Cyber Security 1st Unit Notes
Cyber Security 1st Unit Notes
Unit – 1
Cyber Crime
Cybercrime is defined as a crime in which a computer is the object of the crime (hacking,
phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes).
Cybercriminals may use computer technology to access personal information, business trade secrets or
use the internet for exploitative or malicious purposes. Criminals can also use computers for
communication and document or data storage. Criminals who perform these illegal activities are often
referred to as hackers.
Cybercrime may also be referred to as computer crime.
Mobile, Wireless Devices and hand-held devices
Fig: Push attack on mobile devices. DDos implies distributed denial-of-service attack.
LDAP is a software protocol for enabling anyone to locate individuals, organizations and
other resources such as files and devices on the network (i.e., on the public Internet or on the
organization’s Intranet). In a network, a directory tells you where an entity is located in the
network.
Following are some tips to protect mobile from mobile malware attacks.
1. Download or accept programs and content (including ring tones, games, video clips and
photos) only from a trusted source.
2. If a mobile is equipped with Bluetooth, turn it OFF or set it to non-discoverable mode
when it is not in use and/or not required to use.
3. If a mobile is equipped with beam (i.e., IR), allow it to receive incoming beams, only
from the trusted source.
4. Download and install antivirus software for mobile devices.
3. Mishing
1. Mishing is a combination of mobile phone and Phishing Mishing attacks are attempted
using mobile phone technology.
2. M-Commerce is fast becoming a part of everyday life. If you use your mobile phone for
purchasing goods/services and for banking, you could be more vulnerable to a Mishing
scam.
3. A typical Mishing attacker uses call termed as Vishing or message (SMS) known as
Smishing.
4. Attacker will pretend to be an employee from your bank or another organization and
will claim a need for your personal details.
5. Attackers are very creative and they would try to convince you with different reasons
why they need this information from you.
4. Vishing
Vishing is the criminal practice of using social engineering over the telephone
system, most often using features facilitated by VoIP, to gain access to personal and
financial information from the public for the purpose of financial reward. The term is a
combination of V – voice and Phishing.
Vishing is usually used to steal credit card numbers or other related data used in ID
theft schemes from individuals.
The most profitable uses of the information gained through a Vishing attack include
1. ID theft;
2. Purchasing luxury goods and services;
3. Transferring money/funds;
4. Monitoring the victims’ bank accounts;
5. Making applications for loans and credit cards.
How Vishing Works
The criminal can initiate a Vishing attack using a variety of methods, each of
which depends upon information gathered by a criminal and criminal’s will to reach a
particular audience.
4. The caller enters his/her date of birth and again receives a prompt from the
automated system:
“Thank you. Now please type your PIN, followed by the pound key.”
5. The caller enters his PIN and hears one last prompt from the system: “Thank you.
We will now transfer you to the appropriate representative.”
How to Protect from Vishing Attacks
Following are some tips to protect oneself from Vishing attacks.
1. Be suspicious about all unknown callers.
2. Do not trust caller ID. It does not guarantee whether the call is really coming from
that number, that is, from the individual and/or company – caller ID Spoofing is easy.
3. Be aware and ask questions, in case someone is asking for your personal or financial
information.
4. Call them back.
5. Report incidents:
5. Smishing
Smishing is a criminal offense conducted by using social engineering techniques similar
to Phishing. The name is derived from “SMS PhISHING.” SMS – Short Message Service – is the
text messages communication component dominantly used into mobile phones. To know how
SMS can be abused by using different methods and techniques other than information gathering
under cybercrime.
How to Protect from Smishing Attacks
Following are some tips to protect oneself from Smishing attacks:
1. Do not answer a text message that you have received asking for your PI.
2. Avoid calling any phone numbers, as mentioned in the received message, to cancel a
membership and/or confirming a transaction which you have not initiated but
mentioned in the message.
3. Always call on the numbers displayed on the invoice and/or appearing in the bank
statements/passbook.
3. Never click on a hot link received through message on your Smartphone or PDA. Hot
links are links that you can click, which will take you directly to the Internet sites.
6. Hacking Bluetooth
1. Bluetooth is an open wireless technology standard used for communication (i.e.,
exchanging data) over short distances between fixed and/or mobile devices.
