cscs
cscs
ions: 1. Protection of Sensitive Data: - Cybercrime refers to illegal activities conducted using computers, Computer virus is a type of malicious software (malware) designed to
programs, and data from digital attacks, unauthorized access, and Organizations manage vast amounts of sensitive information, networks, or the internet. It encompasses a wide range of offenses, spread from one computer to another and interfere with normal
damage. With the rapid advancement of technology, cybersecurity including customer data, financial records, and intellectual property. - from financial fraud to hacking and identity theft, aimed at operations. Viruses attach themselves to legitimate programs or files
has become an essential field in safeguarding sensitive information Data breaches can lead to loss of trust, legal penalties, and individuals, organizations, or governments. Types: 1. Hacking: - and execute malicious code when the infected file or program is
and ensuring the smooth functioning of digital infrastructure. Key competitive disadvantage. 2. Operational Continuity: - Cyberattacks, Unauthorized access to computer systems or networks to steal, opened or run. Characteristics: 1. Replication: Viruses can copy
Components: - Confidentiality: Ensures that sensitive information is such as ransomware or Distributed Denial of Service (DDoS), can modify, or destroy data. - Example: Breaking into a company’s themselves and spread to other files or systems. 2. Activation Trigger:
accessible only to authorized users. - Integrity: Maintains the disrupt operations, causing downtime and financial losses. - Strong database to steal confidential information. 2. Phishing: - Fraudulent Viruses are activated when the infected file or program is executed. 3.
accuracy and reliability of data by preventing unauthorized changes. - cybersecurity ensures uninterrupted business processes. 3. Financial attempts to obtain sensitive information like passwords or credit card Payload Delivery: Once activated, they perform malicious activities
Availability: Ensures that systems, data, and services are accessible Impact: - Direct costs include data recovery, legal fees, and potential details via fake emails or websites. - Example: Sending fake bank such as deleting files, stealing data, or corrupting systems. Types: 1.
when needed. - Authentication: Verifies the identity of users and ransom payments. - Indirect costs include loss of business, damaged emails asking users to "verify their accounts." 3. Identity Theft: - File Infector Virus: - Attaches to executable files (.exe, .dll). - Example:
systems before granting access. - Non-Repudiation: Ensures actions or reputation, and reduced customer confidence. 4. Regulatory Stealing personal information to impersonate someone for financial Melissa Virus. 2. Boot Sector Virus: - Infects the boot sector of a
communications cannot be denied by the involved parties. Compliance: - Many industries are governed by data protection laws or other benefits. - Example: Using stolen credentials to apply for storage device (hard drive, USB). - Example: Michelangelo Virus. 3.
Importance: 1. Data Protection: Safeguards sensitive personal, (e.g., GDPR, HIPAA) that mandate specific cybersecurity measures. - loans or credit cards. 4. Ransomware Attacks: - Encrypting victims' Macro Virus: - Targets documents like MS Word or Excel using macro
financial, and business data from theft or loss. 2. Business Continuity: Non-compliance can result in heavy fines and legal repercussions. 5. data and demanding payment for the decryption key. - Example: scripts. - Example: Concept Virus. 4. Polymorphic Virus: - Changes its
Ensures systems and services remain operational, preventing Reputation and Customer Trust: - A breach can harm an WannaCry ransomware attack targeting organizations globally. 5. code to avoid detection by antivirus software. - Example: Storm
disruptions. 3. Financial Protection: Minimizes risks of financial losses organization's brand image and erode customer trust, especially if Online Fraud: - Scams that exploit the internet to deceive users for Worm. 5. Resident Virus: - Installs itself in system memory and infects
from cyberattacks. 4. Regulatory Compliance: Helps meet legal sensitive data is leaked. - Proactive cybersecurity measures enhance financial gain. - Example: Fake e-commerce websites taking payments files as they are accessed. - Example: CIH (Chernobyl) Virus. 6.
requirements and avoid penalties. 5. Trust and Reputation: Builds customer confidence and loyalty. 6. Employee Productivity: - but not delivering products. 6. Cyberstalking: - Using the internet to Multipartite Virus: - Attacks multiple parts of the system, such as boot
consumer confidence by protecting their data. 6. Preventing Cyberattacks can halt employee access to systems, leading to delays harass or intimidate someone. - Example: Sending repeated sectors and files. - Example: Ghostball Virus. How Computer Viruses
Cybercrime: Helps deter criminals from exploiting vulnerabilities for and inefficiencies. - Proper cybersecurity reduces downtime and threatening messages via social media. Reasons Behind Cybercrime: Spread: 1. Email Attachments: Clicking on malicious links or files in
malicious purposes. 7. Intellectual Property Protection: Secures maintains productivity. 6. Increased Costs for Mitigation: - Reactive Cybercrime occurs due to various motivations and factors, ranging phishing emails. 2. Infected Downloads: Downloading software or
valuable company assets, research, and proprietary information from cybersecurity measures after a breach are often more expensive than from financial gain to political objectives. Below are the primary files from untrustworthy sources. 3. Removable Media: Using infected
being stolen or copied. 8. Secure Communication: Protects sensitive proactive investments. - Organizations need to allocate resources for reasons: 1. Financial Gain - Primary Motivation: Many cybercriminals USB drives or external hard drives. 4. Network Propagation:
communications, reducing the risk of interception or manipulation. robust defense mechanisms. Strategies to Mitigate Implications: 1. target individuals and organizations to steal money or valuable Spreading through shared networks or devices. Preventive Measures:
Challenges: 1. Evolving Threats: Cyberattacks are constantly evolving, Implement Security Policies: Define clear cybersecurity protocols for financial information. 2. Lack of Awareness and Education - Many 1. Install Antivirus Software: Keep it updated to detect and remove
making it hard to stay protected. 2. Shortage of Skilled Professionals: employees and systems. 2. Invest in Technology: Use firewalls, individuals and organizations are unaware of cybersecurity practices, viruses. 2. Avoid Suspicious Links: Don’t click on unknown links or
Lack of experts to manage and respond to security risks. 3. Complex encryption, and advanced threat detection tools. 3. Employee making them easy targets. 3. Low Cost and High Reward - Cybercrime email attachments. 3. Use Trusted Sources: Download files only from
Security Systems: Managing diverse and complex security solutions Training: Regularly educate employees on cybersecurity risks and safe often requires minimal investment in tools or knowledge while reputable websites. 4. Enable Firewalls: Block unauthorized access to
can be challenging. 4. Insider Threats: Employees or trusted practices. 4. Incident Response Plans: Have a clear plan to detect, offering significant returns. 4. Anonymity on the Internet - The your system. 5. Regular Updates: Keep your operating system and
individuals can unintentionally or maliciously compromise security. 5. contain, and recover from cyber incidents. 5. Regular Audits: Conduct internet allows attackers to hide their identity and location, making it software updated. 6. Backup Data: Maintain regular backups to
Ransomware: Increasing attacks that lock systems or data, demanding routine security assessments to identify and address vulnerabilities. difficult to track them. 5. Political or Ideological Motives - Some recover from potential virus damage. Signs of a Computer Virus: 1.
ransom for release. 6. Privacy Issues: Safeguarding user data while cybercriminals engage in activities to promote political agendas or Sluggish Performance: - Your computer runs slower than usual, and
complying with privacy regulations. 7. Legacy Systems: Older systems Software piracy refers to the unauthorized copying, distribution, or protest against organizations or governments. applications take longer to load. 2. Frequent Crashes or Errors: -
with outdated security are vulnerable to attacks. 8. Supply Chain use of software without proper licensing or permission from the Unexpected system restarts, freezing, or crashing of applications. 3.
Risks: Third-party vendors can be a weak link in security. software creator or owner. It violates intellectual property rights and Malware threats (malicious software) is a term for software designed Unusual Pop-ups: - Frequent, unexpected ads or warnings, often
often results in legal, financial, and ethical consequences. Types: 1. to harm, exploit, or compromise devices, systems, or networks. promoting fake antivirus tools. 4. Increased Network Activity: -
Cyberspace: refers to the virtual environment created by End-User Piracy: - Individuals or organizations use software without Types: 1. Viruses - Definition: Self-replicating programs that attach to Unusual data usage or internet slowdown due to hidden background
interconnected digital technologies, such as the internet, computer purchasing the required licenses. - Examples: Installing a single- legitimate files or software. - Function: Spread across systems and processes. 5. Corrupted or Missing Files: - Files disappear or become
networks, and communication systems. Features: - It is intangible and license software on multiple devices or using cracks/keygens to corrupt or destroy data. - Example: Melissa Virus infected documents inaccessible, and you may see unknown files on your system. 6.
exists in a digital realm. - Enables global connectivity and bypass activation. 2. Counterfeiting: - Producing fake copies of via email. 2. Worms - Definition: Standalone malware that replicates Unfamiliar Programs: - Unknown programs or applications appear
communication. - Provides a platform for data exchange, commerce, software, often packaged and sold as genuine. - These counterfeit itself to spread across networks without needing a host file. - installed on your system. How to Remove a Computer Virus: 1.
entertainment, and social interactions. Components: - Hardware copies usually appear legitimate but lack proper licensing. 3. Online Function: Consume bandwidth, overload networks, and damage Disconnect from the Internet: - Immediately disconnect to prevent
(servers, routers, computers). - Software (applications, protocols). - Piracy: - Distribution of software through unauthorized websites, infrastructure. - Example: The “ILOVEYOU” worm caused widespread the virus from spreading or sending data to attackers. 2. Boot in Safe
Users and their interactions within the network. Applications: - torrents, or file-sharing platforms. - Example: Downloading paid damage in 2000. 3. Trojans (Trojan Horses) - Definition: Malware Mode: - Restart your computer and boot into Safe Mode to limit the
Online banking, e-commerce, social media, cloud computing, and software for free from illegal sources. 4. Hard Disk Loading: - Installing disguised as legitimate software to trick users into installing it. - virus’s activity. 3. Run Antivirus Software: - Use a reputable antivirus
more. - Facilitates innovation, research, and global collaboration. unlicensed software onto computers sold to customers, often by Function: Provide unauthorized access or steal sensitive information. program to scan and remove the virus. - Update the antivirus
Concerns: - Cyber threats like hacking, data breaches, and retailers to attract buyers. - Example: A computer vendor including - Example: Fake antivirus programs. 4. Ransomware - Definition: database to ensure it can detect the latest threats. 4. Use Malware
misinformation. - Privacy and security challenges in managing pirated software as a "bonus" for buyers. 5. OEM Piracy (Original Encrypts the victim's data and demands payment (ransom) to restore Removal Tools: - If antivirus fails, use specialized tools like
sensitive data. Equipment Manufacturer): - Selling software marked as "OEM-only" access. - Function: Disrupts businesses and individual operations by Malwarebytes or HitmanPro to remove stubborn malware. 5. Delete
separately, often violating licensing agreements. 6. locking critical files. - Example: WannaCry ransomware attack in 2017. Suspicious Files: - Manually delete unknown files or programs if
Corporate/Institutional Piracy: - Companies or organizations use more 5. Spyware - Definition: Malware that secretly monitors user activity identified as malicious.
