cyber security UNIT-2
cyber security UNIT-2
In this modern era, the rising importance of electronic gadgets (i.e., mobile hand-held devices) –
which became an integral part of business, providing connectivity with the Internet outside the
office – brings many challenges to secure these devices from being a victim of cybercrime. In the
recent years, the use of laptops, personal digital assistants (PDAs) and mobile phones has grown
from limited user communities to widespread desktop replacement and broad deployment.
Remote connection has extended from fixed location dial-in to wireless-on-the-move, and smart
hand-held devices such as PDAs have become networked, converging with mobile phones.
Furthermore, the maturation of the PDA and advancements in cellular phone technology have
converged into a new category of mobile phone device: the Smartphone. Smartphones combine the
best aspects of mobile and wireless technologies and blend them into a useful business tool.
Although IT departments of organizations as yet are not swapping employees’ company-provided
PDAs (as the case may be) for the Smartphones, many users may bring these devices from home
and use them in the office. Thus, the larger and more diverse community of mobile users and their
devices increase the demands on the IT function to secure the device, data and connection to the
network, keeping control of the corporate assets, while at the same time supporting mobile user
productivity. Clearly, these technological developments present a new set of security challenges to
the global organizations.
Today, incredible advances are being made for mobile devices. The trend is for smaller devices and
more processing power. A simple hand-held mobile device provides enough computing power to
run small applications, play games and music, and make voice calls. As the term “mobile device”
includes many products. We first provide a clear distinction among the key terms: mobile
computing, wireless computing and hand-held devices. Below figure helps to understand how these
terms are related.
d. Brador Trojan: It affects the Windows CE OS by creating a svchost.exe file in the Windows
start-up folder which allows full control of the device. This executable file is conductive to
traditional worm propagation vector such as E-Mail file attachments (refer to Appendix C).
e. Lasco Worm: It was released first in 2005 to target PDAs and mobile phones running the
Symbian OS. Lasco is based on Cabir’s source code and replicates over Bluetooth connection
2. Denial-of-Service (DoS): The main objective behind this attack is to make the system unavailable
to the intended users. Virus attacks can be used to damage the system to make the system
unavailable.
3. Overbilling Attack: Overbilling involves an attacker hijacking a subscriber’s IP address and then
using it (i.e., the connection) to initiate downloads that are not “Free downloads” or simply use it for
his/her own purposes. In either case, the legitimate user is charged for the activity which the user did
not conduct.
CREDIT CARD FRAUDS IN MOBILE AND WIRELESS COMPUTING ERA
These are new trends in cybercrime that are coming up with mobile computing – mobile commerce
(M- Commerce) and mobile banking (M-Banking). Credit card frauds are now becoming
commonplace given the ever- increasing power and the ever-reducing prices of the mobile hand-held
devices, factors that result in easy availability of these gadgets to almost anyone. Mobile credit card
transactions are now very common; new technologies combine low-cost mobile phone technologies
with the capabilities of a point-of-sale (POS) terminal. Today belongs to “mobile computing,” that is,
anywhere anytime computing.
Credit card companies, normally, do a good job of helping consumers resolve identity (ID) theft
problems once they occur. But they could reduce ID fraud even more if they give consumers better
tools to monitor their accounts and limit high-risk transactions.
Figure: Online Environment for Credit Card Transactions
There is a system available from an Australian company “Alacrity” called Closed-Loop Environment
for Wireless (CLEW). Below figure shows the flow of events
Do’s
1. Make the photocopy of both the sides of your card and preserve it at a safe place to remember
the card number, expiration date in case of loss of card.
2. Change the default Personal Identification Number (PIN) received from the bank before doing any
transaction.
3. Always carry the details about contact numbers of your bank in case of loss of your card.
4. Carry your cards in a separate pouch/card holder than your wallet.
5. Keep an eye on your card during the transaction, and ensure to get it back immediately.
6. Preserve all the receipts to compare with credit card invoice.
7. Reconcile your monthly invoice/statement with your receipts.
8. Report immediately any discrepancy observed in the monthly invoice/statement.
9. Destroy all the receipts after reconciling it with the monthly invoice/statement.
10. Inform your bank in advance, about any change in your contact details such as home address, cell
phone number and E-Mail address.
11. Ensure the legitimacy of the website before providing any of your card details.
12. Report the loss of the card immediately in your bank and at the police station, if necessary.
Dont’s
1. Store your card number and PINs in your cell.
2. Lend your cards to anyone.
3. Leave cards or transaction receipts lying around.
4. Sign a blank receipt (if the transaction details are not legible, ask for another receipt to ensure the
amount instead of trusting the seller).
5. Write your card number/PIN on a postcard or the outside of an envelope.
6. Give out immediately your account number over the phone (unless you are calling to a company/
to your bank).
7. Destroy credit card receipts by simply dropping into garbage box/dustbin .
2. Modern Techniques
a. Triangulation:
• The criminal offers the goods with heavy discounted rates through a website designed and hosted
by him, which appears to be legitimate merchandise website.
The customer registers on this website with his/her name, address, shipping address and valid
credit card details.
• The criminal orders the goods from a legitimate website with the help of stolen credit card details
and supply shipping address that have been provided by the customer while registering on the
criminal’s website.
• The goods are shipped to the customer and the transaction gets completed.
• The criminal keeps on purchasing other goods using fraudulent credit card details of different
customers till the criminal closes existing website and starts a new one.
b. Credit card generators: It is another modern technique – computer emulation software – that
creates valid credit card numbers and expiry dates. The criminals highly rely on these generators to
create valid credit cards. These are available for free download on the Internet .
