Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Unit 1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 25

UNIT-1

Cyber laws and rights in today's digital age: IT Act, Intellectual Property Issues connected with
use and management of Digital Data The similar Acts of other countries.

Information Warfare: Nature of information warfare, including computer crime and


information terrorism; Threats to information resources, including military and economic
espionage, communications eavesdropping, computer break-ins, denial-of-service, destruction
and modification of data, distortion and fabrication of information, forgery, control and
disruption of information How, electronic bombs, and sops and perception management.

The Indian IT Act


• This act was published in year 2000 for the purpose of providing legal recognition for
transactions carried out by means of electronic data interchange and other means of electronic
communication ,commonly referred to as electronic commerce.

• Another purpose of the Indian IT act was to amend the Indian Penal Code(IPC), the Indian
Evidence Act 1872, the Banker’s Book Evidence Act 1891 and The Reserve Bank of India Act 1934.

• The Indian IT Act underwent some important changes to accommodate the current cybercrime
scenario.

The Information Technology (IT) Act is a crucial legislation that governs various aspects of digital
activities, electronic commerce, cybersecurity, and data protection. Here are the key components and
provisions of the IT Act:

1. Electronic Governance

The IT Act facilitates electronic governance by recognizing electronic records and digital signatures as
legally valid, thus enabling electronic transactions and communication.

2. Cybercrimes and Offenses

The Act defines various cybercrimes and prescribes penalties for offenses such as unauthorized access to
computer systems, hacking, data theft, and spreading malicious software.

3. Data Protection and Privacy

It lays down rules for the protection and privacy of electronic data and personal information. The Act
establishes regulations for the collection, processing, storage, and transmission of data to ensure
confidentiality and integrity.
4. Digital Signatures and Certificates

The Act provides a legal framework for the use of digital signatures and digital certificates, ensuring their
validity and authenticity in electronic transactions.

5. Intermediaries' Liability

It outlines the responsibilities and liabilities of intermediaries such as internet service providers (ISPs),
web hosting companies, and social media platforms regarding user-generated content and data
transmission.

6. Cybersecurity Measures

The Act mandates the establishment of Computer Emergency Response Teams (CERTs) to respond to
cybersecurity incidents and promote cybersecurity awareness and best practices.

7. Adjudication and Appellate Mechanisms

The Act establishes adjudicating officers and appellate tribunals to handle disputes, grievances, and legal
proceedings related to electronic transactions, cybercrimes, and data breaches.

8. Digital Copyright and Intellectual Property

It addresses issues related to digital copyright infringement, anti-circumvention measures, and


intellectual property rights protection in digital environments.

Conclusion

The Information Technology Act plays a crucial role in regulating digital activities, ensuring cyber
security, protecting data privacy, and promoting electronic governance and commerce. Compliance with
the provisions of the Act is essential for businesses, organizations, and individuals engaged in digital
transactions and online activities to mitigate legal risks and uphold digital trust and security.

The Indian ITA 2000


Sections 65,66,67,71,72,73 and 74 in Chapter XI of the Indian ITA2000 that are relevant to
cyber crime in legal context

• Section65:Tampering with computer source documents

• Section66:Computer related offences

• Section67:Punishment for publishing or transmitting obscene material in electronic form

• Section71:Penalty for misrepresentation

• Section72:Penalty for breach of confidentiality and privacy

• Section73:Penalty for publishing Digital signature certificate false in certain particulars


• Section74:Publication Digital signature certificate for fraud purposes.

• Please refer the following link to understand the above sections and penallities from chapter
XI of the indian ITA 2000

• Reference:

https://kanoongpt.in/bare-acts/the-information-technology-act-2000
Intellectual property rights (IPR)
Intellectual property rights (IPR) refer to legal rights that protect creations of the mind, such as
inventions, literary and artistic works, designs, symbols, names, and images used in commerce. These
rights give creators and innovators exclusive rights to use their creations for a certain period of time,
allowing them to benefit financially and have control over how their creations are used by others.

There are several types of intellectual property rights, including:

Patents: Patents protect inventions and new processes, granting the inventor exclusive rights to make,
use, and sell their invention for a limited period (usually 20 years) in exchange for public disclosure of
the invention.

