8 Unit Wise Lecture Notes
8 Unit Wise Lecture Notes
Basic Cyber Security Concepts, layers of security, Vulnerability, threat, Harmful acts, Internet
Governance – Challenges and Constraints, Computer Criminals, CIA Triad, Assets and Threat, motive
of attackers, active attacks, passive attacks, Software attacks, hardware attacks, Cyber Threats-Cyber
Warfare, Cyber Crime, Cyber terrorism, Cyber Espionage, etc., Comprehensive Cyber Security Policy
UNIT-I
Cyber security is the most concerned matter as cyber threats and attacks are overgrowing.
Attackers are now using more sophisticated techniques to target the systems. Individuals,
small-scale businesses or large organization, are all being impacted. So, all these firms whether
IT or non-IT firms have understood the importance of Cyber Security and focusing on adopting
all possible measures to deal with cyber threats.
"Cyber security is primarily about people, processes, and technologies working together to
encompass the full range of threat reduction, vulnerability reduction, deterrence, international
engagement, incident response, resiliency, and recovery policies and activities, including
computer network operations, information assurance, law enforcement, etc."
OR
Cyber security is the body of technologies, processes, and practices designed to protect
networks, computers, programs and data from attack, damage or unauthorized access.
The term cyber security refers to techniques and practices designed to protect digital
data.
OR
Cyber security is the protection of Internet-connected systems, including hardware, software,
and data from cyber attacks.
It is made up of two words one is cyber and other is security.
Cyber is related to the technology which contains systems, network and programs or
data.
Whereas security related to the protection which includes systems security, network
security and application and information security.
Cybersecurity is a fast-evolving field that continually poses new challenges for companies,
government agencies, and individuals. While some may assume that cybersecurity means protecting
computers from viruses and other types of malware using anti-virus software or other security
programs, this is only one aspect of the subject.
It is more common than ever for data breaches and cyberattacks to occur. They’re no longer limited to
large corporations with vast resources and sophisticated information security practices. Today,
smaller businesses and those operating online marketplace sites or other e-commerce services are also
at risk.
It takes one mischievous user with access to a computer or mobile device to break into an
organization’s network, steal confidential information, cause damage and result in lost revenue and
penalties for failing to safeguard assets. They can also expose companies to liability risks. Thus, every
organization must understand the basics of information security and why it’s essential for their
business.
The excellent accessibility of cloud computing also makes it a popular choice for many
companies, which can access information anywhere, anytime, and from any location.
Important Cybersecurity Fundamentals
The IT Security Fundamentals skill path includes an understanding of computer hardware, software,
and network security. The cybersecurity fundamentals course trains you in developing and
implementing security solutions for small and large organizations, protecting systems and network
infrastructures.
With the rise in cyber threats, individuals and companies should prioritize device protection. It is
crucial to protect devices that connect to the internet using anti-virus software, enables the lock-and-
erase options, activate two-factor authentication, and perform a regular automatic update of the
system software, whether they are laptops, PCs, mobile phones, AI-based devices (Alexa, smart
watches, etc.), iPads, tables, or any device that connects to the internet. Device protection will
significantly reduce the risk of attacks on individuals and their devices regardless of their location.
Once an individual device is connected online, information transmitted over the Internet requires
more defenses. Furthermore, one should use VPNs: Virtual Private Networks as they automatically
encrypt internet traffic. By using a VPN, all online transactions are secured, including the user’s
identity, location, browsing details, and any sensitive information such as passwords and bank details.
Cybercriminals often use email to gather sensitive information about individuals or companies. It is
highly recommended to encrypt emails to prevent sensitive data from being accessed by anyone other
than the intended recipient since they mask the original information. In addition, email encryption
often includes one-time password authentication.
Backups fall into two categories: Remote backups (offline) and cloud storage (online). Solutions
differ in their advantages and disadvantages.
Remote backup services are convenient and inexpensive, but it is not easily accessible from
anywhere. Alternatively, cloud solutions can be accessed from anywhere and are suitable for an
organization that operates from different locations.
However, one must ensure that critical documents should have their own digital vault with encryption
codes, as anything connected to the internet has a cyber threat risk.
Cyber threats can, however, affect anything connected to the internet. With a database and
infrastructure security management system, the cloud computing solution is highly secure, with strong
network security, application security, and cloud security. Additionally, strong mobile security
enhances cloud computing security.
By implementing a BCDR plan, an organization can recover quickly from unforeseen cloud security
situations such as natural disasters, power outages, team member negligence, hardware failure, and
cyberattacks, allowing routine operations to resume in less time. Moreover, identity management
frameworks provide endpoint security and data security at the highest level.
Cybersecurity refers to protecting systems, networks, programs, devices, and data from cyber -attacks
using technologies, processes, and controls. The basic cybersecurity concepts involve reducing cyber -
attack risks and preventing unauthorized access to systems, networks, and technologies.
Threat identification
Keeping information safe
Detecting intrusions and attacks
Respond to intrusions and attacks.
Rebuild intrusion defenses and recover database security.
Basic Terminologies of Cyber Security
Cybersecurity basics for beginners should include these terminologies. Knowing the cybersecurity
basics terminology will help you better understand the high-tech world. However, technological
advances in cybersecurity are accompanied by the emergence of new jargon.
Internet computers, routers, and websites need billions of unique IP addresses to be identified as one
cannot repeat them. IPv6 is a new protocol designed to meet the day's needs when the system runs out
of unique addresses in the future.
In addition to providing greater privacy than secured Wi-Fi hotspots, VPN services establish secure
and highly encrypted connections. With a VPN, online activity is hidden from cybercriminals,
businesses, governments, and other snoopers who tend to lure users into clicking on anonymous
links.
3. Firewall
A firewall monitors and filters the system's incoming and outgoing network traffic as per a
company’s security policies. Firewalls are a barrier between a private internal network and the
Internet at its primary level. A firewall blocks virtual traffic, which looks destructive, and allows
secure and non-threatening traffic to flow uninterrupted.
DNS - Domain Name Server operates as the internet’s virtual phone book. As every browser on the
internet is known by its IP address which allows users to locate the device, the DNS converts the
domain name into an IP address. For instance, the DNS converts the URL of
www.mycompany123.com to a numerical IP address 204.0.6.42. Browsers send data to the origin
servers on the content delivery network (CDN) using the IP address found by DNS servers.
Encryption is a process of converting plain text (readable message) into codes using an encryption
algorithm known as ciphertext. While, Decryption is a process of converting the ciphertext into plain
text.
6. Encryption Key
Data that is encrypted is decrypted and unscrambled using an encryption key. Keys are unique and
complex to replicate since they are associated with specific encryption codes.
In addition, here are the top 50 cybersecurity terms you should learn to become a pro in
cybersecurity.
Common Types of Cyber Attacks
The world today is plagued by a variety of cyberattacks. However, our networks and systems are
better protected if we know the types of cyberattacks. Here are the five most common types of
cyberattacks:
1. Malware Attack
Virus: A virus is a type of malware that can infect all the files on the network, which is one of the
most challenging types to eliminate. A computer virus can replicate itself by inserting its
malicious code into other programs.
Worm: Have the power to infect the entire network quickly and require no end-user involvement
as the worms can self-replicate.
Trojan: One of the most challenging types of malware to detect is Trojan malware, as it
disguises itself as a legitimate program. As soon as the victim executes the malicious code and
instructions, the malware can function independently. It is often used as an entry point for other
forms of malware.
Adware: End-users are served unwanted advertising (for instance, contact pop-ups) by adware.
Spyware: This type of malware collects sensitive data like user ids and passwords without
suspecting the end-user.
Ransomware: Known as one of the most dangerous types of malware attack that infects the
system, encrypting files and holding onto the encryption key until the victim pays a ransom. The
ransom is mainly in the form of cryptocurrency with a P2P network. Increasingly, organizations
are being attacked by ransomware that costs them millions to restore vital systems as they pay off
the attackers to recover them. There are several ransomware families, but CryptoLocker, Petya,
and Locky are the most recognized ones.
2. Password Attack
Password attacks most commonly cause data breaches. To gain access to user accounts, the hacker
tries to bypass the authentication.
3. Phishing Attack
The hacker can steal user data through phishing attacks, including login credentials, bank account
details, and credit card numbers. Attackers use disguises to trick victims into opening emails, instant
messages, or text messages that appear to come from trusted entities. After the recipient clicks a
malicious link, sensitive information is revealed, and malware is installed.
4. Clickjacking
In clickjacking, the attacker usually uses some sort of ad online to lure the user. They are tricking a
user into clicking on buttons or links that open to another page that installs malware into the user's
system.
The Adobe Flash plugin settings page is one of the most scandalous examples of clickjacking. This
page could be loaded into an invisible iframe and enable an attacker to manipulate the security
settings in Flash, allowing the computer’s microphone and camera to be used remotely by Flash
animations.
5. Cryptocurrency Hijacking
Cryptocurrency hijacking is a new cyber-attack that grew rigorously after the cryptocurrency was
introduced widely. Attackers use cryptojacking to mine cryptocurrency on someone else’s computer.
During the attack, the attacker gains access to the user's computer by infecting their system or
manipulating them to click on malicious links. In most cases, the users are unaware of this since the
Crypto Mining code works in the background, and the only indication that something is wrong is a
delay in the execution.
There are, however, some risks associated with cloud computing, such as the fact that few services are
available in the public domain, and third parties can access these services. Therefore, hackers may be
able to hack these services easily. In addition, cloud computing also poses a severe security risk of
account hijacking. When information in cloud accounts such as email, bank, social media, etc., is not
password protected, it becomes vulnerable, and hackers can access it to perform unauthorized
activities
Regulations such as GDPR are forcing organizations into taking better care of the
personal data they hold.
Because of the above reasons, cyber security has become an important part of the
business and the focus now is on developing appropriate response plans that minimize
the damage in the event of a cyber attack.
But, an organization or an individual can develop a proper response plan only when he
has a good grip on cyber security fundamentals.
It also means trying to keep the identity of authorized parties involved in sharing and holding
data private and anonymous.
Data encryption
Two-factor authentication
Biometric verification
Security tokens
Integrity
Cryptographic checksums
Using file permissions
Uninterrupted power supplies
Data backups
Availability
Availability is making sure that authorized parties are able to access the information when
needed.
1) Web-based attacks
2) System-based attacks
Web-based attacks
These are the attacks which occur on a website or web applications. Some of the important
web-based attacks are as follows-
1. Injection attacks
It is the attack in which some data will be injected into a web application to manipulate the
application and fetch the required information.
Example- SQL Injection, code Injection, log Injection, XML Injection etc.
2. DNS Spoofing
DNS Spoofing is a type of computer security hacking. Whereby a data is introduced into a DNS
resolver's cache causing the name server to return an incorrect IP address, diverting traffic to
the attackers computer or any other computer. The DNS spoofing attacks can go on for a long
period of time without being detected and can cause serious security issues.
3. Session Hijacking
It is a security attack on a user session over a protected network. Web applications create
cookies to store the state and user sessions. By stealing the cookies, an attacker can have access
to all of the user data.
4. Phishing
Phishing is a type of attack which attempts to steal sensitive information like user login
credentials and credit card number. It occurs when an attacker is masquerading as a trustworthy
entity in electronic communication.
5. Brute force
It is a type of attack which uses a trial and error method. This attack generates a large number
of guesses and validates them to obtain actual data like user password and personal
identification number. This attack may be used by criminals to crack encrypted data, or by
security, analysts to test an organization's network security.
6. Denial of Service
It is an attack which meant to make a server or network resource unavailable to the users. It
accomplishes this by flooding the target with traffic or sending it information that triggers a
crash. It uses the single system and single internet connection to attack a server. It can be
classified into the following-
Volume-based attacks- Its goal is to saturate the bandwidth of the attacked site, and is
measured in bit per second.
Application layer attacks- Its goal is to crash the web server and is measured in request per
second.
7. Dictionary attacks
This type of attack stored the list of a commonly used password and validated them to get
original password.
8. URL Interpretation
It is a type of attack where we can change the certain parts of a URL, and one can make a web
server to deliver web pages for which he is not authorized to browse.
It is a type of attack that allows an attacker to access unauthorized or essential files which is
available on the web server or to execute malicious files on the web server by making use of
the include functionality.
It is a type of attack that allows an attacker to intercepts the connection between client and
server and acts as a bridge between them. Due to this, an attacker will be able to read, insert
and modify the data in the intercepted connection.
System-based attacks
These are the attacks which are intended to compromise a computer or a computer network.
Some of the important system-based attacks are as follows-
1. Virus
It is a type of malicious software program that spread throughout the computer files without
the knowledge of a user. It is a self-replicating malicious computer program that replicates by
inserting copies of itself into other computer programs when executed. It can also execute
instructions that cause harm to the system.
2. Worm
3. Trojan horse
It is a malicious program that occurs unexpected changes to computer setting and unusual
activity, even when the computer should be idle. It misleads the user of its true intent. It appears
to be a normal application but when opened/executed some malicious code will run in the
background.
4. Backdoors
It is a method that bypasses the normal authentication process. A developer may create a
backdoor so that an application or operating system can be accessed for troubleshooting or
other purposes.
5. Bots
A bot (short for "robot") is an automated process that interacts with other network services.
Some bots program run automatically, while others only execute commands when they receive
specific input. Common examples of bots program are the crawler, chatroom bots, and
malicious bots.
That’s why we propose a new model that looks at cybersecurity more holistically.
The 7 layers of cyber security should centre on the mission critical assets you are seeking to
protect.
Cyber threats are security incidents or circumstances with the potential to have a negative
outcome for your network or other data management systems.
Examples of common types of security threats include phishing attacks that result in the
installation of malware that infects your data, failure of a staff member to follow data
protection protocols that cause a data breach, or even a tornado that takes down your
company’s data headquarters, disrupting access.
Vulnerabilities are the gaps or weaknesses in a system that make threats possible and tempt
threat actors to exploit them.
Types of vulnerabilities in network security include but are not limited to SQL injections,
server misconfigurations, cross-site scripting, and transmitting sensitive data in a non-
encrypted plain text format.
When threat probability is multiplied by the potential loss that may result, cyber security
experts, refer to this as a risk.
The Threat, Vulnerability, and Risk these terms are interrelated but not the same. In this article, we
are going to discuss the difference between them and how they are related to each other.
Threat
A cyber threat is a malicious act that seeks to steal or damage data or discompose the digital network
or system. Threats can also be defined as the possibility of a successful cyber attack to get access to the
sensitive data of a system unethically. Examples of threats include computer viruses, Denial of
Service (DoS) attacks, data breaches, and even sometimes dishonest employees.
Types of Threat
Threats could be of three types, which are as follows:
1. Intentional- Malware, phishing, and accessing someone’s account illegally, etc. are examples of
intentional threats.
2. Unintentional- Unintentional threats are considered human errors, for example, forgetting to
update the firewall or the anti-virus could make the system more vulnerable.
3. Natural- Natural disasters can also damage the data, they are known as natural threats.
Vulnerability:
Risk:
Cyber risk is a potential consequence of the loss or damage of assets or data caused by a cyber threat.
Risk can never be completely removed, but it can be managed to a level that satisfies an organization’s
tolerance for risk. So, our target is not to have a risk-free system, but to keep the risk as low as
possible.
Cyber risks can be defined with this simple formula- Risk = Threat + Vulnerability. Cyber risks are
generally determined by examining the threat actor and type of vulnerabilities that the system has.
Types of Risks
There are two types of cyber risks, which are as follows:
1. External- External cyber risks are those which come from outside an organization, such as
cyberattacks, phishing, ransomware, DDoS attacks, etc.
2. Internal- Internal cyber risks come from insiders. These insiders could have malicious intent or are
just not be properly trained.
Take advantage of
Known as the weakness in
vulnerabilities in the
hardware, software, or The potential for loss or destruction of
system and have the
designs, which might allow data is caused by cyber threats.
potential to steal and
cyber threats to happen.
1. damage data.
Generally, can’t be
Can be controlled. Can be controlled.
2. controlled.
Cyber crime is taken very seriously by law enforcement. In the early long periods of
the cyber security world, the standard cyber criminals were teenagers or hobbyists in
operation from a home laptop, with attacks principally restricted to pranks and malicious
mischief. Today, the planet of the cyber criminals has become a lot of dangerous. Attackers
are individuals or teams who attempt to exploit vulnerabilities for personal or financial gain.
Types of Cyber Criminals:
1. Hackers: The term hacker may refer to anyone with technical skills, however, it typically
refers to an individual who uses his or her skills to achieve unauthorized access to systems or
networks so as to commit crimes. The intent of the burglary determines the classification of
those attackers as white, grey, or black hats. White hat attackers burgled networks or PC
systems to get weaknesses so as to boost the protection of those systems. The owners of the
system offer permission to perform the burglary, and they receive the results of the take a
look at. On the opposite hand, black hat attackers make the most of any vulnerability for
embezzled personal, monetary or political gain. Grey hat attackers are somewhere between
white and black hat attackers. Grey hat attackers could notice a vulnerability and report it to
the owners of the system if that action coincides with their agenda.
(a). White Hat Hackers – These hackers utilize their programming aptitudes for a good
and lawful reason. These hackers may perform network penetration tests in an attempt to
compromise networks to discover network vulnerabilities. Security vulnerabilities are
then reported to developers to fix them and these hackers can also work together as a blue
team. They always use the limited amount of resources which are ethical and provided by
the company, they basically perform pentesting only to check the security of the company
from external sources.
(b). Gray Hat Hackers – These hackers carry out violations and do seemingly deceptive
things however not for individual addition or to cause harm. These hackers may disclose
a vulnerability to the affected organization after having compromised their network and
they may exploit it .
(c). Black Hat Hackers – These hackers are unethical criminals who violate network
security for personal gain. They misuse vulnerabilities to bargain PC frameworks. theses
hackers always exploit the information or any data they got from the unethical pentesting
of the network.
2. Organized Hackers: These criminals embody organizations of cyber criminals,
hacktivists, terrorists, and state-sponsored hackers. Cyber criminals are typically teams of
skilled criminals targeted on control, power, and wealth. These criminals are extremely subtle
and organized, and should even give crime as a service. These attackers are usually
profoundly prepared and well-funded
3. Internet stalkers: Internet stalkers are people who maliciously monitor the web activity of
their victims to acquire personal data. This type of cyber crime is conducted through the use
of social networking platforms and malware, that are able to track an individual’s PC activity
with little or no detection.
4. Disgruntled Employees: Disgruntled employees become hackers with a particular motive
and also commit cyber crimes. It is hard to believe that dissatisfied employees can become
such malicious hackers. In the previous time, they had the only option of going on strike
against employers. But with the advancement of technology there is increased in work on
computers and the automation of processes, it is simple for disgruntled employees to do more
damage to their employers and organization by committing cyber crimes. The attacks by such
employees brings the entire system down
CIA Triad
The CIA Triad is actually a security model that has been developed to help people think about
various parts of IT security.
What is the CIA Triad?
The three letters in "CIA triad" stand for Confidentiality, Integrity, and Availability. The CIA triad is a
common model that forms the basis for the development of security systems.
Confidentiality
It's crucial in today's world for people to protect their sensitive, private information from
unauthorized access.
Protecting confidentiality is dependent on being able to define and enforce certain access levels
for information.In some cases, doing this involves separating information into various
collections that are organized by who needs access to the information and how sensitive that
information actually is - i.e. the amount of damage suffered if the confidentiality was breached.
Some of the most common means used to manage confidentiality include access control lists,
volume and file encryption, and Unix file permissions.
Integrity
This is an essential component of the CIA Triad and designed to protect data from deletion or
modification from any unauthorized party, and it ensures that when an authorized person makes
a change that should not have been made the damage can be reversed.
Availability
This is the final component of the CIA Triad and refers to the actual availability of your data.
Authentication mechanisms, access channels and systems all have to work properly for the
information they protect and ensure it's available when it is needed.
The CIA Triad is all about information. While this is considered the core factor of the majority
of IT security, it promotes a limited view of the security that ignores other important factors.
For example, even though availability may serve to make sure you don't lose access to resources
needed to provide information when it is needed, thinking about information security in itself
doesn't guarantee that someone else hasn't used your hardware resources without authorization.
It's important to understand what the CIA Triad is, how it is used to plan and also to implement
a quality security policy while understanding the various principles behind it. It's also important
to understand the limitations it presents. When you are informed, you can utilize the CIA Triad
for what it has to offer and avoid the consequences that may come along by not understanding
it.
Each letter in the CIA triad represents a foundational principle in cybersecurity. The importance of
the security model speaks for itself: Confidentiality, integrity and availability are considered the
three most important concepts in infosec.
Considering these three principles together within the triad framework guides the development of
security policies for organizations. When evaluating needs and use cases for potential new products
and technologies, the triad helps organizations ask focused questions about how value is being
provided in those three key areas
The CIA triad provides multiple benefits to businesses, especially to ones that deal with sensitive
data. The benefits of triad implementation include the following:
Data security and privacy. The most obvious benefit is ensuring preparedness in the face of
today's sophisticated cyber attacks and other unauthorized attempts to access, steal or manipulate
valuable data.
Proactive risk prevention. When applied correctly, the triad creates an environment where
security risks are proactively prevented. Existing vulnerabilities are identified and mitigated to
prevent future threats.
Comprehensiveness. The three components mean that security teams aren't just concerned with
thwarting attackers, but they're also ensuring the veracity and availability of their data. For
example, when a large volume of data is needed for analysis, following the CIA triad means the
data is available and accessible when needed.
Challenges or concerns that may arise when attempting to adhere to this triad include the following:
Large data volumes. Big data poses challenges to the CIA paradigm because of the sheer
volume of information that organizations need safeguarded, the many sources that data comes
from and the variety of formats in which it exists. Duplicate data sets and DR plans can multiply
the already-high costs.
Data stewardship and governance. Because the main concern of big data is collecting and
making some kind of useful interpretation of all this information, responsible data stewardship,
auditing and oversight are often lacking. Whistleblower Edward Snowden brought that problem
to the public forum when he reported on the National Security Agency's collection of massive
volumes of U.S. citizens' personal data.
Internet of things (IoT) security and privacy. Almost any physical or logical entity or object
can be given a unique identifier and the ability to communicate autonomously over the internet
or a similar network. The data transmitted by an IoT endpoint might not cause any privacy issues
on its own. However, when even fragmented data from multiple endpoints is gathered, collated
and analyzed, it can yield sensitive information. IoT security is challenging because it involves
so many internet-enabled devices that often go unpatched and are configured with default or
weak passwords. Unless adequately protected, IoT can be used as a separate attack vector or part
of a thingbot.
Security in product development. As more products are developed with the capacity to be
networked, it's important to routinely consider security in product development. The amount of
potential attack vectors for hackers and other malicious actors who want to access sensitive
information increases as more network-connected products become available.
In implementing the CIA triad, an organization should follow a general set of best practices. These
can be divided into the three subjects and include the following:
1. Confidentiality
2. Integrity
o Ensure employees are knowledgeable about compliance and regulatory requirements to
minimize human error.
o Use version control, access control, security control, data logs and checksums.
3. Availability
o Have a data recovery and business continuity plan in place in case of data loss.
Computer crimes
types of targets:
Hardware hacking
Software hacking
Information and website hacking
Bandwidth theft
Service theft
HARDWARE HACKING
Hardware hacking refers to attacks aimed at specific pieces of hardware. The goal of these attacks is
to unlock the hardware in order to give the owner access to features that are normally locked.
SOFTWARE HACKING
Software hacking Is achieved by finding software exploits and breaking software protection
When finding software exploits, hackers look for weaknesses in an application’s security. These
exploits are used to gain unauthorised access to the software itself, or gain remote access to the
computer.
When breaking software protection, the goal of hackers is to remove the protection which ensures
that the software was purchased and is used legally. This allows people to play pirated games or use
pirated software.
BANDWIDTH THEFT
Bandwidth theft, occurs when someone links to a file on your website or server from their website.
This video will use your bandwidth for all users viewing the video.
SERVICE THEFT
Service theft occurs on the Internet whenever someone illegally uses a username and password to
access an online service.
PHISHING
Phishing is an attempt by cybercriminals to obtain sensitive information (usernames, passwords
and credit card details) by posing as legitimate institutions, usually via an electronic communication.
Online services require users to provide personal information in order to use their service. Personal
information may include your full name, address, phone numbers, date of birth, email address,
username and password and banking details. Although personal information is used responsibly
online by many businesses for legitimate communication, it is not always the case and some personal
information can be misused by criminals (used to commit fraud and identity theft)
For example: An employee’s desktop computer, laptop or company phone would be considered
an asset, as would applications on those devices. Likewise, critical infrastructure, such as
servers and support systems, are assets. An organization’s most common assets are information
assets. These are things such as databases and physical files – i.e. the sensitive data that you
store
What is a threat: A threat is any incident that could negatively affect an asset – for example,
if it’s lost, knocked offline or accessed by an unauthorized party.
Intentional threats include things such as criminal hacking or a malicious insider stealing
information, whereas accidental threats generally involve employee error, a technical
malfunction or an event that causes physical damage, such as a fire or natural disaster.
Cybersecurity threats are acts performed by individuals with harmful intent, whose goal is to steal
data, cause damage to or disrupt computing systems. Common categories of cyber threats include
malware, social engineering, man in the middle (MitM) attacks, denial of service (DoS), and injection
attacks—we describe each of these categories in more detail below.
Cyber threats can originate from a variety of sources, from hostile nation states and terrorist groups, to
individual hackers, to trusted individuals like employees or contractors, who abuse their privileges to
perform malicious acts.
Malware Attacks
Malware is an abbreviation of “malicious software”, which includes viruses, worms, trojans, spyware,
and ransomware, and is the most common type of cyberattack. Malware infiltrates a system, usually
via a link on an untrusted website or email or an unwanted software download. It deploys on the target
system, collects sensitive data, manipulates and blocks access to network components, and may
destroy data or shut down the system altogether.
Viruses—a piece of code injects itself into an application. When the application runs, the malicious
code executes.
Worms—malware that exploits software vulnerabilities and backdoors to gain access to an operating
system. Once installed in the network, the worm can carry out attacks such as distributed denial of
service (DDoS).
Trojans—malicious code or software that poses as an innocent program, hiding in apps, games or
email attachments. An unsuspecting user downloads the trojan, allowing it to gain control of their
device.
Ransomware—a user or organization is denied access to their own systems or data via encryption.
The attacker typically demands a ransom be paid in exchange for a decryption key to restore access,
but there is no guarantee that paying the ransom will actually restore full access or functionality.
Cryptojacking—attackers deploy software on a victim’s device, and begin using their computing
resources to generate cryptocurrency, without their knowledge. Affected systems can become slow
and cryptojacking kits can affect system stability.
Spyware—a malicious actor gains access to an unsuspecting user’s data, including sensitive
information such as passwords and payment details. Spyware can affect desktop browsers, mobile
phones and desktop applications.
Adware—a user’s browsing activity is tracked to determine behavior patterns and interests, allowing
advertisers to send the user targeted advertising. Adware is related to spyware but does not involve
installing software on the user’s device and is not necessarily used for malicious purposes, but it can
be used without the user’s consent and compromise their privacy.
Fileless malware—no software is installed on the operating system. Native files like WMI and
PowerShell are edited to enable malicious functions. This stealthy form of attack is difficult to detect
(antivirus can’t identify it), because the compromised files are recognized as legitimate.
Rootkits—software is injected into applications, firmware, operating system kernels or hypervisors,
providing remote administrative access to a computer. The attacker can start the operating system
within a compromised environment, gain complete control of the computer and deliver additional
malware.
Social engineering involves tricking users into providing an entry point for malware. The victim
provides sensitive information or unwittingly installs malware on their device, because the attacker
poses as a legitimate actor.
Baiting—the attacker lures a user into a social engineering trap, usually with a promise of something
attractive like a free gift card. The victim provides sensitive information such as credentials to the
attacker.
Pretexting—similar to baiting, the attacker pressures the target into giving up information under false
pretenses. This typically involves impersonating someone with authority, for example an IRS or
police officer, whose position will compel the victim to comply.
Phishing—the attacker sends emails pretending to come from a trusted source. Phishing often
involves sending fraudulent emails to as many users as possible, but can also be more targeted. For
example, “spear phishing” personalizes the email to target a specific user, while “whaling” takes this a
step further by targeting high-value individuals such as CEOs.
Vishing (voice phishing)—the imposter uses the phone to trick the target into disclosing sensitive data
or grant access to the target system. Vishing typically targets older individuals but can be employed
against anyone.
Smishing (SMS phishing)—the attacker uses text messages as the means of deceiving the victim.
Piggybacking—an authorized user provides physical access to another individual who “piggybacks”
off the user’s credentials. For example, an employee may grant access to someone posing as a new
employee who misplaced their credential card.
Tailgating—an unauthorized individual follows an authorized user into a location, for example by
quickly slipping in through a protected door after the authorized user has opened it. This technique is
similar to piggybacking except that the person being tailgated is unaware that they are being used by
another individual.
Supply chain attacks are a new type of threat to software developers and vendors. Its purpose is to
infect legitimate applications and distribute malware via source code, build processes or software
update mechanisms.
Attackers are looking for non-secure network protocols, server infrastructure, and coding techniques,
and use them to compromise build and update process, modify source code and hide malicious
content.
Supply chain attacks are especially severe because the applications being compromised
by attackers are signed and certified by trusted vendors. In a software supply chain attack, the
software vendor is not aware that its applications or updates are infected with malware. Malicious
code runs with the same trust and privileges as the compromised application.
Man-in-the-Middle Attack
A Man-in-the-Middle (MitM) attack involves intercepting the communication between two endpoints,
such as a user and an application. The attacker can eavesdrop on the communication, steal sensitive
data, and impersonate each party participating in the communication.
Wi-Fi eavesdropping—an attacker sets up a Wi-Fi connection, posing as a legitimate actor, such as a
business, that users may connect to. The fraudulent Wi-Fi allows the attacker to monitor the activity
of connected users and intercept data such as payment card details and login credentials.
Email hijacking—an attacker spoofs the email address of a legitimate organization, such as a bank,
and uses it to trick users into giving up sensitive information or transferring money to the attacker.
The user follows instructions they think come from the bank but are actually from the attacker.
DNS spoofing—a Domain Name Server (DNS) is spoofed, directing a user to a malicious website
posing as a legitimate site. The attacker may divert traffic from the legitimate site or steal the user’s
credentials.
IP spoofing—an internet protocol (IP) address connects users to a specific website. An attacker can
spoof an IP address to pose as a website and deceive users into thinking they are interacting with that
website.
HTTPS spoofing—HTTPS is generally considered the more secure version of HTTP, but can also be
used to trick the browser into thinking that a malicious website is safe. The attacker uses “HTTPS” in
the URL to conceal the malicious nature of the website.
Denial-of-Service Attack
A Denial-of-Service (DoS) attack overloads the target system with a large volume of traffic, hindering
the ability of the system to function normally. An attack involving multiple devices is known as a
distributed denial-of-service (DDoS) attack.
HTTP flood DDoS—the attacker uses HTTP requests that appear legitimate to overwhelm an
application or web server. This technique does not require high bandwidth or malformed packets, and
typically tries to force a target system to allocate as many resources as possible for each request.
SYN flood DDoS—initiating a Transmission Control Protocol (TCP) connection sequence involves
sending a SYN request that the host must respond to with a SYN-ACK that acknowledges the request,
and then the requester must respond with an ACK. Attackers can exploit this sequence, tying up
server resources, by sending SYN requests but not responding to the SYN-ACKs from the host.
UDP flood DDoS—a remote host is flooded with User Datagram Protocol (UDP) packets sent to
random ports. This technique forces the host to search for applications on the affected ports and
respond with “Destination Unreachable” packets, which uses up the host resources.
ICMP flood—a barrage of ICMP Echo Request packets overwhelms the target, consuming both
inbound and outgoing bandwidth. The servers may try to respond to each request with an ICMP Echo
Reply packet, but cannot keep up with the rate of requests, so the system slows down.
NTP amplification—Network Time Protocol (NTP) servers are accessible to the public and can be
exploited by an attacker to send large volumes of UDP traffic to a targeted server. This is considered
an amplification attack due to the query-to-response ratio of 1:20 to 1:200, which allows an attacker to
exploit open NTP servers to execute high-volume, high-bandwidth DDoS attacks.
Injection Attacks
Injection attacks exploit a variety of vulnerabilities to directly insert malicious input into the code of a
web application. Successful attacks may expose sensitive information, execute a DoS attack or
compromise the entire system.
SQL injection—an attacker enters an SQL query into an end user input channel, such as a web form
or comment field. A vulnerable application will send the attacker’s data to the database, and will
execute any SQL commands that have been injected into the query. Most web applications use
databases based on Structured Query Language (SQL), making them vulnerable to SQL injection. A
new variant on this attack is NoSQL attacks, targeted against databases that do not use a relational
data structure.
Code injection—an attacker can inject code into an application if it is vulnerable. The web server
executes the malicious code as if it were part of the application.
OS command injection—an attacker can exploit a command injection vulnerability to input
commands for the operating system to execute. This allows the attack to exfiltrate OS data or take
over the system.
LDAP injection—an attacker inputs characters to alter Lightweight Directory Access Protocol
(LDAP) queries. A system is vulnerable if it uses unsanitized LDAP queries. These attacks are very
severe because LDAP servers may store user accounts and credentials for an entire organization.
XML eXternal Entities (XXE) Injection—an attack is carried out using specially-constructed XML
documents. This differs from other attack vectors because it exploits inherent vulnerabilities in legacy
XML parsers rather than unvalidated user inputs. XML documents can be used to traverse paths,
execute code remotely and execute server-side request forgery (SSRF).
Cross-Site Scripting (XSS)—an attacker inputs a string of text containing malicious JavaScript. The
target’s browser executes the code, enabling the attacker to redirect users to a malicious website or
steal session cookies to hijack a user’s session. An application is vulnerable to XSS if it doesn’t
sanitize user inputs to remove JavaScript code
Motive of Attackers
The categories of cyber-attackers enable us to better understand the attackers' motivations and
the actions they take. As shown in Figure, operational cyber security risks arise from three
types of actions: i) inadvertent actions (generally by insiders) that are taken without malicious
or harmful intent; ii) deliberate actions (by insiders or outsiders) that are taken intentionally
and are meant to do harm; and iii) inaction (generally by insiders), such as a failure to act in a
given situation, either because of a lack of appropriate skills, knowledge, guidance, or
availability of the correct person to take action Of primary concern here are deliberate actions,
of which there are three categories of motivation.
The ‘Opportunistic attacker’ is the most common type in terms of victim volume. As can be
inferred by their name, many of these attackers rely on probability, meaning their malware
spreads as much as possible in order to increase their chance of success without a specific target
in mind. Therefore, the industrial sector is not the target of this threat specifically, rather it suffers
the infection as a side effect, simply on account of having its computers connected to the internet.
The main attacker's motivation is money. When the infection takes place, the attacker usually
tries to use the infected computer for monetization using different techniques, such as:
Ransomware - Blocking access to files on the machines by encrypting them until payment is
made by the user.
Botnets - Harness the processing power of the computer in order to mine cryptocurrencies for
example.
Other motivations may include data gathering or using the infected computer as a bot for future
attacks. In some cases, attacks will not have a specific motivation in mind. Sometimes people
develop malware just for fun, with no real intention behind their work. Many cases of targetless
attacks are accidental - downloading the wrong file or visiting the wrong website
The potential severity of this kind of attack varies greatly depending on the company that was
infected, as well as the complexity and nature of the malware. Most companies have adequate
segmentation and communication policies thereby avoiding excessive propagation of the
malware. However, companies that lack these measures could have their operations considerably
interrupted. Recent ransomware attacks cost manufacturing companies $50M-$300M in
damages strictly by blocking access to IT servers that were in charge of production. In some
events, companies were forced to shut down entire plants until the risk was fully remediated.
For security teams, reducing the attack surface can help limit the impact of this type of attack.
This can include limiting the ability for threats to migrating between IT and OT while increasing
visibility and protection on the points of connection. Educating employees on cyber risk can help
bring greater awareness and involvement in safe and secure operations.
This is the second-largest group of attackers in terms of volume. These attackers use
opportunistic infection methods but they specifically target industrial companies and once again,
the main motivation is money. However, in this case, the attackers know that targeting an
industrial company can result in higher profits and they use this for their benefit. Ransomware is
extremely popular in ICS attacks, for example.
