UNIT_1_CYS
UNIT_1_CYS
Engineering &Technology
Dr.K.Srinivas
⚫
misdirection of the services they provide
▪
⚪
What is network security?
▪ protection of the access to files and directories in a computer network
⚫
against hacking, misuse and unauthorized changes to the system.
▪
⚪
What is meant by cyber security?
▪ techniques to protect computers, networks, programs and data from
unauthorized access or attacks that are aimed for exploitation
▪ • Cyber security is the most concerned and matter as cyber threats and
attacks
▪ overgrowing.
▪ • Attackers are now using more sophisticated techniques to target the
systems.
▪ • Individuals and small scale businesses and large scale businesses all are
being
▪ impacted.
▪ • So all these are understood the importance of cyber security and adopting
all
▪ possible measures to deal with cyber threats
⚫
ways.
▪
⚪
Availability
▪ Assets are accessible to authorized parties
their operations. Active attack involve some modification of the data stream or
Attacks
▪
⚫
Hardware vulnerabilities
▪
⚫
Software vulnerabilities
▪
⚫
Data vulnerabilities
▪ Human vulnerabilities
▪ • The ability of a computer system to ensure that the authorized user has
▪ used the file. Only the authorized system or user can use the information in
▪ files.
▪ • Standard measures to guarantee availability include:
▪ Backing up data to external drives
▪ Implementing firewalls Having backup power
▪ supplies
▪ Data redundancy is a condition created within a database or data storage
▪ technology in which the same piece of data is held in two separate places.
▪ This can mean two different fields within a single database
⚫
that an organization uses to do computing tasks
▪ Any piece of the computing system can become the target of a computing
crime.
▪ Software Vulnerabilities
▪
⚫
Destroyed (deleted) software
▪
⚫
Stolen (pirated) software
▪
⚪
Altered (but still run) software
▪
⚪
Logic bomb
▪
⚪
Trojan horse
▪
⚪
Virus
▪
⚪
Trapdoor
▪ Information leaks
⚫
that will set off a malicious function when specified conditions are met.
▪ For example, a programmer may hide a piece of code that starts deleting
files (such as a salary database trigger), should they ever be terminated from
the company
▪ Trojan horse, or Trojan, is any malicious computer program which is used
⚫
to hack into a computer by misleading users of its true intent.
▪ It is a program designed to breach the security of a computer system while
ostensibly performing some innocuous function
▪ A computer virus is a malware that, when executed, replicates by
⚫
reproducing itself or infecting other programs by modifying them.
▪ Infecting computer programs can include as well, data files, or the boot
⚫
sector of the hard drive.
▪ When this replication succeeds, the affected areas are then said to be
"infected
⚫
a product, computer system, cryptosystem or algorithms, etc.
▪ Backdoors are often used for securing unauthorized remote access to a
computer, or obtaining access to plaintext in cryptographic systems.
▪ Security
❖ System security
❖ Security for Programs or data
❖ Network security
❖ Confidentiality
❖ Integrity
❖ Availability
▪
▪ Unauthorized user HE123LLO23
▪
Availability
All criminal activities done using the medium of computers, the Internet,
cyberspace and the WWW.
2 layers of security
2 layers of security
The 7 layers of cybersecurity should center on the mission critical assets
you are seeking to protect.
1. Mission Critical Assets – This is the data you need to protect*
2. Data Security – Data security controls protect the storage and
transfer of data.
3. Application Security – Applications security controls protect access to
an application, an application’s access to your mission critical assets,
and the internal security of the application.
4. Endpoint Security – Endpoint security controls protect the
connection between devices and the network.
5. Network Security – Network security controls protect an
organization’s network and prevent unauthorized access of the
network.
6. Perimeter Security – Perimeter security controls include both the
physical and digital security methodologies that protect the business
overall.
7. The Human Layer – Humans are the weakest link in any cybersecurity
posture. Human security controls include phishing simulations and
access management controls that protect mission critical assets from
a wide variety of human threats, including cyber criminals, malicious
insiders, and negligent users.
2 layers of security
• 7 layers of cyber security
• • 1: Mission Critical Assets – This is the data you need to
• protect
• • 2: Data Security – Data security controls protect the
• storage and transfer of data.
• • 3: Application Security – Applications security controls
• protect access to an application, an application’s access
• to your mission critical assets, and the internal security
• of the application.
• • 4: Endpoint Security – Endpoint security controls protect
• the connection between devices and the network
2 layers of security
• 5: Network Security – Network security controls protect an
• organization’s network and prevent unauthorized access of the
• network.
