Cyber Security UNIT-1
Cyber Security UNIT-1
Unit-1
Cybercrime or a computer-oriented crime is a crime that includes a computer and a
network. The computer may have been used in the execution of a crime or it may be the
target. Cybercrime is the use of a computer as a weapon for committing crimes such as
committing fraud, identity theft, or breaching privacy. Cybercrime, especially through
the Internet, has grown in importance as the computer has become central to every field
like commerce, entertainment, and government. Cybercrime may endanger a person or
a nation’s security and financial health. Cybercrime encloses a wide range of activities,
but these can generally be divided into two categories:
1. Crimes that aim at computer networks or devices. These types of crimes
involve different threats (like virus, bugs etc.) and denial-of-service (DoS)
attacks.
2. Crimes that use computer networks to commit other criminal activities. These
types of crimes include cyber stalking, financial fraud or identity theft.
Term Cybercrime
The term cyber has some interesting synonyms: fake, replicated, pretend, imitation,
virtual, computer- generated. Cyber means combining forms relating to Information
Technology, the Internet and Virtual Reality. This term owes its origin to the word
"cybernetics" which deals with information and its use; furthermore, cybernetics is the
science that overlaps the fields of neurophysiology, information theory, computing
machinery and automation. However, beyond this, there does not seem to be any
further connection to the term "cybernetics" as per other sources searched. It is closely
related to control theory and systems theory.
People are curious to know how cybercrimes are planned and how they actually take
place. Worldwide, including India, cyberterrorists usually use computer as a tool, target
or both for their unlawful act to gain information which can result in heavy loss/damage
to the owner of that intangible sensitive information.
One definition that is advocated is, "a crime conducted in which a computer was directly
and significantly instrumental" This definition is not universally accepted. It, however,
initiates further discussion to narrow the scope of the definition for "cybercrime" for
example, we can propose the following alternative definitions of computer crime:
Any illegal act where a special knowledge of computer technology is essential for
its perpetration, investigation or prosecution.
Any traditional crime that has acquired a new dimension or order of magnitude
through the aid of a computer, and abuses that have come into being because of
computers.
Any financial dishonesty that takes place in a computer environment.
Any threats to the computer itself, such as theft of hardware or software,
sabotage and demands for ransom.
2. Cyber Extortion –
Cyber extortion occurs when a website, e-mail server or computer system is
subjected to or threatened with repeated denial of service or other attacks by
malicious hackers. These hackers demand huge money in return for assurance
to stop the attacks and to offer protection.
3. Cyber Warfare –
Cyber warfare is the use or targeting in a battle space or warfare context of
computers, online control systems and networks. It involves both offensive
and defensive operations concerning to the threat of cyber attacks, espionage
and sabotage.
4. Internet Fraud –
Internet fraud is a type of fraud or deceit which makes use of the Internet and
could include hiding of information or providing incorrect information for the
purpose of deceiving victims for money or property. Internet fraud is not
considered a single, distinctive crime but covers a range of illegal and illicit
actions that are committed in cyberspace.
5. Cyber Stalking –
This is a kind of online harassment wherein the victim is subjected to a
barrage of online messages and emails. In this case, these stalkers know their
victims and instead of offline stalking, they use the Internet to stalk.
However, if they notice that cyber stalking is not having the desired effect,
they begin offline stalking along with cyber stalking to make the victims’
lives more miserable.
Challenges of Cyber Crime:
2. Anonymity-
Those who Commit cyber crime are anonymous for us so we cannot do
anything to that person.
5. No harsh punishment-
In Cyber crime there is no harsh punishment in every cases. But there is harsh
punishment in some cases like when somebody commits cyber terrorism in
that case there is harsh punishment for that individual. But in other cases
there is no harsh punishment so this factor also gives encouragement to that
person who commits cyber crime.
Prevention of Cyber Crime:
Below are some points by means of which we can prevent cyber crime:
1. Use strong password –
Maintain different password and username combinations for each account
and resist the temptation to write them down. Weak passwords can be easily
cracked using certain attacking methods like Brute force attack, Rainbow
table attack etc, So make them complex. That means combination of letters,
numbers and special characters.
1. Reconnaissance
The literal meaning of "Reconnaissance" is an act of reconnoitering- explore,
often with the goal of finding something or somebody (especially to gain
information about an enemy or potential enemy).
In the world of "hacking," reconnaissance phase begins with "Footprinting" -
this is the preparation toward preattack phase, and involves accumulating
data about the target's environment and computer architecture to find ways to
intrude into that environment. Footprinting gives an overview about system
vulnerabilities and provides a judgment about possible exploitation of those
vulnerabilities. The objective of this preparatory phase is to understand the
system, its networking ports and services, and any other aspects of its
security that are needful for launching the attack.
Thus, an attacker attempts to gather information in two phases: passive and
active attacks.
2. Passive Attacks
A passive attack involves gathering information about a target without his/her
(individual's or company's) knowledge. It can be as simple as watching a
building to identify what time employees enter the building's premises.
However, it is usually done using Internet searches or by Googling (i,e.,
searching the required information with the help of search engine Google) an
individual or company to gain information.
3. Active Attacks
An active attack involves probing the network to discover individual hosts to
confirm the information (IP addresses, operating system type and version, and
services on the network) gathered in the passive attack, phase. It involves the
risk of detection and is also called "Rattling the doorknobs" or "Active
reconnaissance."
Active reconnaissance can provide confirmation to an attacker about security
measures in place,, but the process can also increase the chance of being
caught or raise suspicion.
