Cyber_Security Notes
Cyber_Security Notes
Today we live in a digital era where all aspects of our lives depend on the
network, computer and other electronic devices, and software applications. All
critical infrastructure such as the banking system, healthcare, financial
institutions, governments, and manufacturing industries use devices
connected to the Internet as a core part of their operations. Some of their
information, such as intellectual property, financial data, and personal data,
can be sensitive for unauthorized access or exposure that could have negative
consequences. This information gives intruders and threat actors to infiltrate
them for financial gain, extortion, political or social motives, or just vandalism.
Cyber-attack is now an international concern that hacks the system, and other
security attacks could endanger the global economy. Therefore, it is essential
to have an excellent cyber security strategy to protect sensitive information
from high-profile security breaches. Furthermore, as the volume of cyber-
attacks grows, companies and organizations, especially those that deal with
information related to national security, health, or financial records, needs to
use strong cyber security measures and processes to protect their sensitive
business and personal information.
With the increase in digitalization, data is becoming more and more valuable.
Cybersecurity helps protect sensitive data such as personal information,
financial data, and intellectual property from unauthorized access and theft.
Preserving Privacy:
Cyber threats are constantly evolving, and attackers are becoming increasingly
sophisticated. This makes it challenging for cybersecurity professionals to keep
Cyberspace
Cyberspace refers to the virtual computer world, and more specifically, an
electronic medium that is used to facilitate online communication. Cyberspace
typically involves a large computer network made up of many worldwide
computer sub-networks that employ TCP/IP protocol to aid in communication
and data exchange activities.
Cyber Threats
A cybersecurity threat is the threat of a malicious attack by an individual or
organization attempting to gain access to a computer network, corrupt data,
or steal confidential information. An information security threat is an attack
that pertains directly to the IT stakeholders and your organization’s computer
networks.
Cyber threats also refer to the possibility of a successful cyber attack that aims
to gain unauthorized access, damage, disrupt, or steal an information
technology asset, computer network, intellectual property, or any other form
of sensitive data. Cyber threats can come from within an organization by
trusted users or from remote locations by unknown parties.
Malware
Malware is usually installed into the system when the user opens a malicious
link or email. Once installed, malware can block access to critical components
of your network, damage your system, and export confidential information to
destinations unknown.
Your organization can prevent malware-based cyber attacks by:
Phishing is a type of attack that attempts to trick users into giving over
sensitive data such as usernames and passwords, bank account information,
Social Security numbers, and credit card data.
Typically hackers send out phishing emails that seem to come from trusted
senders, such as PayPal, eBay, financial institutions, or friends and co-workers.
The bogus messages try to get users to click on links in the emails, directing
users to fraudulent websites that ask for personal information or install
malware on their devices.
Opening attachments sent via phishing emails can also install malware or
allow hackers to control your devices remotely.
Other types of phishing can include smishing, vishing, clone phishing, domain
spoofing, URL phishing, watering hole phishing, and evil twin phishing. All can
be costly.
A DDoS attack can overload your servers, slowing them down significantly or
temporarily taking them offline. These shutdowns prevent customers from
accessing your website and completing orders.
Confidentiality
Confidentialityy involves the efforts of an organization to make sure data is
kept secret or private. To accomplish this, access to information must be
controlled to prevent the unauthorized sharing of data
data—whether
whether intentional
or accidental. A key component of maintainin
maintaining
g confidentiality is making sure
that people without proper authorization are prevented from accessing assets
important to your business. Conversely, an effective system also ensures that
those who need to have access have the necessary privileges.
For example,
mple, those who work with an organization’s finances should be able
to access the spreadsheets, bank accounts, and other information related to
the flow of money. However, the vast majority of other employees employees—and
perhaps even certain executives—may
executives not be granted access. To ensure these
policies are followed, stringent restrictions have to be in place to limit who can
see what.
There are several ways confidentiality can be compromised. This may involve
direct attacks aimed at gaining access to systems the a attacker
ttacker does not have
the rights to see. It can also involve an attacker making a direct attempt to
infiltrate an application or database so they can take data or alter it.
These direct attacks may use techniques such as man-in-the the-middle (MITM)
attacks,, where an attacker positions themselves in the stream of information
to intercept data and then either steal or alter it. Some attackers engage in
other types of network
rk spying to gain access to credentials. In some cases, the
attacker will try to gain more system privileges to obtain the next level of
clearance.
However, not all violations of confidentiality are intentional. Human error or
insufficient security controls
controls may be to blame as well. For example, someone
may fail to protect their password—either
password either to a workstation or to log in to a
restricted area. Users may share their credentials with someone else, or they
may allow someone to see their login while they enter it. In other situations, a
user may not properly encrypt a communication, allowing an attacker to
intercept their information. Also, a thief may steal hardware, whether an entire
computer or a device used in the login process and use it to access
confidential
tial information.
To fight against confidentiality breaches, you can classify and label restricted
data, enable access control policies, encrypt data, and use multi-factor
multi
authentication (MFA) systems. It is also advisable to ensure that all in the
organization
ation have the training and knowledge they need to recognize the
dangers and avoid them.
Integrity
Integrity involves making sure your data is trustworthy and free from
tampering. The integrity of your data is maintained only if the data is
authentic, accurate, and reliable.
For example, if your company provides information about senior managers on
yourr website, this information needs to have integrity. If it is inaccurate, those
visiting the website for information may feel your organization is not
trustworthy. Someone with a vested interest in damaging the reputation of
your organization may try to ha hack
ck your website and alter the descriptions,
photographs, or titles of the executives to hurt their reputation or that of the
company as a whole.
Compromising integrity is often done intentionally. An attacker may bypass an
intrusion detection system (IDS), change file configurations to allow
unauthorized access, or alter the logs kept by the system to hide the attack.
Integrity may also be violated by accident. Someone may accidentally enter
the wrong code or make another kind of careless mistake. Also, if the
company’s security policies, protections, and procedures are inadequate,
integrity can be violated without any one person in the organization
accountable for the blame.
To protect the integrity of your data, you can use hashing, encryption, digital
certificates,
tificates, or digital signatures. For websites, you can employ trustworthy
certificate authorities (CAs) that verify the authenticity of your website so
visitors know they are getting the site they intended to visit.
A method for verifying integrity is non-repudiation,
no repudiation, which refers to when
something cannot be repudiated or denied. For example, if employees in your
company use digital signatures when sending emails, the fact that the email
came from them cannot be denied. Also, the recipient cannot deny that
tha they
received the email from the sender.
Availability
Even if data is kept confidential and its integrity maintained, it is often useless
unless it is available to those in the organization and the customers they serve.
This means that systems, networks, and applications must be functioning as
they should and when they should. Also, individuals with access to specific
information must be able to consume it when they need to, and getting to the
data should not take an inordinate amount of time.
If, for example,
mple, there is a power outage and there is no disaster recovery
system in place to help users regain access to critical systems, availability will
be compromised. Also, a natural disaster like a flood or even a severe
snowstorm may prevent users from getting
getting to the office, which can interrupt
the availability of their workstations and other devices that provide business-
business
critical information or applications. Availability can also be compromised
through deliberate acts of sabotage, such as the use of denial-of-service
denial (DoS)
attacks or ransomware.
To ensure availability, organizations can use redundant networks, servers, and
applications. These can be programmed to become available when whe the
primary system has been disrupted or broken. You can also enhance
availability by staying on top of upgrades to software packages and security
systems. In this way, you make it less likely for an application to malfunction or
for a relatively new threat
eat to infiltrate your system. Backups and full disaster
recovery plans also help a company regain availability soon after a negative
event.
When Should
hould You Use the CIA Triad?
You should use the CIA triad in the majority of security situations, particularly
because each component is critical. However, it is particularly helpful when
developing systems around data classification and managing permissions
permissio and
access privileges. You should also stringently employ the CIA triad when
addressing the cyber vulnerabilities of your organization. It can be a powerful
tool in disrupting the Cyber Kill Chain, which refers to the process of targeting
and executing a cyberattack. The CIA security triad can help you hone in on
what attackers may be after and then implement policies and tools to
adequately protect those assets.
In addition, the CIA triad can be used when training employees regarding
cybersecurity. You can use hypothetical scenarios or real-life case studies to
help employees think in terms of the maintenance of confidentiality, integrity,
and availability of information and systems.
Cyber Terrorism
Cyberterrorism is the use of the Internet to conduct violent acts that result in,
or threaten, the loss of life or significant bodily harm, in order to achieve
political or ideological gains through threat or intimidation. Acts of deliberate,
large-scale disruption of computer networks, especially of personal computers
attached to the Internet by means of tools such as computer viruses,
computer worms, phishing, malicious software, hardware methods,
programming scripts can all be forms of internet terrorism. Cyberterrorism is a
controversial term.[citation needed] Some authors opt for a very narrow
definition, relating to deployment by known terrorist organizations of
disruption attacks against information systems for the primary purpose of
creating alarm, panic, or physical disruption. Other authors prefer a broader
definition, which includes cybercrime. Participating in a cyberattack affects the
terror threat perception, even if it isn't done with a violent approach. By some
definitions, it might be difficult to distinguish which instances of online
activities are cyberterrorism or cybercrime.