Cyber Threats refer to malicious activities aimed at disrupting,
damaging, or gaining unauthorized access to computer systems, copies of software than their licenses allow. Risks Involved in Using and collects sensitive information. - Function: Steals credentials,
networks, or data. These threats can originate from individuals, Pirated Software: 1. Legal Consequences: - Heavy fines, lawsuits, and personal information, or financial data. - Example: Keyloggers record 1. Worms: - Worms are a type of self-replicating malware that can
groups, or organizations and may have varying motives, such as penalties for copyright infringement. 2. Security Threats: - Pirated keystrokes to capture passwords. 6. Backdoors - Definition: Malicious spread independently across computers and networks without the
financial gain, espionage, or simply causing harm. Types: 1. Malware: software often contains malware, viruses, or spyware, compromising code that bypasses normal authentication to grant unauthorized need for a host file or user interaction. - They exploit vulnerabilities in
Malicious software like viruses, worms, ransomware, and spyware the user’s data and systems. 3. Lack of Updates and Support: - Users access. - Function: Allows attackers to access systems undetected. - software or operating systems to propagate and can cause significant
designed to damage or gain unauthorized access to systems and data. cannot access legitimate updates, patches, or technical support, Example: Malware used in advanced persistent threats (APTs). damage by consuming bandwidth, overloading servers, or delivering
- Example: Ransomware encrypts files and demands payment for making systems vulnerable to exploits. 4. Data Loss and Corruption: - Prevention Measures: 1. Install Antivirus Software: Keep antivirus harmful payloads. - Example: The ILOVEYOU worm caused
their release. 2. Phishing: Fraudulent emails, messages, or websites Pirated software may be unstable, leading to data corruption or loss. programs updated to detect and block malware. 2. Regular Updates: widespread disruption in 2000, infecting millions of computers. 2.
that trick users into sharing sensitive information like passwords or 5. Reputational Damage: - For businesses, using pirated software can Update operating systems and software to patch vulnerabilities. 3. Trojans: - Trojans (Trojan Horses) are malicious programs that
financial details. - Example: Fake bank emails asking for account harm credibility and customer trust. 6. Economic Loss: - Software Avoid Suspicious Links: Do not click on links or download attachments disguise themselves as legitimate applications to deceive users into
details. 3. Denial of Service (DoS) and Distributed Denial of Service piracy contributes to significant losses for developers and the from unknown sources. 4. Strong Passwords: Use complex passwords downloading or executing them. - Unlike worms, Trojans do not
(DDoS) Attacks: Flooding a system with excessive traffic to overwhelm software industry, affecting innovation. Preventive Measures: 1. and enable multi-factor authentication. 5. Employee Training: Educate replicate but can create a backdoor, steal sensitive data, or allow
and disable its services. - Example: Taking down websites by Educate Users: - Raise awareness about the risks of piracy and the users on recognizing phishing and malware threats. remote control of the infected system. - Example: A Trojan could
overloading servers with requests. 4. Man-in-the-Middle (MitM) importance of intellectual property rights. 2. Use Genuine Software: - masquerade as a game or utility, but when executed, it could steal
Attacks: Intercepting communications between two parties to steal or Purchase software directly from authorized vendors or developers. 3. Sniffing refers to the act of intercepting and monitoring data packets banking credentials or encrypt files for ransom. 3. Backdoor: - A
alter sensitive information. - Example: Eavesdropping on online Digital Rights Management (DRM): - Software creators can use traveling over a network. This activity can be used for legitimate backdoor is a secret entry point that allows attackers to bypass
banking sessions. 5. Zero-Day Exploits: Exploiting unknown encryption and licensing mechanisms to prevent unauthorized use. 4. purposes like network troubleshooting or malicious activities to steal normal authentication processes and gain unauthorized access to a
vulnerabilities in software before the developer can patch them. - Regular Audits: - Organizations should audit software installations to sensitive information. Types: 1. Passive Sniffing: - Definition: system. - It can be intentionally installed by developers for
Example: Targeting newly discovered flaws in operating systems. 6. ensure compliance with licensing agreements. 5. Implement Anti- Monitoring network traffic without altering it. - Purpose: Eavesdrop maintenance purposes or covertly added by attackers through
Social Engineering: Manipulating individuals into revealing Piracy Technology: - Developers can include activation keys, online on unencrypted data in networks like hubs where all traffic is visible. - malware or exploiting vulnerabilities. - Example: The SolarWinds
confidential information or performing actions that compromise verification, and tamper-proof coding to secure software. 6. Strict Example: Reading unencrypted login credentials in plain text. 2. attack in 2020 involved a backdoor inserted into legitimate software
security. - Example: Pretending to be IT support to gain login Legal Actions: - Governments and organizations should enforce Active Sniffing: - Definition: Actively injecting packets or manipulating updates, compromising many organizations. 4. Cyber Stalking: -
credentials. 7. SQL Injection: Inserting malicious SQL code into a web copyright laws and penalize offenders. 7. Promote Affordable network traffic to capture data. - Purpose: Used in switched networks Cyber stalking refers to using digital means to harass, monitor, or
application to access or manipulate databases. - Example: Extracting Software: - Offering affordable pricing for individuals, educational where direct traffic interception isn't possible. - Example: ARP threaten an individual persistently. - Stalkers may use social media,
customer data from an e-commerce website. 8. Advanced Persistent institutions, and developing markets can reduce piracy. 8. Monitor spoofing to redirect network traffic. Techniques: 1. Packet Sniffing: - email, or messaging apps to track victims, send intimidating
Threats (APTs): Long-term targeted attacks, often by sophisticated Online Platforms: - Developers should actively monitor and report Tools like Wireshark are used to capture and analyse data packets. 2. messages, or spread false information. - Example: A stalker could
groups, aimed at stealing sensitive information. - Example: Cyber piracy on websites and torrent platforms. ARP Spoofing: - Manipulates the ARP (Address Resolution Protocol) continuously monitor a victim’s online activity, send threatening
espionage targeting government systems. Prevention and Mitigation table to redirect traffic through the attacker’s machine. 3. MAC emails, or create fake profiles to tarnish their reputation. 5. Cyber
1. Use firewalls and antivirus software. 2. Implement strong password Forgery is the act of creating, altering, or imitating a document, Flooding: - Overloads a switch’s MAC table, turning it into a hub, Bullying: - Cyber bullying involves using digital platforms to
policies and multi-factor authentication. 3. Regularly update and signature, artwork, or other item with the intent to deceive or enabling sniffing. 4. DNS Spoofing: - Redirects traffic to malicious intimidate, humiliate, or harm someone emotionally or mentally. - It
patch software to fix vulnerabilities. 4. Conduct cybersecurity defraud someone. It is a criminal offense that often involves websites by altering DNS responses. Risks: 1. Credential Theft: often occurs on social media, messaging apps, or online forums and
awareness training for employees. 5. Create and test an incident misrepresentation and is used to gain unlawful benefits, such as Captures login credentials for online accounts. 2. Data Breaches: can include spreading rumors, sharing embarrassing content, or
response plan for quick recovery. financial gain or legal advantages. Key Elements: 1. Intent to Deceive: Exposes sensitive information like personal or financial data. 3. sending hateful messages. - Example: A bully might post defamatory
- Forgery involves deliberate actions to mislead others into believing Network Hijacking: Enables attackers to gain unauthorized access to content or share private photos of the victim online to harass them.
the falsified item is genuine. 2. Falsification: - The creation or systems. 4. Loss of Privacy: Monitors private communications. 6. Hiding Files: - The process of concealing files or data within a
Cyberwarfare refers to the use of cyberattacks by nations or state- system to prevent detection by users or security tools. - Attackers
sponsored groups to disrupt, damage, or compromise the digital alteration of an original item, such as forging a signature or altering Preventive Measures: 1. Use Encryption: Encrypt data using protocols
official records. 3. Use of Forged Items: - Presenting a falsified item as like HTTPS, SSL/TLS, and VPNs. 2. Implement Secure Networks: Use may use techniques like renaming files, changing file attributes
infrastructure of another nation. These attacks are often part of (hidden/system), or storing malicious files in less obvious directories.
geopolitical conflicts and are aimed at achieving military, political, or genuine to achieve a specific goal, such as gaining money or access. switches instead of hubs and configure ARP security. 3. Regular
Examples: 1. Signature Forgery: - Example: Signing someone else’s Monitoring: Analyse network traffic for unusual activity. 4. Avoid - Advanced methods include using steganography (hiding data within
economic advantages. Key Characteristics: 1. Nation-State images or other files) or encrypting files to make them inaccessible
Involvement: Primarily conducted by or on behalf of governments to name on a check or legal document without their permission to Public Wi-Fi: Use secure networks to prevent unauthorized access. 5.
withdraw money or gain ownership of property. 2. Document Authentication Protocols: Use strong authentication mechanisms like without the decryption key. - Example: Malware hiding in temporary
target other nations. 2. Targets: - Critical infrastructure like power directories under misleading names like “system32.exe” to blend in
grids, communication networks, and transportation systems. - Forgery: - Example: Altering a birth certificate, passport, or academic WPA3 for Wi-Fi. How it works: 1. Data Capture: - Sniffers capture data
degree to claim false identity, age, or qualifications. 3. Currency packets sent over a network using tools like Wireshark or tcpdump. - with legitimate files. 7. Covering Tracks: - Involves erasing evidence of
Government and military systems. - Financial institutions and private unauthorized activities to avoid detection and investigation. -
sectors. 3. Techniques Used: - Hacking: Gaining unauthorized access Forgery: - Example: Creating counterfeit currency notes to use as legal In a hub network, all devices receive the traffic, making sniffing easier.
tender, which undermines financial systems. 4. Check Forgery: - In a switched network, sniffers need to use techniques like ARP Attackers may clear system logs, delete access records, or disable
to disrupt systems or steal data. - Espionage: Stealing sensitive monitoring tools to hide their presence. - Techniques include: - Log
information for intelligence purposes. - Denial of Service Attacks: Example: Changing the amount written on a check or forging the spoofing to intercept traffic. 2. Packet Analysis: - Sniffers decode and
drawer's signature to withdraw money fraudulently. Consequences: analyze the captured packets to extract information such as login Cleaning: Removing or altering logs of login attempts, file access, or
Overloading systems to disrupt services. - Malware Deployment: system changes. - Timestamps Alteration: Modifying file creation or
Introducing destructive software to compromise systems. 4. 1. Legal Penalties: - Depending on the severity, forgery can result in credentials, emails, or other sensitive data. 3. Methods: - Passive
fines, imprisonment, or both. 2. Loss of Trust: - Forgery damages Sniffing: Listening to traffic without interfering, usually in hub access timestamps to mislead investigators. - Use of Anonymizing
Asymmetric Nature: Cyberwarfare allows smaller nations or groups to Tools: Utilizing VPNs, proxy servers, or the Tor network to hide their
challenge larger powers with relatively low costs. Challenges: 1. reputations and can harm personal and professional relationships. 3. networks. - Active Sniffing: Involves manipulating traffic in switched
Financial Loss: - Victims of forgery may lose money or assets. 4. networks (e.g., ARP spoofing or MAC flooding). 4. Exploitation: - identity. - Example: A hacker clears access logs after gaining
Attribution Difficulty: It is often hard to identify the exact source of an administrator rights to ensure no trace of their login or activities
attack due to the anonymity of cyberspace. 2. Collateral Damage: Economic Impact: - Large-scale forgery, such as counterfeiting, can Attackers use captured data for activities like identity theft, financial
disrupt markets and financial institutions. Preventive Measures: 1. fraud, or unauthorized access to systems. remains.
