Cyber Law
Cyber Law
K PATHAK
3
Jay Kisan Polytechnic Institute, Dharahari, Rautahat Composed By S.K PATHAK
5. Implement Digital Signature
6. Installation of VPN and use VPN server.
7. Use of cypher text for encryption.
4
Jay Kisan Polytechnic Institute, Dharahari, Rautahat Composed By S.K PATHAK
"Cyber Security is the set of principles and practices designed to protect our computing
resources and online information against threats."
1.2 Cyber Crimes
As the name says, "cyber" means computer and "crime" means something unfair and
illegal, which collectively means a crime executed using computer technologies. It
could be that the computer may be involved in the crime or a target of a big one. This
could harm someone's privacy and finances. It comprises a wide range of crimes such
as cyber fraud, financial scams, cybersex trafficking, ad scams, etc. Many privacy con-
cerns refer to cyber-crime when the privacy is intercepted and disclosed.
1.3 Types of Attacks in cyber
Cyber-attack is an exploitation of computer systems and networks. It uses malicious
code to alter computer code, logic or data and lead to cybercrimes, such as information
and identity theft. We are living in a digital era. Now a day, most of the people use
computer and internet. Due to the dependency on digital things, the illegal computer
activity is growing and changing like any type of crime. Cyber-attacks can be classified
into the following categories:
5
Jay Kisan Polytechnic Institute, Dharahari, Rautahat Composed By S.K PATHAK
DNS spoofing is a type of computer security hacking. Whereby a data is introduced into a
DNS resolver's cache causing the name server to return an incorrect IP address, diverting
traffic to the attackers computer or any other computer. The DNS spoofing attacks can go
on for a long period of time without being detected and can cause serious security issues.
3. Session Hijacking
It is a security attack on a user session over a protected network. Web applications create
cookies to store the state and user sessions. By stealing the cookies, an attacker can have
access to all of the user data.
4. Phishing
Phishing is a type of attack which attempts to steal sensitive information like user login
credentials and credit card number. It occurs when an attacker is masquerading as a trust-
worthy entity in electronic communication.
5. Brute force
It is a type of attack which uses a trial and error method. This attack generates a large
number of guesses and validates them to obtain actual data like user password and per-
sonal identification number. This attack may be used by criminals to crack encrypted data,
or by security, analysts to test an organization's network security.
6. Denial of Service
It is an attack which meant to make a server or network resource unavailable to the users.
It accomplishes this by flooding the target with traffic or sending it information that trig-
gers a crash. It uses the single system and single internet connection to attack a server. It
can be classified into the following-
Volume-based attacks- Its goal is to saturate the bandwidth of the attacked site, and is
measured in
bit per second.
Protocol attacks- It consumes actual server resources, and is measured in a packet.
Application layer attacks- Its goal is to crash the web server and is measured in re-
quest per second.
7. Dictionary attacks
This type of attack stored the list of a commonly used password and validated them to get
original password.
8. URL Interpretation
It is a type of attack where we can change the certain parts of a URL, and one can make a
web server to deliver web pages for which he is not authorized to browse.
9. File Inclusion attacks
It is a type of attack that allows an attacker to access unauthorized or essential files which
is available on the web server or to execute malicious files on the web server by making
use of the include functionality.
10. Man in the middle attacks
It is a type of attack that allows an attacker to intercepts the connection between client
and server and acts as a bridge between them. Due to this, an attacker will be able to
read, insert and modify the data in the intercepted connection.
System-based attacks
These are the attacks which are intended to compromise a computer or a computer net -
work. Some of the important system-based attacks are as follows-
1. Virus
It is a type of malicious software program that spread throughout the computer files with-
out the knowledge of a user. It is a self-replicating malicious computer program that repli -
cates by inserting copies of itself into other computer programs when executed. It can also
execute instructions that cause harm to the system.
6
Jay Kisan Polytechnic Institute, Dharahari, Rautahat Composed By S.K PATHAK
2. Worm
It is a type of malware whose primary function is to replicate itself to spread to uninfected
computers. It works same as the computer virus. Worms often originate from email attach-
ments that appear to be from trusted senders.
3. Trojan horse
It is a malicious program that occurs unexpected changes to computer setting and unusual
activity, even when the computer should be idle. It misleads the user of its true intent. It
appears to be a normal application but when opened/executed some malicious code will
run in the background.
4. Backdoors
It is a method that bypasses the normal authentication process. A developer may create a
backdoor so that an application or operating system can be accessed for troubleshooting
or other purposes.