Cyberterrorism can be also defined as the intentional use of computers,
networks, and public internet to cause destruction and harm for personal
objectives. Experienced cyberterrorists, who are very skilled in terms of
hacking can cause massive damage to government systems and might leave a
country in fear of further attacks. The objectives of such terrorists may be
political or ideological since this can be considered a form of terror.
There is much concern from government and media sources about potential
damage that could be caused by cyberterrorism, and this has prompted
efforts by government agencies such as the Federal Bureau of Investigation
(FBI) and the Central Intelligence Agency (CIA) to put an end to cyber attacks
and cyberterrorism.
There have been several major and minor instances of cyberterrorism. Al-
Qaeda utilized the internet to communicate with supporters and even to
recruit new members. Estonia, a Baltic country which is constantly evolving in
terms of technology, became a battleground for cyberterrorism in April 2007
after disputes regarding the relocation of a WWII soviet statue located in
Estonia's capital Tallinn.
Cyberterrorism can be also defined as the intentional use of computers,
networks, and public internet to cause destruction and harm for personal
objectives. Experienced cyberterrorists, who are very skilled in terms of
hacking can cause massive damage to government systems and might leave a
country in fear of further attacks. The objectives of such terrorists may be
political or ideological since this can be considered a form of terror.
There is much concern from government and media sources about potential
damage that could be caused by cyberterrorism, and this has prompted
efforts by government agencies such as the Federal Bureau of Investigation
(FBI) and the Central Intelligence Agency (CIA) to put an end to cyber attacks
and cyberterrorism.
There have been several major and minor instances of cyberterrorism. Al-
Qaeda utilized the internet to communicate with supporters and even to
recruit new members. Estonia, a Baltic country which is constantly evolving in
terms of technology, became a battleground for cyberterrorism in April 2007
after disputes regarding the relocation of a WWII soviet statue located in
Estonia's capital Tallinn.
In today's digital age, organizations face a constant threat from cyber attacks
that can have severe consequences on their operations, reputation, and
financial stability. This newsletter explores the challenges organizations
encounter in dealing with cyber attacks and highlights the implications for
their security posture.
One of the most challenging aspects of cyber attacks for organizations is the
presence of insider threats. Employees or former employees with malicious
intent can compromise sensitive data, sabotage systems, or provide
unauthorized access to cybercriminals. Mitigating insider threats requires a
delicate balance between trust and security, as organizations must implement
robust access controls, monitoring systems, and employee awareness
programs.
Conclusion:
Cyber attacks pose significant challenges for organizations across all sectors.
To mitigate these threats, organizations must stay vigilant, prioritize
cybersecurity measures, and invest in robust infrastructure, personnel training,
and incident response capabilities. Proactive risk management, collaboration
with security experts, and adherence to regulatory frameworks are essential to
safeguard sensitive data and maintain the trust of customers and stakeholders
in today's digital landscape.
Hackers and Cyber Crimes
Introduction
Computers and the Internet have changed the work environment of the world beyond
imagination. Computers on taking over a major part of our lives, all our data has got transferred
from records and ledgers to computers. Though this kind of shift in working has reduced the
physical burden on workers it has also increased the chances of data theft. People involved in
stealing data or harming the systems are knowledgeable people with wrong intentions known as
Hackers. There are different types of hackers. Let’s take a look at how many types of hackers are
there and the types of hacker attacks and techniques.
Who is a Hacker?
A hacker is ideally a person who is skilled in information technology. He uses his technical
knowledge to overcome an obstacle or sometimes even achieve a goal within a computerized
system. However, in recent times, the term hacker is always associated with a security hacker –
someone who is always on the lookout for ways to acquire and exploit sensitive personal,
financial and organizational information, which is otherwise not accessible to them. Legitimate
figures often use hacking for legal purposes.
Hackers are highly skilled in breaching securities to gain unauthorized access to phones, tablets,
computers, IoT devices, networks, or the networking system of an entire organization. They are
generally very proficient in exploiting weaknesses in network security, taking advantage of the
same. These weaknesses can be technical or social in nature.
Types Of Hackers
Computers and the Internet have changed the work environment of the world beyond
imagination. Computers on taking over a major part of our lives, all our data has got transferred
from records and ledgers to computers. Though this kind of shift in working has reduced the
physical burden on workers it has also increased the chances of data theft. People involved in
stealing data or harming the systems are knowledgeable people with wrong intentions known as
Hackers. There are different types of hackers. Let’s take a look at how many types of hackers are
there and the types of hacker attacks and techniques.
White hat hackers are types of hackers who’re professionals with expertise in cybersecurity.
They are authorized or certified to hack the systems. These White Hat Hackers work for
governments or organizations by getting into the system. They hack the system from the
loopholes in the cybersecurity of the organization. This hacking is done to test the level of
cybersecurity in the organization. By doing so, they identify the weak points and fix them to
avoid attacks from external sources. White hat hackers work per the rules and regulations the
government sets. White hat hackers are also known as ethical hackers.
Motives & Aims: The goals of these types of hackers are helping businesses and an appetite for
detecting gaps in networks’ security. They aim to protect and assist companies in the ongoing
battle against cyber threats. A White Hat hacker is any individual who will help protect the
company from raising cyber crimes. They help enterprises create defences, detect vulnerabilities,
and solve them before other cybercriminals can find them.
Black hat hackers are also knowledgeable computer experts but with the wrong intention. They
attack other systems to get access to systems where they do not have authorized entry. On
gaining entry they might steal the data or destroy the system. The hacking practices these types
of hackers use depend on the individual’s hacking capacity and knowledge. As the intentions of
the hacker make the hacker a criminal. The malicious action intent of the individual cannot be
gauged either can the extent of the breach while hacking
Motives & Aims: To hack into organizations’ networks and steal bank data, funds or sensitive
information. Normally, they use the stolen resources to profit themselves, sell them on the black
market or harass their target company.
The intention behind the hacking is considered while categorizing the hacker. The Gray hat
hacker falls between the black and white hat hackers. They are not certified, hackers. These types
of hackers work with either good or bad intentions. The hacking might be for their gain. The
intention behind hacking decides the type of hacker. If the intention is for personal gain, the
hacker is considered a gray hat hacker.
Motives & Aims: The difference is, they don’t want to rob people nor want to help people in
particular. Rather, they enjoy experimenting with systems to find loopholes, crack defenses, and
generally find a fun hacking experience.
4) Script Kiddies
It is a known fact that half knowledge is always dangerous. The Script Kiddies are amateurs
types of hackers in the field of hacking. They try to hack the system with scripts from other
fellow hackers. They try to hack the systems, networks, or websites. The intention behind the
hacking is just to get the attention of their peers. Script Kiddies are juveniles who do not have
complete knowledge of the hacking process.
Motives & Aims: One standard Kiddie Script attack is a DoS (Denial of Service) or DDoS
attack (Distributed Denial of Service). This simply means that an IP address is flooded with too
much excessive traffic that it collapses. Consider several Black Friday shopping websites, for
instance. It creates confusion and prevents someone else uses the service.
Green hat hackers are types of hackers who learn the ropes of hacking. They are slightly
different from the Script Kiddies due to their intention. The intent is to strive and learn to
become full-fledged hackers. They are looking for opportunities to learn from experienced
hackers.
Blue Hat Hackers are types of hackers who’re similar to Script Kiddies. The intent to learn is
missing. They use hacking as a weapon to gain popularity among their fellow beings. They use
hacking to settle scores with their adversaries. Blue Hat Hackers are dangerous due to the intent
behind the hacking rather than their knowledge.
Red Hat Hackers are synonymous with Eagle-Eyed Hackers. They are the types of hackers
who’re similar to white hackers. The red hat hackers intend to stop the attack of black hat
hackers. The difference between red hat hackers and white hat hackers is that the process of
hacking through intention remains the same. Red hat hackers are quite ruthless when dealing
with black hat hackers or counteracting malware. The red hat hackers continue to attack and may
end up having to replace the entire system setup.
Government appoints hackers to gain information about other countries. These types of hackers
are known as State/Nation sponsored hackers. They use their knowledge to gain confidential
information from other countries to be well prepared for any upcoming danger to their country.
The sensitive information aids in being on top of every situation but also in avoiding upcoming
danger. They report only to their governments.
9) Hacktivist
These types of hackers intend to hack government websites. They pose themselves as activists,
so known as a hacktivist. Hacktivists can be an individual or a bunch of nameless hackers whose
intent is to gain access to government websites and networks. The data gained from government
files accessed are used for personal political or social gain.
These types of hackers include individuals working in an organization who can expose
confidential information. The intent behind the exposure might be a personal grudge against the
organization, or the individual might have come across illegal activities within the organization.
The reason for exposure defines the intent behind the exposure. These individuals are known as
whistleblowers.
