Unit I Cyber Security
Unit I Cyber Security
Sabotage
Government organizations must determine sensitive
information and the risks if it is compromised. Hostile
governments or terrorists may steal information, destroy it.
Denial-of-service (DoS) Attacks
DoS attacks prevent legitimate users from accessing a
website by flooding it with fake requests and forcing the
website to handle these requests.
Propaganda Attacks
Attempts to control the minds and thoughts of people
living in or fighting for a target country. Propaganda can be
used to expose embarrassing truths, spread lies to make
people lose trust in their country, or side with their
enemies.
Economic Disruption
Most modern economic systems operate using computers.
Attackers can target computer networks of economic
establishments such as stock markets, payment systems,
and banks to steal money or block people from accessing
the funds they need.
Surprise Attacks
The point is to carry out a massive attack that the enemy
isn’t expecting, enabling the attacker to weaken their
defences. This can be done to prepare the ground for a
physical attack in the context of hybrid warfare.
Conducting Risk Assessments with Cyber Wargames
The best way to assess a nation’s readiness for cyber
warfare is to conduct a real-life exercise or simulation, also
known as a cyber wargame.
•It helps to detect the threats in the files which the users try
to download by using reputation data from Download
Insight.
Firewall Policy-
This policy provides the following protection:
•It blocks the unauthorized users from accessing the
systems and networks that connect to the Internet.
Open Design-
This principle states that the security of a mechanism
should not depend on the secrecy of its design or
implementation. It suggests that complexity does not add
security.
Complete mediation-
The principle of complete mediation restricts the caching
of information, which often leads to simpler
implementations of mechanisms. The idea of this principle
is that access to every object must be checked for
compliance with a protection scheme to ensure that they
are allowed.
Example-
The Internet-connected surveillance cameras are a typical
example of a compromise recording system that can be
placed to protect a building.
Types of Cyber Attacks
A cyber-attack is an exploitation of computer systems and
networks. It uses malicious code to alter computer code,
logic or data and lead to cybercrimes, such as information
and identity theft.
Web-based attacks-
These are the attacks which occur on a website or web
applications. Some of the important web-based attacks are
as follows-
•Injection attacks:
It is the attack in which some data will be injected into a
web application to manipulate the application and fetch the
required information.
URL Interpretation
It is a type of attack where we can change the certain parts
of a URL, and one can make a web server to deliver web
pages for which he is not authorized to browse.
File Inclusion attacks
It is a type of attack that allows an attacker to access
unauthorized or essential files which is available on the
web server or to execute malicious files on the web server
by making use of the include functionality.
Virus-
It is a type of malicious software program that spread
throughout the computer files without the knowledge of a
user. It is a self-replicating malicious computer program
that replicates by inserting copies of itself into other
computer programs when executed. It can also execute
instructions that cause harm to the system.
Worm
It is a type of malware whose primary function is to
replicate itself to spread to uninfected computers. It works
same as the computer virus. Worms often originate from
email attachments that appear to be from trusted senders.
Trojan horse
It is a malicious program that occurs unexpected changes
to computer setting and unusual activity, even when the
computer should be idle. Some malicious code will run in
the background.
Backdoors
It is a method that bypasses the normal authentication
process. A developer may create a backdoor so that an
application or operating system can be accessed for
troubleshooting or other purposes.
Bots
A bot (short for "robot") is an automated process that
interacts with other network services. Some bots program
run automatically, while others only execute commands
when they receive specific input.
Example: of bots program are the crawler, chatroom bots,
and malicious bots.
Types of Cyber Attackers-
In computer and computer networks, an attacker is the
individual or organization who performs the malicious
activities to destroy, expose, alter, disable, steal or gain
unauthorized access to or make unauthorized use of an
asset.
Cyber Criminals-
Cybercriminals are individual or group of people who use
technology to commit cybercrime with the intention of
stealing sensitive company information or personal data
and generating profits.
Cybercriminals use computers in three broad ways to do
cybercrimes-
Negligent-
These are the threats in which employees try to avoid the
policies of an organization put in place to protect endpoints
and valuable data.
Cyber Security Tools-
There are numbers of hacking attacks which affecting
businesses of all sizes. Hackers, malware, viruses are some
of the real security threats in the virtual world.