Cybersecurity Course Overview
Cybersecurity Course Overview
I INTRODUCTION 6
Cyber Security – History of Internet – Impact of Internet – CIA Triad; Reason for Cyber Crime –
Need for Cyber Security – History of Cyber Crime; Cybercriminals – Classification of
Cybercrimes
-A Global Perspective on Cyber Crimes; Cyber Laws – The Indian IT Act – Cybercrime and
Punishment.
UNIT TITLE PERIODS
III RECONNAISSANCE 6
Harvester – Whois – Netcraft – Host – Extracting Information from DNS – Extracting
Information from E-mail Servers – Social Engineering Reconnaissance; Scanning – Port
Scanning – Network Scanning and Vulnerability Scanning – Scanning Methodology – Ping
Sweer Techniques – Nmap Command Switches – SYN – Stealth – XMAS – NULL – IDLE – FIN
Scans – Banner Grabbing and OS Finger printing Techniques.
UNIT TITLE PERIODS
IV INTRUSION DETECTION 6
Host -Based Intrusion Detection – Network -Based Intrusion Detection – Distributed or Hybrid
Intrusion Detection – Intrusion Detection Exchange Format – Honeypots – Example System
Snort
UNIT TITLE PERIODS
V INTRUSION PREVENTION 6
Firewalls and Intrusion Prevention Systems: Need for Firewalls – Firewall Characteristics and
Access Policy – Types of Firewalls – Firewall Basing – Firewall Location and Configurations –
Intrusion Prevention Systems – Example Unified Threat Management Products
30 PERIODS
PRACTICAL EXERCISES: 30 PERIODS
1. Install Kali Linux on Virtual box
.
2. Explore Kali Linux and bash scripting
3. Perform open source intelligence gathering using Netcraft, Whois Lookups,
DNS Reconnaissance, Harvester and Maltego
4. Understand the nmap command d and scan a target using nmap
5. Install metasploitable2 on the virtual box and search for unpatched vulnerabilities
6. Use Metasploit to exploit an unpatched vulnerability
7. Install Linus server on the virtual box and install ssh
8. Use Fail2banto scan log files and ban Ips that show the malicious signs
9. Launch brute-force attacks on the Linux server using Hydra.
10. Perform real-time network traffic analysis and data pocket logging using Snort
COURSE OUTCOMES:
CO1: Explain the basics of cyber security, cybercrime and cyber law (K2)
CO2: Classify various types of attacks and learn the tools to launch the attacks (K2)
TEXT BOOKS:
Anand Shinde, “Introduction to Cyber Security Guide to the World of Cyber Security”,
1
Notion Press, 2021 (Unit 1)
Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber Crimes,
2 Computer Forensics and Legal Perspectives”, Wiley Publishers, 2011 (Unit 1)
3 https://owasp.org/www-project-top-ten/
REFERENCE BOOKS:
INTRODUCTION
UNIT 1 INTRODUCTION
Cyber Security – History of Internet – Impact of Internet – CIA Triad; Reason for Cyber Crime –
Need for Cyber Security – History of Cyber Crime; Cybercriminals – Classification of Cybercrimes –
A Global Perspective on Cyber Crimes; Cyber Laws – The Indian IT Act – Cybercrime and
Punishment.
Cyber Security
Cyber security is the preservation through policy technology and education of the Avaliablity,
confidenality and integrity of information and its underlying infrastructure so as to enhance the
security of person of both online and offline.
"Cyber security is primarily about people, processes, and technologies working together to
encompass the full range of threat reduction, vulnerability reduction, deterrence, international
engagement, incident response, resiliency, and recovery policies and activities, including
computer network operations, information assurance, law enforcement, etc."
OR
Cyber security is the body of technologies, processes, and practices designed to protect networks,
computers, programs and data from attack, damage or unauthorized access.
• The term cyber security refers to techniques and practices designed to protect digital data.
• The data that is stored, transmitted or used on an information
system. OR
Cyber security is the protection of Internet-connected systems, including hardware, software,
and data from cyber attacks. It is made up of two words one is cyber and other is security.
• Cyber is related to the technology which contains systems, network and programs
or data.
• Whereas security related to the protection which includes systems security, network security
and application and information security.