Crackers
We have learnt about hackers, how they work, what their interests are and what they do. Now
when we talk of crackers, we must know that crackers are also hackers. But their ways of works
differ a lot. While a hacker works totally in the interest of a company or an individual, the
cracker works totally in the opposite manner. The purpose of a cracker is to break the security of
computers and networks. It is an illegal activity. They make use of their knowledge to make
personal gains and breach security across networks. They acquire extensive knowledge and
learning about computers, their programming, software, codes and languages and use them to
break into computers for criminal gains.
The crackers are also known as Black Hats. They gain access to the accounts of people
maliciously, and they can misuse the secured information across networks. They can steal credit
card information; they can destroy important files, disclose crucial data and information or
personal details and sell them for personal gains. Their purpose can range from little personal
gains to bigger criminal interests. They can make employees of a company divulge highly secure
information. They violate computer security. Once they have gained control over a system, they
can do anything like steal data, destroy it, use it to their advantage etc.
Types of Crackers
There are various types of crackers that include script kiddies, packet monkeys, s’kiddiots,
lamers, warez d00dz (dudes), and wannabes. Usually, they are less skilled and do not possess the
necessary in-depth knowledge about programming and codes. They almost always rely on the
software tools created by others to carry out their operations. Most of the times, they do not
know what this program really does. They only know the process of cracking the security
networks, and they lack advanced knowledge. They are not much of a threat, but their threats
cannot be ignored. They basically deface the web pages and replace them with their designs.
Hackers vs Crackers
There is a common view that hackers build things, and crackers break things. These are
basically two entirely different terms. They may seem similar, but there are differences between
how the two actually work. While hackers who have advanced knowledge of computer-related
security, crackers usually are not as skilful as hackers. Very few of them are skilled enough to
create their new software and tools. So they generally rely on certain not so reputed, in fact, the
disrepute websites to download several automated programs to execute their deed. Hackers try to
counter the potential threats that the crackers pose to the computer and internet security across
varied networks. Crackers always know that their activities are illegal and they are breaking the
law, so they tend to cover up their tracks.
However, the professional hackers being competent enough and quite skilful with their work,
potentially restore the security setups across the corrupted networks, and they help in catching
the specific crackers. Although most of the crackers are less skilled yet many of them are able
enough. They possess advanced skills and extensive knowledge, just like professional hackers.
They have the ability to create tools and software that help them exploit all sorts of weak points
that they discover in the highly secured programs. This makes it even difficult to catch these
crackers. Because they do not leave a trail behind, the number of skilled crackers is very low, yet
we should not ignore them. They certainly pose a serious threat to internet security.
By now, we are well aware that the hackers are the ethical professionals while the crackers break
into the security systems unethically and illegally. Besides this ethical difference, one of the
major differences between the two is their understanding of computer systems and security
systems. Their ability and inability to create programs and software tools is a major difference
between the two. The hackers can write codes in multiple languages. They have the upper hand
when it comes to the knowledge of various computer languages like C, C++, HTML, Java etc.
also; they have a complete understanding of what these codes do and how these software work.
Crackers, on the other hand, are inept when t comes to computer programs. They boast about
their abilities to break into the security systems and use them to their advantage. The difference
here is clear. The crackers break into secure networks for malicious purposes while a
professional hacker does not. So, therefore, it is just how they work, which makes them entirely
different from each other.
Effective vulnerability management not only improves security programmes but also lessens the
impact of successful attacks. For enterprises across industries, having a well-established
vulnerability management system is now a must. The most typical categories of cybersecurity
vulnerabilities are described below, along with methods to manage vulnerabilities on your
systems.
What is Cyber Security Vulnerabilities?
These hackers can enter the networks without authorization and seriously harm data privacy.
Data being a gold mine in this modern world is something that has to be secured preciously. As a
result, it is crucial to constantly check for cybersecurity vulnerabilities because flaws in a
network could lead to a complete compromise of an organization’s systems.
A system has vulnerabilities from the start; they are not introduced. It is a fault or weakness in
infrastructure similar to the construction. Few instances of cybercrime result in vulnerabilities,
and they frequently come from network or operating system configuration errors. On the other
hand, various types of cyber security attacks enter a system through social engineering attacks or
malware downloads.
In reality, risks are the likelihood and consequences of a vulnerability being used against you.
The risk is low if these two factors are low. Since they are directly inversely correlated, the high
probability and impact of vulnerabilities result in high risks.
An exploitable vulnerability has at least one specific attack vector. For obvious reasons, attackers
seek out vulnerable points in the system or network. Of course, nobody wants to have a
weakness but could exploit it should concern you more.
There are instances where a vulnerability is not exploitable. The causes can be:
There are many causes of cyber security vulnerabilities. A few of them are as follows:
• Complexity: The likelihood of errors, defects, or unauthorized access increases with
complex systems.
• Familiarity: Attackers may already be acquainted with common code, operating systems,
hardware, and software that result in well-known vulnerabilities.
• Connectivity: Vulnerabilities are more likely to exist in connected devices. It is better to
avoid connecting to multiple devices unnecessarily.
• Poor Password Management: This can cause several data breaches because of weak or
repeated passwords. It is important to change passwords using strong password generators
regularly.
• Internet: Spyware and adware that can be loaded on computers automatically are abundant
on the internet.
• Operating System Flaws: Operating systems can also be flawed. Operating systems that
aren’t safe by default might provide users unrestricted access and serve as a haven for
malware and viruses.
• Software Bugs: Sometimes, programmers may unintentionally introduce a vulnerability that
can exploit.
• Unchecked User Input: If software or a website presumes that all user input is secure, SQL
injection may be executed without the user’s knowledge.
• People: For most organizations, social engineering poses the biggest concern. Therefore, one
of the main sources of vulnerability can be people.
Types of Cyber Security Vulnerabilities
System Misconfigurations
Network assets can cause system mistakes with incompatible security settings or restrictions.
Networks are frequently searched for system errors and vulnerable spots by cybercriminals.
Network misconfigurations are increasing as a result of the quick digital revolution. Working
with knowledgeable security professionals is crucial when implementing new technology.
Cybercriminals frequently search networks for vulnerabilities and misconfigurations in the
system that they can exploit.
Hackers frequently scour networks for vulnerable, unpatched systems that are prime targets, just
as system configuration errors do. Attackers may use these unpatched vulnerabilities to steal
confidential data, which is a huge threat to any organization. Establishing a patch management
strategy that ensures all the most recent system updates are applied as soon as they are issued is
crucial for reducing these types of threats.
Attackers frequently utilize brute force methods, such as guessing employee passwords, to gain
access to systems and networks. Therefore, they must therefore train employees on cybersecurity
best practices to prevent the easy exploitation of their login credentials. An endpoint system
security will be a great addition to all laptop or desktop devices.
Malicious Insider Threats
Employees with access to vital systems may occasionally share data that enables hackers to
infiltrate the network, knowingly or unknowingly. Because all acts seem genuine, insider threats
can be challenging to identify. Consider purchasing network access control tools and segmenting
your network according to employee seniority and experience to counter these risks.
If a network has weak or nonexistent encryption, it will be simpler for attackers to intercept
system communications and compromise them. Cyber adversaries can harvest crucial
information and introduce misleading information onto a server when there is weak or
unencrypted data. This may result in regulatory body fines and adversely jeopardize an
organization’s efforts to comply with cyber security regulations.
Zero-day Vulnerabilities
Zero-day vulnerabilities are specific software flaws that the attackers are aware of but that a
company or user has not yet identified.
Since the vulnerability has not yet been identified or reported by the system manufacturer, there
are no known remedies or workarounds in these situations. These are particularly risky because
there is no protection against them before an attack occurs. Exercising caution and checking
systems for vulnerabilities is crucial to reducing the risk of zero-day attacks.
1. Vulnerability detection
2. Vulnerability assessment
3. Addressing Vulnerabilities
Vulnerability Detection
• Vulnerability scanning
• Penetration testing
• Google hacking
Cyber Security Vulnerability Scan
The Cyber Security Vulnerability Scan is performed to discover computer, program, or network
vulnerabilities. A scanner (software) is used to find and pinpoint network vulnerabilities
resulting from improper configuration and poor programming.
SolarWinds Network Configuration Manager (NCM), ManageEngine Vulnerability Manager
Plus, Rapid7 Nexpose, TripWire IP 360, and others are some common vulnerability detection
solutions.
Penetration Testing
Testing an IT asset for security flaws that an attacker might be able to exploit is known as
penetration testing or pen testing. Manual or automated penetration testing is available.
Additionally, it can evaluate adherence to compliance standards, staff security knowledge,
security policies, and the capacity to recognize and address security events.
Google Hacking
Google hacking is using a search engine to identify security flaws. Google hacking is
accomplished by using complex search operators in queries that can find difficult information or
data that has unintentionally been made public due to cloud service misconfiguration. These
focused queries are typically used to find sensitive data not meant for public exposure.
Vulnerability Assessment
Addressing Vulnerabilities
Once a vulnerability’s risk level has been determined, you then need to treat the vulnerability.