Attacks may unintentionally harm civilians or global systems, such as
hospitals or multinational corporations. 3. Escalation Risks: Verification Systems: - Use of biometric authentication, watermarks,
Cyberwarfare can lead to physical conflicts or trigger retaliation in and encryption to prevent forgery of documents and signatures. 2. Privilege escalation refers to a cyberattack technique where an Buffer Overflow is a type of vulnerability that occurs when a program
other domains. 4. Lack of Regulations: Unlike traditional warfare, Awareness: - Educating individuals and organizations about the risks attacker gains higher levels of access or permissions within a system writes more data into a buffer (a temporary storage area in memory)
international laws governing cyberwarfare are still underdeveloped. and signs of forgery. 3. Legal Frameworks: - Enforcing strict laws and or network than initially authorized. This allows them to execute than it can hold. This leads to adjacent memory locations being
regulations to deter potential forgers. 4. Technology Solutions: - restricted commands, access sensitive data, or compromise system overwritten, potentially causing unpredictable behavior or allowing
Adoption of blockchain and other tamper-proof technologies for security further. Types: 1. Vertical Privilege Escalation: Gaining higher attackers to execute malicious code. How Buffer Overflow Works: 1.
CIA Triad is a foundational concept in cybersecurity that focuses on securing records and transactions. Buffers in Programs: - Programs use buffers to temporarily store data,
three key principles to protect information and systems. These privileges, such as escalating from a standard user to an administrator
or root user. 2. Horizontal Privilege Escalation: Gaining access to such as user input or file contents. - Each buffer has a predefined size.
principles are Confidentiality, Integrity, and Availability, and they 2. Overflowing the Buffer: - When a program does not validate the
collectively ensure secure data management.1. Confidentiality - Hackers: Hackers are individuals skilled in computer systems and another user’s account with similar privilege levels. Techniques: 1.
networks. They use their knowledge to explore and understand Exploiting Software Vulnerabilities: - Attackers exploit flaws in size of incoming data, the buffer can overflow, writing data into
Definition: Ensuring that sensitive information is accessible only to memory areas beyond its boundaries. 3. Malicious Exploitation: -
authorized individuals or systems. - Purpose: Protects privacy and systems, often to identify vulnerabilities. Types of Hackers: White Hat software, such as unpatched applications or misconfigurations, to
Hackers: - Ethical hackers who identify and fix vulnerabilities to gain elevated privileges. 2. Credential Dumping: - Extracting Attackers exploit buffer overflows by injecting malicious payloads into
prevents unauthorized disclosure of data. - Methods to Maintain the overflowing data. - This can overwrite the return address of a
Confidentiality: - Encryption of data during storage and transmission. improve security. - Example: Penetration testers hired by companies. credentials (passwords, tokens) from memory or storage to log in as a
Black Hat Hackers: - Malicious hackers who exploit vulnerabilities for higher-privileged user. 3. Misconfigured Permissions: - Weak file or function, directing the program to execute the attacker’s code. Types:
- Strong access controls, such as passwords and multi-factor 1. Stack-Based Overflow: - Occurs in the call stack, often targeting the
authentication (MFA). - Data classification and handling policies to personal gain or to cause harm. - Example: Stealing data from a directory permissions allow unauthorized users to access or modify
secure database. Grey Hat Hackers: - Operate between ethical and sensitive resources. 4. Social Engineering: - Convincing legitimate return pointer to execute malicious code. - Example: Overwriting the
restrict access based on sensitivity. 2. Integrity - Definition: Ensuring stack with a crafted payload to gain control of a program. 2. Heap-
that information remains accurate, consistent, and unaltered unless malicious hacking, often breaking into systems without permission users to share privileged credentials or perform actions on the
but without harmful intent. Crackers: Crackers are individuals who attacker’s behalf. 5. Malicious Payloads: - Using malware, such as Based Overflow: - Targets the heap memory (used for dynamic
by authorized actions. - Purpose: Prevents unauthorized allocation). - Can corrupt adjacent memory and affect the behavior of
modifications, ensuring that data is reliable and trustworthy. - bypass software or system security for malicious purposes. Unlike rootkits or Trojans, to escalate privileges by bypassing system
hackers, their primary intent is destructive or illegal activity. Key defenses. 6. Privilege Inheritance Abuse: - Leveraging legitimate the application. Consequences: 1. Program Crashes: Causes the
Methods to Maintain Integrity: - Use of cryptographic techniques like application to terminate unexpectedly. 2. Execution of Malicious
hashing to verify data integrity. - Implementing version control and Activities: - Breaking Software Protections: Removing license keys, processes or tasks (e.g., scheduled tasks running with higher
copy protections, or DRM (Digital Rights Management). - Malware privileges) to execute malicious commands. Preventive Measures: 1. Code: Grants attackers control of the system. 3. Privilege Escalation:
regular backups. - Access controls to prevent unauthorized changes. Attackers may gain unauthorized administrative privileges. 4. Data
3. Availability - Definition: Ensuring that systems, data, and resources Deployment: Writing and spreading viruses, ransomware, or Trojans. - Patch Management: Regularly update software to fix known
Unauthorized Access: Illegally accessing networks to steal or destroy vulnerabilities. 2. Role-Based Access Control (RBAC): Assign minimum Corruption: Overwrites sensitive data, causing loss or alteration.
are accessible to authorized users whenever needed. - Purpose: Preventive Measures: 1. Input Validation: Ensure all input is within
Minimizes downtime and ensures operational continuity. - Methods data. Example: - Cracking software to bypass paid subscriptions or required privileges to each user. 3. Audit and Monitor: Regularly
licenses. - Gaining unauthorized access to a bank’s database to steal monitor logs to detect unusual activity or access patterns. 4. expected size and format. 2. Use of Safe Functions: Replace unsafe
to Ensure Availability: - Regular system maintenance and software functions like `strcpy()` with safer alternatives like `strncpy()`. 3.
updates. - Implementation of redundant systems and failover financial data. Phreakers: Phreakers are individuals who exploit Implement Multi-Factor Authentication (MFA): Adds an extra layer of
telecommunications systems, such as phone lines, for unauthorized security to prevent unauthorized access. 5. Secure Configuration: Buffer Size Checks: Allocate and manage buffer sizes dynamically and
mechanisms. - Protection against Distributed Denial of Service (DDoS) properly. 4. DEP and ASLR:- Data Execution Prevention (DEP):
attacks. Importance: 1. Holistic Security Framework: Provides a access or to make free calls. Key Activities: - Phone System Harden systems by limiting access to sensitive files and services. 6.
Exploitation: Manipulating phone systems to make free long-distance Limit Privilege Scope: Use principles like least privilege to restrict user Prevents code execution from non-executable memory regions.-
comprehensive approach to safeguarding information and systems. 2. Address Space Layout Randomization (ASLR): Randomizes memory
Balance of Priorities: Helps organizations identify and address calls or avoid charges. - Signal Hijacking: Using specific tones or and process permissions.
signals to bypass telecom security measures. - Hacking Early Telecom addresses to make exploitation difficult. 5. Compiler Protections: Use
vulnerabilities without compromising one principle for another. 3. modern compilers with built-in security features like stack canaries.
Applicability Across Sectors: Used universally in cybersecurity, from Networks: Focused on exploring and manipulating pre-digital telecom
personal data protection to critical infrastructure security. systems like landlines. Example:The use of a “blue box” in the 1970s
to send specific tones and gain control over telephone networks.
Cybercriminals are individuals or groups who engage in illegal Ethical hacking, also known as white-hat hacking, involves the Cyber forensics, also known as digital forensics, is the science of Forensic investigation in cybersecurity involves the process of
activities using computers, networks, or the internet. Their primary authorized process of probing systems, networks, or applications for collecting, analyzing, and preserving digital evidence from electronic identifying, preserving, analyzing, and documenting digital evidence
goal is to exploit vulnerabilities for personal, financial, or ideological vulnerabilities to improve security. It is performed by ethical hackers devices to investigate and solve crimes involving technology. from a cyber incident or breach. The goal is to uncover how the
gain. How Cybercriminals Plan Their Attacks: 1. Identifying the Target who use the same tools and techniques as malicious hackers but with Objectives: 1. Identification: Detect and recognize digital evidence incident occurred, the scope of the damage, and to provide
- Cybercriminals select a target based on value, vulnerability, or the permission of the organization to identify weaknesses before they related to cybercrimes or legal disputes. 2. Preservation: Safeguard actionable insights for legal or corrective measures. Process: 1.
opportunity. 2. Reconnaissance (Information Gathering) - Researching can be exploited by cybercriminals. Types: 1. Black-box Testing: evidence to prevent tampering, ensuring its admissibility in court. 3. Preparation and Prevention - Identify risks and potential threats. -
the target’s systems, employees, and vulnerabilities. Methods: - Hacker has no prior knowledge of the system. 2. White-box Testing: Analysis: Examine the data to uncover insights or trace criminal Develop incident response plans and ensure readiness. - Implement
Scanning networks for weak spots. - Using social media to gather Hacker has full knowledge of the system, including source code. 3. activities. 4. Documentation: Record every step of the investigation security measures like firewalls, encryption, and access controls. 2.
employee information. 3. Weaponization - Creating or acquiring tools Gray-box Testing: Hacker has partial knowledge of the system, process for transparency and legal validation. 5. Presentation: Present Identification - Detect breaches through monitoring systems, logs, or
to exploit the identified vulnerabilities. 4. Delivery of Attack - simulating an insider attack. 4. Social Engineering Testing: Simulating the findings in a structured manner to law enforcement or court reports. - Assess the scope and severity of the incident. 3.
