Chapter-5
Chapter-5
W
Internet
????
Server
Format of a URL
Format of a URL
Retrieve
Display HTML
Features of a web browser
DNS Server
https://drive.google.com/drive/u/2/my-drive 128.17.134.25
Using the IP address, the
Flow to retrieve a web page computer now sets up a
communication with the website
server and the
required pages are
https://drive.google.com/
128.17.134.25
128.17.134.25
HTML
<h1> ....
</h1>
Cookies
Cookies
• Cookies are small files or code stored on a user’s computer.
They are sent by a web server to a browser on a user’s
computer.
• Some usages of cookies:
• Hold user's preference
• Customise the web page for each individual user
• Store login details
• Store items in online shopping cart
Cookies
• They are temporary cookies that are deleted when you close
your web browser.
• They provide information on your browsing while you are on
that particular website.
• They stop to exist on a user's computer once the browser is
closed or the website session is terminated.
• Example: Shopee (we do not need to log in again even if we
switch page)
Persistent Cookies
• They have expiration dates and are stored in a folder on your
computer (hard drive) until they are expire or the user deletes them.
• They make websites appear to remember a user on the next visit.
• They remain even after the browser is closed or the web session is
terminated.
• Examples
• Login details
• Save users' items in a virtual shopping cart
• Online financial transactions (Do you want to remember this card)
Flow of how cookies are used
Person A Person B
Person A Person B
MINER
- Use the power of their personal computers to process
transactions. The reward for doing so is that miners
receive some of the transaction fees involved in the
process of payment made.
Decentralisation - Cryptocurrency
• Traditional digital currencies are regulated by central banks and
governments. This means all transactions and exchange rates are
determined by these two bodies.
• Cryptocurrency has no state control and all the rules are set by the
cryptocurrency community itself.
• The cryptocurrency system works by being within a blockchain
network which means it is much more secure.
Blockchain
A technology that sits behind all cryptocurrency
transactions. It makes all sorts of cryptocurrency
safe to use.
Blockchaining - How cryptocurrency work?
• Blockchain is a decentralised database.
• All the transactions of networked members are stored on this
database.
• The blockchain consists of a number of interconnected computers
but they are not connected to a central server.
• All transaction data is stored on all computers in the blockchain
network.
Blockchaining - A chain of blocks
Blockchaining - A chain of blocks
Hash: A4BF
Previous Hash: 0000
Blockchaining - A chain of blocks
Hackers will find it hard to re-create block 3 and 4, due to proof-of-work, which
makes sure it takes 10 minutes to add a block to the chain.
THIRD REASON: The exact blockchain is stored in all the computers
in the networks.
Hash: 34EE
Hash: A4BF Hash: 6AB1 Hash: 34EE
Hash: A4BF Hash: 6AB1 Hash: 34EE Hash: 34EE
Previous Hash: 6AB1
Previous Hash: 0000 Previous Hash: A4BF Previous Hash: 6AB1
Previous Hash: 0000 Previous Hash: A4BF Previous Hash: 6AB1 Previous Hash: 6AB1
Hash: 34EE
Hash: A4BF Hash: 6AB1 Hash: 34EE
Hash: A4BF Hash: 6AB1 Hash: 34EE Hash: 34EE
Previous Hash: 6AB1
Previous Hash: 0000 Previous Hash: A4BF Previous Hash: 6AB1
Previous Hash: 0000 Previous Hash: A4BF Previous Hash: 6AB1 Previous Hash: 6AB1
I Hack This!
All nodes within this network creates a consensus. Majority wins. This
means that hacker will have to tamper a block in more than half of the
nodes, which is impossible.
Failed!
Cyber Security
Cyber Security
Threat
Cyber Security
Threats Solutions/Prevention
Cyber Security
Threats Solutions/Prevention
Cyber B
Brute-Force
D DDOS Attack
Attack
Security
Data
Threat
Hacking
D Interception H
M Malware
P Phishing
Social
P Pharming
S Engineering
Cyber B
Brute-Force
D DDOS Attack
Attack
Security
Data
Threat
Hacking
D Interception H
M Malware
P Phishing
Social
P Pharming
S Engineering
Brute-Force Attack
B
Security
Data
Threat
Hacking
D Interception H
M Malware
P Phishing
Social
P Pharming
S Engineering
Distributed Denial of Service (DDOS)
D
• A denial of service (DoS) attack is an attempt at preventing users
from accessing part of a network, notably an internet server.
• The attacker may be able to prevent a user from:
• accessing their emails
• accessing websites/web pages
• accessing online services (such as banking).
If too many people accessing a website at the
same time, the server will go down ...
Distributed Denial of Service (DDOS)
D How does it attack?
Patient ..
Distributed Denial of Service (DDOS)
D How does it attack?
x100000
Distributed Denial of Service (DDOS)
D
Distributed = Many
computers
How does it attack?
Denial of Service = Deny
user from using a service
Sorry
can't do
x100000 it!