There are different ways in which you can treat a vulnerability. These include:
• Remediation
Remediation is a process where a vulnerability is completely fixed or patched as part of
vulnerability repair. Since it reduces risk, this is one of the most preferred methods of treating
vulnerabilities.
• Mitigation
To mitigate a vulnerability, one must take action to make it less likely to be exploited. Usually,
vulnerability mitigation is done to purchase time until a suitable patch is released.
• Acceptance
When an organization determines that a vulnerability carries a minimal risk, it is acceptable to
take no action to resolve it. Acceptance is also acceptable if fixing the vulnerability will cost
more than fixing it if it is exploited. Such a situation or process is called Acceptance.
Malware
Malware is malicious software that enables the attacker to have full or limited control
over the target system. Malware can damage, modify, and/or steal information from
the system. There are various types of malware such as viruses, Trojans, worms,
rootkits, spyware, and ransomware. A malware might enter the system through
emails, file transfers, installation of random third-party software, and nonusage of
quality antivirus software.
Types of Malware
There are several types of malware. Let us take a look at them.
Malware Virus
It is malware that requires human intervention to run and disseminate. The following
are the different types of viruses:
• File Viruses: These viruses are infected executable files that infect other files
when opened.
• Macro Viruses: These viruses are Excel files that have malware written in VBS;
when such files are opened, a macro gets executed and infects other files.
• Master Boot Record Viruses: These viruses change or delete boot records that
can render a system useless.
• Polymorphic Viruses: These viruses are able to evade detection by changing
their form frequently.
• Stealth Viruses: These viruses hide in other legitimate files or services.
Trojan Malware
Trojan is a malware that conceals itself in other legitimate files. When the files and
software that are bundled with malware get installed, the malware too gets installed
and executed. The following are the various types of Trojans:
• Remote Access Trojans: These Trojans allow hackers to gain remote access to
systems through covert channels without the knowledge of the user.
• Data Sending Trojans: These Trojans steal data from systems and transmit it to
the attacker.
• Destructive Trojans: As the name suggests, these Trojans destroy files and
services.
• Security Software Disabler Trojans: These Trojans can disable system
firewalls and antiviruses to prevent detection of other malicious files being
downloaded and executed.
Worm Malware
Worms are similar to viruses but without the need for human intervention to run and
propagate.
Rootkit Malware
Rootkits are extremely difficult to detect and just as impossible to remove unless the
system is formatted.
Malware Examples
Malware has a long history that dates back to infected floppy disks swapped by Apple
II hobbyists in the 1980s and the Morris Worm that infected Unix machines in 1988.
Some other examples of high-profile malware attacks are:
• SQL Slammer that brought internet traffic to a halt within minutes of release in
2003
• Zeus, a keylogger Trojan that targeted banking information
• CryptoLocker’s code kept getting repurposed for malware projects of similar
caliber and was the first example of a widespread ransomware attack
• Stuxnet infected systems all over the world but only did real damage to the
uranium-enrichment centrifuges at Natanz, the Iranian nuclear facility
Malware Detection
The following is how you can detect malware-infected systems or networks. These are
the signs that you need to look for:
Gaining Access
Gaining access attack is the second part of the network penetration testing. In this
section, we will connect to the network. This will allow us to launch more powerful
attacks and get more accurate information. If a network doesn't use encryption, we can
just connect to it and sniff out unencrypted data. If a network is wired, we can use a
cable and connect to it, perhaps through changing our MAC address. The only
problem is when the target use encryption like WEP, WPA, WPA2. If we do
encounter encrypted data, we need to know the key to decrypt it, that's the main
purpose of this chapter.
If the network uses encryption, we can't get anywhere unless we decrypt it. In this
section, we will discuss that how to break that encryption and how to gain access to
the networks whether they use WEP/WPA/WPA2.
The management has control over which individual can access which sections of the
data. Usually, the management regulates who has access to data, networks, and
computer systems. Here is where cybersecurity comes into the picture by
identifying users and executing an access control. Various cyber security
applications ensure IAM across an organization. IAM may be implemented in both
software and hardware, and it often makes use of role-based access control (RBAC)
to limit access to certain system components.
Managers can manage who has access to what, when they can access it, and for how
long, thanks to solution providers like Okta.
3. Software Security
4. Risk Management
Risk management, data integrity, security awareness training, and risk analysis are
all covered by cyber security. The evaluation of risks and the control of the harm
that may be done as a result of these risks are important components of risk
management. The security of sensitive information is another issue covered by
data security.
Data recovery enables organizations to continue working in the event of data loss,
assaults, or calamities. By regularly data backup and spending money on a system
that will enable corporate activities to continue, this application offers models or
techniques that may help firms manage with severe data loss. Thus, this application
of cybersecurity ensures business continuity.
6. Physical Security
System locks, intrusion detection systems, alarms, surveillance systems, and data-
destruction systems are a few examples of physical security measures. These allow
organizations to secure their IT infrastructure.
The software aids in detecting software flaws when they are being developed and
ensuring that regulations and standards are followed. Cybersecurity tools
thoroughly test, scan, and analyze the software to identify any bugs, openings, or
weaknesses that hackers or competing businesses might exploit.
After a computer worm loads and begins running on a newly infected system,
it will typically follow its prime directive: to remain active on an infected
system for as long as possible and spread to as many other vulnerable
systems as possible.
Is a worm a virus?
No. A worm is not a virus, although like a virus, it can severely disrupt IT operations and cause
data loss. A worm is actually much more serious than a virus because once it infects a vulnerable
machine, it can “self-replicate” and spread automatically across multiple devices.
A Trojan Horse (Trojan) is a type of malware that disguises itself as legitimate code or
software. Once inside the network, attackers are able to carry out any action that a
legitimate user could perform, such as exporting files, modifying data, deleting files or
otherwise altering the contents of the device. Trojans may be packaged in downloads for
games, tools, apps or even software patches. Many Trojan attacks also leverage social
engineering tactics, as well as spoofing and phishing, to prompt the desired action in the
user.
A Trojan is sometimes called a Trojan virus or Trojan horse virus, but those terms are
technically incorrect. Unlike a virus or worm, Trojan malware cannot replicate itself or self-
execute. It requires specific and deliberate action from the user.
Trojans are malware, and like most forms of malware, Trojans are designed to damage files,
redirect internet traffic, monitor the user’s activity, steal sensitive data or set up backdoor
access points to the system. Trojans may delete, block, modify, leak or copy data, which can
then be sold back to the user for ransom or on the dark web.
Computer viruses aim to disrupt systems, cause major operational issues, and result in data
loss and leakage. A key thing to know about computer viruses is that they are designed to
spread across programs and systems. Computer viruses typically attach to an executable host
file, which results in their viral codes executing when a file is opened. The code then spreads
from the document or software it is attached to via networks, drives, file-sharing programs,
or infected email attachments.
Chances are you’ve heard how important it is to keep viruses out, but what is a computer
virus exactly? A computer virus will more than likely have an adverse effect on the device it
resides on and may be discoverable through common signs of performance loss, including:
Speed of System
A computer system running slower than usual is one of the most common signs that the
device has a virus. This includes the system itself running slowly, as well as applications and
internet speed suffering. If a computer does not have powerful applications or programs
installed and is running slowly, then it may be a sign it is infected with a virus.
Pop-up Windows
Unwanted pop-up windows appearing on a computer or in a web browser are a telltale sign
of a computer virus. Unwanted pop-ups are a sign of malware, viruses, or spyware affecting
a device.
Programs Self-executing
If computer programs unexpectedly close by themselves, then it is highly likely that the
software has been infected with some form of virus or malware. Another indicator of a virus
is when applications fail to load when selected from the Start menu or their desktop
icon. Every time that happens, your next step should be to perform a virus scan and remove
any files on programs that might not be safe to use.
Some viruses are designed to affect specific applications, which will either cause them to
crash or force the user to automatically log out of the service.
System crashes and the computer itself unexpectedly closing down are common indicators of
a virus. Computer viruses cause computers to act in a variety of strange ways, which may
include opening files by themselves, displaying unusual error messages, or clicking keys at
random.
Computer viruses are commonly spread via email. Hackers can use other people's email
accounts to spread malware and carry out wider cyberattacks. Therefore, if an email account
has sent emails in the outbox that a user did not send, then this could be a sign of a computer
virus.
Changes to Your Homepage
Types of Backdoors
Backdoors can come in various different forms. A few of the most common
types include:
• Web Shells: A web shell is a web page designed to take user input and
execute it within the system terminal. These backdoors are commonly
installed by system and network administrators to make it easier to remotely
access and manage corporate systems.
Attack Vector
Definition
An attack vector is a pathway or method used by a hacker to illegally access a network or
computer in an attempt to exploit system vulnerabilities. Hackers use numerous attack
vectors to launch attacks that take advantage of system weaknesses, cause a data breach, or
steal login credentials. Such methods include sharing malware and viruses, malicious email
attachments and web links, pop-up windows, and instant messages that involve the attacker
duping an employee or individual user.
