UNIT-1_CS
UNIT-1_CS
Unit-1
CYBER SECURITY (CS 413)
IV BTECH-I SEM
PREPARED BY
Prof. K.Kiran Kumar
HOD, CSE & CSIT
CSE, CIET
CHALAPATHI 1
CSE, CIET 3
Why is cyber security important?
CSE, CIET 4
History of Cyber Security
In 1969, Leonard Kleinrock, professor of UCLA and student, Charley Kline,
sent the first electronic message from the UCLA SDS Sigma 7 Host computer
to Bill Duvall, a programmer, at the Stanford Research Institute. This is a well-
known story and a moment in the history of a digital world
Often people confuse computer security with other related terms like
information security and cybersecurity. One way to ascertain the similarities and
differences among these terms is by asking what is being secured. For example,
Hardware, the physical part of the computer, like the system memory
and disk drive
CSE, CIET 7
Computer security is mainly concerned with three main areas:
CSE, CIET 8
Computer Security Practices
Computer security threats are becoming relentlessly inventive these days. There is much
need for one to arm oneself with information and resources to safeguard against these
complex and growing computer security threats and stay safe online. Some preventive
steps you can take include:
Secure your computer physically by:
Installing reliable, reputable security and anti-virus software
Activating your firewall, because a firewall acts as a security guard between the internet and
your local area network
Stay up-to-date on the latest software and news surrounding your devices and perform
software updates as soon as they become available
Avoid clicking on email attachments unless you know the source
Change passwords regularly, using a unique combination of numbers, letters and case
types
Use the internet with caution and ignore pop-ups, drive-by downloads while surfing
Taking the time to research the basic aspects of computer security and educate yourself
on evolving cyber-threats
Perform daily full system scans and create a periodic system backup schedule to ensure
your data is retrievable should something happen to your computer.
CSE, CIET 9
THREATS
Types of threats:
Physical damage: fire, water, pollution
CSE, CIET 11
Common Cyber Threats
If you suspect you may have been a target of any of the threats
included here, or have been targeted by any other cyber threat,
report it to your FSO or security point of contact immediately.
Malicious code
Removable media
CSE, CIET 12
Harm
CSE, CIET 13
Vulnerability
CSE, CIET 16
Controls
Security controls are safeguards or countermeasures to avoid, detect,
counteract, or minimize security risks to physical property,
information, computer systems, or other assets.
CSE, CIET 17
Cia Triad diagram
• deflect it, by making another target more attractive (or this one less so)
A computer system does not have the cues we do with face-to-face communication that let us recognize
our friends. Instead computers depend on data to recognize others. Determining who a person really is
consists of two separate steps:
• Identification is the act of asserting who a person is.
• Authentication is the act of proving that asserted identity: that the person is who she says she is.
Identification is the ability to identify uniquely a user of a system or an application that is running in the
system. Authentication is the ability to prove that a user or application is genuinely who that person or
what that application claims to be.
For example, consider a user who logs on to a system by entering a user ID and password. The system
uses the user ID to identify the user. The system authenticates the user at the time of logon by checking
that the supplied password is correct.
CSE, CIET 19
Non-repudiation
The non-repudiation service can be viewed as an extension to the
identification and authentication service. In general, non-repudiation
applies when data is transmitted electronically; for example, an order
to a stock broker to buy or sell stock, or an order to a bank to transfer
funds from one account to another.
CSE, CIET 29
Browser Attacks
WHAT IS A WEB BROWSER?
The web browser is a software application that allows users to view and interact with content on
a web page, such as text, graphics, video, music, games, or other material.1 It is a very popular
method by which users access the Internet. Of the various web browsers currently available,
Internet Explorer, Mozilla Firefox, Opera, and Safari are the most prevalent. Plugins, also known as
add-ons, are applications that extend the functionality of browsers. Some of the more familiar
plug-ins include Flash Player, Java, Media Player, QuickTime Player, Shockwave Player, RealOne
Player, and Acrobat Reader. Based on how a web page was designed, specific plug-ins may be
required to view some content.
• Go after the operating system so it will impede the browser’s correct and secure functioning.
• Tackle the browser or one of its components, add-ons, or plug-ins so its activity is altered.