Distributed Denial of Service (DDOS)
D Signs to detect a DDOS attack
Security
Data
Threat
Hacking
D Interception H
M Malware
P Phishing
Social
P Pharming
S Engineering
Data Interception
D
• Data interception is a form of stealing data by tapping
into a wired or wireless communication link.
• The intent is to compromise privacy or to obtain confidential
information.
• Interception can be carried out using a packet sniffer,
which examines data packets being sent over a network.
The intercepted data is sent back to the hacker.
Data Interception
D To tackle data interception
Encryption of data.
Eg. Wired Equivalency privacy (WEP)
Security
Data
Threat
Hacking
D Interception H
M Malware
P Phishing
Social
P Pharming
S Engineering
Hacking
H
• Hacking is the act of gaining illegal access to a computer
system without the user's permission.
• Data can be deleted, passed on, changed or corrupted.
• Can encryption stops hacking?
Hacking
H
• Hacking is the act of gaining illegal access to a computer
system without the user's permission.
• Data can be deleted, passed on, changed or corrupted.
• Encryption does not stop hacking, it just make the data
meaningless.
• Solution: Firewall, strong passwords.
Hacking
H
Black-hat White-hat
hacker hacker
Hacker that try to find security
Hacker who seeks to gain
loopholes in a system and give
unauthorised access to a
advice to the network owners
computer system.
about how to close them.
Cyber B
Brute-Force
D DDOS Attack
Attack
Security
Data
Threat
Hacking
D Interception H
M Malware
P Phishing
Social
P Pharming
S Engineering
Malware = Malicious Code Software
M
Malware are pieces of software that have been written and
coded with the intention of causing damage to or stealing
data from a computer or system.
Trojan Ransomware
Virus Worm Spyware Adware
Horse
Virus
V
• Viruses are programs or program codes that self-replicate
with the intention of deleting or corrupting files, or causing
a computer to malfunction.
• Viruses need an active host program on the target
computer or an operating system that has already been
infected, before they can actually run and cause harm.
• Viruses are often sent as email attachments, reside on
infected websites or on infected software downloaded
to the user’s computer.
Trojan Ransomware
Virus Worm Spyware Adware
Trojan Horse
T
• A trojan horse is malware that is hidden away in the code of
software that appears to be harmless. A Trojan horse replaces all
or part of the legitimate software with the intent of carrying out
some harm to the user’s computer system.
• They need to be executed by the end-user. They usually arrive
as an email attachment or are downloaded from an infected
website
• Once installed on the user’s computer, the Trojan horse will give
cyber criminals access to personal information on your
computers, such as IP addresses, passwords and other personal
data. Spyware and ransomware are often installed on a user’s
computerTrojan
via Trojan horse malware.
Ransomware
Virus Worm Spyware Adware
Worm
W
• A type of stand-alone malware that can self-replicate. Unlike
viruses, they don't need an active host program to be opened in
order to do any damage.
• Worm replicates itself until the computer's resources are used to
their maximum capacity and no further processing can take place,
leading to system failure and crashing.
• Worms tend to be problematic because of their ability to spread
throughout a network without any action from an end-user;
whereas viruses require each end-user to somehow initiate the
virus.
Trojan Ransomware
Virus Worm Spyware Adware
Spyware
S
• Spyware is software that gathers information by monitoring a
user’s activities carried out on their computer.
• The gathered information (bank account numbers, passwords
and credit/debit card details) is sent back to the cybercriminal
who originally sent the spyware (just like cookies).
• Spyware can be detected and removed by anti-spyware software.
Trojan Ransomware
Virus Worm Spyware Adware
Adware
A
• Adware is a software that will attempt to flood an end-user with
unwanted advertising.
• For example, it could
• redirect a user’s browser to a website that contains
promotional advertising
• appear in the form of pop-ups
• appear in the browser’s toolbar and redirect search requests
Trojan Ransomware
Virus Worm Spyware Adware
Ransomware
R
• Ransomware are programs that encrypt data on a user’s
computer and ‘hold the data hostage’.
• The cybercriminal waits until the ransom money is paid and,
sometimes, the decryption key is then sent to the user.
Trojan Ransomware
Virus Worm Spyware Adware
Flashcard
THE
DIFFERENCE
BETWEEN
VIRUS
VIRUS NEEDS
AND ACTIVE
HOST, WORMS
DO NOT.
Flashcard
HOW IS VIRUS
SENT TO A USER
VIA EMAIL
ATTACHMENTS,
INFECTED
SOFTWARE/
WEBSITE
Flashcard
Once installed on the user’s computer,
I will give cyber criminals access to
personal information on your
computers, such as IP addresses,
passwords and other personal data.
Spyware and ransomware are often
installed on a user’s computer via ME.
WHO AM I?
TROJAN
HORSE
Flashcard
Security
Data
Threat
Hacking
D Interception H
M Malware
P Phishing
Social
P Pharming
S Engineering
Phishing
P
• Sending out legitimate-
looking emails
designed to trick the
recipients into giving
their personal details to
the sender of the email.
• These emails may
contain links or
attachments, when
initiated, take the user
to a fake website to
enter personal details.