Many security vector attacks are financially motivated, with attackers stealing money from
people and organizations or data and personally identifiable information (PII) to then hold
the owner to ransom. The types of hackers that infiltrate a network are wide-ranging. They
could be disgruntled former employees, politically motivated organized groups, hacktivists,
professional hacking groups, or state-sponsored groups.
Cybersecurity attacks are launched using an attack vector. This could be through malware or
a phishing attack, which aims to steal user credentials and gain unauthorized access to
corporate data or resources. Social engineering is another way to launch an attack.
The attack surface is the total network area an attacker can use to launch cyber attack vectors
and extract data or gain access to an organization’s systems. Devices and people are part of
an organization’s attack surface because their vulnerabilities, such as weak passwords or
unpatched software, can be exploited by an attacker.
Information assurance
Information assurance (IA) is the practice of assuring information and managing risks related to
the use, processing, storage, and transmission of information. Information assurance includes
protection of the integrity, availability, authenticity, non-repudiation and confidentiality of user data. IA
encompasses both digital protections and physical techniques. These methods apply to data in
transit, both physical and electronic forms, as well as data at rest. IA is best thought of as a superset
of information security (i.e. umbrella term), and as the business outcome of information risk
management.
Information assurance (IA) is the process of processing, storing, and transmitting the right
information to the right people at the right time. IA relates to the business level and strategic risk
management of information and related systems, rather than the creation and application of
security controls. IA is used to benefit business through the use of information risk management,
trust management, resilience, appropriate architecture, system safety, and security, which
increases the utility of information to only their authorized users.
Authentication
Integrity
Integrity refers to the protection of information from unauthorized alteration. The goal of
information integrity is to ensure data is accurate throughout its entire lifespan.User
authentication is a critical enabler for information integrity. Information integrity is a function of
the number of degrees-of-trust existing between the ends of an information exchange . One way
information integrity risk is mitigated is through the use of redundant chip and software designs.
A failure of authentication could pose a risk to information integrity as it would allow an
unauthorized party to alter content. For example, if a hospital has inadequate password policies,
an unauthorized user could gain access to an information systems governing the delivery of
medication to patients and risk altering the treatment course to the detriment of a particular
patient.
Availability
The pillar of availability refers to the preservation of data to be retrieved or modified from
authorized individuals. Higher availability is preserved through an increase in storage system or
channel reliability.[8] Breaches in information availability can result from power outages,
hardware failures, DDOS, etc. The goal of high availability is to preserve access to information.
Availability of information can be bolstered by the use of backup power, spare data channels, off
site capabilities and continuous signal.
Confidentiality
Non-repudiation
Nonrepudiation is the integrity of the data to be true to its origin, which prevents possible denial
that an action occurred. Increasing non-repudiation makes it more difficult to deny that the
information comes from a certain source. In other words, it making it so that you can not dispute
the source/ authenticity of data. Non-repudiation involves the reduction to data integrity while
that data is in transit, usually through the use of a man-in-the-middle attack or phishing.
Threat Modeling
Definition
Threat modeling is a structured process with these objectives: identify security
requirements, pinpoint security threats and potential vulnerabilities, quantify threat
and vulnerability criticality, and prioritize remediation methods.
Threat modeling methods create these artifacts:
Penetration testing
Penetration testing is used to find out the Vulnerabilities of a particular
network. Penetration testing determines that vulnerability is genuine or not. The
vulnerability will be considered as genuine and reflect on the report if a penetration
tester exploits a potentially vulnerable spot. If they are unavailable to find the spot,
the report will show unexploitable theoretical vulnerabilities. If we
exploit theoretical vulnerabilities, it will lead to Dos. It means it threatens the
network, so to exploit theoretical vulnerabilities is not a good idea. A penetration
tester tries to harm a customer's network by installing malicious software on the
customer's computer or taking down the server, or getting unauthorized access to the
customer's system. This step does not include in vulnerability assessment.
Penetration testing is used when the customer asserts that the security defense of
their network is strong, but they want to check whether they are hack-proof. It is
the depth over breadth approach.
Choice of professional
In the vulnerability assessment, automated testing does not require high skills.
Security department members can also perform it. However, the security employees
of a company may find some vulnerability, but they can't include them in the report.
So the vulnerability assessment vendor of the third party has more information.
To perform penetration testing, we require a high level of expert. A service provider
of penetration testing always outsources it.
Choice of Vendors
The penetration testing and vulnerability assessment differences show that both
security testing is expert to guard the security of a network.
look like and how you might be targeted. These are the 10 most common
types of social engineering attacks to be aware of.
1. Phishing
Phishing is the most common type of social engineering attack, typically
using spoofed email addresses and links to trick people into providing login
2. Whaling
Whaling is another common variation of phishing that specifically targets
attacks usually spoof the email addresses of other high-ranking people in the
3. Diversion Theft
In an old-school diversion theft scheme, the thief persuades a delivery driver
other than the intended recipient. In an online diversion theft scheme, a thief
steals sensitive data by tricking the victim into sending it to or sharing it with
the wrong person. The thief often accomplishes this by spoofing the email
For example, the victim receives an email that promises a free gift card if
they click a link to take a survey. The link might redirect them to a spoofed
Office 365 login page that captures their email address and password and
sends them to a malicious actor.
5. Honey Trap
In a honey trap attack, the perpetrator pretends to be romantically or sexually
interested in the victim and lures them into an online relationship. The
6. Pretexting
Pretexting is a fairly sophisticated type of social engineering attack in which
attack, someone can also physically acquire access to your data by pretending
8. Scareware
Scareware is a form of social engineering in which a scammer inserts
malicious code into a webpage that causes pop-up windows with flashing
colors and alarming sounds to appear. These pop-up windows will falsely
alert you to a virus that’s been installed on your system. You’ll be told to
purchase and download their security software, and the scammers will either
steal your credit card information, install real viruses on your system, or
9. Tailgating/Piggybacking
Tailgating, also known as piggybacking, is a social engineering tactic in
Sometimes the scammer will pretend they forgot their access card, or they’ll
targets are known to visit. Then, when their chosen victims log into the site,
the hacker either captures their credentials and uses them to breach the
Threat Indicators:
Risk Analysis:
• Insider can be an adversory at any time and perform security attacks which
are descibed in the threat models.
• An Adversary (attacker) can find out one key(long term) value in
polynomial amount of time, in this scenario it becomes more hazardous to
the system.
• There are a lot of protocols exists in which the password fields of the users
are not stored in the Encrypted format in that case insider can find out the
password patterns of the user and sell to attackers which can lead them to
the password guessing attack with high probability.
How can you prevent insider threats when none of your
insiders are actually “inside”?
Security teams can be so focused on blocking cyberattacks from outside that they turn
a blind eye to potential threats within their own organizations.
Insider threats are uniquely difficult to defend against because insiders inherently
require an elevated level of trust and access to get their jobs done. For example,
system administrators and other IT professionals may have a legitimate need to access
sensitive systems and data. But, can that trust is used as a cover?
Despite the challenges, you can effectively defend against insider threats. In fact, as
I’ll explore in this blog, many of the most infamous insider attacks could have been
prevented with the right combination of policies, training, systems, and oversight.
Are you prepared for an insider attack? This is how you get
started:
Download our free customizable cybersecurity incident response
plan template.
The faster you respond to an incident, the less damage it will cause.
The Verizon Data Breach Investigations Report (DBIR) explains insider threats this
way: “An insider threat can be defined as what happens when someone close to an
organization, with authorized access, misuses that access to negatively impact the
organization’s critical information or systems.”
The Verizon Insider Threat Report defines five categories of actors behind
insider threats:
Insider threat examples: There are plenty of examples of each type of inside actor,
from conspirators (American Superconductor) to malicious insiders looking for
financial gain (Otto), to conscientious objectors (Edward Snowden), to careless or
unwitting actors.
I’ll delve into those case studies shortly, but first, let’s talk about the broad impact of
insider attacks.
These changes have cybersecurity experts and IT departments concerned about users
accessing systems outside the corporate perimeter leading to an increased likelihood
of data leakage.
It’s not only that there are more devices used to access the corporate network; it’s that
so many of the phones and laptops are unsecured, making it harder for you to detect
rogue devices within the forest of benign ones.
On average, nearly a quarter of all employees are privileged users. Privileged users
have access to a wider array of sensitive systems and data than standard users. Some
privileged users may have a legitimate need for that increased access. But not
everyone does. When so many insiders have elevated privileges, it’s hard to
differentiate between legitimate and aberrant behavior.
These days, during the COVID-19 pandemic, there are many more “insiders” working
outside of an organization. People working remotely expect and need the same access
to systems that they have while in the office. Yet, IT teams have less visibility and
control, which increases the risk of insider threats.
As all of these risk factors increase, insiders (and the criminals who stalk them) have
become more sophisticated in their use of technology, their ability to cover their
tracks, and to navigate corporate networks surreptitiously.
That said, it’s possible to detect insider threats before they cause damage. First, let’s
explore some high-profile insider threats from the past few years. Then, I’ll cover how
these types of breaches could have been discovered and possibly prevented.