5. Bots
A bot (short for "robot") is an automated process that interacts with other network ser-
vices. Some bots program run automatically, while others only execute commands when
they receive specific input. Common examples of bots program are the crawler, chartroom
bots, and malicious bots.
2. Malware-Injecting Devices
Cybercriminals can use hardware to sneak malware onto your computer. For example,
compromised USB sticks can give hackers remote access to your device as soon as they’re
plugged into your computer. All it takes is for one person to give you a malware-ridden USB
stick, and your whole organization could be at risk. Plus, clever hackers are now using
cords — like USB cables and mouse cords — to inject malware.
3. Missing Security Patches
7
Jay Kisan Polytechnic Institute, Dharahari, Rautahat Composed By S.K PATHAK
Security tools can become outdated as the hacking landscape advances. They require fre-
quent updates to protect against new threats. However, some users ignore update notifica-
tions or security patches, leaving them vulnerable.
4. Cracking Passwords
Hackers can obtain your credentials through a number of means, such as keylogging, in
which undetected software — accidentally downloaded by the victim of a social engineer-
ing attack — can record keystrokes for the threat actor to use at their will. This includes
saving usernames and passwords as they are entered on the infected computer.
5. Distributed Denial-of-Service (DDOS)
This hacking technique is aimed at taking down a website so that a user cannot access it or
deliver their service. Denial-of-Service (DoS) attacks work by hitting the target’s server
with large influxes of traffic. The amount is so frequent and high that it overloads the
server by giving it more requests than it can handle. Ultimately, your server crashes and
your website goes down with it.
8
Jay Kisan Polytechnic Institute, Dharahari, Rautahat Composed By S.K PATHAK
VPN stands for Virtual Private Network. It refers to a safe and encrypted network that al -
lows you to use network resources in a remote manner. Using VPN, you can create a safe
connection over a less secure network, e.g. internet. It is a secure network as it is com-
pletely isolated from rest of the internet. The government, businesses, military can use this
network to use network resources securely. VPN is free to use and it uses site-to-site and
remote access methods to work. It uses an arrangement of encryption services to establish
a secure connection. It is an ideal tool for encryption.
2.2 Encryption
Encryption helps us to secure data that we send, receive, and store. It can consist text
messages saved on our cell-phone, logs stored on our fitness watch, and details of
banking sent by your online account. It is the way that can climb readable words so
that the individual who has the secret access code or decryption key can easily read it.
For diplomatic information to help in providing data security.
Types of Encryption
There are various types of encryption, and every encryption type is created as per the
needs of the professionals and keeping the security specifications in mind. The most
common encryption types are as follows.
1. Data Encryption Standard (DES)
The Data Encryption Standard is example of a low-level encryption. In 1977, the U.S.
government set up the standard. DES is largely redundant for securing confidential
data due to advancements in technology and reductions in hardware costs.
2. Triple DES
The Triple DES works 3* times the encryption of DES. It means, it first encrypts the
data, decrypts the data, and again encrypts the data. It improves the original DES stan-
dard, which for sensitive data has been considered too poor a form of encryption.
3. RSA (Remote Access Server)
The RSA holds its name from three computer scientists' ancestral initials. For encryp -
tion, it utilises a powerful and common algorithm. Because of its main length, RSA is
common and thus commonly used for safe data transmission.
2.3 Intrusion Detection
Intrusion Detection System (IDS) is a powerful tool that can help businesses in detect -
ing and prevent unauthorized access to their network. By analyzing network traffic
9
Jay Kisan Polytechnic Institute, Dharahari, Rautahat Composed By S.K PATHAK
patterns, IDS can identify any suspicious activities and alert the system administrator.
IDS can be a valuable addition to any organization’s security infrastructure, providing
insights and improving network performance.
Benefits of IDS
Detects malicious activity: IDS can detect any suspicious activities and alert the
system administrator before any significant damage is done.
Improves network performance: IDS can identify any performance issues on the
network, which can be addressed to improve network performance.
Compliance requirements: IDS can help in meeting compliance requirements by
monitoring network activity and generating reports.
Browser Security
Browser security is the application of Internet security to web browsers in order to pro-
tect networked data and computer systems from breaches of privacy or malware. Secu-
rity exploits of browsers often use JavaScript, sometimes with cross-site scripting
(XSS) .
How to keep browser secure
• Keep your browser software up-to-date.
• Review your browser's security settings and preferences.
