Unit V Cybersecurity
Unit V Cybersecurity
5.1.1 CYBERCRIME:
Cyber crimes are crimes that involve criminal activities done through cyberspace
by devices connected to the internet.
Cybercrime can be committed against an individual or a group;
It can also be committed against government and private organizations.
It may be intended to harm someone’s reputation, physical harm, or even mental
harm.
Cybercrime can cause direct harm or indirect harm to whoever the victim is.
However, the largest threat of cybercrime is on the financial security of an
individual as well as the government.
Cybercrime causes loss of billions of USD every year.
Types of Cybercrime:
The major types of cybercrime :
Malware attacks
A malware attack is where a computer system or network is infected with a computer
virus or other type of malware. A computer compromised by malware could be used by
cybercriminals for several purposes. These include stealing confidential data, using the
computer to carry out other criminal acts, or causing damage to data.
Phishing
A phishing campaign is when spam emails, or other forms of communication, are sent
with the intention of tricking recipients into doing something that undermines their
security. Phishing campaign messages may contain infected attachments or links to
malicious sites, or they may ask the receiver to respond with confidential information.
Distributed DoS attacks
Distributed DoS attacks (DDoS) are a type of cybercrime attack that cybercriminals use
to bring down a system or network. Sometimes connected IoT (Internet of Things)
devices are used to launch DDoS attacks.
Hacking
It is an illegal practice by which a hacker breaches the computer’s security system of
someone for personal interest.
Phishing
Phishing attacks are the practice of sending fraudulent communications that appear to
come from a reputable source. It is usually done through email. The goal is to steal
sensitive data like credit card and login information, or to install malware on the
victim's machine.
Unwarranted mass-surveillance
Mass surveillance means surveillance of a substantial fraction of a group of people by
the authority especially for the security purpose, but if someone does it for personal
interest, it is considered as cybercrime.
Child pornography
It is one of the most heinous crimes that is brazenly practiced across the world. Children
are sexually abused and videos are being made and uploaded on the Internet.
Child grooming
It is the practice of establishing an emotional connection with a child especially for the
purpose of child-trafficking and child prostitution.
Copyright infringement
If someone infringes someone’s protected copyright without permission and publishes
that with his own name, is known as copyright infringement.
Money laundering
Illegal possession of money by an individual or an organization is known as money
laundering. It typically involves transfers of money through foreign banks and/or
legitimate business. In other words, it is the practice of transforming illegitimately
earned money into the legitimate financial system.
Cyber-extortion
When a hacker hacks someone’s email server, or computer system and demands money
to reinstate the system, it is known as cyber-extortion.
Cyber-terrorism
when someone hacks government’s security system or intimidates government or such
a big organization to advance his political or social objectives by invading the security
system through computer networks, it is known as cyber-terrorism.
5.1.2 INFORMATION SECURITY
Governance Framework:
The Information Security and Governance Framework (ISGF) is a set of guidelines and
best practices for managing information security in an organization. It provides a
structure for identifying, classifying, and protecting sensitive information, and
implementing security controls and procedures. The ISGF also includes guidance on
incident response and disaster recovery.
Confidentiality:
Confidentiality is the protection of information from unauthorized disclosure. When
information is confidential, it is not to be shared with anyone who does not need to
know. Confidentiality is crucial for both personal and business information. Personal
information, such as medical records or financial information, should only be shared
with those who have a legitimate need to know.
Information security and integrity are crtitical because they protect the confidentiality,
availability, and integrity of data.
Availability
Availability is the degree to which a system can be accessed and used. To ensure
information security and availability, organizations should have policies and procedures
in place to protect their data.
They should also have a plan for how to respond to security incidents. Additionally, they
should regularly test their systems and backup their data.
Organizations that don't take information security and availability seriously risk data
breaches, which can lead to loss of revenue, damage to reputation, and regulatory
penalties. Data breaches can also cause downtime, disrupting business operations and
leading to lost productivity.