Copyrights: Copyrights protect original literary, artistic, and creative works such as books, music,
paintings, and software. Copyright gives the creator exclusive rights to reproduce, distribute, perform,
and display their work for a limited time (often the life of the author plus 70 years).

Trademarks: Trademarks protect symbols, names, slogans, and logos used to identify and distinguish
goods and services in the marketplace. Trademark rights prevent others from using similar marks that
may cause confusion among consumers.

Trade Secrets: Trade secrets are confidential information, such as formulas, processes, customer lists,
and strategies, that provide a competitive advantage to businesses. Unlike patents, trade secrets are not
publicly disclosed and can be protected indefinitely as long as they remain confidential.

Industrial Designs: Industrial designs protect the visual appearance of a product or its ornamental
features. They ensure that the unique design elements of a product are not copied or imitated by
others.

Enforcing intellectual property rights is crucial for encouraging innovation, creativity, and economic
growth. However, navigating the complexities of intellectual property law and protecting rights across
different jurisdictions can be challenging, so individuals and businesses often seek legal counsel and
utilize tools such as patents, trademarks, copyrights, and non-disclosure agreements to safeguard their
intellectual property assets.
intellectual property (IP) issues
The use and management of digital data present various intellectual property (IP) issues due to the ease
of copying, distributing, and modifying digital content. Here are some key intellectual property issues
that arise in the context of digital data use and management:

Copyright Infringement: Copyright protects original works of authorship such as text, images, music,
videos, and software. In the digital realm, copyright infringement occurs when someone copies,
distributes, or uses copyrighted material without permission from the copyright owner. Issues like
unauthorized file sharing, downloading pirated content, or using copyrighted material without a license
are common challenges in digital data management.

Digital Piracy: Digital piracy involves the unauthorized reproduction and distribution of copyrighted
digital content, such as movies, music albums, e-books, and software. It leads to significant revenue loss
for content creators and rights holders. Technologies like peer-to-peer (P2P) file sharing, torrenting, and
streaming platforms have facilitated widespread piracy, posing significant challenges for content
creators and IP enforcement agencies.

Digital Rights Management (DRM): DRM technologies are used to protect digital content from
unauthorized access, copying, and distribution. They employ encryption, access controls, and licensing
mechanisms to enforce usage rights and prevent piracy. However, DRM systems can be complex, and
balancing user rights with content protection remains a challenge.

Data Privacy and Confidentiality: While not strictly an IP issue, data privacy and confidentiality are
crucial concerns in digital data management. Organizations must comply with data protection laws and
regulations (e.g., GDPR, CCPA) when collecting, storing, and processing personal data. Unauthorized
access, data breaches, and mishandling of sensitive information can lead to legal liabilities and
reputational damage.

Open Source Licensing: Open source software (OSS) is subject to various licensing models (e.g., GPL,
MIT, Apache) that dictate how the software can be used, modified, and distributed. Organizations using
OSS must comply with the terms of the relevant licenses to avoid legal disputes and ensure proper
attribution of intellectual property.

Digital Transformation Challenges: As businesses undergo digital transformation, they often encounter
challenges related to IP ownership, licensing agreements, data interoperability, and protection of
proprietary algorithms or data-driven innovations. Clear IP policies, contracts, and strategies are
essential to navigate these complexities.

Cybersecurity and IP Protection: Cybersecurity threats such as hacking, data breaches, ransomware
attacks, and insider threats can compromise intellectual property stored in digital systems. Robust
cybersecurity measures, data encryption, access controls, and employee training are crucial for
safeguarding sensitive IP assets.

Addressing these intellectual property issues requires a combination of legal frameworks, technological
solutions, policy interventions, and awareness among stakeholders. Collaboration between IP experts,
legal professionals, technology specialists, and business leaders is essential to develop effective
strategies for managing digital data while protecting intellectual property rights

Similar Acts in Other Countries

Acts of other countries


Cyber crime and legal landscape around the world
• Crime-A legal concept and has sanction of law.

