0% found this document useful (0 votes)
9 views

CS Unit-IV

Uploaded by

ajjugamer171
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

CS Unit-IV

Uploaded by

ajjugamer171
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Cyber Security

Unit: - IV
Syllabus:
• Cybercrime-Concept of Cybercrime
• Type Of Cybercrime
• Phishing
• Cyber-Crime Prevention
• Case Study
• Security Threats to E-Commerce- Electronic Payment System
• Digital Signature- Digital Signature Process
Cybercrime-Concept of Cybercrime:
Cybercrime or a computer-oriented crime is a crime that includes
a computer and a network. The computer may have been used in
the execution of a crime or it may be the target.
Cybercrime is the use of a computer as a weapon for committing
crimes such as committing fraud, identity theft, or breaching
privacy.
Cybercrime, especially through the Internet, has grown in
importance as the computer has become central to every field like
commerce, entertainment, and government.
Cybercrime may endanger a person or a nation’s security and
financial health. Cybercrime encloses a wide range of activities,
but these can generally be divided into two categories:
• Crimes that aim at computer networks or devices. These
types of crimes involve different threats (like virus, bugs etc.)
and denial-of-service (DoS) attacks.
• Crimes that use computer networks to commit other
criminal activities. These types of crimes include cyber
stalking, financial fraud or identity theft.
Who are The Cybercriminals?
• A cybercriminal is a person who uses his skills in technology
to do malicious acts and illegal activities known as
cybercrimes. They can be individuals or teams.
• Cybercriminals are widely available in what is called the
“Dark Web” where they mostly provide their illegal services
or products.
• Not every hacker is a cybercriminal because hacking itself is
not considered a crime as it can be used to reveal
vulnerabilities to report and batch them which is called a
“white hat hacker”.
• However, hacking is considered a cybercrime when it has a
malicious purpose of conducting any harmful activities and
we call this one “black hat hacker” or a cyber-criminal.
It is not necessary for cybercriminals to have any hacking skills as
not all cyber-crimes include hacking.
Cybercriminals can be individuals who are trading in illegal online
content or scammers or even drug dealers. So here are some
examples of cybercriminals:
• Black hat hackers
• Cyberstalks
• Cyber terrorists
• Scammers
Challenges of Cyber Crime:
• People are unaware of their cyber rights-
The Cybercrime usually happen with illiterate people
around the world who are unaware about their cyber rights
implemented by the government of that particular country.
• Anonymity-
Those who Commit cyber-crime are anonymous for us so
we cannot do anything to that person.
• Less numbers of case registered-
Every country in the world faces the challenge of cyber-
crime and the rate of cyber-crime is increasing day by day
because the people who even don’t register a case of cyber-
crime and this is major challenge for us as well as for
authorities as well.
• Mostly committed by well educated people-
Committing a cyber-crime is not a cup of tea for every
individual. The person who commits cyber-crime is a
very technical person so he knows how to commit the
crime and not get caught by the authorities.
• No harsh punishment-
In Cyber-crime there is no harsh punishment in every cases.
But there is harsh punishment in some cases like when
somebody commits cyber terrorism in that case there is
harsh punishment for that individual. But in other cases,
there is no harsh punishment so this factor also gives
encouragement to that person who commits cyber-crime.
Type Of Cybercrime:
Cybercrime encompasses a wide range of illegal activities
conducted using computers, networks, and the internet.
Here are some common types of cybercrime:
• Hacking: Unauthorized access to computer systems or
networks, often to steal, manipulate, or destroy data.
Hackers may exploit vulnerabilities in software or use social
engineering techniques to gain access.
• Malware: Malicious software designed to infiltrate and
damage computers or networks. This includes viruses,
worms, Trojans, ransomware, spyware, and adware.
• Phishing: Deceptive techniques used to trick individuals into
providing sensitive information, such as passwords, credit
card details, or personal information. Phishing attacks often
involve fraudulent emails, websites, or messages that
impersonate legitimate entities.
• Identity Theft: Theft of personal information, such as Social
Security numbers, credit card numbers, or login credentials,
to impersonate individuals or commit fraud. Stolen identities
may be used for financial gain, accessing accounts, or
committing other crimes.
• Online Fraud: Various forms of fraud conducted over the
internet, including online shopping scams, auction fraud,
investment scams, and fake websites designed to deceive
users into providing money or sensitive information.
• Cyber Espionage: Covert activities conducted by individuals,
groups, or governments to gain unauthorized access to
sensitive information or intellectual property for espionage
purposes.
• Distributed Denial-of-Service (DDoS) Attacks: Deliberate
