Cs 2
Cs 2
2.1 Introduction
Technology is a “double-edged sword” as it can be used for both good and bad purposes.
People with the tendency to cause damages or carrying out illegal activities will use it for
bad purpose.
Computers and tools available in IT are also used as either target of offense.
The criminals take advantage of the widespread lack of awareness about cybercrimes and
cyberlaws among the people who are constantly using the IT infrastructure for official and
personal purposes.
People who commit cybercrimes are known as “Crackers”
An attacker would look to exploit the vulnerabilities in the networks, most often so because
the networks are not adequately protected.
The categories of vulnerabilities that hackers typically search for are the following:
Inadequate border protection (border as in the sense of network periphery);
remote access servers (RASs) with weak access controls;
application servers with well-known exploits;
misconfigured systems and systems with default configurations.
1
CYBERSECURITY-UNIT 2
It is the single event from the perspective of the victim. For example, unknowingly open an
attachment that may contain virus that will infect the system (PC/laptop). This is known as
hacking or fraud.
5. Series of events:
This involves attacker interacting with the victims repetitively. For example, attacker
interacts with the victim on the phone and/or via chat rooms to establish relationship first and
then they exploit that relationship to commit the sexual assault.
2.2.1 Reconnaissance
The literal meaning of “Reconnaissance” is an act of finding something or somebody
(especially to gain information about an enemy or potential enemy).
In the world of “hacking,” reconnaissance phase begins with “Footprinting” – this is the
preparation toward pre-attack phase, and involves accumulating data about the target’s
environment and computer architecture to find ways to intrude into that environment.
Footprinting gives an overview about system vulnerabilities and provides a judgment about
possible exploitation of those vulnerabilities.
The objective of this preparatory phase is to understand the system, its networking ports
and services, and any other aspects of its security that are needful for launching the attack.
Thus, an attacker attempts to gather information in two phases: passive and active attacks.
Let us understand these two phases.
2
CYBERSECURITY-UNIT 2
However, it is usually done using Internet searches or by Googling (i.e., searching the
required information with the help of search engine Google) an individual or company to gain
information.
3
CYBERSECURITY-UNIT 2
4
CYBERSECURITY-UNIT 2
5
CYBERSECURITY-UNIT 2
The term was coined in 1996 by hackers who were stealing AOL Internet accounts by
scamming passwords without the knowledge of AOL users.
As hackers have a tendency of replacing “f” with “ph,” the term “Phishing” came into
being.
2. E-Mail attachments:
E-Mail attachments are used to send malicious code to a victim’s system, which will
automatically (e.g., keylogger utility to capture passwords) get executed.
Viruses, Trojans, and worms can be included cleverly into the attachments to entice a
victim to open the attachment.
3. Pop-up windows:
Pop-up windows are also used, in a similar manner to E-Mail attachments. Pop-up windows
with special offers or free stuff can encourage a user to unintentionally install malicious
software.
2.4 Cyberstalking
The dictionary meaning of “stalking” is an “act or process of following prey stealthily –
trying to approach somebody or something.”
Cyberstalking has been defined as the use of information and communications technology,
particularly the Internet, by an individual or group of individuals to harass another individual,
group of individuals, or organization.
The behavior includes false accusations, monitoring, transmission of threats, ID theft,
damage to data or equipment, solicitation of minors for sexual purposes, and gathering
information for harassment purposes.
Cyberstalking refers to the use of Internet and/or other electronic communications devices
to stalk another person.
It involves harassing or threatening behavior that an individual will conduct repeatedly, for
example, following a person, visiting a person’s home and/or at business place, making
phone calls, leaving written messages, or vandalizing against the person’s property. As the
Internet has become an integral part of our personal and professional lives, cyberstalkers take
advantage of ease of communication and an increased access to personal information
available with a few mouse clicks or keystrokes.
6
CYBERSECURITY-UNIT 2
7
CYBERSECURITY-UNIT 2
In the past several years, many instances have been reported in India, where cybercafes are
known to be used for either real or false terrorist communication.
Cybercrimes such as stealing of bank passwords and subsequent fraudulent withdrawal of
money have also happened through cybercafes.
Cybercafes have also been used regularly for sending obscene mails to harass people.
Public computers, usually referred to the systems, available in cybercafes, hold two types of
risks.
First, we do not know what programs are installed on the computer – that is, risk of
malicious programs such as keyloggers or Spyware, which maybe running at the background
that can capture the keystrokes to know the passwords and other confidential information
and/or monitor the browsing behavior.
Second, over-the-shoulder surfing can enable others to find out your passwords. Therefore,
one has to be extremely careful about protecting his/her privacy on such systems, as one does
not know who will use the computer after him/her.
Indian Information Technology Act (ITA) 2000, does not define cybercafes and interprets
cybercafes as “network service providers” referred to under the Section 79, which imposed
on them a responsibility for “due diligence” failing which they would be liable for the
offenses committed in their network.
Cybercriminals prefer cybercafes to carry out their activities.
The criminals tend to identify one particular personal computer (PC) to prepare it for their
use.
Cybercriminals can either install malicious programs such as keyloggers and/or Spyware or
launch an attack on the target.