The following are some of the main cyber crimes committed targeting
individuals.
Cyberbullying
The term cyberbullying is not defined under any Indian law. However, in general
parlance, cyberbullying refers to bullying someone by threatening, harassing or
embarrassing the victim using technology digital device. Generally, cyberbullying
includes the following activities on the internet:
Cyberstalking
Browsing anyone’s internet history or online activity, and sending obscene
content online with the help of any social media, software, application, etc. to
know about that particular person is called cyberstalking. Cyberstalkers take
advantage of the inconspicuousness provided by the internet. They are generally
not detectable by the victim, as it is very easy for cyberstalkers to open spam
accounts just to stalk any person; once the stalker deletes the account, his/ her
identity completely vanishes.
Cyber defamation
Cyber defamation means injuring the other person’s reputation via the internet
through social media, Emails etc. There are two types of Cyber defamation: libel
and slander.
Cyber fraud
As the name suggests, cyber fraud refers to any act of fraud committed with the
use of a computer. Any person who dishonestly uses the internet to illegal
deceive people and gets personal data, communication, etc. with a motive to
make money is called a cyber fraud.
Examples of cyber fraud include sending emails containing fake invoices, sending
fake emails from email addresses similar to the official ones, etc.
Cyber theft
Cyber theft is a type of cybercrime which involves the unauthorized access of
personal or other information of people by using the internet. The main motive
of the cyber criminals who commit cyber theft is to gather confidential data like
passwords, images, phone numbers, etc. and use it as leverage to demand a
lumpsum amount of money. The unauthorized transmission of copyrighted
materials, trademarks, etc. over the internet is also a part of cyber theft. Cyber
thefts are committed through various means, like hacking, email/ SMS spoofing,
etc.
Spyware
Spyware is a type of malware or malicious software, when it is installed it starts
accessing and computing the other person’s device without the end user’s
knowledge. The primary goal of this software is to steal credit card numbers,
passwords, One-Time Passwords (OTPs), etc.
Salami attack
It is one of the tactics to steal money, which means the hacker steals the money
in small amounts. The damage done is so minor that it is unnoticed. Generally,
there are two types of Salami attacks- Salami slicing and Penny shaving. In
Salami slicing, the attacker uses an online database to obtain customer
information, such as bank/credit card details. Over time, the attacker deducts
insignificant amounts from each account. These sums naturally add up to large
sums of money taken from the joint accounts invisibly.
Web Jacking
Web Jacking refers to the illegal redirection of a user’s browser from a trusted
domain’s page to a fake domain without the user’s consent. By using the method
of Web Jacking, people visiting any well-known or reliable website can be easily
redirected to bogus websites, which in turn lead to the installation of malware,
leak of personal data, etc. Web jackers intend to illegally collect confidential
information of users by enticing them to click on any link which may seem
genuine at the first glance.
Data diddling
Data diddling is a cyber crime which involves the unauthorized alteration of data
entries on a computer. It may be done either before or during the entry of such
data. It is generally committed by way of computer virus attacks. At times, to
conceal the alteration, the altered data is changed to its original data after
retrieving the required information. Usually, the strategic or statistical data of
large companies.
In India, data diddling is an offence under Section 65 of the IT Act. The said
Section provides that knowingly or intentionally concealing, destroying, altering
or causing another to conceal, destroy, or alter any computer source code used
for a computer, computer programme, computer system or computer network is
punishable with imprisonment of up to three years or with fine of up to two
lakhs.
Cyber pornography
As per Merriam-Webster Dictionary, pornography is the depiction of erotic
behaviour (as in pictures or writing) intended to cause sexual excitement.
Accordingly, cyber pornography refers to using the internet to display,
distribute, import, or publish pornography or obscene materials.