Phishing
P
• Sending out legitimate-
looking emails
designed to trick the
recipients into giving
their personal details to
the sender of the email.
• These emails may
contain links or
attachments, when
initiated, take the user Clickbait
to a fake website to
enter personal details.
Phishing
P
Can you find something
that is not so right?
Phishing - Legit Emails
P
Phishing
P Ways to prevent
phishing
Be aware of fake emails (eg. Dear (Your
name) and not Dear Customer)
Security
Data
Threat
Hacking
D Interception H
M Malware
P Phishing
Social
P Pharming
S Engineering
Pharming
P
• Redirect user from a genuine website to a fake one, with
the hope that this goes unnoticed. They manipulate the
DNS server.
• A user may then be prompted to enter login details, and
this can then be collected by a criminal for use on the
genuine site.
• Pharming attacks occur when web servers are attacked,
and code is inserted into a website that redirects
visitors (changing the IP address).
Cyber B
Brute-Force
D DDOS Attack
Attack
Security
Data
Threat
Hacking
D Interception H
M Malware
P Phishing
Social
P Pharming
S Engineering
Social Engineering
S
• This form of cyber-crime is where users are manipulated into
behaving in a way that they would not normally do.
• Five common types of threat:
• Instant messaging (malicious link embedded in message)
• Scareware (tell you that your computer is infected with virus)
• Email (genuine looking emails)
• Baiting (leave a pendrive where it can be found)
• Phone calls (asks you to download special software)
• All threats above are effective methods for introducing malware.
• The whole idea of social engineering is the exploitation of human
emotion (fear, curiosity, empathy and trust).
EXAM QUESTION(MARCH19)
EXAM QUESTION
EXAM QUESTION
EXAM QUESTION(MARCH19)
EXAM QUESTION
EXAM QUESTION
Cyber Security
Solutions
and
Prevention
Cyber Security
Threats Solutions/Prevention
Cyber A Access Level
A Anti-Malware
Security A Authentication
A
Automating
Solution and
Software Updates
Security A Authentication
A
Automating
Solution and
Software Updates
Security A Authentication
A
Automating
Solution and
Software Updates
Security A Authentication
A
Automating
Solution and
Software Updates
Password
Biometrics Two-step Credit Card &
and user Authentication verification Hotel Card
names
P Password and user names
Password
and user
names
Let's try this out
Password
and user
names
T Tips for a stronger password
• Combine different types of character (lowercase, uppercase,
special character)
• Don't put in pattern in your passwords (eg. cabbag3), use
random patterns eg. Hp3oe7Ls*(!kajmc)
• Don't use the same passwords for all accounts
• Be aware of spyware that tries to steal your passwords (via
keyboard stroke)
Password
and user
names
B Biometric Authentication
Biometric
Authentication
B Biometric Authentication
• Biometrics relies on certain unique characteristics of human
beings:
• Fingerprint scans (compare image stored versus image
scanned; fingerprints are unique)
• Face recognition
• Voice recognition
Biometric
Authentication
T Two-step verification
Two-step
verification
C Credit Card & Hotel Card
Security A Authentication
A
Automating
Solution and
Software Updates
Security A Authentication
A
Automating
Solution and
Software Updates
www.gougle.com
www.amozon.com
Cyber A Access Level
A Anti-Malware
Security A Authentication
A
Automating
Solution and
Software Updates
• A firewall can be either software or hardware. It sits between the user’s computer
and an external network (for example, the internet) and filters information in and out
of the computer.
F Firewall
• A firewall can be either software or hardware. It sits between the user’s computer
and an external network (for example, the internet) and filters information in and out
of the computer.
• Firewalls are the primary defence to any computer system to help protect
it from hacking, malware (viruses and spyware), phishing and pharming.
• Main tasks
• Examine the ‘traffic’ between user’s computer (or internal network)
and a public network
• checks whether incoming or outgoing data meets a given set of
criteria.If the data fails the criteria, the firewall will block the ‘traffic’
• criteria can be set so that the firewall prevents access to certain
undesirable sites; the firewall can keep a list of all undesirable IP
addresses
• The firewall can be software installed on a computer; in some cases, it is
Cyber A Access Level
A Anti-Malware
Security A Authentication
A
Automating
Solution and
Software Updates
Security A Authentication
A
Automating
Solution and
Software Updates
Security A Authentication
A
Automating
Solution and
Software Updates
Certificate
An SSL certificate is a form of digital certificate
which is used to authenticate a website and
enables an encrypted connection
S Secure Socket Layer Handshake
The user’s browser The browser then The web server
sends a message so requests that the web responds by sending a
that it can connect with server identifies itself copy of its SSL
the required website certificate to the
which is secured by SSL user’s browser
A user will know if SSL is being applied when they see https or the
small padlock in the status bar at the top of the screen.
S How do we know if a website is using SSL?
Examples of where SSL will be used:
• Online banking and all online financial transactions
• Online shopping/commerce
• Sending and receiving emails
• Instant messaging
Security A Authentication
A
Automating
Solution and
Software Updates