attempts to disrupt the normal functioning of websites,
servers, or networks by overwhelming them with a flood of
traffic, rendering them inaccessible to legitimate users.
• Data Breaches: Unauthorized access to and disclosure of
sensitive information stored in databases or systems. Data
breaches can result from hacking, malware infections,
insider threats, or security vulnerabilities.
• Cyberbullying and Online Harassment: Harassment,
intimidation, or defamation of individuals using digital
platforms, social media, or messaging services. Cyberbullying
can have serious psychological and emotional impacts on
victims.
• Child Exploitation: Illegal activities involving the exploitation
of children, such as child pornography, online grooming, or
sexual exploitation through the internet.
• Cyber Extortion: Threats or blackmailing using digital means,
such as ransomware attacks that encrypt data and demand
payment for decryption keys, or threats to expose sensitive
information unless a ransom is paid.
Phishing:
“Phishing” refers to an attempt to steal sensitive information,
typically in the form of usernames, passwords, credit card
numbers, bank account information or other important data in
order to utilize or sell the stolen information. By masquerading as
a reputable source with an enticing request, an attacker lures in
the victim in order to trick them, similarly to how a fisherman uses
bait to catch a fish.
Types of Phishing Attacks:
Phishing has evolved into more than simple credential and data
theft. How an attacker lays out a campaign depends on the type of
phishing. Types of phishing include:
• Email phishing: the general term given to any malicious
email message meant to trick users into divulging private
information. Attackers generally aim to steal account
credentials, personally identifiable information (PII) and
corporate trade secrets. However, attackers targeting a
specific business might have other motives.
• Spear phishing: these email messages are sent to specific
people within an organization, usually high-privilege account
holders, to trick them into divulging sensitive data, sending
the attacker money or downloading malware.
• Link manipulation: messages contain a link to a malicious
site that looks like the official business but takes recipients to
an attacker-controlled server where they are persuaded to
authenticate into a spoofed login page that sends credentials
to an attacker.
• Whaling (CEO fraud): these messages are typically sent to
high-profile employees of a company to trick them into
believing the CEO or other executive has requested to
transfer money. CEO fraud falls under the umbrella of
phishing, but instead of an attacker spoofing a popular
website, they spoof the CEO of the targeted corporation.
• Content injection: an attacker who can inject malicious
content into an official site will trick users into accessing the
site to show them a malicious popup or redirect them to a
phishing website.
• Malware: users tricked into clicking a link or opening an
attachment might download malware onto their devices.
Ransomware, rootkits or keyloggers are common malware
attachments that steal data and extort payments from
targeted victims.
• Smishing: using SMS messages, attackers trick users into
accessing malicious sites from their smartphones. Attackers
send a text message to a targeted victim with a malicious link
that promises discounts, rewards or free prizes.
• Vishing: attackers use voice-changing software to leave a
message telling targeted victims that they must call a
number where they can be scammed. Voice changers are
also used when speaking with targeted victims to disguise an
attacker’s accent or gender so that they can pretend to be a
fraudulent person.
• “Evil Twin” Wi-Fi: spoofing free Wi-Fi, attackers trick users
into connecting to a malicious hotspot to perform man-in-
the-middle exploits.
• Pharming: pharming is a two-phase attack used to steal
account credentials. The first phase installs malware on a
targeted victim and redirects them to a browser and a
spoofed website where they are tricked into divulging
credentials. DNS poisoning is also used to redirect users to
spoofed domains.
• Angler phishing: using social media, attackers reply to posts
pretending to be an official organization and trick users into
divulging account credentials and personal information.
• Watering hole: a compromised site provides endless
opportunities, so an attacker identifies a site used by
numerous targeted users, exploits a vulnerability on the site,
and uses it to trick users into downloading malware. With
malware installed on targeted user machines, an attacker can
redirect users to spoofed websites or deliver a payload to the
local network to steal data.
phishing safety steps:
• Don't click email links • Keep your browser •
from unknown sources updated
• Monitor your online • Be aware of popup •
accounts regularly windows
• Never give out personal • Be aware of text messages •
information over email and phone calls from
unknown persons
• Be wary of social, • Deploy malicious URL •
emotion lures detection and content
filtering
• Take our phishing quiz as • Track the latest phishing •
part of your phishing attacks with advanced
education phishing protection

