Mid 1
Mid 1
Mid 1
2. Theft of Identity:
3. Ransomware Infection:
Ransomware attacks are a sort of cybercrime against individuals that
is fairly widespread. It is a sort of virus that may restrict users from
accessing all of their personal data on the device by encrypting it and
then demanding a ransom to get access.
4. Malware Attacks:
These are cyber crimes against individuals who use cell phones with
internet access and are sometimes tracked for their location, online
searches, usernames, and passwords input on their devices,
webcams, and so on.
5. Cyberstalking:
7. Web Jacking:
Digital marketing has become the new normal, enticing firms to create
their own websites. More website traffic suggests that more people
are aware of their products/services/brands.
Email security protocols use domain authentication to reduce threats and spam. The
email security protocols in use today are Sender Policy Framework (SPF),
DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication,
Reporting, and Conformance (DMARC).
SPF detects forged sender addresses during the delivery phase, but it can only
detect them in the envelope of the email, which is used when an email is bounced.
However, when used in conjunction with DMARC authentication, SPF can detect a
forged “visible sender,” which is a technique that is commonly used in phishing and
spam.
Encrypt emails
DKIM uses public and private keys to prove that a sender is who they say they are.
Each message that goes out through SMTP needs a pair of keys that match a public
DNS record, which is verified by the receiving mail server.
Antimalware may detect and block spoofed emails before they reach their targets’
inboxes. It’s important to keep antimalware software up to date because attackers
are alert to newly-identified vulnerabilities and act quickly to exploit them.
Types of Spam
Spam can range from annoying emails to different types of internet spam, like social
media comments full of excessive links or even sensationalist headlines in media
outlets and on other websites that you can’t seem to not see.
Here are the main types of spam you can find online:
Spam emails
Spam emails are the most common type of spam you’re likely to encounter online.
They clog up your inbox and distract you from the emails you actually want to read.
Thankfully, most email clients allow you to report, filter, and block most spam emails.
SEO spam
Also known as “spamdexing,” SEO spam refers to the manipulation of search engine
optimization (SEO) methods to improve the rankings of a spammer’s website in
search engines. We can divide SEO spam into two broad categories:
Content spam
Some spammers cram their pages full of popular keywords to try and rank the pages
of their website higher when people make searches with those keywords. Others will
use existing content without permission to make their own pages seem more
substantial and unique.
Link spam
If you’ve come across a blog comment or forum post that’s filled with irrelevant links,
you’ve encountered link spam. The spammer is trying to exploit an SEO mechanic
known as “backlinking” to drive traffic to their page.
Social media spam
With the rise of social media, spammers have been quick to take advantage of all the
attention on those platforms, spreading their spam via bots and other sketchy
accounts. Most social media spam contains links to commercial pages, which aim to
increase traffic or revenue for a spammer’s website.
Spam text messages and spam calls
Some spammers send text messages (SMS), push notifications, or even call your cell
phone to get your attention. Spam messages can also take the form of instant
messages via popular messaging apps like WhatsApp, Skype, and Snapchat. It's best
to block spam texts and calls from suspected spammers, not answer weird texts, and
never click links on any spam messages.
Tech support scams
Tech support scams usually begin with a phone call from someone pretending to be an
IT professional from a legitimate company. The scammer will try to convince you
there’s something wrong with your computer and that if you give them remote access
they can fix it. Tech support scams can also start with malicious advertisements on
infected sites.
Current events scams
The deluge of sensationalist news published daily gives spammers the opportunity to
exploit headlines to capitalize on tragedies or political events. You might receive a
spam message or spam email asking you to contribute to a fundraising campaign that
isn’t legitimate.
Malware spam (malspam)
Malware spam is exactly what it sounds like: spam that includes malware. It’s usually
delivered to your computer or mobile device via a spam text message or spam email.
This type of spam can deliver almost any type of malware,
from ransomware to trojans to spyware.
6. What are Salami Attack / Salami Technique?
A salami attack is a method of cybercrime that attackers or a hacker typically
used to commit financial crimes. Cybercriminals steal money or resources
from financial accounts on a system one at a time. Those who are found
guilty of such an attack face punishment under Section 66 of the IT Act.
Working of Salami attack:
During this kind of attack, an awfully insignificant change is introduced that goes
completely unnoticed. as an example, a bank accountant inserts a program, into the
bank’s servers, that deducts a satiny low amount of cash from the account of each
customer. No account holder will probably notice this Unauthorized debit, but the
bank accountant will make an outsized amount of cash each month. as an example,
an employee of a bank in the USA was terminated from his job. Disgruntled at
having been supposedly mistreated by his employers the person first introduced a
logic bomb into the bank’s systems.
Working of Usenet
The Usenet is built on the Network News Transfer Protocol (NNTP), a standard Internet
protocol in Request for Comments (RFC) 977 and has two components:
A client/server portion that allows users running client software such as
Google Chrome to interact with the news servers by downloading a list of
available. Usenet newsgroups on the server, read existing messages in the
newsgroups, reply to existing messages, or post new messages.