Manufacturers have a very low tolerance for downtime. Even a couple of days without
production can cause severe damage to income or reputation, and that is just the tip of the iceberg.
Downtime in the energy sector, for example, can cause large-scale power outages. Consequently,
industrial companies are more inclined to pay ransom demands, which is exactly what the
attackers behind this method are counting on - targeting a wide array of plants, some will get
infected, most will pay.
Other attackers may spread their malware, hoping to gain access to a company to later sell this
access to the highest bidder. Another motivation is attackers who are looking to gather data,
without a specific victim in mind, they only know that they wish to target the ICS sector. The
industrial opportunistic attacks have a wide range of potential severity which depends on the
company and malware. To cope, security teams should stay alert and aware of the perimeter
through personnel training and monitoring of the networks are the best actions that the team can
take.
3. Competitors
Intellectual Property (IP) is a key element in the growing industrial world. Innovative methods
of production, solutions, etc. are pieces of data that help companies excel in their field. Data theft
via cyber espionage can have a catastrophic impact on a given company. The rarity of this type
of attack is unknown.
Intellectual Property can be found everywhere and on all levels of the factory - from enterprise
IT and all the way down to the lowest OT levels. Therefore, other than the obvious solution of
network monitoring, communication policies, and so forth, the best matter security teams can
turn to is containment. Performing the following actions will help to minimize the locations of
IP on your network, and ensure that communication with these assets is minimized, encrypted,
and requires high privileges.
- Minimize the IT computers that have recipes, work methods, work statistics, etc. on them.
- Minimize the number of computers that directly communicate or gather data from the OT layer.
- Minimize the number of users who can access these computers.
- Implement DLP software, and encrypt the information you wish to keep safe.
4. Insider Threat
A disgruntled employee or ex-employee can seek revenge against their employer. Sabotage from
inside the company usually means catastrophic outcomes for that company. Since it is an “inside
job”, employees who have access to the company’s network can perform any action an external
hacker could if they had elevated privileges and full access. Revenging employee attacks are
impactful but rare. Their primary motivation is emotional - getting revenge, letting out
frustration, and so forth.
Since these attackers work from within the network, they are most likely to act with relatively
high privileges and authorization. Employees who use cyberattacks as their revenge are most
likely from departments that have a vast knowledge of communications and networking (IT
departments for example), meaning that they are familiar with the organization’s soft spots.
Adopting principles such as granting the least amount of privilege and the separation of duties
aid in limiting the impact of this attack vector.
For security teams, blocking ex-employees is much easier than blocking current employees.
When it comes to existing employees it is hard to differentiate between legitimate and malicious
activity. In some cases, the person whose employment was terminated was able to access the
network remotely with their old VPN credentials and perform destructive actions on the network.
A simple, yet effective action that security teams can implement is to promptly revoke the access
of dismissed employees, making sure that they can no longer access the systems.
Advanced Persistent Threats are seen in the industrial world when an organization or country
tries to stop or damage the production process as part of cyberwar. Other motivations can be
efforts to block the technical advancement of a specific country or to send a message to an
opponent. APTs are more dedicated and tailored than the attacks that were mentioned earlier in
the article. These attacks usually have a very clear target in advance, and they serve a specific
purpose. Fortunately, there have been very few known OT-oriented APT attacks in history.
The main goal of APTs is psychological warfare, e.g.sending a message to opponents. Therefore
the targets are typically high-profile companies and critical infrastructures. Thus ensuring power
grid, defense, and oil and gas cybersecurity is crucial. History has shown that APTs often do not
target small companies, or cause minor damages. Since many of these attacks are complex, state-
sponsored, and customized to their target, their severity tends to be very high.
Unfortunately for security teams, stopping APTs is virtually impossible. There is a long-standing
belief that “if an attacker has enough funds, manpower, and motivation, they will be successful
in their attack”. This belief is exemplified through APTs, where attacks often have sufficient
resources to carry out years of preparation and ongoing operations. Nevertheless, security teams
can better their odds by implementing all the lessons learned throughout this article.
Securing their perimeter, making sure their network communication is monitored, and that their
components are patched and up to date with the latest versions can help minimize the
attacks dramatically. An effective step security teams can take is to minimize the network
information available online.
Active attacks: An active attack is a network exploit in which a hacker attempts to make
changes to data on the target or data en route to the target.
Masquerade: in this attack, the intruder pretends to be a particular user of a system to gain
access or to gain greater privileges than they are authorized for. A masquerade may be
attempted through the use of stolen login IDs and passwords, through finding security gaps in
programs or through bypassing the authentication mechanism.
Session replay: In this type of attack, a hacker steals an authorized user’s log in information
by stealing the session ID. The intruder gains access and the ability to do anything the
authorized user can do on the website.
Message modification: In this attack, an intruder alters packet header addresses to direct a
message to a different destination or modify the data on a target machine.
In a denial of service (DoS) attack, users are deprived of access to a network or web resource.
This is generally accomplished by overwhelming the target with more traffic than it can handle.
Passive Attacks:Passive attacks are relatively scarce from a classification perspective, but can
be carried out with relative ease, particularly if the traffic is not encrypted.
Eavesdropping (tapping): the attacker simply listens to messages exchanged by two entities.
For the attack to be useful, the traffic must not be encrypted. Any unencrypted information,
such as a password sent in response to an HTTP request, may be retrieved by the attacker.
Traffic analysis: the attacker looks at the metadata transmitted in traffic in order to deduce
information relating to the exchange and the participating entities, e.g. the form of the
exchanged traffic (rate, duration, etc.). In the cases where encrypted data are used, traffic
analysis can also lead to attacks by cryptanalysis, whereby the attacker may obtain information
or succeed in unencrypting the traffic.
Logic A Logic Bomb is malware that lies dormant until triggered. A logic bomb is a
Bomb specific example of an asynchronous attack.
Free Wi-Fi
Since we are constantly trying to connect to public Wi-Fi networks, there is a constant threat of
these networks stealing your personal information. Kevin Du, a computer science professor at
Syracuse University, claims that “if you don’t have a VPN, you’re leaving a lot of doors on your
perimeter open.” A VPN or a Virtual Private Network “creates a secure connection between you
and the internet,”[6] which means your IP address (all your internet activity)[7] and your location
are encrypted, keeping hackers and cybercriminals away. For smartphones, it’s best to turn VPN
on only when on an insecure connection or app in order to preserve battery life
Ransomware
Bluejacking
Bluesnarfing
Bluesnarfing is the actual theft of data from Bluetooth enabled devices (especially phones). Like
bluejacking, it depends on a connection to a Bluetooth phone being available. A Bluetooth user
running the right software from a laptop can discover a nearby phone and steal the contact list,
phonebook and images etc. Furthermore, your phone’s serial number can be downloaded and
used to turn off the phone. Again, the only current defense is to turn your Bluetooth off by setting
it to “undiscoverable.”
Security Tips
In order to protect yourself from mobile viruses it is important to regularly update your operating
system, as these updates can contain fixes to security vulnerabilities. The security software for
your smartphone may even come with password managers to keep your login information safe.
To make sure you don’t fall victim to phishing scams, do not click on emails you do not
recognize and be certain the email is from the person you think it is by checking the sender’s
whole email address before you click on a link.
If you are no longer able to access your smartphone due to Ransomware, make sure you have
backed up your data either onto the cloud, your laptop or a remote device.
Don’t download unnecessary or unfamiliar apps, as some of these can come with spyware,
ransomware and data leakages. Do a bit of research on the app and its developer before you add it
to your device.
Turn off your features if you are not using them, such as Bluetooth and Wi-Fi. This is especially
important when you are in a public place with free Wi-Fi, as your phone might automatically
connect, making your data more vulnerable to hacking.
Don’t access public Wi-Fi unless you are sure the network is safe and reliable. If possible, check
with the provider (library, coffee shop, etc.) to find out which network is the real one. Never use
public Wi-Fi to send any important data like your bank account login or credit card information.
Install the HTTPS Everywhere extension to your browser to prevent man-in-the-middle attacks.
Understanding Malware
Email viruses (phishing) and SMS viruses (smishing)
Most email viruses (phishing scams) rely on the user double clicking on an attachment that most
often comes from a person you recognize on your emailing system. That person’s email could
have been hacked as well, or it could be an email that looks the same, but when expanded is from
a different source altogether. The attachment, when clicked, runs a malicious code that mails
itself to other users from that computer. Any attachment that you open on your computer could
contain a virus and infect your computer even if the extension appears to be safe (such as .txt,
.doc or .jpg). Some viruses can infect users as soon as they open the email. These viruses may
compromise your computer’s security or steal data, but more often they create excessive email
traffic and crash servers. Viruses can also be spread by clicking on links in emails that lead to
malware sites.
SMS viruses (smishing) depend on the user getting a text message or a phone call from an
unknown number. The hackers use social leveraging to obtain anything from an online password
to your social security number. The text messages can also appear be from companies you have
used recently, like Canada Post telling you that you have a customs fee to pay to receive your
package. Once you click on the link and enter your credit card information, the hacker has all
they need to steal your money and personal details.
Macro viruses
This type of virus, also known as a document virus, takes advantage of macros (commands
embedded in word processing and spreadsheet software that run automatically) to infect your
computer. A macro virus can copy itself and spread from one file to another. If you open a file
that contains a macro virus, it copies itself into the application’s start up files and infects the
computer. The next file you open using the same program, and every file thereafter, will become
infected; the infection can therefore spread rapidly across a network. When Microsoft first
introduced macros, the company was not aware of the many security risks that would be imposed
on them. With their latest updates, when you open a word document, the macros will not run
unless you approve it (know it is from a reputable source) stop a macro virus erupting in your
computer (PC or Mac).
Boot-sector viruses (the oldest type of viruses) are mostly spread through infected storage
devices such as USB drives. When your computer is turned on, the hardware seeks out the boot-
sector program, the program the computer runs when it starts up. This is generally located on
the hard drive but can also be on a storage device such as a USB drive. A boot-sector virus
replaces the original boot-sector with its own, modified version. Upon your next start up, the
infected boot sector is used and the virus becomes active. It can then read or modify any files or
programs on your computer.
Adware
This type of intrusive software displays advertisements on your computer and has become
increasingly more aggressive since 2019 on Windows, Mac and Android devices. These usually
come in the form of banners and pop-ups when an application is in use and try to “sell something
to users, inflate views of ads, or scam people out of their money.” Adware can become a serious
problem if it installs itself onto your machine: it can hijack your browser (Internet
Explorer, Firefox, Chrome or Safari, for example) to display more ads even on your social media
accounts (such as Instagram and Facebook), as well as gather data from your Web browsing
without your consent and prevent you from uninstalling it. The most common issues
with adware is that it can slow down your internet connection or render your computer unstable,
as well as distract you and waste your time and money.
Spyware
While technically a form of adware, spyware has as its primary function the collection of small
pieces of information without users’ knowledge. One form of spyware, called
a keylogger, actually monitors everything you input into your computer. In addition to
monitoring your input and internet surfing habits, spyware can interfere with your control over
your computer by installing additional software, redirecting your browser, changing computer
settings and slowing or cutting off your internet connection. Other types of spyware include:
tracking cookies, trojans and system monitors
Security tips
To avoid viruses you should run anti-virus software (Norton, MacAfee and Avira are examples of
reputable programs) and avoid clicking on unexpected attachments. Installing patches (a
software “fix” designed to address holes and vulnerabilities in software) issued by software
vendors can also protect you as they can close down vulnerabilities exploited by viruses. In
particular, it is important to keep your browser (the program you use for accessing the Web, such
as Internet Explorer, Firefox, Chrome or Safari) up-to-date, as browsers are one of the main
targets of viruses.
To avoid email viruses, be careful about downloading attachments. You should only download
an attachment from an email if you know the sender and are certain that their account has not
been compromised. Signs that an e-mail account has been compromised include a subject line
that makes no sense and mass-mailings to all of the account’s contacts.
To avoid SMS viruses on your smart phone, do not open a link from any number you do not
know. If a company has sent you a text message asking for information either in the form of your
credit card or personal details, contact that company separately first and do not click on any links.
Avoid opening any documents that are not from a sender you know and trust. If any of your
programs begin behaving oddly, run a scan using your anti-virus software immediately.
To avoid viruses and other malware carried on storage devices, use only storage devices that you
have bought new. Before using any storage device, run anti-virus software on it and do so again
every time you plug a storage device into a different computer.
If you do not want ads popping up on your social media timelines from items you have previously
searched online, try installing a browser plugin such as Privacy Badger or Disconnect
Most privacy software detects adware and labels it as “potentially unwanted applications.” You
can then authorize the adware or choose to remove it.
Similarly, most anti-spyware software will be included with a comprehensive anti-virus program
or you can opt for dedicated software.
General tips - Most computers come with embedded security features including a firewall. This
prevents unknown programs and processes from accessing the system, but is not a replacement
for anti-virus software. Your firewall can be located and activated from your computer’s control
panel. Some websites maintained by anti-virus vendors offer free online scanning of your entire
computer system, but verify the source to be sure. Some sites which claim to scan for viruses
actually plant malware on your computer.
Cookies
A cookie is a small text file saved on your computer by a website, mainly used as a means for
session management, personalization and tracking while surfing the Web. Some cookies can be
useful, making for a smoother browsing experience. For instance, they can save small pieces of
information into memory, such as your name, so that you don’t constantly have to re-enter it on
your most frequently visited websites. Cookies are essential to common features of websites such
as “shopping carts” (which store your purchasing decisions while you browse an online
commerce site such as Amazon). These cookies are usually deleted after you leave the website or
within a few days of not visiting it.
Other cookies, however, can be far more of a nuisance. These cookies will recreate themselves
after the user has deleted them. A script will then keep this information in some other location on
the computer, unbeknownst to the user. Other kinds are able to closely track your online habits
and can last up to a year on a given server.
Understanding cookies
There are several different types of cookies. Each has different properties:
Session cookies
This type of cookie only lasts for the duration of your stay on a particular website and is deleted
when you close your browser. These cookies pose less of a security risk.
Persistent cookies
This type of cookie is also known as a “tracking” or “in memory” cookie. These cookies can last
up to a year from each time a user revisits the server. They are stored by the browser even after it
is closed; when you click ‘remember me’ on a webpage where you hold an account, a persistent
cookie is used to store your information.
Secure cookies
These cookies are used when you are visiting a secure site (one where the Web address begins
with “https” rather than “http”). Secure cookies are encrypted when being sent to and from your
computer and the server, which means that they are more secure if someone intercepts or
copies them. Use the HTTPS Everywhere plugin to make sure you only connect to the secure
version of the site.
Security tips
Most browsers (Internet Explorer, Firefox, Chrome or Safari) are set to accept cookies by default.
If you do not wish to use cookies, all browsers allow you to disable them. Some browsers also
allow you to see which cookies you currently have on your computer and to delete those you no
longer want. There are also software tools, such as CCleaner and QuickWiper, that get rid of
standard cookies and files as well as unwanted persistent and self-replicating cookies that refuse
to go away.
Most browsers also have an option to browse without storing cookies (called inPrivate
Browsing in Internet Explorer, Incognito Mode in Chrome and Private
Browsing in Firefox and Safari). However, while this does prevent cookies from being saved to
your computer, it does not mean that there will be no records of your browsing saved on your
computer or on the servers of the websites you visit.
Browser plugins like Privacy Badger and Disconnect block third-party cookies and supercookies.
Secure sites (where the Web address begins with “https” rather than “http”) encrypt any cookies
you send to them. This makes it more difficult for the information in the cookies to be intercepted
and misused. You should always use secure sites for anything that involves financial information
(bank or credit card data, etc.).
Because logins and passwords are often saved using cookies, you should periodically change
your passwords on any sites you visit. If you do not wish to use a persistent cookie to store your
password, do not click ‘remember me’ on any account pages.
Browser hijacking
Browser hijacking is a malicious online activity where hijackers change the default settings in
your internet browser. Links may appear that point to websites you would usually avoid, new
toolbars and favorites that you do not want may be added and your computer may slow down
overall. Users will also often find themselves unable to return to their original settings once this is
done. The purpose of this threat is to force you to visit a website. This increases the traffic and
number of “hits” a website receives, allowing it to boost its advertising revenue. These websites
may also contain malicious scripts or viruses. Browser hijackers can be extremely persistent. If
they can’t be removed, you may find yourself having to reinstall your browser or restore your
entire system to its original settings.
Security tips
As is the case with most other software threats, keeping your browser updated and using reliable,
updated security software is your first defense. If you do become a victim of hijacking, you can
reset your browser settings. How this is done depends on your browser:
In Chrome, click the Customize and control Google Chrome menu (three dots) in the upper-
right corner of the browser. Click Settings, scroll down to click Advanced, then scroll down and
click Restore settings to their original defaults. Click Reset settings in the pop-up window.
In Internet Explorer, close your browser and then go to Control Panel. Select Network and
internet and then Internet Options. Click on the Advanced tab and then click on
the Reset button under Reset Internet Explorer Settings.
In Edge, right-click on Start and select Apps and Features. Scroll down and select Microsoft
Edge. Click Advanced Options, scroll down and click the Reset button.
In Firefox, open the Start menu and select Run. Enter “firefox-safe-mode” (without quotation
marks) then select “Reset all user preferences to Firefox defaults.”
In Safari, begin by opening your browser and clicking on “Safari” in your Safari menu.
Select Reset Safari and click the Reset dialogue button that appears.
In Firefox, click the Open menu (three horizontal lines). Click Help, then Troubleshooting
Information. Find Give Firefox a Tune-Up and then Refresh Firefox.
You can also disable your add-ons (a piece of software that enhances another software program,
such as plug-ins for Internet Explorer) as a secondary line of defense. If all else fails, you may
have to restore your computer’s state to an earlier point in time using a backup hard drive or
the recovery discs that came with it.
Scripts
A script is a piece of code that is loaded and run by your browser. The most common type
is JavaScript, but HTML, Java or Flash based plug-ins have similar effects. While scripts may
enhance and enrich online experiences (and are often necessary to use the full functionality of a
website) they can also be malicious. A malicious script can compromise your computer’s
performance and overall functionality by redirecting you to another site or loading malware onto
your computer.
Security tips
While you are generally safe from malicious scripts if you stick to trusted sites, there have been
cases in which hackers installed malicious scripts onto legitimate sites. The only sure way of
preventing script attacks is to control which scripts run when you visit a site.
Internet-connected devices
An increasing number of electronic devices, from fitness trackers to cars to children’s toys, are
now connected via Wi-Fi in what’s often called the “Internet of Things.” A report by Fortune
Business Insights indicates that “the global Internet of Things market size stood at USD 250.72
billion in 2019 and is projected to reach USD 1,463.19 billion by 2027.” Unfortunately, many of
these devices are vulnerable in several ways:
Many of them have poor security, which can allow hackers to infect them with malware, spy on
them or take control of them entirely.
They typically connect through your internet router, which makes it easy for malware from an
infected device to easily spread to other devices that use the same network.
They are often designed to work with your online accounts, so an infected device may also give
hackers access to those (such as your email or social network accounts).
Even if the devices aren’t compromised, many collect kinds of data that you may not be
comfortable with – fitness trackers, for example, collect health information.
Security tips
Be cautious before buying an internet-connected device: Security experts say that a majority of
“smart” devices on the market today are not highly resilient to cyberattacks Be particularly wary
of “cloud-based” tools that can only work when connected to the internet. Do some research on
the product you’re considering buying to see if there have been any reports of security problems.
Check the privacy policy: Make sure you have a clear idea of what happens to the data that the
device collects and what other data it can access by connecting to your online accounts or to
other devices.
Set a password: Make sure that every connected device in your home is protected by a unique
password. Most connected devices allow you to set a PIN or password, but many don’t prompt
you to change it from the factory default.
Use a guest network: Create a “guest” network on your Wi-Fi router and connect the devices to
that one, rather than your regular network. That way, if your connected devices get compromised,
the cyber threat won’t be able to access the devices on your main network, like your computer.
Check for firmware updates: Like browsers and computer operating systems, makers of
connected devices frequently release “patches” and updates to address new security issues
they’ve discovered. Security experts suggest treating connected devices like smoke alarms,
setting a date twice a year to make sure that everything is up-to-date
Hardware Attacks:
Common hardware attacks include:
Manufacturing backdoors, for malware or other penetrative purposes; backdoors
aren’t limited to software and hardware, but they also affect embedded radio-
frequency identification (RFID) chips and memory
Backdoor creation; the presence of hidden methods for bypassing normal computer
authentication systems
Counterfeiting product assets that can produce extraordinary operations and those
made to gain malicious access to systems.
4.
5.
Major Types of Harware Attacks:
1.VMX - Virtual machine Extensions(Instructions on processors with x86 virtualization)
Virtualizations offer 2 levels-
Most of us will use 'a.' vs 'b.' not knowing the underlying threats for the reduced isolation.
2.Bluepill -
A rootkit designed for x86 virtualization. It creates a thin hypervisor/VMM and running the
remaining machine virtually. It's almost undetectable, however there was a controversy on this.
Hardware assisted virtualization can help malicious software, thus hardware architecture is prime
here.
4.Stepping p3wns
This attack used resource(printer here) firmware update, that by passes the anti virus at the computer
as it's not windows malicious. However when the task is received at printer side, the firmware gets
updated to the malicious one. This exploitation enables infecting IP phones etc. which can be a huge
concern in 'BYOD' times.
6.
Cyber Threats-Cyber Warfare:Cyber warfare refers to the use of digital attacks -- like
computer viruses and hacking -- by one country to disrupt the vital computer systems of
another, with the aim of creating damage, death and destruction. Future wars will see
hackers using computer code to attack an enemy's infrastructure, fighting alongside troops
using conventional weapons like guns and missiles.
Cyber warfare involves the actions by a nation-state or international organization to attack
and attempt to damage another nation's computers or information networks through, for
example, computer viruses or denial-of-service attacks.
Phishing
Phishing is the practice of sending fraudulent communications that appear to come from a
reputable source, usually through email. The goal is to steal sensitive data like credit card
and login information or to install malware on the victim’s machine. Phishing is an
increasingly common cyberthreat.
What Is Phishing?
Man-in-the-middle attack
Man-in-the-middle (MitM) attacks, also known as eavesdropping attacks, occur when
attackers insert themselves into a two-party transaction. Once the attackers interrupt the
traffic, they can filter and steal data.
Two common points of entry for MitM attacks:
1. On unsecure public Wi-Fi, attackers can insert themselves between a visitor’s device and
the network. Without knowing, the visitor passes all information through the attacker.
2. Once malware has breached a device, an attacker can install software to process all of the
victim’s information.
Denial-of-service attack
A denial-of-service attack floods systems, servers, or networks with traffic to exhaust
resources and bandwidth. As a result, the system is unable to fulfill legitimate requests.
Attackers can also use multiple compromised devices to launch this attack. This is known
as a distributed-denial-of-service (DDoS) attack.
SQL injection
A Structured Query Language (SQL) injection occurs when an attacker inserts malicious
code into a server that uses SQL and forces the server to reveal information it normally
would not. An attacker could carry out a SQL injection simply by submitting malicious
code into a vulnerable website search box.
Learn how to defend against SQL injection attacks.
Zero-day exploit
A zero-day exploit hits after a network vulnerability is announced but before a patch or
solution is implemented. Attackers target the disclosed vulnerability during this window of
time. Zero-day vulnerability threat detection requires constant awareness.
DNS Tunneling
DNS tunneling utilizes the DNS protocol to communicate non-DNS traffic over port 53. It
sends HTTP and other protocol traffic over DNS. There are various, legitimate reasons to
utilize DNS tunneling. However, there are also malicious reasons to use DNS Tunneling
VPN services. They can be used to disguise outbound traffic as DNS, concealing data that
is typically shared through an internet connection. For malicious use, DNS requests are
manipulated to exfiltrate data from a compromised system to the attacker’s infrastructure. It
can also be used for command and control callbacks from the attacker’s infrastructure to a
compromised system
Cyber Crime:
Cybercrime is criminal activity that either targets or uses a computer, a computer network
or a networked device.Cybercrime is committed by cybercriminals or hackers who want to
make money. Cybercrime is carried out by individuals or organizations.
Some cybercriminals are organized, use advanced techniques and are highly technically
skilled. Others are novice hackers.
Cybercrime refers to illegal actions using computers or the internet. Some examples of
cybercrime include:
2. Cyber Extortion –
Cyber extortion occurs when a website, e-mail server or computer system is subjected
to or threatened with repeated denial of service or other attacks by malicious hackers.
These hackers demand huge money in return for assurance to stop the attacks and to
offer protection.
3. Cyber Warfare –
Cyber warfare is the use or targeting in a battle space or warfare context of computers,
online control systems and networks. It involves both offensive and defensive
operations concerning to the threat of cyber attacks, espionage and sabotage.
4. Internet Fraud –
Internet fraud is a type of fraud or deceit which makes use of the Internet and could
include hiding of information or providing incorrect information for the purpose of
deceiving victims for money or property. Internet fraud is not considered a single,
distinctive crime but covers a range of illegal and illicit actions that are committed in
cyberspace.
5. Cyber Stalking –
This is a kind of online harassment wherein the victim is subjected to a barrage of
online messages and emails. In this case, these stalkers know their victims and instead
of offline stalking, they use the Internet to stalk. However, if they notice that cyber
stalking is not having the desired effect, they begin offline stalking along with cyber
stalking to make the victims’ lives more miserable.
2. Anonymity-
Those who Commit cyber crime are anonymous for us so we cannot do anything to
that person.
5. No harsh punishment-
In Cyber crime there is no harsh punishment in every cases. But there is harsh
punishment in some cases like when somebody commits cyber terrorism in that case
there is harsh punishment for that individual. But in other cases there is no harsh
punishment so this factor also gives encouragement to that person who commits cyber
crime.
Prevention of Cyber Crime:
Below are some points by means of which we can prevent cyber crime:
1. Use strong password –
Maintain different password and username combinations for each account and resist
the temptation to write them down. Weak passwords can be easily cracked using
certain attacking methods like Brute force attack, Rainbow table attack etc, So make
them complex. That means combination of letters, numbers and special characters.
Cyber Terrorism:
Cyber terrorism is the convergence of cyberspace and terrorism. It refers to unlawful
attacks and threats of attacks against computers, networks and the information stored
therein when done to intimidate or coerce a government or its people in furtherance of
political or social objectives.
Examples are hacking into computer systems, introducing viruses to vulnerable networks,
web site defacing, Denial-of-service attacks, or terroristic threats made via electronic
communication.
What is cyber terrorism?
While we’ve become used to hearing about cyber attacks, cyber terrorism instils a
different type of worry. Computer hackers have long worked to gain access to classified
information for financial gain, meaning terrorists could do the same
The internet can be used by terrorists to finance their operations, train other terrorists, and
plan terror attacks. The more mainstream idea of cyber terrorism is the hacking of
government or private servers to access sensitive information or even siphon funds for
use in terror activities. However, there is currently no universally accepted definition of
cyber terrorism.
Examples of cyber terrorism
cyber terrorism
Cyber Espionage:
Cyber spying, or cyber espionage, is the act or practice of obtaining secrets and
information without the permission and knowledge of the holder of the information from
individuals, competitors, rivals, groups, governments and enemies for personal,
economic, political or military advantage using methods on the Internet.
Cyber espionage is the malicious theft of data, information, or intellectual property from
and/or through computer systems. Some methods include social
engineering, malware distribution, advanced persistent threat (APT), watering hole attacks,
and spear phishing, but this list is by no means all-inclusive.
Security Policies:
Security policies are a formal set of rules which is issued by an organization to ensure that the
user who are authorized to access company technology and information assets comply with
rules and guidelines related to the security of information.
A security policy also considered to be a "living document" which means that the document is
never finished, but it is continuously updated as requirements of the technology and employee
changes.
We use security policies to manage our network security. Most types of security policies are
automatically created during the installation. We can also customize policies to suit our specific
environment.
1) It increases efficiency.
There are some important cyber security policies recommendations describe below-
Firewall Policy:
It blocks the unauthorized users from accessing the systems and networks that connect
to the Internet.
It detects the attacks by cybercriminals and removes the unwanted sources of network
traffic.
This policy automatically detects and blocks the network attacks and browser attacks.
It also protects applications from vulnerabilities and checks the contents of one or
more data packages and detects malware which is coming through legal ways.
This policy protects a system's resources from applications and manages the
peripheral devices that can attach to a system.
The device control policy applies to both Windows and Mac computers whereas
application control policy can be applied only to Windows clients.
The Top Three Cybersecurity Trends
Ransomware
Cyber attack Surface (IoT supply chain and Remote work systems)
Threats to IT infrastructure
In the extensive growth of the IT sector in different countries, ambitious plans for rapid social
transformation and inclusive growth, and providing the right kind of focus for creating a secure
computing environment and adequate trust and confidence in electronic transactions, software,
services, devices, and networks, has become one of the compelling priorities for all
Cybersecurity Policies
The purpose of this policy is to stipulate the suitable use of computer devices at the
corporate/company. These rules protect the authorized user and therefore the compan y also.
Inappropriate use exposes the corporate to risks including virus attacks, compromise of
network systems and services, and legal issues.
The purpose of this policy is to determine a typical for the creation, administration, use, and
removal of accounts that facilitate access to information and technology resources at the
corporate.
3. Anti-Virus
This policy was established to assist prevent attacks on corporate computers, networks, and
technology systems from malware and other malicious code. This policy is meant to assist
prevent damage to user applications, data, files, and hardware. Antivirus software is a
computer program that detects, prevents, and takes action to disarm or remove malicious
software programs, such as viruses and worms. Most antivirus programs include an auto-
update feature that enables the program to download profiles of new viruses so that it can
check for new viruses as soon as they are discovered. Anti-virus software is a must and a basic
necessity for every system.
4. E-Commerce Policy
The frequency of cyber-attacks has been high in recent years. E-commerce security refers to
the measures taken to secure businesses and their customers against cyber threats. This e-
commerce policy is to be used as both a suggestion and a summary within the management of
the E-Commerce electronic services.
5. E-Mail Policy
Email security may be a term for describing different procedures and techniques for shielding
email accounts, content, and communication against unauthorized access, loss, or
compromise. Email is usually wont to spread malware, spam, and phishing attacks. Attackers
use deceptive messages to entice recipients to spare sensitive information, open attachments,
or click on hyperlinks that install malware on the victim’s device. Email is additionally a
standard entry point for attackers looking to realize an edge in an enterprise network and
acquire valuable company data. Email encryption involves encrypting, or disguising, the
content of email messages to guard potentially sensitive information against being read by
anyone aside from intended recipients. Email encryption often includes authentication. The
purpose of this policy is to determine rules for the utilization of corporate email for sending,
receiving, or storing electronic messages.
The company-owned surplus hardware, obsolete machines, and any equipment beyond
reasonable repair or reuse, including media, are covered by this policy. This policy will
establish and define standards, procedures, and restrictions for the disposition of non-leased
IT equipment and media in a legal, cost-effective manner.
This policy defines the need for reporting and responding to incidents associated with the
company’s information systems and operations. Incident response provides the corporate with
the potential to spot when a security incident occurs.
The reason for this strategy is to characterize norms, methods, and limitations for the
acquisition of all IT equipment, programming, PC-related parts, and specialized
administrations bought with organization reserves. Acquisition of innovation and specialized
administrations for the organization should be supported and facilitated through the IT
Department.
9. Web Policy
The reason for this policy is to set up guidelines for the utilization of the organization’s Internet
for access to the Internet or the Intranet.
Log management is often of great benefit during a sort of scenario, with proper management,
to reinforce security, system performance, resource management, and regulatory compliance.
The purpose of this policy is to define standards for connecting to the company’s network
from any host. These standards are designed to attenuate the potential exposure to the
corporate from damages, which can result from unauthorized use of the company’s resources.
Damages include the loss of sensitive or company confidential data, property, damage to
critical company internal systems, etc.
The concept of usernames and passwords has been a fundamental way of protecting our
information. This may be one of the first measures regarding cybersecurity. The purpose of
this policy is to determine a typical for the creation of strong passwords, the protection of these
passwords, and therefore the frequency of changing passwords must be followed.
Security vulnerabilities are inherent in computing systems and applications. These flaws allow
the event and propagation of malicious software, which may disrupt normal business
operations, additionally placing the corporate in danger. To effectively mitigate this risk,
software “patches” are made available to get rid of a given security vulnerability.
The purpose of this policy is to make sure that the corporate can potentially make appropriate
cloud adoption decisions and at an equivalent time doesn’t use, or allow the utilization of,
inappropriate cloud service practices. Acceptable and unacceptable cloud adoption examples
are listed during this policy.
The purpose of this policy is to define standards and restrictions for the bottom configuration
of internal server equipment owned and/or operated by or on the company’s internal
network(s) or related technology resources via any channel.
The use of external social media within organizations for business purposes is increasing. The
corporate faces exposure to a particular amount of data that will be visible to friends of friends
from social media. While this exposure may be a key mechanism driving value, it also can
create an inappropriate conduit for information to pass between personal and business
contacts. Tools to determine barriers between personal and personal networks and tools to
centrally manage accounts are only starting to emerge. Involvement by the IT Department in
security, privacy, and bandwidth concerns is of maximal importance.
System monitoring and auditing are employed to work out if inappropriate actions have
occurred within a data system. System monitoring is employed to seem for these actions in
real-time while system auditing looks for them after the very fact.
The purpose of this policy is to determine standards for periodic vulnerability assessments.
This policy reflects the company’s commitment to spot and implementing security controls,
which can keep risks to data system resources at reasonable and appropriate levels.
The purpose of this policy is to determine guidelines with reference to communication and
updates of the company’s public-facing website. Protecting the knowledge on and within the
corporate website, with equivalent safety and confidentiality standards utilized within the
transaction of all the corporate business, is significant to the company’s success.
The purpose of this policy is to reinforce security and quality operating status for workstations
utilized at the corporate. IT resources are to utilize these guidelines when deploying all new
workstation equipment. Workstation users are expected to take care of these guidelines and to
figure collaboratively with IT resources to take care of the rules that are deployed.
The purpose of this policy is to determine server virtualization requirements that outline the
acquisition, use, and management of server virtualization technologies. This policy provides
controls that make sure that Enterprise issues are considered, alongside business objectives,
when making server virtualization-related decisions. Platform Architecture policies,
standards, and guidelines are going to be wont to acquire, design, implement and manage all
server virtualization technologies.
The purpose of this policy is to secure and protect the knowledge assets owned by the corporate
and to determine awareness and safe practices for connecting to free and unsecured Wi-Fi,
which can be provided by the corporate. The corporate provides computer devices, networks,
and other electronic information systems for goals and initiatives. The corporate grants access
to those resources as a privilege and must manage them responsibly to take care of the
confidentiality, integrity, and availability of all information assets.
For the needs of this policy, a reference is formed to the defined telecommuting employee who
regularly performs their work from an office that’s not within a corporate building or suite.
Casual telework by employees or remote work by non-employees isn’t included herein. That
specializes in the IT equipment typically provided to a telecommuter, this policy addresses the
telecommuting work arrangement and therefore the responsibility for the equipment provided
by the corporate.
24. Firewall
A firewall is a software program or piece of hardware that helps screen out hackers, viruses,
and worms that try to reach your computer over the Internet. All messages entering or leaving
the Internet pass through the firewall present, which examines each message and blocks those
that do not meet the specified security criteria. Hence, firewalls play an important role in
detecting malware.
This is software that sometimes scans all the files and documents present within the system
for malicious code or harmful viruses. Viruses, worms, and Trojan horses are samples of
malicious software that are often grouped together and mentioned as malware
UNIT – II Cyber Frauds, DoS, Viruses
Cyber Stalking, Fraud, and Abuse: Introduction, How Internet Fraud Works,
Identity Theft, Cyber Stalking, Protecting Yourself Against Cyber Crime. Denial
of Service Attacks: Introduction, DoS, Illustrating an Attack, Malware:
Introduction, Viruses, Trojan Horses, The Buffer-Overflow Attack.
Cyber Stalking
Cyberstalking is when someone uses electronic communication, social media, and other
technology to commit crimes. It is defined as the use of email, direct messaging, or other
electronic means to harass, scare, or threaten someone with physical harm. And it can come in
various forms, such as bullying, sexual harassment, or other unwelcome attention around your
While each cyberstalking case is different, a look at recent cases reveals that cyberstalkers
commonly engage in identity theft and other criminal behaviors. That’s because many
cyberstalkers use a blend of online and physical harassment and intimidation, such as:
Some cyberstalkers use technology to get information such as a physical address and mail
India is at the top of the statistics when it comes to global sexual harassment. The online
harassment faced by women also reflects the harassment in the physical world. 50 percent
of women in the major cities of India have faced online abuse according to a survey by
Feminism. Cyberstalking against men is also becoming quite common nowadays, making
the ratio almost 50:50.