Cyber terrorism
Cyber terrorism means using cyberspace to hurt the general public and damage
the integrity and sovereignty of any country. The IT Act defines cyber terrorism
under Section 66F as any acts done by a person with the intent to create a threat
to the unity, integrity, sovereignty and security of the nation or create terror in
minds of people or section of people by way of disrupting the authorised access
to a computer resource or getting access to a computer resource through
unauthorised means or causing damage to a computer network.
Cyber Espionage
According to Merriam-Webster Dictionary, espionage is “the practice of spying or
using spies to obtain information about the plans and activities especially of a
foreign government or a competing company.” Similarly, cyber espionage refers
to the unauthorized accessing of sensitive data or intellectual property for
economic, or political reasons. It is also called ‘cyber spying’.
In most cases of cyber espionage, spies in the form of hackers are deliberately
recruited to launch cyber attacks on the government systems of enemy nations
to stealthily collect confidential information. The cross-border exposure of
sensitive data related to any country can continue as long as it stays undetected.
The information gathered through cyber espionage is then used by the gathering
country to either combat or launch military or political attacks on the enemy
country.
Military data
Academic research-related data
Intellectual property
Politically strategic data, etc.
• Password is like a key to get an entry into computerized systems like a lock.
• Password cracking is a process of recovering passwords from data that have
been stored in or transmitted by a computer system.
• Usually, an attacker follows a common approach – repeatedly making guesses for the
password.
The purpose of password cracking is as follows:
1. To recover a forgotten password.
2. As a preventive measure by system administrators to check for easily crackable
passwords.
3. To gain unauthorized access to a system.
Manual password cracking is to attempt to logon with different passwords. The attacker
follows the following steps:
1. Find a valid user account such as an Administrator or Guest;
2. create a list of possible passwords;
3. rank the passwords from high to low probability;
4. key-in each password;
5. try again until a successful password is found.
• Birthdays and other personal information such as addresses and phone numbers.
• Word or number patterns like aaabbb, qwerty, zyxwvuts, 123321, etc.
• Any of the above spelled backwards.
• Any of the above preceded or followed by a digit (e.g., secret1,1secret )
Strong Passwords:
A strong password is long enough, random or otherwise difficult to guess-producible
only by the user who chooses it
• Contain both upper and lower case characters (e.g., a-z, A-Z)
• Have digits and punctuation characters as well as letters e.g., 0-9,
@#$%^&*()_+|~-
=\`{}[]:";'<>?,./)
• Are at least eight alphanumeric characters long.
• Are not a word in any language, slang, dialect, jargon, etc.
• Are not based on personal information, names of family, etc.
• Passwords should never be written down or stored on-line.
• Try to create passwords that can be easily remembered.
• One way to do this is create a password based on a song title, affirmation, or other
phrase.
• For example, the phrase might be: "This May Be One Way To Remember" and the
password could be: "TmB1w2R!" or "Tmb1W>r~" or some other variation.
Random passwords :
Secure Password Generator
Password Length, Include Symbols ( e.g. @#$% ) , Include Numbers: ( e.g.
123456 ) , Include Lowercase Characters: ( e.g. abcdefgh ) ,Include Uppercase
Characters: ( e.g. ABCDEFGH ), Exclude Similar Characters: ( e.g. i, l, 1, L, o, 0, O )
,Exclude Ambiguous Characters: ( { } [ ] ( ) / \ ' " ` ~ , ; : . < > ) , Generate On The Client
Side: ( do NOT send across the Internet ) , Auto-Select: ( select the password
automatically ) , Save My Preference: ( save all the settings above for later use ) , Load
My Settings Anywhere: URL to load my settings on other computers quickly ,
Your New Password: Remember your password: Remember your password with the
first letters of each word in this sentence.
To prevent your passwords from being hacked by social engineering, brute force or
dictionary attack method, you should notice that:
1. Do not use the same password for multiple important accounts.
2. Use a password that has at least 16 characters, use at least one number, one
uppercase letter, one lowercase letter and one special symbol.
3. Do not use the names of your families, friends or pets in your passwords.
4. Do not use postcodes, house numbers, phone numbers, birthdates, ID card numbers,
social security numbers, and so on in your passwords.
