Unit-1 Cyber Security
Unit-1 Cyber Security
Unit-1 Cyber Security
2. Cyber Bullying
A form of harassment or bullying inflicted through the use of electronic or
communication devices such as computers, mobile phones, laptops, etc.
3. Cyber Stalking
Cyberstalking is the use of electronic communication by a person to follow
a person, or attempts to contact a person to foster personal interaction
repeatedly despite a clear indication of disinterest by such person; or
monitors the internet, email or any other form of electronic
communication commits the offence of stalking.
4. Cyber Grooming
Cyber Grooming is when a person builds an online relationship with a
young person and tricks or pressures him/ her into doing a sexual act.
5. Online Job Fraud
Online Job Fraud is an attempt to defraud people who are in need of
employment by giving them false hope/ promise of better employment
with higher wages.
6. Phishing
Phishing is a type of fraud that involves stealing personal information such
as Customer ID, PIN, Credit/Debit Card number, Card expiry date, CVV
number, etc. through emails that appear to be from a legitimate source.
7. Vishing
Vishing is an attempt where fraudsters try to seek personal information
like Customer ID, Net Banking password, ATM PIN, OTP, Card expiry date,
CVV etc. through a phone call.
8. Smishing
Smishing is a type of fraud that uses mobile phone text messages to lure
victims into calling back on a fraudulent phone number, visiting fraudulent
websites or downloading malicious content via phone or web.
10. Spamming
Spamming occurs when someone receives an unsolicited commercial
message sent via email, SMS, MMS and any other similar electronic
messaging media. They may try to persuade the recipient to buy a
product or service, or visit a website where he can make purchases, or
they may attempt to trick him/ her into divulging bank account or credit
card details.
11. Ransomware
Ransomware is a type of computer malware that encrypts the files,
storage media on communication devices like desktops, Laptops, Mobile
phones etc., holding data/information as a hostage. The victim is asked to
pay the demanded ransom to get his device decrypts
12. Viruses, Worms, and Trojans
A computer virus is a program written to enter your computer and
damage/alter your files/data and replicate itself.
Worms are malicious programs that make copies of themselves again and
again on the local drive, network shares, etc.
2. Cyber Extortion –
3. Cyber Warfare –
4. Internet Fraud –
5. Cyber Stalking –
2. Anonymity-
Those who Commit cyber crime are anonymous for us so we cannot
do anything to that person.
Every country in the world faces the challenge of cyber crime and the
rate of cyber crime is increasing day by day because the people who
even don’t register a case of cyber crime and this is major challenge
for us as well as for authorities as well.
5. No harsh punishment-
In Cyber crime there is no harsh punishment in every cases. But there
is harsh punishment in some cases like when somebody commits
cyber terrorism in that case there is harsh punishment for that
individual. But in other cases there is no harsh punishment so this
factor also gives encouragement to that person who commits cyber
crime.
Always keep your social media accounts data privacy only to your
friends. Also make sure only to make friends who are known to you.
Whenever you get the updates of the system software update it at the
same time because sometimes the previous version can be easily
attacked.
We can divide the term cyber security into two parts: cyber and security.
Cyber refers to the technology that includes systems, networks, programs,
and data of an internet-connected system. The word security specifies the
protection of the systems, networks, applications, and information.
Cybersecurity proper began in 1972 with a research project on ARPANET (The Advanced Research
Projects Agency Network), a precursor to the internet. Researcher Bob Thomas created a computer
program called Creeper that could move across ARPANET’s network, leaving a breadcrumb trail
wherever it went. It read: ‘I’m the creeper, catch me if you can. Ray Tomlinson – the inventor of email
– wrote the program Reaper, which chased and deleted Creeper. Reaper was not only the very first
example of antivirus software, but it was also the first self-replicating program, making it the first-
ever computer worm.
1987 was the birth year of commercial antivirus, although there are competing claims
for the innovator of the first antivirus product.
Andreas Lüning and Kai Figge released their first antivirus product for
the Atari ST – which also saw the release of Ultimate Virus Killer (UVK)
In the U.S., John McAfee founded McAfee (now part of Intel Security), and
released VirusScan.
The first polymorphic viruses were created (code that mutates while keeping the
original algorithm intact to avoid detection)
British computer magazine PC Today released an edition with a free disc that ‘accidentally’
contained the DiskKiller virus, infecting tens of thousands of computers
EICAR (European Institute for Computer Antivirus Research) was established
Early antivirus was purely signature-based, comparing binaries on a system with a database of virus
‘signatures’. This meant that early antivirus produced many false positives and used a lot of
computational power – which frustrated users as productivity slowed.
