Cybersecurity Unit 3
Cybersecurity Unit 3
Cybersecurity Unit 3
Q1) What is the effect of proliferation of mobile and wireless devices over cybercrime?
Effect of proliferation over cybercrime:- Due to proliferation (Growth) of mobile and wireless
devices the Cyber Security is becoming a severe issue for individuals, enterprises, and
governments alike. In a world where everything is on the internet, from cute kitten videos and our
travel diaries to our credit card information, ensuring that our data remains safe is one of the biggest
THAT IS CALLED CYBER SECURITY…..!
challenges of Cyber Security. Cyber Security challenges come in many forms, such as
ransomware, phishing attacks and malware attacks.
IOT devices transmit data over a network Examples of IoT devices include desktops, laptops,
mobile phones, smart security devices, etc. As the adoption of IoT devices is increasing at an
unprecedented rate, so are the challenges of Cyber Security. Attacking IoT devices can result in
the compromise of sensitive user data. Safeguarding IoT devices is one of the biggest challenges
in Cyber Security.
To protect your devices and data against cyber threats, you can adopt simple measures such as
using the latest hardware and software for your digital needs. You will also need to adopt advanced
measures such as installing a firewall to add an extra security layer.
Q2) What are the measures should be taken for organizational security policies in mobile
computing?
1) Proliferation of hand-held devices used makes the cybersecurity issue graver than we can
think. people are storing more types of confidential information on mobile computing
devices. Such as credit card and bank account numbers, passwords, confidential E-Mails and
strategic information about organization, merger or takeover plans. If such important and
valuable information leak that could impact on their business or stock values.
2) If an employee's USB, pluggable drive or laptop was lost or stolen, revealing sensitive
customer data such as credit reports, social security numbers (SSNs) and contact
information. Not only would this be a public relations (PR) disaster, but it could also violate
laws and regulations. It could be a potential legal trouble for a public company whose sales
reports, employee records or expansion plans may fall into wrong hands.
3) The simplest solution is to prevent users from storing proprietary information on platforms
that are insufficiently secure. by increasing awareness of 'the user, it can be reasonably
effective. Information classification and handling policy should clearly define what sorts of
data may be stored on mobile devices. In the absence of other controls, simply not storing
confidential data on at-risk platforms will mitigate the risk of theft or loss.
1. Determine whether the employees in the organization need to use mobile computing
devices at all, based on their risks and benefits within the organization, industry and
regulatory environment.
2. Implement additional security technologies, as appropriate to fit both the organization and
the types of devices used. Most (and perhaps all) mobile computing devices will need to
have their native security augmented with such tools as strong encryption, device
passwords and physical locks. Biometrics techniques can be used for authentication and
encryption and have great potential to eliminate the challenges associated with passwords.
3. Standardize the mobile computing devices and the associated security tools being used
with them. As a matter of fundamental principle, security deteriorates quickly as the tools
and devices used become increasingly disparate.
4. Develop a specific framework for using mobile computing devices, including guidelines for
data syncing, the use of firewalls and anti-malware software and the types of information
that can be stored on them.
THAT IS CALLED CYBER SECURITY…..!
5. Centralize management of your mobile computing devices. Maintain an inventory so that
you know who is using what kinds of devices.,
6. Establish patching procedures for software on mobile devices. This can often be simplified
by integrating patching with syncing or patch management with the centralized inventory
database.
7. Label the devices and register them with a suitable service that helps recovered devices to
the owners.
8. Establish procedures to disable remote access for any mobile devices reported as lost or
stolen. Many devices allow the users to store usernames and passwords for website
portals, which could allow a thief to access even more information than on the device itself.
9. Remove data from computing devices that are not in use or before re-assigning those
devices to new owners. This is to preclude incidents through which people obtain "old"
computing devices that still had confidential company data.
10. Provide education and awareness training to personnel using mobile devices. People
cannot be expected to appropriately secure their information if they have not been told
how.
Q4) What types of internet frauds are most common? Explain in detail?
The term ‘internet fraud’ refers to any type of fraud scheme that uses email, web sites, chat
rooms or message boards to foul prospective victims, to conduct fake transactions or to
transmit the proceeds of fraud to financial institutions or to others connected with the
scheme.
Internet fraud may include spam, scams, spyware, identity theft, phishing or internet
banking fraud.
Phishing
“Phishing” (pronounced “fishing”) is when criminals use email to try to lure you to fake
websites, where you are asked to disclose confidential, financial, or personal information like
passwords, account numbers, or transaction information.
The most common type of phishing is an email threatening some dire consequence if you do
not immediately log in and take action.