Cyber-Crime Prevention:
Below are some points by means of which we can prevent cyber-
crime:
• Use strong password –
Maintain different password and username combinations
for each account and resist the temptation to write them
down. Weak passwords can be easily cracked using certain
attacking methods like Brute force attack, Rainbow table
attack etc, so make them complex. That means combination
of letters, numbers and special characters.
• Use trusted antivirus in devices –
Always use trustworthy and highly advanced antivirus
software in mobile and personal computers. This leads to
the prevention of different virus attack on devices.
• Keep social media private –
Always keep your social media accounts data privacy only
to your friends. Also make sure only to make friends who
are known to you.
• Keep your device software updated –
Whenever you get the updates of the system software
update it at the same time because sometimes the previous
version can be easily attacked.
• Use secure network –
Public Wi-Fi are vulnerable. Avoid conducting financial or
corporate transactions on these networks.
• Never open attachments in spam emails –
A computer get infected by malware attacks and other
forms of cybercrime is via email attachments in spam
emails. Never open an attachment from a sender you do
not know.
• Software should be updated – Operating system should be
updated regularly when it comes to internet security. This
can become a potential threat when cybercriminals exploit
flaws in the system.
Security Threats to E-Commerce- Electronic Payment System:
Security threats to e-commerce and electronic payment systems
are numerous and constantly evolving, posing significant risks to
both businesses and consumers.
Here are some of the key security threats:
• Payment Card Fraud: This includes unauthorized use of
credit/debit card information for fraudulent transactions. It
can occur through various methods such as card skimming,
card-not-present (CNP) fraud (e.g., online transactions), and
carding (using stolen card details for purchases).
• Phishing and Spoofing: Cybercriminals may attempt to trick
users into providing sensitive information (e.g., login
credentials, credit card details) by impersonating legitimate
entities through phishing emails, fake websites, or spoofed
communication.
• Data Breaches: Breaches of e-commerce websites can lead
to unauthorized access to sensitive customer data, including
payment information, usernames, passwords, and personal
details. These breaches can occur due to vulnerabilities in
the website's security, weak authentication mechanisms, or
insider threats.
• Malware and Ransomware: Malicious software (malware)
can infect e-commerce platforms or users' devices,
compromising security and privacy. Ransomware attacks can
encrypt data, rendering it inaccessible until a ransom is paid,
disrupting business operations and causing financial losses.
• Man-in-the-Middle (MitM) Attacks: In MitM attacks,
attackers intercept communication between two parties to
eavesdrop, modify, or manipulate data exchanged between
them. This can enable them to steal sensitive information
such as payment details or login credentials.
• Distributed Denial-of-Service (DDoS) Attacks: DDoS attacks
aim to disrupt the availability of e-commerce websites or
payment systems by overwhelming them with a flood of
traffic, rendering them inaccessible to legitimate users.
• Supply Chain Attacks: Cybercriminals may target third-party
vendors or service providers within the e-commerce supply
chain to gain access to sensitive data or compromise the
integrity of transactions.
• Insider Threats: Employees or individuals with insider access
to e-commerce systems may pose a security risk by
intentionally or unintentionally disclosing sensitive
information, abusing privileges, or engaging in fraudulent
activities.
• Identity Theft: Theft of personally identifiable information
(PII) can enable attackers to impersonate legitimate users,
make unauthorized purchases, or carry out fraudulent
activities in their name.
Digital Signature- Digital Signature Process:
A digital signature is a cryptographic method used to validate the
authenticity and integrity of a digital document, message, or
transaction. It provides a way to ensure that the sender of the
information is who they claim to be and that the content has not
been tampered with during transmission.
Here's an overview of the digital signature process:
• Key Generation: The digital signature process starts with the
generation of a key pair for the signer. This key pair consists
of a private key and a corresponding public key. The private
key is kept secret and used by the signer to create
signatures, while the public key is shared with others to
verify those signatures.
• Signing: To sign a document or message, the signer applies a
mathematical algorithm to the content using their private
key. This process generates a unique digital signature that is
specific to both the content and the signer's private key. The
signature is typically appended to the document or message.
• Verification: Anyone who receives the digitally signed
