Module 1 - Introduction To Cyber Security
Module 1 - Introduction To Cyber Security
Cyber Security
(SEIT4530)
Books
4
• Networks • Policy Makers
• Application Servers • Technologists
• Laptops • Criminals
• Smart Phones
• Social Activists
• Sensors
• Intelligence Operatives
• Database, etc.
• Hobbyists, etc.
11
• Security: We must protect our computers and data • Cybercrime can be defined as “The illegal usage of any communication device
in the same way that we secure the doors to our to commit or facilitate in committing any illegal act”.
homes. • A cybercrime is explained as a type of crime that targets or uses a computer or
• Safety: We must behave in ways that protect us a group of computers under one network for the purpose of harm.
against risks and threats that come with • Cybercrimes are committed using computers and computer networks. They
technology. can be targeting individuals, business groups, or even governments.
• Investigators tend to use various ways to investigate devices suspected to be
used or to be a target of a cybercrime.
Cyber Crime Classification of Cyber Crimes
• The term cyber crime is used to describe a unlawful activity in which • The cyber criminal could be internal or external to the organization
computer or computing devices such as smartphones, tablets, Personal facing the cyber attack.
Digital Assistants(PDAs), etc. which are stand alone or a part of a
1. Insider Attack
network are used as a tool or/and target of criminal activity.
2. Outsider Attack
• It is often committed by the people of destructive and criminal mindset
either for revenge, greed or adventure.
• An attack to the network or the computer system by some person with • When the attacker is either hired by an insider or an external entity to the
authorized system access is known as insider attack. organization, it is known as external attack.
• It is generally performed by dissatisfied or unhappy inside employees or • The organization which is a victim of cyber attack not only faces financial loss
contractors. The motive of the insider attack could be revenge or greed. but also the loss of reputation.
• It is comparatively easy for an insider to perform a cyber attack as he is well • Since the attacker is external to the organization, so these attackers usually scan
aware of the policies, processes, IT architecture and weakness of the security and gathering information.
system.
Reasons for Commission of Cyber Crimes Reasons for Commission of Cyber Crimes
1. Money: People are motivated towards committing cyber crime is to make quick 5. Anonymity- Many time the anonymity that a cyber space provide motivates the
and easy money. person to commit cyber crime as it is much easy to commit a cyber crime over
2. Revenge: Some people try to take revenge with other the cyber space and remain anonymous as compared to real world. It is much
person/organization/society/ caste or religion by defaming its reputation or easier to get away with criminal activity in a cyber world than in the real world.
bringing economical or physical loss. This comes under the category of cyber There is a strong sense of anonymity than can draw otherwise respectable
terrorism. citizens to abandon their ethics in pursuit personal gain.
3. Fun: The amateur do cyber crime for fun. They just want to test the latest tool 6. Cyber Espionage: At times the government itself is involved in cyber
they have encountered. trespassing to keep eye on other person/network/country. The reason could
4. Recognition: It is considered to be pride if someone hack the highly secured be politically, economically socially motivated.
networks like defense sites or networks.
17 18
• The Internet Governance Forum (IGF) network is a multistakeholder
policy platform, initiated by the United Nations with the aim of
exchanging information and sharing good policies and practices
relating to the Internet and technologies.
• It brings together representatives of various stakeholders and social
groups on online governance, in particular governments, the private
sector and civil society, including the technical and academic
community, and promotes dialogue and policy-making
internationally.
39 69
• Unethical Hacking:
Ethical Hacking Unethical Hacking When a hacker uses his knowledge to steal from or
cause damage to other people ,it is known as
unethical hacking
41 42
• A hacker is a person who breaks into a computer • A criminal who uses and manipulates technology
with vicious and often illegal intent and for their
system Hackers
personal profit .
Black Hat Hackers White Hat Hackers Grey Hat Hackers • They are sometimes called crackers.
• They are also called penetration tester. • A hacker that is not necessarily
malicious but blurs the line between
black and hat hacker.
• They purposely attempt to hack client
systems to find weaknesses which they • They use their talents in the same as
then report to their company. white hat hackers but without the
permission of their company.
• They are hired by businesses to handle
cyber security. • Once they discover weaknesses they
will offer to sell them back to the
hacked party..