• • 6: Perimeter Security – Perimeter security controls include
• both the physical and digital security methodologies that
• protect the business overall.
• • 7: The Human Layer – Humans are the weakest link in any
• cyber security posture. Human security controls include
• phishing simulations and access management controls that
• protect mission critical assets from a wide variety of human
• threats, including cyber criminals, malicious insiders, and
• negligent users.
Cyber threats
• Cyber threats : are security incidents or circumstances
• with the potential to have a negative outcome for
• your network or other data management systems.
• • Examples of common types of security threats
include
• phishing attacks that result in the installation of
• malware that infects your data, failure of a staff
• member to follow data protection protocols that
• cause a data breach, or even a tornado that takes
• down your company’s data headquarters, disrupting
• access.
SECURITY VULNERABILITIES, THREATS
AND
ATTACKS
• Vulnerabilities are the gaps or weaknesses in a
• system that make threats possible and tempt
• threat actors to exploit them.
• Categories of vulnerabilities
• • Corrupted (Loss of integrity)
• • Leaky (Loss of confidentiality)
• • Unavailable or very slow (Loss of availability)
• • Threats: represent potential security harm to an
• asset when vulnerabilities are exploited
Computer criminals
• Computer criminals have access to enormous
• amounts of hardware, software, and data.
• • We say computer crime is any crime
involving
• a computer so,to protect ourselves, our
• businesses, and our communities against
• those who use computers maliciously
Attacks are threats that have been
carried
out
• Active and Passive Attacks are security attacks.
• • In Active attack, an attacker tries to modify the content of
• the messages.
• • Whereas in Passive attack, an attacker observes the
• messages, copy them and may use them for malicious
• purposes.
• • Insider attack – An insider threat is a security risk that
• originates from within the targeted organization.
• • It typically involves a current or former employee or
• business.
• • Outsider attack– Initiated from outside the perimeter
Active attack
• An active attack is probing the network.
• They gather information like IP addresses, OS
type & version etc.
• In computer security, persistent attempt to
introduce invalid data into a system to
damage the data.
• It is treated as a criminal offense in many
countries.
ACTIVE ATTACK
Motive of Attackers
• Examples:
• Any of the most common methods of cyber misconduct,
including infecting a computer system with malware,
holding it hostage with ransomware, disabling it with a
flood of messages (also-called denial of service attack) or
hacking data for the purpose of espionage.
What is the main purpose of cyber
warfare?
• Cyberwarfare refers to the use of digital
attacks -- like computer viruses and hacking --
by one country to disrupt the vital computer
systems of another, with the aim of creating
damage, death and destruction.
Cybercrime
• Cybercrime is an illegal behaviour directed by
means of electronic operations that targets the
security of computer systems & data processed
by them.
• They are also called as,
• Computer related crime
• Internet crime
• E-crime
• High tech crime
TYPES OF CYBER CRIME
• Hacking
• 2. Child pornography
• 3.Child grooming
• 4.Copyright infringement
• 5.Money laundering
• 6. Cyber-extortion
Cyber Threats-Cyber Warfare
• :Cyber warfare refers to the use
• of digital attacks -- like computer viruses and hacking -- by one
• country to disrupt the vital computer systems of another, with
• the aim of creating damage, death and destruction.
• • Future wars will see hackers using computer code to attack an
• enemy's infrastructure, fighting alongside troops using
• conventional weapons like guns and missiles.
• • Cyber warfare involves the actions by a nation-state or
• international organization to attack and attempt to damage
• another nation's computers or information networks through,
• for example, computer viruses or denial-of-service attacks
Cyber Crime:
• • 1) It increases efficiency.
• • 2) It upholds discipline and accountability
• • 3) It can make or break a business deal
• • 4) It helps to educate employees on security
• literacy
Firewall Policy:
Department of Computer Science & Engineering, VNRVJIET, Hyderabad February 4, 2025 140
ACTIVE ATTACKS
▪ Examples of active attacks
▪ Man-in-the-middle (MitM)
▪ An attacker intercepts and alters messages between two parties without
their knowledge.
▪ Denial of service (DoS)
▪ An attacker sends a large number of illegitimate requests to a system,
network, or service, making it inaccessible.
Department of Computer Science & Engineering, VNRVJIET, Hyderabad February 4, 2025 141
ACTIVE ATTACKS
▪ Malware infection
▪ An attacker uses malicious software, such as a virus, worm, or Trojan, to gain
control of a system.