Deploying the weaponized tool to compromise the target. 5. phishing, pretexting, or baiting attacks. 5. Mobile Hacking: Assessing authorities. Components: 1. Disk Forensics: Recovery and analysis of Containment - Isolate affected systems to limit further damage. -
Exploitation - Activating the malware or using other tools to exploit vulnerabilities in mobile applications and devices. 6. Web Application data from storage devices. 2. Network Forensics: Monitoring and Notify stakeholders and authorities while preserving evidence. 4.
vulnerabilities. 6. Execution of Attack Objectives - Fulfilling the Testing: Testing for vulnerabilities in web applications (e.g., SQL analyzing network traffic to detect and trace attacks. 3. Email Evidence Collection - Capture volatile (e.g., memory) and non-volatile
purpose of the attack, such as stealing data, disrupting operations, or injection, XSS). Purpose: 1. Identify Vulnerabilities: Proactively find Forensics: Investigating email frauds, phishing attempts, and identity (e.g., hard drives) data. - Maintain a chain of custody for legal
demanding a ransom. 7. Covering Tracks - Removing traces of the weaknesses in systems before malicious hackers exploit them. 2. Test theft. 4. Mobile Forensics: Extracting and analyzing data from mobile admissibility. - Secure evidence to prevent tampering. 5. Examination
attack to avoid detection. 8. Monetization or Propaganda - Defenses: Evaluate the effectiveness of security measures (e.g., devices like smartphones and tablets. 5. Cloud Forensics: and Analysis - Analyze evidence to uncover malicious activity and
Cybercriminals profit from their actions or achieve non-financial goals firewalls, encryption). 3. Improve Security: Provide recommendations Investigating cybercrimes involving cloud storage and computing. patterns. - Correlate data to reconstruct the timeline of events. -
like spreading a political message. to strengthen defenses. 4. Simulate Real Attacks: Test how systems Importance: - Helps law enforcement and organizations solve crimes Identify vulnerabilities and causes of the breach. 6. Reporting -
would respond to actual cyberattacks. 5. Compliance and Risk involving digital evidence. - Prevents tampering and ensures evidence Document findings, methods, and the event timeline. - Ensure
Enterprise Information Security Architecture (EISA) is a structured Management: Ensure regulatory compliance and manage risks by integrity for legal proceedings. - Enhances cybersecurity measures by reports are legally sound and suitable for forensic audits. - Provide
framework for managing and aligning an organization’s information identifying gaps. Importance: 1. Proactive Defense: Identifies and identifying vulnerabilities exploited in attacks. - Supports compliance recommendations for remediation and prevention. 7. Recovery and
security strategy with its overall business goals. It helps ensure that fixes vulnerabilities before they are exploited. 2. Cost Reduction: with legal and regulatory requirements for data protection. Remediation - Restore systems using backups or reinstallations. -
security policies, processes, and technologies are consistently Prevents costly breaches and reputational damage. 3. Boosts Patch vulnerabilities and strengthen defenses. - Monitor for any
integrated into the organization’s operations. Key Components: 1. Customer Trust: Demonstrates a commitment to data protection, Computer forensics is the branch of digital forensics that involves the recurrence of the issue. 8. Legal and Ethical Compliance - Follow data
Security Policies and Standards: - Defines rules and guidelines for fostering customer confidence. 4. Improved Incident Response: Helps identification, preservation, analysis, and presentation of evidence protection laws and corporate policies. - Collaborate with law
protecting information and IT assets. - Examples: Password policies, refine security response protocols. 5. Security Awareness: Increases found on computer systems, storage devices, and other digital media. enforcement for legal action if needed.
access control standards, and data classification guidelines. 2. Risk awareness of potential risks and security practices within the It plays a critical role in investigating and solving crimes involving
Management Framework: - Identifies, assesses, and mitigates risks to organization. Skills: Technical Skills: 1. Networking Knowledge: computers. Types: 1. Disk Forensics: - Focuses on analyzing hard Forensic Investigator are professionals skilled in collecting, analyzing,
organizational data and systems. 3. Security Governance: - Establishes Understanding protocols and network infrastructure. 2. Operating drives, SSDs, and other storage devices for evidence. 2. Email and preserving digital or physical evidence related to crimes or
roles, responsibilities, and accountability for security practices. 4. System Expertise: Proficiency in Linux and Windows. 3. Forensics: - Investigates email systems to detect fraud, phishing, or incidents. They play a key role in solving cases, especially
Technology Controls: - Implements technical measures like firewalls, Programming/Scripting: Skills in Python, C/C++, Java, Bash, etc. 4. unauthorized access. 3. Memory Forensics: - Analyzes volatile cybercrimes, by uncovering details hidden in data or systems. Role: 1.
intrusion detection systems, and encryption to safeguard assets. 5. Penetration Testing Tools: Familiarity with Metasploit, Nmap, memory (RAM) for evidence related to running processes or Evidence Collection - Identify, collect, and preserve digital evidence
Identity and Access Management (IAM): - Manages user identities, Wireshark, etc. 5. Cryptography: Knowledge of encryption and secure malware. 4. Network Forensics: - Monitors and analyzes network from devices and networks. - Use tools like EnCase or FTK to maintain
roles, and permissions to ensure only authorized individuals access communication methods. 6. Vulnerability Assessment: Using tools like activity to trace unauthorized access or breaches. 5. Mobile Device evidence integrity. 2. Analysis - Examine data to uncover malicious
sensitive data. 6. Incident Response Plan: - Defines procedures for Nessus and OpenVAS. Non-Technical Skills: 1. Problem Solving: Forensics: - Deals with recovering and analyzing data from mobile activities and reconstruct events. - Analyze logs, files, emails, and
detecting, responding to, and recovering from security breaches. Creative thinking to find vulnerabilities. 2. Communication Skills: phones and portable devices. Objectives: 1. Evidence Collection: - network traffic for clues. 3. Chain of Custody - Document evidence
Benefits: 1. Alignment with Business Goals: Security is integrated Explaining technical findings clearly to non-technical stakeholders. 3. Identify and collect relevant digital evidence without altering or handling to ensure legal admissibility. - Use hashing to verify data
with organizational objectives. 2. Improved Risk Management: Attention to Detail: Identifying even minor vulnerabilities. 4. Critical damaging it. 2. Data Recovery: - Retrieve deleted, damaged, or integrity. 4. Incident Response - Identify causes and scope of security
Identifies and mitigates potential threats effectively. 3. Enhanced Thinking: Analysing systems for potential risks. 5. Ethical Judgment: hidden data. 3. Legal Compliance: - Ensure evidence meets legal incidents. - Provide insights to mitigate ongoing and future threats. 5.
Compliance: Ensures adherence to legal, regulatory, and industry Maintaining confidentiality and following a code of conduct. 6. standards for admissibility in court. 4. Crime Investigation: - Uncover Reporting - Prepare detailed reports with findings and
standards. 4. Scalability and Flexibility: Adapts to changing business Teamwork: Collaborating with IT teams and management. and understand criminal activities involving digital devices. 5. methodologies. - Present evidence in structured formats for legal use.
needs and evolving threats. 5. Cost Efficiency: Reduces costs Prevention: - Learn from analyzed data to prevent similar crimes in 6. Court Testimony - Serve as an expert witness in legal cases. -
associated with breaches and reactive security measures. Threat Modelling: is a systematic approach to identifying and the future. Importance: 1. Solving Cybercrimes: - Essential in Explain technical findings and defend evidence validity. 7. Staying
Implementation: 1. Assessment and Planning: Analyse current addressing potential security threats and vulnerabilities in a system or investigating hacking, fraud, identity theft, and other crimes. 2. Legal Updated - Learn new tools, techniques, and cybersecurity trends. -
security posture and identify gaps. 2. Framework Selection: Adopt network. It helps organizations understand the types of threats they Evidence: - Provides reliable and admissible evidence for court Adapt to counteract evolving threats like malware and phishing. 8.
industry frameworks like NIST, ISO 27001, or COBIT. 3. Integration: face, their impact, and the likelihood of exploitation. Purpose: The proceedings. 3. Corporate Investigations: - Helps businesses Collaboration - Work with law enforcement, cybersecurity, and legal
Align security architecture with IT and business processes. 4. goal is to anticipate potential security risks before they become investigate internal fraud or policy violations. 4. Data Recovery: - teams. - Help in post-incident recovery and strengthening defenses.
Continuous Improvement: Regularly review and update the problems by identifying vulnerabilities, assessing the severity of these Retrieves critical data in cases of accidental loss or intentional
architecture to address new threats and business changes. risks, and implementing preventative measures. It enables deletion. 5. Incident Response: - Assists organizations in analyzing Forensic audit is a specialized examination and evaluation of a firm’s
organizations to allocate resources efficiently to mitigate the most security breaches and implementing safeguards. 6. Compliance and or individual’s financial records to detect and investigate fraud,
Information Assurance (IA) Model in cybersecurity is a framework critical threats. Process: Involves creating a detailed inventory of the Accountability: - Ensures organizations comply with legal and embezzlement, money laundering, or other financial crimes. The goal
used to ensure that information systems and data are protected from system or application, identifying potential threats (e.g., external regulatory standards. is to uncover the facts of the financial misdeeds and provide evidence
unauthorized access, modification, or destruction while maintaining attackers, malicious insiders), evaluating vulnerabilities, and that can be used in legal proceedings. Purpose: 1. Detect Fraud:
their availability and reliability. It focuses on the CIA Triad determining countermeasures to protect against them. It also Computer Forensics Report: is a structured document that details the Identify financial misconduct like embezzlement or misreporting. 2.
(Confidentiality, Integrity, and Availability) along with additional includes threat analysis tools and techniques like STRIDE and PASTA. findings and procedures of a digital investigation. 1. Executive Provide Legal Evidence: Offer evidence for legal actions or court use.
elements like authentication and non-repudiation. Dimensions: 1. Methods: Common threat modelling techniques include: - STRIDE: A Summary: This investigation was initiated to analyze [case 3. Recover Assets: Trace and recover stolen or hidden assets. 4.
Information States - Definition: Refers to the different stages or framework used to identify various threat types, such as spoofing, description]. Key findings include [main points, e.g., evidence of Ensure Financial Integrity: Confirm the accuracy of financial records.
