0 ratings0% found this document useful (0 votes) 79 views20 pagesCyber Security Notes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Cyber ae
unde- ]
Lntoteduction,
yor Coume FUeget Octivity committed
OM thy ht eur,
Defining Cyber coume
* Couns comriltrat
* Sueqas angoot :
+ pmalveclow PROM - 7
1800, Joseph manic Jacquol. a wextile Manfactun e
france
Dlbernatine —depeictbn Cyber tame ©
Any — ctlousck do dha” dompyte dtaup . Such
as thet , Pordwore ord fume Soroctege and
demand swrouice .
tyber coune = and dnyecunditin - Bequity
who are wre! coorainet
& Credit coud pau
+ cybo Baoteg . ~
pespotre —annehwh Onn
+ meng copy otigit
Se Computer Buy
a th ookzed aceem
8 9 ae :categosiaalion Of; Cyber Coumninals
j ipso i ws
Gybe COLM ~ bamrgy co oumgrition
TORE Te eye counurd) — nod ur onterg ou
j Steeqy aitton
Type -8
cyber ebumenal the winsidery
Motives beard cyber couima
Claes. pubitelty, aelerge |) ouurisiictne nerds,
1) tyber cour agaaine an dédividual
phisheig . Spear Phidhsng
| Spamming
; fyper. diamation,
oybe Stata
*f comput. Sabotage i
u Poorngpophic .
Pass awood “igniting
2) wyber cous agasit powperdty
Couastit cartel pau *
Infor cleok — Potepety (ip
Trtomt tins tape |
3) cyber conus aganiit ‘eager eatin
Parsaweeid Shipgng
loge bom f
vious attace
FED SP > yee aresmmmeemmnmepememeceremesesseceessee cece5) cybe mui agpnut
data obiaettirg
Lepr Rove
Sdptwoo «Podagy .
A) Cyber corime
yorpny
cyber Lemoore
agamit Sectety
Web Jacky
Courhe ernanalitg yton Usenet new gatoop.
Fence Sewice at goon oven owe Uyak group mau
ube copouy Gpoand |
Spanenecrg
F- mail Span
Junk yile
Fntaant meveage Span
Web Search engene
ad Spam,
Salami attack
Ehat att aches pw
D Salami attack us method % yer Counte
a Packs ypieatly , UNd do
temmut yorian otal Coury, , Open toutinal Steals monsy
Ost gusoUrCe — foto yuranatal Acrount on a Apten
at oa ite:
REE T_TSS UCtCtC~—
cy clefamatien
Lfbel
Slandex
allegoation
cnitome cane cthept
Galani attack | Salant Lechwique
+
Pucancial counes
(eons
count yettv'g a » olbcunient
M tnth b
IT = raindaby % ulootracbbn Beech rblogy
Grove yak” case" Web J by"
spiel pub. was chanel .
Hacking
Goterd
Pouy
Publiorty
foabioblen Shpoomestien. ‘
“GPS & nitcluen Pra cheng
x
Alte under Leth o% abou
JAek & maser on couonline pau cl
ythanoial frauds
Ten tfpie they.
wall cepaperg
charactour A% — cyber
Counie
Tretieat
Taxget % Potepad
Deiqani rater
sgantea
Cyber cwmulie Seale Leland oe
cJet’s Oo even
How coununat plan the attack
Re comnaisance
Passive attacks
Suystena attacks
activte attacks si, Bt dandy
elomijeation “‘Socich’ enginttny
Human ybamal cGocrat - enginansing
epmpulix © based Social enginsnung. :
Alloy oo -meblte @ cell Phone .
mobiie phone thept
ope VOUAes
Mishing :
. wshur'g
-smushirg ;
nese nameFO
_secwtity uioplenaations 407 bam
eae
devices ton
pbile
Se pe par das
W Mangirg dvi qoottcatn % Fard ded aleute oy
2) unconsit / See?
Sto i
qaten Sitlen ley
8) Thieat tiomught Lom and ", :
) Thee 4
A) Prwcetee! aga close levies
Joptep user
emonage Ceuices
5) Educating the
zation (|
Oo Nabe! wcone. ob te. OU veel
& o
ty Particles Sugect sto tesa 95,
Consistents (
_ Sead
oth! entternal
~ émptenec! seourt FY owen! ard deol,
— polyes
~ Ceo- chrep exente Ogee
@® _ creompamer ae
USER - Univeral Setial bus treet afer
b
Bip and Memooy
aeattive Beoority
| 1) encropting osprey dota bass
device vo Seasety
i) whovleing — ravbit=
| Stovage «
COpntten greattivo dup mer
- Data rig ard deca wane boonies
p Rw
~ Two augontties ( sjectaet) ASherS Ory esicspterg
_ balck Sop oF aulgosiithew -
Ass >Laduen tage except
National ce Una tioeie t
erent Ccem)'
SHardaxd
geandead Lecknmagy .| Og D doplener tity
si) vous Chee
nw) Los cpenenation
(prathoxt
Ret)
Ww) othe control 4 mobile ays
Vv) cSeae aert ance do tompeny | (vew
© De vopurg 4 aye ‘bam! Secutky aug
ard mpbile’ dewiees
incoopate cbecutty querer tate mobile brary,
ard yproot rotoy vane
and char .
