Cyber Security 60 89
Cyber Security 60 89
Cyber Security 60 89
Definition of E- Commerce
E-Commerce or Electronic Commerce means buying and selling of goods,
products, or services over the internet.
E-commerce is also known as electronic commerce or internet commerce.
Transaction of money, funds, and data are also considered as E-commerce.
These business transactions can be done in four ways: Business to Business
(B2B), Business to Customer (B2C), Customer to Customer (C2C), and
Customer to Business (C2B).
E-commerce platforms face various threats that can compromise security and
disrupt operations. Here are some common threats:
1. Data Breaches: These occur when sensitive customer information, such as
credit card details or personal data, is accessed or stolen by unauthorized
individuals or cybercriminals. Breaches can happen through hacking,
phishing, or exploiting vulnerabilities in the system.
AEPS doesn’t require any physical activity like visiting a branch, using debit or
credit cards or making a signature on a document. This bank-led model allows
digital payments at PoS (Point of Sale / Micro ATM) via a Business
Correspondent (also known as Bank Mitra) using Aadhaar authentication.
Each mode of digital payment offers its own set of advantages in terms of
accessibility, ease of use, security, and suitability for different scenarios. The choice
of which to use often depends on factors like convenience, accessibility to
technology, internet connectivity, and personal preferences.
Digital Payments Related Common Frauds and Preventive Measures
With the increasing trend of digital payment systems, the number of fraud
attempts is also increasing at an alarming rate. Cybercriminals are always looking
for ways to exploit the loopholes in the digital payment process to steal money
from unsuspecting individuals.
1. Phishing
Phishing scams are fake messages, emails, or websites that trick people
into providing their personal information, such as login credentials, credit
card details, or social security numbers. These scammers then use this
information to access victims’ accounts and steal their funds.
Preventive Measures:
− Verify website URLs before entering any personal information.
− Never share personal or financial details via email or unsecured
websites.
− Enable two-factor authentication for added security.
2. Identity Theft
Identity theft occurs when a fraudster steals someone’s personal
information, such as their name, address, or social security number, and
uses it for fraudulent activities, such as opening a new credit card or
mobile payment account.
Preventive Measures:
− Use strong, unique passwords for each financial account.
− Regularly monitor your credit report for any suspicious activities.
− Be cautious while sharing personal information online.
3. Account Takeover
In an account takeover, a fraudster gains access to a user’s digital
payment account by stealing their login credentials or obtaining their
personal information using phishing scams. The attacker then uses the
account to make unauthorized transactions and transfer funds.
Preventive Measures:
− Use strong, unique passwords and change them regularly.
− Enable account alerts for any unusual activity.
− Consider using biometric authentication if available.
4. Card Skimming
Card skimming involves the illegal copying of a user’s credit or debit card
information using a skimming device when the card is swiped for payment.
The scammers then use the copied information to make fraudulent
transactions.
Preventive Measures:
− Check for tampering on card readers before using them.
− Use contactless payment methods where possible.
− Regularly monitor your account statements for any unauthorized
charges.
5. Malware and Spyware:
Malicious software designed to steal financial information from devices.
Preventive Measures:
− Install and regularly update antivirus and anti-malware software.
− Avoid clicking on suspicious links or downloading unknown
attachments.
− Keep your device's operating system and apps up to date.
6. Unauthorized Transactions:
Transactions made without the account holder's knowledge or consent.
Preventive Measures:
− Regularly check account statements for any unfamiliar transactions.
− Enable transaction notifications or alerts for your accounts.
− Report any unauthorized transactions to your bank or
payment provider immediately.
7. Social Engineering Attacks:
Manipulating individuals to reveal confidential information.
Preventive Measures:
− Be cautious of unsolicited calls or messages asking for personal
information.
− Verify the identity of the person or organization before sharing any
details.
− Educate yourself and your family about common social engineering
tactics.
RBI guidelines on digital payments and customer protection in unauthorized
banking transactions.
The Reserve Bank of India (RBI) has put forth various guidelines regarding digital
payments and customer protection, particularly concerning unauthorized
banking transactions.
Here are some key aspects:
Digital Payments:
1. Security Measures: RBI mandates that banks and financial institutions
implement robust security measures to safeguard digital transactions. This
includes two-factor authentication, encryption, and other security protocols.