• “Crime or an offense is a legal wrong that can be followed by criminal proceedings which may
result into punishment”

• We start with legislative analysis in Asia –pacific region (with regard to Online safety, data
privacy and online child safety) followed by

Spam laws ,Online protection for Children

Anti-Spam laws in CANADA

Federal Laws in the US about cybercrime.

EU legal framework to prevent cybercrime.

Cybercrime legislation in African countries

“Please refer the PPT for Acts across the world”

Information warfare
Information warfare encompasses a broad range of activities aimed at manipulating, disrupting, or
influencing information and communication systems for strategic or political purposes. This includes
computer crime and information terrorism, which are forms of information warfare that exploit digital
technologies for malicious ends.

Cyber warfare and information warfare are closely related and often used interchangeably, they are not
exactly the same. Here's how they differ:
1. Cyber Warfare: Cyber warfare specifically refers to the use of digital technologies, particularly
computer systems and networks, to conduct warfare. This includes offensive operations such as
cyber attacks targeting the computer systems and infrastructure of adversaries, as well as
defensive operations to protect one's own systems. Cyber warfare often involves actions aimed
at disrupting, damaging, or destroying the adversary's capabilities, infrastructure, or information
assets. It can also encompass espionage, sabotage, and other activities conducted in the digital
domain to achieve strategic objectives.

2. Information Warfare: Information warfare, on the other hand, is a broader concept that
encompasses any action taken to gain an advantage through the management or manipulation
of information. While cyber warfare is one aspect of information warfare, information warfare
also includes non-digital tactics such as propaganda, psychological operations, deception, and
influence campaigns conducted through traditional media, social networks, or interpersonal
communication. Information warfare aims to shape perceptions, beliefs, or behaviors in a way
that benefits the initiator.

In summary, cyber warfare is a subset of information warfare, focusing specifically on the use of digital
technologies to conduct warfare, while information warfare encompasses a wider range of tactics and
strategies aimed at influencing information and perceptions to achieve strategic objectives.

Cyber Warfare

Cyber warfare is comparatively a new type of weaponry having various effects on the target.

It can be defined as the actions taken by a state in order to penetrate into another state’s networks or
computers for the purpose of causing disruption or damage.

Cyber warfare revolves around information and communications.

Cyber attacks are less expensive and easy to conduct

Also , the sectors such as energy,power and financial their growing reliance and dependency on cyber
infrastructure particularly on electronics and telecommunications new security threats have been
opened up.

The director and chief economist of U.S. Cyber consequences Unit argues that The dangers of cyber
attacks have the potential to cause hundreds of billions of dollars worth damage and to cause thousands
of deaths.

Besides causing damage cyber warfare is often supposed to be one sided battle where attacker makes all
the strikes and the target of the attack respond so slowly that it becomes difficult to identify the
attacker.

On the other hand, the networks act as a medium of storage of the sensitive information which has
given birth to cyber economic warfare against businesses and cyber espionage against governments.
In contemporary times, the cyber warfare has moved beyond the military dimension and entered into
economic, political, criminal, security and civilian dimensions.

Military espionage and economic espionage are both forms of espionage, but they have distinct focuses
and objectives:

1. Military Espionage:

 Objective: Military espionage involves gathering intelligence related to military


capabilities, strategies, plans, and operations of foreign nations or entities. This
information may include details about weapons systems, troop movements, defense
infrastructure, military technologies, and other sensitive military-related data.

 Methods: Military espionage can involve various methods such as human intelligence
(spies or operatives), signals intelligence (intercepting communications), cyber
espionage (hacking into military networks), and satellite reconnaissance (monitoring
activities from space).

 Purpose: The primary purpose of military espionage is to gain a strategic advantage in


military conflicts, deterrence, or defense planning. By obtaining information about the
military capabilities and intentions of adversaries, a nation can better prepare its own
military forces, anticipate potential threats, and develop effective counter-strategies.

2. Economic Espionage:

 Objective: Economic espionage involves stealing trade secrets, proprietary information,


intellectual property, and other valuable economic or business-related data from
foreign companies, governments, or research institutions.

 Methods: Economic espionage can be conducted through various means such as cyber
espionage (hacking into corporate networks), insider threats (recruiting employees with
access to sensitive information), bribery, surveillance, and covert operations.

