0% found this document useful (0 votes)
81 views49 pages

1st Unit Cyber Secuirty

The document discusses cyber security technologies and practices. It introduces cyber security, covering its history from the 1960s to present day, including the creation of the first computer virus in 1970 and modern data breaches. The document also covers cyber security goals of confidentiality, integrity and availability. It defines security attacks and types including interception, interruption, modification and fabrication. Finally, it discusses e-commerce security requirements and common cyber attacks such as viruses, adware, Trojan horses, ransomware and phishing.

Uploaded by

leon pric
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
81 views49 pages

1st Unit Cyber Secuirty

The document discusses cyber security technologies and practices. It introduces cyber security, covering its history from the 1960s to present day, including the creation of the first computer virus in 1970 and modern data breaches. The document also covers cyber security goals of confidentiality, integrity and availability. It defines security attacks and types including interception, interruption, modification and fabrication. Finally, it discusses e-commerce security requirements and common cyber attacks such as viruses, adware, Trojan horses, ransomware and phishing.

Uploaded by

leon pric
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 49

Cyber Security Technologies

&
Practice
Objectives

• Introduction

• Needs of Cyber Security

• History of Cyber Security

• Goals of Cyber Security


• Introduction

Cyber Security is the protection of Internet connected system Including


hardware, software and program or data from cyber attack.(ex.Cyber cafe).

Cyber Security

Cyber Security

• Computer System • System Security


• Network • Network Security
• Programs & Data • Program & Data Security
A
D

C
B

F G
Internet

H I

E
Needs of Cyber Security

• To protect private data.

• To protect intellectual data.

• To protect banking & finance data.

• National Security.

• Global Economy.

• Protect Sensitive data.


History of Cyber Security:-

1. 1969 Professor of UCLA sent message to standard


research institute.

1. 1970 Robert create first virus name “ CREPER”.

2. 1986 Russians used Cyber power as weapons.

3. 1988 American scientist create program to check


size of internet.
Cyber Security Goals:- ( CIA)

C = Confidentiality :- F G
Hello World

Encryption Decryption

I = Integrity

A = Availability :- Ex. 10th Result


Information Security
Basic Concepts
Objectives

•Information Security

• Security Attacks

• Different kinds of security attacks

• E-commerce Security
Information Protection – why ?

• Information is an important strategic and operational asset for


any organization
* Damages and misuses of information affect not only a single
user or an application ; they may have disastrous consequences
(result) on the entire organization.
* Additionally , the advent of the internet as well as networking
capabilities has made the access to information much easier.

• Consider a payroll database in a corporation, it must be ensured that:


* Salaries of individual employees are not disclosed to arbitrary users of the
database.
* Salaries are modified by only those individuals that are properly authorized.
Paychecks are verified by individuals different than the ones who issued them.
* Paychecks are printed on time at the end of each pay period.
What is Information Security ?

• Confidentiality

• Integrity

• Availability
Confidentiality
Refers to information protection from unauthorized
read operations.

Example:
•A person withdrawing money from an ATM

* The person will hide his personal Identification Number (PIN) and ATM card

* The owner of ATM will maintain the confidentiality of this person's bank account
and balance

* The bank will maintain the confidentiality of transaction with this ATM. and the
balance change in the account
Integrity
• Refers to information protection from modifications; it involves several goals:

* Data integrity, ensuring the integrity of information with respect to the original
information.
* Origin integrity, ensuring source of the data, often referred to as authentication

* Semantic Integrity, protecting information from incorrect modifications.

Example:
• A newspaper may print information obtained from a leak at the White house, but
attributes it to the wrong source.
• This obeys data integrity.
• Violates origin integrity.
Availability

• It ensures that access to information is not denied to authorized subjects.

• Can result from power loss, operating system or application problems

• Attempts to block availability, are called denial of service attacks.

Example, SMURF attack.


Security Attack
A security attack can be explained in terms of:

• Vulnerability - Weakness that can be exploited to harm us.

• Threat - Something that has a potential to cause harm to our assets.

• Risk - Potential loss, damage, or destruction of an asset as a result of a threat


exploiting a vulnerability.

Example: A system that allows weak passwords

Vulnerability - Password is vulnerable to dictionary or exhaustive key


attacks.