Send a clear indication in writing to the cyberstalker that you do not want to be
contacted by them and that if the message goes unheeded, you will go to the police.
Once a warning is issued, do not engage with the stalker at all.
Go to the police if the harassment does not stop.
If you think you are being tracked by someone through spyware, use a family
member’s or friend’s phone to get help.
Get your devices checked for spyware or signs of compromised accounts.
Change all passwords.
Use privacy settings to block the person off your social media, and report the abuse
to the network.
Filter abusive emails to a separate folder to avoid reading them.
If you know the stalker’s ISP, the part after the @ in their email address, contact
abuse@domainname or postmaster@domainname.
Google has a support system in place for such cases,
https://support.google.com/mail/contact/abuse
Tell your employer if you have cyberstalkers at your workplace.
Make sure to have copies of any communication involved, police reports, and
emails from the networks.
Back up the evidence on an external drive.
Make all posts viewable to friends only so that no strangers can see them.
Do not enable permissions for social networks to post your contact details publicly.
Try to have a separate email address for social media and other online activities.
Share private information with friends over a private message rather than a public
post.
Avoid using your real name and use a gender-neutral screen name or pseudonym
instead for your social media accounts.
Leave optional fields in social media profiles blank.
Only accept friend requests from those you know in person.
Set your social network settings to accept friend requests only from friends of
friends.
Disable geolocation settings and GPS on your device.
Computer abuse is the legal term for the use of a computer to carry out improper or illegal
activities, but which do not constitute financial crimes that would be classified as wire
fraud.
KEY TAKEAWAYS
While the law was intended for the prosecution of hackers committing computer abuse by
stealing valuable personal or corporate information, or causing damage when they break
into a computer system, Congress has expanded the scope of the CFAA five times so that
activities that were once considered misdemeanors are now federal felonies. As a result,
everyday users can be punished for seemingly minor infractions of an application’s terms
of service.
The CFAA, for instance, makes white lies such as understating your age or weight on a
dating site a crime (even though this is rarely if ever prosecuted). It also makes violating a
company’s policy on using a work computer for personal use a felony. If the law were
widely enforced, almost every white collar worker in America would be in prison for
computer abuse. Because it is arbitrarily and sometimes overly enforced, federal judges
and scholars have advocated for changing the law to decriminalize terms of service
violations. One impediment to loosening the law has been resistance by corporations who
benefit from it. One of the changes to the CFAA in 1994, for example, amended the law to
allow for civil actions, giving corporations a way to sue employees who steal company
secrets.
An incident that many people might not think of as computer abuse is creating a
fake social media account. If the social media service’s terms and conditions require users
to provide accurate information about their identities when creating an account, they could
be prosecuted under the CFAA. This outcome is unlikely unless an individual uses a fake
account for malicious purposes, such as cyberbullying, but it is a possibility—and that
possibility of being prosecuted for something as minor as the mere creation of a fake
account is a major problem with the CFAA. Attorneys have been able to exploit the law’s
weaknesses to defend clients who should perhaps have been punished, and prosecutors
have been able to exploit the law to obtain convictions for minor incidents.
Aaron’s Law was a bill introduced in the United States Congress in 2013 in honor of
Swartz to loosen the CFAA. Though the bill did not pass Congress, it remains an
influential bill.
Email spoofing is a form of cyberattack in which a hacker sends an email that has
been manipulated to seem as if it originated from a trusted source. For example- a
spoofed email may pretend to be a well-known shopping website, asking the
recipient to provide sensitive data, such as a password or credit card number.
Spamming is the use of electronic messaging systems like emails and other digital
delivery systems and broadcast media to send unwanted bulk messages
indiscriminately.
Some online crimes occur against property such as the internet or server.
Cyber Abuse:
The term "cyberbullying" refers to a wide spectrum of online abuse, including harassment,
reputation attacks, and revenge pornography. Cyberbullying or harassment is a type of
bullying or harassment that takes place through the internet. As the digital environment has
expanded and technology has evolved, it has grown more widespread, particularly among
teenagers.
Face-to-face bullying and cyberbullying can often happen alongside each other. But
cyberbullying leaves a digital footprint. The informational technology amendment Act also
provides remedies for cyberbullying. Section 66 A of the IT Act defines punishment to a
person who sends offensive things by using internet tools for communication.
Present Scenario:
66E defines punishment for invading privacy. Section 67 defines punishment for
publishing any obscene picture.
Presently, there is a huge increase in cyber abuse and cyberbullying cases. But no. Of cases
are reported less because many of the people didn't tell anyone about getting bullied.
According to child rights and You 1 in 3 adults get bullied every day and most of their age
is between 13-18 years.
1. Resist the urge to respond as people who say hurtful things often do so just to get a
reaction.
2. Save evidence as our immediate reaction might be to make the abusive content
disappear but it is important to keep evidence of that.
3. Report and block options should be used.
4. Check out tailored advice
5. Seek help for legal advice or we have to go for legal help.
6. Save your data
7. Protect your e-identity
It protects them from trespassing, threats, property destruction, and corruption because
cyber-crimes frequently target issues that are specified and discussed by the Information
Technology Act, the act makes these crimes even more punishable. The Indian Penal Code
is the country's primary legal framework for dealing with traditional offences. Because the
scope of these crimes has broadened in recent years as a result of the technological
revolution, a subset of them can readily be categorised as cyber-crimes.
As a result, cybercrime in India is largely dealt with under the following two
legislation:
Charging Policy
Access “without authorization.”
Access “exceeding authorized access.”
Whether prosecution would serve the Department’s goals for CFAA enforcement.
The Computer Fraud and Abuse Act (CFAA) was enacted in 1986, as an amendment to the
first federal computer fraud law, to address hacking. Over the years, it has been amended
several times, most recently in 2008, to cover a broad range of conduct far beyond its
original intent. The CFAA prohibits intentionally accessing a computer without
authorization or in excess of authorization, but fails to define what “without authorization”
means. With harsh penalty schemes and malleable provisions, it has become a tool ripe for
abuse and use against nearly every aspect of computer activity.
Internet scams that target victims through online services account for millions of dollars
worth of fraudulent activity every year. And the figures continue to increase as internet
usage expands and cyber-criminal techniques become more sophisticated.
Internet fraud offenses are prosecuted under state and federal law. For example, federal law
has the controlling statute 18 U.S.C. § 1343 that covers general cyber fraud and can carry a
punishment of up to 30 years in prison and fines of up to $1 million depending on the
severity of the crime.
States like California also have anti-phishing, credit card fraud, unauthorized computer
access, and identity theft laws. These laws also prohibit eliciting personally identifiable
information (PII) via the internet by pretending to be a company under the Anti-Phishing
Act of 2005.
Types of Internet Fraud
Cyber criminals use a variety of attack vectors and strategies to commit internet fraud. This
includes malicious software, email and instant messaging services to spread malware,
spoofed websites that steal user data, and elaborate, wide-reaching phishing scams.
Internet fraud can be broken down into several key types of attacks, including:
1. Phishing and spoofing: The use of email and online messaging services to dupe victims
into sharing personal data, login credentials, and financial details.
2. Data breach: Stealing confidential, protected, or sensitive data from a secure location and
moving it into an untrusted environment. This includes data being stolen from users and
organizations.
3. Denial of service (DoS): Interrupting access of traffic to an online service, system, or
network to cause malicious intent.
4. Malware: The use of malicious software to damage or disable users’ devices or steal
personal and sensitive data.
5. Ransomware: A type of malware that prevents users from accessing critical data then
demanding payment in the promise of restoring access. Ransomware is typically delivered
via phishing attacks.
6. Business email compromise (BEC): A sophisticated form of attack targeting businesses
that frequently make wire payments. It compromises legitimate email accounts
through social engineering techniques to submit unauthorized payments.
To avoid hackers’ internet fraud attempts, users need to understand common examples of
internet fraud and tactics.
Email-based phishing scams are among the most prevalent types of internet fraud, which
continues to pose a serious threat to internet users and businesses.
Statistics from Security Boulevard show that in 2020, 22% of all data breaches involved a
phishing attack, and 95% of all attacks that targeted business networks were caused
by spear phishing. Furthermore, 97% of users could not spot a sophisticated phishing
email, 1.5 million new phishing sites were created every month, and 78% of users
understand the risk of hyperlinks in emails but click them anyway.
Email-based phishing scams are constantly evolving and range from simple attacks to more
sneaky and complex threats that target specific individuals.
Email phishing scams see cyber criminals masquerade as an individual that their victim
either knows or would consider reputable. The attack aims to encourage people to click on
a link that leads to a malicious or spoofed website designed to look like a legitimate
website, or open an attachment that contains malicious content.
The hacker first compromises a legitimate website or creates a fake website. They then
acquire a list of email addresses to target and distribute an email message that aims to dupe
people into clicking on a link to that website. When a victim clicks the link, they are taken
to the spoofed website, which will either request a username and password or automatically
download malware onto their device, which will steal data and login credential
information. The hacker can use this data to access the user’s online accounts, steal more
data like credit card details, access corporate networks attached to the device, or commit
wider identity fraud.
Email phishing scam attackers will often express the need for urgency from their victims.
This includes telling them that their online account or credit card is at risk, and they need to
log in immediately to rectify the issue.
Many internet fraud attacks focus on popular events to scam the people that celebrate them.
This includes birthdays, Christmas, and Easter, which are commonly marked by sharing
greeting cards with friends and family members via email. Hackers typically exploit this by
installing malicious software within an email greeting card, which downloads and installs
onto the recipient’s device when they open the greeting card.
The consequences can be devastating. The malware could result in annoying pop-up ads
that can affect application performance and slow down the device. A more worrying result
would be the victim’s personal and financial data being stolen and their computer being
used as a bot within a vast network of compromised computers, also known as a botnet.
Credit card fraud typically occurs when hackers fraudulently acquire people's credit or
debit card details in an attempt to steal money or make purchases.
To obtain these details, internet fraudsters often use too-good-to-be-true credit card or bank
loan deals to lure victims. For example, a victim might receive a message from their bank
telling them they are eligible for a special loan deal or a vast amount of money has been
made available to them as a loan. These scams continue to trick people despite widespread
awareness that such offers are too good to be true for a reason.
Another typical example of internet fraud targets the plethora of online dating applications
and websites. Hackers focus on these apps to lure victims into sending money and sharing
personal data with new love interests. Scammers typically create fake profiles to interact
with users, develop a relationship, slowly build their trust, create a phony story, and ask the
user for financial help.
Another common form of internet fraud is email scams that tell victims they have won the
lottery. These scams will inform recipients that they can only claim their prize after they
have paid a small fee.
Lottery fee fraudsters typically craft emails to look and sound believable, which still results
in many people falling for the scam. The scam targets people's dreams of winning massive
amounts of money, even though they may have never purchased a lottery ticket.
Furthermore, no legitimate lottery scheme will ask winners to pay to claim their prize.
A classic internet fraud tactic, the Nigerian Prince scam approach remains common and
thriving despite widespread awareness.
The scam uses the premise of a wealthy Nigerian family or individual who wants to share
their wealth in return for assistance in accessing their inheritance. It uses phishing tactics to
send emails that outline an emotional backstory, then lures victims into a promise of
significant financial reward. The scam typically begins by asking for a small fee to help
with legal processes and paperwork with the promise of a large sum of money further
down the line.
The scammer will inevitably ask for more extensive fees to cover further administration
tasks and transaction costs supported by legitimate-looking confirmation documents.
However, the promised return on investment never arrives.
How To Protect Yourself from Internet Scams
Internet users can protect themselves and avoid being caught in a phishing line by
remaining vigilant of the common types of internet fraud listed above. It is vital to never
send money to someone met over the internet, never share personal or financial details with
individuals who are not legitimate or trustworthy, and never click on hyperlinks or
attachments in emails or instant messages. Once targeted, internet users should report
online scammer activity and phishing emails to the authorities.
Credit card fraud can also be avoided by keeping a close eye on bank accounts, setting up
notifications on credit card activity, signing up for credit monitoring, and using consumer
protection services. If users suffer credit card fraud, they must report it to the relevant legal
authorities and credit bureaus
Identity Theft
Identity theft occurs when criminals steal a victim's personal information to commit
criminal acts. Using this stolen information, a criminal takes over the victim's identity and
conducts a range of fraudulent activities in their name.
Cyber criminals commit identity theft by using sophisticated cyber attack tactics, including
social engineering, phishing, and malware. Identity theft can also result from rudimentary
tactics with criminals stealing mail, digging through dumpsters, and listening in on phone
conversations in public places.
The ultimate goal of many cyber attacks is to steal enough information about a victim to
assume their identity to commit fraudulent activity. Unfortunately, most people only
discover they're victims of identity theft when they apply for a loan, attempt to open a bank
account, apply for a job, receive a call from a collection agency, or request a new credit
card
There are several ways identity thieves can use your personal information to their
advantage. Some involve using it to steal money from you, while others require multiple
steps before the thief realizes a profit.
A criminal can use your credit card number, address, and name to buy things with your
card. They can also file a tax return or even use your insurance and other information to get
medical treatment while pretending to be you. If you have airline miles or can get access to
government services like the Special Supplemental Nutrition Program for Women, Infants,
and Children (WIC) or Social Security checks, the thief could use your information to take
advantage of those provisions as well.
Once your data has been taken, particularly during a data breach where the thief can grab
many victims' information at once, it may be sold on the dark web. Even though each piece
of information may only yield a few dollars, if a thief has thousands of account numbers,
addresses, and names, their profits can add up quickly.
Impersonation
A thief may pretend to be you on social media or to get a job or apartment. This is
particularly true when there is an element of their own identity that gets in the way of what
they are trying to do, such as a criminal record.
Possible Signs of Identity Theft
Keep an eye out for the following signs that may indicate your identity has been stolen:
Identity Theft also called Identity Fraud is a crime that is being committed by a huge
number nowadays. Identity theft happens when someone steals your personal information
to commit fraud. This theft is committed in many ways by gathering personal information
such as transactional information of another person to make transactions. Types of
Identity Thefts:
There are various amount of threats but some common ones are :
Criminal Identity Theft – This is a type of theft in which the victim is charged
guilty and has to bear the loss when the criminal or the thief backs up his position
with the false documents of the victim such as ID or other verification documents and
his bluff is successful.
Senior Identity Theft – Seniors with age over 60 are often targets of identity thieves.
They are sent information that looks to be actual and then their personal information
is gathered for such use. Seniors must be aware of not being the victim.
Driver’s license ID Identity Theft – Driver’s license identity theft is the most
common form of ID theft. All the information on one’s driver’s license provides the
name, address, and date of birth, as well as a State driver’s identity number. The
thieves use this information to apply for loans or credit cards or try to open bank
accounts to obtain checking accounts or buy cars, houses, vehicles, electronic
equipment, jewelry, anything valuable and all are charged to the owner’s name.
Medical Identity Theft – In this theft, the victim’s health-related information is
gathered and then a fraud medical service need is created with fraud bills, which then
results in the victim’s account for such services.
Tax Identity Theft – In this type of attack attacker is interested in knowing your
Employer Identification Number to appeal to get a tax refund. This is noticeable
when you attempt to file your tax return or the Income Tax return department sends
you a notice for this.
Social Security Identity Theft – In this type of attack the thief intends to know your
Social Security Number (SSN). With this number, they are also aware of all your
personal information which is the biggest threat to an individual.
Synthetic Identity Theft – This theft is uncommon to the other thefts, thief combines
all the gathered information of people and they create a new identity. When this
identity is being used than all the victims are affected.
Financial Identity Theft – This type of attack is the most common type of attack. In
this, the stolen credentials are used to attain a financial benefit. The victim is
identified only when he checks his balances carefully as this is practiced in a very
slow manner.
Techniques of Identity Thefts : Identity thieves usually hack into corporate databases
for personal credentials which requires effort but with several social-engineering
techniques, it is considered easy. Some common identity theft techniques are:
Pretext Calling – Thieves pretending to be an employee of a company over phone
asking for financial information are an example of this theft. Pretending as legitimate
employees they ask for personal data with some buttery returns.
Mail Theft – This is a technique in which credit card information with transactional
data is extracted from the public mailbox.
Phishing – This is a technique in which emails pertaining to be from banks are sent
to a victim with malware in it. When the victim responds to mail their information is
mapped by the thieves.
Internet – Internet is widely used by the world as attackers are aware of many
techniques of making users get connected with public networks over Internet which is
controlled by them and they add spyware with downloads.
Dumpster Diving – This is a technique that has made much information out of the
known institutions. As garbage collectors are aware of this they search for account
related documents that contain social security numbers with all the personal
documents if not shredded before disposing of.
Card Verification Value (CVV) Code Requests – The Card Verification Value
number is located at the back of your debit cards. This number is used to enhance
transaction security but several attackers ask for this number while pretending as a
bank official.
Steps Of Prevention From Identity Theft:
Following are some methods by which you can enhance your security for identity thefts :
1. Use Strong Passwords and do not share your PIN with anyone on or off the phone.
2. Use two-factor notification for emails.
3. Secure all your devices with a password.
4. Don’t install random software from the internet.
5. Don’t post sensitive information over social media.
6. While entering passwords at payment gateway ensure its authenticity.
7. Limit the personal information to be carried with out.
8. Keep a practice of changing your PIN and password regularly.
9. Do not disclose your information over phone.
10. While traveling do not disclose personal information with strangers.
11. Never share your Aadhaar/PAN number (In India) with anyone whom you do not
know/trust.
12. Never share your SSN (In US) with anyone whom you do not know/trust.
13. Do not make all the personal information on your social media accounts public.
14. Please never share an Aadhaar OTP received on your phone with someone over a
call.
15. Make sure that you do not receive unnecessary OTP SMS about Aadhaar (if you do,
your Aadhaar number is already in the wrong hands).
16. Do not fill personal data on the website that claims to offer benefits in return.
17. Last, be a keeper of personal knowledge.
Cybercrime is any crime that takes place online or primarily online. Cybercriminals often
commit crimes by targeting computer networks or devices. Cybercrime can range from security
Terrorists collaborate on the internet, moving terrorist activities and crimes into cyberspace.
Anyone using the internet should exercise some basic precautions. Here are 11 tips you can use
It’s a good idea to consider trusted security software like Norton 360 with LifeLock Select,
which provides all-in-one protection for your devices, online privacy, and identity, and helps
Don’t repeat your passwords on different sites, and change your passwords regularly. Make
them complex. That means using a combination of at least 10 letters, numbers, and symbols.
A password management application can help you to keep your passwords locked down.
This is especially important with your operating systems and internet security software.
Cybercriminals frequently use known exploits, or flaws, in your software to gain access to your
system. Patching those exploits and flaws can make it less likely that you’ll become a
cybercrime target.
4. Manage your social media settings
Keep your personal and private information locked down. Social engineering cybercriminals
can often get your personal information with just a few data points, so the less you share
publicly, the better. For instance, if you post your pet’s name or reveal your mother’s maiden
name, you might expose the answers to two common security questions.
It’s a good idea to start with a strong encryption password as well as a virtual private network. A
VPN will encrypt all traffic leaving your devices until it arrives at its destination.
anything but encrypted data. It’s a good idea to use a VPN whenever you a public Wi-Fi
You can teach your kids about acceptable use of the internet without shutting down
communication channels. Make sure they know that they can come to you if they’re
If you do business with a merchant or have an account on a website that’s been impacted by a
security breach, find out what information the hackers accessed and change your password
immediately.
Identity theft occurs when someone wrongfully obtains your personal data in a way that
involves fraud or deception, typically for economic gain. How? You might be tricked into
giving personal information over the internet, for instance, or a thief might steal your mail to
access account information. That’s why it’s important to guard your personal data. A VPN —
short for virtual private network — can also help to protect the data you send and receive online,
It’s smart to know how to protect your identity even when traveling. There are a lot of things
you can do to help keep criminals from getting your private information on the road. These
include keeping your travel plans off social media and being using a VPN when accessing the
Just like you’ll want to talk to your kids about the internet, you’ll also want to help protect them
against identity theft. Identity thieves often target children because their Social Security number
and credit histories frequently represent a clean slate. You can help guard against identity theft
by being careful when sharing your child’s personal information. It’s also smart to know what to
look for that might suggest your child’s identity has been compromised.
If you believe that you’ve become a victim of a cybercrime, you need to alert the local police
and, in some cases, the FBI and the Federal Trade Commission. This is important even if the
crime seems minor. Your report may assist authorities in their investigations or may help to
thwart criminals from taking advantage of other people in the future. If you think cybercriminals
have stolen your identity. These are among the steps you should consider.
Contact the companies and banks where you know fraud occurred.
Place fraud alerts and get your credit reports.
Report identity theft to the FTC.
Denial of Service Attacks
A denial-of-service (DoS) attack is a type of cyber attack in which a malicious actor aims
to render a computer or other device unavailable to its intended users by interrupting the
device's normal functioning. DoS attacks typically function by overwhelming or flooding a
targeted machine with requests until normal traffic is unable to be processed, resulting in
denial-of-service to addition users. A DoS attack is characterized by using a single
computer to launch the attack.
A distributed denial-of-service (DDoS) attack is a type of DoS attack that comes from
many distributed sources, such as a botnet DDoS attack.
An attack type in which a memory buffer overflow can cause a machine to consume all
available hard disk space, memory, or CPU time. This form of exploit often results in
sluggish behavior, system crashes, or other deleterious server behaviors, resulting in
denial-of-service.
Flood attacks
Ping of Death - often conflated with a ping flood attack, a ping of death attack
involves sending a malformed packet to a targeted machine, resulting in
deleterious behavior such as system crashes.
While it can be difficult to separate an attack from other network connectivity errors or
heavy bandwidth consumption, some characteristics may indicate an attack is underway.
Atypically slow network performance such as long load times for files or
websites
The distinguishing difference between DDoS and DoS is the number of connections
utilized in the attack. Some DoS attacks, such as “low and slow” attacks like Slowloris,
derive their power in the simplicity and minimal requirements needed to them be effective
Popular flood attacks include:
Buffer overflow attacks – the most common DoS attack. The concept is to send more
traffic to a network address than the programmers have built the system to handle. It
includes the attacks listed below, in addition to others that are designed to exploit bugs
ICMP flood – leverages misconfigured network devices by sending spoofed packets that
ping every computer on the targeted network, instead of just one specific machine. The
network is then triggered to amplify the traffic. This attack is also known as the smurf
SYN flood – sends a request to connect to a server, but never completes the handshake.
Continues until all open ports are saturated with requests and none are available for
Other DoS attacks simply exploit vulnerabilities that cause the target system or service to
crash. In these attacks, input is sent that takes advantage of bugs in the target that
subsequently crash or severely destabilize the system, so that it can’t be accessed or used.
An additional type of DoS attack is the Distributed Denial of Service (DDoS) attack. A
DDoS attack occurs when multiple systems orchestrate a synchronized DoS attack to a
single target. The essential difference is that instead of being attacked from one location,
the target is attacked from many locations at once. The distribution of hosts that defines a
He can leverage the greater volume of machine to execute a seriously disruptive attack
The location of the attack is difficult to detect due to the random distribution of attacking
The true attacking party is very difficult to identify, as they are disguised behind many
Illustrating an Attack
The 17 Most Common Types of Cyber Attacks
1. Malware-based attacks
2. Phishing attacks
3. Man-in-the-middle attacks
4. Denial of Service attacks
5. SQL injection attacks
6. DNS tunneling
7. Zero-day exploits
8. Password attacks
9. Drive-by download attacks
10. Cross-site scripting (XSS) attacks
11. Rootkits
12. DNS spoofing
13. Internet of Things (IoT) attacks
14. Session hijacking
15. URL manipulation
16. Cryptojacking
17. Inside threats
The Different Types of DoS Attacks
Here are a few of the different types of DoS attacks:
Buffer Overflow
Buffer Overflow is a common type of DoS attack. It relies on sending an amount of traffic
to a network resource that exceeds the default processing capacity of the system. For
instance, back in the day, a 256-character file name as an attachment would surely crash
Microsoft Outlook.
Ping of Death
Attackers send spoofed packets that ping every computer on the targeted network. The
target responds and becomes flooded with responses from the malicious packet. It is also
known as Internet Control Message Protocol (ICMP) Flood and Smurf Attack.
SYN Flood
A SYN Flood attack exploits the Transmission Control Protocol (TCP) handshake – a
method used for the TCP network to create a connection with a local host/client/server.
Unfortunately, the handshake is left incomplete, leaving the connected host in an occupied
status and unavailable to take further requests. Attackers will double down on the requests,
saturating all open ports and preventing anyone from connecting to the network.
Teardrop
In a teardrop attack, IP data packet fragments are sent to the target network. The network
then reassembles the fragments into the original packet. The process of reassembling these
fragments exhausts the system and it ends up crashing. It crashes because the fragments are
designed to confuse the system so it can never be put back together
Malware:
Introduction
Malware, short for malicious software, refers to any intrusive software developed by
cybercriminals (often called hackers) to steal data and damage or destroy computers and
computer systems. Examples of common malware include viruses, worms, Trojan viruses,
spyware, adware, and ransomware.
Malware is developed as harmful software that invades or corrupts your computer network.
The goal of malware is to cause havoc and steal information or resources for monetary gain
or sheer sabotage intent.
Destruction or vandalism
Destroys computer systems to damage your network infrastructure.
Monetary gain
Sells your organization's intellectual property on the dark web.
7 types of malware
Virus
Viruses are a subgroup of malware. A virus is malicious software attached to a document
or file that supports macros to execute its code and spread from host to host. Once
downloaded, the virus will lie dormant until the file is opened and in use. Viruses are
designed to disrupt a system's ability to operate. As a result, viruses can cause significant
operational issues and data loss.
Worms
A worm is a type of malicious software that rapidly replicates and spreads to any device
within the network. Unlike viruses, worms do not need host programs to disseminate. A
worm infects a device through a downloaded file or a network connection before it
multiplies and disperses at an exponential rate. Like viruses, worms can severely disrupt
the operations of a device and cause data loss.
Trojan virus
Trojan viruses are disguised as helpful software programs. But once the user downloads it,
the Trojan virus can gain access to sensitive data and then modify, block, or delete the data.
This can be extremely harmful to the performance of the device. Unlike normal viruses and
worms, Trojan viruses are not designed to self-replicate.
Spyware
Spyware is malicious software that runs secretly on a computer and reports back to a
remote user. Rather than simply disrupting a device's operations, spyware targets sensitive
information and can grant remote access to predators. Spyware is often used to steal
financial or personal information. A specific type of spyware is a keylogger, which records
your keystrokes to reveal passwords and personal information.
Adware
Adware is malicious software used to collect data on your computer usage and provide
appropriate advertisements to you. While adware is not always dangerous, in some cases
adware can cause issues for your system. Adware can redirect your browser to unsafe sites,
and it can even contain Trojan horses and spyware. Additionally, significant levels of
adware can slow down your system noticeably. Because not all adware is malicious, it is
important to have protection that constantly and intelligently scans these programs.
Ransomware
Ransomware is malicious software that gains access to sensitive information within a
system, encrypts that information so that the user cannot access it, and then demands a
financial payout for the data to be released. Ransomware is commonly part of a phishing
scam. By clicking a disguised link, the user downloads the ransomware. The attacker
proceeds to encrypt specific information that can only be opened by a mathematical key
they know. When the attacker receives payment, the data is unlocked.
Fileless malware
Fileless malware is a type of memory-resident malware. As the term suggests, it is malware
that operates from a victim's computer's memory, not from files on the hard drive. Because
there are no files to scan, it is harder to detect than traditional malware. It also makes
forensics more difficult because the malware disappears when the victim computer is
rebooted. In late 2017, the Cisco Talos threat intelligence team posted an example of
fileless malware that they called DNSMessenger.
Unlike worms, viruses often require some sort of user action (e.g., opening an email
attachment or visiting a malicious web page) to spread.
What is a worm?
A worm is a type of virus that can spread without human interaction. Worms often spread
from computer to computer and take up valuable memory and network bandwidth, which
can cause a computer to stop responding. Worms can also allow attackers to gain access to
your computer remotely.
What is a Trojan horse?
A Trojan horse is a computer program that is hiding a virus or other potentially damaging
program. A Trojan horse can be a program that purports to do one action when, in fact, it is
performing a malicious action on your computer. Trojan horses can be included in software
that you download for free or as attachments in email messages.
What are some tips to avoid viruses and lessen their impact?
Install anti-virus software from a reputable vendor. Update it and use it regularly.
In addition to scanning for viruses on a regular basis, install an "on access" scanner
(included in most anti-virus software packages) and configure it to start each time
you start up your computer. This will protect your system by checking for viruses
each time you run an executable file.
Use a virus scan before you open any new programs or files that may contain
executable code. This includes packaged software that you buy from the store as
well as any program you might download from the Internet.
If you are a member of an online community or chat room, be very careful about
accepting files or clicking links that you find or that people send you within the
community.
Make sure you back up your data (documents, bookmark files, important email
messages, etc.) on disc so that in the event of a virus infection, you do not lose
valuable work.
Chances are you’ve heard how important it is to keep viruses out, but what is a computer
virus exactly? A computer virus will more than likely have an adverse effect on the device
it resides on and may be discoverable through common signs of performance loss,
including:
Speed of System
A computer system running slower than usual is one of the most common signs that the
device has a virus. This includes the system itself running slowly, as well as applications
and internet speed suffering. If a computer does not have powerful applications or
programs installed and is running slowly, then it may be a sign it is infected with a virus.
Pop-up Windows
Unwanted pop-up windows appearing on a computer or in a web browser are a telltale sign
of a computer virus. Unwanted pop-ups are a sign of malware, viruses,
or spyware affecting a device.
Programs Self-executing
If computer programs unexpectedly close by themselves, then it is highly likely that the
software has been infected with some form of virus or malware. Another indicator of a
virus is when applications fail to load when selected from the Start menu or their desktop
icon. Every time that happens, your next step should be to perform a virus scan and remove
any files on programs that might not be safe to use.
Some viruses are designed to affect specific applications, which will either cause them to
crash or force the user to automatically log out of the service.
System crashes and the computer itself unexpectedly closing down are common indicators
of a virus. Computer viruses cause computers to act in a variety of strange ways, which
may include opening files by themselves, displaying unusual error messages, or clicking
keys at random.
Computer viruses are commonly spread via email. Hackers can use other people's email
accounts to spread malware and carry out wider cyberattacks. Therefore, if an email
account has sent emails in the outbox that a user did not send, then this could be a sign of a
computer virus.
Computer viruses can be spread via email, with some even capable of hijacking email
software to spread themselves. Others may attach to legitimate software, within software
packs, or infect code, and other viruses can be downloaded from compromised application
stores and infected code repositories. A key feature of any computer virus is it requires a
victim to execute its code or payload, which means the host application should be running.
There are several types of computer viruses that can infect devices. This section will cover
computer virus protections and how to get rid of computer viruses.
Resident Virus
Multipartite Virus
A multipartite virus uses multiple methods to infect and spread across computers. It will
typically remain in the computer’s memory to infect the hard disk, then spread through and
infect more drives by altering the content of applications. This results in performance lag
and application memory running low.
Multipartite viruses can be avoided by not opening attachments from untrusted sources and
by installing trusted antivirus software. It can also be prevented by cleaning the boot sector
and the computer’s entire disk.
Direct Action
A direct action virus accesses a computer’s main memory and infects all programs, files,
and folders located in the autoexec.bat path, before deleting itself. This virus typically
alters the performance of a system but is capable of destroying all data on the computer’s
hard disk and any USB device attached to it. Direct action viruses can be avoided through
the use of antivirus scanners. They are easy to detect, as is restoring infected files.
Browser Hijacker
A browser hijacker manually changes the settings of web browsers, such as replacing the
homepage, editing the new tab page, and changing the default search engine. Technically,
it is not a virus because it cannot infect files but can be hugely damaging to computer
users, who often will not be able to restore their homepage or search engine. It can also
contain adware that causes unwanted pop-ups and advertisements.
Browser hijackers typically attach to free software and malicious applications from
unverified websites or app stores, so only use trusted software and reliable antivirus
software.
Overwrite Virus
Overwrite viruses are extremely dangerous. They can delete data and replace it with their
own file content or code. Once files get infected, they cannot be replaced, and the virus can
affect Windows, DOS, Linux, and Apple systems. The only way this virus can be removed
is by deleting all of the files it has infected, which could be devastating. The best way to
protect against the overwrite virus is to use a trusted antivirus solution and keep it updated.
A web scripting virus attacks web browser security, enabling a hacker to inject web-pages
with malicious code, or client-side scripting. This allows cyber criminals to attack major
websites, such as social networking sites, email providers, and any site that enables user
input or reviews. Attackers can use the virus to send spam, commit fraudulent activity, and
damage server files.
Protecting against web scripting is reliant on deploying real-time web browser protection
software, using cookie security, disabling scripts, and using malicious software removal
tools.
File Infector
A file infector is one of the most common computer viruses. It overwrites files when they
are opened and can quickly spread across systems and networks. It largely affects files with
.exe or .com extensions. The best way to avoid file infector viruses is to only download
official software and deploy an antivirus solution.
Network Virus
Network viruses are extremely dangerous because they can completely cripple entire
computer networks. They are often difficult to discover, as the virus could be hidden within
any computer on an infected network. These viruses can easily replicate and spread by
using the internet to transfer to devices connected to the network. Trusted, robust antivirus
solutions and advanced firewalls are crucial to protecting against network viruses.
Boot Sector Virus
A boot sector virus targets a computer’s master boot record (MBR). The virus injects its
code into a hard disk’s partition table, then moves into the main memory when a computer
restarts. The presence of the virus is signified by boot-up problems, poor system
performance, and the hard disk becoming unable to locate. Most modern computers come
with boot sector safeguards that restrict the potential of this type of virus.
-------.
How To Prevent Your Computer From Viruses
There are several ways to protect your computer from viruses, including:
Trusted computer antivirus products are crucial to stop malware attacks and prevent
computers from being infected with viruses. These antivirus concepts will protect devices
from being infected through regular scans and identifying and blocking malware.
Unwanted pop-up advertisements are more than likely to be linked to computer viruses and
malware. Never click on pop-up advertisements because this can lead to inadvertently
downloading viruses onto a computer.
A popular way to protect your device from computer viruses is to avoid suspicious email
attachments, which are commonly used to spread malware. Computer antivirus solutions
can be used to scan email attachments for potential viruses.
File-sharing programs, particularly unofficial sites, are also popular resources for attackers
to spread computer viruses. Avoid downloading applications, games, or software from
unofficial sites, and always scan files that have been downloaded from any file-sharing
program
Is Trojan a Virus?
A Trojan horse is a type of program that pretends to be something it is not to get onto a
device and infect it with malware. Therefore, a Trojan horse virus is a virus disguised to
look like something it is not. For example, viruses can be hidden within unofficial games,
applications, file-sharing sites, and bootlegged movies.
Is a Worm a Virus?
A computer worm is not a virus. Worms do not need a host system and can spread between
systems and networks without user action, whereas a virus requires users to execute its
code.
Is Ransomware a Virus?
Ransomware is when attackers lock victims out of their system or files and demand a
ransom to unlock access. Viruses can be used to carry out ransomware attacks.
Is Rootkit a Virus?
A rootkit is not a virus. Rootkits are software packages that give attackers access to
systems. They cannot self-replicate or spread across systems.
"Bug" is a common word used to describe problems with computers, but a software bug is
not a virus. A bug is a flaw or mistake in software code, which hackers can exploit to
launch a cyberattack or spread malware
What Is a Trojan Horse Virus?
A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a
legitimate program. The delivery method typically sees an attacker use social
engineering to hide malicious code within legitimate software to try and gain users' system
access with their software.
A simple way to answer the question "what is Trojan" is it is a type of malware that
typically gets hidden as an attachment in an email or a free-to-download file, then transfers
onto the user’s device. Once downloaded, the malicious code will execute the task the
attacker designed it for, such as gain backdoor access to corporate systems, spy on users’
online activity, or steal sensitive data
A Trojan horse virus can often remain on a device for months without the user knowing
their computer has been infected. However, telltale signs of the presence of a Trojan
include computer settings suddenly changing, a loss in computer performance, or unusual
activity taking place. The best way to recognize a Trojan is to search a device using a
Trojan scanner or malware-removal software.