The image above is a scale model of the UNIVAC I (the name stood for Universal Automatic
Computer) which was delivered to the Census Bureau in 1951. It weighed some 16,000 pounds,
used 5,000 vacuum tubes, and could perform about 1,000 calculations per second. It was the first
American commercial computer, as well as the first computer designed for business use. (Business
computers like the UNIVAC processed data more slowly than the IAS-type machines, but were
designed for fast input and output.) The first few sales were to government agencies, the A.C.
Nielsen Company, and the Prudential Insurance Company. The first UNIVAC for business
applications was installed at the General Electric Appliance Division, to do payroll, in 1954. By
1957 Remington-Rand (which had purchased the Eckert-Mauchly Computer Corporation in 1950)
had sold forty-six machines.
Impact of Internet :
Learning
Communication
Social Networks
Health Care
Business
Entertainment
Jobs and Employment
CIA TRIAD :
We use a control or countermeasure as protection. That is, a control is an action, device,
procedure, or technique that removes or reduces a vulnerability.
These characteristics are both basic security properties and the objects of security threats.
We can define these three properties as follows.
• availability: the ability of a system to ensure that an asset can be used by any authorized parties
• integrity: the ability of a system to ensure that an asset is modified only by authorized parties
• confidentiality: the ability of a system to ensure that an asset is viewed only by authorized
parties adds
properties that are desirable, particularly in communication networks:
• authentication: the ability of a system to confirm the identity of a sender
• nonrepudiation or accountability: the ability of a system to confirm that a sender cannot
convincingly deny having sent something
Confidentiality is about preventing the disclosure of data to unauthorized parties. It also means
trying to keep the identity of authorized parties involved in sharing and holding data private and
anonymous.
Often confidentiality is compromised by cracking poorly encrypted data, Man-in-the-middle
(MITM) attacks, disclosing sensitive data.
Standard measures to establish confidentiality include:
• Data encryption
• Two-factor authentication
• Biometric verification
• Security tokens
Properties that could mean a failure of data
.
confidentiality:
• An unauthorized person accesses a data item.
• An unauthorized process or program accesses a data item.
• A person authorized to access certain data accesses other data not authorized
(which is a specialized version of “an unauthorized person accesses a data
item”).
• An unauthorized person accesses an approximate data value (for example, not knowing
someone’s exact salary but knowing that the salary falls in a particular range or exceeds a
particular amount).
• An unauthorized person learns the existence of a piece of data (for example, knowing that a
company is developing a certain new product or that talks are underway about the merger of two
companies).
Integrity: Integrity
Integrity refers to protecting information from being modified by unauthorized parties. Three
particular aspects of integrity are
• Authorized actions
• Separation and protection of resources
• Error detection and correction.
Integrity can be enforced in much the same way as can confidentiality: by rigorous control of who
or what can access which resources in what ways.
Standard measures to guarantee integrity include:
• Cryptographic checksums
• Using file permissions
• Uninterrupted power supplies
• Data backups
if we say that we have preserved the integrity of an item, we may mean that the item is
• precise
• accurate
• unmodified
• modified only in acceptable ways
• modified only by authorized people
• modified only by authorized processes
• consistent
• internally consistent
• meaningful and usable
Availability
Availability is making sure that authorized parties are able to access the information when
needed. Availability applies both to data and to services (that is, to information and to information
processing), and it is similarly complex. As with the notion of confidentiality,
different people expect availability to mean different things. For example, an object or
service is thought to be available if the following are true:
• It is present in a usable form.
• It has enough capacity to meet the service’s needs.
• It is making clear progress, and, if in wait mode, it has a bounded waiting time.
• The service is completed in an acceptable period of time.
We can construct an overall description of availability by combining these goals. Following are
some criteria to define availability.
• There is a timely response to our request.
.
• Resources are allocated fairly so that some requesters are not favored
over others.
• Concurrency is controlled; that is, simultaneous access, deadlock
management, and exclusive access are supported as required.
• The service or system involved follows a philosophy of fault tolerance,
whereby hardware or software faults lead to graceful cessation of service or to work-arounds
rather than to crashes and abrupt loss of information. (Cessation does mean end; whether it is
graceful or not, ultimately the system is unavailable. However, with fair warning of the system’s
stopping, the user may be able to move to another system and continue work.)
• The service or system can be used easily and in the way it was intended to
be used. (This is a characteristic of usability, but an unusable system may
also cause an availability failure.)