Social engineering is the term used for a broad range of malicious activities
accomplished through human interactions. It uses psychological manipulation
to trick users into making security mistakes or giving away sensitive
information.
Baiting
As its name implies, baiting attacks use a false promise to pique a victim’s
greed or curiosity. They lure users into a trap that steals their personal
information or inflicts their systems with malware.
The most reviled form of baiting uses physical media to disperse malware.
For example, attackers leave the bait—typically malware-infected flash
drives—in conspicuous areas where potential victims are certain to see them
(e.g., bathrooms, elevators, the parking lot of a targeted company). The bait
has an authentic look to it, such as a label presenting it as the company’s
payroll list.
Victims pick up the bait out of curiosity and insert it into a work or home
computer, resulting in automatic malware installation on the system.
Baiting scams don’t necessarily have to be carried out in the physical world.
Online forms of baiting consist of enticing ads that lead to malicious sites or
that encourage users to download a malware-infected application.
Scareware
Scareware involves victims being bombarded with false alarms and fictitious
threats. Users are deceived to think their system is infected with malware,
prompting them to install software that has no real benefit (other than for the
perpetrator) or is malware itself. Scareware is also referred to as deception
software, rogue scanner software and fraudware.
Scareware is also distributed via spam email that doles out bogus warnings,
or makes offers for users to buy worthless/harmful services.
Pretexting
All sorts of pertinent information and records is gathered using this scam,
such as social security numbers, personal addresses and phone numbers,
phone records, staff vacation dates, bank records and even security
information related to a physical plant.
Phishing
As one of the most popular social engineering attack types, phishing scams
are email and text message campaigns aimed at creating a sense of urgency,
curiosity or fear in victims. It then prods them into revealing sensitive
information, clicking on links to malicious websites, or opening attachments
that contain malware.
Spear phishing
Moreover, the following tips can help improve your vigilance in relation to
social engineering hacks.
• Don’t open emails and attachments from suspicious sources – If you don’t
know the sender in question, you don’t need to answer an email. Even if you
do know them and are suspicious about their message, cross-check and
confirm the news from other sources, such as via telephone or directly from a
service provider’s site. Remember that email addresses are spoofed all of the
time; even an email purportedly coming from a trusted source may have
actually been initiated by an attacker.
• Use multifactor authentication – One of the most valuable pieces of
information attackers seek are user credentials. Using multifactor
authentication helps ensure your account’s protection in the event of system
compromise. Imperva Login Protect is an easy-to-deploy 2FA solution that
can increase account security for your applications.
• Be wary of tempting offers – If an offer sounds too enticing, think twice
before accepting it as fact. Googling the topic can help you quickly determine
whether you’re dealing with a legitimate offer or a trap.
• Keep your antivirus/antimalware software updated – Make sure
automatic updates are engaged, or make it a habit to download the latest
signatures first thing each day. Periodically check to make sure that the
updates have been applied, and scan your system for possible infections.
Don’t rely on one factor – the most basic preventive measure guarantees your
account security. Of course, the password ensures security, but we have realized
they’re inadequate on its own. Because it is far easier for someone else to guess your
password and obtain access to your accounts.
Make sure your system, which houses sensitive information is being monitored 24 x
7. When certain exploiting tactics are employed like Trojans, they sometimes
depend on the system, which is vulnerable. Scanning both external and internal
systems with web application scanning can help to find vulnerabilities in your
system.
Besides, you should also perform a social engineering engagement at least once a
year to assess whether your employees would fall victim to the dangers of social
engineering. Once tracked, fake domains, if any, can be taken down instantly to
avoid copyright infringement online.
You’re probably already employing a firewall within your business, but a next-
generation web application cloud-based firewall is specially designed to ensure
maximum protection against social engineering attacks. The web WAF is very
different from the traditional WAF that most companies deploy.
To avoid this kind of social engineering threats, contact the claimed sender of the
email message and confirm whether he sent the email or not. Remember, legitimate
banks will not ask your authorized credentials or confidential information through
email.
“When a lot of companies focus on protecting their assets, they’re very focused on
that from the perspective of their business” – Jim O’Gorman, a member of Social-
Engineer.org
That is not necessarily the approach hacker will target your company. They always
target the assets valuable to them.
You should evaluate in the attacker’s perspective and identify what to protect,
considering the assets beyond your product, service, or intellectual property.
“Independent Assessment is the best tool to determine which of your assets criminals
are most likely to target.” – according to O’Gorman.
Encrypting data, emails, and communication ensure that even if hackers intercept
your communication, they can’t be able to access the information contained within.
This can be achieved by obtaining SSL certificates from trusted authorities.
Furthermore, always verify the site, which asks for your sensitive information. To
verify the website’s authenticity, check the URLs. The URLs which start
with https:// can be considered as trusted and encrypted website. The websites
with http:// are not offering a secure connection.
7. Penetration Testing
The most effective approach among the ways to prevent social engineering attacks is
conducting a pen-test to detect and try to exploit vulnerabilities in your organization.
If your pen-tester succeeds in endangering your critical system, you can identify
which system or employees you need to concentrate on protecting as well as the
types of social engineering attacks you may be prone to.
Learn more about how application Pen testing can mitigate Fraud.
Enable Spam filters and close the door for offenders of social engineering security
threats. Spam filters offer vital services in protecting your inboxes from social
engineering attacks.
Most email service providers offer spam filters that hold the emails which are
deemed as suspicious. With spam features, you can categorize emails effortlessly,
and freed from the horrible tasks of identifying mistrustful emails.
Oversharing of personal details online through social media can give these criminals
more information to work with. For instance, if you keep your resume online, you
should consider censoring your date of birth, phone number, and residential address.
All that information is useful for attackers who are planning a social engineering
threat.
Cyber Forensics and Auditing:
Introduction to Cyber Forensics
Introduction
Cyber forensics is the process of obtaining data as evidence for a crime (using electronic
equipment) while adhering to correct investigative procedures to apprehend the offender by
presenting the evidence to the court. Computer forensics is another name for cyber forensics.
Maintaining the chain of evidence and documentation to identify the digital criminal is the
primary goal of cyber forensics.
It is crucial to make a digital copy of the system's unique storage cell during the examination. To
identify who is responsible for a security breach, a thorough cyber forensics investigation is
conducted. While assuring that the system is not impacted, a full investigation is conducted on
the software copy.
Cyber forensics is an unavoidable and crucial element in the modern era, thus cyber forensics
plays a huge role in incident response.
So CyberForensics don't only talk about just the technology, they also talk about the human in
the loop read this case study on Sony Hack and also do refer to the slides given below where I
talk about the different practices in DevSecOps that you can use for understanding the challenges
in SDLC, this is even before we have a compromised system. The Challenges, strategies, and the
decision of using the right tool in the SDLC.Do See the slides here.
Cyber forensics is a process of extracting data as proof for a crime (that involves
electronic devices) while following proper investigation rules to nab the culprit by
presenting the evidence to the court. Cyber forensics is also known as computer
forensics. The main aim of cyber forensics is to maintain the thread of evidence and
documentation to find out who did the crime digitally. Cyber forensics can do the
following:
• It can recover deleted files, chat logs, emails, etc
• It can also get deleted SMS, Phone calls.
• It can get recorded audio of phone conversations.
• It can determine which user used which system and for how much time.
• It can identify which user ran which program.
Cyber forensics is a field that follows certain procedures to find the evidence to reach
conclusions after proper investigation of matters. The procedures that cyber forensic
experts follow are:
• Identification: The first step of cyber forensics experts are to identify what
evidence is present, where it is stored, and in which format it is stored.
• Preservation: After identifying the data the next step is to safely preserve the data
and not allow other people to use that device so that no one can tamper data.
• Analysis: After getting the data, the next step is to analyze the data or system. Here
the expert recovers the deleted files and verifies the recovered data and finds the
evidence that the criminal tried to erase by deleting secret files. This process might
take several iterations to reach the final conclusion.
• Documentation: Now after analyzing data a record is created. This record contains
all the recovered and available(not deleted) data which helps in recreating the crime
scene and reviewing it.
• Presentation: This is the final step in which the analyzed data is presented in front
of the court to solve cases.
There are multiple types of computer forensics depending on the field in which digital
investigation is needed. The fields are:
• Network forensics: This involves monitoring and analyzing the network traffic to
and from the criminal’s network. The tools used here are network intrusion detection
systems and other automated tools.
• Email forensics: In this type of forensics, the experts check the email of the
criminal and recover deleted email threads to extract out crucial information related
to the case.
• Malware forensics: This branch of forensics involves hacking related crimes. Here,
the forensics expert examines the malware, trojans to identify the hacker involved
behind this.
• Memory forensics: This branch of forensics deals with collecting data from the
memory(like cache, RAM, etc.) in raw and then retrieve information from that data.
• Mobile Phone forensics: This branch of forensics generally deals with mobile
phones. They examine and analyze data from the mobile phone.
• Database forensics: This branch of forensics examines and analyzes the data from
databases and their related metadata.
• Disk forensics: This branch of forensics extracts data from storage media by
searching modified, active, or deleted files.
