Cyber Security Notes Unit III
Cyber Security Notes Unit III
Cyber Security Notes Unit III
Malware
Viruses
Viruses, like their biological namesakes, attach themselves to clean files and infect
other clean files. Viruses can spread uncontrollably, causing damage to the core
functionality as well as deleting and corrupting files. Viruses usually appear as
executable files downloaded from the internet.
Trojan
Worms
Worms use the network’s interface to infect a whole network of devices, either
locally or via the internet. Worms infect more machines with each successive
infected machine.
Phishing
In recent years, phishing emails have become much more complex, making it
impossible for some users to distinguish between a real request for information
and a fraudulent one. Phishing emails are sometimes lumped in with spam, but
they are far more dangerous than a simple advertisement.
Q2.Discuss different criminal threats to IT
infrastructure. What can be preventive measures for these
threats?
Criminal Threats to IT infrastructure
(a) False Data input -The falsification of the data
input is a major threat to IT infrastructure .This
threat may arise from:
(b) Unreasonable or inconsistent data ,or
(c) Changes in the keyed in data ,or
(d) Misinterpretation of input type (e.g payment
recorded as receipt),or
(e) Unauthorised addition,deletion or modification of
data elements or whole records,or
(f) Improper use of error correction procedures.
Such threats endanger the integrity and safety of
data and normally cause direct financial loss to the
enterprise.
(b) Misuse of IT infrastructure
1. Financial Gain
The primary motivation of a hacker is money, and getting it can be done with
a variety of methods.
This also ties into the fact that cyber criminals are competitive by nature, and
they love the challenge their actions bring. In fact, they often drive one
another to complete more complicated hacks.
3. Insider Threats
Individuals who have access to critical information or systems can easily
choose to misuse that access—to the detriment of their organization.
These threats can come from internal employees, vendors, a contractor or a
partner—and are viewed as some of the greatest cyber security threats to
organizations.
However, not all insider threats are intentional, according to an Insider Threat
Report from Crowd Research Partners. Most (51%) are due to carelessness,
negligence, or compromised credentials, but the potential impact is still
present even in an unintentional scenario.
These groups can steal information and argue that they are practicing free
speech, but more often than not, these groups will employ a DDoS
(Distributed Denial of Service) attack to overload a website with too much
traffic and cause it to crash.
5. State Actors
State-sponsored actors receive funding and assistance from a nation-state.
They are specifically engaged in cyber crime to further their nation’s own
interests. Typically, they steal information, including “intellectual property,
personally identifying information, and money to fund or further espionage
and exploitation causes.”
6. Corporate Espionage
This is a form of cyber attack used to gain an advantage over a competing
organization.
Types of Hacking :
Hacking is something from which you’ve to protect yourself and solely can be
done by anticipating how a hacker might think to get into the system.
1. Phishing –
In this type of hacking, hackers intention is to steal critical information
of users like account passwords, MasterCard detail, etc. For example,
hackers can replicate an original website for users interaction and can
steal critical information from the duplicate website the hacker has
created.
2. Virus –
These are triggered by the hacker into the filters of the website once
they enter into it . The purpose is to corrupt the information or
resources on the net website.
3.
UI redress –
In this technique, the hacker creates a pretend interface and once the
user clicks with the intent of progressing to a particular website, they
are directed to a special website.
4.
Cookie theft –
Hackers access the net website exploitation malicious codes and steal
cookies that contain tips, login passwords, etc. Get access to your
account then will do any factor besides your account.
5. Distributed Denial-of-service(DDoS) –
This hacking technique is aimed toward taking down a website so that a
user cannot access it or deliver their service. Gets the server down and
stops it from responding, which may cause a condition error constantly.
6. DNS spoofing –
This essentially uses the cache knowledge of an internet website or
domain that the user might have forgotten keeping up to date. It then
directs the data to a distinct malicious website.
7.
Social Engineering –
Social engineering is an attempt to manipulate you to share personal info,
sometimes by impersonating a trustworthy supply.
9. Malware-Injection Devices –
Cyber-criminals will use hardware to sneak malware onto your pc. You
would have detected infected USB sticks which can allow hackers remote
access to your device when it is connected to your pc.
