Cyber Security
Cyber Security
Cyber Security
Syllabus
UNIT 1: Introduction to Cybercrime
UNIT 2: Cyber offenses
UNIT 3: Cybercrime: Mobile and Wireless devices
UNIT 4: Tools and method used in Cybercrime
UNIT 5: Phishing and identity theft
UNIT 6: Cybercrimes and Cyber Security: The legal
perspectives
TEXT BOOK:
Cyber Security by Nina Godbole,Sunit Belapure, Wiley
India, 1st edition copyright 2011 reprint 2013.
REFERENCES:
Computer Forensics and Cyber Crime An Introduction by
Marjie T. Britz ,Pearson publication, 2nd edition.
Unit 1: Learning Objectives
End of this unit, you will be able to:
Learn what cybercrime is and appreciate the importance of
cybercrime as a topic.
Understand the different types cybercrime.
Understand the difference between cybercrime and
cyberfraud.
Learn about different types of cybercriminals and the
motives behind them
Get an overview of cybercrime scenario in India and global
Understand legal perspective on cybercrime.
Unit 2: Learning Objectives
Understand different types of cyberattacks.
Get an overview of the steps involved in planning
cybercrime
Understand tools used for gathering information about
the target
Get an overview on social engineering
Learn about the role of cybercafe in cybercrime
Understand what is cyberstalking
Learn about botnet and attack vector
Get an overview of cloud computing
Unit 3: Learning Objectives
Understand the security challenges presented by
mobile devices and information systems access in the
cybercrime world.
Understand challenges faced by the mobile workforce
and implication under the cybercrime era.
Mitigation strategy – credit card users.
Security issues due to use of media players
Unit 4: Learning Objectives
Proxy servers and anonymizers
Password cracking
Keyloggers and spywares
Overview of virus and worms
Trojan horses and backdoors
Steganography
DoS attacks
SQL injection
Unit 5: Learning Objectives
Phishing and its techniques
Identity theft
Unit 6: Learning Objectives
Cyber laws
Legal perspectives
Course Outcomes
On Successful completion of the course, the
students will be able to:
Explain the classification of cybercrimes
Identify the steps of attacks
Discuss challenges posed by mobile devices
Recognize the attack on mobile networks
Discuss Phishing in cybercrime
Explain the different security challenges to Indian law
1.1 INTRODUCTION
The internet in India is growing rapidly. It has given rise to
new opportunities in every field we can think of be it
entertainment, business, sports or education.
which uses (computer) technology, not as a tool to commit the crime, but as the subject
of the crime itself. Techno Crime is usually pre-meditated and results in the deletion,
corruption, alteration, theft or copying of data on an organization's systems.
Techno Criminals will usually probe their prey system for weaknesses and will almost
always leave an electronic 'calling card' to ensure that their pseudonym identity is
known.
Techno – vandalism: Passive attack
Techno Vandalism is a term used to describe a hacker or cracker who breaks into a
computer system with the sole intent of defacing and or destroying its contents.
Techno Vandals can deploy 'sniffers' on the Internet to locate soft (insecure) targets
and then execute a range of commands using a variety of protocols towards a range of
ports. If this sounds complex - it is! The best weapon against such attacks is a firewall
which will hide and disguise your organization's presence on the Internet.
1.3 Cybercrime and information security
Lack of information security give rise to cybercrime
Cybersecurity: means protecting information,
equipment, devices, computer, computer resource,
communication device and information stored therein
from unauthorized access, use, disclosure, disruption,
modification or destruction.
Cybercrime trends over years
1.4 Who are Cybercriminals?
Are those who conduct acts such as:
Child pornography
Credit card fraud
Cyberstalking
Defaming another online
Gaining unauthorized access to computer systems
Ignoring copyrights
Software licensing and trademark protection
Overriding encryption to make illegal copies
Software piracy
Stealing another’s identity to perform criminal acts
Categorization of Cybercriminals
Type 1: Cybercriminals- hungry for recognition
Hobby hackers
A person who enjoys exploring the limits of what is
possible, in a spirit of playful cleverness. May modify
hardware/ software
IT professional(social engineering):
Ethical hacker
The defense establishment then realized how many Israelis received the
email, and reportedly tracked the malicious program down to Chinese
defense industries.