Cybercriminals will visit these cafes at a particular time and on the prescribed frequency,
maybe alternate day or twice a week.
A recent survey conducted in one of the metropolitan cities in India reveals the following
facts:
1. Pirated software(s) such as OS, browser, office automation software(s) (e.g., Microsoft
Office) are installed in all the computers.
2. Antivirus software is found to be not updated to the latest patch and/or antivirus signature.
3. Several cybercafes had installed the software called “Deep Freeze” for protecting the
computers from prospective malware attacks. Deep Freeze can wipe out the details of all
activities carried out on the computer when one clicks on the “restart” button. Such practices
present challenges to the police or crime investigators when they visit the cybercafes to pick
up clues after the Interet Service Provider (ISP) points to a particular IP address from where a
threat mail was probably sent or an online Phishing attack was carried out, to retrieve logged
files.
4. Annual maintenance contract (AMC) found to be not in a place for servicing the
computers; hence, hard disks for all the computers are not formatted unless the computer is
down. Not having the AMC is a risk from cybercrime perspective because a cybercriminal
can install a Malicious Code on a computer and conduct criminal activities without any
interruption.
8
CYBERSECURITY-UNIT 2
5. Pornographic websites and other similar websites with indecent contents are not blocked.
6. Cybercafe owners have very less awareness about IT Security and IT Governance.
7. Government/ISPs/State Police (cyber cell wing) do not seem to provide IT Governance
guidelines to cybercafe owners.
8. Cybercafe association or State Police (cyber cell wing) do not seem to conduct periodic
visits to cybercafes – one of the cybercafe owners whom we interviewed expressed a view
that the police will not visit a cybercafe unless criminal activity is registered by filing an First
Information Report (FIR). Cybercafe owners feel that police either have a very little
knowledge about the technical aspects involved in cybercrimes and/or about conceptual
understanding of IT security.
There are thousands of cybercafes across India. In the event that a central agency takes up the
responsibility for monitoring cybercafes, an individual should take care while visiting and/or
operating from cybercafe. Here are a few tips for safety and security while using the
computer in a cybercafe:
1. Always logout 2. Stay with the computer 3. Clear history and temporary fi les 4. Be alert
5. Avoid online financial transactions 6. Change passwords 7. Use Virtual keyboard 8.
Security warnings
9
CYBERSECURITY-UNIT 2
10
CYBERSECURITY-UNIT 2
the payload is sometimes considered to include that part of the overhead data that this layer
handles.
The attack vectors described here are how most of them are launched.
1. Attack by E-Mail: The content is either embedded in the message or linked to by the
message. Sometimes attacks combine the two vectors, so that if the message does not get you,
the attachment will. Spam is almost always carrier for scams, fraud, dirty tricks, or malicious
action of some kind. Any link that offers something “free” or tempting is a suspect.
2. Attachments (and other files): Malicious attachments install malicious computer code.
The code could be a virus, Trojan Horse, Spyware, or any other kind of malware.
Attachments attempt to install their payload as soon as you open them.
3. Attack by deception: Deception is aimed at the user/operator as a vulnerable entry point.
It is not just malicious computer code that one needs to monitor. Fraud, scams, and to some
extent Spam, not to mention viruses, worms and such require the unwitting cooperation of the
computer’s operator to succeed. Social engineering are other forms of deception that are often
an attack vector too.
4. Hackers: Hackers/crackers are a formidable attack vector because, unlike ordinary
Malicious Code, people are flexible and they can improvise. Hackers/crackers use a variety
of hacking tools, heuristics, Cyberoffenses: How and social engineering to gain access to
computers and online accounts. They often install a Trojan Horse to commandeer the
computer for their own use
5. Heedless guests (attack by webpage): Counterfeit websites are used to extract personal
information. Such websites look very much like the genuine websites they imitate. One may
think he/she is doing business with someone you trust. However, he/she is really giving their
personal information, like address, credit card number, and expiration date. They are often
used in conjunction with Spam, which gets you there in the first place. Pop-up webpages may
install Spyware, Adware or Trojans.
6. Attack of the worms: Many worms are delivered as E-Mail attachments, but network
worms use holes in network protocols directly. Any remote access service, like file sharing, is
likely to be vulnerable to this sort of worm. In most cases, a firewall will block system
worms. Many of these system worms install Trojan Horses.
7. Malicious macros: Microsoft Word and Microsoft Excel are some of the examples that
allow macros. A macro does something like automating a spreadsheet, for example. Macros
can also be used for malicious purposes. All Internet services like instant messaging, Internet
Relay Chart (IRC), and P2P fi le-sharing networks rely on cozy connections between the
computer and the other computers on the Internet. If one is using P2P software then his/her
system is more vulnerable to hostile exploits.
8. Foistware (sneakware): Foistware is the software that adds hidden components to the
system with cunning nature. Spyware is the most common form of foistware. Foistware is
partial- legal software bundled with some attractive software. Sneak software often hijacks
your browser and diverts you to some “revenue opportunity” that the foistware has set up.
9. Viruses: These are malicious computer codes that hitch a ride and make the payload.
Nowadays, virus vectors include E-Mail attachments, downloaded files, worms, etc
11