2. Customer Awareness: Banks are required to educate customers about safe
digital practices, potential risks, and methods to secure their transactions. This
could be through notifications, SMS alerts, or educational campaigns.
3. Fraud Monitoring: Regular monitoring of transactions for any suspicious
activity or patterns to prevent fraudulent transactions is mandatory.
4. Prompt Redressal: There are provisions for customers to report unauthorized
transactions promptly. Upon receiving such reports, banks are obligated to
investigate and resolve complaints within a specific timeline.
Customer Protection in Unauthorized Transactions:
1. Limited Liability of Customers: In cases of unauthorized transactions, if
the customer reports the transaction within a stipulated time frame, the
customer's liability is limited. The liability shift is from the customer to the
bank, subject to certain conditions and documentation.
2. Timely Reporting: Customers are encouraged to report unauthorized
transactions or any suspicious activity as soon as possible to minimize their
liability.
3. Dispute Resolution: There is a defined process for dispute resolution
between the customer and the bank regarding unauthorized transactions.
4. Reversal of Transactions: The RBI mandates that banks have to ensure prompt
reversal of any unauthorized transaction within a specified time frame once
it is reported by the customer.
Relevant provisions of Payment Settlement Act,2007.
The Payment and Settlement Systems Act, 2007 is an Indian legislation that
provides the regulatory framework for payment systems in India. Here are some
of the relevant provisions:
1. Regulation of Payment Systems: The Act establishes the Reserve
Bank of India (RBI) as the regulatory authority for payment systems in
India. It aims to ensure the stability, efficiency, and integrity of payment
systems.
2. Designation of Payment Systems: The RBI has the authority to
designate systems for the purpose of the Act, allowing it to regulate and
supervise various payment systems in the country.
3. Licensing of Payment System Operators: The Act outlines
provisions for the licensing and regulation of payment system operators,
ensuring that entities involved in payment systems meet certain criteria
and adhere to specified norms.
4. Oversight and Monitoring: The RBI is empowered to oversee and
monitor payment systems to ensure their smooth functioning, stability, and
compliance with regulations.
5. Settlement Finality: The Act provides for settlement finality, meaning
that once a settlement in a payment system is deemed final, it cannot be
revoked or reversed, except in certain specified circumstances.
6. Establishment of Payment System Board: The Act establishes a
Payment System Board within the RBI to regulate and supervise payment
systems more effectively.
7. Penalties and Enforcement: Provisions for penalties and enforcement
mechanisms are outlined in the Act to ensure compliance with its
provisions and regulations set by the RBI.
These provisions and more are detailed in the Payment and Settlement Systems
Act, 2007, aimed at fostering a secure, efficient, and reliable payment system
framework in India.
Module-V:
End Point device and Mobile phone security, Password policy, Security patch
management, Data backup, Downloading and management of third-party software,
Device security policy, Cyber Security best practices, Significance of host firewall and
Ant-virus, Management of host firewall and Anti-virus, Wi-Fi security, Configuration of
basic security policy and permissions.
4. Encrypt Mobile Data: Enable encryption for data stored on the device.
Most modern smart phones have this option in settings.
5. Remote Wipe/Find Features: Activate remote wipe/locate features so that if
the device is lost, you can erase its data or find its location.
6. Regular Updates: Keep the phone's operating system and apps updated to
patch vulnerabilities.
7. Use VPNs on Public Networks: When connecting to public Wi-Fi, use a
Virtual Private Network (VPN) for encrypted and secure browsing.
8. Avoid Jail breaking or Rooting: Avoid modifying the phone's operating
system beyond the manufacturer's intended use, as it can expose the device to
more risks.
Password policy
A password policy sets the rules that passwords for a service must meet, such as
length and type of characters allowed and disallowed.
Password policies are crucial for ensuring the security of digital accounts and
systems. They typically include guidelines and requirements that dictate how
passwords should be created, used, and managed. Here are some common
elements of a robust password policy:
1. Password Length: Requiring a minimum number of characters (often 8-12)
helps create stronger passwords.
2. Complexity Requirements: Encouraging or mandating a mix of
character types (uppercase, lowercase, numbers, symbols) makes
passwords harder to crack.