▪ Password attacks
▪ An attacker attempts to guess or crack passwords to gain access to a system
or account.
▪ Spoofing attacks
▪ An attacker impersonates a trusted entity, such as a website, email, or IP
address, to trick users into revealing sensitive data
Department of Computer Science & Engineering, VNRVJIET, Hyderabad February 4, 2025 142
passive a acks
▪ Examples of passive a acks Eavesdropping on unencrypted
communications, Exploiting weak passwords, Analyzing network
tra c for sensitive information, Installing a keylogger to record user
credentials, and Using a packet analyzer program to record network
data.
Department of Computer Science & Engineering, VNRVJIET, Hyderabad February 4, 2025 143
Techno – vandalism: Passive a ack
❖ These are brainless defacement of websites and other activities, such as copying files
and publicizing their contents publicity.
❖ Tight internet security, strong technical safeguards, should prevent these incidents
Department of Computer Science & Engineering, VNRVJIET, Hyderabad February 4, 2025 144
Lack of information securitygive rise to cybercrime
Cybersecurity: means protecting information, equipment, devices,
computer, computer resource, communication device and
information stored therein from unauthorized access, use, disclosure,
disruption, modi cation ordestruction
Department of Computer Science & Engineering, VNRVJIET, Hyderabad February 4, 2025 145
▪ CYBER SPACE
❖ Cyber space is a nebulous place where humans interact over computer
network.
❖ Cyber space is a world wide network of computer networks that uses
Transmission Control Protocol/Internet Protocol(TCP/IP) for communication
to facilitate transmission and exchange of data.
❖ It is a place where you can chat,explore,research and play.
Department of Computer Science & Engineering, VNRVJIET, Hyderabad February 4, 2025 146
Cyber squatting
❖ Squatting is the act of occupying an un occupied space that the squatter
does not own, rent or have permission to use.
❖ Domain names are being paid for by the cyber squatters through registration
process.
❖ It is an act of registering a popular internet address, usually a company name
❖ EX: amazon.nice.com
Department of Computer Science & Engineering, VNRVJIET, Hyderabad February 4, 2025 147
3.Cyberpunk and Cyberwarfare
❖ Cyberpunk is anarchy (disorder) via machines or machine/computer rebel
movement.
❖ Cyber warfare means information warriors unleashing vicious attacks against
an unsuspecting opponents computer networks, wreaking havoc(creating
great damage) and paralyzing nations.
Department of Computer Science & Engineering, VNRVJIET, Hyderabad February 4, 2025 148
4. Cyberterrorism
▪ The premeditated use of disruptive activities, or threat thereof, against
computers and/or networks, with the intention to cause harm or further
social, ideological, religious, political, or similar objectives to intimate any
person in furtherance of such objectives.
▪ Cyberterrorism is defined as “any person, group or organization who, with
terrorist intent, utilizes accesses or aids in accessing a computer or computer
network or electronic system or electronic device by any available means,
and thereby knowingly engages in or attempts to engage in a terrorist act
commits the offence of cyberterrorism.”
Department of Computer Science & Engineering, VNRVJIET, Hyderabad February 4, 2025 149
1.4 Who are Cybercriminals?
Are those who conduct acts such as:
Child pornography
Credit card fraud
Cyberstalking
Defaming another online
Gaining unauthorized access to computer systems
Ignoring copyrights
Software licensing and trademark protection
Overriding encryption to make illegal copies
Software piracy
Stealing another’s identity to perform criminal acts
Categorization of Cybercriminals
Type 1: Cybercriminals- hungry for recognition
Hobby hackers
A person who enjoys exploring the limits of what is
possible, in a spirit of playful cleverness. May modify
hardware/ software
IT professional(social engineering):
Ethical hacker
Politically motivated hackers :
promotes the objectives of individuals, groups or nations supporting a
variety of causes such as : Anti globalization, transnational con icts
and protest
Terrorist organizations
Cyberterrorism
Use the interneta acks in terroristactivity
Large scale disruption of computer networks , personal
computers a ached to internetvia viruses
Type 2: Cybercriminals- not
interested in recognition
Psychological perverts
Financially motivated hackers
Make money from cyber a acks
Bots-for-hire : fraud through phishing, information theft, spam
and extortion
State-sponsored hacking
Hacktivists
Extremely professional groups working for governments
Have ability to worm into the networks of the media, major
corporations, defense departments
Type 3: Cybercriminals- the
insiders
Department of Computer Science & Engineering, VNRVJIET, Hyderabad February 4, 2025 163