 Purpose: The primary purpose of economic espionage is to gain a competitive


advantage in the global marketplace by obtaining valuable information about
competitors' products, technologies, business strategies, and market trends. Economic
espionage can also be used to undermine the economic interests of rival nations or to
support domestic industries by acquiring foreign expertise or technology.

While both military espionage and economic espionage involve clandestine activities aimed at gathering
sensitive information, they serve different strategic objectives and target different types of data. Military
espionage focuses on military-related information to enhance national security and defense capabilities,
while economic espionage targets economic and commercial information to gain a competitive edge in
the global economy.
In this warfare actors can operate behind false IP addresses and through foreign servers.Therefore
attacker can act with almost complete secrecy and relative liberty.

Cyber warfare is considered as “fifth battlefield” after land, water, air and space. Also the ways and
means of cyber warfare remain very distinctive from other modes of conflict.

Cyber warfare has become a more powerful instrument in today’s battlefield and had large impact on
the development of armies as well as weapon technologies in many countries.

1. In middle 2007 ,the Israeli cyber warriors hacked the Syrian anti-aircraft installations and
reprogrammed their computers. The installation system of Syrian’s computers displayed an empty sky.By
doing so, the Syrian’s allowed Israeli planes to bomb over a suspected nuclear weapons manufacturing
industry being built by North Korea .

2. The first among known cyber attacks was launched by Russia in 2008 under DDos against “Paperless
Government” of Estonia. After this attack, DDos emerged as a common platform of attack for countries
such as United states, China, Russia, North Korea, Israel and Pakistan.

3. In the same year Russia launched another important cyber campaign against Georgia.It made several
attacks against Georgia’s Cyber infrastructure inorder to overload and ultimately shutdown its critical
servers.The impact was so huge that no outbound traffic in Georgia could get through.Hackers seized all
routers supporting traffic to Georgia.As a result Georgians could not connect any information sources or
outside news and even could not send an email out of state.

Computer Crime
Definition: Computer crime refers to illegal activities that involve the use of computers, networks, or
digital technologies. It encompasses a wide range of offenses, including hacking, malware distribution,
identity theft, fraud, and denial-of-service attacks.

Motivations: Perpetrators of computer crime may include hackers, cybercriminal groups, insiders, and
state-sponsored actors. Motivations can vary, including financial gain, espionage, political activism, or
sabotage.

Methods: Computer criminals employ various techniques to exploit vulnerabilities in computer systems
and networks. This may involve unauthorized access, exploitation of software vulnerabilities, social
engineering tactics, or phishing scams.

Impact: Computer crime can have significant consequences, including financial losses, data breaches,
disruption of services, reputational damage, and compromise of sensitive information.
In the context of information warfare, computer crime can be used as a means to disrupt or
undermine the operations of an adversary, steal sensitive information, or cause economic
harm. Cybercriminals may operate independently or be employed by state or non-state actors
to carry out malicious activities in support of broader strategic goals.

Cyber crime refers to any illegal activity by using computers as primary mode of commission. During
early years the most effective cyber criminal operations were carried through DDos attacks which were
followed by general efforts at identity theft.

Cyber criminals use computer technology to access business trade secrets, personal information or using
the internet for malicious or exploitive purposes.

Its been estimated that in 2012,

54 million people in Turkey,40 million inU.S, 20 million in Korea, 20 million in China, more than 16
million in Germany have been affected by cyber crimes.

According to report prepared by Norton on cyber crimes it is estimated that highest number of
cybercrime victims is found in Russia 92.%,followed by China 84% and South Korea 80%.

Figure shows the total costs of cybercrime as recorded in seven countries during 2013-2015.
The cybercrime is thus one of the biggest problems affecting both the developed and developing world.

Consequences of cybercrime had bad implications on the trade, innovation, competitiveness, and global
economic growth.

In 2000, the first major instance of cybercrime took place when a mass-mailed computer virus affected
around 45 million computer users worldwide.

Cyber crime landscape changed dramatically and began to attain political motivated objectives.In the
past decade, cyber attacks have evolved in utilizing online weaponry affecting government entities.

The digital age has witnessed online communication in which internet users as well as governments
easily fall prey to cyber attacks. With the advancement in the techniques of Cyber criminals their focus
shifted from financial information to business espionage as well as accessing government information.