The incident led security companies to reiterate to employees computer
security guidelines.
Hacking
Every act committed toward breaking into a computer and/
or network is hacking.
Purpose
Greed
Power
Publicity
Revenge
Adventure
Desire to access forbidden information
Destructive mindset
History of hacking
hacking is any technical effort to manipulate the normal behavior of
network connections and connected systems.
A hacker is any person engaged in hacking.
The term "hacking" historically referred to constructive, clever
technical work that was not necessarily related to computer systems.
M.I.T. engineers in the 1950s and 1960s first popularized the term and
concept of hacking.
the so-called "hacks" perpetrated by these hackers were intended to be
harmless technical experiments and fun learning activities.
Later, outside of M.I.T., others began applying the term to less
honorable pursuits. for example, several hackers in the U.S.
experimented with methods to modify telephones for making free
long-distance calls over the phone network illegally.
As computer networking and the Internet exploded in popularity, data
networks became by far the most common target of hackers and
hacking.
Hacking vs. Cracking
Malicious attacks on computer networks are officially
known as cracking ,
while hacking truly applies only to activities having
good intentions.
Most non-technical people fail to make this
distinction, however.
Outside of academia, its extremely common to see the
term "hack" misused and be applied to cracks as well.
There are 3 types of modern hackers
Black Hats: Criminal Hackers.
Possess desire to destruction
Hack for personal monetary gains : Stealing credit card
information, transferring money from various bank
accounts to their own account, extort money from
corporate giant by threatening.
White Hats: Ethical Hackers.
Network Security Specialist.
Grey Hats: Deals in both of the above (jack of all
trades, master of none).
Real life case:dec 2009
NASA site hacked via SQL Injection
Two NASA sites recently were hacked by an individual wanting to demonstrate
that the sites are susceptible to SQL injection.
The websites for NASA's Instrument Systems and Technology Division and
Software Engineering Division were accessed by a researcher, who posted to
his blog screen shots taken during the hack.
The researcher, using the alias "c0de.breaker," used SQL injection to hijack the
sites.
SQL injection is an attack process where a hacker adds additional SQL code
commands to a page request and the web server then tries to execute those
commands within the backend database
The NASA hack yielded the credentials of some 25 administrator accounts.
The researcher also gained access to a web portal used for managing and
editing those websites.
In this particular case, the researcher found the vulnerabilities, made NASA
aware of them, then published findings after the websites had been fixed.
An attacker, however, could have tried to use that web server as an entry point
into other systems NASA might control or edit the content of the sites and use
them for drive-by downloads.
Nadya Suleman’s Website Hacked,
feb 2009
The story..
LOS ANGELES, CA – Octuplet mom Nadya Suleman launched
a website to solicit donations for her family, but it was
immediately hacked by a group of vigilante mothers!
The website originally featured photos of all eight octuplets, a
thank you note from Suleman, images of children’s toys and a
large donation button for viewers to send money through.
Suleman also provided an address where people can send items
such as diapers and formula.
Suleman was perhaps not prepared for the backlash she was to
receive, as the site was hacked and brought down within hours.
The original homepage was left up but defaced, as seen in the
screenshot.
The site was tagged by the famous hacker group MOD, also
known as the Mothers of Disappointment. The mysterious
group has a history of attacking personal sites they disapprove
of, including Britney Spears when she infamously hung dry
her sons on a clothes line after a bath, and Angelina Jolie for
being Angelina Jolie.