document can verify its authenticity by using the signer's
public key. They apply the same algorithm to the document
and the signature using the public key, which produces a
result. If the result matches the one obtained by the signer
when creating the signature, the document is considered
authentic and unaltered.
• Public Key Infrastructure (PKI): In many digital signature
systems, a trusted third party, known as a Certificate
Authority (CA), issues digital certificates that bind public keys
to specific entities (such as individuals or organizations).
These certificates help establish trust in the authenticity of
the public keys used for verification.
• Timestamping: To ensure that a digital signature remains
valid even if the signer's certificate expires or is revoked,
timestamping can be used. A trusted timestamp authority
adds a timestamp to the digital signature, indicating the
exact time the signature was created. This helps establish
the signing time and provides additional evidence of the
signature's validity.
• Secure Transmission: It's essential to securely transmit both
the digitally signed document and the corresponding public
key (if not previously shared). Encryption and secure
communication protocols, such as SSL/TLS, can be used to
protect the integrity and confidentiality of the transmitted
data.
Here is our five-step guide to how the digital signature process
works:
• Create the document
The document is created with whatever tool is used in the
organization. To prepare for signing, the document should be
converted to PDF (Portable Document Format).
It is recommended to use the PDF/A standard when creating
the document, as this format is made for archiving. It also
ensures that the visual representation of the document is
preserved.
• Upload the document
The provider chosen depends entirely on what aspects of the
digital signature are required. There are basic free apps,
subscription services offering premium features, cloud-based
solutions for on-the-go signing, or an app integrated into your
CRM.
If you need to sign a more casual document without money
involved, it might be okay to use a simple electronic signature,
for example scribbling a handwritten signature on a screen.
This will have no evidence of the signer’s identity.
But if you are dealing with legal documents or contracts, you
should opt for a digital signature with identity verification built
into the solution to keep you safe.
Digital signature encryption ensures the data associated with
the signed document is secure, and helps to verify the
authenticity of the signature.
• Send a signature request
Create a signature request to send the document to the
signers. Each signer will receive the document, and have the
option to sign it, using a method defined by the sender, such as
eID, uploading ID paper, or even the low-security scribble a
signature on a screen.
Multiple users may be added to a signature request, and may
sign in-sequence or in-parallel. Use the solution, for example
Signicat, to manage the documents to be signed and reach out
to the users signing.
Receive status updates of the request and if multiple signers
are involved, you will receive another update when the signing
is complete.
Generating the document and sending a signature request can
all be done directly within a CRM system, such as Microsoft
Dynamics or SalesForce.
• Wait for signatures
Each of the signers will receive a notification that they have
received a document to sign. Depending on the user and their
location, different methods are available to sign the
documents.
The user’s identity has already been validated, and can then be
re-used for signing. If no eID is available, the user can sign by
uploading their personal ID paper and taking a self-portrait.
This is more work for the user, but will give good proof of
identity.
• Finalise the document
Once the document is signed by all required signers, the signed
document is generated. This contains all the collected evidence
during the signing, and the signatures will show who signed
and can be verified to make sure the document has not been
modified after it was signed.
This information can later be used as legal evidence. Once
upon a time, you needed a courier to send signed paper
documents to the recipient, but now you can send everything
finalised with the touch of a button, while knowing everything
is legal and verified.
How do digital signatures work?
• Using a mathematical algorithm, digital signing
solution providers such as generate two keys: a public key and
a private key. When a signer digitally signs a document, a
cryptographic hash is generated for the document.
• That cryptographic hash is then encrypted using the sender's
private key, which is stored in a secure HSM box. It is then
appended to the document and sent to the recipients along
with the sender's public key.
• The recipient can decrypt the encrypted hash with the sender's
public key certificate. A cryptographic hash is again generated
on the recipient's end.
• Both cryptographic hashes are compared to check its
authenticity. If they match, the document hasn't been
tampered with and is considered valid.

You might also like