Standard measures to guarantee availability include:
• Backing up data to external drives
• Implementing firewalls
• Having backup power supplies
• Data redundancy
A person or system can do three basic things with a data item: view it, modify it, or use it. Thus,
viewing (confidentiality), modifying (integrity), and using (availability) are the basic modes of
access that computer security seeks to preserve.
Computer security seeks to prevent unauthorized viewing (confidentiality) or modification
(integrity) of data while preserving access (availability).
Harm:
The C-I-A triad can be viewed from a different perspective: the nature of the harm caused to assets.
Harm can also be characterized by four acts: interception, interruption, modification, and
fabrication.
data:
.
Through unauthorized access, hackers attempt to either delete or modify the data.
Extortion:
In exchange for money or ransom, hackers threaten the victim by illegally gaining access to their
sensitive and private data.
Damage reputation:
Breaches lead to a loss of trust among an organization’s customer base.
The significance of cyber security in today’s digital age cannot be understated. A single security
breach has severe consequences in today’s interconnected world, resulting in heavy financial losses
and data loss, as well as hurting its reputation.
For instance, in 2017 Equifax breach exposed the personal identification information of over 145
million people. In 2018, the breach at Marriott leaked the personal information of over 500 million
people.
Cyber Crime: Cybercrime or a computer-oriented crime is a crime that includes a computer and a
network. The computer may have been used in the execution of a crime or it may be the target.
Cybercrime is the use of a computer as a weapon for committing crimes such as committing fraud,
identity theft, or breaching privacy. Cybercrime, especially through the Internet, has grown in
importance as the computer has become central to every field like commerce, entertainment, and
government. Cybercrime may endanger a person or a nation’s security and financial health.
Cybercrime encloses a wide range of activities, but these can generally be divided into two
categories:
.
Crimes that aim at computer networks or devices. These types of crimes involve different threats
(like virus, bugs etc.) and denial-of-service (DoS) attacks.
Crimes that use computer networks to commit other criminal activities. These types of crimes
include cyber stalking, financial fraud or identity theft.
Cyber Terrorism –
Cyber terrorism is the use of the computer and internet to perform violent acts that result in loss
of life. This may include different type of activities either by software or hardware for threatening
life of citizens.
In general, Cyber terrorism can be defined as an act of terrorism committed through the use
of cyberspace or computer resources.
.
Cyber Extortion –
Cyber extortion occurs when a website, e-mail server or computer system is subjected to or
threatened with repeated denial of service or other attacks by malicious hackers. These
hackers demand huge money in return for assurance to stop the attacks and to offer
protection.
Cyber Warfare –
Cyber warfare is the use or targeting in a battle space or warfare context of computers, online
control systems and networks. It involves both offensive and defensive operations concerning
to the threat of cyber attacks, espionage and sabotage.
Internet Fraud –
Internet fraud is a type of fraud or deceit which makes use of the Internet and could include hiding
of information or providing incorrect information for the purpose of deceiving victims for money
or property. Internet fraud is not considered a single, distinctive crime but covers a range of illegal
and illicit actions that are committed in cyberspace.
Cyber Stalking –
This is a kind of online harassment wherein the victim is subjected to a barrage of online messages
and emails. In this case, these stalkers know their victims and instead of offline stalking, they use
the Internet to stalk. However, if they notice that cyber stalking is not having the desired effect,
they begin offline stalking along with cyber stalking to make the victims’ lives more miserable.
Challenges of Cyber Crime:
People are unaware of their cyber rights-
The Cybercrime usually happen with illiterate people around the world who are unaware
about their cyber rights implemented by the government of that particular country.
Anonymity- Anonymity-
Those who Commit cyber crime are anonymous for us so we cannot do anything to that person.
No harsh punishment-
In Cyber crime there is no harsh punishment in every cases. But there is harsh punishment in
some cases like when somebody commits cyber terrorism in that case there is harsh punishment
for that individual. But in other cases there is no harsh punishment so this factor also gives
encouragement to that person who commits cyber crime.
Prevention of Cyber Crime:
Below are some points by means of which we can prevent cyber crime:
.
methods like Brute force attack, Rainbow table attack etc, So make them complex. That means
combination of letters, numbers and special characters.