45 46
What cause vulnerabilities
Hacker Cracker •Vulnerabilities can arise from a wide variety of sources.
•Misconfigurations, bugs, or unauthorized use are more likely in complex systems.
People who gain unauthorized Someone who breaks into
access to computer system for computers , often does harmful •Consistency − Attackers may be able to predict and exploit flaws in widely used
knowledge or to discover things such as steal credentials. code, operating systems, hardware, and software.
•Connectivity makes gadgets more susceptible to security flaws.
Does not work against law and Work against the law and
•Weak or repeated passwords increase the risk of multiple data breaches.
does not damage data damages data intentionally
intentionally •Operating System Flaws − Operating systems are not immune to having problems.
Operating systems that aren't properly protected by design are
Referred as White Hats Referred as Black Hats
vulnerable to viruses and malware since they provide users
Have good ethics , improve and Have poor ethics , shutdown or unrestricted access.
make system advance. Harm systems 47
all over the internet. compromise assets. All systems have vulnerabilities. Even though the technologies are
improving but the number of vulnerabilities are increasing such as tens of millions of lines
•Bugs in Software Development- It is not uncommon for programmers to
of code, many developers, human weaknesses, etc.
inadvertently introduce a security flaw.
•Unchecked user input − If a piece of software or a website treats all user input as • Types of Vulnerabilities
trustworthy, it may execute an accidental SQL injection. 1. Hardware Vulnerability
•Most companies face their greatest security risk from their employees, making 2. Software Vulnerability
3. Network Vulnerability
social engineering a top concern. This suggests that people can be a major
4. Procedural Vulnerability
source of danger.
Hardware Vulnerability Software Vulnerability
64 65
68 25
• Warms can replicate themselves like • Trojan horse is a malicious code that is installed in
Virus. the host machine by pretending to be useful
• They does not require human intervention to software.
travel over the network and spread from the • The user clicks on the link or download the file
infected machine to the whole network. which pretends to be a useful file or software from
legitimate source.
• Worms can spread either through network,
using the loopholes of the Operating System • It not only damages the host computer by
or via email. The replication and spreading of manipulating the data but also it creates a
the worm over the network consumes the backdoor in the host computer so that it could be
network resources like space and bandwidth controlled by a remote computer.
and force the network to choke.
• Trojens neither infect the other computers in
70 the network nor do they replicate. 71
• It is a special type of which is installed in the target • It is a special type of malware which is used for
computer with or without the user permission forced advertising. They either redirect the page
and is designed to steal sensitive information from to some advertising page or pop-up an additional
the target machine. page which promotes some product or event.
• Mostly it gathers the browsing habits of the user and • These adware are financially supported by the
the send it to the remote server without the organizations whose products are advertised.
knowledge of the owner of the computer.
72 73
• It has even changed the way how the criminal • It hijacks the setting of all browsers like
target the people for ransom. Homepage, New tab and default search
engine.
• The malicious code can neither be uninstalled nor
can the computer be used till the ransom is paid.
74 75
• By mail attachments (Spam Mail). • Avoid clicking on untrusted Links.
• By downloading cracked version. • Avoid downloading attachments from unknown senders.
• By visiting untrusted websites. • Install updates re g ularly to make your system up to date
• By clicking adds. and to solve security patches.
• Use anti virus software.
• Use updated firewall.
76 77
• Update password
• Update passwords in regular intervals.
• John the ripper
• Password should not be the same for everything. • Hydra tool:
• Enforce strong password policies • Hashcat
• When setting password , best practices should be followed with a generous
use of alpha numeric.
• Mesusa
• CeWL tool:
• Enable Multifactor Authentication
• It involves use of password with extra security checks. E.g., One-Time
• Cain & Abel
Password (OTP), biometric authentication, software tokens, and behavioral
analysis. • Ophcrack
• Use No Dictionary
• ncrack etc
• It’s always a great idea to use a password that makes no sense for passwords. 39
82
• Botnets are workhorses of the • DDos stands for distributed denial of service attack.
internet. • It is a cyber attack on a specific server or network.
• A botnet is a number of internet-
connected devices, each of which
runs one or more bots.