Prpropniat §— [aw oY
Y
agen vain «Security pease?
% uty
crrepectant * f
gpoastirg quite quid ind irnif sradina
miblie devices caeceuTty “POGRY
Cogan ation pote ‘
pee Public seca teers
creewnty Nur
octal
(Fo one,
daw. local
WAN mun
MPN Metourite:unte-a
TOPIS anc mettle Us,
cA ih OIhecaina
Stages an a Eo
| What & IPs
OD unitioar
Covertyg tive cx
| 9) Netwonk cpenbe
2) fowssuig the Lie towed eleceonte céame
1 capteonttg the neewouk
DP) HOmb ets arte
6) Covering cbha ecttacte
Varies yfools 12 Used fon tthe “atta,
OD pow sever and anonyatzes .
Clee end terete aay, betiscen enct pores
: “4
poroay Bor
Purpose. A Paomy Seaver.
» A nengnd zen
~ Un Bioeea ble
= Pootectry Penoral Un osirao
by Ataling the 9 eat we clint rg tg U0 Foamraseso
Phe hag
en tine (D thy
- Vb USE»
pow Phish wasilsset up
yeack
~ collectioe
tet ard pad.
welent rey ft and pred
Pavsuoed Mackrg '
b> boute- Fosice - attack.
by amntit an amdatle Cy Ptoqnaplie
oe POON day,
Ti puipse & parsow cmd cecteing
smanual pousseuond toroekiog A Lee eh
LA \Wtatiet vser
Categoote o% ~ Pavawosk” cuacking atiack:-
(Ghee Caaye9 —F mne 80 onothe, Por,
Dumptor diwa orel Co gooimortton uty
Purpose place .
whot & Shfoueln Suny hy >
Most popula = two attack en
Tan -in- the~ middle qttacl’
bucke+ roxfgode octtace:
Type % Poaword atock +
Papsewocee guess
Di cteonaty attackby admurtator
Wal Pavawood.
Stoong Pasword |
vo het ope wuie Werk Paumandoo!
Key loggers
wrt & another name & Bea oop >
= Reysbioke
- Key laggy
- Keyued capewns
°
Human core pele Feviaction
oppeteachr > acute — arelasis” ?
Sapeosre bard keg lage
: imp post (Ap) _paseet )
Steal Posooad — :
= Packet Analyte”
Two giles
pu
EXE what &
J) Byam ple
prardueorel Key logan hand wore
- ATMS macht Kee log .9
ans. ATM,
aesKeylngy
Ie
cand
cseund se
tated,
put Rel” foot) anti + Keyetboke «logao.,
Bayit % antl layligge
Hey tagger someon Seuu(4 a eae deteg
by,
Chr pred. + owllable J .
cbegre
vows ard — wooms
Dijjeot bho vous and woos —» @® Cm
APpneT. — aclvontleced Pee sessree h Popject — armens
wetwark. ~
Tye] Veluses ,
+ Boot Sector vsuses
* “Posqoam Wises
“Multipart” veiteuss
# Glealth yy *
a Neat VU tes P thoes “noe stece! Vourg
Polymoaplic —vui ; :
: u Ve Clisacie.
“ Mavieotovewses 3 wiser eto _sppeot (MSM
Mave
K Native X ord java Coites!Web bows 5 chem e, py iN
“Tht wovlld's edaoeet wool Varia actterch
WIR BS Puy > Moore fonby > ga bt)
4
Teigjan foase arel Backeloon ,
+ Backdov: .
How to Powtect yrore — sbigan Moose ancl Bocedars
FTP Satie,
Eaomple % «backdoon ,
1) Stay away suspect websites [erebatinks'
3) wy on ithe web cauLtrourty ,
5). wistall an efvous ( hagjowe womote — SoLbwevte
tgp
ar Tyjecteoe Nes ,
gy Cotogteoral ovstly danguage (S02)
4 Step for th upjette, aecP
t.
cto Poavent COL Gy ecto attat
+ How , agp + eactve sate et).
id otter
1) Repo va
2 cy evo sagoril
3) ofte powering“Tyre ] baygor overs ov
0 Stack. > Space
2” Buffer overt loo (¢, cre’) Poppet larg agg
* Hack eon el. bps Otters low
jose tio Powe ove
©
Nops + no CPeation (0%) NO enwatii Pe
what is Mop,» © couale Streit! tne delay ey
$0:9m7,
Sendeoien (4) , 83 4 emply Set 9% Sel)
Heop Buyfer overfla .