With the internet available in more homes and offices across the globe,
cybercriminals had more devices and software vulnerabilities to exploit than ever
before. And, as more and more data was being kept digitally, there was more to
plunder.
The 2010s saw many high-profile breaches and attacks starting to impact the national security of
countries and cost businesses millions.
2012: Saudi hacker 0XOMAR publishes the details of more than 400,000 credit cards online
2013: Former CIA employee for the US Government Edward Snowden copied and leaked
classified information from the National Security Agency (NSA)
2013-2014: Malicious hackers broke into Yahoo, compromising the accounts and personal
information of its 3 billion users. Yahoo was subsequently fined $35 million for failing to
disclose the news
Cyber Criminals
Types of Cyber Criminals:
1. Hackers: The term hacker may refer to anyone with technical skills,
however, it typically refers to an individual who uses his or her skills to achieve
unauthorized access to systems or networks so as to commit crimes.
The intent of the illegal determines the classification of those attackers as
white, grey, or black hats.
3. Internet stalkers: Internet stalkers are people who maliciously monitor the
web activity of their victims to acquire personal data. This type of cyber crime
is conducted through the use of social networking platforms and malware, that
are able to track an individual’s PC activity with little or no detection.
1. Reconnaissance
In cybersecurity, reconnaissance begins with “Footprinting”, the initial preparation
towards the preattack phase, and entails collecting data about the target’s computer
infrastructure as well as their cyber-environment.
Footprinting gives an overview of the victim’s weak points and suggestions on how
they can be exploited. The primary objective of this phase is to provide the attacker
with an understanding of the victim’s system infrastructure, the networking ports and
services, and any other aspect of security required for launching attacks.
A. Passive attacks
This is the second phase of the attack plan. In this phase, an attacker secretly
gathers information about their target; the aim is to acquire the relevant data
without the victim noticing. The process can be as simple as watching an
organization to see when their CEO reports to work or spying on a specific
department to see when they down their tools. Because most hackers prefer
executing their duties remotely, most passive attacks are conducted over the internet
by googling. For example, one may use search engines such as dogpile to search
for information about an individual or organization.
1. Yahoo or Google search: malicious individuals can use these search
engines to gather information about employees of the firm they are
targeting to breach their system.
2. Surfing online communities like Twitter, Facebook, Instagram can also
prove useful sources to gather information about an individual, their
lifestyle, and probably a hint to their weakness that can then be
exploited.
3. The organization’s website may also provide useful information about
specific or key individuals within the organization, such as the CEO,
MD, head of the IT department, etc. The website can be used to source
personal details such as email addresses, phone numbers, roles, etc.
With the details, an attacker can then launch a social
engineering attack to breach their target.
4. Press releases, blogs, newsgroups, and so on, are in some cases,
used as the primary channels to gather information about an entity or
employees.
5. Going through job requirements for a specific position within a
company can also help an attacker identify the type of technology
being used by a company and the level of competency of their
workforce. An attacker can then decide on what method to use when
breaching the targeted system from the data.
B. Active Attacks
An active attack involves closely examining the network to discover individual hosts
and verify the validity of the gathered information, such as the type of operating
system in use, IP address of the given gadget, and available services on the
network, collected during the passive attack. It involves the risk of detection and can
also be referred to as “Active reconnaissance” or “Rattling the doorknobs”.
Active reconnaissance can be used to confirm the security measures put in place by
an attacker, but at the same time, it can alert the victim if not well executed. The
process may raise suspicion or increase the attacker’s chance of being caught
before they execute the full attack.
2. Scrutinizing and Scanning the Gathered Information
Scanning is a key step to intelligently examine after as you collect information about
the network infrastructure. The process has the following objectives;
1. Brute force attack or any other relevant method to bypass the password.
2. Exploit the password.
3. Launch the malicious command or applications.
4. If requires, then hide the files.
5. Cover the tracks, don’t leave any trail that can lead back to you as the
malicious third party. This can be achieved by deleting logs so that there is no
trail for your illicit actions.
Social Engineering
Social engineering involves tricking an unsuspecting user into
taking an action that enables a cybercriminal to access
systems and data
Attackers use social engineering tactics because is it easier to
exploit your natural inclination to trust
Popular social engineering tactics include baiting, phishing,
spear-phishing, email hacking and contact spamming,
pretexting, vishing, and quid pro quo.