Weekly World News could not reach any members for
comment, however reporters did receive a short note from an
anonymous e-mail address:
mod will not tolerate the selfish acts of bad parenting
we will remain true to our mission despite any setbacks
viva la maternity
(call your mother, she misses you)
The site has since been restored, and Suleman’s PR
representative has stated they are now taking extra security
measures to arm against future attacks.
Online frauds
Fraud that is committed using the internet is “online fraud.” Online
fraud can involve financial fraud and identity theft.
Online fraud comes in many forms.
viruses that attack computers with the goal of retrieving personal
information, to email schemes that lure victims into wiring money to
fraudulent sources,
“phishing” emails that purport to be from official entities (such as banks or
the Internal Revenue Service) that solicit personal information from
victims to be used to commit identity theft,
to fraud on online auction sites (such as Ebay) where perpetrators sell
fictional goods.
E-Mail spoofing to make the user to enter the personal information :
financial fraud
Illegal intrusion: log-in to a computer illegally by having previously
obtained actual password. Creates a new identity fooling the computer that
the hacker is the genuine operator. Hacker commits innumerable number
of frauds.
Pornographic offenses: Child pornography
Means any visual depiction, including but not limited
to the following:
1. Any photograph that ca be considered obscene and/
or unsuitable for the age of child viewer.
2. Film ,video, picture;
3. Obscene Computer generated image or picture
How do they Operate
1. Pedophiles use false identity to trap the children/teenagers
2. Pedophiles contact children/teens in various chat rooms which are
used by children/teen to interact with other children/teen.
3. Befriend the child/teen.
4. Extract personal information from the child/teen by winning his
confidence.
5. Gets the e-mail address of the child/teen and starts making contacts
on the victims e-mail address as well.
6. Starts sending pornographic images/text to the victim including
child pornographic images in order to help child/teen shed his
inhibitions so that a feeling is created in the mind of the victim that
what is being fed to him is normal and that everybody does it.
7. Extract personal information from child/teen
8. At the end of it, the pedophile set up a meeting with the child/teen
out of the house and then drag him into the net to further sexually
assault him or to use him as a sex object.
Software piracy
Theft of software through the illegal copying of
genuine programs or the counterfeiting and
distribution of products intended to pass for the
original.
End-user copying
Hard disk loading with illicit means
Counterfeiting
Illegal downloads from internet
Buying Pirated software have a lot to lose:
Getting untested software that may have been copied
thousands of times.
Potentially contain hard-ware infecting viruses
No technical support in case of software failure
No warranty protection
No legal right to use the product
Computer sabotage
Computer sabotage involves deliberate attacks intended to disable
computers or networks for the purpose of disrupting commerce,
education and recreation for personal gain, committing espionage,
or facilitating criminal conspiracie.
Through viruses, worms, logic bombs
Chernobyl virus
The Chernobyl virus is a computer virus with a potentially devastating
payload that destroys all computer data when an infected file is executed.,
Y2K virus
Y2K bug, also called Year 2000 bug or Millennium Bug, a problem in
the coding of computerized systems that was projected to create
havoc in computers and computer networks around the world at the
beginning of the year 2000
E-mail bombing/mail bombs
In Internet usage, an email bomb is a form of net
abuse consisting of sending huge volumes of email to
an address in an attempt to overflow the mailbox or
overwhelm the server where the email address is
hosted in a denial-of-service attack.
Construct a computer to repeatedly send E-mail to a
specified person’s E-mail address.
Can overwhelm the recipient’s personal account and
potentially shut down the entire system.
Computer network intrusions
An intrusion to computer network from any where in
the world and steal data, plant viruses, create
backdoors, insert trojan horse or change passwords
and user names.
An intrusion detection system (IDS) inspects all
inbound and outbound network activity and identifies
suspicious patterns that may indicate a network or
system attack from someone attempting to break into
or compromise a system.