3. Mishing: Mishing is a combination of mobile and Phishing. Mishing attacks are attempted using
mobile phone technology.
• M-Commerce is fast becoming a part of everyday life. If you use your mobile phone for purchasing
goods/services and for banking, you could be more vulnerable to a Mishing scam.
• A typical Mishing attacker uses call termed as Vishing or message (SMS) known as Smishing.
• Attacker will pretend to be an employee from your bank or another organization and will claim a
need for your personal details.
• Attackers are very creative and they would try to convince you with different reasons why they
need this information from you.
4. Vishing: Vishing is the criminal practice of using social engineering over the telephone system,
most often using features facilitated by VoIP, to gain access to personal and financial information
from the public for the purpose of financial reward. The term is a combination of V – Voice and
Phishing. Vishing is usually used to steal credit card numbers or other related data used in ID theft
schemes from individuals. The most profitable uses of the information gained through a Vishing
attack include:
• ID theft
• Purchasing luxury goods and services
• Transferring money/funds
• Monitoring the victims’ bank accounts
• Making applications for loans and credit cards
6.Hacking Bluetooth: Bluetooth is an open wireless technology standard used for communication
(i.e., exchanging data) over short distances (i.e., using short length radio waves) between fixed and/or
mobile device. Bluetooth is a short-range wireless communication service/technology .
When Bluetooth is enabled on a device, it essentially broadcasts “I’m here, and I’m able to
connect” to any other Bluetooth-based device within range. This makes Bluetooth use simple and
straightforward, and it also makes easier to identify the target for attackers. The attacker installs
special software [Bluetooth hacking tools] on a laptop and then installs Bluetooth antenna.
Whenever an attacker moves around public places, the software installed on laptop
constantly scans the nearby surroundings of the hacker for active Bluetooth connections. Once the
software tool used by the attacker finds and connects to a vulnerable Bluetooth-enabled cell phone, it
can do things like download address book information, photos, calendars, SIM card details, make
long-distance phone calls using the hacked device, bug phone calls and much more.
Example of Bluetooth tool:- BlueScanner , BlueSniff , BlueBugger , Bluesnarfer , BlueDiving .
1.Not only can viruses, worms and Trojans get into the organization network, but can also destroy
valuable data in the organization network.
2.Organization has to have a policy in place to block these ports while issuing the asset to the
employee.
3. Employees can connect a USB/small digital camera/MP3 player to the USB port of any unattended
computer and will be able to download confidential data or upload harmful viruses.
4. As the malicious attack is launched from within the organization, firewalls and antivirus software
are not alerted.
5.Using “DeviceLock” software solution, one can have control over unauthorized access to plug and
play devices.
3. Threats through Lost & Stolen Devices: This is a new emerging issue for cybersecurity. Often
mobile hand-held devices are lost while people are on the move. Lost mobile devices are becoming
even a larger security risk to corporations. The cybersecurity threat under this scenario is scary;
owing to a general lack of security in mobile devices, it is often not the value of the hand-held device
that is important but rather the content that, if lost or stolen, can put a company at a serious risk of
sabotage, exploitation or damage to its professional integrity, as most of the times the mobile hand-
held devices are provided by the organization.
Most of these lost devices have wireless access to a corporate network and have potentially very little
security, making them a weak link and a major headache for security administrators.
4. Protecting Data on Lost Devices: At an individual level, employees need to worry about the
importance of data protection especially when it resided on a mobile hand-held device. There are two
reasons why cybersecurity needs to address this issue
• Data that is persistently stored on the device
• Always running applications
For protecting data that are stored on the device, there are two precautions that individual can take to
prevent disclosure of the data stored on a mobile device
A key point here is that the organizations should have a clear policy on how to respond to the loss or
theft of a device, whether it is data storage, a PDA or a laptop. There should be a method for the
device owner to quickly report the loss & device owners should be aware of this method.
5. Educating the Laptop Users: Often it so happens that corporate laptop users could be putting
their company’s networks at risk by downloading non-work-related software capable of spreading
viruses and spyware. This is because the software assets on laptops become more complex as more
applications are used on an increasingly sophisticated OS with diverse connectivity options. The
perception plays much role in terms of most people perceiving laptops as greater culprits compared
with other innocuous-looking mobile hand-held devices .
• Rijndael (pronounced Rain-dahl or Rhine-doll), a block encryption algorithm, chosen as the new
Advanced Encryption Standard (AES) for block ciphers by the National Institute of Standards and
Technology (NIST).
• The other algorithm used to implement strong encryption of database files is the Multi-Dimensional
Space Rotation (MDSR) algorithm developed by Casio.
• Implement strong asset management, virus checking, loss prevention and other controls for mobile
systems that will prohibit unauthorized access and the entry of corrupted data.
Develop a system of more frequent and thorough security audits for mobile devices.
• Incorporate security awareness into your mobile training and support programs so that everyone
understands just how important an issue security is within a company’s overall IT strategy.
• Notify the appropriate law-enforcement agency and change passwords. User accounts are closely
monitored for any unusual activity for a period of time.
ORGANIZATIONAL SECURITY POLICIES AND MEASURES IN MOBILE COMPUTING
ERA:-
There are also approaches in between, where mobile devices fall under both existing general policies
and a new one. There may not be a need for separate policies for wireless, LAN, WAN etc because a
properly written network policy can cover all connections to the company data, including mobiles &
wireless.