Install a security product, update your software, and be
vigilant to prevent social engineering attacks
Types of Social Engineering
There are different social engineering tricks that hackers leverage to steal
confidential information.
These are some of the tips to help you avoid social engineering attacks:
Cyber Stalking
Cyber Stalking can even occur the bad person harasses the victim.
Several governments have moved toward creating these practices
punishable by law. Social media, blogs, image sharing sites and lots of
different ordinarily used online sharing activities offer Cyber Stalkers
with a wealth of data that helps them arrange their harassment. It
includes actions like fraud, information destruction, threats to life and
manipulation through threats of exposure. It has stalkers take the
assistance of e-mails and other forms of message applications, messages
announce to an online website or a discussion cluster, typically even the
social media to send unwanted messages, and harass a specific person
with unwanted attention.
In February 2009 survey, 90% of the audience across eight cities and 3500 cafes were
male and in the age group of 15-35 years.
52% were graduates and postgraduates.
Almost 50% were students.
In India, cybercafes are known to be used for either real or false terrorist
communication.
Cybercafe hold two types of risks :
1. We do not know what programs are installed on the computer like keyloggers or
spyware.
2. Over the shoulder snooping can enable others to find out your passwords.
3.Several cybercafes has installed “Deep Freeze” to protect computer which helps cyber
criminals.
4.Annual Maintenance Contract (AMC) was not found for servicing of the computer.
One can reduce the chances of becoming part of a Bot by limiting access into the system.
Leaving your Internet connection ON and unprotected is just like leaving the front door of
the house wide open. One can ensure following to secure the system:
1. Use antivirus and anti-Spyware software and keep it up-to-date: It is important to
remove and/or quarantine the viruses. The settings of these softwares should be done
during the installations so that these softwares get updated automatically on a daily basis.
2. Set the OS to download and install security patches automatically: OS companies
issue the security patches for flaws that are found in these systems.
3. Use a firewall to protect the system, from hacking attacks while it is connected on
the Internet: A firewall is a software and/or hardware that is designed to block
unauthorized access while permitting authorized communications. It is a device or set of
devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer
traffic between different security domains based upon a set of rules and other criteria. A
firewall is different from antivirus protection. Antivirus software scans incoming
communications and files for troublesome viruses vis-a-vis properly configured firewall
that helps to block all incoming communications from unauthorized sources.
4. Disconnect from the Internet. when you are away from your computer: Attackers
cannot get into the system when the system is disconnected from the Internet. Firewall,
antivirus, and anti-Spyware softwares are not foolproof mechanisms to get access to the
system.
5. Downloading the freeware only from websites that are known and trustworthy: It
is always appealing to download free software(s) such as games, file-sharing programs,
customized toolbars, etc. However, one should remember that many free software(s)
contain other software, which may include Spyware.
6. Check regularly the folders in the mail box- "sent items" or "outgoing"-for those
messages, you did not send: If you do find such messages in your outbox, it is a sign that
your system may have infected with Spyware, and maybe a part of a Botnet. This is not
foolproof; many spammers have learned to hide their unauthorized access.
7. Take an immediate action if your system is infected: If your system is found to be
infected by a virus, disconnect it from the Internet immediately. Then scan the entire
system with fully updated antivirus, and anti-Spyware software. Report the unauthorized
accesses to ISP and to the legal authorities. There is a possibility that your passwords may
have been compromised in such cases, so change all the passwords immediately.
Attack Vector
In cybersecurity, an attack vector is a method of achieving unauthorized network
access to launch a cyberattack. Attack vectors allow cybercriminals
to exploit system vulnerabilities to gain access to sensitive data, personally
identifiable information (PII), and other valuable information accessible after a data
breach.
The most common attack vectors include malware, viruses, email attachments, web
pages, pop-ups, instant messages, text messages, and social engineering. However,
the number of cyber threats continues to grow as cybercriminals look to exploit
unpatched or zero-day vulnerabilities listed on CVE and the dark web, as there is no
single solution for preventing every attack vector.
The Difference Between an Attack Vector, Attack Surface and Threat Vector
An attack surface is the total number of attack vectors an attacker can use to
manipulate a network or computer system or extract data.
Threat vector can be used interchangeably with attack vector and generally
describes the potential ways a hacker can gain access to data or other confidential
information.
