Unit4_CyberSecurity
Unit4_CyberSecurity
• Function
o IP addresses identify devices on the internet and allow them to communicate with each
other.
• Example
o Public
o Private
o static, and
o dynamic.
Versions of IP address
• The two most common versions of IP addresses are IPv4 and IPv6.
• IPv4, or Internet Protocol version 4, is the original addressing system of the Internet,
introduced in 1983.
• It uses a 32-bit address scheme, which theoretically allows for over 4 billion unique addresses
(2^32).
• IPv4 addresses are typically displayed in decimal format, divided into four octets separated by
dots.
• For example, 192.168.1.1 is a common IPv4 address you might find in a home network.
IPV6
• The well-known IPv6 protocol is being used and deployed more often,
especially in mobile phone markets.
• It is better than IPv4 in terms of complexity and efficiency.
• IPv6 is written as a group of 8 hexadecimal numbers separated by colon
(:).
• It can be written as 128 bits of 0s and 1s.
MAC address
• MAC Address stands for Media Access Control Address or is hardware address.
• Every device has a unique physical address which identifies it between whole network
devices.
• Your PC, your smart phone, your tablet or any other devices that we use in networking has a
unique physical address.
• This is the vendor specific part which is assigned to that vendor from
IEEE.
• The second part of the Media Access Control Address is device specific
part NIC part.
• The DNS is essential for the functioning of the internet, as it allows users to
access websites using easy-to-remember names instead of complex numerical
IP addresses.
How DNS works
2. Response: Once the IP address is found, it's sent back to your browser,
allowing it to connect to the website's server and load the content.
DHCP (Dynamic Host Configuration
Protocol)
• DHCP (Dynamic Host Configuration Protocol) is a network
management protocol used to dynamically assign an IP address to any
device, or node, on a network so it can communicate using IP.
o Default gateway
o Lease duration (the time a device can use the assigned IP before it needs renewal)
Working
Client systems uses a process called a lease to request an IP address configuration from
a DHCP server. The lease generation process consists of four steps:
4. Acknowledge: The DHCP server acknowledges the request and marks the IP
address as leased in its database
Router
• Firewall and Security:Blocks unauthorized access using built-in firewalls and filtering
rules.Can support Virtual Private Networks (VPNs) for secure remote access.
1) Web-based attacks
2) System-based attacks
Web-based attacks
• These are the attacks which occur on a website or web applications. Some of
the important web-based attacks are as follows
• 1. Injection attacks
• It is the attack in which some data will be injected into a web application to
manipulate the application and fetch the required information.
• Example- SQL Injection, code Injection, log Injection, XML Injection etc.
• 2. DNS Spoofing
Boot Sector
Virus
Polymorp-
Macro
hic
Adware &
Stealth
Malware
Boot sector Virus
A Boot Sector is the part of our PC's hard drive that loads our computer's
operating system. When a system has booted the code in a boot sector will
always run first.
A Boot Sector(also known as Boot infector or MBR virus) infects the Master
Boot Record(MBR), so the virus loads on the computer memory during
startup.
This virus is attached with our system files i.e. ".exe", ".com" or
".dll"(Dynamic link libraries) files. When the user uses these files, the virus
performs destructive operations and destroy all data files.
Program virus
Code Modification: The stealth virus changes the code and virus
signature of each infected file.
Encryption: The stealth virus encrypts data via simple encryption and
uses a different encryption key for each infected file.
Brain, the first stealth virus, spread internationally during
the mid-1980s.
Polymorphic viruses
Like “chameleon” that changes its virus signature (i.e., binary pattern)
every time it spread through the system (i.e., multiplies & infect a new
file)
Polymorphic generators are routines that can be linked with the
existing viruses
Generators are not viruses but purpose to hide actual viruses under the
cloak of polymorphism
WORMS
5 Prevalence Over 100,000 known computer Prevalence for virus is very high as
viruses have been there against moderate prevalence for a
(popularity)
though not all have attacked worm.
computers (till 2005)
Trojan
Cyber Law is the law governing cyber space. Cyber space is a very wide
term and includes computers, networks, software, data storage devices
(such as hard disks, USB disks etc), the Internet, websites, emails and
even electronic devices such as cell phones, ATM machines etc.
Cyber law encompasses laws relating to:
1. Cyber Crimes
2. Electronic and Digital Signatures
3. Intellectual Property
4. Data Protection and Privacy
Man-in-the-Middle (MITM) Attack
• A Man-in-the-Middle (MITM) Attack is a cyberattack where an attacker
secretly intercepts and possibly alters the communication between two
parties who believe they are directly communicating with each other.
• The attacker positions themselves between the victim and the intended
destination, enabling them to eavesdrop, manipulate data, or steal
sensitive information.
Common Targets of MITM
• Online banking and financial transactions.
• E-commerce websites.