2. Bluetooth is a short-range wireless communication service/technology that uses the 2.4-
GHz frequency range for its transmission/communication.
Name of the
S. No. Description
Tool
This tool enables to search for Bluetooth enable device and will try to extract as
1 BlueScanner much information as possible for each newly discovered device after connecting
it with the target.
This is a GUI-based utility for finding discoverable and hidden Bluetooth enabled
2 BlueSniff
devices.
The buggers exploit the vulnerability of the device and access the images,
3 BlueBugger
phonebook, messages and other personal information.
If a Bluetooth of a device is switched ON, then Bluesnarfing makes it possible
4 Bluesnarfer to connect to the phone without alerting the owner and to gain access to
restricted portions of the stored data.
Bluediving is testing Bluetooth penetration. It implements attacks like Bluebug
5 BlueDiving
and BlueSnarf.
Bluejacking, Bluesnarfing, Bluebugging and Car Whisperer are common attacks that have
emerged as Bluetooth-specific security issues.
1. Bluejacking: It means Bluetooth Jacking where Jacking is short name for hijack – act of
taking over something. Bluejacking is sending unsolicited messages over Bluetooth to
Bluetooth-enabled devices such as mobile phones, PDAs or computers.
2. Bluesnarfing: It is the unauthorized access from a wireless device through a Bluetooth
connection between cell phones, PDAs and computers. This enables the attacker to access a
calendar, contact list, SMS and E-Mails as well as enable attackers to copy pictures and
private videos.
3. Bluebugging: It allows attackers to remotely access a user’s phone and use its features
without user’s attention.
4. Car Whisperer: It is a piece of software that allows attackers to send audio to and receive
audio from a Bluetooth-enabled car stereo.
Mobile Devices: Security Implications for Organizations
1. Managing diversity and proliferation of hand-held devices
We have talked about the micro issues of purely technical nature in mobile device security.
Given the threats to information systems through usage of mobile devices, the organizations
need to establish security practices at a level appropriate to their security objectives, subject to
legal and other external constraints.
We have discussed micro- and macro level security issues with mobile devices used for
mobile computing purposes and what individuals can do to protect their personal data on mobile
devices. We discuss what organizations can do toward safeguarding their information systems
in the mobile computing paradigm.
1. Encrypting Organizational Databases
Critical and sensitive data reside on databases [say, applications such as customer
relationship management (CRM) that utilize patterns discovered through data warehousing and
data mining (DM) techniques] and with the advances in technology, access to these data is not
impossible through hand-held devices. It is clear that to protect the organizations’ data loss,
such databases need encryption.
2. Including Mobile Devices in Security Strategy
These discussion so far makes a strong business case – in recognition of the fact that
our mobile workforce is on the rise, organizational IT departments will have to take the
accountability for cyber security threats that come through inappropriate access to organizational
data from mobile-device–user employees. Encryption of corporate databases is not the end of
everything.
1. Determine whether the employees in the organization need to use mobile computing
devices at all, based on their risks and benefits within the organization, industry and
regulatory environment.
2. Implement additional security technologies, as appropriate to fit both the organization and
the types of devices used.
3. Standardize the mobile computing devices and the associated security tools being used with
them. As a matter of fundamental principle, security deteriorates quickly as the tools and
devices used become increasingly disparate.
4. Develop a specific framework for using mobile computing devices, including guidelines
for data- syncing, the use of firewalls and anti-malware software and the types of
information that can be stored on them.
5. Centralize management of your mobile computing devices. Maintain an inventory so that
you know who is using what kinds of devices.
6. Establish patching procedures for software on mobile devices. This can often be simplified
by integrating patching with syncing or patch management with the centralized inventory
database.
7. Label the devices and register them with a suitable service that helps return recovered
devices to the owners.
8. Establish procedures to disable remote access for any mobile devices reported as lost or
stolen. Many devices allow the users to store usernames and passwords for website portals,
which could allow a thief to access even more information than on the device itself.
9. Remove data from computing devices that are not in use or before re-assigning those
devices to new owners (in case of company-provided mobile devices to employees). This
is to preclude incidents through which people obtain “old” computing devices that still had
confidential company data.
10. Provide education and awareness training to personnel using mobile devices. People
cannot be expected to appropriately secure their information if they have not been told how.