84 85
• Volume attack
• Protocol attack
• In volume attack, attackers overflow the website with malicious • Protocol or network-layer DDoS attacks send large numbers of
traffic. packets to targeted network infrastructures and infrastructure
management tools.
• This attack is initiated by forwarding a huge number of UDP, I C M P • Protocol attacks mainly utilize layers 3 and 4 of the protocol
and HTTP (GET and POST) flood packets. stack to make the target not been accessed. These attacks
consume the state capacity of web servers, firewalls and load
• In this attack continuously requests can been send called pings. balancer etc.
• Volume attacks consume to use the bandwidth of target and
• Protocol assaults, also known as state-exhaustion attacks, disrupt
service by consuming too many servers and network
internet networks. equipment resources.
90 91
• Application layer attack : • Traffic Analysis to detect any unusual traffic on network.
• This attack is low and slow.
• Traffic control by employ load balancers(reroute traffic to other
• Application attacks Some of the more sophisticated DDoS attacks, servers and prevent any one server to failure) and firewalls (blocks
these exploit weaknesses in the application layer by opening unwanted traffic).
connections and initiating process and transaction requests that
consume finite resources.
• DDoS attacks on the application layer do not target network • Detect an attack early (by filtering the traffic) and mitigate the
damage beyond that.
bandwidth. Rather, these attacks focus on the application layer 7 of
the OSI model hosting the service that end-users are browsing.
• The slow-rate cyberattacks are aimed at the layer that produces • Switch to cloud service providers like AWS and Azure.
webpages on the domain controller and delivers them in response to
HTTP. 48
• Allocate more bandwidth to prevent clogging of data. 49
Do not save credit card details to any shopping site to protect yourself.
98 99
• Malvertising, or malicious advertising, is the term for
criminally controlled advertisements within Internet
connected programs, usually web browsers, which
intentionally harm people and businesses with all manner of
malware, potentially unwanted programs (PUPs), and assorted
scams.
100 101
• By using Ad-blocker
• By using regular software updates
• Common sense to avoid any scam
102 103
• A drive-by download attack refers to the unintentional
download of malicious code to your computer or mobile device
that leaves you open to a cyberattack.
104 61
110 111
• Updated Firewall • Cyber warfare is the use of technology to attack a nation,
causing comparable harm to actual warfare, disruption of vital
• Use efficient and well-known Antivirus computer systems and loss of life.
• General Distrust
• Smart Clicking
112 113
Hacktavism
Military
• Hacktivism involves hackers using cyberattacks to promote an ideology.
• It is in the military’s best interests to gain control of key Hacktivists can engage in cyber warfare by spreading propaganda or
elements of an enemy nation’s cyberspace. An going after secrets and then exposing them to the rest of the world. In these
effective cyberattack could bring an enemy country’s military to ways, hacktivists can weaken an opponent’s standing on the world
its knees and secure what would have been an otherwise costly stage, precluding support from other countries.
victory.
Income Generation
• Cybe r warfare “soldiers” can engage in these kinds of attacks for their
Civil own financial benefit. If they are employed by the government, they can
• Attacking the civil infrastructure of a nation directly impacts the earn a fee for their services. Further, they could break the defenses of a
people living and working in the country. This could be used financial institution and steal money for themselves.
to inspire fear or cause them to revolt against the government in
protest, weakening the opponent from a political114standpoint. 79
• It is crimes of terrorism which occur electrically.
Nonprofit Research
• Cyber Terrorism is basically the process of causing harm to the community
• Nonprofit research often reveals very valuable information by making use of Internet networks to conduct violent incidents like loss of
that a country can use to solve a critical problem. life or data, to achieve some political advantage by giving threats.
• A cyber terrorism attack is much more harmful than a normal cybercrime
because to intentional harm to the victims and it may not cause financial
• For example, if a country is trying to develop a vaccine and damage to cause fear in society.
another one already has it, cyber warfare could be used to
• In most cases, the criminals target the banking industry, military power,
steal information pertaining to their solution. nuclear power plants, air traffic control, and water control sectors for
making a cyber terrorism attack for creating fear, critical infrastructure
failure, or for political advantage.
116 117