conditions in which information can exist within a system or network. tampering, repudiation, information disclosure, denial of service, and malware, suspicious activities]. Recommendations for prevention and 5. Strengthen Controls: Identify weaknesses in internal financial
- Key States: - Data at Rest: Information that is stored on physical elevation of privilege. - PASTA: A risk-centric methodology that system hardening are included. 2. Objectives: The primary objectives systems. 6. Ensure Compliance: Verify adherence to regulations and
devices, such as hard drives, databases, or cloud storage. - Data in simulates possible attacks to analyse and prioritize potential threats. - of this investigation were: 1. To identify and preserve digital evidence laws. Fundamentals: 1. Audit: - Objective: Assess and verify the
Transit: Information that is being transmitted across a network or Attack Trees: A visual representation of potential threats and their from the compromised system. 2. To analyze the nature and extent of accuracy of financial records. - Methods: Involves reviewing financial
between systems. - Data in Use: Information actively being processed corresponding risk levels. Insider Attack: occurs when an individual the attack. 3. To provide actionable recommendations to prevent documents, transactions, and processes to ensure compliance with
by a system, such as during calculations or queries in memory. - with trusted access to an organization's systems, network, or future incidents. 3. Computer Evidence Analyzed: Evidence gathered legal and regulatory standards. 2. Investigation: - Objective: Identify
Importance: Understanding these states is crucial for implementing sensitive data intentionally or unintentionally causes harm. The and analyzed included: - Hard drives, SSDs, and other storage media. - and analyze financial misconduct or fraud. - Methods: Includes
appropriate security measures at each phase of the information attacker could be an employee, contractor, or someone with Network activity logs and firewall reports. - RAM dumps for live interviewing stakeholders, gathering evidence, and analyzing data to
lifecycle. 2. Security States - Definition: Refers to the security posture authorized access to the system. Types:- Malicious Insider: system analysis. - Browser history and cached files. - User application uncover suspicious activity or violations. 3. Agreed-Upon Procedures
or condition of information systems at any given moment in time. - Deliberately compromises security for financial gain, revenge, or logs and event logs. 4. Relevant Findings: The following are the Engagement: - Objective: Perform specific procedures agreed upon by
Key Security States: - Secure State: When information and systems espionage. - Unintentional Insider: An employee who unknowingly significant findings from the investigation: - Attacker Methodology: - the client and auditor. - Methods: Involves detailed steps outlined in
are fully protected and not exposed to threats or vulnerabilities. - causes a breach, often due to a lack of awareness or negligence (e.g., Evidence indicates the use of a phishing attack to gain initial access. - advance to address specific concerns, such as verifying transactions
Compromised State: When an information system has been breached falling for a phishing scam). - Privilege Abuse: An insider who exploits Malware (Trojan) was deployed to steal credentials. - User or reviewing controls, with findings reported back. 4. Proactive
or is vulnerable to attack, possibly due to a malware infection, insider their privileges to access or manipulate sensitive information beyond Applications: - Unauthorized applications were installed, such as Search for Fraud: - Objective: Detect fraud before it escalates. -
threat, or security loophole. - Transition State: When information or their authorized scope. Prevention: Mitigating insider threats [application name]. - Logs reveal frequent access to restricted files. - Methods: Uses techniques like data analytics, anomaly detection, and
systems are moving from one state to another (e.g., from secure to requires implementing security measures like least privilege access, Internet Activity: - Suspicious access to external IPs linked to continuous monitoring to identify signs of fraud early and prevent
compromised due to a breach). - Importance: Identifying the current regular monitoring of user activity, data encryption, and robust malicious activity. - Browser history showed visits to phishing further losses. Importance: 1. Fraud Detection and Prevention: Helps
security state allows for appropriate actions to be taken to either authentication methods. It’s also important to educate employees websites. 5. Supporting Details: Supporting evidence includes: 1. uncover and prevent financial fraud. 2. Legal Evidence: Provides
mitigate threats or enhance the security posture. 3. Security about cybersecurity best practices and conduct thorough background Screenshots of event logs showing unauthorized access timestamps. legally admissible evidence for legal proceedings. 3. Asset Recovery:
Countermeasures - Definition: These are the safeguards, tools, and checks before granting access to sensitive systems. Penetration 2. Packet capture (PCAP) files highlighting malicious communication. Aids in recovering misappropriated assets. 4. Financial Integrity:
processes implemented to protect information systems from security Testing: (often called ethical hacking) is the practice of simulating 3. Recovered deleted files with sensitive data. 6. Investigative Leads: Ensures accurate financial reporting and transparency. 5. Improved
threats and to maintain information assurance. - Types of Security cyberattacks on a system, application, or network to evaluate its The investigation revealed potential leads: - Traces of attacker IPs Internal Controls: Identifies weaknesses and strengthens financial
Countermeasures: - Preventive Measures: Measures aimed at security defenses and identify vulnerabilities. These tests are originating from [location]. - Metadata in files linked to external practices. 6. Regulatory Compliance: Ensures adherence to legal and
preventing threats from exploiting vulnerabilities (e.g., firewalls, conducted by security professionals who use the same techniques as sources. - Suspicious user accounts created without approval. 7. industry regulations. Challenges: 1. Complexity of Data: Large and
encryption, access control). - Detective Measures: Measures that help malicious hackers but with the permission of the organization. Types: Additional Subsections - Recommendations: - Implement robust complex data sets are difficult to analyze. 2. Legal and Ethical Issues:
identify attacks or breaches once they have occurred (e.g., intrusion - Black-box Testing: The tester has no prior knowledge of the system multi-factor authentication (MFA) to prevent unauthorized access. - Maintaining compliance with legal and ethical standards is critical. 3.
detection systems, logging, and monitoring). - Corrective Measures: or network. This type simulates a real-world external attack, where Regularly update and patch all systems. - Train employees on Resource Intensive: Requires significant time, expertise, and tools. 4.
Actions taken to respond to and recover from security incidents (e.g., the attacker has no inside information. - White-box Testing: The tester recognizing phishing attempts. - Deploy endpoint detection and Access to Information: Obtaining necessary records can be
patching vulnerabilities, restoring backups, incident response plans). - has full knowledge of the system, including source code, architecture, response (EDR) solutions. challenging. 5. Handling of Evidence: Proper evidence handling is
Importance: Effective countermeasures reduce the likelihood of a and network setup. This method provides a deep, comprehensive crucial to maintain admissibility. 6. Resistance to Findings: Internal
breach and minimize the damage in case of an attack. 4. Time - analysis of vulnerabilities. - Gray-box Testing: The tester has partial resistance to audit findings can hinder progress. Process: 1. Planning:
knowledge of the system (e.g., some access or credentials). It mimics Computer Forensics is Used as Evidence 1. Evidence Collection -
Definition: Refers to the temporal aspect of information assurance, Collect digital data like emails, files, logs, and browser histories. - Use Define the audit scope, objectives, and standards to be followed. 2.
including how information and security states evolve over time. - Key a scenario where an insider or someone with limited access tries to Data Collection: Gather system logs, configurations, and network
exploit the system. Process: 1. Reconnaissance: Gathering tools like EnCase or FTK to ensure evidence is extracted without
Aspects of Time: - Timeliness of Security Measures: Ensuring that alteration. 2. Evidence Preservation - Maintain a chain of custody to data. 3. Evaluation: Analyze collected data against predefined security
countermeasures are implemented in a timely manner to address information on the target system. 2. Scanning & Enumeration: standards. 4. Testing: Perform penetration tests, gap analysis, and
Identifying open ports and potential vulnerabilities. 3. Exploitation: document handling of evidence. - Use hashing methods (e.g., MD5,
emerging threats. - Incident Response Time: The speed at which SHA-256) to verify data remains unaltered. 3. Analysis - Analyze vulnerability assessments. 5. Reporting: Document findings,
security incidents are detected and addressed to minimize damage. - Attempting to exploit vulnerabilities. 4. Post-exploitation: Assessing vulnerabilities, and recommendations. 6. Follow-Up: Monitor and
the impact of the breach. 5. Reporting: Documenting findings and collected data to uncover deleted files, hidden folders, or encrypted
Lifespan of Information States: How long information remains in a data. - Reconstruct the sequence of events to identify actions and ensure remediation of identified issues.
given state (e.g., data at rest might stay in a secure state unless suggesting remediation. Importance: Penetration testing helps
organizations identify and fix vulnerabilities before they can be perpetrators. 4. Presentation in Court - Submit well-structured
moved or accessed). - Importance: Managing the time dimension forensic reports detailing findings and methods. - Act as expert Plan an Audit Against Audit Criteria 1. Define Audit Objectives -
ensures that security measures are responsive and that systems can exploited by real attackers, improving overall security posture and
reducing the risk of data breaches and other security incidents. witnesses to explain technical findings in understandable terms. 5. Clarify the audit purpose (e.g., compliance, risk, performance). - Align
adapt quickly to threats or changes in their security state. Types of Evidence - Direct Evidence: Emails, chat logs, screenshots objectives with stakeholders’ goals. 2. Identify Audit Criteria -
directly linked to the crime. - Circumstantial Evidence: IP addresses, Determine relevant standards, guidelines, internal policies, and legal
Attack vector is a method or pathway used by cybercriminals to gain Social engineering is a manipulation technique used by timestamps, and logs showing suspect activity. 6. Legal Compliance - requirements. 3. Scope the Audit - Select audit areas (departments,
unauthorized access to a system, network, or device in order to carry cybercriminals to deceive individuals into divulging confidential Adhere to legal guidelines for evidence collection and handling to processes, systems). - Define boundaries and level of detail. 4.
out malicious activities, such as data theft, system compromise, or information, performing actions, or granting access to systems that ensure admissibility. Develop an Audit Plan - Assign resources and audit team. - Set a
service disruption. Identifying and understanding attack vectors is compromise security. Types: 1. Phishing: - Fraudulent emails or timeline with key milestones. - Choose audit tools and methods. 5.
crucial for building robust defenses against cyber threats. Common messages that appear legitimate, tricking users into revealing Risk Assessment - Identify potential risks (e.g., data confidentiality). -
sensitive information (e.g., passwords, credit card numbers). 2. Spear ISO 27001:2013: ISO/IEC 27001:2013 is an international standard for
Attack Vectors:1. Phishing: Fraudulent attempts to steal sensitive Information Security Management Systems (ISMS), providing a Develop risk mitigation strategies. 6. Prepare Audit Program - Break
information by pretending to be a trustworthy entity (e.g., fake emails Phishing: - A targeted form of phishing aimed at specific individuals or down tasks and define test procedures. - Decide on sampling
organizations, often using personalized information to increase framework to protect the confidentiality, integrity, and availability of
or websites). 2. Malware: Malicious software (viruses, worms, information through risk management. Key Aspects: 1. Context of the strategies. 7. Communication and Documentation - Inform
trojans) designed to damage or gain unauthorized access to systems. credibility. 3. Pretexting: - Attackers create a fabricated scenario stakeholders about the audit scope and schedule. - Plan
(pretext) to obtain information, such as impersonating a trusted Organization - Understand internal and external factors affecting
3. Social Engineering: Manipulating individuals into divulging information security. 2. Leadership and Commitment - Top documentation for audit activities and findings. 8. Conduct
confidential information or performing harmful actions (e.g., authority figure to extract personal data. 4. Baiting: - Offering Preliminary Review - Review available documentation to ensure audit
something enticing (e.g., free software or prizes) to lure victims into management must support and lead the ISMS efforts. 3. Risk
pretexting, baiting). 4. SQL Injection: Inserting malicious SQL code Assessment and Treatment - Identify and manage information readiness. - Refine approach if necessary. 9. Audit Execution - Gather
into input fields to exploit vulnerabilities and access or alter data. 5. disclosing information or downloading malicious content. 5. data, test compliance, and assess performance. - Document findings
Tailgating:- Gaining unauthorized access to physical locations by security risks with a treatment plan. 4. Information Security
Cross-Site Scripting (XSS): Injecting malicious scripts into web pages Objectives - Set measurable objectives aligned with organizational and conduct interviews. 10. Post-Audit Activities - Prepare an audit
to steal sensitive data from users. 6. Man-in-the-Middle (MITM) following authorized personnel, often without their knowledge. 6. report with findings and recommendations. - Review with
Quizzes or Surveys: - Cybercriminals create fake surveys or quizzes to goals. 5. Control Framework - Implement security controls from
Attack: Intercepting and potentially altering communications between Annex A to protect information assets. 6. Continuous Improvement - stakeholders and suggest corrective actions. - Monitor corrective
two parties. 7. Denial-of-Service (DoS) / Distributed DoS (DDoS): collect personal information through seemingly harmless questions. actions and improvements. 11. Audit Review and Feedback - Evaluate
Targets: 1. Individuals: - Employees, managers, or any person who has Regularly review and improve the ISMS for effectiveness. 7. Internal
Overloading a system with traffic to make it unavailable to users. 8. Audits and Reviews - Conduct audits and management reviews to audit effectiveness and gather feedback. - Refine future audits based
Brute Force Attacks: Guessing passwords or encryption keys through access to sensitive information or systems. 2. Organizations: - on feedback.