You should never respond or reply to email that:
Requires you to enter organizational or personal information directly into the email or
submit that information some other way
Threatens to close or suspend your account if you do not take immediate action by
providing specific information about you or your company
Solicits your participation in a survey where you are asked to enter personal information
States that your account has been compromised or that there has been third-party activity
on your account and requests you to enter or confirm your account information
States that there are unauthorized transactions on your account(s) and requests your
account information
Asks you to enter your User ID, password, or account numbers into an email or non-secure
website
Asks you to confirm, verify, or refresh your account information
Directs you to a screen that asks you to provide additional data beyond your normal login
information
Asks you to validate account information for banking systems you do not use
Vishing
Phishing scams can have a phone connection. First, it was “phishing,” where criminals send
email by the thousands in hopes of tricking unsuspecting users into sharing confidential
information.
Now, there is “vishing.” In this latest twist, fraudsters use a telephone number in the phishing
email instead. If you call, a person or an automated response system will ask for your personal
or account information.
When you call J.P. Morgan, only call the phone numbers we have provided directly to you
during your program implementation.
REMINDER: J.P. Morgan will never ask you for your password.
EXAMPLE
Employment Scam :- There are many online employment platforms (i.e. LinkedIn, Glassdoor,
Zip Recruiter etc.). Companies use these to be cost effective and convenient when hiring.
Unfortunately, scammers can use these websites to gain access to the personal information of
THAT IS CALLED CYBER SECURITY…..!
their targets. They post fake job recruitments and ask for money while victim applying for the
job.
Q5) what kind of attacks are possible on mobile cell phone discuss in detail?
Mobile devices can be attacked at different levels. This includes the potential for malicious apps,
network-level attacks, and exploitation of vulnerabilities within the devices and the mobile OS.
As mobile devices become increasingly important, they have received additional attention from
cybercriminals. As a result, cyber threats against these devices have become more diverse.
Malicious Apps and websites
Like desktop computers, mobile devices have software and Internet access. Mobile malware (i.e.
malicious applications) and malicious websites can accomplish the same objectives (stealing data,
encrypting data, etc.) on mobile phones as on traditional computers.
Malicious apps come in a variety of different forms. The most common types of malicious mobile
apps are trojans that also perform ad and click scams.
Mobile Ransomware
Mobile ransomware is a particular type of mobile malware, but the increased usage of mobile
devices for business has made it a more common and damaging malware variant. Mobile
ransomware encrypts files on a mobile device and then requires a ransom payment for the
decryption key to restore access to the encrypted data.
Phishing
“Phishing” (pronounced “fishing”) is when criminals use email to try to lure you to fake websites,
where you are asked to disclose confidential, financial, or personal information like passwords,
account numbers, or transaction information.
The most common type of phishing is an email threatening some dire consequence if you do not
immediately log in and take action.
Man-in-the-Middle (MitM) Attacks
Man-in-the-Middle (MitM) attacks involve an attacker intercepting network communications to
either eavesdrop on or modify the data being transmitted. While this type of attack may be
possible on different systems, mobile devices are especially susceptible to MitM attacks. Unlike
web traffic, which commonly uses encrypted HTTPS for communication, SMS messages can be
easily intercepted, and mobile applications may use unencrypted HTTP for transfer of potentially
sensitive information
Q7) what are the policies organizations use to maintain security on mobile devices called?
(For Q7 please Refer Q2 and Q8)
Q8) Explain the best practice in implementing security polices and also explain three types
of security policies?
1. Standardize the mobile computing devices and the associated security tools being used
with them. As a matter of fundamental principle, security deteriorates quickly as the tools
and devices used become increasingly disparate.
2. Develop a specific framework for using mobile computing devices, including guidelines for
data syncing, the use of firewalls and anti-malware software and the types of information
that can be stored on them.
3. Centralize management of your mobile computing devices. Maintain an inventory so that
you know who is using what kinds of devices.,
4. Label the devices and register them with a suitable service that helps recovered devices to
the owners.
THAT IS CALLED CYBER SECURITY…..!
5. Establish procedures to disable remote access for any mobile devices reported as lost or
stolen. Many devices allow the users to store usernames and passwords for website
portals, which could allow a thief to access even more information than on the device itself.
6. Provide education and awareness training to personnel using mobile devices. People
cannot be expected to appropriately secure their information if they have not been told
how.
3. System-specific policy
A system-specific policy is the most granular type of IT security policy, focusing on a particular
type of system, such as a firewall or web server, or even an individual computer. In contrast to the
issue-specific policies, system-specific policies may be most relevant to the technical personnel
that maintains them. NIST states that system-specific policies should consist of both a security
objective and operational rules. IT and security teams are heavily involved in the creation,
implementation, and enforcement of system-specific policies but the key decisions and rules are
still made by senior management.