4. Scanning and Scrutinizing Gathered Information
Scanning is a key step to examine intelligently while gathering information
about the target. The objectives of scanning are as follows:
Social engineering uses human weakness or psychology to gain access to the system,
data, personal information, etc. It is the art of manipulating people. It doesn’t involve
the use of technical hacking techniques. Attackers use new social engineering practices
because it is usually easier to exploit the victim’s natural inclination to trust. For
example, it is much easier to fool someone to give their password instead of hacking
their password. Sharing too much information on social media can enable attackers to
get a password or extracts a company’s confidential information using the posts by the
employees. This confidential information helped attackers to get the password of victim
accounts.
Purpose
The purpose of social engineering attacks is typically to steal sensitive information,
such as login credentials, credit card numbers, or personal information. Attackers can
use this information for identity theft, financial fraud, or other malicious purposes.
Another purpose of social engineering attacks is to gain unauthorized access to secure
areas or systems. For example, an attacker might use tailgating to follow an authorized
individual into a secure area or use pretexting to convince an individual to give them
access to a restricted system.
Prevention
Timely monitor online accounts whether they are social media accounts or
bank accounts, to ensure that no unauthorized transactions have been made.
Check for Email headers in case of any suspecting mail to check its legitimate
source.
Avoid clicking on links, unknown files, or opening email attachments from
unknown senders.
Beware of links to online forms that require personal information, even if the
email appears to come from a source. Phishing websites are the same as
legitimate websites in looks.
Adopt proper security mechanisms such as spam filters, anti-virus software,
and a firewall, and keep all systems updated, with anti-keyloggers.
Cyber Stalking
In Cyber Stalking, a cyber criminal uses the internet to consistently threaten
somebody. This crime is often perpetrated through email, social media, and the other
online medium. Cyber Stalking can even occur in conjunction with the additional
ancient type of stalking, wherever the bad person harasses the victim offline. There’s no
unified legal approach to cyber Stalking, however, several governments have moved
toward creating these practices punishable by law. Social media, blogs, image sharing
sites and lots of different ordinarily used online sharing activities offer cyber Stalkers
with a wealth of data that helps them arrange their harassment. It includes actions like
false accusations, fraud, information destruction, threats to life and manipulation
through threats of exposure. It has stalkers take the assistance of e-mails and other
forms of message applications, messages announce to an online website or a discussion
cluster, typically even the social media to send unwanted messages, and harass a
specific person with unwanted attention. Cyber Stalking is typically cited as internet
stalking, e-stalking or online stalking.
Types of Cyber Stalking:
Webcam Hijacking: Internet stalkers would attempt to trick you into
downloading and putting in a malware-infected file that may grant them
access to your webcam. the method is therefore sneaky that it’s probably you
wouldn’t suspect anything strange.
Observing location check-ins on social media: In case you’re adding
location check-ins to your Facebook posts, you’re making it overly simple for
an internet stalker to follow you by just looking through your social media
profiles.
Catfishing: Catfishing happens via social media sites, for example,
Facebook, when internet stalkers make counterfeit user-profiles and approach
their victims as a companion of a companion.
Visiting virtually via Google Maps Street View: If a stalker discovers the
victim’s address, then it is not hard to find the area, neighbourhood, and
surroundings by using Street View. Tech-savvy stalkers don’t need that too.
Installing Stalkerware:One more method which is increasing its popularity
is the use of Stalkerware. It is a kind of software or spyware which keeps
track of the location, enable access to text and browsing history, make an
audio recording, etc. And an important thing is that it runs in the background
without any knowledge to the victim.
Looking at geotags to track location:Mostly digital pictures contain geotags
which is having information like the time and location of the picture when
shot in the form of metadata. Geotags comes in the EXIF format embedded
into an image and is readable with the help of special apps. In this way, the
stalker keeps an eye on the victim and gets the information about their
whereabouts.
Protective Measures:
Develop the habit of logging out of the PC when not in use.
Remove any future events you’re close to attending from the social networks
if they’re recorded on online approaching events and calendars.
Set strong and distinctive passwords for your online accounts.
Cyber Stalkers can exploit the low security of public Wi-Fi networks to
snoop on your online activity. Therefore, avoid sending personal emails or
sharing your sensitive info when connected to an unsecured public Wi-Fi.
Make use of the privacy settings provided by the social networking sites and
keep all info restricted to the nearest of friends.
Do a daily search on the internet to search out what information is accessible
regarding you for the public to check.
1. Prevent Cybercrime:
Cyber cafes can be misused by criminals to carry out illegal activities, such as hacking,
cyberbullying, online fraud, identity theft, and distribution of illegal content. Regulations can
help enforce stricter measures to deter cybercriminals from using cyber cafes as a platform for
their activities.
Suppose a security firm is tasked with guarding a rare painting that hangs in a
museum. There are a number of ways that a thief could enter and exit the
museum — front doors, back doors, elevators, and windows. A thief could
enter the museum in some other way too, perhaps by posing as a member of
the museum's staff. All of these methods represent attack vectors, and the
security firm may try to eliminate them by placing security guards at all doors,
putting locks on windows, and regularly screening museum staff to confirm
their identity.
Similarly, digital systems all have areas attackers can use as entry points.
Because modern computing systems and application environments are so
complex, closing off all attack vectors is typically not possible. But strong
security practices and safeguards can eliminate most attack vectors, making it
far more difficult for attackers to find and use them.
Open ports: A port is a virtual entryway into a device. Ports help computers
and servers associate network traffic with a given application or process. Ports
that are not in use should be closed. Attackers can send specially crafted
messages to open ports to try to compromise the system, just as a car thief
might try opening doors to see if any are unlocked.