Newt), malloecr , caller €) $4 eorerrainc!
hy 2moe4 alldsshiny
How to Minimize Bufo overflow,
* ASsesment Seoisie Coal ¢ rrairoally
+ Diable atack excecachon
* comple: (ide tools
& Byaramac Stun tem ¢ Cheeks.
# Vaston tole wutsed to detect ,tte
ONPEE 3100,
J POPUL OO — Faensaeg
(YPo Pron tee,
PFE eh sera
Ove.
THO MH trey cour
: oltre Hooencd teva,
~ SABIE 0% OKFeot to comment tha
Yorn
computer foounvc coe) Aig tee Yorwnat as ,
- Digital oouny’, is ouquited
~ RE goowurg, Femuco,
Pee Pousereition
© Collectio
~ Valtacta tien | . -
GON ey
~ dcumentin
— Powsentation ee
Digital forme Ces ;
- Ter Petble , ye
= unbailals(ies 8>" : .
~ thterpyetation . | ea, ae bell
— Powserator .
focumee eels:——————— ts
ese?
cat Fabeasimertion
file
yoomatiirg_yie ard file Ses Od
~ rlemperot files
~ dala cluster,
teed ye fonmprto: forunstes
= FCT advantage ard ue % Competes wos
High deo peat copactty & model pm,
New siimb foo Comput wxtm
Outcome
= daw en ovamunt 7
~ UBI@oTy Of computor fo qo toes ten
~ devegal evince — evexythey fhe Ed ah
— Convrce People.
- Cyber fretansce ane!
Computer focennt expect '-
- Reibtive defo — giom — distetony es
Riskin file. dette aye
| Oped Ue
’
4) User tortor
feYormput? Ceti Yije
D We @ thee+ Trion e
tulcince ace tape
he Sertoment nutth
tute
Permuie oy 7
Ooelevtanc Jefure eaters of
fouersic Analinie oy ery tt
~ puthentiaty
Email foo.) ¢oramun cailion
= big Ttal evichnces .
fp wotl Sipfem + CHevtdware ror Software >;
Components
be emarl Serves;
i il
a ; ened la e
Hg J “¢
e . . 7
Forunsies Analywe | e~ matt!
Wasica) “Perth > Meclia' «
fegfea) contol 5 dare. Ceéridteiny b cuftences )
thtoomation
Pre 9892 --
~Tntoinet messoge vfoiain footmat” *
- vatid e-matt addr
= REC 2 8B2. < applied
Digrtal oveunat AGte tucles-
Digttl dg
~ dao nyo ouentent,
L
New cdo cuesere
+ s branapoort + <
+ Steae C0gen cliyetal euitbnee
FON > fepsact bene oy ete,
Parerees
© oD Fxbfe Cowieuince atin ide)
1) “Test monéy
| ay Peerty > (
w) challey
Y Codat Pedups pose
YW) fede tude ccctiiel ty
i) Rix analysts
Fee computer fooansié eed gta poverty:
— Potpasabie and it tet
~ CBee? and Stcooyey
= Hoeung ond .sborypooctr
— Exomaniy and . dnvegalten
- Ora byl, BA ntomtiom and
= Popo atigs. 0
| - testi; ae
| ~ Cleotng ard eooauty i euro’
~ COnputens
~— Cell Phong
= cligé tal Caserta.Blach Rox
Cbd
oe tombe}
“Tag ancl eb Troyes,
ghee Pome
Compete
Chai @
Cun
Document ¢
Toole
= anc metho .,
“Spolleng
emp! Foeamies desta
evidences +.
Searching —o woan
~ Phalysie and
> Wen- igtal eViclence
SROM Kwiee -tool7
Repostecng (oval oo) eter
Botwad clevel
element % ithe Steposct |
- Tndetty & Sopot agents
- Ce clon tiple
- Case Cavegaten ,
~ data % Reaxt,
~ Serial no, make model
a Broth uflyyey 3
~ Sep take dusming erornieg
~ Resutt Co) eonctascon ,
in
Eo wuncé
pethee’ are! fol s
~ Walle ~Netwont
Thtret wok~ Seewsity analy .—
© 031 + + Layo mode! to Computer foun,
~ -Pootpavrting
Stanning and
(Going orccest
Tonabuge
explo Ft
Pebacking
rstabing back loco, |