3. Regular Changes: Requiring periodic password changes (every 60-90
days) reduces the risk of prolonged exposure to potential breaches.
4. Prohibiting Common Passwords: Blocking commonly used or easily
guessable passwords enhances security.
5. Account Lockout: Implementing a mechanism that locks an account after
multiple failed login attempts prevents brute force attacks.
6. Multi-Factor Authentication (MFA): Encouraging or mandating the use
of MFA adds an extra layer of security, requiring users to provide more than
one form of verification.
7. Education and Training: Providing guidance to users on creating strong
passwords and the importance of safeguarding them through regular
training or resources.
8. Restrictions on Password Sharing: Discouraging or prohibiting the
sharing of passwords helps maintain individual account security.
Effective patch management helps mitigate the risks associated with security
vulnerabilities, reducing the chances of security breaches or attacks exploiting
known weaknesses in software or systems.
Data backup
6. Secure Wi-Fi Networks: Use strong encryption (like WPA3) for Wi-Fi
networks, change default passwords on routers, and hide your network's SSID to
prevent unauthorized access.
7. Implement Firewalls: Use firewalls to establish barriers between your
internal network and untrusted external networks, such as the internet.
8. Limit Access and Permissions: Grant access only to necessary data and
systems. Regularly review and update user permissions as roles change within
the organization.
9. Monitor and Respond: Employ monitoring tools to detect and respond to
security threats promptly. This includes network traffic, system logs, and
anomalous activities.
10. Create an Incident Response Plan: Develop a plan outlining steps to take in
the event of a cyber security incident. This helps in responding effectively and
minimizing damage.
11. Encrypt Sensitive Data: Encrypt data both in transit and at rest. This adds a layer
of protection even if data is compromised.
12. Third-Party Risk Management: Assess and manage the security risks posed
by third-party vendors and service providers who have access to your systems
or data.
13. Regular Security Audits: Conduct periodic security audits and assessments
to identify vulnerabilities and address them promptly.
14. Implement Least Privilege: Provide users with the minimum level of access
needed to perform their jobs. This minimizes the risk of unauthorized access.
15. Stay Informed: Stay updated on the latest cyber security threats and trends.
This knowledge helps in proactively securing systems and networks.
Cyber security is an ongoing process requiring continuous efforts to stay
ahead of evolving threats. Implementing these best practices can significantly
strengthen your organization's security posture.
Both host firewalls and antivirus software play critical roles in computer
security, albeit in different ways.
Host Firewall:
A host firewall is a software or hardware component that monitors and controls
incoming and outgoing network traffic on an individual device (such as a
computer or server). Its primary function is to act as a barrier between your
device and potentially malicious content from the internet or other networks.
− Protection: It helps prevent unauthorized access to or from a private network
by controlling the traffic entering or leaving the device.
− Filtering: It filters network packets based on predefined security rules, allowing
or denying traffic based on various criteria like IP addresses, ports, protocols,
and applications.
− Defense: A host firewall is the first line of defense against many common
network-based attacks, such as port scanning, malware, and certain types of
cyber threats.
Antivirus Software:
Antivirus software is designed to detect, prevent, and remove malicious software
(malware) from a computer or device.
− Malware Protection: It scans files, emails, downloads, and other elements of
your system for known patterns and behaviors associated with viruses,
worms, Trojans, spyware, ransomware, and other types of malicious
software.
− Real-time Monitoring: Many antivirus programs run continuously in the
background, monitoring system activities and flagging or quarantining
suspicious files or processes.
− Updates and Heuristics: Antivirus software relies on regular updates to its
virus definition databases to recognize new threats. Additionally, some use
heuristic analysis to detect previously unknown malware by identifying
suspicious behavior patterns.
Significance:
− Complementary Protection: Host firewalls and antivirus software complement
each other. Firewalls protect against unauthorized network access, while
antivirus software safeguards against malware threats.
− Defense in Depth: Employing both provides a multi-layered defense,
crucial in cyber security, known as defense in depth. If one layer fails,
others might still provide protection.
− Preventative Measures: Together, they significantly reduce the risk of various
cyber threats, preventing unauthorized access, data breaches, and the potential
damage caused by malware infections.
In the constantly evolving landscape of cyber security, it's essential to keep
both your host firewall and antivirus software updated to ensure they can
effectively counter new and emerging threats.