The governments around the world are actively focusing on preventing and fighting the cyber criminals
from damaging infrastructure. On the other hand, cybercriminals are developing new techniques and
thereby making it more challenging for governments and companies to cope up with such attacks.

Challenges that commonly confront in dealing with cybercrime

 First Investigation of criminals involved in cybercrimes is difficult as criminal activity in


itself is borderless by nature .
 Cybercrime is result of underground economy with many digital experts specializing in
carrying out cyber operations.
 There exists a severe shortage of skills and expertise to fight with such type of crime in
which it is difficult to trace its origin.
 Use of pirated software increases the vulnerability of systems to cyber attacks.

Therefore, in order to combat with these emerging challenges and to fight against fast-spreading
cybercrime, governments must collaborate globally to develop an effective model that will control the
threat Internet-based networking, cybercrime, and digital attack incidents.

Information Terrorism and Cyber terrorism


Information terrorism and cyber terrorism are both forms of terrorism that leverage information
technology to achieve their objectives, but they have distinct characteristics:

1. Information Terrorism:

 Definition: Information terrorism involves the use of information, communication


technologies, and media platforms to spread fear, panic, or chaos for ideological,
political, or social purposes.
 Methods: Information terrorists disseminate propaganda, false information, threats, or
incitements to violence through various channels such as social media, websites, online
forums, or traditional media outlets.

 Objectives: The primary objective of information terrorism is to manipulate public


perceptions, undermine trust in institutions, incite social unrest, or advance extremist
ideologies. Information terrorists may seek to exploit vulnerabilities in information
systems or exploit the psychological impact of mass communication to create fear and
disrupt societal stability.

2. Cyber Terrorism:

 Definition: Cyber terrorism involves the use of cyberattacks, hacking, or other forms of
malicious activities targeting computer systems, networks, or critical infrastructure to
cause disruption, damage, or destruction for political, ideological, or ideological
purposes.

 Methods: Cyber terrorists use various techniques such as malware, ransomware,


distributed denial-of-service (DDoS) attacks, hacking, or exploiting vulnerabilities in
software and networks to launch cyberattacks against their targets.

 Objectives: The primary objective of cyber terrorism is to inflict harm, disrupt essential
services, or create chaos by targeting critical infrastructure, government agencies,
financial systems, or other key sectors. Cyber terrorists may seek to achieve political
goals, advance ideological agendas, or retaliate against perceived adversaries through
cyber means.

While both information terrorism and cyber terrorism leverage information technology as a tool for
their activities, they differ in their primary tactics, targets, and objectives. Information terrorism focuses
on manipulating information and public perception to create fear and instability, while cyber terrorism
involves using cyberattacks to cause physical or economic harm, disrupt systems, and achieve political or
ideological goals. Both pose significant challenges for governments, law enforcement agencies, and
cybersecurity professionals in terms of prevention, detection, and response.

Cyber Terrorism

Cyber terrorism is any deliberate attack against information of computer systems, programs, and data
resulting in violence against noncombatant targets by secret agents or sub-national groups.

The attacks are generally politically motivated.

Cyber attacks are designed to cause extreme financial harm or physical violence.
Areas of cyber terrorist targets include military installations, banking industry, air traffic control centers,
power plants, water systems etc. The term “cyber terrorism” is sometimes referred to as information
war or electronic terrorism.

Cyber terrorism allows terrorists to carry out their attacks from anywhere in the globe at relatively low
costs,with high level of secrecy as well as with no restriction of time or space.

It can arise from states, organizations, groups or even individuals. It includes crimes like defacing of
websites, creating worms and viruses, stealing sensitive information, and attacking infrastructures.

The cyber terrorists use information technologies and the internet as a medium in conducting their
plans in order to raise the financial funds, secure communications, and distribute their propaganda.

Terrorist groups like Hezbullah, Al-Qaeda, and Hamas used computerized files, emails, and protection
for supporting and carrying out their operations.