A Trojan horse virus can often remain on a device for months without the user knowing
their computer has been infected. However, telltale signs of the presence of a Trojan
include computer settings suddenly changing, a loss in computer performance, or unusual
activity taking place. The best way to recognize a Trojan is to search a device using a
Trojan scanner or malware-removal software.
Trojan attacks have been responsible for causing major damage by infecting computers and
stealing user data. Well-known examples of Trojans include:
For example, a buffer for log-in credentials may be designed to expect username and
password inputs of 8 bytes, so if a transaction involves an input of 10 bytes (that is, 2 bytes
more than expected), the program may write the excess data past the buffer boundary.
Buffer overflows can affect all types of software. They typically result from malformed
inputs or failure to allocate enough space for the buffer. If the transaction overwrites
executable code, it can cause the program to behave unpredictably and generate incorrect
results, memory access errors, or crashes
Stack-based buffer overflows are more common, and leverage stack memory that only
exists during the execution time of a function.
Heap-based attacks are harder to carry out and involve flooding the memory space allocated
for a program beyond memory used for current runtime operations.
C and C++ are two languages that are highly susceptible to buffer overflow attacks, as they
don’t have built-in safeguards against overwriting or accessing data in their memory. Mac
OSX, Windows, and Linux all use code written in C and C++.
Languages such as PERL, Java, JavaScript, and C# use built-in safety mechanisms that
minimize the likelihood of buffer overflow.
Developers can protect against buffer overflow vulnerabilities via security measures in their
code, or by using languages that offer built-in protection.
In addition, modern operating systems have runtime protection. Three common protections
are:
The software error focuses on buffers, which are sequential sections of computing memory
that hold data temporarily as it is transferred between locations. Also known as a buffer
overrun, buffer overflow occurs when the amount of data in the buffer exceeds its storage
capacity. That extra data overflows into adjacent memory locations and corrupts or
overwrites the data in those locations.
A buffer overflow attack takes place when an attacker manipulates the coding error to carry
out malicious actions and compromise the affected system. The attacker alters the
application’s execution path and overwrites elements of its memory, which amends the
program’s execution path to damage existing files or expose data.
A buffer overflow attack typically involves violating programming languages and
overwriting the bounds of the buffers they exist on. Most buffer overflows are caused by
the combination of manipulating memory and mistaken assumptions around the
composition or size of data.
The buffer overflow exploit techniques a hacker uses depends on the architecture and
operating system being used by their target. However, the extra data they issue to a
program will likely contain malicious code that enables the attacker to trigger additional
actions and send new instructions to the application.
For example, introducing additional code into a program could send it new instructions that
give the attacker access to the organization’s IT systems. In the event that an attacker
knows a program’s memory layout, they may be able to intentionally input data that cannot
be stored by the buffer. This will enable them to overwrite memory locations that store
executable code and replace it with malicious code that allows them to take control of the
program.
Attackers use a buffer overflow to corrupt a web application’s execution stack, execute
arbitrary code, and take over a machine. Flaws in buffer overflows can exist in both
application servers and web servers, especially web applications that use libraries like
graphics libraries. Buffer overflows can also exist in custom web application codes. This is
more likely because they are given less scrutiny by security teams but are less likely to be
discovered by hackers and more difficult to exploit.
1. System crashes: A buffer overflow attack will typically lead to the system crashing. It may
also result in a lack of availability and programs being put into an infinite loop.
2. Access control loss: A buffer overflow attack will often involve the use of arbitrary code,
which is often outside the scope of programs’ security policies.
3. Further security issues: When a buffer overflow attack results in arbitrary code execution,
the attacker may use it to exploit other vulnerabilities and subvert other security services.
1. Stack-based buffer overflows: This is the most common form of buffer overflow attack.
The stack-based approach occurs when an attacker sends data containing malicious code to
an application, which stores the data in a stack buffer. This overwrites the data on the
stack, including its return pointer, which hands control of transfers to the attacker.
2. Heap-based buffer overflows: A heap-based attack is more difficult to carry out than the
stack-based approach. It involves the attack flooding a program’s memory space beyond
the memory it uses for current runtime operations.
3. Format string attack: A format string exploit takes place when an application processes
input data as a command or does not validate input data effectively. This enables the
attacker to execute code, read data in the stack, or cause segmentation faults in the
application. This could trigger new actions that threaten the security and stability of the
system.
Nearly all applications, web servers, and web application environments are vulnerable to
buffer overflows. Environments that are written in interpreted languages, such as Java and
Python, are immune to the attacks, with the exception of overflows in their interpreter.
Buffer overflow attacks are typically caused by coding errors and mistakes in application
development. This results in buffer overflow as the application does not allocate
appropriately sized buffers and fails to check for overflow issues. These issues are
particularly problematic in the programming language C/C++ as it does not have buffer
overflow protection built in.
This programming language is not the only one vulnerable to buffer overflow attacks. A
buffer overflow program in Assembly, C, C++ or Fortran is also particularly vulnerable
and more likely to enable attackers to compromise a system. However, applications written
in JavaScript or Perl are typically less vulnerable to buffer overflow attacks.
How to Prevent Buffer Overflows
Application developers can prevent buffer overflows by building security measures into
their development code, using programming languages that include built-in protection, and
regularly testing code to detect and fix errors.
One of the most common methods for preventing buffer overflows is avoiding standard
library functions that have not been bounds-checked, which includes gets, scanf, and
strcpy. Another common method is to prevent buffer overruns by using bounds-checking
that is enforced at runtime. This automatically checks that the data written to a buffer is
within the appropriate boundaries.
Modern operating systems now deploy runtime protection that enables additional security
against buffer overflows. This includes common protection like:
1. Address space layout randomization (ASLR): Buffer overflow attacks typically need to
know where executable code is located. ASLR moves at random around locations of data
regions to randomize address spaces, which makes overflow attacks almost impossible.
2. Data execution prevention: This method prevents an attack from being able to run code in
non-executable regions by flagging areas of memory as executable or non-executable.
3. Structured exception handling overwrite protection (SEHOP): Attackers may look to
overwrite the structured exception handling (SEH), which is a built-in system that manages
hardware and software exceptions. They do this through a stack-based overflow attack to
overwrite the exception registration record, which is stored on the program’s stack. SEHOP
prevents attackers’ malicious code from being able to attack the SEH and use its overwrite
exploitation technique.
UNIT - III Techniques Used by Hackers
Introduction, Basic Terminology, The Reconnaissance Phase, Actual Attacks,
Malware Creation, Penetration Testing.
Using Bait and Switch the hackers buy advertisement space on any website and then
create an eye-catching advertisement on the website’s page. Whenever a user comes to
visit that website, most of the time user gets convinced to click on that advertisement due
to its presentation to the user and the time user clicks on that advertisement he gets
redirected to a malicious web page. This way hackers can install malicious code on the
victim’s system and can steal user information.
The attacker uses a virus, Trojan, and other malicious code and installs them on the
victim’s computer to get unprivileged access. Virus and other Trojans keep sending data
to the hacker regularly and can also perform various tasks on the victim’s system like
sniffing your data and diverting traffic etc.
3. Cookie Theft
We use Browser to search for different websites and those websites store cookies in your
browser. This includes our search history, some account passwords, and other useful
information, When attacker gets on your browser’s cookie session then he can
authenticate himself as you on a browser and then can conduct attacks. It’s always a best
practice to periodically clear the search history and cache of your browser to ensure
protection from such kinds of attacks
4. Denial of Service
This hacking technique involves flooding the network with a huge amount of data
packets to bring the system down. In this manner, users are unable to use the service due
to the real-time crash of the system. Hacker uses too many requests to lower down the
system so that the system cannot respond to the actual or original request from genuine
users. Another attack called DDoS (Distributed Denial of Service) is also used to fulfill
the same purpose by using zombies or computers to flood the intended system, The
number of data packets or requests used to fulfill the requirements of the attack increases
if it fails every time. You should always use good anti-malware software and other
security measures to make sure they are safe from these attacks.
5. Keylogger
A keylogger is simply software that is used to record key sequences and store the strokes
of keys pressed on your keyboard to a file on your computer. These log files can contain
some useful and sensitive data of the user that may be account information and different
passwords. Check your computer regularly for this type of theft by using security tools
and make sure to use a virtual keyboard while doing transactions if you have any
suspects during login. It’s always a good practice to install good antivirus software that
checks your system periodically for any virus and other suspects on your computer. Also,
make sure your windows firewall is turned on for additional security of your system and
do not respond to fraud e-mails and offers. Try installing software from a trusted and
secured software provider and avoid doing transactions and exchange of other sensitive
data using public Wi-Fi networks
Ethical Hacking - An Understanding
Ethical hacking implies a hacking system that depends on ethical or moral values
without any wrong intent. Any form of hacking authorized by the target system owner is
known as ethical hacking. It is the process of adapting active security measures to
defend systems from hackers with foul intentions regarding data privacy.
Ethical hacking techniques provide security measures a system applies to look for
vulnerabilities, breaches, and potential threats to the data. An ethical hacker hacks the
system they have targeted before any hacker. For this reason, security patches are
applied. This effectively eliminates and reduces the chances for the attacker to execute
the hack.
Using ethical hacking tools and techniques PDF, a hacker can surpass the threats by
searching for the weak points in the system. These tools can be used to secure the data
and systems of the user. They provide security and protection. There are different types
of ethical hacking methods. Some of them are as follows
1. Black-hat hackers
2. White-hat hackers
3. Grey-hat hackers
4. Miscellaneous hackers
White hat checkers are ethical hackers, whereas black hat hackers are called
unauthorized hackers or crackers. They use various techniques and methods to protect
and disrupt security systems. One can gather as much data as possible about targeted
systems and networks through footprinting techniques and Ethical Hacking
Ethical hacking has the potential to test, scan, and secure systems and data. Ethical
hacking techniques can be learnt using an ethical hacking PDF and some of the
techniques are listed below.
1. Phishing
2. Sniffing
Sniffing is the process of keeping track and capturing all the packets passing through a
given network. This is done using some sniffing tools. It is also known as wiretapping as
it is in the form of tapping phone wires and can get to know about the conversation.
3. Social Engineering
Due to loose security policies and the absence of hardware or software tools to prevent
it, it is difficult to detect a social engineering attack.
4. Footprinting
In this ethical hacking technique, the hacker gathers as much data as possible about a
specific targeted system and infrastructure to recognize opportunities to penetrate them.
The hacker might use various tools and technologies to get information to crack a whole
system.
5. SQL injection
SQL injection is an attack in which the attacker sends a SQL query, a statement, to a
database server that modifies it as required. An SQL injection happens when the user
input is improperly sanitized before using it in an SQL query.
SQL allows securing a response from the database. It will help the hacker understand
the construction of the database, as the table names.
6. Enumeration
Enumeration also means information gathering. In this process, the attacker creates a
connection with the victim to find as many attack vectors which are used to exploit the
system in the future.
A hacker needs to establish an active connection with the target host. First, the
vulnerabilities are counted and assessed. Then, it is done to search for attacks and
threats to target the system. This is used to collect the username, hostnames, passwords,
and IP addresses.
There are a lot of ethical hacking tools available for user convenience. In addition,
ethical hacking tools help in security investigations.
1. Ettercap
Ettercap includes the features of host and network analysis. In addition, Ettercap has got
the capability of sniffing an SSH connection. It allows you to create custom plugins
using API. Also, it will enable you to inject some characters into the server or the
client's network. Ettercap supports a detailed analysis of the action along with passive
protocols.
One can apply for a cyber security certificate program online to learn effective
security management and control.
2. Netsparker
Netsparker is the latest web application scanner for security that automatically detects
vulnerabilities in web applications. It is available in the form of a SAAS solution. The
Netsparker detects dead vulnerabilities using the latest scanning technology. The tool
requires less configuration. It can scan more than 1000 web applications in a short time.
3. Burp Suite
Burp Suite is one of the ethical hacking tools which helps in security tests. This feature
is handy for testing web applications. It includes a wide range of tools that help in the
testing process.
The Burp Suite tool can detect the spam of around 2000 web applications. It can also
scan open-source software applications. They are used to detect bugs and malware
accurately with the help of advanced scanning tools.
John the Ripper is one of the most popular password-cracking tools. The tool is used to
test the strength of the password. Brute force technology is used by this tool to hack
passwords. This tool can auto-detect the encryption type of password. This feature
makes it the best among all other password hacking tools.
Algorithms such as MD4, LDAP, DES, and Hash LM are used by this tool.
5. Nmap
Nmap is an open-source security tool. This tool is mainly used to manage and audit
network and system security. Usually, Information Security professionals use this tool to
find malware, network audits, network mapping, and more for local and remote hosts.
6. Wireshark
Wire shark is used to analyze network traffic in real time. The technology used is
sniffing. This tool is open-source for ethical hacking. Different features like power GUI
and packet browser are included, resulting in other formats. In addition, the tool
supports various types of protocols.
7. OpenVAS
OpenVAS is used for detecting vulnerabilities on different hosts. It is one of the open -
source network scanners. Different features like a web-based interface, scheduled scans,
and multiple hosts scanning at a time are included in this tool. In addition, the OpenVas
is integrated with Nagios monitoring software.
8. Angry IP scanner
The Angry IP scanner does not require any installation. The tool scans local as well as
web networks. Angry IP is provided with the best scanning techniques. The tool is open-
source and free, which supports different platforms.
9. Iron was
The Iron tool is helpful for web application malware testing. It is open-source and free.
In addition, the tool is an easy-to-use GUI-based tool. Programming languages like
Python and Ruby are supported by it. Reporting in different formats like HTML and
RTF are provided by this tool.
10. Acunetix
Acunetix tool is a fully automatic hacking tool. This tool stays ahead of any intruders.
Complex issues related to the web and network are audited in the tool. Various features
include scanning different variants like SQL injection, XSS, etc. They are available on
premises as well as on cloud platforms.
3. System hacking
System hacking is the sacrifice of computer software to access the targeted computer to
steal their sensitive data. The hacker takes advantage of the weaknesses in a computer
system to get the information and data and takes unfair advantage. System hacking aims
to gain access, escalate privileges, and hide files.
Wireless hacking attacks wireless networks or access points that offer confidential
information such as authentication attacks, admin portal access, WiFi password, and
other similar data. It is performed to gain access to a private WiFi network.
Web content is generated as a software application on the server side in real time. This
allows the hackers to attack the webserver to steal private information, data, passwords,
and business information by using DoS attacks, port scans, SYN flood, and Sniffing.
Hackers hack web servers to gain financial gain from theft, sabotage, blackmail,
extortion, etc.
1. Reconnaissance
2. Scanning
3. Gain access
4. Maintain access
5. Cover Tracks
2. What are the top 3 techniques of ethical Hacking?
The top three techniques of ethical Hacking are
Phishing is one of the most common hacking terminology used by security people. Phishing
is a technique that tricks users into revealing sensitive information (like usernames,
passwords, or credit card details) to seemingly benign sources. A phisher disguises as a
trustworthy entity and contacts potential victims asking them to reveal information. This
could be further used for malicious intent. For example, a phisher may pose as a bank and
ask for a user’s bank account credentials via e-mail. Or he could trick you to click on a
fraudulent link. Phishing is a type of social engineering.How to detect Social Engineering
attacks
A fake Amazon mail attempts to persuade the lucky recipient that they have a chance to win
£10 in return for completing a quick survey to steal login and Payment Information
2. Malware- You hear about websites getting infected daily with malware attacks, so let’s
learn more about this hacking terminology.
For instance, a recent malware functioned by redirecting both Opencart and Magento desktop
and mobile websites to malicious links. This essentially leads to a loss of customers,
reputation and most importantly bad impact on search engine rankings.
This file called unzip.php allowed uploading of malicious files to the server
3. Ransomware
One of the most searched hacking terminology of 2017. Ransomware is a form of malware
which locks a user out of his own system and cuts access to his/her files. A ransom message
is displayed that instructs how much and where to send payment, usually requested in
bitcoin, in order to get your files back. Such attacks affect not only individuals but banks,
hospitals, and online businesses. A very recent example of such ransomware is the Petya
ransomware attack which recently took the businesses worldwide by a storm.
A message
demanding money is seen on a monitor of a payment terminal at a branch of Ukraine’s state-
owned bank Oschadbank after being hit by the Petya ransomware. Image source:
REUTERS/Valentyn Ogirenko
4. Spoofing
E-mail and IP spoofing are few common hack techniques encountered by users worldwide.
E-mail spoofing involves altering the header of an e-mail to make it look legit. For instance,
a black hat hacker can make an e-mail look as if it has appeared from your bank or any other
source you may trust. On the other hand, IP spoofing refers to an illegitimate packet sent to a
computer with an altered IP appearing to be a trusted host. This is carried out with the hope
that the packet would be accepted that will allow the sender access to the target machine.
5. Encryption
6. Adware
Adware is typically a software which acts as spyware to track a user’s browsing activities
covertly. It then generates advertisements based on the user’s browsing history. Some adware
is maliciously designed to pop up ads with a frequency ultimately slowing down your
system. It can collect your personal information, browsing history, and provide inputs for
further phishing attacks. This hacking terminology is common in the marketing
world. Google shows a warning when visitors visit such a deceptive website because
of Social engineering content.
A zero-day threat refers to a threat which is undocumented and hence hidden from any
antivirus scanner installed on the system. This kind of flaw is inherent in anti-virus scanners,
making it oblivious to developers who built antivirus functionalities based on knowledge of
these vulnerabilities. Such vulnerabilities are exploited through different vectors, popularly
web browsers, and malicious attachments via e-mails.
Another commonly hacking terminology to get bypass the login pages. Brute Force, aka
Exhaustive key search, is a trial and error method to decrypt data such as passwords, Data
Encryption Standard (DES) keys, or other encrypted information. This method is widely
used to crack passwords to admin accounts, which in turn can be used to steal information
and documents of paramount importance.
9. HTTPS/SSL/TLS
Highly searched hacking terminology of 2018 when Google Chrome announced that it will
give warning to users who are visiting HTTP using websites. HTTPS, which stands for
Hypertext Transfer Protocol with the “S” for “Secure”, is a basic framework that controls
how data is transferred across the web. This protocol adds a layer of encryption to provide
you with secure daily browsing—your bank, your email provider, and social network. SSL
and TLS are protocols used by HTTPS to provide an added identity proof to your website. It
is advised to avoid browsing the website using HTTP and enter any passwords or credit card
detail on it.
10. Bot
A bot is a software robot that runs automated tasks (scripts) over the Internet. Many search
engines like Google and Bing employ bots, also called spiders, to scan websites and index
them for purpose of ranking them according to returns on search queries. But when these
bots are used by hackers, they can be programmed to perform malicious tasks, as well as
introduce malware into the system. Learn more about bad bots.
11. Botnets
A botnet refers to a network of bots controlled by a black hat. Applications of botnets include
the launch of DDoS (Distributed Denial of Service), steal data, send spam, and allow the
attacker access to the device and its connection. A swarm of botnets not only help cover the
black hat’s tracks but raise the intensity of the attack by attacking in a coordinated effort.
This hacking terminology is highly common among hackers and is a major concern for
website owners and developers. A DDoS attack is carried out with the aid of zombies or
botnets controlled by black hats. By programming the botnets, the black hats command them
to send data packets to the targeted web server from multiple systems. This floods the target
server thereby slowing down or even crashing and shutting down the server thereby
disrupting any activity. All the while the user of the server is oblivious to the attack.
Some of the most notoriously known attacks discovered lately were the Rio Olympics DDoS
which lasted for months, Russian banks Sberbank and Alfabank which were attacked by a
botnet consisting of at least 24,000 computers located in over 30 countries, and the US
presidential elections campaign attacks.
Rise of
DDoS attacks during Rio Olympics
13. Firewall
A firewall is a network security system, which continuously monitors incoming and outgoing
network traffic, and blocks out any untrusted sources to ensure safe communications. A
firewall can be both hardware and software-based. A well designed and implemented
firewall continuously monitors for malicious inputs, however, black hats strive to circumvent
them. As a result, firewalls are continuously being updated, adjusted, or replaced with new
security measures over time.
14. Payload
Essentially, a payload is a cargo of transmitted data over a network. However, in black hat
hacking terminology, a payload refers to the part of the virus that performs malicious actions,
such as compromising data, destroy information, or hijacking the computer system.
While black hat hackers are notoriously known for performing destructive activities online,
white hat hackers are ethical hackers who use their skills to expose loopholes in security
measures for organizations/companies before black hats exploit them.
16. Rootkit
Rootkits are one of the scariest methods to perform a cyber intrusion mostly because it goes
undetected. Give a black hat a rootkit and he would perform the perfect heist. A rootkit is a
malware program which can be installed on a system through various means. Just like a
virus, a rootkit can be injected via e-mails, unauthenticated websites, infected hard drives,
etc. Once injected, a black hat can exploit unhindered access to remote applications as per
his/her need. What makes it even more lethal is its ability to function at the low system level
so as to erase its tracks and go undetected for a long time. Once introduced into a system, its
activity is extremely hard to detect even by skilled IT security professionals. It’s like the holy
grail of hacking.
17. RAT
Remote Access Tool or Remote Access Trojan (RAT) is a form of malware which can be
operated by even an unskilled hacker. Once a RAT is installed on your system, the attacker
gains complete control of the system. While RAT can be used for legitimate purposes, like
when a user wants to access his home computer from another location, it is largely used for
illegitimate reasons.
The ONI Ransomware which performed a month-long attack on Japanese companies would
encrypt the computer’s files and append the .oni extension to encrypted files
To make the ONI Ransomware
go undetected, the attackers execute a batch file that cleaned up over 460 different event logs
in order to cover their activities. Source: Cybereason
18. SPAM
This hacking terminology is commonly associated with e-mails. Spam is unsolicited emails,
often used to spread advertisements via e-mails. Often, spammers collect a huge database of
e-mails and randomly send them emails to promote products. However, spams can also be
used to introduce malware into systems through phishing or directing to unauthenticated
websites. The best practice is to delete spam as soon as you receive one, or make use of a
spam filter.
19. Worm
20. Cloaking
Hackers often use Cloaking to present different content or URLs to human users and search
engines, thereby cloaking them under legitimate-looking web material. Hackers use dynamic
scripts and .htaccess rules to hide their tracks by returning a 404 or 500 error code to certain
IP addresses or browsers while serving spam to other IP addresses or browsers. Google
generally suspend your ads if they notice cloaking on your website.
In the reconnaissance phase, hackers identify a vulnerable target and explore how to
exploit it. The initial target can be anyone in the company. Attackers need only a single
point of entrance to get started. Targeted phishing emails are common as an effective
method of distributing malware in this phase.
The whole point is getting to know the target. At this stage, hackers are asking
themselves who the important people in the company are, who they do business with,
and what public data is available about the target organization. Company websites and
online contact resources such as Linkedin are two obvious sources for researching key
people in organizations. Identifying suppliers and customers may involve ‘social
engineering’ where a hacker makes bogus sales calls to the company.
Among publicly available data, hackers collect Internet Protocol (IP) address
information and run scans to determine what hardware and software the target company
is using. They check the Internet Corporation for Assigned Names and Numbers
(ICAAN) web registry database.
The more time hackers spend gaining information about the people and systems at the
company, the more successful the hacking attempt will be.
In the weaponization phase, the hacker uses the previously gathered information to
create ways to get into the target’s network.
This could involve creating believable spear phishing e-mails that look like e-mails that
the target could potentially receive from a known vendor or other business contact.
Another hacker tactic is to create ‘watering holes’, fake web pages that look identical to
a vendor’s or a bank’s web page. This aims to capture usernames and passwords, or to
offer a free download of a malware-infected document or something else of interest.
The attacker’s final action in this phase is to collect the tools to successfully exploit any
vulnerabilities that they may find when they later gain access to the target’s network.
The attack starts in the delivery phase. Phishing e-mails are sent, ‘watering hole’ web
pages are posted to the internet, and the attacker waits for the arrival of all the data they
need.
If the phishing e-mail contains a weaponized attachment, then the attacker waits for
someone to open the attachment and for the malware in it to ‘call home’ to the hacker.
In the exploitation phase, the hacker starts to reap the rewards of preparing and
delivering the attack.
As usernames and passwords arrive, the attacker tries them against web-based e-mail
systems or virtual private network (VPN) connections to the company network. If
malware-infected attachments were sent, then the attacker remotely accesses the affected
computers.
The hacker explores the targeted network and gains a better idea of the traffic flow on it,
what systems are connected to it, and how they can be exploited.
In the installation phase, the attacker ensures continued access to the network.
To achieve this, the hacker will install a persistent backdoor, create administrator
accounts on the network, and disable firewall rules. They may even activate remote
desktop access on servers and other systems on the network.
The hacker’s intention at this point is to be certain of staying in the system as long as
needed to achieve their objectives.
Now they have unrestrained access to the entire network and administrator accou nts, all
the required tools are in place for the command and control phase.
The attacker can look at anything, impersonate any user on the network, and even send
e-mails from the CEO to all employees.
Now in control, the hacker can lock a company’s IT users out of the organization’s
entire network if they want to, perhaps demanding a ransom to restore access.
The action on objectives phase now begins. This could involve stealing information on
employees, customers, product designs, and so on. Or an attacker could start to disrupt
the target company’s operations.
Not all hackers are after monetizable data or incriminating emails that they can publish.
Some simply want to cause chaos or to inflict pain on a company. If a company receives
online orders, a hacker could shut down the ordering system or delete orders, for
example. They could even create orders and have them shipped to the company’s
customers.
If a hacker gains access to an Industrial Control System, they could shut down
equipment, enter new set points, and disable alarms
There are two main types of reconnaissance: active and passive reconnaissance.
With active reconnaissance, hackers interact directly with the computer system and
testing and tools like ping and netcat. Active recon is generally faster and more accurate,
but riskier because it creates more noise within a system and has a higher chance of being
detected.
using tools such as Wireshark and Shodan and methods such as OS fingerprinting to gain
information
Actual Attacks
What Is a Cyber Attack?
Cyberattacks can target a wide range of victims from individual users to enterprises or
even governments. When targeting businesses or other organizations, the hacker’s goal
is usually to access sensitive and valuable company resources, such as intellectual
property (IP), customer data or payment details.
1. Malware
2. Denial-of-Service (DoS) Attacks
3. Phishing
4. Spoofing
5. Identity-Based Attacks
6. Code Injection Attacks
7. Supply Chain Attacks
8. Insider Threats
9. DNS Tunneling
10. IoT-Based Attacks
1. Malware
Malware — or malicious software — is any program or code that is created with the
intent to do harm to a computer, network or server. Malware is the most common type
of cyberattack, mostly because this term encompasses many subsets such as
ransomware, trojans, spyware, viruses, worms, keyloggers, bots, cryptojacking, and
any other type of malware attack that leverages software in a malicious way.
Type Description
Keylogger Keyloggers are tools that record what a person types on a device.
While there are legitimate and legal uses for keyloggers, many
uses are malicious. In a keylogger attack, the keylogger software
records every keystroke on the victim’s device and sends it to the
attacker.
In a DoS attack, users are unable to perform routine and necessary tasks, such as
accessing email, websites, online accounts or other resources that are operated by a
compromised computer or network. While most DoS attacks do not result in lost data
and are typically resolved without paying a ransom, they cost the organization time,
money and other resources in order to restore critical business operations.
The difference between DoS and Distributed Denial of Service (DDoS) attacks has to
do with the origin of the attack. DoS attacks originate from just one system while
DDoS attacks are launched from multiple systems. DDoS attacks are faster and harder
to block than DOS attacks because multiple systems must be identified and neutralized
to halt the attack.
3. Phishing
Phishing is a type of cyberattack that uses email, SMS, phone, social media, and social
engineering techniques to entice a victim to share sensitive information — such as
passwords or account numbers — or to download a malicious file that will install
viruses on their computer or phone.
Type Description
Vishing Vishing, a voice phishing attack, is the fraudulent use of phone calls
and voice messages pretending to be from a reputable organization
to convince individuals to reveal private information such as bank
details and passwords.
4. Spoofing
Type Description
Domain Domain spoofing is a form of phishing where an attacker impersonates a known business o
Spoofing fool people into the trusting them. Typically, the domain appears to be legitimate at first gla
differences.
Email Email spoofing is a type of cyberattack that targets businesses by using emails with forged
Spoofing alleged sender, they are more likely to open the email and interact with its contents, such as
ARP Address Resolution Protocol (ARP) spoofing or ARP poisoning is a form of spoofing attack
Spoofing commits an ARP spoofing attack by tricking one device into sending messages to the hacke
hacker gains access to your device’s communications, including sensitive data.
5. Identity-Based Attacks
Identity-driven attacks are extremely hard to detect. When a valid user’s credentials
have been compromised and an adversary is masquerading as that user, it is often very
difficult to differentiate between the user’s typical behavior and that of the
hacker using traditional security measures and tools.
Type Description
Credential Stuffing Credential stuffing attacks work on the premise that people
often use the same user ID and password across multiple
accounts. Therefore, possessing the credentials for one
account may be able to grant access to other, unrelated
account.
Code injection attacks consist of an attacker injecting malicious code into a vulnerable
computer or network to change its course of action. There are multiple types of code
injection attacks:
Type Description
A supply chain attack is a type of cyberattack that targets a trusted third-party vendor
who offers services or software vital to the supply chain. Software supply chain
attacks inject malicious code into an application in order to infect all users of an app ,
while hardware supply chain attacks compromise physical components for the same
purpose. Software supply chains are particularly vulnerable because modern software
is not written from scratch: rather, it involves many off-the-shelf components, such as
third-party APIs, open source code and proprietary code from software vendors.
8. Insider Threats
IT teams that solely focus on finding adversaries external to the organization only get
half the picture. Insider threats are internal actors such as current or former employees
that pose danger to an organization because they have direct access to the company
network, sensitive data, and intellectual property (IP), as well as knowledge of
business processes, company policies or other information that would help carry out
such an attack.
9. DNS Tunneling
DNS Tunneling is a type of cyberattack that leverages domain name system (DNS)
queries and responses to bypass traditional security measures and transmit data and
code within the network.
Once infected, the hacker can freely engage in command-and-control activities. This
tunnel gives the hacker a route to unleash malware and/or to extract data, IP or other
sensitive information by encoding it bit by bit in a series of DNS responses.
DNS tunneling attacks have increased in recent years, in part because they are
relatively simple to deploy. Tunneling toolkits and guides are even readily accessible
online through mainstream sites like YouTube.
An IoT attack is any cyberattack that targets an Internet of Things (IoT) device or
network. Once compromised, the hacker can assume control of the device, steal data,
or join a group of infected devices to create a botnet to launch DoS or DDoS attacks.
[According to the Nokia Threat Intelligence Lab, connected devices are responsible for
nearly one-third of mobile network infections – more than double the amount in 2019.]
Given that the number of connected devices is expected to grow rapidly over the next
several years, cybersecurity experts expect IoT infections to grow as well. Further, the
deployment of 5G networks, which will further fuel the use of connected devices, m ay
also lead to an uptick in attac
Malware Creation
Advantages of Detecting and Removing Malware
1. Improved Security: By detecting and removing malware, individuals, and
organizations can improve the security of their systems and reduce the risk of future
infections.
2. Prevent Data Loss: Malware can cause data loss, and by removing it, individuals and
organizations can protect their important files and information.
3. Protect Reputation: Malware can cause harm to a company’s reputation, and by
detecting and removing it, individuals and organizations can protect their image and
brand.
4. Increased Productivity: Malware can slow down systems and make them less
efficient, and by removing it, individuals and organizations can increase the
productivity of their systems and employees.
Disadvantages of Detecting and Removing Malware
1. Time-Consuming: The process of detecting and removing malware can be time-
consuming and require specialized tools and expertise.
2. Cost: Antivirus software and other tools required to detect and remove malware can
be expensive for individuals and organizations.
3. False Positives: Malware detection and removal tools can sometimes result in false
positives, causing unnecessary alarm and inconvenience.
4. Difficulty: Malware is constantly evolving, and the process of detecting and removing
it can be challenging and require specialized knowledge and expertise.
5. Risk of Data Loss: Some malware removal tools can cause unintended harm, resulting
in data loss or system instability.
Creating HTTP Trojan and Controlling a Target Machine Remotely With HTTP RAT
RAT or a Remote Access Trojan helps hackers to gain complete control over a target
system, allowing them to access the files, private conversations, etc. remotely. In this lab,
let’s understand how HTTP Trojans work so that you can protect your network against this
type of malware.
2. When the HTTP RAT window comes, uncheck the send notification with IP
address to mail option. Next, enter server port 84 and click on Create for the
creation of an httpserver.exe file.
3. A server will get created in the default location where you can find the HTTP RAT
files. Minimize all the open windows.
4. Go to Windows 8.
When the Open File -Security Warning error comes, click on Run.
6. The httpserver.exe file will continue to run in the background. Open the Task
Manager for the confirmation of status. You can see in the Processes tab that
the Httpserver (32 bit) is running. Keep the Windows 8 machine running.
9. In the URL bar, write the IP address of the target machine and press Enter. In this
lab, the target machine is Windows 8 with IP address 10.10.10.8.
10. It will show the z0mbie’s HTTP_RAT page. Click on Running Processes to see
the list of processes active on Windows 8.
11. It will show the list of Running Processes on the target machine. You can close
any process from your end.
12. Click on Browse to view the directories and files on the target machine. You can
further check the content on the drives.
13. If you click on the Computer info, it will show you the details about the computer,
hardware, and users.
14. Close all the open windows when the lab is completed.
Hackers can further use it to take control over the computers in a network, create malware
and spread it in the network.
As an ethical hacker or security admin, it is important for you to find the vulnerable
machines that can be attacked by Trojans, malware, which can lead to data breach and
identity theft.
In this lab, let’s understand how to create a server using njRAT and gain remote access to
the target machine.
2. When the All Control Panel Items window comes, click on Windows Defender
Firewall. Further, click on Use Recommended Settings. Close the open windows
and let the Windows 10 system in running mode.
4. When the njRAT GUI comes, enter the port number and click on Start. Here, let’s
proceed with the default port number 5552.
5. In the next interface, click on Builder in the lower-left side.
6. When the Builder dialog box comes, enter the IP of Windows Server 2016
(attacker machine). Check mark the Copy to Startup and Registry
Startup options and click on Build.
7. When the Save As dialog box comes, specify the location for storing the server, add
a name, and then click on Save.
8. Here, the file has been named to Test.exe and the destination location
is E:\CEHv10 Module 07 Malware Threats\Trojans Types\Remote Access
Trojans (RAT)\njRAT.
9. When the server is created successfully, there will be DONE! popup. Click on OK.
10. Hackers transmit a crafted server file to the target machine in real time. When this
file is executed, the hackers can see and access the information on the target
machine.
Here, let’s use the Test.exe file on the Shared Network drive. It can be accessed by the
other machines.
Copy-paste the Test.exe file on Desktop. Minimize the currently open windows.
13. Open Windows Server 2016 as soon as the file is opened. The njRAT client
running on Windows Server 2016 will form a connection with the target machine.
The control over the target machine remains with the hacker unless he disconnects it.
In the GUI, you can see the basic details about the target machine, including IP address,
username, operating system, etc.
15. In the Manager window, the File Manager is selected by default. To see the
related files of a directory, double-click on the directory.
16. Click on Process manager. From the processes shown, right click on a process to
perform actions like Kill, Delete, and Restart.
17. Click on Connection, choose a particular connection, and right click on it. Then
click on Kill Connection. It will close the connection between two machines
interacting via a specific port.
18. Click on Remote Shell to open a remote command prompt of the target machine.
Write ipconfig/all and press Enter.
19. It will show the interfaces associated with the target machine. Similarly, you can
write other commands and view more information from the target machine.
Similarly, you can click on Services to see the services running on the target machine. It
will allow you to start, pause, or stop a service.
20. Right-click on the target machine name and then click on Run File. Select an
option from the dropdown. Hackers use these options to write and execute scripts
and find remote access to the machine.
21. Now, right-click on the target machine name and choose Remote Desktop. It will
open a remote desktop connection. The victim will not become aware of it.
22. When the Remote Desktop window comes, navigate to the top-center part. A down
arrow will show. Click on it.
23. When the remote desktop control panel comes, check mark the Mouse option. It
will allow you to communicate with the target machine remotely using your mouse.