5. Do not use any dictionary word in your passwords.
6. Do not use something that can be cloned( but you can't change ) as your passwords,
such as your fingerprints.
7. Do not let your Web browsers( FireFox, Chrome, Safari, Opera, IE ) store your
passwords, since all passwords saved in Web browsers can be revealed easily.
8. Do not log in to important accounts on the computers of others, or when connected to
a public Wi-Fi hotspot, Tor, free VPN or web proxy.
9. Do not send sensitive information online via HTTP or FTP connections, because
messages in these connections can be sniffed with very little effort. You should use
encrypted connections such as HTTPS and SFTP whenever possible.
10. It's recommended to change your passwords every 10 weeks.
11. Be careful when using online paste tools and screen capture tools, do not let them to
upload your passwords to the cloud.
12. If there are important files on your computer, and it can be accessed by others,
check if there are hardware keyloggers( e.g. wireless keyboard sniffer ), software
keyloggers and hidden cameras when you feel it's necessary.
Password guidelines:
1. Passwords used for business E-Mail accounts, personal E-Mail accounts and
banking/financial user accounts should be kept separate.
2. Passwords should be of minimum eight alphanumeric characters (common names or
phrases should be phrased).
3. Passwords should be changed every 30/45 days.
4. Passwords should not be shared with relatives and/or friends.
5. Password used previously should not be used while renewing the password.
6. Passwords of personal E-Mail accounts and banking/financial user accounts
should be changed from a secured system, within couple of days, if these E-Mail
accounts has been accessed from public Internet facilities such as
cybercafes/hotels/libraries.
7. Passwords should not be stored under mobile phones/PDAs, as these devices
are also prone to cyberattacks.
8. In case E-Mail accounts/user accounts have been hacked, respective
agencies/institutes should be contacted immediately.
5.3.2 Keyloggers and Spywares
• Keystroke logging, often called keylogging, is the practice of noting (or logging) the
keys struck on a keyboard, typically in a covert manner so that the person using the
keyboard is unaware that such actions are being monitored.
• Keystroke logger or keylogger is quicker and easier way of capturing the
passwords and monitoring the victims’ IT savvy behavior. It can be classified as
software keylogger and hardware keylogger.
5.3.2.3 Antikeylogger
Antikeylogger is a tool that can detect the keylogger installed on the computer system and also
can
remove the tool. (Visit http://www.anti-keyloggers.com for more information)
Advantages of using antikeylogger are as follows:
1. Firewalls cannot detect the installations of keyloggers on the systems; hence,
antikeyloggers
can detect installations of keylogger.
2. This software does not require regular updates of signature bases to work effectively such
as
other antivirus and antispy programs; if not updated, it does not serve the purpose, which
makes
the users at risk.
3. Prevents Internet banking frauds. Passwords can be easily gained with the help of
installing
keyloggers.
4. It prevents ID theft (we will discuss it more in Chapter 5).
5. It secures E-Mail and instant messaging/chatting.
5.4.3 Spywares
• Spyware is a type of malware (i.e., malicious software) that is installed on computers which
collects information about users without their knowledge.
• The presence of Spyware is typically hidden from the user; it is secretly installed on the user’s
personal computer.
• Sometimes, however, Spywares such as keyloggers are installed by the owner of a shared,
corporate or public computer on purpose to secretly monitor other users.
Spy.
Spector Pro.
Spector Pro.
eBlaster.
Remotespy .
Stealth Recorder Pro.
Stealth Website Logger.
Flexispy.
Wiretap Professional.
PC PhoneHome.
SpyArsenal Print Monitor Pro.
Malwares:
Malware, short for malicious software, is a software designed to infiltrate a computer system
without the owner’s informed consent. The expression is a general term used by
computer
professionals to mean a variety of forms of hostile, intrusive or annoying software or program
code.