• If you do not need pop-ups, disable them or install software that will prevent pop-up
windows. Pop-ups can be used to run malicious software on your computer.
• Install an adblocker.
• Install browser add-ons, plug-ins, toolbars, and extensions sparingly and with care.
• Private Web Browsing.
• Use VPN
11
Jay Kisan Polytechnic Institute, Dharahari, Rautahat Composed By S.K PATHAK
Unit 3. Information Security and Cryptography
3.1. Cryptography basics
Cryptography is the process of hiding or coding information so that only the person a mes-
sage was intended for can read it. The art of cryptography has been used to code mes-
sages for thousands of years and continues to be used in bank cards, computer passwords,
and ecommerce. Modern cryptography techniques include algorithms and ciphers that en-
able the encryption and decryption of information, such as 128-bit and 256-bit encryption
keys. Modern ciphers, such as the Advanced Encryption Standard (AES), are considered vir-
tually unbreakable.
3.2. Classical Encryption/Decryption Method
Classical cryptography is based on the mathematics and it relies on the computational
difficulty of factorizing large number. Encryption is the process of converting normal mes-
sage (plaintext) into meaningless message (Cipher text). Whereas Decryption is the
process of converting meaningless message (Cipher text) into its original form (Plaintext).
The major distinction between secret writing associated secret writing is that the conver-
sion of a message into an unintelligible kind that’s undecipherable unless decrypted.
Whereas secret writing is that the recovery of the first message from the encrypted infor-
mation.
Difference between Encryption and Decryption
Parameter Encryption Decryption
Definition The process of converting plaintext into ci- The process of converting ciphertext back
phertext using an algorithm and a key. into plaintext using a decryption algorithm
and a key.
Purpose To protect data confidentiality and prevent To revert encrypted data back to its original
unauthorized access. form for authorized access and understand-
ing.
Input Plaintext (original data) and encryption key. Ciphertext (encrypted data) and decryption
key.
Output Ciphertext (encrypted data). Plaintext (original data).
Key A key is used during encryption to transform A key is used during decryption to reverse the
plaintext into ciphertext. It is known only to encryption process and retrieve the original
the sender and authorized recipients. plaintext. It should match the encryption key
used.
Security Encryption provides data confidentiality by Decryption allows authorized users to access
making the encrypted data unreadable with- and understand the encrypted data by using
out the proper decryption key. the correct decryption key.
Communica- Encryption is typically used during data Decryption is used at the receiving end to re-
tion transmission to secure sensitive information cover the original data and make it usable.
from interception and unauthorized access.
Examples HTTPS communication, encrypting files, se- Decrypting received emails, accessing en-
cure messaging apps, etc. crypted databases, decrypting encrypted
files, etc.
Rivest-Shamir-Adleman (RSA)
The RSA algorithm (Rivest-Shamir-Adleman) is the basis of a cryptosystem a suite of cryp-
tographic algorithms that are used for specific security services or purposes which enables
public key encryption and is widely used to secure sensitive data, particularly when it is be-
ing sent over an insecure network such as the internet.
RSA was first publicly described in 1977 by Ron Rivest, Adi Shamir and Leonard Adleman of
the Massachusetts Institute of Technology, though the 1973 creation of a public key algo-
rithm by British mathematician Clifford Cocks was kept classified by the U.K.
What is DES?
It stands for Data Encryption Standard, developed in 1977. It is a multi-round cipher that
divides the full text into 2 parts and then work on each part individually. It includes vari -
ous functionality such as Expansion, Permutation, and Substitution, XOR operation with a
round key.
What is AES?
It stands for Advanced Encryption Standard, developed in 2001. As triple-DES was found
to be slow, AES was created and is six times faster than the triple DES. It is one of the
most widely used symmetric block cipher algorithm used nowadays. It works on bytes
rather than bits.
3.4. Asymmetric Key Cryptography
Asymmetric encryption, also known as public-key cryptography, is a type of encryption
that uses a pair of keys to encrypt and decrypt data. The pair of keys includes a public key,
which can be shared with anyone, and a private key, which is kept secret by the owner. In
asymmetric encryption, the sender uses the recipient’s public key to encrypt the data. The
recipient then uses their private key to decrypt the data. This approach allows for secure
communication between two parties without the need for both parties to have the same
secret key.
13
Jay Kisan Polytechnic Institute, Dharahari, Rautahat Composed By S.K PATHAK
Unit 4. Legal Issues in Cyber Crime
16