MAN-IN-THE-BROWSER ATTACKS
A man-in-the-browser (MITB) attack uses a Trojan to infect the
victim’s internet browser and modify information as it is exchanged
between the browser interface and the internet. Unlike some other
web attacks, the user is not redirected to a malicious URL. Browsing
and transactions take place as normal, but the malware interposes
itself between the web application and the user’s browser, capturing
and relaying sensitive information back to the attacker. It can also
modify how the webpage appears, injecting form fields to capture
additional information. Attackers can steal personal information, such
as login credentials, account details and even social security or
passport numbers. While typically targeting financial sites, the stolen
data is often sold on underground markets and can be used to gain
entry to corporate networks, especially as 60% of internet users
reuse passwords across multiple accounts.
Man-in-the-browser: Trojan horse that intercepts data passing through
the browser.
CSE, CIET 32
PAGE-IN-THE-MIDDLE ATTACK
another page. Similar to the man-in-the-browser attack, a page attack might wait until a user
has gone to a particular web site and present a fictitious page for the user. As an example,
when the user clicks “login” to go to the login page of any site, the attack might redirect the
user to the attacker’s page, where the attacker can also capture the user’s credentials.
USER-IN-THE-MIDDLE ATTACK
A different form of attack puts a human between two automated processes so that the human
A CAPTCHA is a puzzle that supposedly only a human can solve, so a server application can
distinguish between a human who makes a request and an automated program generating the
same request repeatedly. Think of web sites that request votes to determine the popularity of
television programs. To avoid being fooled by bogus votes from automated program scripts,
the voting sites sometimes ensure interaction with an active human by using CAPTCHAs (an
acronym for Completely Automated Public Turing test to tell Computers and Humans Apart—
CSE, CIET 33
sometimes finding words to match a clever acronym is harder than doing the project itself).
UI-REDRESS ATTACK
Commonly called clickjacking, this type of attack tricks a user into unknowingly
clicking on a button or link that enables a malicious action. The attacker uses
hidden iframes, text boxes or stylesheets to disguise the real click action, while
the user thinks they are clicking on something innocuous such as an antivirus
alert or a “like” button.
ADWARE
CSE, CIET 35
Web Attacks Targeting Users
1. Drive-By Downloads
CSE, CIET 36
Clickjacking
CSE, CIET 37
Plug-In- And Script-Enabled Attacks
Not only do attackers look for vulnerabilities within the browser itself,
they also frequently ferret out bugs in browser plug-ins and scripting
programming to help them carry out drive-by downloads and
clickjacking attacks.
CSE, CIET 38
Advanced Phishing Attacks
While phishing attacks are typically associated with email, most are
perpetrated via links to malicious content on the Web, whether a
simple password capture form used in traditional phish attempts or a
malicious drive-by download in more advanced targeted attacks.
Phishing attacks are designed to trick users into thinking they are a
link from an organization or person they know, making people feel
safe enough to click or divulge information they otherwise wouldn't.
Many corporate security training programs have helped users spot
the most obvious first-generation phishing attempts, which were
designed to steal credentials such as banking passwords. But
attackers are getting more crafty.
CSE, CIET 39
Social (Engineering) Networks
It's easy these days for attackers to use exploit kits to break into
legitimate sites and implant drive-by-download attacks. With
"watering hole attacks" they're taking that technique further. The
idea is that, just as a lion waits by a watering hole visited by the prey
it would like to eat, an attacker plants malware at news or networking
sites that he knows his targets are likely to visit. For example,
employees of an accounting firm are likely to visit an accounting
association website.
CSE, CIET 41
Third-Party Web Apps
CSE, CIET 42
Obtaining User or Website Data
Websites are built for human consumption, not machine. So it’s not always easy to get web data into a
spreadsheet for analysis or machine learning. Copying and pasting information from websites is time-
consuming, error-prone and not feasible.
Web scraping is a way to get data from a website by sending a query to the requested page, then
combing through the HTML for specific items and organizing the data. If you don’t have an engineer on
hand, Import.io provides a no-coding, point and click web data extraction platform that makes it easy to
get web data.
Here are the steps to get a data from a website:
Step 1: First, find the page where your data is located. For instance, a product page on
Amazon.com.
Step 2: Copy and paste the URL from that page into Import.io, to create an extractor that will
attempt to get the right data.