The cyber terrorist also uses the internet to reach out their audience without any need to use other
media like television, radio, or holding of press conferences. To highlight the injustice, they design
special web pages to recruit members and supporters. Such websites are often carrying instructions and
content of procedures of making explosives and chemical weapons. By the process, they also identify
the most common users that can have sympathy for their cause as well as becomes an effective method
for recruiting.
Experts(1997) pointed out that future cyber terrorist can attack air traffic control systems by which two
large civilian aircraft could collide. They can disrupt banks, stock exchanges and international financial
transactions. They bring economic systems grind to a halt resulting in the loss of public confidence and
ultimately the destabilization.

The act of cyber terrorists could lead to plane crashes, explosions, water contamination, economic
losses or even death.

Motives behind these acts are largely political in nature and intended to cause grave harm like loss of
life or severe economic damage.

Exploitation of ICT by Terrorists

ICT is exploited by the terrorist organizations in two ways as a tool and as a target of attack. As a tool,
communications are used in support of their operations providing for control of all their activities.
Terrorists can also operate in cyber space to destroy or manipulate information for their own purpose.
Skilled hackers with terrorist intent can access all but the most secure databanks, stealing or changing
information, or destroying it. The targets of terrorists could be ranging from financial institutions to
nuclear installations, besides the civil and military communication systems. There are numerous known
cases of exploitation of ICT by the terrorist organisations, both, globally as well as within India. These
generally pertain to the following:

 Communications, for command and control, issue of instructions/ orders/directions, etc.

 Intelligence gathering.(gathering information & planning)

 Financing support operations.

 Cyber attacks.

The future, however, is beset with many unforeseen possibilities. It will be worthwhile to study the past
patterns to predict the future eventualities so as to be able to adopt preventive measures in a pro-active
manner.

Threats to information resources


Classification of cyber crimes

Cyber crimes are classified as follows:

1. Crimes against individual


Email spoofing,Phishing,Spamming,Cyberdefamation,Cyberstalking and harassment.
2. Cyber crime against property
Credit card frauds,Intellectual property crimes,Internet time of theft.
3. Cyber crime against organization
Unauthorised accessing of computer,password sniffing,Denail-of-service attack,virus,Trojan
horse,logic bomb,mail bomb,Industrial spying/industrial espionage,computer network
intusions,software piracy.
4. Crime against society
Forgery,cyberterrorism,web jacking.

Classification by Informational Impact

• An attack on a targeted system has potential to impact sensitive information in various ways.

• A committed resource must be able defend information warfare strategies in an effort to


protect themselves against theft, disruption, distortion, denial of service, or destruction of
sensitive information assets.

• Distort - A distortion in information, usually when an attack has caused a modification of a file.
When an attack involves distort, it is a change to data within a file, or modification of
information from the victim.

• Disrupt - A disruption in services, usually from a Denial of Service. When an attack involves
disrupt, it is an access change, or removal of access to victim or to information.

• Destruct - A destruction of information, usually when an attack has caused a deletion of files or
removal of access. Destruct is the most malicious impact, as it involves the file deletion, or
removal of information from the victim.

• Disclosure - A disclosure of information, usually providing an attacker with a view of information


they would normally not have access to. It is unauthorized disclosure of information, with the
possibility of leading to other compromises.

Communications Eavesdropping:

Eavesdropping involves the interception of data as it travels across communication channels. This could
be accomplished through various means, such as tapping into network cables, wireless signals, or
compromising intermediary devices like routers or servers.

A man-in-the-middle (MitM) attack is a type of cyber attack in which the attacker secretly intercepts and
relays messages between two parties who believe they are communicating directly with each other. The
attack is a type of eavesdropping in which the attacker intercepts and then controls the entire
conversation.
MitM cyber attacks pose a serious threat to online security because they give the attacker the ability to
capture and manipulate sensitive personal information -- such as login credentials, account details or
credit card numbers -- in real time.

Prevvent MitM attacks:

 Always use trusted networks and devices to log in to sensitive websites.

 Avoid connecting to a Wi-Fi that is open(unencrypted).

 Keeping networks secure from unwanted external access.