Q9) What kinds of attacks are possible on mobile/cell phones? Explain with example.
Press 1 if you need to check your banking details and live balance. Press 2 if you wish to transfer
funds.
Press 3 to unlock your online profile. Press 0 for any other query.
2. Regardless of what the victim enters (Le.. presses the key), the automated system prompts him
THAT IS CALLED CYBER SECURITY…..!
to authenticate himself: "The security of each customer is important to us. To proceed further. we
require that you authenticate your ID before proceeding. Please type your bank account number,
followed by the pound key." The victim enters his/her bank account number and hears the next
prompt: "Thank you. Now please type your date of birth, followed by the pound key.
For example 01 January 1950 press 01011950." 3. 4. The caller enters his/her date of birth and
again receives a prompt from the automated system:
Thank you. Now please type your PIN, followed by the pound key." 5. The caller enters his PIN
and hears one last prompt from the system: "Thank you. We will now Transfer you to the
appropriate representative.
At this stage, the phone call gets disconnected, and the victim thinks there was something wrong
with the telephone line; or visher may redirect the victim to the real customer service line, and the
victim will not be able to know at all that his authentication was appropriated by the visher.
10) Describe Credit card fraud in mobile and wireless Computing with example.
( Please Refer Q14)
In this modern era, the rising importance of electronic gadgets – which became an integral
part of business, providing connectivity with the internet outside the office – brings many
challenges to secure these devices from being a victim of cyber crime. These Credit card
frauds and all are the new trends in cybercrime that are coming up with mobile computing.
Credit card (or debit card) fraud is a form of identity theft that involves an unauthorized
taking of another’s credit card information for the purpose of charging purchases to the
account or removing funds from it.
Types of Credit Card Fraud:
The first category, lost or stolen cards, is a relatively common one, and should be reported
immediately to minimize any damages.
The second is called “account takeover” — when a cardholder unwittingly gives personal
information (such as home address, mother’s maiden name, etc.) to a fraudster, who then
contacts the cardholder’s bank, reports a lost card and change of address, and obtains a
new card in the soon-to-be victim’s name.
The fourth is called “never received” — when a new or replacement card is stolen from
the mail, never reaching its rightful owner.
The fifth is fraudulent application— when a fraudster uses another person’s name and
information to apply for and obtain a credit card.
Fake shopping website.
Attracting high profit generating investment scheme where attackers forced to make
payment from credit card.
Mobile computing is moving into a new era, third generation ( 3G), which promises greater variety
in applications and have highly improved usability as well as speedier networking. "iPhone" from
Apple and Google-led "Android" phones are the best examples of this trend and there are plenty
of other developments that point in this direction. This smart mobile technology is rapidly gaining
popularity and the attackers (hackers and crackers) are among its biggest fans.
THAT IS CALLED CYBER SECURITY…..!
It is worth noting the trends in mobile computing; this will help readers to readers to realize the
seriousness of cybersecurity issues in the mobile computing domain. Figure below shows the
different types of mobility and their implications. The new technology 3G networks are not entirely
built with IP data security. Moreover, IP data world when compared to voice-centric security threats
is new to mobile operators. There are numerous attacks that can be committed against mobile
networks, and they can originate from two primary vectors. One is from outside the mobile network
- that is, public Internet, private networks and other operator's networks - and the other is within
the mobile networks- that is, devices such as data-capable handsets and Smartphones, notebook
computers or even desktop computers connected to the 3G network.
3. Overbilling attack: Overbilling involves an attacker hijacking a subscriber's IP address and then
using it (i.e., the connection) to initiate downloads that are not "Free downloads" or simply use it for
his/her own purposes. In either case, the legitimate user is charged for the activity which the user
did not conduct or authorize to conduct.5. Signaling-level attacks: The Session Initiation Protocol
(SIP) is a signaling protocol used in IP multimedia subsystem (IMS) networks to provide Voice Over
Internet Protocol (VoIP) services. There are several vulnerabilities with SIP-based VolP systems.
THAT IS CALLED CYBER SECURITY…..!
Q12) What kinds of cybersecurity measures an organization should have to take in case of
portable storage devices?
Use passwords correctly - In the process of getting to the information on your portable device, you
probably encounter multiple prompts for passwords. Take advantage of this security. Don't choose
options that allow your computer to remember passwords, don't choose passwords that thieves
could easily guess, use different passwords for different programs, and take advantage of
additional authentication methods (see Choosing and Protecting Passwords and Supplementing
Passwords for more information).