Software should be updated – Operating system should be updated regularly when it comes
to internet security. This can become a potential threat when cybercriminals exploit flaws in
the system
Increasing Frequency and Complexity: Cyber criminals continuously evolve their tactics,
techniques, and procedures to exploit vulnerabilities in systems and networks, making cyber
attacks more sophisticated and challenging to combat.
Cross-Border Nature: This cross-border nature poses challenges for law enforcement and
regulatory agencies in terms of jurisdiction, coordination, and collaboration in investigating
and prosecuting cyber criminals.
Impact on Individuals and Organisations: Cyber crimes can have significant economic,
social, and geopolitical consequences for individuals, businesses, governments, and society as a
whole.
Emerging Trends and Technologies: Rapid technological advancements, such as the Internet of
Things (IoT), artificial intelligence (AI), blockchain, and quantum computing, present both
opportunities and challenges in the fight against cyber crimes.
Regulatory and Policy Landscape: Governments around the world are enacting laws,
regulations, and international agreements to combat cyber crimes, protect critical infrastructure,
safeguard data privacy, and promote cybersecurity best practices.
.
.
.
Cyber Laws :
Cyber law, also known as internet law or digital law, signifies the legal regulations and
frameworks governing digital activities. It covers a large range of issues, including online
communication, e-commerce, digital privacy, and the prevention and prosecution of
cybercrimes.
Cybercrime Laws:
Cybercrime laws define and penalize various cybercrimes, ensuring legal consequences for
offenders. These laws play a crucial role in deterring individuals from engaging in illegal online
activities and provide a legal framework for prosecuting cybercriminals.
E-commerce Laws:
E-commerce laws regulate online business transactions, defining rules for contracts,
transactions, and consumer protection. These laws contribute to the establishment of a secure
and fair online marketplace.
Cybersecurity Laws:
Cybersecurity laws establish standards for securing digital systems and data. These laws
mandate organizations to implement measures to protect against cyber threats, contributing to
the overall resilience of digital infrastructure.
.
and prosecuting cybercriminals operating across borders.
Data Privacy:
Safeguarding individuals' digital information is a paramount concern addressed by cyber laws.
These regulations ensure that organizations handle personal data responsibly, establishing a
foundation of trust in digital transactions and interactions.
E-commerce Regulation:
The legal framework provided by cyber laws is crucial for the regulation of e-commerce. It
defines rules for online transactions, contracts, and consumer protection, thereby fostering a
fair and secure online marketplace.
The Information Technology Act, 2000 also Known as an IT Act is an act proposed by the
Indian Parliament reported on 17th October 2000. This Information Technology Act is based
on the United Nations Model law on Electronic Commerce 1996 (UNCITRAL Model) which was
suggested by the General Assembly of United Nations by a resolution dated on 30th January,
1997. It is the most important law in India dealing with Cybercrime and E-Commerce.
The main objective of this act is to carry lawful and trustworthy electronic, digital and online
transactions and alleviate or reduce cybercrimes. The IT Act has 13 chapters and 94 sections.
The last four sections that starts from ‘section 91 – section 94’, deals with the revisions to the
Indian Penal Code 1860.
.
Deals with documents to which the Act shall not apply.
Second Schedule –
Deals with electronic signature or electronic authentication method.
Section Punishment
Section 43 This section of IT Act, 2000 states that any act of
destroying, altering or stealing computer system/network
or deleting data with malicious intentions without
authorization from owner of the computer is liable for the
payment to be made
to owner as compensation for damages.
Section 43 A This section of IT Act, 2000 states that any corporate body
dealing with sensitive information that fails to implement
reasonable security practices causing loss of other person
will also liable as convict for compensation to the affected
party
Section 66 Hacking of a Computer System with malicious intentions
like fraud will be punished with 3 years imprisonment or
the fine of Rs.5,00,000 or both.
Section 66 B, C, D Fraud or dishonesty using or transmitting information or
identity theft is punishable with 3 years imprisonment or
Rs. 1,00,000 fine or both.
.
Section 66 F This Section is on Cyber Terrorism affecting unity, integrity,
security, sovereignty of India through digital medium is
liable for life imprisonment.
Section 67 This section states publishing obscene information or
pornography or transmission of obscene content in public
is liable for imprisonment up to 5 years or fine of
Rs.
10,00,000 or both
.
.