Step 3: Click Go and Import.io will query the page and use machine learning to try to
determine what data you want.
Step 4: Once it’s done, you can decide if the extracted data is what you need. In this case, we
want to extract the images as well as the product names and prices into columns. We trained
the extractor by clicking on the top three items in each column, which then outlines all items
belonging to that column in green.
Step 5: Import.io then populates the rest of the column for the product names and prices.
Step 6.:Next, click on Extract data from website.
Step 7:Import.io has detected that the product listing data spans more than one page, so you
can add as many pages as needed to ensure that you get every product in this category into
your spreadsheet.
Step 8: Now, you can download the images, product names, and prices.
Step 9: First, download the product name and price into an Excel spreadsheet.
Step 10: Next, download the images as files to use to populate your own website or
marketplace.
CSE, CIET 43
Email Attacks
Email Security refers to the security measures that an organization takes in order to
secure various aspects of its email system such as identity, content, media
attachments or email access.Email security can be a target of a phishing attack,
identity theft, spam emails and virus attacks.
Types of Email Attacks
Many people rely on the Internet for many of their professional, social and personal
activities. But there are also people who attempt to damage our Internet-connected
computers, violate our privacy and render inoperable the Internet services.
Email is a universal service used by over a billion people worldwide. As one of the most
popular services, email has become a major vulnerability to users and organizations.
Below are some of the most common types of Attacks:
Phishing : Phishing is a form of fraud. Cyber criminals use email, instant messaging,
or other social media to try to gather information such as login credentials by
masquerading as a reputable person. Phishing occurs when a malicious party sends a
fraudulent email disguised as being from an authorized, trusted source. The message
intent is to trick the recipient into installing malware on his or her device or into
sharing personal or financial information.
Spear phishing is a highly targeted phishing attack. While phishing and spear phishing
both use emails to reach the victims, spear phishing sends customized emails to a
specific person. The criminal researches the target’s interests before sending the
email.
CSE, CIET 44
Vishing: Vishing is phishing using voice communication technology.
Criminals can spoof calls from authorized sources using voice over IP
technology. Victims may also receive a recorded message that
appears authorized. Criminals want to obtain credit card numbers or
other information to steal the victim’s identity. Vishing takes
advantage of the fact that people trust the telephone network.
Smishing: Smishing is phishing using text messaging on mobile
phones. Criminals impersonate a legitimate source in an attempt to
gain the trust of the victim. For example, a smishing attack might
send the victim a website link. When the victim visits the website,
malware is installed on the mobile phone.
Whaling: Whaling is a phishing attack that targets high profile
targets within an organization such as senior executives. Additional
targets include politicians or celebrities.
Pharming: Pharming is the impersonation of an authorized website
in an effort to deceive users into entering their credentials. Pharming
misdirects users to a fake website that appears to be official. Victims
then enter their personal information thinking that they connected to
a legitimate site.
CSE, CIET 45
Spyware: Spyware is software that enables a criminal to obtain information about a
user’s computer activities. Spyware often includes activity trackers, keystroke
collection, and data capture. In an attempt to overcome security measures, spyware
often modifies security settings. Spyware often bundles itself with legitimate software
or with Trojan horses. Many shareware websites are full of spyware.
Scareware: Scareware persuades the user to take a specific action based on fear.
Scareware forges pop-up windows that resemble operating system dialogue windows.
These windows convey forged messages stating that the system is at risk or needs the
execution of a specific program to return to normal operation. In reality, no problems
exist, and if the user agrees and allows the mentioned program to execute, malware
infects his or her system.
Adware: Adware typically displays annoying pop-ups to generate revenue for its
authors. The malware may analyze user interests by tracking the websites visited. It
can then send pop-up advertising relevant to those sites. Some versions of software
automatically install Adware.
Spam: Spam (also known as junk mail) is unsolicited email. In most cases, spam is a
method of advertising. However, spam can send harmful links, malware or deceptive
content. The end goal is to obtain sensitive information such as a social security
number or bank account information. Most spam comes from multiple computers on
networks infected by a virus or worm. These compromised computers send out as
much bulk email as possible.
Virus : Attacking with a virus through email is another form using email as a vector.
Creating a virus and implementing it requires a meticulous amount of planning, an
activity more likely to be conceived and executed by a group rather than an individual.
CSE, CIET 46