Consider storing important data separately - There are many forms of storage media, including
CDs, DVDs, and removable flash drives (also known as USB drives or thumb drives). By saving your
data on removable media and keeping it in a different location (e.g., in your suitcase instead of your
laptop bag), you can protect your data even if your laptop is stolen. You should make sure to secure
the location where you keep your data to prevent easy access. It may be helpful to carry storage
media with other valuables that you keep with you at all times and that you naturally protect, such
as a wallet or keys.Encrypt files - By encrypting files, you ensure that unauthorized people can't
view data even if they can physically access it. You may also want to consider options for full disk
encryption, which prevents a thief from even starting your laptop without a passphrase. When you
use encryption, it is important to remember your passwords and passphrases; if you forget or lose
them, you may lose your data.
Install and maintain anti-virus software - Protect laptops and PDAs from viruses the same way you
protect your desktop computer. Make sure to keep your virus definitions up to date (see
Understanding Anti-Virus Software for more information). If your anti-virus software doesn't include
anti-spyware software, consider installing separate software to protect against that threat (see
Recognizing and Avoiding Spyware and Coordinating Virus and Spyware Defense for more
information).
Install and maintain a firewall - While always important for restricting traffic coming into and leaving
your computer, firewalls are especially important if you are traveling and using different networks.
Firewalls can help prevent outsiders from gaining unwanted access (see Understanding Firewalls
for more information).Back up your data - Make sure to back up any data you have on your computer
onto a CD-ROM, DVD-ROM, or network (see Good Security Habits and Real-World Warnings Keep
You Safe Online for more information). Not only will this ensure that you will still have access to the
information if your device is stolen, but it could help you identify exactly which information a thief
may be able to access. You may be able to take measures to reduce the amount of damage that
exposure could cause.
THAT IS CALLED CYBER SECURITY…..!
Q13) What kinds of attacks are possible on mobile/cell phones? Explain with example.
SMiShing :
Smishing become common now as smartphones are widely used. SMiShing uses Short Message
Service (SMS) to send fraud text messages or links. The criminals cheat the user by calling. Victims
may provide sensitive information such as credit card information, account information, etc.
Accessing a website might result in the user unknowingly downloading malware that infects the
device.
War driving :
War driving is a way used by attackers to find access points wherever they can be. With the
availability of free Wi-Fi connection, they can drive around and obtain a very huge amount of
information over a very short period of time.WEP attack :
Wired Equivalent Privacy (WEP) is a security protocol that attempted to provide a wireless local
area network with the same level of security as a wired LAN. Since physical security steps help to
protect a wired LAN, WEP attempts to provide similar protection for data transmitted over WLAN
with encryption.WEP uses a key for encryption. There is no provision for key management with
Wired Equivalent Privacy, so the number of people sharing the key will continually grow. Since
everyone is using the same key, the criminal has access to a large amount of traffic for analytic
attacks.
WPA attack :
Wi-Fi Protected Access (WPA) and then WPA2 came out as improved protocols to replace WEP.
WPA2 does not have the same encryption problems because an attacker cannot recover the key by
noticing traffic. WPA2 is susceptible to attack because cyber criminals can analyze the packets
going between the access point and an authorized user.
Bluejacking :
Bluejacking is used for sending unauthorized messages to another Bluetooth device. Bluetooth is a
high-speed but very short-range wireless technology for exchanging data between desktop and
mobile computers and other devices.Replay attacks :
In Replay attack an attacker spies on information being sent between a sender and a receiver. Once
the attacker has spied on the information, he or she can intercept it and retransmit it again thus
leading to some delay in data transmission. It is also known as playback attack.
Bluesnarfing :
It occurs when the attacker copies the victim’s information from his device. An attacker can access
information such as the user’s calendar, contact list, e-mail and text messages without leaving any
evidence of the attack.
RF Jamming :
Wireless signals are susceptible to electromagnetic interference and radio-frequency interference.
Radio frequency (RF) jamming distorts the transmission of a satellite station so that the signal does
not reach the receiving station.
THAT IS CALLED CYBER SECURITY…..!
Q14) Describe Credit card fraud in mobile and wireless Computing with example.
1. Traditional Techniques :
Paper-based Fraud –
Paper-based fraud is whereby a criminal makes use of stolen or faux files such as utility payments
and financial institution statements that can construct up beneficial Personally Identifiable
Information (PII) to open an account in anybody else’s name.Application Fraud –
ID Theft :
Where a person pretends to be anybody else.
Financial Fraud :
1. Where a person offers false data about his or her monetary reputation to gather credit.
2. Modern Techniques :
Skimming to Commit Fraud is a kind of crime in which dishonest employees make unlawful copies
of credit or debit cards with the help of a ‘skimmer’. A skimmer is a gadget that captures credit
card numbers and other account information which should be personal. The data and records
held on either the magnetic stripe on the lower back of the deposit card or the records saved on
the smart chip are copied from one card to another