Computer Security Chapter 5
Computer Security Chapter 5
5.Cyber Security
5.1
Note: (Don’t go at deep for all the below topics till 5.2)
Hacking :
Every act committed toward breaking into a computer and/ or network is known as
hacking.
Hacking is the process of finding some security holes in a computer system or network in
order to gain access to personal or corporate information.
One example of computer hacking is the use of a password cracking technique to gain
access to a computer system.
The process of gaining illegal access to a computer system, or a group of computer systems,
is known as hacking.
Types of Hacking/Hackers:
1. Ethical Hacking (White Hat Hacking):
Ethical hackers, also known as white hat hackers, are individuals or security professionals
who use their hacking skills for legitimate, lawful purposes.
They may be employed by organizations to identify vulnerabilities in their systems,
networks, or applications and help patch those vulnerabilities before malicious hackers
can exploit them.
Ethical hacking is an important part of cybersecurity as it helps improve the security of
systems.
2. Malicious Hacking (Black Hat Hacking):
Malicious hackers, or black hat hackers, engage in hacking activities with malicious intent.
They may seek financial gain, steal sensitive information, or disrupt services. T
his type of hacking is illegal and can result in criminal charges.
Cracking :
Cracking is a technique used to breach computer software or an entire computer security system,
and with malicious intent.
Cracking is the process of gaining unauthorized access with the intention of causing damage.
while hacking truly applies only to activities having good intentions.
Types of Cracking
- Password Cracking
- Software cracking
- Network cracking
- Application cracking
- Wireless cracking
Pornography :
Pornography means an act by using cyberspace to create, display, distribute, import, or publish
obscene materials, especially materials related to children who are engaged in sexual acts with
adults.
This term refers to any visual representation, including but not limited to:
1. Any photograph that can be considered obscene and/ or unsuitable for the age of child viewer.
2. Film ,video, picture.
3. Obscene Computer generated image or picture.
Software Piracy :
Software piracy is the illegal and unethical act of unauthorized copying, distribution, or use of
software without proper licenses or permissions, violating intellectual property rights and causing
severe consequences.
Types of Software Piracy:
1. End-User Piracy: This occurs when an individual or organization uses unauthorized copies
of software without the appropriate licenses. It includes using a single licensed copy on multiple
computers or obtaining and using software without a valid license.
2. Hard-Disk Loading: This happens when a computer vendor or reseller pre-installs
unauthorized copies of software on computers they sell, without obtaining the necessary licenses.
3. Counterfeiting: This involves creating fake or counterfeit copies of software, often with the
intent to sell them as genuine products.
4. Internet Piracy: The unauthorized distribution and downloading of software from the
internet, often through torrent sites or file-sharing networks, is a common form of software piracy.
Intellectual Property :
Intellectual property (IP) refers to legal rights that are granted to individuals or entities for their
creations or inventions of the mind.
Intellectual property is a form of protection that allows creators, inventors, and innovators to
have exclusive rights to their work to make it unlawful to copy or reuse that work without the
owner’s permission. It is a part of property law.
There are numerous types of tools of protection that come under the term “intellectual property”.
Notable among these are the following:
1. Copyright: Copyright protects original works of authorship, such as literary works, music, art, and
software. It gives creators the exclusive right to reproduce, distribute, and display their works.
Copyright protection typically lasts for the life of the creator plus 50 to 70 years.
2. Trademark: Trademarks protect symbols, names, and slogans used to identify and distinguish
goods and services. This helps consumers identify the source or origin of products. Trademarks
are renewable as long as they are in use.
3. Patent: Patents protect inventions or discoveries, granting the inventor exclusive rights to make,
use, and sell the invention for a specified period (usually 20 years). In return, inventors must
disclose their invention to the public.
4. Industrial Design Rights: These rights protect the visual design of objects, such as the shape or
surface of a product.
5. Database Rights: In some jurisdictions, there are rights associated with the compilation and
maintenance of databases.
Advantages of Intellectual Property Rights
- It provides exclusive rights to the creator’s or inventor’s.
- It gives freedom to inventor to share his knowledge without keeping its secret.
- It helps to creator financially.
- It provides legal defence to the creator.
Mail Bombs :
A "mail bomb," also known as an "email bomb" or "letter bomb" (not to be confused with a
physical explosive device sent via postal mail).
Itis a form of cyberattack in which an individual or group sends a massive volume of emails to a
specific email address or domain with the intent of overwhelming the recipient's email server and
disrupting their email service.
This can have serious consequences, including making the email system unusable for the intended
recipient or causing network congestion.
Volume: In a mail bomb attack, a large number of emails are sent to the target's email address,
typically in a short period of time. This volume can vary, but it is generally enough to cause
problems for the recipient's email server or client.
Intent: The intent behind a mail bomb is often malicious. Attackers may want to disrupt the
target's email service, overwhelm their inbox, or cause inconvenience and frustration.
