CSE 5th Chap
CSE 5th Chap
CSE 5th Chap
1 Cyber Security
Cybersecurity is the practice of protecting internet-connected systems, including
hardware, software, and data, from cyber threats such as hacking, malware,
phishing, and unauthorized access. It involves implementing measures to ensure the
confidentiality, integrity, and availability of information and systems.
1. Data Interception:
Cyber security threats/attacks data interception
Data interception is a common cybersecurity threat where attackers intercept and
capture sensitive information as it travels over a network.
This type of attack can occur through various methods, including:
I.Man-in-the-Middle (MitM) Attack: In a MitM attack, an attacker intercepts
communication between two parties, such as a user and a website, without their
knowledge. The attacker can eavesdrop on the communication, modify data packets,
or even impersonate one of the parties to gain access to sensitive information.
II.Packet Sniffing: Attackers use packet sniffing tools to capture data packets
transmitted over a network. These tools allow attackers to analyze the captured
packets to extract sensitive information such as login credentials, credit card
numbers, or other confidential data.
IV.DNS Spoofing: Attackers manipulate the Domain Name System (DNS) to redirect
users to malicious websites or servers controlled by the attacker. This enables
attackers to intercept and capture sensitive data exchanged between users and
legitimate websites.
DDoS Attack:
A distributed denial-of-service (DDoS) attack is a malicious attempt to
disrupt the normal traffic of a targeted server, service or network by overwhelming
the target or its surrounding infrastructure with a flood of Internet traffic.DDoS
attacks achieve effectiveness by utilizing multiple compromised computer systems as
sources of attack traffic. Exploited machines can include computers and other
networked resources such as IoT devices.From a high level, a DDoS attack is like an
unexpected traffic jam clogging up the highway, preventing regular traffic from
arriving at its destination
This type of attack aims to control all available bandwidth between the victim
and the larger internet. Domain name system (DNS) amplification is an example
of a volume-based attack. In this scenario, the attacker spoofs the target's
address, then sends a DNS name lookup request to an open DNS server with the
spoofed address When the DNS server sends the DNS record response, it is sent
instead to the target,resulting in the target receiving an amplification of the
attacker’s initially small query.
Protocol Attacks
Protocol attacks consume all available capacity of web servers or other
resources, such as firewalls. They expose weaknesses in Layers 3 and 4 of the
OSI protocol stack to render the target inaccessible.A SYN flood is an
example of a protocol attack, in which the attacker sends the target an
overwhelming number of transmission control protocol (TCP) handshake requests with
spoofed source Internet Protocol (IP) addresses. The targeted servers attempt to
respond to each connection request, but the final handshake never occurs,
overwhelming the target in the process.
Application-Layer Attacks
These attacks also aim to exhaust or overwhelm the target's resources but are
difficult to flag as malicious. Often referred to as a Layer 7 DDoS attack—
referring to Layer 7 of the OSI model—an application-layer attack targets the layer
where web pages are generated in response to Hypertext Transfer Protocol (HTTP)
requests.A server runs database queries to generate a web page. In this form of
attack, the attacker forces the victim's server to handle more than it normally
does. An HTTP flood is a type of application-layer attack and is similar to
constantly refreshing a web browser on different computers all at once. In this
manner, the excessive number of HTTP requests overwhelms the server, resulting in a
DDoS.
diagram of ddos
hacking
Hacking refers to the unauthorized intrusion into computer systems or
networks with the intent to gain access to data, manipulate systems, or disrupt
operations. Here are some key points about hacking:
White Hat Hackers: Ethical hackers who use their skills to uncover vulnerabilities
in systems and networks to help improve security.
Black Hat Hackers: Malicious hackers who exploit vulnerabilities for personal gain,
financial motives, or to cause harm.
Grey Hat Hackers: Hackers who may engage in both ethical and unethical hacking
activities, often without malicious intent.
Methods of hacking:
hacker can use various techniques to gain unauthorized
accesS including
1.Exploiting Vulnerabilities: Identifying and exploiting weaknesses or security
flaws in software, hardware, or network configurations.
2.Brute Force Attacks: Attempting to guess passwords or encryption keys through
automated trial-and-error methods.
14.Regular Software Updates: Applying patches and updates to software and systems
to address known vulnerabilities and minimize the risk of exploitation.
15.User Education: Providing training and awareness programs to educate users about
cybersecurity best practices, such as strong password management and identifying
phishing attempts.
Malware
Malware, or malicious software, encompasses a wide range of harmful programs
designed to disrupt, damage, or gain unauthorized access to computer systems or
networks.
Viruses: Programs that replicate themselves and spread by infecting other files or
systems. They can cause damage by deleting files, corrupting data, or stealing
information.
Worms: Self-replicating malware that spreads across networks without user
interaction. Worms can exploit vulnerabilities in operating systems or software to
propagate and often consume network bandwidth or degrade system performance.
Ransomware: Malware that encrypts files on a victim's system and demands payment
(usually in cryptocurrency) for the decryption key. Ransomware attacks can result
in data loss, financial loss, and operational disruption for individuals and
organizations.
Spyware: Programs that secretly monitor and collect information about a user's
activities without their consent. Spyware can track keystrokes, capture
screenshots, record web browsing habits, and harvest sensitive data such as login
credentials and financial information.
Phishing
Pharming
Unlike the malware-based approach, DNS server poisoning does not rely on individual
files being corrupted. Instead, it exploits vulnerabilities at the DNS server
level. The attacker poisons the DNS table, which then redirects users to a
fraudulent website, often without their knowledge. The corruption of a large DNS
server can result in cyber criminals targeting and scamming larger groups of
victims. DNS cache poisoning rewrites the internet’s rules around the flow of
traffic to websites by redirecting traffic to attackers’ spoofed websites. Cyber
criminals can achieve this through DNS hijacking, which enables them to target
multiple users on DNS servers and unprotected routers, especially free or public
Wi-Fi networks.
Social Engineering
Social engineering is the manipulation of individuals to divulge
confidential information or perform actions that may compromise security. It often
involves psychological manipulation rather than technical exploitation. Examples
include phishing emails, pretexting phone calls, and impersonation tactics to gain
access to sensitive data or systems. It's a significant threat to cybersecurity and
requires awareness and education to mitigate effectively.
COMMON METHODS OF SOCIAL ENGINEERING
Reverse social engineering: Involves tricking the victim into approaching the
attacker for help or information, thereby giving the attacker an opportunity to
exploit the victim