Cyber forensic investigators use various techniques and tools to examine the data and
some of the commonly used techniques are:
• Reverse steganography: Steganography is a method of hiding important data inside
the digital file, image, etc. So, cyber forensic experts do reverse steganography to
analyze the data and find a relation with the case.
• Stochastic forensics: In Stochastic forensics, the experts analyze and reconstruct
digital activity without using digital artifacts. Here, artifacts mean unintended
alterations of data that occur from digital processes.
• Cross-drive analysis: In this process, the information found on multiple computer
drives is correlated and cross-references to analyze and preserve information that is
relevant to the investigation.
• Live analysis: In this technique, the computer of criminals is analyzed from within
the OS in running mode. It aims at the volatile data of RAM to get some valuable
information.
• Deleted file recovery: This includes searching for memory to find fragments of a
partially deleted file in order to recover it for evidence purposes.
Advantages
What are the required set of skills needed to be a cyber forensic expert?
1. Identification
2. Preservation
3. Collection
4. Examination
5. Analysis
6. Presentation
The two basic types of data that are collected in computer forensics are persistent data, or data
stored on a local hard drive (or another device) which is preserved when the computer is turned
off and volatile data, or data that is stored in memory and lost when the computer loses power.
In forensics, to handle this data there exist experts in operating and file systems, data recovery,
cloud computing, and more. They analyze hard disks or hard-disk images from a variety of
different operating systems and provide an interface so that files can be analyzed and information
or data gathered in an electronic format is extremely easy to extract and
store. Lesson Quiz Course
Magnetic Media
Magnetic media store data on a magnetized medium. There are three types of storage devices in this area:
• Floppy disks: These devices contain soft magnetic disks used for data transfer, storage and backup of
small amounts of data. An important disadvantage is that they can be affected by heat, dust and
magnetic fields. Floppy disks have been largely replaced by flash memory, optical disks, and external
hard drives.
• Hard drives: These devices contain hard magnetic platters which store and retrieve digital
information. They are more accessible and affordable than SSD's and with the largest capacity. One
drawback is that they consume more power and produce noise while in operation than do SSD's.
Because of movable, mechanical parts, a hard drive it is vulnerable to damage when shaken or
dropped. Data resides on these disks even after the power supply is turned off. Information from hard
drives may be recoverable using data carving techniques or by using a commercial data recovery
tool. Another forensic recovery method is to clone a hard drive to an image file. This is more practical
but depends of the size of the source hard drive and the equipment that it is used.
• Magnetic tapes: These devices are similar to an audio cassette tape. They are well-suited for
archiving because of their high capacity, low cost and long durability. Compared to a hard disk, these
are very slow. You can only get to data by winding through the tape. Data is downloaded to magnetic
tapes mostly for long-term storage. Because data is stored magnetically, care must be taken to keep
tapes away from all types of magnetic fields. They differ in the way that data is retrieved because they
must be read in a linear fashion, from the start of the tape through the end of the tape. This drastically
increases the time it takes to make a forensic recovery.
Digital forensics starts with the collection of information in a way that maintains its
integrity. Investigators then analyze the data or system to determine if it was changed,
how it was changed and who made the changes. The use of computer forensics isn't
always tied to a crime. The forensic process is also used as part of data recovery
processes to gather data from a crashed server, failed drive, reformatted operating
system (OS) or other situation where a system has unexpectedly stopped working.
The average person never sees much of the information modern devices collect. For
instance, the computers in cars continually collect information on when a driver
brakes, shifts and changes speed without the driver being aware. However, this
information can prove critical in solving a legal matter or a crime, and computer
forensics often plays a role in identifying and preserving that information.
Digital evidence isn't just useful in solving digital-world crimes, such as data theft,
network breaches and illicit online transactions. It's also used to solve physical-world
crimes, such as burglary, assault, hit-and-run accidents and murder.
Businesses often use a multilayered data management, data governance and network
security strategy to keep proprietary information secure. Having data that's well
managed and safe can help streamline the forensic process should that data ever come
under investigation.
As the world becomes more reliant on digital technology for the core
functions of life, cybercrime is rising. As such, computer forensic specialists
no longer have a monopoly on the field. See how the police in the U.K. are
adopting computer forensic techniques to keep up with increasing rates of
cybercrime.
• Mobile forensics. The examination of mobile devices to retrieve and analyze the
information they contain, including contacts, incoming and outgoing text
messages, pictures and video files.
• Network forensics. Looking for evidence by monitoring network traffic, using tools
such as a firewall or intrusion detection system.
How does computer forensics work?
Forensic investigators typically follow standard procedures, which vary depending on
the context of the forensic investigation, the device being investigated or the
information investigators are looking for. In general, these procedures include the
following three steps:
Often, multiple tools are used in computer forensic investigations to validate the
results they produce. Learn how a researcher at Kaspersky Lab in Asia created an
open source forensics tool for remotely collecting malware evidence without
compromising system integrity.
Techniques forensic investigators use
Investigators use a variety of techniques and proprietary forensic applications to
examine the copy they've made of a compromised device. They search hidden folders
and unallocated disk space for copies of deleted, encrypted or damaged files. Any
evidence found on the digital copy is carefully documented in a finding report and
verified with the original device in preparation for legal proceedings that involve
discovery, depositions or actual litigation.
• Live analysis. With this technique, a computer is analyzed from within the OS
while the computer or device is running, using system tools on the computer. The
analysis looks at volatile data, which is often stored in cache or RAM. Many tools
used to extract volatile data require the computer in to be in a forensic lab to
maintain the legitimacy of a chain of evidence.
• Deleted file recovery. This technique involves searching a computer system and
memory for fragments of files that were partially deleted in one place but leave
traces elsewhere on the machine. This is sometimes known as file carving or data
carving.
Find out more about computer forensic analytics in this chapter from the book Python
Forensics: A Workbench for Inventing and Sharing Digital Forensic Technology, by
Chet Hosmer. It shows how to use Python and cybersecurity technology to preserve
digital evidence.
• Enron. In one of the most commonly cited accounting fraud scandals, Enron, a
U.S. energy, commodities and services company, falsely reported billions of
dollars in revenue before going bankrupt in 2001, causing financial harm to many
employees and other people who had invested in the company. Computer forensic
analysts examined terabytes of data to understand the complex fraud scheme. The
scandal was a significant factor in the passing of the Sarbanes-Oxley Act of 2002,
which set new accounting compliance requirements for public companies. The
company declared bankruptcy in 2001.
• Google trade secret theft. Anthony Scott Levandowski, a former executive of both
Uber and Google, was charged with 33 counts of trade secret theft in 2019. From
2009 to 2016, Levandowski worked in Google's self-driving car program, where
he downloaded thousands of files related to the program from a password-
protected corporate server. He departed from Google and created Otto, a self-
driving truck company, which Uber bought in 2016, according to The New York
Times. Levandowski plead guilty to one count of trade secrets theft and was
sentenced to 18 months in prison and $851,499 in fines and
restitution. Levandowski received a presidential pardon in January 2021.
• Larry Thomas. Thomas shot and killed Rito Llamas-Juarez in 2016 Thomas was
later convicted with the help of hundreds of Facebook posts he made under the
fake name of Slaughtaboi Larro. One of the posts included a picture of him
wearing a bracelet that was found at the crime scene.
• Mikayla Munn. Munn drowned her newborn baby in the bathtub of her Manchester
University dorm room in 2016. Investigators found Google searches on her
computer containing the phrase "at home abortion," which were used to convict
her.
Murder is just one of the many types of crime computer forensics can aid in
combating. Learn how forensic financial analysis software is used to combat fraud.
Cyber Ethics and Laws
Introduction to Cyber Laws
Cyber law, also known as Internet Law or Cyber Law, is the part of the overall legal
system thet is related to legal informatics and supervises the digital circulation of
information, e-commerce, software and information security. It is associated with legal
informatics and electronic elements, including information systems, computers, software, and
hardware. It covers many areas, such as access to and usage of the Internet, encompassing
various subtopics as well as freedom of expression, and online privacy.
Cyber laws help to reduce or prevent people from cybercriminal activities on a large scale
with the help of protecting information access from unauthorized people, freedom of speech
related to the use of the Internet, privacy, communications, email, websites, intellectual
property, hardware and software, such as data storage devices. As Internet traffic is
increasing rapidly day by day, that has led to a higher percentage of legal issues worldwide.
Because cyber laws are different according to the country and jurisdiction, restitution ranges
from fines to imprisonment, and enforcement is challenging.
Cyberlaw offers legal protections for people who are using the Internet as well as running
an online business. It is most important for Internet users to know about the local area and
cyber law of their country by which they could know what activities are legal or not on the
network. Also, they can prevent ourselves from unauthorized activities.
The Computer Fraud and Abuse Act was the first cyber law, called CFFA, that was
enacted in 1986. This law was helpful in preventing unauthorized access to computers. And it
also provided a description of the stages of punishment for breaking that law or performing
any illegal activity.
Cyber Law also called IT Law is the law regarding Information-technology including
computers and the internet. It is related to legal informatics and supervises the digital
circulation of information, software, information security, and e-commerce.