Management of host firewall and Anti-virus
Managing host firewalls and antivirus software is crucial for maintaining a secure
system. Here are some general guidelines for managing them effectively:
Firewall Management:
1. Understand Firewall Rules: Learn how your firewall works and the rules
governing inbound and outbound traffic. Configure rules based on the
principle of least privilege, allowing only necessary traffic.
2. Regular Updates: Keep the firewall software updated to ensure it has the
latest security patches and features.
3. Logging and Monitoring: Enable logging to track firewall activities.
Regularly review logs for any suspicious activities or unauthorized access
attempts.
4. Default Deny Policy: Implement a default deny policy where all traffic is
blocked unless specifically allowed. This minimizes the attack surface.
5. Application Control: Use application-specific rules to control which
applications can access the network. This helps prevent unauthorized
programs from communicating externally.
Antivirus Management:
1. Regular Updates: Ensure your antivirus software is updated with the latest
virus definitions and software patches. New threats emerge regularly, so
frequent updates are crucial.
2. Scheduled Scans: Set up regular system scans to check for malware,
viruses, and other threats. Perform full system scans periodically.
3. Real-Time Protection: Enable real-time scanning to monitor files and
processes in real- time for any suspicious behavior or malware.
4. Quarantine and Removal: Configure the antivirus to quarantine or
remove identified threats automatically. Regularly review quarantined items
to ensure no false positives.
5. User Education: Educate users about safe browsing habits, downloading files
from trusted sources, and avoiding suspicious emails or websites that could
introduce malware.
6. Compatibility and Performance: Ensure the antivirus software doesn’t
conflict with other applications or significantly degrade system
performance. Adjust settings if needed for optimal performance
Wi-Fi security
Wi-Fi security is crucial in safeguarding your network from unauthorized access,
data breaches, and various cyber threats. Here are some essential tips to enhance
Wi-Fi security:
1. Strong Passwords: Use a complex, unique password for your Wi-Fi
network. Avoid using default passwords provided by the router
manufacturer.
2. Encryption: Enable WPA3 (Wi-Fi Protected Access 3) encryption if
available on your router. WPA2 is also secure but might not be as
robust as WPA3.
Creating a basic security policy involves several steps and considerations. Here’s a
general guide on how to approach setting up security policies and permissions:
1. Identify Assets: Determine what data, systems, or resources need protection.
This could be customer data, intellectual property, servers, etc.
2. Risk Assessment: Evaluate potential threats and vulnerabilities to those assets.
Consider internal and external risks, such as cyber attacks, unauthorized access,
data breaches, etc.
3. Define Security Policies: Create a set of rules and guidelines to protect the
identified assets. This might include:
− Access Control Policies: Define who can access what. Use principles like
least privilege (giving users only the necessary permissions) and
separation of duties.
− Data Encryption Policies: Specify when and where encryption should
be applied to sensitive data, both at rest and in transit.
− Password Policies: Establish guidelines for strong, regularly updated
passwords and multi-factor authentication.
− Security Update Policies: Define how often systems and software should
be updated to patch vulnerabilities.
− Incident Response Policies: Lay out procedures for responding to
security incidents, including reporting and mitigation steps.
4. Implement Permissions:
− User Roles: Define roles (like admin, user, manager) and assign permissions
accordingly. Admins usually have the highest level of access, while users
have more limited access.
− Access Controls: Use tools like access control lists (ACLs) or Role-Based
Access Control (RBAC) to enforce permissions. This can be managed
through operating systems, databases, or applications.
5. Regular Audits and Updates: Periodically review and update security policies and
permissions. Technology changes and new threats emerge, so it’s important to
stay up-to-date.
6. Employee Training: Educate employees about security policies and the importance
of adhering to them. Human error is a significant factor in security breaches.
7. Monitoring and Logging: Implement systems to monitor user activities and
log events. This helps in identifying suspicious behavior and investigating
incidents.
8. Compliance: Ensure that your security policies align with relevant regulations
and industry standards applicable to your organization.
Remember, this is a general framework. The specifics will vary depending on the
nature of your organization, the industry, and the regulatory environment you
operate in. Always consider seeking professional advice or a security expert's
help when setting up security policies for an organization.