Malware can be classified as follows:
1. Viruses and worms: These are known as infectious malware. They spread from one
computer system to another with a particular behavior.
2. Trojan Horses: A Trojan Horse,[14] Trojan for short, is a term used to describe malware
that appears,to the user, to perform a desirable function but, in fact, facilitates
unauthorized access to the user’s computer system
3. Rootkits: Rootkits is a software system that consists of one or more programs designed to
obscurethe fact that a system has been compromised.
4. Backdoors: Backdoor[16] in a computer system (or cryptosystem or algorithm) is a method
of bypassing normal authentication, securing remote access to a computer, obtaining access to
plain text and so on while attempting to remain undetected.
5. Spyware:
6. Botnets:
7. Keystroke loggers:
Here are few examples of variable field text the attacker uses on a webpage to test for
SQL
vulnerabilities:
1. Blah’ or 1=1--
2. Login:blah’ or 1=1--
3. Password::blah’ or 1=1--
4. http://search/index.asp?id=blah’ or 1=1--
Similar SQL commands may allow bypassing of a login and may return many rows in a table or
even
an entire database table because the SQL server is interpreting the terms literally. The double
dashes
near the end of the command tell SQL to ignore the rest of the command as a comment.
The page with the vulnerability may not be the one that displays data; however, it will
display
differently depending on the results of a logical statement injected into the legitimate SQL
statement called for that page.
• This type of attack can become time-intensive because a new statement must be crafted for
each bit
recovered.
• There are several tools that can automate these attacks once the location of the vulnerability
and
the target information have been established.
The NAC can also provide endpoint security protection such as antivirus
software, firewall, and vulnerability assessment with security enforcement
policies and system authentication methods.
NAC is critical for modern businesses because it allows organizations to monitor the
devices and users -- authorized and unauthorized -- trying to access the network.
Unauthorized users include cybercriminals, hackers and data thieves, and other bad
actors that an organization must keep out.
But businesses must also be gatekeepers for authorized users.
This particularly applies to organizations that allow remote access to the enterprise
network from non-corporate devices like mobile phones, laptops and tablets, or
companies that allow employees working in the office to use personal devices.
Both scenarios create security risks demanding organizations to address network
security.
Pre-admission: evaluates access attempts and only allows entry to authorized devices
and users.
Post-admission: re-authenticates users trying to enter a different part of the network;
also restricts lateral movement to limit the damage from cyber attacks.
Many NAC functions are performed by a network access server. A traditional network
access server is a server that performs authentication and authorization functions by
verifying user logon information. Also known as a media access gateway or remote
access server, a network access server handles remote logins, establishes point-to-point
protocol connections and ensures that authorized users can access the resources they
need.
A network access server can function in several ways, such as the following:
Network load balancing to distribute traffic and improve reliability and performance;
Network resource management to manage and allocate resources for networking
processes; and
Network user sessions to track users, store their data and persist their specific state.
common use cases for network access control?
NAC tools are proactive and designed to stop unauthorized access before it happens.
They protect an organization’s network perimeter including the physical infrastructure,
devices, software, applications and cloud-based assets.
Bring Your Own Device: Protects from vulnerabilities created when employees use
their own devices or use company devices from remote locations.
Network access for non-employees (vendors or partners): NAC with VPN allows
external users to access the corporate network (or specific parts of it) through a secure
self-service portal.
Internet of things (IoT): Prevents cybercriminals from exploiting IoT devices
connected to the enterprise network but often overlooked in terms of security and
monitoring.
Incident response: Identifies compromised devices and automatically disables access
to prevent an attack from spreading across the network.
NAC tools are also useful for security and authentication in specific industrial use cases,
such as medical devices and healthcare systems.
NAC offerings cover a broad range of capabilities and use cases. To find the right
one, consider these factors:
Lack of visibility
It's easy to lose track of how your data is being accessed and by whom, since many cloud
services are accessed outside of corporate networks and through third parties.