24. Similarly, you can spy on the target machine and keep a track of voice
conversations by right-clicking on the target machine name and choosing Remote
Cam and Microphone.
25. Open Windows 10 and do some activities on it like a legitimate user. The activities
can include opening websites in a browser, writing text in a document, etc.
26. Open Windows Server 2016 and right-click on the target machine name. Then,
click on Keylogger.
27. When the Keylogger window comes, it will show all the keystrokes performed by
the user on the target Windows 10 machine.Close the window after seeing it.
28. Right-click on the target machine name and then click on Open Chat.
29. When the Chat pop-up comes, enter a nickname and click on OK.
30. When the chat box shows, write a message and click on Send.
31. Open Windows 10 as soon as you send the message from the Windows Server 2016
machine. It will show you a pop-up.
When a victim sees such pop-ups or alerts, he tries to close it. However, no matter
wherever they click, the chat box will remain open as long as it is being used by the
attacker.
In case the victim tries to restart the system, it will disconnect the communication between
njRAT and Windows 10.
34. Click Windows 10 and login to it. Keep the machine running.
35. Open Windows Server 2016 and check whether the connection is formed after
restarting.
As an ethical hacker, you must know how to perform malware analysis to have an idea
about their working and the damage that can be caused by them.
4. After installation, open the app. When the IDA License window comes, click on I
Agree.
5. Click on New when the IDA: Quick Start pop-up shows up.
7. When the Load a new file window comes, keep the default settings and click
on OK.
In case you see a Warning pop-up, click on OK. If there is a Please confirm dialog box,
click on Yes.
8. Once the analysis is complete, it will display the IDA Pro Analysis window.
Navigate to View > Graphs, and click on Flow Chart from the menu bar.
9. It will open a Graph window with the flow. You can zoom it to see it properly.
10. Close the Graph window. Navigate to View > Graphs. Click on Function
Calls from the menu bar.
11. When a window displaying call flow comes, zoom it to see clearly. Do the analysis
and then close the WinGraph32 Call flow window.
12. Click on Windows from the menu bar and choose Hex View-1.
13. It will show you the Hex Value of the virus.
15. It will show the structures. To see details, click on Ctrl and +. The same way, you
can check and analyze the other options of IDA Pro.
Penetration Testing
Penetration testing (or pen testing) is a security exercise where a cyber-security expert
attempts to find and exploit vulnerabilities in a computer system. The purpose of this
simulated attack is to identify any weak spots in a system’s defenses which attackers could
take advantage of.
Open-box pen test - In an open-box test, the hacker will be provided with some
information ahead of time regarding the target company’s security info.
Closed-box pen test - Also known as a ‘single-blind’ test, this is one where the
hacker is given no background information besides the name of the target
company.
Covert pen test - Also known as a ‘double-blind’ pen test, this is a situation
where almost no one in the company is aware that the pen test is happening,
including the IT and security professionals who will be responding to the attack.
For covert tests, it is especially important for the hacker to have the scope and
other details of the test in writing beforehand to avoid any problems with law
enforcement.
External pen test - In an external test, the ethical hacker goes up against the
company’s external-facing technology, such as their website and external
network servers. In some cases, the hacker may not even be allowed to enter the
company’s building. This can mean conducting the attack from a remote
location or carrying out the test from a truck or van parked nearby.
Internal pen test - In an internal test, the ethical hacker performs the test from
the company’s internal network. This kind of test is useful in determining how
much damage a disgruntled employee can cause from behind the company’s
firewall.
Pen tests start with a phase of reconnaissance, during which an ethical hacker spends time
gathering data and information that they will use to plan their simulated attack. After that,
the focus becomes gaining and maintaining access to the target system, which requires a
broad set of tools.
Tools for attack include software designed to produce brute-force attacks or SQL
injections. There is also hardware specifically designed for pen testing, such as small
inconspicuous boxes that can be plugged into a computer on the network to provide the
hacker with remote access to that network. In addition, an ethical hacker may use social
engineering techniques to find vulnerabilities. For example, sending phishing emails to
company employees, or even disguising themselves as delivery people to gain physical
access to the building.
The hacker wraps up the test by covering their tracks; this means removing any embedded
hardware and doing everything else they can to avoid detection and leave the target system
exactly how they found it
Ideally, software and systems were designed from the start with the aim of eliminating
dangerous security flaws. A pen test provides insight into how well that aim was achieved.
Pen testing can help an organization
Depending on the goals of a pen test, testers are given varying degrees of information
about, or access to, the target system. In some cases, the pen testing team takes one
approach at the start and sticks with it. Other times, the testing team evolves its strategy as
its awareness of the system increases during the pen test. There are three levels of pen test
access.
Opaque box. The team doesn’t know anything about the internal structure of the
target system. It acts as hackers would, probing for any externally exploitable
weaknesses.
Semi-opaque box. The team has some knowledge of one or more sets of
credentials. It also knows about the target’s internal data structures, code, and
algorithms. Pen testers might construct test cases based on detailed design
documents, such as architectural diagrams of the target system.
Transparent box. Pen testers have access to systems and system artifacts including
source code, binaries, containers, and sometimes even the servers running the
system. This approach provides the highest level of assurance in the smallest
amount of time
Pen testers simulate attacks by motivated adversaries. To do this, they typically follow a
plan that includes the following steps:
A comprehensive approach to pen testing is essential for optimal risk management. This
entails testing all the areas in your environment.
Web apps. Testers examine the effectiveness of security controls and look for
hidden vulnerabilities, attack patterns, and any other potential security gaps that can
lead to a compromise of a web app.
Mobile apps. Using both automated and extended manual testing, testers look for
vulnerabilities in application binaries running on the mobile device and the
corresponding server-side functionality. Server-side vulnerabilities include session
management, cryptographic issues, authentication and authorization issues, and
other common web service vulnerabilities.
Networks. This testing identifies common to critical security vulnerabilities in an
external network and systems. Experts employ a checklist that includes test cases
for encrypted transport protocols, SSL certificate scoping issues, use of
administrative services, and more.
Cloud. A cloud environment is significantly different than traditional on-premises
environments. Typically, security responsibilities are shared between the
organization using the environment and the cloud services provider. Because of
this, cloud pen testing requires a set of specialized skills and experience to
scrutinize the various aspects of the cloud, such as configurations, APIs, various
databases, encryption, storage, and security controls.
Containers. Containers obtained from Docker often have vulnerabilities that can be
exploited at scale. Misconfiguration is also a common risk associated with
containers and their environment. Both of these risks can be uncovered with expert
pen testing.
Embedded devices (IoT). Embedded / Internet of Things (IoT) devices such as
medical devices, automobiles, in-home appliances, oil rig equipment, and watches
have unique software testing requirements due to their longer life cycles, remote
locations, power constraints, regulatory requirements, and more. Experts perform a
thorough communication analysis along with a client/server analysis to identify
defects that matter most to the relevant use case.
Mobile devices. Pen testers use both automated and manual analysis to find
vulnerabilities in application binaries running on the mobile device and the
corresponding server-side functionality. Vulnerabilities in application binaries can
include authentication and authorization issues, client-side trust issues,
misconfigured security controls, and cross-platform development framework issues.
Server-side vulnerabilities can include session management, cryptographic issues,
authentication and authorization issues, and other common web service
vulnerabilities.
APIs. Both automated and manual testing techniques are used to cover the OWASP
API Security Top 10 list. Some of the security risks and vulnerabilities testers look
for include broken object level authorization, user authentication, excessive data
exposure, lack of resources / rate limiting, and more.
CI/CD pipeline. Modern DevSecOps practices integrate automated and intelligent
code scanning tools into the CI/CD pipeline. In addition to static tools that find
known vulnerabilities, automated pen testing tools can be integrated into the CI/CD
pipeline to mimic what a hacker can do to compromise the security of an
application. Automated CI/CD pen testing can discover hidden vulnerabilities and
attack patterns that go undetected with static code scanning.
There is no one-size-fits-all tool for pen testing. Instead, different targets require different
sets of tools for port scanning, application scanning, Wi-Fi break-ins, or direct penetration
of the network. Broadly speaking, the types of pen testing tools fit into five categories.
Although pen testing is mostly a manual effort, pen testers do use automated scanning and
testing tools. But they also go beyond the tools and use their knowledge of the latest attack
techniques to provide more in-depth testing than a vulnerability assessment (i.e., automated
testing).
Manual pen testing
Manual pen testing uncovers vulnerabilities and weaknesses not included in popular lists
(e.g., OWASP Top 10) and tests business logic that automated testing can overlook (e.g.,
data validation, integrity checks). A manual pen test can also help identify false positives
reported by automated testing. Because pen testers are experts who think like adversaries,
they can analyze data to target their attacks and test systems and websites in ways
automated testing solutions following a scripted routine cannot.
Automated testing
Automated testing generates results faster and needs fewer specialized professionals than a
fully manual pen testing process. Automated testing tools track results automatically and
can sometimes export them to a centralized reporting platform. Also, the results of manual
pen tests can vary from test to test, whereas running automated testing repeatedly on the
same system will produce the same results.
With the frequency and severity of security breaches increasing year after year,
organizations have never had a greater need for visibility into how they can withstand
attacks. Regulations such as PCI DSS and HIPAA mandate periodic pen testing to remain
current with their requirements. With these pressures in mind, here are some pros and cons
for this type of defect discovery technique.
Pros of pen testing
Computer security technology encompasses a wide array of practices, tools, and methods
designed to protect computer systems, networks, and data from unauthorized access, theft,
damage, or any form of cyber attack. It is a crucial aspect of information technology that
ensures the confidentiality, integrity, and availability of data. Here are the key components:
1. Firewalls: These are network security devices that monitor incoming and outgoing
network traffic and decide whether to allow or block specific traffic based on a
defined set of security rules. Firewalls can be hardware-based, software-based, or
both.
Detail: Firewalls act as a barrier between your internal network and incoming traffic from
external sources (such as the internet) to block malicious traffic like viruses and hackers.
Advantages: Protect against external attacks, manage network traffic, and prevent
unauthorized access.
Disadvantages: Can be complex to configure, might slow down network performance if not
properly optimized, and cannot protect against internal threats or attacks that bypass the
firewall.
Implementation Process: Identify network requirements, select between hardware and
software firewalls or use both (known as a dual firewall), configure firewall rules according
to your security policy, and regularly update and review firewall rules.
Types: Packet-filtering firewalls, stateful inspection firewalls, proxy firewalls, next-
generation firewalls (NGFW), and network address translation (NAT) firewalls.
2. Antivirus and Anti-malware Software: This software is used to prevent, detect, and
remove malicious software (malware) like viruses, worms, and spyware. These tools
often include real-time scanning features to detect malware as it appears.
Detail: Software designed to detect, prevent, and remove malware, including viruses, worms,
and spyware.
Advantages: Provides real-time protection against a wide range of malware, can remove
existing infections, and often includes tools for web security and email protection.
Disadvantages: Can impact system performance, might not catch all malware (especially new
or sophisticated threats), and requires regular updates to be effective.
Implementation Process: Choose an antivirus solution that fits your needs, install the software
on all devices, configure settings for regular scans and updates, and educate users about not
disabling protection.
Types: Signature-based detection, behavior-based detection (heuristic analysis), sandbox
detection, and cloud-based antivirus.
3. Encryption: The process of encoding data so that only authorized users can access it.
Encryption can protect data in transit (over the network) and at rest (stored on a
device).
Detail: The conversion of data into a coded form that can only be accessed and decrypted by
someone who has the encryption key.
Advantages: Secures data from unauthorized access, ensures data integrity, and is essential
for protecting sensitive information.
Disadvantages: Can be complex to implement correctly, encrypted data can still be
compromised if the encryption keys are stolen, and performance overhead.
Implementation Process: Identify sensitive data, choose an encryption standard (such as AES
or RSA), implement encryption at the desired layers (disk, file, database, or communication
channels), manage encryption keys securely.
Types: Symmetric encryption, asymmetric encryption, and hashing.
4. Access Control: Ensures that only authorized users have access to specific resources.
This involves creating user accounts with permissions tailored to the individual's role
within the organization, implementing strong authentication methods, and sometimes
using biometric verification.
Detail: Systems and processes that limit access to resources, data, or applications to
authorized users only.
Advantages: Minimizes risk of unauthorized access, helps in data protection, and ensures that
users can only access the information necessary for their roles.
Disadvantages: Can be complex to manage, especially in large organizations, and improper
configurations can lead to either excessive access or too restrictive access.
Implementation Process: Define access control policies, classify data and resources,
implement an access control model (e.g., RBAC, ABAC), enforce authentication and
authorization mechanisms, and regularly review access rights.
Types: Discretionary Access Control (DAC), Mandatory Access Control (MAC), Role-based
Access Control (RBAC), and Attribute-based Access Control (ABAC).
5. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS): IDS
monitors network or system activities for malicious activities or policy violations,
while IPS actively blocks potential threats based on the detection.
Detail: IDS monitors network and system activities for malicious activities or policy
violations, whereas IPS takes active measures to block potential threats.
Advantages: Enhances network security by detecting and preventing attacks, provides
insights into malicious activities, and helps in compliance with security policies.
Disadvantages: IDS can generate false positives and negatives, IPS might block legitimate
traffic if misconfigured, and both require significant management and updating.
Implementation Process: Define security requirements, select between host-based and
network-based systems, configure detection rules and responses, and continuously update and
monitor for new threats.
Types: Signature-based, anomaly-based, and stateful protocol analysis for IDS/IPS.
6. Data Loss Prevention (DLP): Technologies and practices that prevent unauthorized
users from accessing or sharing sensitive information. DLP solutions can monitor,
detect, and block sensitive data while in use (endpoint actions), in motion (network
traffic), and at rest (data storage).
Advantages of SIEM:
Real-time Visibility: SIEM provides real-time analysis of security alerts generated by
applications and network hardware, enabling immediate detection of potential security
incidents.
Improved Incident Detection and Response: By correlating events from different sources,
SIEM can identify complex threats that might not be detectable through individual logs,
improving the overall incident detection and response capabilities.
Compliance Management: Many SIEM solutions come with built-in features to help
organizations comply with industry regulations by generating reports that detail the
organization’s adherence to required security standards.
Enhanced Threat Hunting: SIEM systems allow security teams to proactively search through
historical data for indicators of compromise (IoCs) and other signs of advanced persistent
threats (APTs) or insider threats.
Disadvantages of SIEM:
Complexity: SIEM systems can be complex to configure and manage, requiring specialized
knowledge to ensure they are tuned correctly to minimize false positives and false negatives.
Resource-Intensive: The process of collecting, storing, and analyzing large volumes of data
demands significant computational resources and storage capacity.
High Cost: The cost of SIEM solutions, including hardware, software, and operational costs
(such as staff training and additional personnel), can be prohibitive for some organizations.
Alert Fatigue: The high volume of alerts generated by SIEM systems can overwhelm security
teams, potentially leading to important alerts being overlooked.
Implementation Process of SIEM:
Needs Assessment: Evaluate the organization's security needs, regulatory requirements, and
the specific IT environment to select a SIEM solution that best fits these criteria.
Solution Selection: Choose a SIEM solution based on the organization’s size, complexity,
budget, and specific security and compliance needs.
Deployment Planning: Plan the deployment, including deciding which log sources to include,
determining storage requirements, and establishing processes for incident response.
Configuration and Customization: Configure the SIEM system to collect logs from the
chosen sources, and customize the system to accurately reflect the organization’s
environment and to filter out irrelevant data.
Tuning and Optimization: Continuously tune the SIEM system to refine its accuracy in
detecting real threats while minimizing false positives and false negatives.
Training and Awareness: Train security personnel on the effective use of the SIEM system,
including how to analyze alerts and conduct investigations.
Types of SIEM:
Traditional SIEM: Focuses on log collection, management, and rule-based analysis. Best
suited for organizations with well-defined security processes and experienced security teams.
Next-Generation SIEM: Incorporates advanced analytics, machine learning, and threat
intelligence to improve detection of sophisticated threats. Designed for dynamic
environments and aimed at reducing false positives.
Cloud-based SIEM: Offers SIEM as a service, reducing the need for on-premises hardware
and specialized staff. Ideal for organizations looking for scalability and flexibility.
Hybrid SIEM: Combines on-premises and cloud-based features, offering flexibility for
organizations transitioning to the cloud or with specific compliance needs requiring on-
premises data retention.
8. Virtual Private Networks (VPN): A technology that creates a safe and encrypted
connection over a less secure network, such as the internet. VPNs are used to protect
privacy and secure data as it travels across the internet.
Advantages:
Enhances online privacy and security by encrypting internet traffic, making it difficult for
hackers to intercept data.
Allows remote access to secure network resources as if the user is directly connected to the
network, which is beneficial for remote workers.
Disadvantages:
The use of VPNs can potentially slow down internet speeds due to encryption overhead and
the distance data travels to the VPN server.
Free or low-quality VPN services might have security flaws or log user activity,
compromising privacy.
Implementation Process:
Determine the VPN needs (remote access vs. site-to-site, number of users, etc.).
Select a reputable VPN service provider or acquire VPN hardware/software for self-hosting.
Install VPN client software on devices or configure the network for VPN access.
Train users on how to connect to the VPN and educate them about security practices while
using it.
Types:
Remote Access VPN: Allows users to connect to a private network from anywhere.
Site-to-Site VPN: Connects entire networks to each other, often used for connecting branch
offices to a central office.
Client-based VPN vs. Browser-based VPN: Where clients require software installation,
browser-based provides VPN functionality within a web browser without additional software.
9. Patch Management: The process of managing updates for software applications and
technologies. Keeping software up to date is crucial in protecting against
vulnerabilities that could be exploited by hackers.
Advantages:
Keeps software and systems up to date, reducing the risk of exploitation by known
vulnerabilities.
Helps ensure compliance with regulatory standards that require up-to-date security measures.
Disadvantages:
Patches can sometimes introduce new issues or incompatibilities with existing systems or
software.
Requires a rigorous testing and deployment process to minimize disruptions.
Implementation Process:
Inventory all IT assets to understand what software and systems are in use and need to be
maintained.
Subscribe to vulnerability alerts and updates from software vendors.
Test patches in a controlled environment before wide deployment to prevent operational
issues.
Automate patch deployment when possible, using patch management tools to streamline the
process.
Monitor and report on patching status and compliance.
Types:
Operating System Patches: Updates for the underlying operating system, addressing security
vulnerabilities and functionality improvements.
Application Patches: Updates for specific applications, fixing security holes or adding
features.
Firmware Patches: Updates for hardware devices' firmware, improving security or
functionality.
10. Cybersecurity Training: Educating users and employees about the risks of cyber
threats and the best practices to mitigate these risks. This includes awareness about
phishing attacks, safe browsing habits, and the importance of using strong, unique
passwords.
Advantages:
Empowers employees to recognize and respond appropriately to cybersecurity threats,
significantly reducing the risk of successful attacks.
Promotes a culture of security awareness within the organization.
Disadvantages:
Requires ongoing effort and resources to keep training materials up to date and engaging.
Effectiveness can vary depending on the employee's engagement and the quality of the
training material.
Implementation Process:
Assess the specific cybersecurity risks and knowledge gaps within the organization.
Develop or procure training materials that are relevant to the organization's needs, including
policies, procedures, and threat awareness.
Deliver training through various methods such as online courses, in-person sessions, and
interactive workshops.
Regularly update training content to reflect the latest threats and best practices.
Test and evaluate employee knowledge and adjust training programs based on feedback and
assessments.
Types:
General Awareness Training: Broad training focused on common cybersecurity practices and
policies.
Role-based Training: Tailored training that addresses the specific risks and responsibilities
associated with particular roles within the organization.
Simulated Attack Training: Engages employees with mock phishing emails or other attack
simulations to practice recognizing and responding to threats.
Computer Virus
Definition
A computer virus is a piece of code that gets implanted in a program and is constructed with
the ability to self-replicate; affecting other programs on a computer. It’s just like how humans
get a cold or flu, it can remain dormant within the system and get activated when you least
expect it.
A virus has the potential to cause unexpected damage to the system, such as harming the
system software by corrupting or destroying data.
A computer virus is formed to diffuse from one host to another and thus there are numerous
ways how the user’s computer catches it. It can be through email attachments, downloaded
files, during software installations, or using unsecured links. These viruses can steal the
user’s data such as passwords, hack into their social media accounts or online banking
accounts, and also wipe out all the saved data.
When a virus program is executed, it replicates itself by changing other computer programs
and rather enters its coding. This code infects a file or program and if it grows massively, it
may ultimately result in the crashing of the device. Certain indications can help you analyze
that a device is virus-hit. Given below are some of them:
1. In case a virus is fully executed into a user’s device, the time needed to open any
application may become longer and the entire system processing becomes slower.
2. Started getting too many pops up on the window or screen while working, this is also
an indication of a virus attack on the system.
3. Files or applications may begin to open by themselves in the background of the
system without the user’s knowledge.
4. In case of a virus attack, the possibility of accounts getting hacked increases and even
the user might get logged out of all the systems and applications.
5. In most cases, if the virus grows at maximum then changes can be seen in the files
and programs, and this may even lead to a system crash.
Boot Sector Virus – It is a type of virus that infects the boot sector of floppy disks or
the Master Boot Record (MBR) of hard disks. The Boot sector comprises all the files
which are required to start the Operating system of the computer. The virus either
overwrites the existing program or copies itself to another part of the disk.
Direct Action Virus – When a virus attaches itself directly to a .exe or .com file and
enters the device while its execution is called a Direct Action Virus. If it gets installed
in the memory, it keeps itself hidden. It is also known as Non-Resident Virus.
Resident Virus – A virus which saves itself in the memory of the computer and then
infects other files and programs when its originating program is no longer working.
This virus can easily infect other files because it is hidden in the memory and is hard
to be removed from the system.
Multipartite Virus – A virus which can attack both, the boot sector and the
executable files of an already infected computer is called a multipartite virus. If a
multipartite virus attacks your system, you are at risk of cyber threat.
Overwrite Virus – One of the most harmful viruses, the overwrite virus can
completely remove the existing program and replace it with the malicious code by
overwriting it. Gradually it can completely replace the host’s programming code with
the harmful code.
Polymorphic Virus – Spread through spam and infected websites, the polymorphic
virus are file infectors which are complex and are tough to detect. They create a
modified or morphed version of the existing program and infect the system and retain
the original code.
File Infector Virus – As the name suggests, it first infects a single file and then later
spreads itself to other executable files and programs. The main source of this virus are
games and word processors.
Spacefiller Virus – It is a rare type of virus which fills in the empty spaces of a file
with viruses. It is known as cavity virus. It will neither affect the size of the file nor
can be detected easily.
Macro Virus – A virus written in the same macro language as used in the software
program and infects the computer if a word processor file is opened. Mainly the
source of such viruses is via emails.
Online download
Buying an Anti-virus software and installing it
Further below, we bring to you details as to what anti-virus is and what are its different types
along with a few examples.
– Desktop antivirus: This type of antivirus software is installed on a computer and protects it
from viruses.
– Mobile antivirus: This type of antivirus software is installed on a mobile device and
protects it from viruses.
– Web antivirus: This type of antivirus software is installed on a web server and protects it
from viruses.
– Network antivirus: This type of antivirus software is installed on a network and protects it
from viruses.
What is an Anti-Virus?
An anti-virus is a software which comprises programs or set of programs which can detect
and remove all the harmful and malicious software from your device. This anti-virus software
is designed in a manner that they can search through the files in a computer and determine the
files which are heavy or mildly infected by a virus.
Given below is a list of few of the major antivirus software which is most commonly used:
Norton Antivirus
F-Secure Antivirus
Kaspersky Antivirus
AVAST Antivirus
Comodo Antivirus
McAfee Antivirus
These are few of the many anti-virus software widely used to remove viruses from a device.
Firewalls
-=-=-
For example, the image depicted below shows how a firewall allows good traffic to pass to
the user’s private network.
Fig: Firewall allowing Good Traffic
However, in the example below, the firewall blocks malicious traffic from entering the
private network, thereby protecting the user’s network from being susceptible to a
cyberattack.
This way, a firewall carries out quick assessments to detect malware and other suspicious
activities.
It is used to inspect the incoming and outgoing traffic with the help of a set of rules to
identify and block threats by implementing it in software or hardware form.
Firewalls can be used in both personal and enterprise settings, and many devices come
with one built-in, including Mac, Windows, and Linux computers.
Antivirus
Antivirus can deal with external threats as well as internal threats by implementing only
through software.
Limitations of a Firewall
Firewalls are not able to stop the users from accessing the data or information from
malicious websites, making them vulnerable to internal threats or attacks.
It is not able to protect against the transfer of virus-infected files or software if security
rules are misconfigured, against non-technical security risks (social engineering)
It does not prevent misuse of passwords and attackers with modems from dialing in to or
out of the internal network.
Antispyware
Spyware is malicious software that enters a user’s computer, gathers data from the device
and user, and sends it to third parties without their consent. A commonly accepted spyware
definition is a strand of malware designed to access and damage a device without the user’s
consent.
Spyware collects personal and sensitive information that it sends to advertisers, data
collection firms, or malicious actors for a profit. Attackers use it to track, steal, and sell user
data, such as internet usage, credit card, and bank account details, or steal user credentials to
spoof their identities.
Spyware is one of the most commonly used cyberattack methods that can be difficult for
users and businesses to identify and can do serious harm to networks. It also leaves
businesses vulnerable to data breaches and data misuse, often affects device and network
performance, and slows down user activity.
The term "spyware" first emerged in online discussions in the 1990s, but only in the early
2000s did cybersecurity firms use it to describe unwanted software that spied on their user
and computer activity. The first anti-spyware software was released in June 2000, then four
years later, scans showed that around 80% of internet users had their systems affected by
spyware, according to research by America Online and the National Cyber Security Alliance.
However, 89% of users were unaware of the spyware’s existence and 95% had not granted
permission for it to be installed.
Types of Spyware
Attackers use various types of spyware to infect users’ computers and devices. Each spyware
variety gathers data for the attacker, with the lesser types monitoring and sending data to a
third party. But more advanced and dangerous spyware types will also make modifications to
a user’s system that results in them being exposed to further threats.
1. Adware: This sits on a device and monitors users’ activity then sells their data to advertisers
and malicious actors or serves up malicious ads.
2. Infostealer: This is a type of spyware that collects information from devices. It scans them for
specific data and instant messaging conversations.
3. Keyloggers: Also known as keystroke loggers, keyloggers are a type of infostealer spyware.
They record the keystrokes that a user makes on their infected device, then save the data into
an encrypted log file. This spyware method collects all of the information that the user types
into their devices, such as email data, passwords, text messages, and usernames.
4. Rootkits: These enable attackers to deeply infiltrate devices by exploiting security
vulnerabilities or logging into machines as an administrator. Rootkits are often difficult and
even impossible to detect.
5. Red Shell: This spyware installs itself onto a device while a user is installing specific PC
games, then tracks their online activity. It is generally used by developers to enhance their
games and improve their marketing campaigns.
6. System monitors: These also track user activity on their computer, capturing information like
emails sent, social media and other sites visited, and keystrokes.
7. Tracking cookies: Tracking cookies are dropped onto a device by a website and then used to
follow the user’s online activity.
8. Trojan Horse Virus: This brand of spyware enters a device through Trojan malware, which is
responsible for delivering the spyware program.
Most spyware targets Windows computers and laptops, but attackers are increasingly
targeting other forms of devices.
1. Apple device spyware: Malware targeting Apple devices, particularly its Mac computers, has
increased rapidly in the last few years. Mac spyware is similar in behavior to those targeting
Windows operating systems but are typically password-stealing or backdoor types of
spyware. They frequently see the attacker attempt attacks such as keylogging, password
phishing, remote code execution, and screen captures.
2. Mobile spyware: Spyware targeting mobile devices steals data such as call logs, browser
history, contact lists, photos, and short message service (SMS) messages. Certain types will
log user keystrokes, record using the device’s microphone, take photos, and track location
using Global Positioning System (GPS) trackers. Others take control of devices through
commands sent from SMS messages, data transfers, and remote servers. Hackers can also use
mobile spyware to breach an organization through mobile device vulnerabilities, which may
not be detected by the security team.
All types of spyware sit on a user’s device and spy on their activity, the sites they visit, and
the data they amass or share. They do this with the objective of monitoring user activity,
tracking login and password details, and detecting sensitive data.
Other spyware strands are also capable of installing further software on the user’s device,
which enables the attacker to make changes to the device. But spyware typically follows a
three-step process from being installed on a device to sending or selling the information it has
stolen.
1. Step 1—Infiltrate: Spyware is installed onto a device through the use of an application
installation package, a malicious website, or as a file attachment.
2. Step 2—Monitor and capture: Once installed, the spyware gets to work following the user
around the internet, capturing the data they use, and stealing their credentials, login
information, and passwords. It does this through screen captures, keystroke technology, and
tracking codes.
3. Step 3—Send or sell: With data and information captured, the attacker will either use the data
amassed or sell it to a third party. If they use the data, they could take the user credentials to
spoof their identity or use them as part of a larger cyberattack on a business. If they sell, they
could use the data for a profit with data organizations, other hackers, or put it on the dark
web.
Through this process, the attacker can collect and sell highly sensitive information, such as
the user’s email addresses and passwords, internet usage information and browsing habits,
financial details, and account personal identification number (PIN) codes.
One common method for delivering spyware is bundleware. This is a bundle of software
packages that attaches itself to other programs that a user downloaded or installed. As a
result, it will install without the user knowing about it. Other bundleware packages force the
user to agree to download a full software bundle, with no idea that they have voluntarily
infected their device. Spyware can also infiltrate a computer through the same routes as other
forms of malware, such as compromised or spoofed websites and malicious email
attachments.
The effects of spyware are wide-ranging. Some could go unseen, with users not knowing they
have been affected for months or even years. Others might just cause an inconvenience that
users may not realize is the result of being hacked. Some forms of spyware are capable of
causing reputational and financial damage.
1. Data theft: One of the most common problems caused by spyware is data theft. Spyware is
used to steal users’ personal data, which can then be sold to third-party organizations,
malicious actors, or hacking groups.
2. Identity fraud: If spyware harvests enough data, then it can be used for identity fraud. This
sees the attacker amass data like browsing history, login credentials for email accounts,
online banking, social networks, and other websites to spoof or imitate the user’s identity.
3. Device damage: Some spyware will be poorly designed, which ends up having a negative
effect on the computer it attaches itself to. This can end up draining system performance and
eating up huge amounts of internet bandwidth, memory, and processing power. Even worse,
spyware can cause operating systems to crash, disable internet security software, and make
computers overheat, which can cause permanent damage to the computer.
4. Browsing disruption: Some spyware can take control of the user’s search engine to serve up
harmful, fraudulent, or unwanted websites. They can also change homepages and alter
computer settings, as well as repeatedly push pop-up ads.
Spyware can increasingly affect any device, from computers and laptops to mobile phones
and tablets. Devices that run Windows operating systems are typically the most susceptible to
an attack, but cyber criminals are increasingly devising methods that afflict Apple and mobile
devices.
Some of the most prominent causes of spyware infiltrating a device or system include:
1. Misleading marketing: Spyware authors will often disguise their malicious software as a
legitimate tool, such as a hard disk cleaner, download manager, or new web browser.
2. Phishing or spoofing: Phishing occurs when an attacker encourages a recipient to click on a
malicious link or attachment in an email, then steals their credentials. They often use spoofed
websites that appear to be a legitimate site that steal users’ passwords and personal
information.
3. Security vulnerabilities: Attackers often target code and hardware vulnerabilities to gain
unauthorized access to devices and systems and plant their spyware.
4. Software bundles: Bundleware sees users unknowingly install spyware within a bundle of
software they believe to be legitimate.
5. Trojans: A Trojan is a type of malware that pretends to be another piece of software. Cyber
criminals use Trojans as a method for delivering malware strains, such as spyware,
cryptojackers, and viruses, onto devices.
A device can also become infected with spyware as a result of a user’s actions, such as:
Spyware Removal
If a device is showing signs of spyware, then it is important to get the device and any
connected systems cleaned up and protected again. The removal of spyware is possible
through solutions that can identify and remove malicious files.
The first step in removing spyware is to ensure the system is cleared of infection. This will
prevent new password changes and future logins from also being stolen. It is also important
to purchase robust cybersecurity software that offers comprehensive spyware removal, deep
cleans devices affected by spyware, and repairs any files or systems that may have been
infected.
With the system cleaned up, financial services need to be advised that potentially fraudulent
activity has occurred that could affect bank accounts and credit cards. If the spyware has
affected an organization, then legal and regulatory violations need to be reported to the
appropriate law enforcement agency.
Spyware Protection
Spyware and other malicious attack methods are a constant threat to any device connected to
the internet. Therefore, the first line of defense against spyware is to deploy an internet
security solution that includes proactive anti-malware and antivirus detection. In addition,
tools like antispam filters, cloud-based detection, and virtual encrypted keyboards are useful
to eliminate potentially malicious risks.
Some spyware types are also able to install software and modify the settings on a user’s
device. This means it is also vital for users to use secure passwords, not recycle their
credentials on multiple applications and websites, and use processes like multi-factor
authentication (MFA) to keep their identity secure and their devices updated.
In addition to software, there are several steps that can be taken to protect devices and
systems:
1. Cookie consent: It can be easy for users to simply click "accept" on the cookie consent pop-
ups that appear on nearly every website they visit. However, they need to be careful about
issuing their consent every time and only accept cookies from websites they trust.
2. Browser extensions: Users can also install anti-tracking extensions that prevent the relentless
online tracking of their activity on web browsers. These extensions can block activity
tracking by both reputable sources and malicious actors, keeping users’ data private when
they access the internet.
3. Security updates: Updating software with the latest versions is vital to preventing spyware
and other types of malware. Spyware typically makes its way onto devices through gaps in
code or vulnerabilities in operating systems. So it is important to constantly patch potential
issues and fix vulnerabilities immediately.
4. Avoid free software: It can be appealing to download free software, but doing so can have
costly ramifications for users and their organizations. The free software may be insecure and
the creator can make a profit from users’ data.
5. Use secure networks: Unsecured Wi-Fi networks are an easy resource for hackers to breach
devices. Avoid using free Wi-Fi networks, and only connect to trusted, secure networks.
6. Best practice and behavior: Practicing good cybersecurity behavior is crucial to avoiding
spyware. All users need to be aware of the security risks they face, avoid opening emails or
downloading files from people they do not know, and make it a habit to hover over links to
check if they are reputable before clicking on them.
Computer and laptop users can follow steps to keep their devices secure. These include
enabling and downloading pop-up blockers on their desktops and limiting allowed
applications and permissions. All users should also avoid clicking links or opening
attachments in all emails, even those purporting to be from trusted senders, as this is a prime
delivery method for spyware and other malicious attacks.
IDS
An Intrusion Detection System (IDS) maintains network traffic looks for unusual activity and
sends alerts when it occurs. The main duties of an Intrusion Detection System (IDS) are
anomaly detection and reporting, however, certain Intrusion Detection Systems can take
action when malicious activity or unusual traffic is discovered. In this article, we will discuss
every point about the Intrusion Detection System.
What is an Intrusion Detection System?
A system called an intrusion detection system (IDS) observes network traffic for malicious
transactions and sends immediate alerts when it is observed. It is software that checks a
network or system for malicious activities or policy violations. Each illegal activity or
violation is often recorded either centrally using an SIEM system or notified to an
administration. IDS monitors a network or system for malicious activity and protects a
computer network from unauthorized access from users, including perhaps insiders. The
intrusion detector learning task is to build a predictive model (i.e. a classifier) capable of
distinguishing between ‘bad connections’ (intrusion/attacks) and ‘good (normal)
connections’.
IDS
Working of Intrusion Detection System(IDS)
An IDS (Intrusion Detection System) monitors the traffic on a computer network to
detect any suspicious activity.
It analyzes the data flowing through the network to look for patterns and signs of
abnormal behavior.
The IDS compares the network activity to a set of predefined rules and patterns to
identify any activity that might indicate an attack or intrusion.
If the IDS detects something that matches one of these rules or patterns, it sends an alert
to the system administrator.
The system administrator can then investigate the alert and take action to prevent any
damage or further intrusion.
