Cyber Security Q and A
Cyber Security Q and A
Crime committed using a computer and the internet to steal data or information.
Cybercrime specifically can be defined in number of ways…
A crime committed using a computer and the internet to steal a person’s
identity(identity theft) or sell contraband or stalk victims or disrupt operations with
malevolent programs.
Crimes completed either on or with a computer
Any illegal activity through the Internet or on the computer
All criminal activities done using the medium of computers, the Internet, cyberspace and
the WWW.
2. Explain the two types of attack of cyber criminal ?
Two types of attacks are common:
Techno- crime : Active attack Techno Crime is the term used by law enforcement
agencies to denote criminal activity which uses (computer) technology, not as a tool to
commit the crime, but as the subject of the crime itself. Techno Crime is usually pre-
meditated and results in the deletion, corruption, alteration, theft or copying of data on an
organization's systems. Techno Criminals will usually probe their prey system for
weaknesses and will almost always leave an electronic 'calling card' to ensure that their
pseudonym identity is known.
Techno – vandalism: Passive attack Techno Vandalism is a term used to describe a
hacker or cracker who breaks into a computer system with the sole intent of defacing and
or destroying its contents. Techno Vandals can deploy 'sniffers' on the Internet to locate
soft (insecure) targets and then execute a range of commands using a variety of protocols
towards a range of ports. If this sounds complex - it is! The best weapon against such
attacks is a firewall which will hide and disguise your organization's presence on the
Internet.
3. What is cyber security ?
Cybersecurity: means protecting information, equipment, devices, computer, computer resource,
communication device and information stored therein from unauthorized access, use, disclosure,
disruption, modification or destruction.
4. Write a note on Challenges for securing data in business perspective ?
Challenges for securing data in business perspective
Cybercrime occupy an important space in information security due to their impact.
Most organizations do not incorporate the cost of the vast majority of computer security
incidents into their accounting
The difficulty in attaching a quantifiable monetary value to the corporate data and yet
corporate data get stolen/lost
Financial loses may not be detected by the victimized organization in case of Insider
attacks : such as leaking customer data
5. Who are cyber Criminal ? Explain type one type two and type three group
of cyber criminals ?
Are those who conduct acts such as:
Child pornography
Credit card fraud
Cyberstalking
Defaming another online
Gaining unauthorized access to computer systems
Ignoring copyrights
Software licensing and trademark protection
Overriding encryption to make illegal copies
Software piracy
Stealing another’s identity to perform criminal acts Categorization of Cybercriminals
Type 1: Cybercriminals- hungry for recognition
Hobby hackers
A person who enjoys exploring the limits of what is possible, in a spirit of playful
cleverness. May modify hardware/ software
IT professional(social engineering):
Ethical hacker
Politically motivated hackers :
promotes the objectives of individuals, groups or nations supporting a variety of causes
such as : Anti globalization, transnational conflicts and protest
Terrorist organizations
Cyberterrorism
Use the internet attacks in terrorist activity
Large scale disruption of computer networks , personal computers attached to internet
via viruses
Type 2: Cybercriminals- not interested in recognition
Psychological perverts
Express sexual desires, deviates from normal behavior
Poonam panday
Financially motivated hackers
Make money from cyber attacks
Bots-for-hire : fraud through phishing, information theft, spam and extortion
State-sponsored hacking
Hacktivists
Extremely professional groups working for governments
Have ability to worm into the networks of the media, major corporations, defense
departments
Type 3: Cybercriminals- the insiders
Disgruntled or former employees seeking revenge
Competing companies using employees to gain economic advantage through damage
and/ or theft
6. What are the classification of cyber crime and explain each ?
Classification of cybercrimes
1. Cybercrime against an individual
2. Cybercrime against property
3. Cybercrime against organization
4. Cybercrime against Society
5. Crimes emanating from Usenet newsgroup
1. Cybercrime against an individual
Electronic mail spoofing and other online frauds
Phishing, spear phishing
spamming
Cyberdefamation
Cyberstalking and harassment
Computer sabotage
Pornographic offenses
passwordsniffing
2.Cybercrime against property
Credit card frauds
Intellectual property( IP) crimes
Internet time theft
3.Cybercrime against organization
Unauthorized accessing of computer
Password sniffing
Denial-of-service attacks
Virus attack/dissemination of viruses
E-Mail bombing/mail bombs
Salami attack/ Salami technique
Logic bomb
Trojan Horse
Data diddling
Industrial spying/ industrial espionage
Computer network intrusions
Software piracy
4.Cybercrime against Society
Forgery
Cyberterrorism
Web jacking
5.Crimes emanating from Usenet newsgroup
Usenet groups may carry very offensive, harmful, inaccurate material
Postings that have been mislabeled or are deceptive in another way
Hence service at your own risk
7. Explain the news group spam or crimes emanating from usenet news
group?
Crimes emanating from Usenet newsgroup
Usenet groups may carry very offensive, harmful, inaccurate material
Postings that have been mislabeled or are deceptive in another way
Hence service at your own risk
History of Usenet groups
In 1979 it was developed by two graduate student
s from Duke University in North Carolina (UNC) as a network that allowed users to
exchange quantities of information too large for mailboxes
Usenet was designed to facilitate textual exchanges between scholars.
Slowly, the network structure adapted to allow the exchange of larger files such as videos
or images.
Usenet groups as a “safe” place?
Usenet newsgroups constitute one o the largest source of child pornography available in
cyberspace
This source useful for observing other types of criminal or particular activities: online
interaction between pedophiles, adult pornographers and writers of pornographic stories.
Usenet for sharing illegal content.
Criminal activity on Oracle USENET Newsgroups
This interesting SearchOracle article on Oracle security bloopers, we see the risks with
engaging the unsavory inhabitants of the Oracle USENET newsgroup, a forum laced with
profanity, pornography and, according to this note, criminal Oracle hackers:
“I subscribe to several Usenet groups so I can keep my skills current. Well, a few years ago
a DBA needed some assistance and posted a question in which he shared his tnsnames.ora
file and wondered why he could not connect to SQL*Plus with the following syntax:
sqlplus system/SecurePswd@prod
Almost immediately several people connected to this person’s production system and
was able to fish around the system. Numerous people emailed the DBA back and pointed
out that he just broadcasted to the world his production connection string and password.
How crazy is that?”
Cybersecurity constitutes one of the top five risks of most firms, especially in Big Tech
and Banking & Financial Services. A weekend reading led to some interesting data
points from various sources such as AV-Test and Coveware, among others, and that
further led to me pondering over the mitigating actions that we can take as individuals
and as organisations for some, if not all, of these cybercrime risks. I extend my thanks
to the respective experts who shared their knowledge, enabling me to piece together
some parts of the larger jigsaw puzzle.
Global cybercrime damage costs this year are expected to breach US $6 trillion an
annum. That is almost one-fourth of the US GDP or twice the GDP of India. This is
expected to scale up to US $10.5 trillion an annum by 2025. Cyber attackers are
disrupting critical supply chains, at least 4 times more than in 2019.