Computer Break ins:


Computer break-ins, also known as cyber security breaches or intrusions, can take various forms, each
with its own methods, motives, and impacts. Here are some common types of computer break-ins in
cyber security:

Hacking:

Every act committed toward breaking into a computer and/or network is hacking and it is an
offense.Hackers write or use ready-made computer programs to attack the target computer.Hackers
hack for personal monetary gain, such as stealing credit card information, transferring money from
various bank accounts to their own accounts.

1.Malware Attacks

Malware is an abbreviation of “malicious software”, which includes viruses, worms, trojans, spyware,
and ransomware, and is the most common type of cyberattack. Malware infiltrates a system, usually via
a link on an untrusted website or email or an unwanted software download. It deploys on the target
system, collects sensitive data, manipulates and blocks access to network components, and may destroy
data or shut down the system altogether.

This can include viruses, worms, Trojans, Botnet, spyware, adware.

Virus:

It is a malicious piece of code that replicates by copying itself to another document or


program.Attackers make use of security vulnerabilities to infect the device and spread the virus.Virus
results in failure of device, corrupting data and consuming device resources.

Worms: Self-replicating malware that spreads across networks without user intervention, often
exploiting vulnerabilities in software or operating systems. It uses existing network for its propagation. It
consumes network bandwidth and affects the security of the device.

Trojans: Malware disguised as legitimate software, which can perform various malicious actions, such as
stealing data, spying on users, or install backdoors providing unauthorized access to systems, log
keystrokes and send these reports secretly to the attacker.

Backdoor:

Backdoor does not itself harm the device but helps other malware to bypass the security mechanism
and enter the device.

Botnet:

Botnet is a network of compromised computers.Attacker installs a malware “bot” in the vulnerable


devices turning these devices into a network of compromised machines(slaves).These devices may be
used to launch DoS attack.Command and control (C&C) networks are used to circulate messages,
responsibilities and payload to the Bots.
2.Denial of service attack:

In DoS attack , an attacker prevents the legitimate user from accessing the services, resources, or
devices.In this attack attacker floods the network,server or systems with a large amount of traffic,
making it difficult for the legitimate users to access the services.In DoS attack one computer and one
internet connection are used to flood the network with bogus requests.

Distributed Denial of Service (DDoS) Attacks

In DDoS attack multiple compromised computer systems(slaves) are used to flood the network with
Transmission Control Protocol/User Datagram Protocol packets.

DDoS attacks make an online service unavailable by overwhelming it with excessive traffic from many
locations and sources. Website response time slows down, preventing access during a DDoS attack.
Cyber criminals develop large networks of infected computers called Botnets by planting malware. A
DDoS attack may not be the primary cyber crime. The attacks often create a distraction while other
types of fraud and cyber intrusion are attempted.

Denial of Service - Denial of Service (DoS) is an attack to deny a victim access to a particular resource or
service, and has become one of the major threats and rated among the hardest Internet security issues .

o Host Based - A Host based DoS aims at attacking a specific computer target within the configuration,
operating system, or software of a host. These types of attacks usually involved resource hogs, aimed at
consuming up all resources on a computer; crashers, which attempts to crash the host system .

o Network Based - A Network based DoS targets a complete network of computers to prevent the
network of providing normal services .

Network based DoS usually occur in the form of flooding with packets [6], where the network’s
connectivity and bandwidth are the target [13]. o Distributed - A Distributed Denial of Service (DDoS) is
becoming more popular as an attacker’s choice of DoS. A distributed denial of service uses multiple
attack vectors to obtain its goal [10].

3.Data Destruction:

Ransomware: Malicious software that encrypts files on a victim's computer or network, rendering them
inaccessible until a ransom is paid. In some cases, ransomware may also threaten to permanently delete
files if the ransom demands are not met.

Data Wiping: Deliberate or accidental deletion of data from storage devices or systems, either through
malware, insider threats, or technical failures.

Physical Destruction: Destruction of hardware devices, such as servers, hard drives, or storage media, to
prevent data recovery or compromise.

4.Data modification
Data modification attacks involve unauthorized alterations or manipulations of data, aiming to
undermine its integrity, reliability, or authenticity. These attacks can have serious consequences for
individuals, organizations, and systems. Here are some common types of data modification attacks:

1. SQL Injection (SQLi):

 SQL injection attacks exploit vulnerabilities in web applications that use SQL databases.
Attackers inject malicious SQL queries into input fields, such as login forms or search
boxes, to manipulate or modify database content.