A server/server portion that allows news servers to establish communication
with each other, for the purpose of replicating messages from newsgroups.
For example, Microsoft Exchange Server fully supports NNTP.
Newsgroup
Each topic collection of posted notes is known as a Newsgroup. There are thousands of
newsgroups and it is also possible to form a new one. Many newsgroups are hosted on
Internet-connected servers but they can also be hosted from servers without the Internet.
Advantages of Newsgroups
Newsgroups are similar in some ways to mailing lists, but they tend to have a
structure better than mailing lists, which makes it more likely that they will
be around for much longer than a mailing list.
It is easy to find a newsgroup, and they sometimes have a moderator. A
moderator is one who makes sure that things stay on track and do not
disintegrate into something that is unpleasant socially.
Most often than not, you will be able to find the FAQs (Frequently Asked
Questions) section on a newsgroup, which is always helpful for those who are
not sure about anything. These questions tend to be the ones that are asked
repeatedly and so negate the need for constantly answering the same
questions.
Disadvantages of Newsgroups
A newsgroup is not as fast as an email or even a mailing list. Often there
might be a latency of at least a day, often longer, before a response is given.
The information on the newsgroup is submitted by users who lack actual
knowledge about the domain on which they are posting the article, so you
need to be aware of this flaw, keep some alternatives ready for this and do a
bit of research first then only rely on it.
A serious disadvantage to a newsgroup is that they can sometimes attract
people who you would not give the time of day to if you were to meet them in
person. This is especially worrying if children have access to newsgroups.
1. Open or accepted
2. Closed or not listening
3. Filtered or blocked.
Prevention:
The preventive ways for Port Scan attack are listed as follows :
Secured Firewalls
Strong Security Mechanisms
information or valuable data. In cybercrime, the human hacking scams entice unsuspecting
users to disclose data, spread malware infections, or give them access to restricted systems.
Attacks can occur online, in-person, and by other interactions. Social engineering scams are
Impersonation
In this type of social-engineering attack, the hacker pretends to be an employee
or valid user on the system. A hacker can gain physical access by pretending to
be a janitor, employee, or contractor.
Posing as an important user
In this type of attack, the hacker pretends to be a VIP or high-level manager
who has the authority to use computer systems or files.
Desktop support
Calling tech support for assistance is a classic social-engineering technique.
Help desk and technical support personnel are trained to help users, which
makes them good prey for social engineering attacks.
Shoulder surfing—
o Shoulder surfing is the technique of gathering passwords by watching over a
person’s shoulder while they log in to the system.
Dumpster diving
Dumpster diving involves looking in the trash for information written on pieces
of paper or computer printouts.
The hacker can often find passwords, filenames, or other pieces of confidential
information like SSN, PAN, Credit card ID numbers etc
2. Computer –Based Social Engineering
Computer-based social engineering uses computer software that attempts to
retrieve the desired information.
Fake E-mails
E-mail attachments
Pop-up windows
Fake E-mails
A message might come from a bank or other well-known institution with the
need to “verify” your login information.
E-Mail attachments
Emails sent by scammers may have attachments that include malicious code inside the
attachment. Those attachments can include keyloggers to capture users’ passwords,
viruses, Trojans, or worms.
Pop-up windows
Advantages of SaaS
1. Cost-Effective: Pay only for what you use.
2. Reduced time: Users can run most SaaS apps directly from their web
browser without needing to download and install any software. This
reduces the time spent in installation and configuration and can reduce the
issues that can get in the way of the software deployment.
3. Accessibility: We can Access app data from anywhere.
4. Automatic updates: Rather than purchasing new software, customers rely
on a
5. Scalability: It allows the users to access the services and features on-demand.
Platform as a Service
Advantages of PaaS:
1. Simple and convenient for users: It provides much of the infrastructure
and other IT services, which users can access anywhere via a web browser.
2. Cost-Effective: It charges for the services provided on a per-use basis thus
eliminating the expenses one may have for on-premises hardware and
software.
3. Efficiency: It allows for higher-level programming with reduced
complexity thus, the overall development of the application can be more
effective.
Infrastructure –as –a-service(IaaS):
It totally depends upon the customer to choose its resources wisely and as per
need. Also, it provides billing management too.
It is like Amazon Web Services that provide virtual servers with unique IP addresses and blocks of
storage on demand.
Examples :
AWS
Microsoft Azure
Advantages of IaaS:
1. Cost-Effective: Eliminates capital expense and reduces ongoing cost and
IaaS customers pay on a per-user basis, typically by the hour, week, or
month.
2. Website hosting: Running websites using IaaS can be less expensive than
traditional web hosting.
3. Security: The IaaS Cloud Provider may provide better security than your
existing software.
4. Maintenance: There is no need to manage the underlying data center or
the introduction of new releases of the development or underlying
software. This is all handled by the IaaS Cloud Provider.