The practice of strong password
Password sniffing
Password sniffers are programs that monitor and
record the name and password of network users as
they login, jeopardizing security at a site.
through sniffers installed, anyone can impersonate an
authorized user and login to access restricted
documents.
Credit card frauds
Credit card fraud is a wide-ranging term for theft
and fraud committed using or involving a
payment card, such as a credit card or debit card, as a
fraudulent source of funds in a transaction.
The purpose may be to obtain goods without paying,
or to obtain unauthorized funds from an account.
Credit card fraud is also an adjunct to identity theft.
Identity theft
Identity theft is a fraud involving another person’s identity for an
illicit purpose.
The criminal uses someone else’s identity for his/ her own illegal
purposes.
Phishing and identity theft are related offenses
Examples:
Fraudulently obtaining credit
Stealing money from victim’s bank account
Using victim’s credit card number
Establishing accounts with utility companies
Renting an apartment
Filing bankruptcy using the victim’s name
Real life cases
Dr. Gerald Barnes
Gerald Barnbaum lost his pharmacist license after committing
Medicaid fraud. He stole the identity of Dr. Gerald Barnes and
practiced medicine under his name. A type 1 diabetic died under
his care. “Dr. Barnes” even worked as a staff physician for a center
that gave exams to FBI agents. He’s currently serving hard time.
Andrea Harris-Frazier
Margot Somerville lost her wallet on a trolley. Two years later she
was arrested. Andrea Harris-Frazier had defrauded several banks
—using Somerville’s identity—out of tens of thousands of
dollars. The real crook was caught.
Abraham Abdallah
A busboy named Abraham Abdallah got into the bank accounts
of Steven Spielberg and other famous people after tricking his
victims via computer, getting sufficient data to fake being their
financial advisors—then calling their banks…and you know the
rest.
Cybercrime:
the legal perspective
Cybercrime possess a mammoth challenge
Computer crime: Criminal Justice Resource
Manual(1979)
Any illegal act for which knowledge of computer
technology is essential for a successful prosecution.
International legal aspects of computer crimes were
studied in 1983
Encompasses any illegal act for which the knowledge of
computer technology is essential for its prepetration
Cybercrime:
the legal perspective
The network context of cyber crime make it one of the
most globalized offenses of the present and most
modernized threats of the future.
Solution:
Divide information system into segments bordered by
state boundaries.
Not possible and unrealistic because of globalization
Or incorporate the legal system into an integrated entity
obliterating these state boundaries.
Cybercrimes: An Indian Perspective
India has the fourth highest number of internet users
in the world.
45 million internet users in India
37% - in cybercafes
57% are between 18 and 35 years
The Information Technology (IT) Act, 2000, specifies
the acts which are punishable. Since the primary
objective of this Act is to create an enabling
environment for commercial use of I.T.
Cybercrimes: An Indian Perspective
217 cases were registered under IT Act during the year
2007 as compared to 142 cases during the previous year
(2006)
Thereby reporting an increase of 52.8% in 2007 over
2006.
22.3% cases (49out of 217 cases) were reported from
Maharashtra followed by Karnataka (40), Kerala (38)
and Andhra Pradesh and Rajasthan (16 each).
Cybercrimes: An Indian Perspective
Incidence of Cyber Crimes in
Cities
17 out of 35 mega cities did not report any case of Cyber Crime i.e,
neither under the IT Act nor under IPC Sections) during the year
2007.
17 mega cities have reported 118 cases under IT Act and 7 megacities
reported 180 cases undervarious section of IPC.
There was an increase of 32.6% (from 89 cases in 2006 to 118 cases in
2007) in cases under IT Act as compared to previous year (2006),
and an increase of 26.8% (from 142 cases in 2006 to 180 cases in 2007)
of cases registered under various section of IPC
Bengaluru (40), Pune (14) and Delhi (10) cities have reported high
incidence of cases (64 out of 118 cases) registered under IT Act,
accounting for more than half of the cases (54.2%) reported under the
Act.