 By crafting SQL queries to exploit poorly sanitized inputs, attackers can bypass
authentication, extract sensitive data, or modify database records.

2. Cross-Site Scripting (XSS):

 Cross-Site Scripting attacks involve injecting malicious scripts into web pages viewed by
other users. Attackers exploit vulnerabilities in web applications that fail to properly
validate or sanitize user inputs.

 Malicious scripts executed in victims' browsers can modify page content, steal session
cookies, or redirect users to malicious websites, facilitating data manipulation or theft.

Forgery:

Counterfeit currency notes, postage and revenue stamps, marksheets etc can be forged using
sophisticated computers, printers and scanners.
Forgery in the context of cybersecurity refers to the creation, alteration, or falsification of digital
documents, records, or identities for deceptive or fraudulent purposes.

Digital document forgery involves altering or fabricating electronic documents, such as contracts,
certificates, invoices, or identification cards, to deceive or defraud others.

Digital signature forgery involves compromising or impersonating digital signatures to create fraudulent
digital documents, contracts, or transactions.

Web Jacking:

Web jacking is a form of cyber attack where an attacker gains unauthorized access to a website's
administration controls, often through vulnerabilities in web application.

Once access is obtained, the attacker can modify the content of the website, deface its pages, or insert
malicious code to redirect visitors to other sites controlled by the attacker. Web jacking can have various
motivations, including political activism, vandalism, or financial gain. It can result in reputational
damage, loss of trust, and financial losses for the targeted website owner.

Cyber defamation:
Cyber defamation is the act of distributing false or harmful statements about a person or an
organization on the internet. It commonly occurs on platforms like social media, forums, blogs, or any
website. When such incorrect information is circulated, it can have major ramifications for the person’s
or group’s reputation. It can lead to financial loss and mental anguish
Phishing(social engineering attacks):

Phishing is a type of cyber attack where attackers use deceptive tactics, such as email, text messages, or
fake websites, to trick individuals into revealing sensitive information, such as passwords, usernames,
credit card numbers, or other personal data. Phishing attacks are a common method used by
cybercriminals to steal identities, perpetrate financial fraud, or gain unauthorized access to systems or
accounts.

Email Phishing:

 In email phishing attacks, attackers send fraudulent emails that appear to come from legitimate
sources, such as banks, social media platforms, or government agencies.

Spear Phishing:
 Spear phishing is a targeted form of phishing where attackers customize their fraudulent
messages to specific individuals or organizations, often using personal information obtained
from social media or data breaches

Email Spoofing:
Email spoofing is a technique used by attackers to forge or falsify the sender's email address in an email
message. By manipulating the email header information, attackers can make it appear as though the
email originated from a trusted source or a legitimate sender, even though it may have been sent from a
malicious actor.

Preventive measures from threats to information resources:


 Stay away from suspect websites/weblinks: Avoid downloading free/pirated software that aften
get infected by Trojans, worms and virus.
 Connect only to secured Wireless networks, do not connect to open wi-fi hotspots.Avoid
providing network a name which can be easily identified.
 Install Anti-virus solution: protects from malware, access to phishing sites, scan files, SMSs and
MMSs.
 Spam Filters: this application prevents and blocks SMS, Phone calls, MMS and emails from
unwanted sources.
 Firewall: Prevents network-related attacks by refusing connection with untrusted network.
 Access Control: Access control restricts the access to user and process to resources or services.
 Authentication: this process prevents unauthorized access to device.
 Applying patches (Regular software updates): Applying patches the vendor has released due to
some vulnerability within software in use. New updates will be provided as patches which you
can apply on existing application or system so that your application will have all the required
security updates.
 IDS - Intrusion Detection System
It is a device or software that analyses the network traffic and detects malicious activities.
Prevention based IDS analyses the traffic flow in order to detect and prevent vulnerability
exploits.To prevent dos ,MIM attacks.
 To prevent SQL injection attacks input validation, user inputs need to be checked and cleaned
properly ,modify error reports SQL error reports should not be displayed to outside users,
developer should handle or configure the error reports carefully.

You might also like