Classification of Intrusion Detection System(IDS)
Intrusion Detection System are classified into 5 types:
Network Intrusion Detection System (NIDS): Network intrusion detection systems
(NIDS) are set up at a planned point within the network to examine traffic from all
devices on the network. It performs an observation of passing traffic on the entire
subnet and matches the traffic that is passed on the subnets to the collection of known
attacks. Once an attack is identified or abnormal behavior is observed, the alert can be
sent to the administrator. An example of a NIDS is installing it on the subnet where
firewalls are located in order to see if someone is trying to crack the firewall.
Network Intrusion Detection System
Host Intrusion Detection System (HIDS): Host intrusion detection systems (HIDS)
run on independent hosts or devices on the network. A HIDS monitors the incoming
and outgoing packets from the device only and will alert the administrator if suspicious
or malicious activity is detected. It takes a snapshot of existing system files and
compares it with the previous snapshot. If the analytical system files were edited or
deleted, an alert is sent to the administrator to investigate. An example of HIDS usage
can be seen on mission-critical machines, which are not expected to change their layout.
Protocol-based Intrusion Detection System (PIDS): Protocol-based intrusion
detection system (PIDS) comprises a system or agent that would consistently reside at
the front end of a server, controlling and interpreting the protocol between a user/device
and the server. It is trying to secure the web server by regularly monitoring the HTTPS
protocol stream and accepting the related HTTP protocol. As HTTPS is unencrypted
and before instantly entering its web presentation layer then this system would need to
reside in this interface, between to use the HTTPS.
Application Protocol-based Intrusion Detection System (APIDS): An application
Protocol-based Intrusion Detection System (APIDS) is a system or agent that generally
resides within a group of servers. It identifies the intrusions by monitoring and
interpreting the communication on application-specific protocols. For example, this
would monitor the SQL protocol explicitly to the middleware as it transacts with the
database in the web server.
Hybrid Intrusion Detection System: Hybrid intrusion detection system is made by the
combination of two or more approaches to the intrusion detection system. In the hybrid
intrusion detection system, the host agent or system data is combined with network
information to develop a complete view of the network system. The hybrid intrusion
detection system is more effective in comparison to the other intrusion detection
system. Prelude is an example of Hybrid IDS.
Intrusion Detection System Evasion Techniques
Fragmentation: Dividing the packet into smaller packet called fragment and the
process is known as fragmentation. This makes it impossible to identify an intrusion
because there can’t be a malware signature.
Packet Encoding: Encoding packets using methods like Base64 or hexadecimal can
hide malicious content from signature-based IDS.
Traffic Obfuscation: By making message more complicated to interpret, obfuscation
can be utilised to hide an attack and avoid detection.
Encryption: Several security features, such as data integrity, confidentiality, and data
privacy, are provided by encryption. Unfortunately, security features are used by
malware developers to hide attacks and avoid detection.
Benefits of IDS
Detects malicious activity: IDS can detect any suspicious activities and alert the
system administrator before any significant damage is done.
Improves network performance: IDS can identify any performance issues on the
network, which can be addressed to improve network performance.
Compliance requirements: IDS can help in meeting compliance requirements by
monitoring network activity and generating reports.
Provides insights: IDS generates valuable insights into network traffic, which can be
used to identify any weaknesses and improve network security.
Detection Method of IDS
Signature-based Method: Signature-based IDS detects the attacks on the basis of the
specific patterns such as the number of bytes or a number of 1s or the number of 0s in
the network traffic. It also detects on the basis of the already known malicious
instruction sequence that is used by the malware. The detected patterns in the IDS are
known as signatures. Signature-based IDS can easily detect the attacks whose pattern
(signature) already exists in the system but it is quite difficult to detect new malware
attacks as their pattern (signature) is not known.
Anomaly-based Method: Anomaly-based IDS was introduced to detect unknown
malware attacks as new malware is developed rapidly. In anomaly-based IDS there is
the use of machine learning to create a trustful activity model and anything coming is
compared with that model and it is declared suspicious if it is not found in the model.
The machine learning-based method has a better-generalized property in comparison to
signature-based IDS as these models can be trained according to the applications and
hardware configurations.
Comparison of IDS with Firewalls
IDS and firewall both are related to network security but an IDS differs from a firewall as a
firewall looks outwardly for intrusions in order to stop them from happening. Firewalls
restrict access between networks to prevent intrusion and if an attack is from inside the
network it doesn’t signal. An IDS describes a suspected intrusion once it has happened and
then signals an alarm.
Placement of IDS
The most optimal and common position for an IDS to be placed is behind the firewall.
Although this position varies considering the network. The ‘behind-the-firewall’
placement allows the IDS with high visibility of incoming network traffic and will not
receive traffic between users and network. The edge of the network point provides the
network the possibility of connecting to the extranet.
In cases, where the IDS is positioned beyond a network’s firewall, it would be to defend
against noise from internet or defend against attacks such as port scans and network
mapper.An IDS in this position would monitor layers 4 through 7 of the OSI model and
would use Signature-based detection method. Showing the number of attemepted
breacheds instead of actual breaches that made it through the firewall is better as it
reduces the amount of false positives. It also takes less time to discover successful
attacks against network.
An advanced IDS incorporated with a firewall can be used to intercept complex attacks
entering the network. Features of advanced IDS include multiple security contexts in
the routing level and bridging mode. All of this in turn potentially reduces cost and
operational complexity.
Another choice for IDS placement is within the network. This choice reveals attacks or
suspicious activity within the network. Not acknowledging security inside a network is
detrimental as it may allow users to bring about security risk, or allow an attacker who
has broken into the system to roam around freely.
An IDS only needs to detect potential threats. It is placed out of band on the network
infrastructure. Consequently, it is not in the real-time communication path between the sender
and receiver of information.
IDS solutions often take advantage of a TAP or SPAN port to analyze a copy of the inline
traffic stream. This ensures that the IDS does not impact inline network performance.
When IDS was developed, the depth of analysis required to detect intrusion could not be
performed quickly enough. The speed would not keep pace with components on the direct
communications path of the network infrastructure.
Network intrusion detection systems are used to detect suspicious activity to catch hackers
before damage is done to the network. There are network-based and host-based intrusion
detection systems. Host-based IDSes are installed on client computers; network-based IDSes
are on the network itself.
An IDS works by looking for deviations from normal activity and known attack signatures.
Anomalous patterns are sent up the stack and examined at protocol and application layers. It
can detect events like DNS poisonings, malformed information packets and Christmas tree
scans.
There are five types of IDS: network-based, host-based, protocol-based, application protocol-
based and hybrid.
3. Protocol-based (PIDS)
A protocol-based intrusion detection system is usually installed on a web server. It monitors
and analyzes the protocol between a user/device and the server. A PIDS normally sits at the
front end of a server and monitors the behavior and state of the protocol.
4. Application protocol-based (APIDS)
An APIDS is a system or agent that usually sits inside the server party. It tracks and interprets
correspondence on application-specific protocols. For example, this would monitor the SQL
protocol to the middleware while transacting with the web server.
5. Hybrid intrusion detection system
A hybrid intrusion detection system combines two or more intrusion detection approaches.
Using this system, system or host agent data combined with network information for a
comprehensive view of the system. The hybrid intrusion detection system is more powerful
compared to other systems. One example of Hybrid IDS is Prelude.
There is also a subgroup of IDS detection methods, the two most common variants being:
1. Signature-based
A signature-based IDS monitors inbound network traffic, looking for specific patterns and
sequences that match known attack signatures. While it is effective for this purpose, it is
incapable of detecting unidentified attacks with no known patterns.
2. Anomaly-based
The anomaly-based IDS is a relatively newer technology designed to detect unknown attacks,
going beyond the identification of attack signatures. This type of detection instead uses
machine learning to analyze large amounts of network data and traffic.
Anomaly-based IDS creates a defined model of normal activity and uses it to identify
anomalous behavior. However, it is prone to false positives. For example, if a machine
demonstrates rare, but healthy behavior, it is identified as an anomaly. This results in a false
alarm.
IDses and Next-Generation Firewalls are both network security solutions. What differentiates
an IDS from a firewall is its purpose.
An IDS device monitors passively, describing a suspected threat when it’s happened and
signaling an alert. IDS watches network packets in motion. This allows incident response to
evaluate the threat and act as necessary. It does not, however, protect the endpoint or
network.
A firewall monitors actively, looking for threats to prevent them from becoming incidents.
Firewalls are capable of filtering and blocking traffic. They allow traffic based on
preconfigured rules, relying on ports, destination addresses and the source
Firewalls reject traffic that does not follow firewall rules. However, if an attack is coming
from inside the network, the IDS will not generate an alert.
A digital certificate is a form of electronic credential that can prove the authenticity of a user,
device, server, or website. It uses PKI to help exchange communications and data securely
over the internet.
This form of authentication is a type of cryptography that requires the use of public and
private keys to validate users.
Public key certificates are issued by trusted third parties, a CA, who signs the certificate, thus
verifying the identity of the device or user that is requesting access. To ensure validity, the
public key will be matched with a corresponding private key that only the recipient has
knowledge of. Digital certificates have a specific key pair that they are associated with: one
public and one private.
User’s name
Company or department of user
IP (internet protocol) address or serial number of device
Copy of the public key from a certificate holder
Duration of time the certificate is valid for
Domain certificate is authorized to represent
Digital certification can offer a level of security that is increasingly important in this digital
age. In fact, cybersecurity has been named one of the top priorities of the U.S. Government
by the Department of Homeland Security (DHS). Cybercrime is a major threat to businesses
and individuals.
TLS/SSL Certificate
Domain Validated
A domain validated certificate is a quick validation method that is acceptable for any website.
It is cheap to obtain and can be issued in a matter of minutes.
Organization Validated
This provides light business authentication and is ideal for organizations selling products
online through e-commerce.
Extended Validation
This offers full business authentication, which is required by larger organizations or any
business dealing with highly sensitive information. It is typically used by businesses in the
financial industry and offers the highest level of authentication, security, and trust.
Code Signing Certificate
A code signing certificate is used to confirm the authenticity of software or files downloaded
through the internet. The developer or publisher signs the software to confirm that it is
genuine to users that download it. This is useful for software providers that make their
programs available on third-party sites to prove that files have not been tampered with.
Client Certificate
A client certificate is a digital ID that identifies an individual user to another user or machine,
or one machine to another. A common example of this is email, where a sender signs a
communication digitally and its signature is verified by the recipient. Client certificates can
also be used to help users access protected databases.
Who Can Issue a Digital Certificate?
Digital certificates are issued by CAs, which sign a certificate to prove the authenticity of the
individual or organization that issued the request. A CA is responsible for managing domain
control verification and verifying that the public key attached to the certificate belongs to the
user or organization that requested it. They play an important part in the PKI process and
keeping internet traffic secure.
Security
Digital certificates encrypt internal and external communications to prevent attackers from
intercepting and stealing sensitive data. For example, a TLS/SSL certificate encrypts data
between a web server and a web browser, ensuring an attacker cannot intercept website
visitors’ data.
Scalability
Digital certificates provide businesses of all shapes and sizes with the same encryption
quality. They are highly scalable, which means they can easily be issued, revoked, and
renewed in seconds, used to secure user devices, and managed through a centralized platform.
Authenticity
Digital certificates are crucial to ensuring the authenticity of online communication in the age
of widespread cyberattacks. They make sure that users’ messages will always reach their
intended recipient—and only reach their intended recipient. TLS/SSL certificates encrypt
websites, Secure/Multipurpose Internet Mail Extensions (S/MIME) encrypt email
communication, and document-signing certificates can be used for digital document sharing.
Reliability
Only publicly trusted CAs can issue recognized digital certificates. Obtaining one requires
rigorous vetting, which ensures hackers or fake organizations cannot trick victims that use a
digital certificate.
Public Trust
Using a digital certificate provides confirmation that a website is genuine and that documents
and emails are authentic. This projects public trust, assuring clients that they are dealing with
a genuine company that values their security and privacy
SSL/TLS
SSL (Secure Sockets Layer) encryption, and its more modern and secure replacement, TLS
(Transport Layer Security) encryption, protect data sent over the internet or a computer
network. This prevents attackers (and Internet Service Providers) from viewing or tampering
with data exchanged between two nodes—typically a user’s web browser and a web/app
server. Most website owners and operators have an obligation to implement SSL/TLS to
protect the exchange of sensitive data such as passwords, payment information, and other
personal information considered private.
SSL/TLS (Secure Sockets Layer and Transport Layer Security) – cryptographic protocols
enabling secure internet communication.
There are several different types of SSL certificates. One certificate can apply to a single
website or several websites, depending on the type:
SSL certificates also come with different validation levels. A validation level is like a
background check, and the level changes depending on the thoroughness of the check.
There are several different types of SSL certificates. One certificate can apply to a single
website or several websites, depending on the type:
SSL certificates also come with different validation levels. A validation level is like a
background check, and the level changes depending on the thoroughness of the check.
Encryption Process
The encryption process in SSL/TLS involves several steps:
1. Handshake Protocol: Initially, the client and server establish a secure connection
using a 'handshake'. This involves the exchange of encryption algorithms, keys, and
other session details.
2. Symmetric Encryption: Once the handshake is complete, a symmetric key is used
for encrypting the data transmitted during the session. This key is known only to the
client and server, ensuring privacy.
3. Asymmetric Encryption: During the handshake, asymmetric encryption is used
for key exchange. This involves a public key (known to all) and a private key (known
only to the recipient).
Authentication through Digital Certificates
SSL/TLS uses digital certificates for authentication:
Certificate Authorities (CAs): These are trusted entities that issue digital
certificates. They validate the identity of the certificate holder.
Public Key Infrastructure (PKI): This infrastructure underpins the use of digital
certificates and keys. It includes policies and procedures for creating, managing, and
validating certificates.
Certificate Validation: When a client connects to a server, it checks the server's
certificate against a list of trusted CAs. If the certificate is valid, it confirms the
server's authenticity.
Data Integrity
SSL/TLS protocols ensure data integrity through:
----00-
Difference between Secure Socket Layer (SSL) and Transport Layer Security (TLS)
SSL TLS
SSL stands for Secure Socket Layer. TLS stands for Transport Layer Security.
SSL (Secure Socket Layer) supports TLS (Transport Layer Security) does not
the Fortezza algorithm. support the Fortezza algorithm.
SSL (Secure Socket Layer) is the 3.0 TLS (Transport Layer Security) is the 1.0
version. version.
SSL uses port to set up explicit TLS uses protocol to set up implicit
connection. connection.
SSL TLS
SSL means Secure Sockets
Stands For TLS means Transport Layer Security.
Layer.
SSL is now replaced with TLS. TLS is the upgraded version of SSL.
Version
SSL moved through versions TLS has moved through versions 1.0,
History
1.0, 2.0, and 3.0. 1.1, 1.2, and 1.3.
Every SSL version is now TLS versions 1.2 and 1.3 are actively
Activity
deprecated. used.
SSL has only two types of alert
Alert TLS alert messages are encrypted and
messages. Alert messages are
Messages more diverse.
unencrypted.
Message
SSL uses MACs. TLS uses HMACs.
Authentication
SSL supports older algorithms
TLS uses advanced encryption
Cipher Suites with known security
algorithms.
vulnerabilities.
An SSL handshake is complex A TLS handshake has fewer steps and
Handshake
and slow. a faster connection
A virtual private network (VPN) is a technology that creates a safe and encrypted
connection over a less secure network, such as the Internet. A Virtual Private Network is a
way to extend a private network using a public network such as the Internet. The name only
suggests that it is a “Virtual Private Network”, i.e. user can be part of a local network sitting
at a remote location. It makes use of tuneling protocols to establish a secure connection.
The situation is described below
All 100 hundred computers of the corporate office in Washington are connected to the
VPN server(which is a well-configured server containing a public IP address and a
switch to connect all computers present in the local network i.e. in the US head office).
The person sitting in the Mumbai office connects to The VPN server using a dial-up
window and the VPN server returns an IP address that belongs to the series of IP
addresses belonging to a local network of the corporate office.
Thus person from the Mumbai branch becomes local to the head office and information
can be shared securely over the public internet.
So this is the intuitive way of extending the local network even across the geographical
borders of the country.
VPN is well Exploited all Across the Globe
We will explain to you with an example. Suppose we are using smartphones regularly.
Spotify Swedish music app that is not active in India But we are making full use of it sitting
in India. So how ?? VPN can be used to camouflage our geolocation.
Suppose the IP address is 101.22.23.3 which belongs to India. That’s why our device is
not able to access the Spotify music app.
But the magic began when we used the Psiphon app which is an Android app used to
change the device IP address to the IP address of the location we want(say US where
Spotify works seamlessly).
The IP address is changed using VPN technology. Basically what happens is that your
device will connect to a VPN server of the respective country that you have entered in
your location textbox of the Psiphon app and now you will inherit a new IP from this
server.
Now we typed “What is my IP address”? Amazingly the IP address changed to 45.79.66.125
which belongs to the USA And since Spotify works well in the US, we can use it now being
in India (virtually in the USA). Is not that good? obviously, it is very useful.
VPN also ensures security by providing an encrypted tunnel between the client and the
VPN server.
VPN is used to bypass many blocked sites.
VPN facilitates Anonymous browsing by hiding your IP address.
Also, the most appropriate Search engine optimization (SEO) is done by analyzing the
data from VPN providers which provide country-wise statics of browsing a particular
product.
VPNs encrypt your internet traffic, safeguarding your online activities from potential
eavesdropping and cyber threats, thereby enhancing your privacy and data protection.
Types of VPN
There are several types of VPN and these are vary from specific requirement in computer
network. Some of the VPN are as follows:
1. Remote Access VPN
2. Site to Site VPN
3. Cloud VPN
4. Mobile VPN
5. SSL VPN
For more details you can refer Types of VPN published article.
VPN Protocols
OpenVPN: A cryptographic protocol that prioritises security is called OpenVPN.
OpenVPN is compatible protocol that provides a variety of setup choices.
Point-To-Point Tunneling Protocol(PPTP): PPTP is not utilized because there are
many other secure choices with higher and more advanced encryption that protect data.
WireGuard: Wireguard is a good choice that indicates capability in terms of
performance.
Secure Socket Tunneling Protocol(SSTP): SSTP is developed for Windows users by
Microsoft. It is not widely used due to the lack of connectivity.
Layer 2 Tunneling Protocol(L2TP) It connects a user to the VPN server but lacks
encryption hence it is frequently used with IPSec to offer connection, encryption, and
security simultaneously.
Why Should Use VPN?
For Unlimited Streaming: Love streaming your favourite shows and sports games? A
VPN is your ultimate companion for unlocking streaming services.
For elevating your Gaming Experience: Unleash your gaming potential with the
added layer of security and convenience provided by a VPN. Defend yourself against
vengeful competitors aiming to disrupt your gameplay while improving your ping for
smoother, lag-free sessions. Additionally, gain access to exclusive games that may be
restricted in your region, opening up a world of endless gaming possibilities.
For Anonymous Torrenting: When it comes to downloading copyrighted content
through torrenting, it’s essential to keep your IP address hidden. A VPN can mask your
identity and avoid potential exposure, ensuring a safe and private torrenting experience.
For supercharging your Internet Speed: Are you tired of your Internet speed slowing
down when downloading large files? Your Internet Service Provider (ISP) might be
intentionally throttling your bandwidth. Thankfully, a VPN can rescue you by keeping
your online activities anonymous, effectively preventing ISP throttling. Say goodbye to
sluggish connections and embrace blazing-fast speeds.
Securing Public Wi-Fi: VPNs are essential for maintaining security when using public
Wi-Fi networks, such as those in coffee shops, airports, or hotels. These networks are
often vulnerable to cyberattacks, and using a VPN encrypts your internet connection,
protecting your data from potential hackers and eavesdroppers when you connect to
untrusted Wi-Fi hotspots.
Are VPNs legal or illegal?
Using a VPN is legal in most countries, The legality of using a VPN service depends on the
country and its geopolitical relations with another country as well. A reliable and secure VPN
is always legal if you do not intend to use it for any illegal activities like committing fraud
online, cyber theft, or in some countries downloading copyrighted content. China has decided
to block all VPNs (Virtual private network) by next year, as per the report of Bloomberg.
Many Chinese Internet users use VPNs to privately access websites that are blocked under
China’s so-called “great firewall”. This is done to avoid any information leakage to rival
countries and to tighten the information security.
What to Look for When Choosing a VPN?
Be sure the VPN has appropriate speed, a lot of providers have trouble keeping up with
Netflix viewing or downloading.
Read both user and expert evaluations to gain a good idea of how well the VPN
operates.
Select a VPN provider that provides shared IP addresses.
More servers translate into faster browsing because there will be less traffic on each
one.
Benefits of VPN
When you use VPN it is possible to switch IP.
The internet connection is safe and encrypted with VPN
Sharing files is confidential and secure.
Your privacy is protected when using the internet.
There is no longer a bandwidth restriction.
It facilitates cost savings for internet shopping.
Limitations of VPN
VPN may decrease your internet speed.
Premium VPNs are not cheap.
VPN usage may be banned in some nations.
Working of VPN?
A virtual private network connects you to the internet while acting as a bridge between you
and the internet. Instead of communicating directly with a website, you would use a VPN
server, primarily to keep your internet activity strictly confidential.
Assume you want to transfer money from a bank account to a family member’s account. To
do so, you will navigate to the bank’s website and enter your login details.
If you are accessing the internet without a VPN, your can reveal your login details to anyone
observing your network, such as hackers, government officials, network administrators, and
so on.
In contrast, a virtual private network establishes a tunnel through which your data packets
pass, keeping them hidden from other entities. When you use a VPN, your data is encrypted,
and no one can read it except the intended recipient.
Wi-Fi Security
Wireless Terminologies
First, let's go through the bunch of basic terms, related to wireless communication.
Progressively, we will get into more advanced stuff going all along this path together.
Wireless Communication
Wireless communication refers to any type of data exchange between the parties that is
performed wirelessly (over the air). This definition is extremely wide, since it may
correspond to many types of wireless technologies, like −
All the technologies mentioned above use different communication architecture, however
they all share the same "Wireless Medium" capability.
Wi-Fi
Wireless Fidelity (Wi-Fi) refers to wireless local area network, as we all know them. It is
based on IEEE 802.11 standard. Wi-Fi is a type of wireless network you meet almost
everywhere, at your home, workplace, in hotels, restaurants and even in taxis, trains or
planes. These 802.11 communication standards operate on either 2.4 GHz or 5 GHz ISM
radio bands.
These devices are easily available in the shops that are compatible with Wi-Fi standard, they
have following image visible on the device itself. I bet you have seen it hundreds of times in
various shops or other public places!
Due to the fact, that 802.11 based wireless network are so heavily used in all types of
environments - they are also the biggest subject for various security researches across other
802.11 standards.
Wireless Clients
Wireless clients are considered to be any end-devices with a wireless card or wireless adapter
installed. Now, in this 21st century, those devices can be almost anything −
Modern Smartphones − These are one of the most universally used wireless devices
you see in the market. They support multiple wireless standards on one box, for
example, Bluetooth, Wi-Fi, GSM.
Laptops − These are a type of device which we all use every single day!
Smartwatch − An example of Sony based smartwatch is shown here. It can
synchronize with your smartphone via a Bluetooth.
Smart-home Equipment − With the current progress of the technology, smart-home
equipment might be for example a freezer that you can control over Wi-Fi or a
temperature controller.
The list of possible client devices is growing every single day. It sounds a little scary that all
of those devices/utilities we use on a daily basis can be controlled via a wireless network so
easily. But at the same time, remember that all the communication flowing through a wireless
medium can be intercepted by anyone who is just standing at the right place at the right time.
Wireless Security - Access Point
Access Point (AP) is the central node in 802.11 wireless implementations. It is the interface
between wired and wireless network, that all the wireless clients associate to and exchange
data with.
For a home environment, most often you have a router, a switch, and an AP embedded in one
box, making it really usable for this purpose.
Base Transceiver Station (BTS) is the equivalent of an Access Point from 802.11 world, but
used by mobile operators to provide a signal coverage, ex. 3G, GSM etc...
Note − The content of this tutorial concentrates on the 802.11 wireless networking, therefore
any additional information about BTS, and mobile communication in more detail, would not
be included.
This is the situation, where the concept of wireless controller comes into play. It is the
"Mastermind" behind all the wireless network operation. This centralized server which has
the IP connectivity to all the AP's on the network making it easy to manage all of them
globally from the single management platform, push configuration templates, monitor users
from all the AP's in real time and so on.
Service Set Identifier (SSID)
SSID directly identifies the wireless WLAN itself. In order to connect to Wireless LAN, the
wireless client needs to send the same exact SSID in the association frame as the SSID name,
preconfigured on the AP. So the question now arises how to find out which SSIDs are present
in your environment? That is easy as all the operating systems come with a built-in wireless
client that scans wireless spectrum for the wireless networks to join (as shows below). I am
sure you have done this process several times in your daily routine.
But, how those devices know that specific wireless network is named in that particular way
just by listening to radio magnetic waves? It is because one of the fields in a beacon frame
(that APs transmit all the time in very short time intervals) contains a name of the SSID
always in clear text, which is the whole theory about this.
SSID can have a length of up to 32 alphanumeric characters and uniquely identifies a
particular WLAN broadcasted by the AP. In case, when the AP has multiple SSIDs defined, it
will then send a separate beacon frame for each SSID.
Cell
A cell is basically a geographical region covered by the AP's or BTS's antenna (transmitter).
In the following image, a cell is marked with a yellow line.
Most often, an AP has much more output power, when compared it with the capabilities of
the antenna built-in into the client device. The fact that, the client can receive frames
transmitted from the AP, does not mean that a 2-way communication can be established. The
above picture perfectly shows that situation. - In both situations, a client can hear AP's
frames, but only in the second situation, the 2-way communication can be established.
The outcome from this short example is that, when designing the wireless cell sizes, one has
to take into account, what is the average output transmitting power of the antennas that clients
will use.
Channel
Wireless Networks may be configured to support multiple 802.11 standards. Some of them
operate on the 2.4GHz band (example are: 802.11b/g/n) and other ones on the 5GHz band
(example: 802.11a/n/ac).
Depending on the band, there is a predefined set of sub-bands defined for each channel. In
environments with multiple APs placed in the same physical area, the smart channel
assignment is used in order to avoid collisions (collisions of the frames transmitted on exactly
the same frequency from multiple sources at the same time).
Let's have a look at the theoretical design of the 802.11b network with 3 cells, adjacent to
each other as shown in the above picture. Design on the left is composed of 3 non-
overlapping channels - it means that frames sent by APs and its clients in particular cell, will
not interfere with communication in other cells. On the right, we have a completely opposite
situation, all the frames flying around on the same channel leads to collisions and degrade the
wireless performance significantly.
For wireless security testing or penetration tests of the wireless networks, external antenna is
one of the most important tools. You should get one of them, if you want to go into this field!
One of the biggest advantages of external antennas (comparing to most of the internal
antennas you might meet built-in to the equipment), is that they can be configured in a so-
called "monitor mode" - this is definitely something you need! It allows you to sniff the
wireless traffic from your PC using wireshark or other well-known tools like Kismet.
Wireless network may be classified into different categories based on the range of operation
they offer. The most common classification scheme divides the wireless networks into four
categories listed in the table below, together with short examples.
Data exchange
Very short - max
Wireless Personal Bluetooth, between
10 meters but
Area Network 802.15, IrDA smartphones
usually much
(WPAN) communication Headsets
smaller
Smart watches
Wimax, IEEE
Wireless
802.16 or Between homes and
Metropolitan Area All around the city
proprietary businesses
Network (WMAN)
technologies
Wireless Wide
Throughout the Wireless access to the
Area Network 3G, LTE
world internet from
(WWAN)
This tutorial is mainly going to cover WLAN technology, however we will also cover the
various aspects of Bluetooth communication (WPAN).
Just to give you some proof, that wireless technologies will affect our lives in more and more
ways every year. Have a look at the sample statistics that have been found! Some of them
seems to be a scary, but at the same time they simply show how much we rely on wireless
communication nowadays.
By 2020, around 24 Billion devices will be connected to the internet, with more than
half connected via wireless. This is true Internet of Things (IoT). How does it sound,
taking into a fact that we have around 7.4 Billion people living on the earth now?
About 70% of all the types of wireless communication is Wi-Fi (802.11 standard).
The speed of the Wi-Fi network has grown from 802.11a - 54Mbps (in 1999) to ac-
wave 1 - 1.3 Gbps (in 2012). On top of that, there is the 801.11ac-wave2 on the horizon
with multi-Gbps speeds.
Every day, millions of people are making cash transfer and accessing their bank account
using smartphones over the Wi-Fi!
Are you still hesitant about the importance of security in wireless implementations?
Wi-Fi Networks
The choice of devices used in wireless deployments is influenced by the type of deployment
whether this is going to be a network for a small house, shop, a big enterprise network or the
one for hotels.
Since the beginning of IEEE 802.11 standard, the wireless networks were evolving at a
significant pace. People saw the potential in this type of data transmission, therefore 802.11
successors were showing up, few years after each other. The following table summarizes the
current 802.11 standards that are used in our times −
As you can see, Wi-Fi networks are becoming faster and faster. Following are a couple of
limiting factors why we don't see high speeds when we download data over Wi-Fi −
There is a difference between the speed and actuals throughout. Since wireless
communication is half-duplex (single antenna can either transmit or receive at one
time), the actual throughput is actually around 50% of the speed. This condition is only
true, when there is one transmitter and one receiver, without any other clients involved,
and without interferences (that leads to collisions and retransmissions).
The most cutting edge standards (802.11ac) are not that widely supported on end-
devices. Most of the laptops or smartphones on the market provides support for
802.11a/b/g/n, but not yet for 802.11ac standard. In addition to that, some devices are
equipped only with antenna, that supports 2,4 GHz frequency band, but not 5 GHz (that
lead to lack of 802.11ac support by default).
Let us see how you can check what standards are supported on the Wi-Fi network that you
are joined to? You can check that using the number of approaches. I will present two of them
here −
The following screenshot shows the dump from a wireless-based tool called "inSSIDer" that
is running on Mac. It directly shows all the visible wireless networks, together with some of
the details about every one of them.
From the above picture, one can see that some of the WLAN's support 130Mbps for
maximum speed (those must be 802.11ac), other ones 54 and 36 Mbps (those may be 802.11
A or G).
On the other hand, you can also use popular Linux-based program called "airdump-ng" (we
will go deeper into this one later on, during showcase of hacking - breaking the keys of the
Wi-Fi network). As for the Windows environment, you may use popular the "Network
Stumbler". All those tools work in a very similar way with each other.
Wireless Security Wi-Fi Authentication Modes
In this chapter, we will briefly go through the possible authentication schemes that are used in
the wireless deployments. They are: Open Authentication and Pre-Shared Key (PSK)-based
authentication. The former one is based on EAP frames to derive dynamic keys.
Open Authentication
The term Open Authentication is itself very misleading. It suggests, that some kind of
authentication is in place, but in fact, the authentication process in this scheme is more like
formal step, rather than authentication mechanism. The process looks like how it is shown in
the following diagram −
In plain English, what this exchange is saying is that, in authentication request the wireless
client (supplicant) is saying "Hi AP, I would like to authenticate" and authentication response
from the AP is stating "OK, here you go". Do you see any kind of security in this setup?
Neither do I…
That is why, Open Authentication should be never used, since it simply allows any client to
authenticate to the network, without the right security check.
When a wireless client authenticates to the AP, both of them go through the 4 step
authentication process called 4-way handshake. During those message exchanges, the shared
password is derived between AP and wireless client, without being transmitted in any of
those EAP messages.
The Pairwise Master Key (PMK) is something a hacker would like to collect, in order to
break the network encryption scheme. PMK is only known to the Supplicant and
Authenticator, but is not shared anywhere in transit.
HOWEVER, the session keys are, and they are the combination of ANonce, SNonce, PMK,
MAC addresses of Supplicant and Authenticator. We may write that relation, as the
mathematical formula −
It is definitely a recommended authentication approach to use, and definitely safer than using
Open Authentication.
Wi-Fi Chalking
Wi-Fi chalking was a very funny concept in the history of wireless LAN history, mainly used
in the USA. The main idea was to mark the places, where open-authentication or WLANs
with weak authentication were implemented. By doing that, everyone who finds out this sign
somewhere on the wall or ground, written with a chalk, then he can log in to the Wi-Fi
system without authentication. Smart, right?
You may just ask yourself - why chalk and not some kind of marker, spray or other more
permanent way of marking? The answer is simple and comes from criminal law - writing
with chalk was not considered as an act of vandalism.
In general, encryption is the process of transforming the data, into some kind
of cyphertext that would be non-understandable for any 3rd party that would intercept the
information. Nowadays, we use encryption every single day, without even noticing. Every
time you access your web bank or mailbox, most often when you log in to any type of web
page, or create a VPN tunnel back to your corporate network.
Some information is too valuable, not to be protected. And, to protect the information
efficiently, it must be encrypted in a way that would not allow an attacker to decrypt it. To be
honest with you guys - there is no fully secure encryption scheme. All the algorithms that we
use every day may be broken, but what is its likelihood of this happening with current
technology and time?
For example, it might take around eight years to break encryption "X" using new super-fast
computers. Is that risk big enough, to stop using algorithm "X" for encryption? I doubt it, the
information to be protected might be outdated at that point of time.
To start speaking about wireless encryption, it is worth saying that there are 2 types of
encryption algorithms: Stream Cipher and Block Cipher.
The most common encryption algorithms are collected in the following table −
Type of
Encryption
encryption Size of data block
Algorithm
algorithm
The ones that you will most likely meet (in some form) on the wireless networks are RC4
and AES.
There are three widely known security standards in the world of wireless networking. The
biggest difference between those three, are the security model they can provide.
Encryption
Security Authentication
algorithm Possibility of breaking the encryption
Standard methods
user
WEP was the first wireless "secure" model that was supposed to add authentication and
encryption. It is based on RC4 algorithm and 24 bits of Initialization Vector (IV). This is
the biggest drawback of the implementation that leads to WEP being crack able within a few
minutes, using the tools that anyone can have installed on their PCs.
In order to enhance the security, WPA2 was invented with strong encryption model (AES)
and a very strong authentication model based on 802.1x (or PSK). WPA was introduced just
as a staging mechanism for smooth transition to WPA2. A lot of wireless cards did not
support the new AES (at that time), but all of them were using RC4 + TKIP. Therefore WPA
was also based on that mechanism, just with a few advancements.
Initialization Vector (IV) is one of the inputs to the WEP encryption algorithm. The whole
mechanism is presented in the following diagram −
As one can notice, there are two inputs to the algorithm, one of which is a 24-bit long IV (that
is also added to the final ciphertext in a clear text) and the other is a WEP key. When trying
to crack this security model (WEP), one has to collect a large number of wireless data
frames (large number of frames until the frame with duplicate IV vector value is found).
Assuming that for WEP, the IV has 24 bits. This means that it could be any number from two
frames (if you are lucky enough) to 224 + 1 (you collect every single possible IV value, and
then, the very next frame must be a duplicate). From the experience, I can say that, on a
rather crowded wireless LAN (around 3 clients sending the traffic all the time), it is a matter
of 5-10 minutes to get enough frames, to crack the encryption and derive the PSK value.
This vulnerability is only present in WEP. WPA security model uses TKIP that solved weak
IV by increasing its size from 24 bits to 48 bits, and making other security enhancements to
the diagram. Those modifications made the WPA algorithm much more secure and prone to
this type of cracking.
Designed to
Many; Vulnerable to Susceptible to prevent known
including easy dictionary attacks KRACK (Key vulnerabilities in
Vulnerabilities to crack and has been Reinstallation WPA2; however,
encryption and superseded by Attacks) under complexity can
IV collisions WPA2 certain conditions introduce new
vulnerabilities
Recommended
Should only be
Obsolete due for networks until Recommended for
used if WPA2 or
Use Case to security WPA3 devices all Wi-Fi users for
WPA3 is not
flaws become more enhanced security
available
widespread
Compatible Limited
Compatible with Compatible with
Backward with all WEP- compatibility;
devices since devices that
Compatibility enabled requires devices
2003 support WPA2
devices that support WPA3
UNIT -V CYBER ETHICS AND LAWS
Introduction to Cyber Laws, E-Commerce and E-Governance, Certifying Authority
and Controller, Offences under IT Act, Computer Offences and its penalty under
ISO 27001, IT Act 2000, Positive Aspects and weak areas of ITA 2000, Digital
signatures and the Indian ITA act, ITA 2008, and International Standards
maintained for Cyber Security, Security Audit, Investigation by
Investing Agency, Intellectual Property Rights in Cyberspace.