Threat - An intruder can exploit the password weakness to break into the
system.

• Risk - The resources within the system are prone to illegal access/
modification/damage by the intruder.
Types of Security Attacks
The security attacks can be classified into four categories:

Interception - Allows unauthorized access to information. For example unauthorized


file viewing, eavesdropping on phone conversation (affects confidentiality)

Interruption - Causes assets to become unusable or unavailable. For example, a Dos


attack on a mail server (affects availability)

Modification - Tampering with assets. For example, accessing a file in an unauthorized


manner and altering its data (affects integrity)

Fabrication - Unauthorized access to the system and the insertion of false objects into
it. For example, gaining access to a person's email and sending messages (affects
integrity and authenticity)
E-commerce security
Security is an essential part of any transaction that takes place over
the internet. Customers will lose her/his faith in e-business if its security
is compromised. Following are the essential requirements for safe
e-payments/transactions
1. Confidentiality

2. Integrity

3. Availability

4. Authenticity:
There should be a mechanism to authenticate a user before
giving him/her an access to the required information.

5. Non-Repudiability:
It is the protection against the denial of order or denial
of payment. Once a sender sends a message, the sender should not be able to
deny sending the message. Similarly, the recipient of message should not
be able to deny the receipt.
6. Encryption:
Information should be encrypted and decrypted only by an
authorized user.

7. Auditability :
Data should be recorded in such a way that it can be audited for
integrity requirements.
Background and current scenario of information security:-
In the past maintaining the security of information was difficult.

•1960’s Password Protection


It was during 1960’s when organization first started to become to more
protective of their computer. During this time there was no internet network to
worry about so security largely focused or more physical measure and
preventing access to people with enough knowledge about how to work on
computer, In order to do this, password ever added to device.
•1970’s From CREEPER to Reaper
Cyber security began with a research project during the 1970’s
On what was then known as the ARPANET. A researcher created a computer
program which was able to move ARPANET’s network. He named the program
CREEPER because of the printed message that was left when travelling across
the network “I’M THE CREEPER : CATCH ME IF YOU CAN ”
A later designed a program which took CREEPER to the next level, making it
self-replicating and the first ever computer worm. Fortunately he wrote
another program called reaper which chased creeper and delete it providing
the first example of antivirus software
•1980’s : The Internet goes mad
Over the year that followed computer connected, computer viruses became
more advanced and info security system could not keep up.
However its ability to self replicated would be its downfall the worm replicated
so aggressively that it made computer in operable & slowed the internet down
to a crawling pace. It spread quickly throughout the network & caused untold
damage.
Robert Merries became the first person to become successfully charged under
the computer fraud and misuse act.

•1990’s : The Rise of Firewalls


With the internet becoming available to the public more and more people
began putting their personal information online because of this the criminals
stated to steal data from people & government by web .
Firewalls and anti virus programs had to be produced on a mass basis
to protect the public.
In 2014 - Yahoo experience one and the biggest data branch. In this attack a total
of 500 million Yahoo user were compromised
In 2015 - messaging app service Snap chat was exposed . Hackers posted
username, phone number and location of 4.6 million accounts.
In 2017 – Hackers stole 50M names, home address, mobile phone numbers and
emails of people who had used Uber and the driver’s license and other information
of 7 million drivers.
In 2020 - The Ministry of Information and Technology Ban 118 Chinese mobile app
majorly including Tiktok and pubg mobile. The IT mystery started the Chinese app
has been banned under the section 69A of the information technology Act the IT
industry has received many complaints from various sources about the misuse of
some mobile app available on android and IOS platform for stealing and
transmitting users data in an unauthorized manner to service that have location
outside INDIA.
Cyber Attacks