Companies, especially employees in HR, finance, or IT departments, ensure compliance and improvement. 8. Certification - Seek
trial and error. 9. Zero-Day Exploits: Attacks exploiting unknown certification to demonstrate compliance and effective management.
vulnerabilities in software before a patch is released. 10. Credential who have access to internal systems or databases. 3. Public figures: -
Celebrities, politicians, or high-profile individuals who are often Benefits: 1. Risk Management Structured approach to managing
Stuffing: Using stolen login credentials across multiple sites, assuming information security risks. 2. Improved Reputation Builds trust with
users reuse passwords. How Attack Vectors are Exploited: - Weak targeted for personal gain or corporate espionage. 4. Weak Security
Systems: - Any organization with poor security protocols or a lack of stakeholders by demonstrating security commitment. 3. Legal
Passwords: Many attacks, like brute force, exploit weak or easily Compliance Helps meet regulatory requirements and data protection
guessed passwords. - Software Vulnerabilities: Unpatched software awareness, making them easier targets for manipulation. Defense
Strategies: 1. User Education and Awareness: - Conduct regular standards. 4. Business Continuity Ensures critical information remains
can be targeted through various methods like SQL injection or zero- secure during disruptions. 5. Competitive Advantage Certification
day exploits. - Human Error: Phishing and social engineering attacks training for employees to recognize common social engineering
tactics like phishing and pretexting. 2. Strong Authentication: - serves as a differentiator in the market. Structure: 1. Clause 1: Scope -
often succeed due to a lack of user awareness and training. - Network Defines the scope and application. 2. Clause 2: Normative References
Misconfigurations: Misconfigured networks or poorly secured Implement multi-factor authentication (MFA) to ensure that even if
credentials are compromised, unauthorized access is prevented. 3. - Lists related standards. 3. Clause 3: Terms and Definitions - Provides
wireless connections provide an opportunity for attackers to gain key definitions. 4. Clause 4: Context of the Organization - Identifies
unauthorized access. Mitigation: 1. Strong Passwords: Use complex Verify Requests: - Always verify requests for sensitive information or
access through trusted channels, especially if the request seems influencing factors. 5. Clause 5: Leadership - Focuses on management
passwords and enable multi-factor authentication (MFA). 2. Regular responsibility. 6. Clause 6: Planning - Risk assessment and objectives.
Updates: Apply software patches and updates to fix vulnerabilities. 3. suspicious or urgent. 4. Limit Information Sharing: - Be cautious when
sharing personal or work-related information, especially over email or 7. Clause 7: Support - Resources and documentation. 8. Clause 8:
Encryption: Encrypt sensitive data in transit and at rest. 4. Firewalls & Operation - Execution of controls and processes. 9. Clause 9:
Antivirus: Use firewalls and up-to-date antivirus software to block social media. 5. Use Anti-phishing Tools: - Deploy email filters, anti-
phishing software, and security solutions to detect and block Performance Evaluation - Monitoring and measurement. 10. Clause
malicious traffic. 5. User Training: Educate employees and users on 10: Improvement - Continuous improvement process.
phishing, social engineering, and security best practices. 6. Intrusion malicious messages before they reach users. 6. Access Control
Detection: Deploy IDS/IPS to monitor and detect suspicious activity Policies: - Restrict access to sensitive information based on roles and
on the network. enforce strict access controls to minimize the impact of attacks.
Network forensics is the process of capturing, analyzing, and E-Commerce (Electronic Commerce) refers to the buying and selling IT Act, 2000 provides a legal framework for addressing cybercrimes Passive attack refers to an attempt to gain unauthorized access to
recording network traffic to detect security incidents, unauthorized of goods and services over the internet. It involves various online and electronic commerce in India. It outlines various offences related data without actively altering or interfering with the system. The
access, or malicious activities within a network. Components: 1. Data activities, including marketing, payment processing, and product to cybersecurity, digital transactions, and data protection. Here are attacker silently monitors and collects information, typically without
Capture: - Collects network traffic from routers, firewalls, and servers delivery. E-commerce has revolutionized the retail industry, making it some key offences under the IT Act: 1. Hacking (Section 66) - Offence: the knowledge of the target. Characteristics: - Non-Intrusive: No
using tools like Wireshark and tcpdump. 2. Traffic Analysis: - Analyzes easier for businesses and consumers to interact globally. Types: 1. Unauthorized access to a computer system or network, altering or direct interaction with the system or data. - Data Interception: The
network traffic for suspicious patterns and anomalies. 3. Malicious B2B (Business to Business) - Transactions between businesses, such damaging data. - Penalty: Imprisonment up to 3 years, or a fine up to attacker simply observes or listens to data traffic. - Hard to Detect:
Activity Identification: - Identifies intrusions, malware, and as manufacturers selling to wholesalers. 2. B2C (Business to ₹5 lakh, or both. 2. Identity Theft (Section 66C) - Offence: Misusing Since no changes are made, these attacks are difficult to identify in
unauthorized access. 4. Evidence Collection & Preservation: - Secures Consumer) - Businesses sell products or services directly to someone’s identity or electronic signature for fraud or malicious real-time. Types: 1. Eavesdropping (Sniffing) - Description: Listening
and preserves data for legal use while maintaining the chain of consumers (e.g., Amazon, Flipkart). 3. C2B (Consumer to Business) - purposes. - Penalty: Imprisonment up to 3 years, or a fine of ₹1 lakh, to network traffic to capture sensitive data. - Example: Intercepting
custody. 5. Incident Reconstruction: - Reconstructs attack timelines Consumers offer products or services to businesses (e.g., freelancing or both. 3. Cyberstalking (Section 66A) - Offence: Sending offensive unencrypted communications. 2. Traffic Analysis - Description:
and correlates data to understand the full scope of the incident. 6. platforms like Upwork). 4. C2C (Consumer to Consumer) - Consumers or menacing messages via electronic means that annoy or harass Monitoring traffic patterns to infer information about
Reporting: - Documents findings and provides mitigation sell directly to other consumers (e.g., eBay, OLX). 5. B2G (Business to someone. - Penalty: Imprisonment up to 3 years, and a fine. 4. Cyber communications. - Example: Analyzing packet size and frequency. 3.
recommendations. Purpose: - Cybersecurity Incident Investigation: Government) - Businesses provide goods or services to governments Bullying (Section 66E) - Offence: Capturing or transmitting images or Footprinting - Description: Collecting information about a target
Traces breaches and attacks. - Evidence Gathering: Collects data for (e.g., procurement platforms). 6. C2G (Consumer to Government) - videos of an individual without their consent, especially in a private system or network for future attacks. - Example: Scanning a website
legal purposes. - Root Cause Analysis: Identifies how breaches occur. - Consumers make payments or taxes to government bodies online setting. - Penalty: Imprisonment up to 3 years, or a fine of ₹2 lakh, or for infrastructure details. Hybrid attack is a combination of multiple
Real-Time Monitoring: Detects threats early. Importance: - Cyber (e.g., utility bill payments). Advantages: 1. Convenience - 24/7 access both. 5. Cyber Terrorism (Section 66F) - Offence: Using computer attack methods or techniques used together to compromise a system.
Attack Detection: Identifies malicious activities like malware or to products and services from anywhere in the world. 2. Global Reach systems or networks to threaten or harm national security, This type of attack leverages the strengths of different strategies to
breaches. - Security Enhancement: Improves network defenses by - Businesses can access a global market, reaching customers beyond sovereignty, or integrity. - Penalty: Imprisonment for life. 6. Sending increase the chances of success. Characteristics: - Multiple Methods:
identifying vulnerabilities. - Legal Compliance: Provides evidence for local areas. 3. Cost-Effective - Reduces overhead costs like rent, Offensive Messages (Section 66A) - Offence: Sending offensive, false, Combines different attack types. - Increased Effectiveness: Enhances
legal investigations. - Incident Response: Aids in recovering from utilities, and staff for physical stores. 4. Variety and Choice - Offers a or threatening messages using electronic communication. - Penalty: chances of breaching security. - Adaptive: Shifts between methods to
security incidents. Challenges: 1. Large Data Volume: - Analyzing wide range of products from various sellers in one place. 5. Easy Imprisonment up to 3 years, and a fine. 7. Data Theft or Data Breach bypass defenses. Types: 1. Hybrid Brute Force Attack - Description:
massive amounts of traffic in real-time is challenging. 2. Encrypted Payment Methods - Multiple payment options (credit/debit cards, (Section 43) - Offence: Unauthorized access, transfer, or use of data Combines dictionary and brute-force methods to guess passwords. -
Traffic: - Encrypted data hides malicious activities, making inspection digital wallets, etc.) for smooth transactions. 6. Personalized Shopping or information. - Penalty: Fine up to ₹1 crore. 8. Publishing Offensive Example: First, common passwords are tried, then all combinations
difficult. 3. Privacy Concerns: - Raises legal and ethical issues - Tailored recommendations based on browsing history and Content (Section 67) - Offence: Publishing or transmitting obscene or are tested. 2. Phishing + Malware - Description: Phishing is used to
regarding data privacy. 4. Complex Attacks: - Sophisticated attacks can preferences. Disadvantages: 1. Security Concerns - Risks of fraud, offensive material in electronic form. - Penalty: Imprisonment up to 5 trick users into downloading malware. - Example: A phishing email
be hard to detect and trace. 5. Resource-Intensive: - Requires hacking, and identity theft with online transactions. 2. Lack of years, and a fine up to ₹10 lakh for the first conviction. Imprisonment containing a trojan virus attachment. 3. MitM + Social Engineering -
specialized tools and skilled professionals. Physical Inspection - Customers cannot physically examine products up to 10 years, and a fine up to ₹20 lakh for subsequent convictions. Description: Combines interception and social engineering to steal
before purchasing. 3. Technical Issues - Website downtime, server 9. Tampering with Computer Source Code (Section 65) - Offence: information. - Example: Intercepted data manipulated to gain
Collect Network-Based Evidence: 1. Preparation - Identify the type of failures, and internet connectivity issues can hinder transactions. 4. Altering, destroying, or concealing the source code of a computer confidential details. 4. DoS + Phishing - Description: DDoS attack
network activity to monitor (e.g., intrusion, data theft). - Obtain legal Shipping and Delivery Challenges - Delays, shipping costs, and system. - Penalty: Imprisonment up to 3 years, or a fine up to ₹2 lakh, overwhelms a system, while phishing collects credentials. - Example:
permissions or warrants for evidence collection. - Choose tools like potential damage to goods during delivery. 5. Privacy Concerns - or both. 10. Fraudulent Digital Signature (Section 73) - Offence: Website downtime used to steal login info via phishing. Active attack
Wireshark, tcpdump, or Snort for data capture. 2. Identify Evidence Customers may worry about sharing personal information online. 6. Using false digital signatures or certificates for fraudulent purposes. - is an attempt to alter, disrupt, or manipulate a system or data. The
Sources - Network Devices: Logs from routers, firewalls, switches, Competitive Market - With many sellers online, businesses face Penalty: Imprisonment up to 3 years, or a fine up to ₹1 lakh, or both. attacker interacts with the target system, causing harm or gaining
proxies. - Servers: Logs from web, mail, and file servers. - Endpoints: intense competition, often driving prices down. 11. Phishing (Section 66C) - Offence: Impersonating someone online unauthorized access. Characteristics: - Intrusive: The attacker
Devices like workstations, laptops, IoT. - Cloud Infrastructure: Cloud to steal personal information like usernames and passwords. - interacts with and alters the system or data. - Detectable: Easier to
service logs (AWS, Azure, etc.). 3. Evidence Collection Methods - Penalty: Imprisonment up to 3 years, or a fine of ₹1 lakh, or both. 12. detect than passive attacks due to system disruptions. - Destructive:
Commerce E-Commerce
Packet Capturing: Real-time packet capture using tools like Wireshark Sending Offensive or False Messages (Section 66A) - Offence: Can cause damage or compromise the integrity of systems. Types: 1.