Denial of Service (DoS): A mail bomb is a type of Denial of Service (DoS) attack. By flooding the
recipient's email system with messages, the attacker aims to render it temporarily or even
permanently unavailable.
Bug Exploits :
"Bug exploits," often referred to as "exploits, is a piece of code, a chunk of data, or a sequence of
commands that takes advantage of a software vulnerability or security flaw in an application or a
system to cause unexpected behaviour to occur.
Exploits are used to gain unauthorized access, control, or manipulate a computer system,
application, or network.
They can be used for various purposes, including spreading malware, stealing data, disrupting
services, or gaining control over a compromised system.
Exploits take advantage of a security flaw in an operating system, computer system, Internet of
Things (IoT) device, piece of software or other security vulnerability.
Once an exploit has been used, it becomes known to the software developers of the vulnerable
system, often fixed through a patch, and becomes unusable.
Cyber law, also known as cybercrime law or IT (Information Technology) law, is a branch of legal
studies and regulations that specifically addresses legal issues related to the use of digital
technology, the internet, and computers. Cyber law encompasses a wide range of topics and
concerns.
These laws aim to establish guidelines for internet activities,protect digital assets and combat (to
struggle againts) cybercrimes.
Two significant pieces of legislation in India that provide the legal founadation for addressing
cyber related issues are the information technology Act, 2000 and its subsequent amendment in
2008.
Cyber Law also called IT law is the law regarding information technology including computers and
internet.
Cyber Law is the law governing cyber space. Cyber space is a very wide term and includes
computers, networks, software, data storage devices (such as hard disks, USB disks etc), the
Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc.
Cyber law encompasses laws relating to:
1. Cyber Crimes
2. Electronic and Digital Signatures
3. Intellectual Property
4. Data Protection and Privacy
Cyber forensics, also known as digital forensics, is the process of collecting, preserving,
analyzing and presenting electronic evidence in order to investigate and prevent cybercrimes
and other digital incidents.
Determining the past actions that have taken place on a computer system using computer
forensic techniques .
It encompasses various areas such as Computer Forensic, Network Forensics, and Mobile
Device Forensics.
Objectives:
Forensic Tools :
Forensic tools, also known as digital forensics tools, are specialized software applications and
hardware devices used by digital forensic investigators and cybersecurity professionals to collect,
preserve, analyze, and present electronic evidence during investigations.
Here are some common types of forensic tools and their functionalities:
1. EnCase (Disk Imaging Tool) :
- A popular commercial tool for creating forensic images of disks and analyzing data.
Forensic Techniques :
Cyber forensic techniques, also known as digital forensic techniques, are methods and procedures
used by digital forensic investigators to collect, preserve, analyze, and interpret electronic
evidence in a systematic and legally sound manner. Here are some common cyber forensic
techniques:
1. Reverse-steganography :
The process of attempting to hide data inside a digital message or file is called steganography.
Reverse-steganography happens when computer forensic specialists look at the hashing of a
message or the file contents.
A hashing is a string of data, which changes when the message or file is interfered with.
2. Evidence Collection:
Collecting electronic evidence from various sources, including hard drives, memory, network logs,
and cloud storage.
Using specialized forensic tools to create forensic images and acquire data from digital devices.
3. Data Recovery:
Employing data recovery techniques to retrieve deleted, damaged, or hidden data, such as files or
database records.
4. Memory Analysis:
Examining the contents of computer memory (RAM) to identify running processes, malware, open
files, and system activity.
5. Malware Analysis:
Dissecting (study in detail) and analyzing malicious software (malware) to understand its
6. Keyword Searching:
the investigation.
Cybercrime investigations focus on collecting digital evidence, preserving the integrity of that
evidence, and understanding how cybercrimes occurred.
Here are the key steps involved in investigating a cybercrime scene:
1. Preservation of Evidences:
It's crucial to ensure that digital evidence is preserved in a forensically sound manner and isolating
them to prevent alteration of evidence.
2. Documentation:
Document the physical and digital environment, including photographs, sketches, and descriptions of
the crime scene. Take note of the hardware, network configurations, and any signs of intrusion or
unauthorized access.
3. Chain of Custody:
Establish and maintain a clear chain of custody for all digital evidence. Document who handles the
evidence, when, and what actions are taken.
4. Imaging:
Creating forensic images of storage media to preserve Data integrity. During the image process it is
insured that no changes are made to the original data.
Rules of Evidence :
Admissable(accepted): Digital evidence must met certain criteria to be admissable in court. It
should be relevant authentic and not hearsay(unverified).
Hearsay Rule : Hearsay is generally not admissible. Hearsay is an out-of-court statement offered
for the truth of the matter asserted.
Relevance: Evidence must be relevant to the case at hand. It should have a logical connection to
the facts in dispute, helping to prove or disprove an issue in the case.
Expert Testinomy: In many cases, a qualified cyber forensic expert is required to present and
explain the digital evidence to the court.
Best Evidence Rule: The best evidence rule requires that the original document or the best
available evidence be presented in court. Copies or secondary evidence may be admitted if the
original is unavailable.