Cyber ethics and laws are crucial components in the digital realm, governing the conduct and
practices of individuals and organizations online. They encompass a wide range of principles,
regulations, and legal frameworks designed to protect users, data, and digital assets, while
fostering a safe, respectful, and equitable online environment. Understanding both concepts is
essential for responsible digital citizenship and compliance in the rapidly evolving
cyberspace.
Cyber Ethics
Cyber ethics refers to the study and application of ethical principles and moral behaviors in
digital and online environments. It involves understanding what is right and wrong in the
cyber world, including respect for privacy, intellectual property rights, equality in access to
information, and freedom of expression. Cyber ethics also covers the responsible use of
technology, emphasizing the importance of not causing harm to others through cyberbullying,
hacking, or spreading malware.
Respect for Privacy: Protecting individuals' personal information and respecting their privacy
settings.
Intellectual Property Rights: Recognizing and honoring copyright, trademarks, and other
forms of intellectual property.
Non-Discrimination: Ensuring equal access to information and technology, regardless of race,
gender, disability, or economic status.
Freedom of Expression: Balancing free speech with respect for others, avoiding
cyberbullying, and hate speech.
Responsibility: Acknowledging the impact of one’s actions online and taking responsibility
for them.
Cyber Laws
Cyber laws, on the other hand, are the legal frameworks and regulations that govern
activities, transactions, and behaviors in cyberspace. They are implemented by governments
and international bodies to protect people and entities from cybercrimes, data breaches, and
other malicious activities online. Cyber laws cover a wide range of areas including data
protection, digital transactions, cybersecurity, copyright infringement, cyberbullying, and
more.
In the digital age, where technology permeates every aspect of life, understanding and
adhering to cyber ethics and laws is vital for individuals, businesses, and governments. It
ensures that the benefits of digital technology can be enjoyed broadly and safely, with respect
for the rights and dignity of all internet users.
Cyber Laws
Cyber law, also known as cybercrime law or Internet law, refers to the legal framework that
governs activities and transactions in the digital realm. It encompasses a wide range of legal
principles, regulations, and statutes that address issues related to the Internet, computers,
networks, and electronic information.
Cyber law defines the legal jurisdiction and enforcement mechanisms concerning cybercrimes.
It establishes provisions for investigating, prosecuting, and punishing offenders, both within
national boundaries and in collaboration with international counterparts.
One of the key advantages of cyber laws in India is the protection of personal information.
With the proliferation of digital platforms, the threat to privacy has become more pronounced.
Cyber laws enforce strict regulations on organisations and individuals handling personal data,
ensuring its confidentiality, integrity, and availability.
Compliance with these laws becomes paramount, as they safeguard against unauthorised
access, use, or disclosure of personal information. Individuals can confidently engage in digital
transactions, knowing that legal provisions protect their sensitive data. The advantages of cyber
laws are particularly evident in the context of data breaches and identity theft, where legal
frameworks provide remedies and redressal mechanisms to victims, offering a sense of security
and trust in the digital ecosystem.
Prevention of Cybercrimes
Cyber laws play a crucial role in preventing and combating cybercrimes. They establish
provisions and penalties for various forms of digital offences, including hacking, identity theft,
online fraud, cyberbullying, and harassment. By criminalising such activities, cyber laws act
as a deterrent, dissuading potential offenders from engaging in unlawful behaviour.
The advantages of cyber laws are evident in the reduction of cybercrimes, as law enforcement
agencies can effectively investigate and prosecute offenders based on the legal frameworks
provided. These laws ensure that individuals and businesses can operate in a secure online
environment, fostering trust, and promoting a vibrant digital economy.
Facilitation of E-commerce
Cyber laws in India provide a supportive environment for e-commerce transactions. They
establish legal frameworks for electronic contracts, digital signatures, and electronic payment
systems. These laws help build trust among buyers and sellers, as they ensure the enforceability
of electronic transactions and the validity of digital signatures.
Intellectual property protection is a critical aspect of cyber laws in India. These laws address
copyright infringement, software piracy, and digital content protection issues. By safeguarding
intellectual property rights, cyber laws incentivise creativity, innovation, and technological
advancements.
The advantages of cyber laws in India can be seen through the promotion of a conducive
environment for artists, authors, inventors, and businesses to protect their creations and
inventions in the digital space. By providing legal remedies against intellectual property
violations, cyber laws foster an atmosphere of respect for creative endeavours and encourage
investment in research and development.
Promotion of Cybersecurity
Cybersecurity is a pressing concern in today’s digital landscape, and cyber laws in India
prioritise the establishment of robust security measures. Organisations are required to
implement adequate cybersecurity protocols and safeguards to protect their digital
infrastructure and sensitive information. By mandating cybersecurity practices, cyber laws help
prevent unauthorised access, data breaches, and cyberattacks.
The advantages of cyber laws are apparent in the shared efforts to combat cross-border
cybercrimes, ensuring that offenders are brought to justice regardless of their geographical
location. By fostering international cooperation, cyber laws help create a united front against
cyber threats and establish a global framework for addressing digital offences.
Redressal Mechanisms
Cyber laws provide individuals with accessible and effective redressal mechanisms in case of
cyber offences. Specialised cybercrime investigation cells, cyber tribunals, and dedicated
courts are established to handle cyber-related cases. These mechanisms ensure timely
resolution and justice for victims of cybercrimes, offering a sense of security and trust in the
legal system.
The advantages of cyber laws in India are evident in the establishment of efficient channels for
reporting, investigating, and prosecuting cybercrimes. This promotes accountability and serves
as a deterrent for potential offenders, reinforcing the importance of responsible and ethical
behaviour in the digital realm.
Cyber laws in India emphasise the significance of awareness and education regarding
cybersecurity and digital rights. These laws promote initiatives to educate individuals,
businesses, and government agencies about best practices, safe online behaviour, and legal
obligations.
By fostering digital literacy, the advantages of cyber laws extend to the empowerment of
individuals to protect themselves from cyber threats, make informed decisions online, and
exercise their digital rights. Through awareness campaigns, training programs, and public-
private partnerships, cyber laws contribute to creating a digitally literate society capable of
navigating the complexities of the digital world.
The “e” stands for electronic. Electronic governance or e-governance can be defined as the
application of information and communication technology (ICT) for providing government
services, exchange of information, transactions, integration of previously existing services and
information portals.
E-governance can be considered as a tool for leveraging the potential of ICT for improving
effectiveness of government activities, strengthening democratic process which led to more
empowered citizens and more transparent government offices.
Elements of E-Governance
The 3 most basic and common groups that are involved with the process of governance are:
Types of E-Governance
Various G2C services of both central and state government have been integrated on the Digital
Seva Portal which are accessible by the citizens in the rural and remote areas of the country.
Some of the day-to-day examples of the G2C services can be: (a) Bharat BillPay (b) FASTag
(c) Passport services (d) PAN Card / Aadhar Card facility (e) Swacch Bharat Abhiyan and so
on.
G2G services take place at both local or domestic level as well as international level. At the
local level, these services facilitate different departments to access the same information from
any corner of the country whereas with the international perspective, such services tend to
improve international discretion and relations.
Some of the examples of G2G services are: (a) Smart Gov. initiative by Andra Pradesh
government. (b) Khajane Project undertaken by the Karnataka government to manage the
treasury related activities. (c) Northeast Gang Information System (NEGIS)
Some of the areas where G2B services have been provided are: (a) Online GST facility (b)
MSME Samadhaan (c) Government e-marketplace (d) MCA e-forms
Examples of G2E services can be: (a) Online salary payment (b) Applying for leave online (c)
Online insurance or health care facility provided bt the employer (d) Checking the balance of
holidays
Advantages of E-Governance
Challenges of E-Governance
Issues that the field of electronic governance faces can be categorised into 3 kinds, viz, (a)
Economical (b) Social (c) Technical which has been discussed in detail below:
Any issue which involves spending of public expenditure can be considered as the economical
challenge as e-governance is an costly affair. Such issues have been discussed further:
(1) Cost: Anything related to technology does not comes cheap. Therefore, to install a good
electronic governance system, government has to bear heavy cost of technology and updating
the staff accordingly to work with the updated technology.
(2) Reusability: Technology updates so fast and it is quite difficult to reuse the technology
and save on cost, thereby increasing the cost further.
(3) Maintainability: Technical devices need timely updation to run them properly and
efficiently.
Whether it is about the installation or running of technical devices, none can be done without
proper knowledge and guidance. Issues relating to such factors have been listed below:
(1) Interoperability: Unless proper guidance has been provided, technical devices can be too
hard to operate for anyone.
(2) Privacy & Security: Any data that citizens provide to the government needs to be
protected by the government. Leakage of data can shake people’s faith in the government.
(3) Authenticity: It’s not just government who is upgrading with time. It’s the hackers and
false information providers too. Therefore, it is necessary to be able to identify the authenticity
of the data being provided.
Supposedly, government has provided the facilities online but of what use will it be of unless
common people how to avail them. Some of the such issues have been talked about below:
(1) Accessibility: Unless, an ordinary man is able to access the facilities provided by the
government, they will be of no use and there are still some parts of the country which are
unknown to the world of internet or updated technology.
(2) Usability: Even if government arranges accessibility, citizens will have to learn, at the same
time, how to use the provided facility.
(3) Use of local language: In the initial days, as we know internet was only available in the
foreign language which was again a hurdle to the development of the technology but was
removed gradually by bringing the local language in usage.
(4) Awareness: Any facility bought would be only useful when citizens are aware about it
which should be made sure by the government by running of compagins, seminars and other
such social awareness programs.
(1) Proper Administration: Change or new system has always been resisted. Therefore, a
proper administration is required to run the e-governance properly and efficiently.
(2) Hybrid Approach: A hybrid approach needs to be adopted for enhancing interoperability
among e-governance applications which will encompass a centralized approach for document
management, knowledge management, file management, grievance management and alike.
(3) Awareness: Government should set up or allot NGO’s to take up the take of spreading the
knowledge and making people aware regarding electronic governance services in the villages
by identifying the grassroot reality.
(4) Dedicated Legislation: A legislation is always needed for right implementation. Framing
of proper legislation, particularly dedicated to the e-governance, will lead to smoothing of
establishment and implementation of the project.
There is no dedicated legislation, particularly and solely, to the field of electronic governance
in our country. Although, some of the existing laws in India do apply to electronic governance
which have been talked about briefly below.
Indian RTI Act is similar to the Canadian Law. In India, unlike UK and US laws, RTI Act
provides citizens with the direct access to the Central Information Commission in case the
information is denied to the citizens by any department of the government. Such access avoids
delays in the procedures to grant the citizens their basic right to information and to go through
the hardships of the courts to enforce their basic rights.
RTI Act ensures the transparency in the functioning of the government by placing an obligation
on the government at all the levels and it’s department to provide the common man with the
information about the policies, rules and regulations passed by them. The act also provides for
the penalties, in case, the government fails to provide the citizens with the appropriate
information, timely and in a proper manner.
To help the government provide the citizens with the information, Department of Information
Technology is spreading the use of technology through the system of electronic governance
and website to display all the information for easy access of the citizens.
For the Act to be more effective, there need to be better information flow among people at the
village level who are unaware of their rights because that’s where the grassroot issue lies and
efforts are lacking. Government needs to set up NGO to create awareness at the level where
it’s needed the most. But still the RTI Act doesn’t totally take up the responsibility of its proper
implementation due to lack of enforceability procedures which needs to be taken care of by the
government of the country.
India is a country to have legal framework for all the ‘e’ (electronic) promulgated as the IT
Act, 2000. The Act, also, effected the consequential amendments in the Indian Penal Code, The
Evidence Act, 1872, and The RBI Act, 1934, bringing all of them in line as per the requirements
of the digital transactions.
Ever gave a thought, what if all the data that is being provided by the citizens to the government
gets leak or is used for some other purpose ? Such issues are dealt by the IT Act so as to not
shaken the trust and confidentiality that a common person places in the government.
Whenever any law provides that information or any other matter shall be written, typewritten
or in printed form, information in electronic form would also be considered in the same. Such
information will also be accessible for subsequent references.
(3) Section 6 – Use of electronic records and signature in government and it’s agencies:
If a citizen needs to file a form, application or a document with government owned or controlled
office, agency, body or authority or grant or issue any license, sanction, permit or approval or
receive or pay money, it can also be done in an electronic form in the government-approved
format.
Whereever, a law requires the retention of certain records, documents or information for a
specific period, such retention can also be made in the electronic form, provided that, such
information is accessible, usable for subsequent reference, format of electronic record must be
original and represent the original information and the electronic record contains the necessary
details as stated by the law.
Though there are systems like cryptography, passwords, to ensure the security of the document,
but this still pose threat to the Government due to other measures adopted by hackers. This
section provides protection against unauthorized access of the computer system by imposing
heavy penalty.
In the Case of PUCL v. UOI it was held that the procedure is inadequate as the Controller has
been given discretionary power and there is no mention of consultation with the accused before
punishing him. Therefore proper guidelines needs to be provided in this regard for maintaining
the balance between the right to privacy of the citizens and the provision of the search and
seizure under the Act.
This section is targeted only towards the officials who are empowered to collect the data under
the Act but the scope only extends to the Adjudicating officers, members of the Cyber
Regulations Appellate Tribunal (CRAT) or certifying Authorities under the Act if they commit
breach of confidentiality or privacy of any data accessible by them.
The IT Act accommodates the Controller of Certifying Authorities(CCA) to permit and direct
the working of Certifying Authorities. The Certifying Authorities (CAs) issue computerized
signature testaments for electronic confirmation of clients. The Controller of Certifying
Authorities (CCA) has been named by the Central Government under Section 17 of the Act for
reasons for the IT Act. The Office of the CCA appeared on November 1, 2000. It targets
advancing the development of E-Commerce and E-Governance through the wide utilization of
computerized marks.
The Controller of Certifying Authorities (CCA) has set up the Root Certifying Authority
(RCAI) of India under segment 18(b) of the IT Act to carefully sign the open keys of Certifying
Authorities (CA) in the nation. The RCAI is worked according to the gauges set down under
the Act. The CCA guarantees the open keys of CAs utilizing its own private key, which
empowers clients in the internet to confirm that a given testament is given by an authorized
CA. For this reason it works, the Root Certifying Authority of India (RCAI). The CCA likewise
keeps up the Repository of Digital Certificates, which contains all the authentications gave to
the CAs in the nation.
Certificate Authority (CA) is a confided in substance that issues Digital Certificates and open
private key sets. The job of the Certificate Authority (CA) is to ensure that the individual
allowed the extraordinary authentication is, truth be told, who the individual in question
professes to be.
The Certificate Authority (CA) checks that the proprietor of the declaration is who he says he
is. A Certificate Authority (CA) can be a confided in outsider which is answerable for genuinely
confirming the authenticity of the personality of an individual or association before giving an
advanced authentication. A Certificate Authority (CA) can be an outer (open) Certificate
Authority (CA) like verisign, thawte or comodo, or an inward (private) Certificate Authority
(CA) arranged inside our system. Certificate Authority (CA) is a basic security administration
in a system. A Certificate Authority (CA) plays out the accompanying capacities. A Controller
plays out a few or the entirety of the following roles:
1. Administer the exercises of the Certifying Authorities and furthermore confirm their open keys.
2. Set out the guidelines that the Certifying Authorities follow.
3. Determine the accompanying capabilities and furthermore experience necessities of the
workers of all Certifying Authorities conditions that the Certifying Authorities must follow for
directing business the substance of the printed, composed, and furthermore visual materials
and ads in regard of the advanced mark and the open key the structure and substance of an
advanced mark declaration and the key the structure and way where the Certifying Authorities
look after records terms and conditions for the arrangement of examiners and their
compensation.
4. Encourage the Certifying Authority to set up an electronic framework, either exclusively or
together with other Certifying Authorities and its guideline.
5. Indicate the way where the Certifying Authorities manage the endorsers.
6. Resolve any irreconcilable situation between the Certifying Authorities and the endorsers.
7. Set out the obligations of the Certifying Authorities.
8. Keep up a database containing the revelation record of each Certifying Authority with all the
subtleties according to guidelines. Further, this database is open to the general population.
Certificate Authority (CA) Verifies the personality: The Certificate Authority (CA) must
approve the character of the element who mentioned a computerized authentication before
giving it. Certificate Authority (CA) issues computerized testaments: Once the approval
procedure is finished, the Certificate Authority (CA) gives the advanced authentication to the
element who requested it. Computerized declarations can be utilized for encryption (Example:
Encrypting web traffic), code marking, authentication and so on. Certificate Authority (CA)
keeps up Certificate Revocation List (CRL): The Certificate Authority (CA) keeps up
Certificate Revocation List (CRL).
An authentication repudiation list (CRL) is a rundown of computerized testaments which are
not, at this point legitimate and have been disavowed and subsequently ought not be depended
by anybody. A Certificate Authority (CA) is a selective element which issues and signs SSL
endorsements, confirming and guaranteeing the reliability of their proprietors. All CAs are
individuals from the CA/B Forum (Certificate Authority and Browser Forum), being subjects
to industry guidelines, principles, and prerequisites, and are every year examined to guarantee
their consistence. The CA is a basic component when talking about SSL Certificates. The CA
recognizes and verifies the character of the SSL Certificate’s proprietor when giving and
marking the SSL Certificate. In view of the SSL Certificate’s sort, the CA completely checks
the candidate’s area name, business and individual data, and different qualifications before
giving the testament.
The Controller may additionally carry out all or any of the following functions:
5) Specifies the situations below which the Certifying Authority shall conduct their business;
6) Specifies the contents of written, revealed or visual materials and commercials that may be
distributed or utilized in a Digital Signature Certificate and the general public key;
7) Specifies the format and content of a Digital Signature Certificate and the important thing;
8) Specifies the layout wherein Certifying Authorities shall keep the bills.
9) Specifies the terms and situations for the appointment of the auditors and their remuneration.
10) Helps the Certifying Authorities in organizing any digital machine and law of such gadget.
11) Specifies the way wherein the Certifying Authorities shall address the subscribers.
12) Resolves any warfare that arises between the Certifying Authorities and the subscribers;
14) Maintains a database containing the disclosure record of ever Certifying Authority.
15) Maintains the database of public keys in a way that it is available to the general public.
The IT Act presents for the Controller of Certifying Authorities (CCA) to license and adjust
the running of Certifying Authorities. The Certifying Authorities (CAs) issue digital signature
certificates for electronic authentication of users. The Controller of Certifying Authorities
(CCA) has been appointed with the aid of the Central Government under phase 17 of the Act
for functions of the IT Act. The Office of the CCA came into existence on November 1, 2000.
It ambitions at selling the growth of E-Commerce and E- Governance thru the wide use of
virtual signatures. The Controller of Certifying Authorities (CCA) has established the Root
Certifying Authority (RCAI) of India underneath section 18(b) of the IT Act to digitally signal
the general public keys of Certifying Authorities (CA) within the country. The RCAI is
operated as according to the requirements laid down under the Act.
The CCA certifies the public keys of CAs the use of its own non-public key, which permits
customers in the our on-line world to verify that a given certificate is issued by a licensed CA.
For this reason it operates, the Root Certifying Authority of India (RCAI). The CCA
additionally continues the Repository of Digital Certificates, which incorporates all the
certificates issued to the CAs inside the country
Explanation: For the purpose of this section “computer source code” means the listing of
programmes, computer commands, design and layout and programme analysis of computer
resource in any form.
Object: The object of the section is to protect the “intellectual property” invested in the
computer. It is an attempt to protect the computer source documents (codes) beyond what is
available under the Copyright Law
Case Laws:
1. Frios v/s State of Kerela
Facts: In this case it was declared that the FRIENDS application software as protected
system. The author of the application challenged the notification and the constitutional
validity of software under Section 70. The court upheld the validity of both.
It included tampering with source code. Computer source code the electronic form, it can be
printed on paper.
Held: The court held that Tampering with Source code are punishable with three years jail
and or two lakh rupees fine of rupees two lakh rupees for altering, concealing and destroying
the source code.
In Parliament case several smart device storage disks and devices, a Laptop were recovered
from the truck intercepted at Srinagar pursuant to information given by two suspects. The
laptop included the evidence of fake identity cards, video files containing clips of the political
leaders with the background of Parliament in the background shot from T.V news channels.
In this case design of Ministry of Home Affairs car sticker, there was game “wolf pack” with
user name of ‘Ashiq’. There was the name in one of the fake identity cards used by the
terrorist. No back up was taken therefore it was challenged in the Court.
(2) Whoever commits hacking shall be punished with imprisonment up to three years, or with
fine which may extend up to two lakh rupees, or with both.
Case Laws:
1. R v/s Gold & Schifreen
In this case it is observed that the accused gained access to the British telecom Prestl Gold
computers networks file amount to dishonest trick and not criminal offence.
2. R v/s Whiteley.
In this case the accused gained unauthorized access to the Joint Academic Network (JANET)
and deleted, added files and changed the passwords to deny access to the authorized users.
The perspective of the section is not merely protect the information but to protect the integrity
and security of computer resources from attacks by unauthorized person seeking to enter
such resource, whatever may be the intention or motive.
The official website of the government of Maharashtra was hacked by Hackers Cool Al-
Jazeera, and claimed them they were from Saudi Arabia
The following table shows the offence and penalties against all the mentioned sections of the
I.T. Act −
On first Conviction
imprisonment of either
Publishing or
description up to 5 years and/or
transmitting of material Offence is Non Bailable,
fine up to Rs. 10 lakh On
67-B depicting children in Cognizable and triable by Court of
Subsequent Conviction
sexually explicit act JMFC
imprisonment of either
etc., in electronic form
description up to 7 years and/or
fine up to Rs. 10 lakh
Intermediary
intentionally or
knowingly contravening Imprisonment up to 3 years and
67-C Offence is Bailable, Cognizable.
the directions about fine
Preservation and
retention of information
Failure to comply with
Imprisonment up to 2 years Offence is Bailable, Non-
68 the directions given by
and/or fine up to Rs. 1 lakh Cognizable.
Controller
Failure to assist the
agency referred to in
sub section (3) in regard
interception or Imprisonment up to 7 years and Offence is Non-Bailable,
69
monitoring or fine Cognizable.
decryption of any
information through any
computer resource
Failure of the
intermediary to comply
with the direction issued
Imprisonment up to 7 years and Offence is Non-Bailable,
69-A for blocking for public
fine Cognizable.
access of any
information through any
computer resource
Intermediary who
intentionally or
knowingly contravenes
the provisions of sub-
section (2) in regard Imprisonment up to 3 years and
69-B Offence is Bailable, Cognizable.
monitor and collect fine
traffic data or
information through any
computer resource for
cybersecurity
Any person who secures
access or attempts to
Imprisonment of either
secure access to the Offence is Non-Bailable,
70 description up to 10 years and
protected system in Cognizable.
fine
contravention of
provision of Sec. 70
Indian Computer
Emergency Response
Team to serve as
national agency for
incident response. Any
service provider, Imprisonment up to 1 year Offence is Bailable, Non-
70-B
intermediaries, data and/or fine up to Rs. 1 lakh Cognizable
centres, etc., who fails
to prove the information
called for or comply
with the direction issued
by the ICERT.
Misrepresentation to the
Imprisonment up to 2 years Offence is Bailable, Non-
71 Controller to the
and/ or fine up to Rs. 1 lakh. Cognizable.
Certifying Authority
Breach of
Imprisonment up to 2 years Offence is Bailable, Non-
72 Confidentiality and
and/or fine up to Rs. 1 lakh. Cognizable.
privacy
Disclosure of
Imprisonment up to 3 years
72-A information in breach of Offence is Cognizable, Bailable
and/or fine up to Rs. 5 lakh.
lawful contract
Publishing electronic
Signature Certificate Imprisonment up to 2 years Offence is Bailable, Non-
73
false in certain and/or fine up to Rs. 1 lakh Cognizable.
particulars
Publication for Imprisonment up to 2 years Offence is Bailable, Non-
74
fraudulent purpose and/or fine up to Rs. 1 lakh Cognizable.
OR
Computer Penalty under National Laws
Offences (Examples) ISO 27001 Practices/Controls
Varies by country; can include fines and
imprisonment. For instance, under the Access control policies (A.9), user access
Unauthorized UK’s Computer Misuse Act, it can lead to management (A.9.2), and system and
Access (Hacking) up to two years in prison. application access control (A.9.4).
Penalties depend on the jurisdiction and Information security policies (A.5),
the severity. Under GDPR, fines can go operations security (A.12), and
Data Breach (Loss up to €20 million or 4% of the annual information security incident management
of Confidentiality) global turnover. (A.16).
Computer Penalty under National Laws
Offences (Examples) ISO 27001 Practices/Controls
Fines and/or imprisonment, depending on
the impact and jurisdiction. For instance, Cryptographic controls (A.10) for the
in the US, violations can result in protection of information, and information
Data Integrity significant financial penalties under backup (A.12.3) for ensuring data
Violation various laws. integrity.
Human resource security (A.7) to ensure
Legal consequences include fines and employees understand their
corrective orders, especially if it involves responsibilities, and privacy and
Misuse of personal data under privacy laws like protection of personally identifiable
Information GDPR. information (A.18).
Legal penalties include imprisonment and
fines, based on the laws of the country. Network security management (A.13) and
The US, for example, can impose up to 10 security in information processing
Denial of Service years in prison under the Computer Fraud facilities (A.11) to manage and mitigate
Attacks and Abuse Act. DoS risks.
Penalties include fines and imprisonment.
Under laws like the US's Computer Fraud Malware protection (A.12.2) to prevent,
Malware and Abuse Act, distributing malware can detect, and remove malicious software,
Distribution lead to severe penalties. and user awareness training (A.7.2.2).
Section 65 of this Act provides that if anyone knowingly or intentionally conceals, destroys or
alters any computer source code used for a computer, computer Programme, computer system
or computer network, maintained by law for the being time in force, then they shall be punished
with imprisonment up to three year, or with fine which may extend up to two lakh rupees, or
with both.[6]
The main objective of this section is to protect the “intellectual property” invested in the
computer. It is an effort to protect the computer source documents (codes) beyond the
availability under the Copyright Law.
In this case, there was a company called Tata Indicom. Some employees of this company were
arrested for manipulation of the electronic 32- bit number (ESN) programmed into cell phones.
This theft was exclusively franchised to Reliance Infocom. It was held by the Court held that
tampering with source code invokes Section 65 of the Information Technology Act.
In this case, some terrorists attacked The Parliament House of India on 13 December 2001. The
Digital evidence played a vital role during their prosecution in this case. The accused argued
that the electronics evidence can be easily manipulated and hence, should not be relied.
The Court held that any challenge to the accuracy of computer evidence should be established
by the challenger. Mere theoretical and generic doubts cannot be casted on the evidence’s
authenticity.
(1) If any person with an intent to cause wrongful loss or damage to the public or any person
tries to destroy or delete or alters any information residing in a computer resource or reduce its
value or utility or affect it injuriously by any means, commits hacking.
(2) For the offence of hacking, one shall be punished with imprisonment up to three years, or
with fine up to two lakh rupees, or with both.
R v. Whiteley[10]
In this particular case, the accused somehow managed to gain unauthorized access to the Joint
Academic Network (JANET). He deleted some files and changed the passwords to deny access
to the authorized users.
The objective of this section is not merely to protect the information but to protect the integrity
and security of computer resources from attacks by unauthorized person seeking to enter such
resource, irrespective of the intention or motive.
Section 67 of this Act states that anyone who publishes or transmits any material which is
lascivious or appeals to the prurient interest electronically, shall be punished on first conviction
with imprisonment up to five years and with fine which may increase up to one lakh rupees. If
the person is involved in the event of a second or subsequent conviction, he shall be punished
with imprisonment for a term up to ten years and also with fine which may extend to two lakh
rupees.
In this case, a man posted obscene, defamatory and annoying message about a divorcee woman
in the Yahoo message group. These postings and fake messages resulted in annoying and
demeaning phone calls to the lady. Based on the complaint of that woman, police nabbed the
accused. He was a known family friend of the victim and wanted to marry her. She got married
to another person, but that marriage ended in divorce and the accused once again started
contacting her. When she did not agree to marry him, he started harassing her through the
internet. The accused is found guilty of offenses under Section 67 of the IT Act 2000.
Section 72 of the Information Technology Act 2002 provides that- Any person who, in
enactment of any of the powers conferred under this Act, rules or regulation, has secured assess
to any electronic record, book, register, correspondence, information, document or other
material without the consent of the person of the authority shall be punished with imprisonment
for a term which may extend to two years, or with fine which may extend to one lakh rupees,
or with both.
In short-
The Information Technology Act, 2000 (ITA 2000) is a comprehensive law passed by the
Indian Parliament to regulate, control, and deal with issues pertaining to electronic
commerce (e-commerce) and cybercrime within India. It was enacted to provide a legal
framework to facilitate electronic transactions, electronic filing, and digital signatures.
ITA 2000 also addresses security practices, procedures, and the prevention of
cybercrimes, extending to unauthorized access, data breaches, identity theft, and cyber
terrorism among others.
Legal Recognition of Electronic Transactions: ITA 2000 gives electronic records and
digital signatures the same legal standing as traditional paper documents and handwritten
signatures, facilitating e-commerce and e-governance.
Boost to E-commerce and E-governance: By providing a legal structure for electronic
transactions, ITA 2000 has significantly contributed to the growth of e-commerce and the
digitization of government services in India.
Cybercrime Legislation: It was one of the first laws globally to define and deal with
cybercrimes explicitly, setting a precedent for cyber law.
Attribution, Acknowledgment, and Dispatch of Electronic Records: ITA 2000 details
the framework for the creation, transmission, and validation of electronic records,
enhancing trust and reliability in electronic communications.
Regulation of Certifying Authorities: The act provides for the regulation of Certifying
Authorities, ensuring the integrity of digital certificates and facilitating secure digital
transactions.
Limited Scope on Privacy: While ITA 2000 addresses data protection in the context of
corporate bodies, it lacks a comprehensive approach to individual privacy protection,
especially with the rise of data mining and personal data exploitation.
Ambiguities and Broad Definitions: Certain sections of the Act have been criticized for
their broad and ambiguous definitions, leading to potential misinterpretation and misuse.
Jurisdiction Issues: The global nature of the internet means cybercrimes can be
transnational, which poses challenges in jurisdiction and enforcement under ITA 2000.
Technological Neutrality: Rapid advancements in technology mean that certain
provisions of ITA 2000 may become outdated or inadequate to address new forms of
cybercrimes or digital transactions.
Enforcement and Implementation Challenges: There have been concerns regarding the
effective enforcement of ITA 2000 provisions, partly due to the lack of technical expertise
among law enforcement agencies.
The Information Technology Act, 2000, marks a significant step in adapting Indian law to
the demands of the digital age.
Importance of Signatures
· Authentication – which concerns the assurance of identity.[5] When the sales clerk applies
the signature on the back of the credit card to the signature on the payment slip, the clerk utilizes
hand-written signatures as an identification method to ensure that the individual displaying the
credit card is the one to which the card was issued by the issuing bank.
· Data Integrity– It is the assurance that there has no data modification taken place after the
application of signature. Although handwritten signatures do not in itself offer data integrity
facilities, the standard protection procedures around handwritten signatures, including the
usage of indelible ink and tamper-evident material, provide a measure of data integrity. Digital
signatures provide excellent data integrity services because the digital signature value is the
function of the message digest; even the slightest modification of digitally signed messages
will always result in a signature verification failure.
· Non-repudiation – which seeks to provide evidence to a third party (such as a judge or jury)
that a party has participated in a transaction and thus protects other parties from false refusals
of participation in the transaction. The purchaser’s signature on the credit card payment slip
contains proof of the purchaser’s involvement in the transaction which defends the retailer and
the card-supplying bank against fraudulent denials of the purchaser’s involvement in the
transaction.
There are, of course, many situations in which documents have to be signed and archived, and
the signatures remain valid for the duration of the archive. Signatures on documents, for
example, can be called into doubt several decades after they have been implemented. Many
sources of signed archival records, collected from everyday life, include medical notes, service
discharge papers, and mortgages. When considering digital data archiving, it is important to
remember that digital signature verification requires each and every bit of the signed document
to be preserved and read correctly, just as it was when the signatory applied for the signature.
For example, turning a bit that changes the “s” character to the “S” character, would be
undesirable in any electronic document, and render a digitally signed document completely
unverifiable.
Digital signatures are exacerbating the problem of technological obsolescence. They make the
most common coping technique-transformation into new formats during transition periods-
impossible unless the original signatory can resign under a new format-a solution that is always
burdensome and often impossible. From a digital signature point of view, a modification to a
paper type is distinct from a shift to the text of the paper which would result in an unverifiable
signature. While handwritten signatures are forged in such a way that digital signatures are not,
by their cryptographic properties, digital signatures are subject to compromise (loss or
disclosure) on the private key of the signatory, just as Sumerian and Roman seals were subject
to lose or theft. Compromise is a vulnerability that is not associated with handwritten
signatures.
Forgery of handwritten signatures has been practiced for centuries, while forgery of digital
signatures, in the absence of compromising the private signature key, or the hijacking of the
signature mechanism, is virtually impossible. The forgery mechanisms for handwritten and
digital signatures are different.
The data integrity service provided by digital signatures is much stronger than that provided
by hand-written signatures. Handwritten signatures can be witnessed, whereas digital
signatures cannot be recorded, although they can be notarized. Manuscript signatures can be
verified on a perpetual basis, whereas digital signatures are likely to become unverifiable after
ten years or so due to data processing equipment and cryptographic standards obsolescence,
certificate expiry, and other factors.
According to the Information Technology Act, 2000, digital signatures mean authentication of
any electronic record by a subscriber by means of an electronic method or procedure in
accordance with the provisions of section 3. Further, the IT Act, 2000 deals with digital
signatures under Sections 2, 3, and 15.
Section 2(1)(p)
According to Section 2(1)(p), digital signature means ‘authentication of any electronic record
using an electronic method or procedure in accordance with the provisions of Section 3‘.
Further, authentication is a process for confirming the identity of a person or proving the
integrity of information. Authenticating messages involves determining the source of the
message and verifying that is has not been altered or modified in transit.
Introduction to Cyberspace
Section 3
Section 3 of the Information technology Act, 2000 provides certain provisions for the
authentication of electronic records. The provisions are:
Subject to the provisions of this section, any subscriber can affix his digital signature and
hence authenticate an electronic record.
An asymmetric crypto system and hash function envelop and transform the initial
electronic record into another record which affects the authentication of the record.
Also, any person in possession of the public key can verify the electronic record.
Further, every subscriber has a private key and a public key which are unique to him and
constitute a functioning key pair.
Let’s say that two parties agree to apply a certain security procedure. If it is possible to verify
that a digital signature affixed was
2. Also, it is linked to the electronic record in such a manner that a change in the record
invalidates the digital signature
then
ITA 2008
The Information Technology (Amendment) Act, 2008 (ITA 2008)
is a significant amendment to India's Information Technology Act,
2000 (IT Act 2000). It was enacted to address th e growing
challenges and needs in the realm of information technology and
cybersecurit y. The amendment came into effect on October 27,
2009, and introduced several key changes and additions to
strengthen the legal framework for secure electronic commerce,
electronic governance, data privacy, and cybersecurity.
Despite its comprehensive scope, ITA 2008 has faced criticism for
certain provisions that are seen as overly broad or vague,
potentially leading to misuse. Concerns have been raised about
privacy protections, freedom of expression, and the potential for
increased surveillance. The Act's implementation has also
highlighted the need for more clarity and guidelines on certain
issues, as well as the importance of ongoing updates to keep pace
with technological advancements.
Focus: Establishes commonly accepted control objectives, controls, and guidelines for
protecting PII.
Key Elements: Data protection, PII processors, cloud service agreements.
Purpose: To enhance privacy in cloud computing environments, especially relevant with
GDPR compliance.
Adoption: Targeted towards public cloud service providers.
Focus: Developed by the U.S. National Institute of Standards and Technology to provide a
policy framework of computer security guidance.
Key Elements: Identify, Protect, Detect, Respond, Recover.
Purpose: To help organizations manage and reduce cybersecurity risk.
Adoption: Although a U.S. standard, it's globally recognized and used by various
organizations.
8. CIS Controls
Focus: Developed by the Center for Internet Security, offering a prioritized set of actions to
protect organizations and data from known cyber attack vectors.
Key Elements: Basic, Foundational, and Organizational controls.