Buying/selling in physical Buying/selling over the
or tcpdump. - Network Logs: Collect logs from firewalls, IDS/IPS, and stores. internet. Sending false or offensive messages that cause annoyance or harm. - Denial-of-Service (DoS) - Description: Overwhelms a system to make
proxies. - Flow Data: Use NetFlow/sFlow for traffic patterns and IP Physical storefronts or Operates online, no physical Penalty: Imprisonment up to 3 years, and a fine. 13. Breach of it unavailable. - Example: DDoS attack flooding a server with traffic. 2.
tracking. - DNS/DHCP Logs: Track domain resolutions and device IP- offices. store. Confidentiality (Section 72A) - Offence: Disclosure of personal data Man-in-the-Middle (MitM) - Description: Intercepts and manipulates
to-MAC mappings. - Email Logs: Analyze email headers for Local or regional. Global reach. or information without consent, leading to harm. - Penalty: communication between two parties. - Example: Altering messages
phishing/spam investigations. 4. Ensure Evidence Integrity - Maintain In-person, physical Virtual browsing and Imprisonment up to 3 years, or a fine up to ₹5 lakh, or both. 14. between a user and a server. 3. SQL Injection - Description: Inserting
chain of custody and document every step. - Hash data with interaction. purchasing. Tampering with Computer Data (Section 43) - Offence: Unauthorized malicious SQL code to manipulate databases. - Example: Deleting or
MD5/SHA-256 to verify integrity. - Synchronize system clocks for Limited hours (9 am - 9 pm). 24/7 availability. deletion, alteration, or damaging of data. - Penalty: Fine up to ₹1 modifying database records via input fields. 4. Privilege Escalation -
accurate timelines. 5. Storage - Store evidence on write-protected Immediate product take- Products shipped and crore. 15. Online Gambling (Section 67B) - Offence: Promoting or Description: Gaining unauthorized higher-level access or permissions.
media and encrypt sensitive data. - Keep backups to avoid accidental away. delivered later. facilitating online gambling. - Penalty: Imprisonment up to 5 years, - Example: Exploiting software vulnerabilities to become an admin.
loss. 6. Analysis - Reconstruct events using packet captures, logs, and High cost of operation. Low cost of operation. and a fine up to ₹10 lakh. 16. Cyber Fraud (Section 66D) - Using
metadata. - Identify malicious activities like port scans or data Physical store security. Cybersecurity risks (fraud, online platforms to deceive or mislead individuals for financial or
Passive Active
exfiltration. 7. Documentation - Document sources, collection hacking). personal gain. - Penalty: Imprisonment up to 3 years or a fine of ₹1
Non-intrusive, no data Intrusive, modifies data or
methods, observations, and conclusions. 8. Tools - Wireshark: Packet lakh, or both. 17. Obscene Content on the Internet (Section 67B) - alteration. systems.
analysis. - tcpdump: Command-line packet capture. - Snort/Suricata: Publishing or transmitting obscene content related to children. - Hard to detect, no changes Easier to detect due to
Intrusion detection. - NetFlow Analyzers: Monitor traffic patterns. Penalty: Imprisonment up to 5 years and a fine up to ₹10 lakh. made. disruptions.
E-Governance refers to the use of digital tools and technologies to
enhance the delivery of government services, improve Observe data without Disrupt or alter
communication, and streamline administrative processes. It involves IPSec (Internet Protocol Security) is a suite of protocols used to altering it. data/systems.
Information Security Management System (ISMS) Management is a
the integration of information and communication technology (ICT) to secure Internet Protocol (IP) communications by authenticating and No direct damage, potential Can cause damage, system
structured approach to managing sensitive information, ensuring its
govern effectively, transparently, and efficiently. Types: 1. G2C encrypting each IP packet in a communication session. It is widely data theft. compromise.
confidentiality, integrity, and availability through people, processes,
(Government to Citizen) - Services and information provided by the used in Virtual Private Networks (VPNs) and other secure network Used for data collection, Used for disruption,
and technology. Components: 1. Leadership Commitment - Top surveillance. unauthorized access.
management supports and allocates resources for ISMS. 2. Risk government directly to citizens (e.g., online tax filing, public health communications. Features: 1. Encryption - Ensures data
confidentiality by encrypting the IP packet payload. 2. Authentication Moderate risk level. High risk level.
Management - Identify, assess, and mitigate security risks. 3. Security services). 2. G2B (Government to Business) - Government services for
Objectives - Set measurable information security goals aligned with businesses, such as licenses, permits, e-procurement, and regulatory - Verifies the sender’s identity using AH and ESP protocols. 3. Data
business. 4. Resource Allocation - Provide necessary resources for compliance (e.g., business registration portals). 3. G2G (Government Integrity - Ensures data is not altered using hash functions. 4. Anti-
effective ISMS implementation. 5. Information Security Controls - to Government) - Information and services exchanged between Replay Protection - Prevents replay attacks by tracking packet Password is a secret string of characters used to authenticate or
Implement and review security controls based on risks. 6. different government departments or agencies to improve efficiency sequences. 5. Modes - Transport Mode: Encrypts only the payload. - verify the identity of a user, granting access to a system, application,
Documentation and Policies - Develop consistent policies and and collaboration (e.g., data sharing between ministries). 4. G2E Tunnel Mode: Encrypts both the header and payload. Types: 1. AH or account. It serves as a security measure to protect sensitive
procedures to safeguard information. 7. Training and Awareness - (Government to Employee) - Services provided by the government to (Authentication Header) - Purpose: Provides authentication, integrity, information from unauthorized access. Password Types: 1. Strong
Train employees and raise awareness on security best practices. 8. its employees, such as payroll systems, pension management, and and anti-replay. - How: Authenticates the data and header, no Password - Definition: A strong password is complex, long, and hard
Incident Management - Develop a plan to respond to security internal communication platforms. 5. C2G (Citizen to Government) - encryption. - Use: Verifies data integrity and sender identity. 2. ESP to guess. It combines a mix of uppercase and lowercase letters,
breaches and incidents. 9. Internal Audits - Conduct regular audits to Citizens communicate with the government, submitting applications, (Encapsulating Security Payload) - Purpose: Provides encryption, numbers, and special characters. - Example: `A7f$G2z8#qP!` 2. Weak
assess ISMS effectiveness and compliance. 10. Management Review - feedback, or complaints (e.g., online grievance redressal systems). integrity, authentication, and anti-replay. - How: Encrypts the payload Password - Definition: A weak password is short, easy to guess, and
Top management reviews ISMS to ensure alignment and Advantages: 1. Transparency - Easy access to information, reducing and optionally the header. - Use: Ensures confidentiality and integrity. lacks complexity. It may use simple words, phrases, or obvious
effectiveness. 11. Continuous Improvement - Improve ISMS based on corruption. 2. Efficiency - Faster service delivery and resource 3. IKE (Internet Key Exchange) - Purpose: Manages key exchange and patterns. - Example: `password123` or `123456` 3. Random Password
audits, incidents, and monitoring results. Benefits: 1. Risk Reduction - management. 3. Cost-Effective - Reduces administrative costs and secure communication setup. - How: Negotiates encryption - Definition: A random password is generated with no predictable
Minimizes security breaches and potential damages. 2. Compliance - paper usage. 4. Public Participation - Easier citizen engagement in parameters and sets up Security Associations (SAs). - Use: Ensures pattern, often combining a variety of characters, numbers, and
Helps meet regulatory security requirements. 3. Improved Security - decision-making. 5. Accessibility - Services are accessible, even in secure key management and session initiation. Applications: 1. VPNs symbols. - Example: `B9&k#T0eF$1zL` (randomly generated string of
Strengthens the security posture of the organization. 4. Operational remote areas. 6. Better Service Delivery - Streamlined processes (Virtual Private Networks) - Used for secure site-to-site and remote- characters)
Efficiency - Streamlines security processes and responses. 5. result in quicker services. Challenges: 1. Digital Divide - Unequal tech access VPNs. 2. Secure Network Communication - Secures
Enhanced Reputation - Builds trust with stakeholders through strong access in rural areas. 2. Cybersecurity Risks - Protection of sensitive communication between network devices. 3. Access Control - Works
Cybersecurity vulnerability is a weakness or flaw in a system,
data protection. Steps: 1. Define Framework - Create policies and data against cyber threats. 3. High Initial Investment - High costs in with firewalls to enforce security policies. Advantages: 1. Data
network, application, or process that could be exploited by attackers
procedures tailored to needs. 2. Conduct Risk Assessment - Identify infrastructure and training. 4. Resistance to Change - Hesitation from Security - Ensures encryption and authentication for confidentiality
to gain unauthorized access, steal data, or cause damage. Types: 1.
and evaluate risks to assets. 3. Establish Controls - Implement government employees and citizens. 5. Technological Obsolescence - and integrity. 2. Flexibility - Supports both IPv4 and IPv6. 3.