IT law does not consist of a separate area of law rather it encloses aspects of contract,
intellectual property, privacy, and data protection laws. Intellectual property is a key element
of IT law. The area of software license is controversial and still evolving in Europe and
elsewhere.
E-commerce
E-commerce (Electronic Commerce) is the buying and selling of goods and services, or the
transmitting of funds or data, over the internet.
E-commerce refers to paperless exchange of business information using EDI, E-mail, electronic
fund transfer etc.
E-commerce web sites are like on-line market places where you can sell and buy items, and
facilitate it by advertising your product, establishing newsgroups and blogs, posting job-oriented
resumes etc.
There are four main types of ecommerce models that can describe almost every transaction that
takes place between consumers and businesses.
1. Business-to-Consumer (B2C)
The B2C model involves transaction between business organization and customer. The business
organization sells its products directly to a consumer. Customer can view the products shown on
the website. The customer can choose a product and order the same. The website will then send a
notification to the business organization via email and the organization will dispatch the
product/goods to the customer.
2. Business-to-Business (B2B)
The B2B model involves the transaction between companies/businesses, such as between a
manufactures and a wholesaler or between wholesaler and a retailer. The business/company sells
its products to an intermediate buyer who then sells the product to the final customer.
3. Consumer-to-Business (C2B)
The C2B model involves a transaction between a consumer and business organization. It is
similar to B2C model, however the difference is that in this case the consumer is the seller and
business organization is the buyer. In this kind of transaction, the consumer decide the price of a
particular product, which business accept or decline.
4. Consumer-to-Consumer (C2C)
The C2C model involves transaction between consumers. Here, a consumer sells directly to
another consumer. A well-known example is eBay.
E-governance
As per Section 18 of The Information Technology Act, 2000 provides the required legal sanctity
to the digital signatures based on asymmetric cryptosystems. The digital signatures are now
accepted at par with handwritten signatures and the electronic documents that have been digitally
signed are treated at par with paper documents.
The IT Act provides for the Controller of Certifying Authorities(CCA) to license and regulate the
working of Certifying Authorities. The Certifying Authorities (CAs) issue digital signature
certificates for electronic authentication of users.
The Controller of Certifying Authorities (CCA) has been appointed by the Central Government
under section 17 of the Act for purposes of the IT Act. The Office of the CCA came into
existence on November 1, 2000. It aims at promoting the growth of E-Commerce and E-
Governance through the wide use of digital signatures.
The Controller of Certifying Authorities (CCA) has established the Root Certifying Authority
(RCAI) of India under section 18(b) of the IT Act to digitally sign the public keys of Certifying
Authorities (CA) in the country. The RCAI is operated as per the standards laid down under the
Act.
The CCA certifies the public keys of CAs using its own private key, which enables users in the
cyberspace to verify that a given certificate is issued by a licensed CA. For this purpose it
operates, the Root Certifying Authority of India(RCAI). The CCA also maintains the Repository
of Digital Certificates, which contains all the certificates issued to the CAs in the country.
A Certifying Authority is a trusted body whose central responsibility is to issue, revoke, renew
and provide directories of Digital Certificates. Certifying Authority means a person who has
been granted a license to issue an Electronic Signature Certificate under section 24.
Provisions with regard to Certifying Authorities are covered under Chapter VI i.e. Sec.17
to Sec.34 of the IT Act, 2000. It contains detailed provisions relating to the appointment and
powers of the Controller and Certifying Authorities. Controller of Certifying Authorities
(CCA)
The IT Act provides for the Controller of Certifying Authorities (CCA) to license and
regulate the working of Certifying Authorities. The Certifying Authorities (CAs) issue digital
signature certificates for electronic authentication of users.
The CCA certifies the public keys of CAs using its own private key, which enables users
in the cyberspace to verify that a given certificate is issued by a licensed CA. For this
purpose it operates, the Root Certifying Authority of India (RCAI). The CCA also maintains
the National Repository of Digital Certificates (NRDC), which contains all the certificates
issued by all the CAs in the country.
The functions of the Controller are –
(a) to exercise supervision over the activities of the Certifying Authorities;
(b) certify public keys of the Certifying Authorities;
(c) lay down the standards to be maintained by the Certifying Authorities;
(d) specify the qualifications and experience which employees of the Certifying
Authorities should possess;
(e) specify the conditions subject to which the Certifying Authorities shall conduct their
business;
(f) specify the content of written, printed or visual material and advertisements that may be
distributed or used in respect of a Electronic Signature Certificate and the Public Key;
(g) specify the form and content of a Electronic Signature Certificate and the key;
(h) specify the form and manner in which accounts shall be maintained by the Certifying
Authorities;
(i) specify the terms and conditions subject to which auditors may be appointed and the
remuneration to be paid to them;
(j) facilitate the establishment of any electronic system by a Certifying Authority either
solely or jointly with other Certifying Authorities and regulation of such systems;
(k) specify the manner in which the Certifying Authorities shall conduct their dealings
with the subscribers;
(l) resolve any conflict of interests between the Certifying Authorities and the subscribers;
(m) lay down the duties of the Certifying Authorities;
(n) maintain a data-base containing the disclosure record of every Certifying Authority
containing such particulars as may be specified by regulations, which shall be accessible to
the public. Controller has the power to grant recognition to foreign certifying authorities with
the previous approval of the Central Government, which will be subject to such conditions
and restrictions imposed by regulations.
The Information Technology Act, 2000 also Known as an IT Act is an act proposed by the
Indian Parliament reported on 17th October 2000. This Information Technology Act is based
on the United Nations Model law on Electronic Commerce 1996 (UNCITRAL Model) which
was suggested by the General Assembly of United Nations by a resolution dated on 30th
January, 1997. It is the most important law in India dealing with Cybercrime and E-Commerce.
The main objective of this act is to carry lawful and trustworthy electronic, digital and online
transactions and alleviate or reduce cybercrimes. The IT Act has 13 chapters and 90 sections.
The last four sections that starts from ‘section 91 – section 94’, deals with the revisions to the
Indian Penal Code 1860.
The introduction of the internet has brought the tremendous changes in our lives. People of
all fields are increasingly using the computers to create, transmit and store information in the
electronic form instead of the traditional papers, documents. Information stored in electronic
forms has many advantages, it is cheaper, easier to store, easier to retrieve and for speedier to
connection. Though it has many advantages, it has been misused by many people in order to
gain themselves or for sake or otherwise to harm others. The high and speedier connectivity
to the world from any place has developed many crimes and these increased offences led to
the need of law for protection. Some countries have been rather been vigilant and formed
some laws governing the net. In order to keep in pace with the changing generation, the
Indian Parliament passed the law --- Information Technology Act 2000. The IT Act 2000 has
been conceptualized on the United Nations Commissions on International Trade Law
(UNCITRAL) Model Law.
The increase rate of technology in computers has led to enactment of Information
Technology Act 2000. The converting of the paper work into electronic records, the storage
of the electronic data, has led tremendous changed the scenario of the country. The Act
further amends the Indian Penal Code, 1860, The Evidence Act, 1872, The Banker’s Book’s
Evidence Act, 1891 and The Reserve Bank of India Act, 1934.
Offences:
Cyber offences are the unlawful acts which are carried in a very sophisticated manner in
which either the computer is the tool or target or both. Cyber crime usually includes:
(a) Unauthorized access of the computers
(b) Data diddling
(c) Virus/worms attack
(d) Theft of computer system
(e) Hacking
(f) Denial of attacks
(g) Logic bombs
(h) Trojan attacks
(i) Internet time theft
(j) Web jacking
(k) Email bombing
(l) Salami attacks
(m) Physically damaging computer system.
Intellectual Property (IP) simply refers to the creation of the mind. It refers to the
possession of thought or design by the one who came up with it. It offers the owner of any
inventive design or any form of distinct work some exclusive rights, that make it unlawful to
copy or reuse that work without the owner’s permission. It is a part of property law. People
associated with literature, music, invention, etc. can use it in business practices.
There are numerous types of tools of protection that come under the term “intellectual
property”. Notable among these are the following:
Patent
Trademark
Geographical indications
Layout Designs of Integrated Circuits
Trade secrets
Copyrights
Industrial Designs
Cyberspace is the non-physical domain where numerous computers are connected through
computer networks to establish communication between them. With the expansion of
technology, cyberspace has come within reach of every individual. This fact led to the
emergence of cyberspace as a business platform and hence increases pressure on Intellectual
Property. Nowadays, cyber crimes do not solely limit themselves to fraud, cyberbullying,
identity thefts but also an infringement of copyrights and trademarks of various businesses
and other organizations. Online content needs to be protected and hence Intellectual Property
Rights and Cyber laws cannot be separated.
In cyberspace, sometimes one person makes a profit by using another person’s creation
without the owner’s consent. This is a violation of privacy, and it is protected by IPR. We
have certain laws to avoid violation of Intellectual Property Rights in cyberspace and when it
is violated, then additionally we have several remedies in law.