1.Virus
2. Adware
3. Trojan Horse
4. Ransomware
5. Phishing
Virus:-
A computer virus is a malicious piece of
computer code designed to spread from device
to device. A subset of malware, these self-
copying threats are usually designed to damage a
device or steal data.
A computer virus is very similar to the biological
virus . Designed to replicate relentlessly,
computer viruses infect your programs and files,
alter the way your computer operates or stop it
from working altogether.
What does a computer virus do?
Some computer viruses are programmed to harm
your computer by damaging programs, deleting
files, or reformatting the hard drive. Others simply
replicate themselves or flood a network with
traffic, making it impossible to perform any
internet activity. Even less harmful computer
viruses can significantly disrupt your system’s
performance, sapping computer memory and
causing frequent computer crashes.
Adware
What do you mean by adware?
Adware, or advertising supported software,
is software that displays unwanted
advertisements on your computer. ...
Adware uses the browser to collect your
web browsing history in order to 'target'
advertisements that seem tailored to your
interests.
What is adware in computer with example?
Adware (short for advertising-supported
software) is a type of malware that automatically
delivers advertisements. Common examples of
adware include pop-up ads on websites and
advertisements that are displayed by software. ...
Most adware is sponsored or authored by
advertisers and serves as a revenue generating
too.
Trojan horse
What is a Trojan horse on a computer?

A Trojan horse, or Trojan, is a type of malicious


code or software that looks legitimate(legal) but
can take control of your computer. A Trojan is
designed to damage, disrupt, steal, or in general
inflict(punish) some other harmful action on your
data or network. A Trojan acts like a bona fide
application or file to trick you.
Ransomware
What is ransomware and how it works?

Ransomware is a type of malicious software that


infects a computer and restricts users' access to
it until a ransom is paid to unlock it. Ransomware
variants have been observed for several years and
often attempt to extort money from victims by
displaying an on-screen alert.
Phishing:-
Phishing attacks are the practice of sending
fraudulent communications that appear to
come from a reputable source. It is usually
done through email. The goal is to steal
sensitive data like credit card and login
information, or to install malware on the
victim's machine.
Objectives
It is to recover , analyze and presents computer
based material in such a way that is useable as
evidence in a court of law.

Priorities
Absolute priority is accuracy.
Processing steps of conducting of investigation.
Step:-1. Acquisition

Acquisition of the materials from the crime scene by using


the proper hardware and software tools makes the
obtained data legal evidence.

Step:-2. Data Acquisition

Data acquisition is that the sampling of continuous world


information to get data which will be manipulated by a
computer.
Step:-3. Data Recovery

Forensic data recovery is the extraction of data from


damaged evidence sources in a forensically sound manner.

Step:-4. Forensics Analysis

Forensic digital analysis is the in-depth analysis and


examination of electronically stored information (ESI)

Step:-5. Presentation

The presentation of digital analysis includes a formal


written report on the identification of relevant information.
How is Steganography different from Cryptography?
At their core, both of them have almost the same goal, which
is protecting a message or information from the third
parties. However, they use a totally different mechanism to
protect the information.

Cryptography changes the information to ciphertext which


cannot be understood without a decryption key. So, if
someone were to intercept this encrypted message, they
could easily see that some form of encryption had been
applied. On the other hand, steganography does not change
the format of the information but it conceals the existence of
the message.
Steganography Techniques

Depending on the nature of the cover object(actual


object in which secret data is embedded),
steganography can be divided into five types:

Text Steganography
Image Steganography
Video Steganography
Audio Steganography
Network Steganography
Text Steganography

Text Steganography is hiding information inside the text


files. It involves things like changing the format of existing
text, changing words within a text, generating random
character sequences or using context-free grammars to
generate readable texts.
Example:-

I don't want any dog because they spread stink and are
not known for being great.

And find the hidden text:

“Dogs are Great”


Image Steganography

Hiding the data by taking the cover object as the image is


known as image steganography. In digital steganography,
images are widely used cover source because there are a
huge number of bits present in the digital representation of
an image.
Audio Steganography

In audio steganography, the secret message is embedded


into an audio signal which alters the binary sequence of
the corresponding audio file. Hiding secret messages in
digital sound is a much more difficult process when
compared to others, such as Image Steganography.
Video Steganography

In Video Steganography you can hide kind of data into digital


video format. The advantage of this type is a large amount
of data can be hidden inside and the fact that it is a moving
stream of images and sounds. You can think of this as the
combination of Image Steganography and Audio
Steganography.
Network Steganography (Protocol Steganography)
It is the technique of embedding information within
network control protocols used in data transmission such
TCP, UDP, etc. You can use steganography in some covert
channels that you can find in the OSI model. For Example,
you can hide information in the header of a TCP/IP packet in
some fields that are either optional.
In today’s digitalized world, various software tools are
available for Steganography.

You might also like