Software Vulnerabilities - Flaws in software programs or code that can
measures to protect against risks. 4. Monitor and Review - Rapid tech changes can make systems outdated. 6. Privacy Concerns - Interoperability - Compatible with different devices and vendors. 4.
be exploited by attackers. 2. Hardware Vulnerabilities - Weaknesses in
Continuously assess the effectiveness of ISMS. 5. Certify and Maintain Ensuring data protection and privacy. Examples: 1. Digital India - Transparency - Operates at the IP layer without requiring application
physical components like processors, storage devices, or networking
- Pursue certification and ensure ongoing compliance. Promotes e-governance, digital literacy, and online services. 2. e- changes. Challenges: 1. Performance Overhead - Encryption can slow
hardware. 3. Configuration Vulnerabilities - Incorrect or weak settings
Procurement System - Transparent government procurement via down network performance. 2. Complex Configuration - Setup can be
in systems or software that can be exploited. 4. Human Vulnerabilities
online bidding. 3. Aadhaar System - Biometric ID system for accessing challenging, especially with multiple devices. 3. Key Management -
Controller of Certifying Authorities (CCA) is a key regulatory - Weaknesses caused by human error, often exploited through social
services. 4. M-Governance - Government services through mobile Managing encryption keys and associations can be complex. Working:
authority in India responsible for overseeing the functioning of engineering. 5. Network Vulnerabilities - Weaknesses in the network
apps. 1. SA Establishment:IPSec establishes Security Associations (SAs)
Certifying Authorities (CAs) that issue digital certificates for secure infrastructure or protocols that attackers can exploit. 6. Physical
using IKE (Internet Key Exchange) to negotiate encryption keys and
online communication and transactions. The CCA is part of the Vulnerabilities - Security gaps related to physical access to systems or
security parameters. 2. Data Encryption/Authentication: - ESP
Ministry of Electronics and Information Technology (MeitY) and plays Cyber laws are a set of legal regulations governing the use of the devices. Mitigation Measures: - Regular Patching: Keep systems,
(Encapsulating Security Payload): Encrypts and optionally
a critical role in the Public Key Infrastructure (PKI) system. Roles: 1. internet, digital technology, and online activities. They address issues software, and hardware updated. - Strong Authentication: Use multi-
authenticates data. - AH (Authentication Header): Provides
Licensing CAs - Grants licenses to Certifying Authorities to issue digital such as privacy, security, intellectual property, cybercrimes, and data factor authentication and strong password policies. - Encryption:
authentication and integrity without encryption. 3. Transmission
certificates. 2. Regulation and Monitoring - Regulates and supervises protection. These laws aim to protect individuals, organizations, and Encrypt sensitive data in transit and at rest. - Employee Training:
Modes: - Transport Mode: Only the payload is secured. - Tunnel
Certifying Authorities to ensure compliance. 3. Ensuring Security governments from various risks associated with the digital world. Key Educate employees to recognize phishing attempts and other social
Mode: Both the payload and header are secured. 4. Decryption &
Standards - Sets security standards for issuing and managing digital Areas: 1. Cybercrimes: Laws against hacking, phishing, fraud, and engineering attacks. - Firewalls and IDS: Implement network security
Validation: The recipient decrypts and verifies the data’s integrity
certificates. 4. Auditing CAs - Audits Certifying Authorities to ensure cyberbullying. 2. Data Protection & Privacy: Regulations to protect measures to detect and block suspicious activities. Impacts: 1. Data
using the agreed parameters in the SA. 5. Anti-Replay: Ensures no
regulatory compliance. 5. Managing Digital Certificates - Oversees personal data (e.g., GDPR, CCPA). 3. Intellectual Property: Protection Breaches: Exposure of sensitive information. 2. System Compromise:
replay attacks by tracking sequence numbers of packets.
issuance and management of digital certificates. 6. Promoting for digital content (e.g., copyright, patents). 4. E-commerce Laws: Attackers gaining control over systems. 3. Financial Loss: Costs from
Awareness - Educates the public on digital signatures and Laws governing online transactions and digital contracts. 5. theft, recovery, or repairs. 4. Reputation Damage: Loss of trust and
cybersecurity. 7. Dispute Resolution - Resolves disputes involving Cybersecurity: Regulations on protecting networks and systems from Email forensics involves the investigation and analysis of email brand harm. 5. Legal Consequences: Penalties or lawsuits due to data
digital certificates and CAs. 8. Policy Recommendations - Advises on threats. 6. Digital Evidence: Guidelines on collecting and presenting messages to uncover potential evidence of criminal activities, security protection violations.
policies and best practices for digital certificates. 9. Developing Trust digital evidence. 7. Cyber Terrorism: Laws against digital attacks on breaches, or policy violations. It aims to track the origin, contents,
Models - Supports the development of trust models for secure online infrastructure or governments. 8. Social Media Regulations: Laws and metadata of an email to determine its authenticity and uncover
Cyber stalking refers to the use of the internet, social media, or other
transactions. addressing harmful content and privacy on social media. Importance: any malicious intent. Components: 1. Email Header Analysis -
digital platforms to harass, threaten, or monitor an individual with
1. Protection of Rights: Safeguards privacy and intellectual property. Purpose: Examines metadata (IP, timestamps, routing) to trace the
the intent to cause distress or harm. Methods: 1. Sending
2. Security: Prevents cybercrimes and enhances online security. 3. email's origin. - Example: Detecting spoofed addresses or tracing
Intellectual Property Rights (IPR) in cyberspace refer to the legal Threatening Messages: Repeated harmful or intimidating messages.
Regulation of Online Activities: Ensures fair practices and consumer phishing sources. 2. Content Analysis - Purpose: Reviews the email's
protections granted to the creations of the mind, such as inventions, 2. Monitoring Activities: Constantly tracking someone's online
protection. 4. International Cooperation: Combats global content for malware, links, or suspicious attachments. - Example:
designs, logos, artistic works, and other forms of intellectual property behavior or location. 3. Spreading False Information: Defaming the
cybercrimes. 5. Digital Economy: Encourages business growth with a Identifying harmful code or malicious URLs. 3. Attachment
in the online and digital environment. With the rise of the internet, e- victim through false statements or rumors. 4. Impersonation: Creating
secure legal framework. Challenges: 1. Technological Change: Laws Examination - Purpose: Analyzes email attachments for malware or
commerce, and digital content creation, protecting IPR in cyberspace fake profiles to interact with the victim or manipulate their online
struggle to keep up with evolving technology. 2. Cross-Border harmful files. - Example: Scanning ZIP files for hidden threats. 4. Email
has become crucial to safeguard creators and innovators. Types: 1. presence. Impact: - Emotional Distress: Victims may experience
Jurisdiction: Complicated enforcement across countries. 3. Privacy Trail Reconstruction - Purpose: Reconstructs email exchanges to
Copyright - Protects creative works like text, music, videos, and anxiety, fear, or depression. - Privacy Invasion: Breach of personal and
Concerns: Balancing privacy and security is challenging. 4. Cybercrime uncover context or hidden conversations. - Example: Tracing deleted
software. - Prevents piracy and unauthorized distribution online. 2. online privacy. - Reputation Damage: False rumors or online
Complexity: Cybercrimes are hard to investigate due to anonymity. 5. emails or fraud schemes. 5. Timestamp Analysis - Purpose: Verifies
Trademarks - Protects logos, names, and symbols for brand identity. - defamation can harm the victim’s reputation. Prevention: - Privacy
Lack of Awareness: Many are unaware of cyber law protections. email timestamps for authenticity. - Example: Checking email delivery
Prevents cybersquatting and misuse of trademarks online. 3. Patents - Settings: Secure personal information on social media. - Report
Cyber Laws in India: 1. Information Technology Act, 2000 (IT Act, times against claims. Types: 1. Malware Email - Description: Emails
Protects technological inventions and innovations. - Covers software, Abuse: Notify platform administrators or law enforcement. - Legal
2000): - Governs cybercrimes, e-commerce, and digital contracts. - with attachments or links that deliver malware. - Example: An email
algorithms, and digital technologies. 4. Trade Secrets - Protects Protection: Seek legal action or protection orders if necessary.
Recognizes electronic records and digital signatures. 2. Amendments attachment containing ransomware. 2. Whaling - Description: Spear-
confidential business information. - Prevents hacking and phishing targeting high-profile individuals. - Example: A fake email
to IT Act: - IT (Amendment) Act, 2008: Introduced provisions for data
unauthorized access to sensitive data. 5. Design Rights - Protects aimed at a CEO to steal sensitive info. 3. Email Spoofing - Description: Threat Modeling Methodologies 1. STRIDE - Focuses on six threat
protection and stricter penalties for cybercrimes. 3. National Cyber
visual design of products and websites. - Applies to digital product Forged email headers to impersonate legitimate sources. - Example: A categories: Spoofing, Tampering, Repudiation, Information Disclosure,
Security Policy, 2013: - Focuses on securing cyberspace and
designs and app interfaces. Importance: 1. Encourages Innovation - phishing email from a fake organization. 4. Mail Bombing - Denial of Service, and Elevation of Privilege. 2. PASTA (Process for
enhancing cybersecurity infrastructure. 4. Personal Data Protection
Ensures creators receive recognition and rewards. 2. Prevents Piracy - Description: Floods an inbox with excessive emails to crash a server. - Attack Simulation and Threat Analysis) - A risk-centric method
Bill (2019): - A draft bill aimed at protecting personal data and
Reduces unauthorized duplication and distribution of content. 3. Example: Sending thousands of emails to overwhelm an account. 5. simulating real-world attacks in stages to identify vulnerabilities. 3.
aligning with the EU's GDPR. 5. Sensitive Personal Data Rules, 2011: -
Builds Brand Trust - Protects brand integrity and consumer Ransomware Email - Description: Emails with malicious links that OCTAVE (Operationally Critical Threat, Asset, and Vulnerability
Defines and protects sensitive personal data, requiring adequate
confidence. 4. Supports E-Commerce - Enables secure online business encrypt files, demanding ransom. - Example: An email with an Evaluation) - Focuses on asset risk assessment and security posture
security measures. 6. Cyber Appellate Tribunal (CAT): - Resolves
operations. Challenges: 1. Jurisdiction Issues - Global differences in infected attachment holding files hostage. 6. Email Spamming - for enterprise-level systems. 4. VAST (Visual, Agile, and Simple Threat)
disputes related to cybercrimes and IT Act violations. 7. Intermediary
IPR laws complicate enforcement. 2. Piracy and Counterfeiting - Description: Sending unsolicited emails, often for advertising or - An agile, visual methodology ideal for fast-paced development,
Guidelines and Digital Media Rules, 2021: - Regulates social media
Digital content is easily copied and distributed illegally. 3. Domain malicious purposes. - Example: Bulk emails promoting fake products using diagrams to identify threats. 5. Attack Trees - A hierarchical
platforms and digital media for accountability.
Name Disputes - Cybersquatting and domain name conflicts arise. 4. or services. model that breaks down attacks into possible outcomes and sub-
Anonymous Infringement - Tracking infringers is challenging in the goals. 6. DREAD - A risk assessment model used to evaluate the
digital space. 5. Technological Advancements - Emerging tech requires severity of threats based on five criteria: Damage, Reproducibility,
new IPR protection methods. Legal Framework: 1. WIPO - Facilitates Exploitability, Affected Users, and Discoverability. 7. TRIKE - A
global cooperation on IPR protection. 2. The Copyright Act, 1957 methodology focused on risk management, emphasizing risk
(India) - Protects digital content and software in India. 3. IT Rules, assessment by identifying the impacts of vulnerabilities on assets and
2011 (India) - Addresses personal data and trade secret protection. 4. providing a risk-based approach to prioritizing threats. 8. T-MAP
DMCA (USA) - Manages online copyright infringement issues. 5. UDRP (Threat Modeling and Analysis Process) - A comprehensive framework
- Resolves domain name disputes like cybersquatting. for identifying threats and vulnerabilities in systems, emphasizing the
use of structured processes for thorough risk evaluation and
mitigation.