• Email communications.
• Corporate networks.
• Public Wi-Fi users.
Working of MITM
• Interception:
• The attacker gains access to the communication channel between two
parties.
• Common methods include:
• Spoofing Wi-Fi Networks: Creating fake Wi-Fi hotspots.
• ARP Spoofing: Sending false ARP (Address Resolution Protocol) messages on a
LAN to link the attacker’s MAC address to the victim's IP address.
• DNS Spoofing: Redirecting users to malicious websites by altering DNS records.
Cont…
• Data Manipulation:
• The attacker reads, modifies, or injects malicious content into the
intercepted data.
• Victims are often unaware of the interference.
Types of MITM Attacks:
1.Eavesdropping:
Intercepting sensitive information like login credentials, credit card numbers, or personal data.
2.Session Hijacking:
Stealing session cookies to impersonate a user and gain unauthorized access to their accounts.
3.SSL Stripping:
Downgrading a secure HTTPS connection to an insecure HTTP connection, exposing sensitive
data.
4.Email Hijacking:
Intercepting and manipulating email communications to impersonate one of the participants.
5.Wi-Fi Eavesdropping:
Using rogue access points to capture data transmitted over public or unsecured Wi-Fi networks.
Signs of a MITM Attack:
• Frequent SSL/TLS certificate warnings.
• Suspicious redirects to unknown websites.
• Unexpected login attempts or account lockouts.
• Poor performance or unusual behavior on networks or devices.
Hackers
• Hackers are individuals or groups who use their knowledge of computer
systems, programming, and networks to gain unauthorized access to
systems, manipulate data, or exploit vulnerabilities. The term "hacker"
can have both positive and negative connotations, depending on their
intent and the impact of their actions.
Types of Hackers
1.White Hat Hackers (Ethical Hackers):
1. Work with organizations to identify and fix vulnerabilities in their systems.
2. Often employed in cybersecurity roles, including penetration testing and security
audits.
3. Operate legally and ethically to improve security.
2.Black Hat Hackers (Malicious Hackers):
1. Exploit vulnerabilities for personal gain or malicious purposes, such as stealing
data, spreading malware, or causing disruption.
2. Operate outside the law and can cause significant harm to individuals, businesses,
and governments.
Types of Hackers(cont.)
3. Gray Hat Hackers:
1. Operate between ethical and unethical boundaries.
2. May exploit vulnerabilities without permission but often report them to the
affected party afterward, sometimes expecting a reward.
4.Script Kiddies:
1. Inexperienced hackers who use pre-written tools or scripts to conduct attacks.
2. Often lack a deep understanding of hacking techniques.
Types of Hackers(cont)
5. Hacktivists:
1. Use hacking as a form of protest to promote political, social, or ideological
causes.
2. May deface websites, leak sensitive information, or disrupt services.
6. State-Sponsored Hackers:
1. Employed by governments to conduct cyber espionage, sabotage, or warfare.
2. Target other nations, organizations, or individuals for political, economic, or
military advantage.
Types of Hackers(cont)
7. Cybercriminal Groups:
1. Organized groups that engage in illegal activities for financial gain.
2. Operate on a larger scale, often using ransomware, phishing, or other advanced
methods.
8. Insider Threats:
1. Employees or contractors who exploit their access to systems for malicious
purposes.
2. Often motivated by personal grievances, financial gain, or coercion.
Common Hacking Techniques:
1.Phishing: Deceiving users into revealing sensitive information via fake emails or
websites.
2.Malware: Deploying malicious software to infiltrate systems or steal data.
3.Social Engineering: Manipulating people to gain access to confidential information.
4.Exploiting Vulnerabilities: Taking advantage of unpatched software or
misconfigurations.
5.Denial-of-Service (DoS) Attacks: Overloading a system or network to make it
unavailable.
6.Man-in-the-Middle (MITM) Attacks: Intercepting and altering communications
between two parties.
7.Credential Stuffing: Using stolen login credentials to gain unauthorized access to
accounts
Vulnerabilities
• Cybersecurity vulnerabilities are flaws in software, hardware, or network
systems that cybercriminals exploit to gain unauthorized access, disrupt
services, or steal sensitive information.
• These vulnerabilities can stem from different sources, including errors in
code, misconfigurations, outdated software, or even human error.
Types of vulnerabilities
• network vulnerabilities
• operating system vulnerabilities
• process (or procedural) vulnerabilities, and
• human vulnerabilities.
Types of vulnerabilities(cont.)
• Unpatched and outdated software also creates OS vulnerabilities, because the system
running the application is exposed, sometimes endangering the entire network.
Types of vulnerabilities(cont.)
• Human vulnerabilities are created by user errors that can expose networks,
hardware, and sensitive data to malicious actors.
• They arguably pose the most significant threat, particularly because of the
increase in remote and mobile workers.