1. Compromised Credentials
sernames and passwords are still the most common type of access credential and
U
continue to be exposed in data leaks, phishing scams, and malware. When lost,
stolen, or exposed, credentials give attackers unfettered access. This is why
organizations are now investing in tools to continuously monitor for data exposures
and leaked credentials. Password managers, two-factor authentication (2FA), multi-
factor authentication (MFA), and biometrics can reduce the risk of leak credentials
resulting in a security incident too.
2. Weak Credentials
eak passwords and reused passwords mean one data breach can result in many
W
more. Teach your organization how to create a secure password, invest in a
password manager or a single sign-on tool, and educate staff on their benefits.
3. Insider Threats
ommon data
C encryption methods like SSL certificates and DNSSEC can
prevent man-in-the-middle attacks and protect the confidentiality of data being
transmitted. Missing or poor encryption for data at rest can mean that sensitive data
or credentials are exposed in the event of a data breach or data leak.
5. Misconfiguration
6. Ransomware
7. Phishing
hishing attacks are social engineering attacks where the target is contacted by
P
email, telephone, or text message by someone who is posing to be a legitimate
colleague orinstitution to trick them into providing sensitive data, credentials,
or personally identifiable information (PII). Fake messages can send users to
malicious websites with viruses or malware payloads.
8. Vulnerabilities
ew security vulnerabilities are added to the CVE every day and zero-day
N
vulnerabilities are found just as often. If a developer has not released a patch for a
zero-day vulnerability before an attack can exploit it, it can be hard to prevent zero-
day attacks.
9. Brute Force
rute force attacks are based on trial and error. Attackers may continuously try to
B
gain access to your organization until one attack works. This could be by attacking
weak passwords or encryption, phishing emails, or sending infected email
attachments containing a type of malware. Read our full post on brute force attacks.
DDoS attacks are cyber attacks against networked resources like data centers,
servers, websites, or web applications and can limit the availability of a computer
system. The attacker floods the network resource with messages which cause it to
slow down or even crash, making it inaccessible to users. Potential mitigations
include CDNs and proxies.
12. Trojans
XSS attacks involve injecting malicious code into a website but the website itself is
not being attacked, rather it aims to impact the website's visitors. A common way
attackers can deploy cross-site scripting attacks is by injecting malicious code into a
comment e.g. embedding a link to malicious JavaScript in a blog post's comment
section.
Attackers may infect your system with malware that grants remote access to a
command and control server. Once they have infected hundreds or even thousands
of computers they can establish a botnet, which can be used to
send phishing emails, launch other cyber attacks, steal sensitive data, or mine
cryptocurrency.
Money is not the only motivator. Attackers may want to leak information to the public,
embarrass certain organizations, grow political ideologies, or perform cyber warfare
on behalf of their government like the United States or China.
There are many ways to expose, alter, disable, destroy, steal or gain unauthorized
access to computer systems, infrastructure, networks, operating systems, and IoT
devices.
In general, attack vectors can be split into passive or active attacks:
Passive attack vector exploits are attempts to gain access or make use of
information from the system without affecting system resources, such
as typosquatting, phishing, and other social engineering-based attacks.
Active cyber attack vector exploits are attempts to alter a system or affect its
operation such as malware, exploiting unpatched vulnerabilities, email
spoofing, man-in-the-middle attacks, domain hijacking, and ransomware.
To address common attack vectors, security controls must spread across the
majority of the attack surface. The process begins by identifying all possible entry
points into your private network - a delineation that will differ across all businesses.
The following cyber defense strategies will help you block frequently abused entry
points and also highlight possible regions in your ecosystem that might be housing
attack vectors.
Create secure IoT credentials - Most IoT devices still use their predictable
factory login credentials, making them prime targets for DDoS attacks.
Use a password manager - Password managers ensure login credentials
are strong and resilient to brute force attacks.
Educate employees - To prevent staff from falling common for social
engineering and phishing tactics, they need to be trained on how to identify
and report potential cybercriminal activity. Humans will always be the weakest
points in every security program.
Identify and shut down data leaks - Most businesses are unknowingly
leaking sensitive data that could facilitate data breaches. A data leak detection
solution will solve this critical security issue.
Detect and remediate all system vulnerabilities - This should be done for
both the internal and external vendor networks. An attack surface monitoring
solution can help you do this.
Keep antivirus software updated - Updates keep antivirus software
informed of the latest cyber threats roaming the internet.
Keep third-party software regularly updated - Software updates contain
critical patches for newly discovered attack vectors. Many cyber attackers
have achieved success by abusing known vulnerabilities in out-of-date
software.