10. Cracking Password –
Hackers will get your credentials through a technique known as key-
logging.
Techniques of Hacking :
1. Bait and Switch
Using Bait and Switch the hackers buy advertisement space on any website
and then create an eye-catching advertisement on the website’s page.
Whenever a user comes to visit that website, most of the time user gets
convinced to click on that advertisement due to its presentation to the user and
the time user clicks on that advertisement he gets redirected to a malicious
web page. This way hackers can install malicious code on the victim’s system
and can steal user information.
The attacker uses a virus, Trojan, and other malicious code and installs them
on the victim’s computer to get unprivileged access. Virus and other Trojans
keep sending data to the hacker regularly and can also perform various tasks
on the victim’s system like sniffing your data and diverting traffic etc.
3. Cookie Theft
We use Browser to search for different websites and those websites store
cookies in your browser. This includes our search history, some account
passwords, and other useful information, When attacker gets on your
browser’s cookie session then he can authenticate himself as you on a browser
and then can conduct attacks. It’s always a best practice to periodically clear
the search history and cache of your browser to ensure protection from such
kinds of attacks.
4. Denial of Service
This hacking technique involves flooding the network with a huge amount of
data packets to bring the system down. In this manner, users are unable to use
the service due to the real-time crash of the system. Hacker uses too many
requests to lower down the system so that the system cannot respond to the
actual or original request from genuine users. Another attack called DDoS
(Distributed Denial of Service) is also used to fulfill the same purpose by using
zombies or computers to flood the intended system, The number of data
packets or requests used to fulfill the requirements of the attack increases if it
fails every time. You should always use good anti-malware software and other
security measures to make sure they are safe from these attacks.
5. Keylogger
A keylogger is simply software that is used to record key sequences and store the
strokes of keys pressed on your keyboard to a file on your computer. These log files
can contain some useful and sensitive data of the user that may be account
information and different passwords. Check your computer regularly for this type of
theft by using security tools and make sure to use a virtual keyboard while doing
transactions if you have any suspects during login. It’s always a good practice to
install good antivirus software that checks your system periodically for any virus
and other suspects on your computer. Also, make sure your windows firewall is
turned on for additional security of your system and do not respond to fraud e-mails
and offers. Try installing software from a trusted and secured software provider and
avoid doing transactions and exchange of other sensitive data using public Wi-Fi
networks.
The issues of jurisdiction in cyberspace arise from the challenges associated with regulating
and enforcing laws in a space that transcends geographical, physical, and political borders.
Some of the major issues are as follows:-
• Data Jurisdiction: With the increasing storage and processing of data online,
disagreeing governments may want to regulate access to such data in a mutually
beneficial way. It often leads to debates on where data is stored, where it is being
processed, and, based on that, to whom it is subject.
• Security Jurisdiction: Cybersecurity is a significant issue with online data, especially as
almost all digital activities are susceptible to hacking and phishing. It raises privacy and
security concerns since the nature of cyberspace transcends geographical jurisdiction.
• Regulatory Jurisdiction: Regulatory jurisdiction is the authority to impose legal
regulations on activities, transactions, or entities. Since territorial boundaries do not
define online spaces, it becomes hard to establish and enforce regulatory jurisdiction
over cyberspace-based activities.
• Law Enforcement Jurisdiction: Law enforcement jurisdiction refers to the power of
the police or judicial authorities to enforce laws, arrest offenders, or initiate legal
proceedings. Due to cyberspace’s complexity and trans-border nature, it is difficult for
law enforcement authorities to enforce laws effectively.
• Physical Jurisdiction: Physical jurisdiction refers to the ability of a state to exert
control over physical spaces. As cyberspace is outside the physical realm, governments
often face problems in identifying the source of a cyber attack or tracing the physical
location of a criminal.
2. Antivirus Software
Antivirus software is a program which is designed to prevent, detect, and remove viruses
and other malware attacks on the individual computer, networks, and IT systems. It also
protects our computers and networks from the variety of threats and viruses such as
Trojan horses, worms, keyloggers, browser hijackers, rootkits, spyware, botnets, adware,
and ransomware. Most antivirus program comes with an auto-update feature and
enabling the system to check for new viruses and threats regularly. It provides some
additional services such as scanning emails to ensure that they are free from malicious
attachments and web links
3. PKI Services
PKI stands for Public Key Infrastructure. This tool supports the distribution and
identification of public encryption keys. It enables users and computer systems to securely
exchange data over the internet and verify the identity of the other party. We can also
exchange sensitive information without PKI, but in that case, there would be no assurance
of the authentication of the other party.