Multitenancy
Public cloud environments house multiple client infrastructures under the same umbrella, so
it's possible your hosted services can get compromised by malicious attackers as collateral
damage when targeting other businesses.
Compliance
Regulatory compliance management is oftentimes a source of confusion for enterprises using
public or hybrid cloud deployments. Overall accountability for data privacy and security still
rests with the enterprise, and heavy reliance on third-party solutions to manage this
component can lead to costly compliance issues.
Misconfigurations
Misconfigured assets accounted for 86% of breached records in 2019, making the inadvertent
insider a key issue for cloud computing environments. Misconfigurations can include leaving
default administrative passwords in place, or not creating appropriate privacy settings.
Types of cloud security solution:
Secure web gateway (SWG) provides threat protection and policy enforcement for
users accessing the web to prevent infections and block unwanted traffic.
Firewall/IPS provides network security, app control, and visibility. Cloud firewalls
stay up to date and scale to handle demand or encryption, making them a more
practical option.
URL filtering screens and blocks inappropriate access or content, also offering
protection from web-borne malware.
Sandboxing isolates software in an environment where it can be scanned and
executed without the risk of infecting a system or other applications.
Browser isolation loads webpages or apps in a remote browser and only sends the
user pixels, preventing the downloading, copying, pasting, and printing of data
or documents.
DNS controls define rules that control requests and responses related to DNS traffic,
allowing you to detect and prevent DNS abuses such as tunneling.
Antivirus detects and neutralizes trojans, spyware, ransomware, and more. Many
offerings also protect against threats such as malicious URLs, phishing, and DDoS.
TLS/SSL decryption breaks open inbound and outbound encrypted traffic to inspect
its contents, and then re-encrypts it to continue to its destination.
Wireless Security
Wireless Network provides various comfort to end users but actually they are very
complex in their working. There are many protocols and technologies working behind
to provide a stable connection to users. Data packets traveling through wire provide a
sense of security to users as data traveling through wire probably not heard by
eavesdroppers.
To secure the wireless connection, we should focus on the following areas
Identify endpoint of wireless network and end-users i.e., Authentication.
Protecting wireless data packets from middleman i.e., Privacy.
Keeping the wireless data packets intact i.e., Integrity.
1. WEP Protocol : Wired Equivalent Privacy Protocol abbreviated as WEP, was initially
originated in the 1999 and is considered the standard for wireless security encryption.
It is less found in today’s modern world because of the risk of security it is associated
with directly/ indirectly. WEP is not considered stable and Wi-Fi discontinued its use in
2004 because it is easy to exploit this level of security.
Example: Security added in the LAN connections to protect from unauthenticated users
trying to breach privacy.
2. WPA Protocol: WEP was succeeded by Wi-Fi Protected Access Protocol abbreviated
as WAP which offers more security and safety. WPA has a 128-bit dynamic key called
Temporary Key Integrity Protocol (TKIP) that’s hard to break and makes it unique. One
noticeable disadvantage of WPA was that since it was made for WEP-enabled devices, so
the core components were majorly the same for WPA and WEP.
3. WPA 2 Protocol : Wi-Fi Protected Access 2 Protocol abbreviated as WPA2 came next
and was better than the previous encryption types. Here, Temporary Key Integrity
Protocol (TKIP) was replaced by Counter Mode Cipher Block Chaining Message (CCMP).
It is one of the most used security encryption types. In 2006, WPA2 was declared to be
used in all wi-fi devices for wireless security encryption. WPA2 offers Advanced
Encryption Standards (AES). However, the major disadvantage of WPA2 is that if the
security key reached the hands of the hacker then the entire network is vulnerable to
attack.
4. WPA3 Protocol: WPA3 or Wi-Fi Protected Access 3 (WPA3) Protocol is the newest
security encryption that’s gaining popularity. WPA3 offers high protection and prevents
unauthorized access. Unauthenticated and unauthorized individuals can’t breach this
level of security. WPA3 is the most desired for public networks as it performs automatic
encryption.