnerable input
fields, exploiting the lack of validation.
3. Query Manipulation: The injected SQL code manipulates the structure of the original query,
potentially altering its behavior.
4. Unauthorized Access: Successful SQL injection can lead to unauthorized access to databases,
exposing sensitive information.
Types Of SQL Injection:
1. Classic SQL Injection: Attackers manipulate the structure of SQL queries using input fields to gain
unauthorized access.
2. Blind SQL Injection: Exploits vulnerabilities where the application doesn’t display database errors,
making it harder to retrieve information but still allowing for exploitation.
3. Time-Based Blind SQL Injection: Delays the server’s response to gather information based on the
time it takes for the application to respond.
Prevention and Mitigation:
1. Parameterized Statements: Use parameterized queries or prepared statements to separate SQL
code from user input, reducing the risk of injection.
2. Input Validation and Sanitization: Validate and sanitize user input to ensure it conforms to ex-
pected patterns and doesn’t contain malicious code.
3. Web Application Firewalls (WAF): Implement WAFs to filter and monitor HTTP traffic, identifying
and blocking SQL injection attempts.
4. Security Testing: Conduct regular security assessments and penetration testing to identify and
address SQL injection vulnerabilities.
5. Error Handling: Customize error messages to provide minimal information to attackers, preventing
disclosure of sensitive details.
6. Database Encryption: Encrypt sensitive data stored in the database to protect it even if an attacker
gains access.

33
3.9 Buffer Overflow
A buffer overflow is a type of software vulnerability that occurs when a program writes more data to a
buffer—temporary data storage area in computer memory—than it was allocated, leading to the overflow
of excess data into adjacent memory locations. This overflow can potentially overwrite other critical data
structures, causing unexpected behavior and security issues

EXAMPLE:

How Buffer Overflow Occurs:


1. Buffer Allocation: A program allocates a fixed-size buffer in memory to store data, often based on
user input.

2. Excessive Data Input: The program receives input that exceeds the allocated buffer size, causing
the excess data to overflow into adjacent memory regions.
3. Memory Corruption: The overflowed data can corrupt adjacent memory structures, including func-
tion pointers, return addresses, or control data.

4. Exploitation: An attacker can craft malicious input to exploit the overflow, potentially gaining
unauthorized access, executing arbitrary code, or causing a denial of service.
Types of Buffer Overflows:
1. Stack-Based Buffer Overflow: Occurs when the overflowed data affects the stack memory, poten-
tially altering function return addresses.

2. Heap-Based Buffer Overflow: Involves overflowing buffers in the heap memory, impacting dynam-
ically allocated memory regions.
3. Integer Overflow: Results from arithmetic operations causing an overflow, leading to unintended
behavior.

34
Prevention and Mitigation:
1. Bounds Checking: Implement bounds checking to ensure that data written to a buffer does not
exceed its allocated size.

2. Input Validation: Validate and sanitize user input to prevent input that could trigger buffer over-
flows.
3. Runtime Checks: Use runtime checks and monitoring tools to detect buffer overflows and other
memory-related issues.

4. Regular Software Updates: Keep software and systems up to date with the latest security patches
to address known vulnerabilities.
5. Static Code Analysis: Perform static code analysis to identify and eliminate potential buffer over-
flow vulnerabilities during development.
Tools to Prevent from Bufferoverflow

• StackGuard
• ProPolice
• LibSafe

35
3.10 Attacks on Wireless Networks
Explain the traditional attacks on wireless networks mention any two tools used to protect
wireless network.
**Traditional Attacks on Wireless Networks:**
1. **Wireless Eavesdropping (Sniffing):**
- *Description:* Unauthorized interception of wireless communications to capture sensitive information.

- *Tools:* Wireshark for packet capturing and analysis.

2. **Wireless Deauthentication and Disassociation Attacks:**

- *Description:* Sending frames to force clients or access points to disconnect, causing disruptions or
creating opportunities for other attacks.

- *Tools:* Aircrack-ng, including aireplay-ng for deauthentication attacks.

**Tools to Protect Wireless Networks:**


1. **Encryption (WPA3):**

- *Description:* Implementing WPA3 for strong encryption, safeguarding data from eavesdropping.

- *Tool:* WPA3 - Wi-Fi Protected Access

2. **Intrusion Detection and Prevention Systems (IDPS):**

- *Description:* Monitoring network traffic, detecting and preventing attacks, including deauthenti-
cation attacks.

- *Tool:* Snort - Open-source IDPS for network behavior analysis and proactive security measures.

36
How do you secure wireless network from attacks
**Key Steps to Secure a Wireless Network:**
1. **Encryption:**

- Use WPA3 or WPA2 encryption to protect data from eavesdropping.

2. **Strong Passwords:**

- Employ unique and strong passwords for both the network and router.

3. **Change Default SSID:**

- Replace default SSID with a unique name to avoid easy identification.

4. **MAC Address Filtering:**

- Allow only known devices by implementing MAC address filtering.

5. **Disable SSID Broadcasting:**

- Conceal the network by turning off SSID broadcasting.

6. **Firmware Updates:**

- Regularly update router firmware to patch security vulnerabilities.

7. **Firewall Protection:**

- Enable and configure the router’s firewall for traffic filtering.

8. **Disable Remote Management:**

- Turn off remote management features to limit potential vulnerabilities.

9. **VLAN Implementation:**

- Use VLANs to segregate network traffic for improved security.

10. **Monitor Activity:**

- Deploy intrusion detection or prevention systems and regularly review logs.

11. **User Education:**

- Educate users on security practices, such as avoiding public Wi-Fi risks

37

You might also like