People associate PKI with SSL or TLS. It is the technology which encrypts the server
communication and is responsible for HTTPS and padlock that we can see in our browser
address bar. PKI solve many numbers of cybersecurity problems and deserves a place in
the organization security suite.
5. Penetration Testing
Penetration testing, or pen-test, is an important way to evaluate our business's security
systems and security of an IT infrastructure by safely trying to exploit vulnerabilities. These
vulnerabilities exist in operating systems, services and application, improper
configurations or risky end-user behavior. In Penetration testing, cybersecurity
professionals will use the same techniques and processes utilized by criminal hackers to
check for potential threats and areas of weakness.
6. Staff Training
Staff training is not a 'cybersecurity tool' but ultimately, having knowledgeable employees
who understand the cybersecurity which is one of the strongest forms of defence against
cyber-attacks. Today's many training tools available that can educate company's staff
about the best cybersecurity practices. Every business can organize these training tools to
educate their employee who can understand their role in cybersecurity.
During the inspection, it is critical to create a digital or soft copy of the system’s
special storage cell. The purpose of carrying out a detailed cyber forensics
investigation is to determine who is to blame for a security breach. The entire
inquiry is carried out on the software copy while ensuring that the system is not
affected.
This method entails producing a copy of the system’s data to avoid harm from
being done to the actual system, which might lead to file confusion with the files
already present on the computer. Cloning a hard disc entails replicating the hard
drive’s files and folders. The duplicate is present on another disc by copying every
small piece of data for analysis.
After copying the files, experts verify that the copied data is consistent and exactly
as it exists in the real system.
It is possible to change the format of the data while duplicating it from a device,
resulting in discrepancies in the operating systems of the investigators and the one
from which the data was copied. To avoid this, detectives ensure that the structure
stays constant and that the data is forensically acceptable and is written on the
hard disk drive in a format that is adequately used in the computer.
Criminals think of innovative ways of deleting the scene and often remove some
data that could indicate their misconduct; it is the work of the investigators to
recover and reconstruct deleted files with state-of-the-art software.
Forensics specialists can recover files erased by the user from a computer; the files
are not permanently wiped from the computer, and forensics specialists can
recover them.
The OS perceives vacant space in the hard disc as room for storing new files and
directories; however, temporary files and documents that were erased years ago
will be stored there until new data is entered. Forensics specialists look for these
files using this free space.
Forensics specialists utilize tools that can access and produce pertinent information
throughout all data for phrases.
The last phase will be to produce a technical report that is relevant and easily
understood regardless of the background of the individual. The result of this report
is to state clearly the crime, possible culprits, and innocent individuals.
Digital Forensics is a branch of forensic science that deals with digital evidences in
solving a crime under the regulations of law. With the wide availability and use of
various digital media and devices, and social media there are various branches of
digital forensics such as mobile forensics, network forensics, database forensics,
email forensics, etc. With increasing digital crime in each branch, digital forensics has
wide applicability.
o Crime Detection- There are various malwares and malicious activities that
happen over digital media and networks, such as phishing, spoofing,
ransomware, etc.
o Crime Prevention- There are various cyber crimes that happen due to lack of
security or existing unknown vulnerabilities, such as zero-day vulnerability.
Hence, cyber forensics helps in finding out these vulnerabilities and avoiding
such crimes to occur.
o Crime Analysis- This is the main application of digital forensics. It involves- [2]
o Preservation- This process involves protecting the crime scene and the digital
evidence or setup from further manipulation and photographing and video
graphing the crime scene, for future reference. Also this process involves
stopping any ongoing command that may be linked to the crime.
o Identification- This process involves identifying the digital media and devices
that can serve as the potential evidence.
o Extraction- This process involves the imaging of the digital evidence, (to
maintain the authenticity of the original evidence), for further analysis.
o Documentation- This involves maintaining the chain of custody and
documenting all the evidence collected from the crime scene.