Purpose: To provide actionable guidance for improving an organization's cybersecurity
posture.
Adoption: Widely respected and implemented across industries.
Security Audit
Data processing auditors audits the usage of computer system in order to control it. The
auditor need control data which is obtained by computer system itself.
The role of auditor begins at the initial stage of system development so that resulting system
is secure. It describes an idea of utilization of system that can be recorded which helps in load
planning and deciding on hardware and software specifications. It gives an indication of wise
use of the computer system and possible misuse of the system.
Audit Trial
An audit trial or audit log is a security record which is comprised of who has accessed a
computer system and what operations are performed during a given period of time. Audit
trials are used to do detailed tracing of how data on the system has changed.
It provides documentary evidence of various control techniques that a transaction is subject to
during its processing. Audit trials do not exist independently. They are carried out as a part of
accounting for recovering lost transactions.
Audit Methods
Audit Considerations
Audit considerations examine the results of the analysis by using both the narratives and
models to identify the problems caused due to misplaced functions, split processes or
functions, broken data flows, missing data, redundant or incomplete processing, and
nonaddressed automation opportunities.
Security
System security refers to protecting the system from theft, unauthorized access and
modifications, and accidental or unintentional damage. In computerized systems, security
involves protecting all the parts of computer system which includes data, software, and
hardware. Systems security includes system privacy and system integrity.
System privacy deals with protecting individuals systems from being accessed and
used without the permission/knowledge of the concerned individuals.
System integrity is concerned with the quality and reliability of raw as well as
processed data in the system.
Control Measures
There are variety of control measures which can be broadly classified as follows −
Backup
Regular backup of databases daily/weekly depending on the time criticality and size.
Incremental back up at shorter intervals.
Backup copies kept in safe remote location particularly necessary for disaster recovery.
Duplicate systems run and all transactions mirrored if it is a very critical system and
cannot tolerate any disruption before storing in disk.
Password system.
Encrypting sensitive data/programs.
Training employees on data care/handling and security.
Antivirus software and Firewall protection while connected to internet.
Risk Analysis
A risk is the possibility of losing something of value. Risk analysis starts with planning for
secure system by identifying the vulnerability of system and impact of this. The plan is then
made to manage the risk and cope with disaster. It is done to accesses the probability of
possible disaster and their cost.
Risk analysis is a teamwork of experts with different backgrounds like chemicals, human
error, and process equipment.
As the risks or threats are changing and the potential loss are also changing, management of
risk should be performed on periodic basis by senior managers.
Risk management is a continuous process and it involves the following steps −
1. Preparation
Training: Investigators undergo rigorous training in cyber laws, digital forensics, and the
latest cybersecurity technologies.
Tools and Resources: Agencies equip themselves with advanced digital forensic tools and
software for evidence collection and analysis.
Standard Operating Procedures (SOPs): Developing SOPs ensures consistent and methodical
investigation processes, minimizing errors and oversights.
2. Identification
Incident Detection: The first step involves recognizing a potential security incident or
cybercrime, often reported by victims, detected through monitoring systems, or uncovered by
cybersecurity teams.
Preliminary Assessment: Investigators perform an initial assessment to understand the scope,
nature, and severity of the incident.
3. Legal Considerations
Warrants and Permissions: Obtaining necessary legal warrants or permissions is crucial for
accessing and examining digital evidence, ensuring the investigation adheres to legal
standards.
Jurisdictional Challenges: Cybercrimes can transcend national boundaries, raising complex
jurisdictional issues that may require international cooperation.
4. Evidence Collection
Preservation: Immediate actions are taken to preserve digital evidence. This could involve
isolating affected systems to prevent data tampering or loss.
Acquisition: Digital evidence is collected in a forensically sound manner, ensuring it remains
unchanged from its original state. This might involve making bit-by-bit copies of data.
Chain of Custody: Maintaining a clear and documented chain of custody is essential for
ensuring the integrity and admissibility of evidence in legal proceedings.
5. Analysis
Data Examination: Investigators analyze the collected evidence using forensic tools to
uncover hidden, deleted, or encrypted data.
Attribution: Efforts are made to trace the cybercrime back to its source, which can be
challenging due to techniques like IP spoofing and the use of anonymizing services.
Pattern Recognition: Analyzing attack patterns can help in identifying the perpetrators,
especially if they have a history of similar offenses.
6. Reporting
Documentation: Detailed reports are prepared, documenting the evidence found, the analysis
performed, and the conclusions drawn.
Recommendations: Reports may also include recommendations for preventing future
incidents, enhancing security measures, or taking legal action against the perpetrators.
7. Legal Action and Follow-up
Prosecution: The collected evidence and reports can be used to prosecute the accused in
court.
Feedback Loop: Lessons learned from the investigation feed back into improving
organizational cybersecurity policies and practices.
8. International Cooperation
Given the global nature of the internet, investigating agencies often collaborate with
international counterparts, sharing intelligence and resources to combat cybercrime
effectively.
Intellectual Property Rights (IPR) in cyberspace refer to the legal protections afforded to
creators and owners of intellectual property (IP) for their works that are created, distributed,
and accessed in digital form across the internet and other electronic networks. As the digital
landscape continues to expand, so does the significance of IPR in protecting the economic
and moral rights of creators in the online world. Here’s a detailed look into IPR in
cyberspace:
1. Copyrights:
Protect original works of authorship, including software, digital books, and online
articles.
Automatically applies to digital content as soon as it is created and fixed in a tangible
form.
2. Trademarks:
Used to protect brand names, logos, and slogans in the digital realm.
Essential for maintaining brand identity on the internet.
3. Patents:
May protect inventions, including software or business methods, subject to national
laws and interpretations.
Important for safeguarding proprietary technologies.
4. Domain Names:
Considered as business identifiers and can be protected under trademark laws.
Disputes may be resolved through ICANN’s Uniform Domain-Name Dispute-
Resolution Policy (UDRP).
5. Challenges:
Difficulty in policing IPR violations across jurisdictions.
Rapid dissemination of digital content complicates enforcement.
6. Enforcement:
Use of digital rights management (DRM) technologies to control access and
distribution.
Legal actions may involve cease and desist orders, takedowns, or litigation.
7. International Treaties and Agreements:
World Intellectual Property Organization (WIPO) treaties, such as the Copyright
Treaty (WCT) and the Performances and Phonograms Treaty (WPPT), address digital
IPR.
The Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS)
sets minimum standards for IPR protection and enforcement.
UNIT -VI Introduction to Forensics
Introduction, General Guidelines, Finding Evidence on the PC, Finding Evidence
in System Logs , Getting Back Deleted Files, Operating System Utilities,
Mobile Forensics: Cell Phone Concepts
Introduction
Cyber forensics is a process of extracting data as proof for a crime (that involves electronic
devices) while following proper investigation rules to nab the culprit by presenting the
evidence to the court. Cyber forensics is also known as computer forensics. The main aim
of cyber forensics is to maintain the thread of evidence and documentation to find out who
did the crime digitally. Cyber forensics can do the following:
It can recover deleted files, chat logs, emails, etc
It can also get deleted SMS, Phone calls.
It can get recorded audio of phone conversations.
It can determine which user used which system and for how much time.
It can identify which user ran which program.
General Guidelines
Here are some fundamental guidelines for conducting cyber forensic investigations:
1. Prepare Thoroughly
Training and Certification: Ensure that investigators are properly trained and, if possible,
certified in digital forensics methodologies and tools.
Forensic Toolkit: Maintain a toolkit of approved forensic software and hardware tools,
keeping them updated to handle the latest technologies.
2. Follow Legal Requirements
Chain of Custody: Maintain a detailed chain of custody for all evidence, documenting every
individual who handled the evidence and any actions taken.
Data Integrity: Use write blockers when accessing storage media to prevent altering the
data. Create bit-for-bit copies (forensic images) of storage devices for analysis.
4. Systematic Collection
Prioritization: Identify and prioritize relevant data sources based on the investigation
objectives.
Comprehensive Collection: Collect all potentially relevant information, including deleted,
encrypted, or hidden data, without altering the original evidence.
Physical Security: Store physical devices and media securely to prevent unauthorized access
or damage.
Digital Security: Protect forensic images and other digital evidence with strong encryption
when stored or transmitted.
6. Document Everything
Documentation: Keep detailed records of all investigative steps, including how evidence
was collected, analyzed, and preserved.
Reporting: Prepare clear, comprehensive, and objective reports detailing the findings and the
methods used to reach them.
7. Analysis
Use Approved Tools: Analyze the digital evidence using reliable and validated forensic
software tools.
Repeatability: Ensure that analyses are conducted in such a way that another investigator
could replicate the process and arrive at the same findings.
Confidentiality: Keep all information confidential and disclose findings only to authorized
individuals.
Impartiality: Approach all investigations with an unbiased and objective mindset.
9. Continual Learning
Stay Updated: Keep abreast of the latest developments in digital forensics, including new
tools, techniques, and emerging technologies.
Professional Development: Participate in ongoing training and professional development
opportunities to enhance skills and knowledge.
Peer Review: Have forensic processes and findings reviewed by a peer or supervisor to
ensure accuracy and completeness.
Adhere to Standards: Follow industry standards and best practices, such as those set by the
International Organization for Standardization (ISO) or the National Institute of Standards
and Technology (NIST).
Cyber forensics is a field that follows certain procedures to find the evidence to reach
conclusions after proper investigation of matters. The procedures that cyber forensic
experts follow are:
Identification: The first step of cyber forensics experts are to identify what evidence is
present, where it is stored, and in which format it is stored.
Preservation: After identifying the data the next step is to safely preserve the data and
not allow other people to use that device so that no one can tamper data.
Analysis: After getting the data, the next step is to analyze the data or system. Here the
expert recovers the deleted files and verifies the recovered data and finds the evidence
that the criminal tried to erase by deleting secret files. This process might take several
iterations to reach the final conclusion.
Documentation: Now after analyzing data a record is created. This record contains all
the recovered and available(not deleted) data which helps in recreating the crime scene
and reviewing it.
Presentation: This is the final step in which the analyzed data is presented in front of
the court to solve cases.
In the early 80s PCs became more popular and easily accessible to the general population, this
also led to the increased use of computers in all fields and criminal activities were no exception
to this. As more and more computer-related crimes began to surface like computer frauds,
software cracking, etc. the computer forensics discipline emerged along with it. Today digital
evidence collection is used in the investigation of a wide variety of crimes such as fraud,
espionage, cyberstalking, etc. The knowledge of forensic experts and techniques are used to
explain the contemporaneous state of the digital artifacts from the seized evidence such as
computer systems, storage devices (like SSDs, hard disks, CD-ROM, USB flash drives, etc.),
or electronic documents such as emails, images, documents, chat logs, phone logs, etc.
Process involved in Digital Evidence Collection:
The main processes involved in digital evidence collection are given below:
Data collection: In this process data is identified and collected for investigation.
Examination: In the second step the collected data is examined carefully.
Analysis: In this process, different tools and techniques are used and the collected evidence
is analyzed to reach some conclusion.
Reporting: In this final step all the documentation, reports are compiled so that they can
be submitted in court.
There are multiple types of computer forensics depending on the field in which digital
investigation is needed. The fields are:
Network forensics: This involves monitoring and analyzing the network traffic to and
from the criminal’s network. The tools used here are network intrusion detection
systems and other automated tools.
Email forensics: In this type of forensics, the experts check the email of the criminal
and recover deleted email threads to extract out crucial information related to the case.
Malware forensics: This branch of forensics involves hacking related crimes. Here, the
forensics expert examines the malware, trojans to identify the hacker involved behind
this.
Memory forensics: This branch of forensics deals with collecting data from the
memory(like cache, RAM, etc.) in raw and then retrieve information from that data.
Mobile Phone forensics: This branch of forensics generally deals with mobile phones.
They examine and analyze data from the mobile phone.
Database forensics: This branch of forensics examines and analyzes the data from
databases and their related metadata.
Disk forensics: This branch of forensics extracts data from storage media by searching
modified, active, or deleted files.
Cyber forensic investigators use various techniques and tools to examine the data and some
of the commonly used techniques are:
Reverse steganography: Steganography is a method of hiding important data inside
the digital file, image, etc. So, cyber forensic experts do reverse steganography to
analyze the data and find a relation with the case.
Stochastic forensics: In Stochastic forensics, the experts analyze and reconstruct digital
activity without using digital artifacts. Here, artifacts mean unintended alterations of
data that occur from digital processes.
Cross-drive analysis: In this process, the information found on multiple computer
drives is correlated and cross-references to analyze and preserve information that is
relevant to the investigation.
Live analysis: In this technique, the computer of criminals is analyzed from within the
OS in running mode. It aims at the volatile data of RAM to get some valuable
information.
Deleted file recovery: This includes searching for memory to find fragments of a
partially deleted file in order to recover it for evidence purposes.
Advantages
INTRODUCTION
Computer Forensics is a scientific method of investigation and analysis in order to gather
evidence from digital devices or computer networks and components which is suitable
for presentation in a court of law or legal body. It involves performing a structured
investigation while maintaining a documented chain of evidence to find out exactly what
happened on a computer and who was responsible for it.
TYPES
Disk Forensics: It deals with extracting raw data from the primary or secondary
storage of the device by searching active, modified, or deleted files.
Network Forensics: It is a sub-branch of Computer Forensics that involves
monitoring and analyzing the computer network traffic.
Database Forensics: It deals with the study and examination of databases and their
related metadata.
Malware Forensics: It deals with the identification of suspicious code and studying
viruses, worms, etc.
Email Forensics: It deals with emails and their recovery and analysis, including
deleted emails, calendars, and contacts.
Memory Forensics: Deals with collecting data from system memory (system
registers, cache, RAM) in raw form and then analyzing it for further investigation.
Mobile Phone Forensics: It mainly deals with the examination and analysis of phones
and smartphones and helps to retrieve contacts, call logs, incoming, and outgoing
SMS, etc., and other data present in it.
CHARACTERISTICS
Identification: Identifying what evidence is present, where it is stored, and how it is
stored (in which format). Electronic devices can be personal computers, Mobile
phones, PDAs, etc.
Preservation: Data is isolated, secured, and preserved. It includes prohibiting
unauthorized personnel from using the digital device so that digital evidence,
mistakenly or purposely, is not tampered with and making a copy of the original
evidence.
Analysis: Forensic lab personnel reconstruct fragments of data and draw conclusions
based on evidence.
Documentation: A record of all the visible data is created. It helps in recreating and
reviewing the crime scene. All the findings from the investigations are documented.
Presentation: All the documented findings are produced in a court of law for further
investigations.
PROCEDURE:
The procedure starts with identifying the devices used and collecting the preliminary
evidence on the crime scene. Then the court warrant is obtained for the seizure of the
evidence which leads to the seizure of the evidence. The evidence are then transported to
the forensics lab for further investigations and the procedure of transportation of the
evidence from the crime scene to labs are called chain of custody. The evidence are then
copied for analysis and the original evidence is kept safe because analysis are always
done on the copied evidence and not the original evidence.
The analysis is then done on the copied evidence for suspicious activities and
accordingly, the findings are documented in a nontechnical tone. The documented
findings are then presented in a court of law for further investigations.
Some Tools used for Investigation:
Tools for Laptop or PC –
COFFEE – A suite of tools for Windows developed by Microsoft.
The Coroner’s Toolkit – A suite of programs for Unix analysis.
The Sleuth Kit – A library of tools for both Unix and Windows.
Tools for Memory :
Volatility
WindowsSCOPE
Tools for Mobile Device :
MicroSystemation XRY/XACT
APPLICATIONS
Intellectual Property theft
Industrial espionage
Employment disputes
Fraud investigations
Misuse of the Internet and email in the workplace
Forgeries related matters
Bankruptcy investigations
Issues concerned the regulatory compliance
Advantages of Computer Forensics :
To produce evidence in the court, which can lead to the punishment of the culprit.
It helps the companies gather important information on their computer systems or
networks potentially being compromised.
Efficiently tracks down cyber criminals from anywhere in the world.
Helps to protect the organization’s money and valuable time.
Allows to extract, process, and interpret the factual evidence, so it proves the
cybercriminal action’s in the court.
Disadvantages of Computer Forensics :
Before the digital evidence is accepted into court it must be proved that it is not
tampered with.
Producing and keeping electronic records safe is expensive.
Legal practitioners must have extensive computer knowledge.
Need to produce authentic and convincing evidence.
If the tool used for digital forensics is not according to specified standards, then in a
court of law, the evidence can be disapproved by justice.
A lack of technical knowledge by the investigating officer might not offer the desired
result.
System logs provide digital footprints and time stamps of exactly what occurred on a device
at any given time, actions taken, and can usually tie changes back to specific users.
Logs are so important to businesses that regulations, such as the Federal Rules of Civil
Procedure (FRCP), require corporations to securely manage logs for incident response
support and forensic analysis in potential breaches or crimes.
All logs are not created equal and can quickly overwhelm security staff if excessive logs are
captured that provide little security value.
For example, firewalls can generate millions of debug logs daily that have no intrinsic value
to investigations, so companies are advised against storing irrelevant debug data.
As a security engineer for Tripwire, we typically advise clients to prioritize capturing the
following logs at minimum:
Network device
Business critical server audit
Critical system file change
User authentication
Business critical database
Logs of all actions tied to administrator accounts for offsite storage
Active directory
Management account
Security appliances and/or applications
It is important to note that system and audit logging differs among operating systems and
network infrastructure.
For example, root is used for administrator and elevated privileges in Unix systems, but not
Windows. Therefore, security staff should build their logging strategy according to vendor
best practices.
More importantly, security professionals should consult with business units, including legal,
to align the strategy with business requirements. This will ensure that all regulatory mandates
are covered and that risks are being properly evaluated from a holistic approach.
The biggest log collection & examination challenge is overwhelming amounts of data being
generated daily. The Cloud Security Alliance estimates that some large enterprises generate 1
trillion events per day, a number that can grow as more data sources are added as more
people or hired or more data gets moved to the cloud.
Another issue is gaps in logs. Although the number 1 control on the Top 20 Critical Security
Controls is asset management, many companies still struggle with identifying and classifying
all of their assets.
If the business is not aware assets exist, then they cannot log the security events needed to aid
in forensics investigations.
Finally, extremely large and disparate data sets make it nearly impossible for forensics
experts to correlate actionable intelligence with criminal activity.
Chief Security Officer Preston Woods concurs. During a 2012 interview, he states that his
direct reports are, “swimming in data but had a hard time turning that into action”.
If the people on teams that are familiar with their environments are overwhelmed, then it will
be extremely difficult for investigators to compile cohesive logs that contain actionable
intelligence.
These challenges show that the biggest log collection and examination issues organizations
face are the voluminous amounts of data being generated.
Log Priority in Intrusions, Malware, and File Deletion Events
Similar to other forensics sources, logs can contain relevant forensics data to help reconstruct
all events on a system and tie actions to specific users. However, the value of the log data will
be determined by whether gaps exist, proper events were logged on each system, and the
availability of archived logs during the time frame in question.
Many companies only store logs for the amount of time and quantity required by law, and
their data retention policies govern which logs are kept for specific purposes. Although logs
are useful for forensic investigations, they are more important to some events types than
others.
Let’s review prioritization aspects of logs in network intrusions, malware installs, and file
deletions.
Logs from intrusion detection/prevention systems, firewalls, routers, and switches are critical
during network intrusion investigations.
In the event of a breach, logs from network infrastructure should be the first data sources
under review. These logs can be correlated in security analytics tools to establish a timeline
of events and help determine what actions should be taken.
Logs can be a good source of relevant data for malware installations, but evidence of
malware will usually appear in file system changes first.
For example, malware typically alters critical system files to phone home to command and
control servers as an authenticated user to hide itself as long as possible. The fact that the user
is authenticated will allow the activity to continue unnoticed.
In my professional experience, changes to critical system files, such as .dll files, will identify
the anomalous activity.
For this reason, logs are considered secondary sources for malware installations.
Logs can be modified or deleted to cover up evidence of tampering and malicious activity. It
can be used in certain situations for attribution depending on the level of logging on the
systems, but it is not the most reliable form of attribution. Therefore, logs are secondary for
file system deletions.
Summary of key findings:
Logs provide digital footprints and time stamps of exactly what occurred on a device at any
given time, actions taken, and can usually tie changes back to specific users. The main issues
with logs include gaps in coverage, availability of archived log data, and voluminous
amounts of data that can be overwhelming.
All data sources are not created equal, and security professionals must understand how to
rank sources by the order of importance.
Logs are a primary forensics data source in network intrusions and insider file deletions.
However, logs are a secondary source in malware investigations because evidence typically
presents itself in file system changes first.
Log Forensics: The Basics of Finding Intel in Your Logs
Today’s post covers yet another log-related concept: log forensics. What’s this, and why
should your organization care about it?
Well, this is a topic related to logs, which are ubiquitous in the technology field. An IT
organization that doesn’t generate many MBs worth of logs each day would be a rare
occurrence nowadays.
Get log data insights in just a few clicks – Try XpoLog out-of-the-box log analysis platform.
Even though logs are omnipresent, specific terms might not be so well-known. Not long
ago, we covered log analytics, and today it’s log forensics time.
This post starts similarly to the log analytics one, by providing a brief overview of logging
and its value to an organization. If you have experience with logging, you can skip this
section without missing anything.
Then we get to the meat of the post, where we define log forensics, explain what it’s used
for, and how it differs from other approaches, such as log analytics. Let’s get started.
As promised, before we start covering log forensics itself, we’ll do a quick overview of
logging. What is logging all about?
The primary use for logging of any kind is troubleshooting. Reading through log entries
gives you this sort of time-travel power. By reading application logs, for instance, you can
retrace the actions a user performed in an application, so you can understand and fix a
problem.
Using logs only that way, though, really amounts to a reactive use. Don’t get me wrong:
using logging to understand and fix problems is an amazingly useful approach. But at the
end of the day, you’re leaving money on the table if you can’t put your logs to work for you
in a more proactive manner.
That’s where approaches like log analytics come in handy since they allow you to use your
logs in a more proactive manner, by extracting insights for them and potentially preventing
problems before they happen.
How exactly does log forensics fit into this picture? How does it differ from log analytics?
That’s what we’re going to see next.
We’ve just given you a quick overview of logging. Now you understand what logging is
and why it matters if you didn’t know that already.
With that out of the way, we’re ready to get to the topic that gives the post its name: log
forensics.
Computer forensics is the application of investigation and analysis techniques to gather and
preserve evidence from a particular computing device in a way that is suitable for
presentation in a court of law. The goal of computer forensics is to perform a structured
investigation while maintaining a documented chain of evidence to find out exactly what
happened on a computing device and who was responsible for it.
Computer forensics is (the) application of the scientific method to digital media in order to
establish factual information for judicial review.
Now we’ll offer a brief definition of a term we’ve mentioned a few times throughout this
post: log analytics.
We actually have a whole post on the topic, and we recommend you read it. But in any case,
here you have the definition we gave to log analytics there:
Since log forensics involves log analytics, the definition above makes it obvious that log
forensics is much more involved than just looking at log entries.
Since we’ve already defined both computer forensics and log analytics, we’re ready to put
the two together to come up with a proper definition of log forensics.
Log forensics is, in short, the fusion between computer forensics and log analytics. Putting
the two concepts together, we can come up with a definition like this:
Log forensics means using log analytics in forensics. In other words, it means to perform
analysis on log entries, in order to extract knowledge and insights from them, but with a
very specific goal in mind: to establish factual information for judicial review.
I’ve seen log forensics be described as an intersection between law, science, and
technology, and that’s not a bad way to put it. We could think of log forensics as a
specialization of log analytics geared toward judicial investigations.
So, what is log forensics useful for? Does your organization need to care about it? That’s
what the next section will cover.
We’ve just defined log forensics, but you might still be wondering what its applications are.
It all boils down to security.
In short, log forensics is part of a response to incidents strategy. “Incident” here refers to
security incidents. Those might be harmless, routine events, but might also be more severe
occurrences, such as hacks or crimes.
Finally, as mentioned before, we’ll understand how log forensics differs from log
analytics. The two approaches are meant to extract useful insights from logs, so these can
be used to solve or even prevent problems and help in decision making. So, what is the
difference, if there is any?
Basically, the difference resides in the overall goals of the two approaches. Log analytics
means just analyzing the logs to learn something. Log forensics, on the other hand, has
judicial purposes.
In other words, we can think of log forensics as a specialization of log analysis. And since
log forensics is also a form of computer forensics, you can expect a greater degree of
severity, norms, and regulations. And that’s because, as we’ve mentioned, computer
forensic belongs to the realm of law. It’s become an area of scientific expertise, with
accompanying coursework and certification.
Digital Evidence is any information that is stored or transmitted in the digital form that a
party at court can use at the time of trial. Digital evidence can be Audio files, and voice
recordings, Address books and contact lists, Backups to various programs, including
backups to mobile devices, Browser history, Cookies, Database, Compressed archives (ZIP,
RAR, etc.) including encrypted archives, etc.
Destroyed Evidence
In a criminal or cyber-criminal case, the attempts to destroy the evidence are very common.
Such attempts can be more or less successful depending upon the following conditions:
Deleted Files
Deleting files is one of the easiest, convenient, and foremost way to destroy the evidence.
Whether it is using the “Delete” button or “Shift+Delete” button. The principle of file
recovery of deleted files is based on the fact that Windows does not wipe the contents of
the file when it’s being deleted. Instead, a file system record storing the exact location of
the deleted file on the disk is being marked as “deleted” and the disk space previously
occupied by the deleted file is then labeled as available – but not overwritten with zeroes or
other data.
The deleted file can be retrieved by analyzing the contents of the recycle bin as they are
temporarily stored there before being erased.
If the deleted files have no trace in the recycle bin like in case of the “Shift+Delete”
command, then, in that case, you can use commercial recovery tools to recover the
deleted evidence. One such example commercial tool is DiskInternals Partition
Recovery.
Looking for characteristic signatures of known file types by analyzing the file system
and/or scanning the entire hard drive, one can successfully recover :
Files that were deleted by the user.
Temporary copies of Office documents (including old versions and revisions
of such documents).
Temporary files saved by many applications.
Renamed files.
Information stored in deleted files can be supplemented with data collected from other
sources. For example, the “chatsync” folder in Skype stores the internal data that may
contain chunks and bits of user conversations. This means if the “chatsync” folder
exists there is a possibility to recover user chat’s even if the Skype database is deleted.
Many tools exist for this purpose like Belkasoft Evidence Center 2020.
SSD Drives
SSD means Solid-State Drives represent a new storage technology.
Data Carving
Carving means bit-precise and sequential examination of the entire content of the hard
drive. The concept of Data Carving is completely different from File Recovery. Carving
allows:
Identifying particular signatures or patterns that may give a clue that some interesting
data can be stored in a particular spot on the disk.
Locating various artifacts that would not be available otherwise.
Data Carving is truly amazing when looking for destroyed evidence. In the case of data
carving, investigators don’t need to rely on files as they may be partially overwritten,
fragmented and scattered around the disk. Data Carving has the following features when we
are dealing with the text content:
Overview: The understanding of an OS and its file system is necessary to recover data for
computer investigations. The file system provides an operating system with a roadmap to data
on the hard disk. The file system also identifies how hard drive stores data. There are many
file systems introduced for different operating systems, such as FAT, exFAT, and NTFS for
Windows Operating Systems (OSs), and Ext2fs, or Ext3fs for Linux OSs. Data and file
recovery techniques for these file systems include data carving, slack space, and data hiding.
Another important aspect of OS forensics is memory forensics, which incorporates virtual
memory, Windows memory, Linux memory, Mac OS memory, memory extraction, and swap
spaces. OS forensics also involves web browsing artifacts, such as messaging and email
artifacts. Some indispensable aspects of OS forensics are discussed in subsequent sections.
Windows
Windows is a widely used OS designed by Microsoft. The file systems used by Windows
include FAT, exFAT, NTFS, and ReFS. Investigators can search out evidence by analyzing
the following important locations of the Windows:
Recycle Bin: This holds files that have been discarded by the user. When a user
deletes files, a copy of them is stored in recycle bin. This process is called “Soft
Deletion.” Recovering files from recycle bin can be a good source of evidence.
Registry: Windows Registry holds a database of values and keys that give useful
pieces of information to forensic analysts. For example, see the table below that
provides registry keys and associated files that encompasses user activities on the
system.
Thumbs.db Files: These have images’ thumbnails that can provide relevant
information.
Browser History: Every Web Browser generates history files that contain significant
information. Microsoft Windows Explorer is the default web browser for Windows
OSs. However, some other supported browsers are Opera, Mozilla Firefox, Google
Chrome, and Apple Safari.
Print Spooling: This process occurs when a computer prints files in a Windows
environment. When a user sends a print command from a computer to the printer, the
print spooling process creates a “print job” to some files that remain in the queue
unless the print operation is completed successfully. Moreover, the printer
configuration is required to be set in either EMF mode or RAW mode. In a RAW
mode, the print job merely provides a straight graphic dump of itself, whereas with an
EMF mode, the graphics are converted into the EMF image format (Microsoft
Enhanced Metafile). These EMF files can be indispensable and can provide an
empirical evidence for forensic purposes. The path to EMF files is:For Windows NT
and 2000: Winntsystem32spoolprintersFor Windows
XP/2003/Vista/2008/7/8/10: Windowssystem32spoolprintersOS forensic tools can
automatically detect the path; there is no need to define it manually.
A love triangle of three Russian students led to a high-profile murder of one of them. A
female defendant stalked her former lover for a couple of months in order to kill his new
girlfriend. Once a day, she found the right moment and drove to her boyfriend’s apartment
where his new girlfriend was alone. She murdered the girl and tried not to leave any evidence
behind to assist the investigation process. However, she used used her computer extensively
in the plotting of the crime, a fact that later provided strong material evidence during the
entire process of her trail. For example, she made three printouts for directions from her
home to her boyfriend’s apartment.
The forensic examiners took her computer into custody and recovered the spool files (or
EME files) from her computer. Among one of the three pages within spool files provide
substantial evidence against her (defendant). The footer at the bottom of the page
incorporates the defendant’s address and her former lover’s address, including the date and
time when the print job was performed. This evidence later proved to be a final nail in her
coffin.
Linux
Linux is an open source, Unix-like, and elegantly designed operating system that is
compatible with personal computers, supercomputers, servers, mobile devices, netbooks, and
laptops. Unlike other OSs, Linux holds many file systems of the ext family, including ext2,
ext3, and ext4. Linux can provide an empirical evidence if the Linux-embedded machine is
recovered from a crime scene. In this case, forensic investigators should analyze the
following folders and directories.
/etc [%SystemRoot%/System32/config]
This contains system configurations directory that holds separate configuration files for each
application.
/var/log
This directory contains application logs and security logs. They are kept for 4-5 weeks.
/home/$USER
/etc/passwd
Mac OS X
Mac OS X is the UNIX-based operating system that contains a Mach 3 microkernel and a
FreeBSD-based subsystem. Its user interface is Apple-like, whereas the underlying
architecture is UNIX-like.
Mac OS X offers a novel technique to create a forensic duplicate. To do so, the perpetrator’s
computer should be placed into a “Target Disk Mode.” Using this mode, the forensic
examiner creates a forensic duplicate of perpetrator’s hard disk with the help of a Firewire
cable connection between the two PCs.
iOS
Apple iOS is the UNIX-based operating system first released in 2007. It is a universal OS for
all of Apple’s mobile devices, such as iPhone, iPod Touch, and iPad. An iOS embedded
device retrieved from a crime scene can be a rich source of empirical evidence.
Android
Android is a Google’s open-source platform designed for mobile devices. It is widely used as
the mobile operating system in the handsets industry. The Android operating system runs on
a Linux-based kernel which supports core functions, such as power management, network
infrastructure, and device drivers. Android’s Software Development Kit (SDK) contains a
very significant tool for generic and forensic purposes, namely Android Debug Bridge
(ADB). ADB employs a USB connection between a computer and a mobile device.
Disk-to-disk copy: This works best when the disk-to-image method is not possible. Tools for
this approach include SnapCopy, EnCase, or SafeBack.
The Sparse copy of a file: This is a preferable method if time is limited and the disk has a
large volume of data storage.
For both Linux and Windows Operating Systems, write-blocking utilities with Graphical
User Interface (GUI) tools must be used in to gain access to modify the files. A Linux Live
CD offers many helpful tools for digital forensics acquisition.
What tools are most useful when conducting operating system forensics?
Many tools can be used to perform data analysis on different Operating Systems. The most
common tools are described below.
Cuckoo Sandbox
This tool is mainly designed to perform analysis on malware. Cuckoo Sandbox takes
snapshots of virtual machines so that the investigator can compare the state of the system
before and after the attack of malware. Since malware mostly attacks Windows OS, Windows
virtual machines are used for this purpose. Figure 1 demonstrates malware’s behavior on a
network.
Forensic specialists use a forensic toolkit to collect evidence from a Linux Operating System.
The toolkit comprises many tools such as Dmesg, Insmod, NetstatArproute, Hunter.O,
DateCat, P-cat, and NC.
Helix
Helix is the distributor of the Knoppix Live Linux CD. It provides access to a Linux kernel,
hardware detections, and many other applications.
Helix CD also offers some tools for Windows Forensics, such as:
Asterisk Logger
Registry Viewer
Screen Capture
File Recovery
Rootkit Revealer
MD5 Generator
Command Shell
Security Reports
IE Cookies Viewer
Mozilla Cookies Viewer
X-Ways forensics
X-Ways Forensics offers a forensics work environment with some remarkable features, such
as:
Disk imaging and cloning, including under Disk Operating System (DOS)
Compatible with UDF, CDFS, ext2, ext3, NTFS, and FAT
Views and dumps the virtual memory of running processes and physical RAM
Gathers inter-partition space, free space, and slack space
Mass hash calculations for files
Ensures data authenticity with write protection feature
Automated files, signature check
These utilities can help in acquiring, analyzing, and evaluating digital evidence from
computers and other devices. The focus here is on the built-in utilities that come with
operating systems like Windows, macOS, and Linux, which forensic analysts often utilize
during the initial phases of an investigation.
1. Windows Utilities
Event Viewer: Allows investigators to view logs and events that Windows records,
including system, security, and application events. This can help trace user activities,
system errors, and security incidents.
Registry Editor (Regedit): Windows Registry stores configuration settings and options.
Investigators can examine installed software, user profiles, and system configurations.
Task Manager and Resource Monitor: Provide insights into running processes, system
performance, network activity, and resource usage, which can be critical in identifying
malicious activities.
Windows Search/Indexing Service: Useful for quickly locating files and data of interest
based on specific criteria such as file names, content, and properties.
PowerShell: A powerful command-line shell that allows for advanced scripting and
automation. Forensic analysts can use PowerShell scripts to automate the collection and
analysis of forensic data.
2. macOS Utilities
System Information: Provides detailed information about the hardware and system
configuration, including installed software and peripheral devices.
Console: Allows access to system and application logs, which can provide valuable
information about system events and user actions.
Disk Utility: Useful for managing disk drives and volumes including mounting,
unmounting, and encrypting drives, as well as creating disk images which are essential for
forensic duplication.
Terminal: The command-line interface in macOS that enables investigators to use
powerful Unix commands for data searching, processing, and analysis.
3. Linux Utilities
Grep: Command-line utility for searching plain-text data sets for lines that match a regular
expression. It's crucial for filtering and examining log files or specific datasets.
dd: A command-line tool for converting and copying files. It can be used to create raw
disk images, a fundamental task in data forensics.
Netstat: Helps in examining the network connections and listening ports, along with the
routing table. This is crucial for identifying active connections and potential backdoors.
Foremost: An open-source forensic program to recover lost files based on their headers,
footers, and internal data structures. Although not built into Linux, it's commonly used in
forensic distros.
4. Cross-Platform Utilities
Wireshark: Although not a built-in utility, it's an essential tool for capturing and analyzing
network packets. Available on Windows, macOS, and Linux, it provides deep insights into
network activities.
File carving tools like scalpel and photorec can be used across different OSes for
recovering deleted files by scanning the disk's raw data.
Mobile Forensics:
Mobile forensics, a subtype of digital forensics, is concerned with retrieving data from an
electronic source. The recovery of evidence from mobile devices such as smartphones and
tablets is the focus of mobile forensics. Because individuals rely on mobile devices for so
much of their data sending, receiving, and searching, it is reasonable to assume that these
devices hold a significant quantity of evidence that investigators may utilize.
Mobile devices may store a wide range of information, including phone records and text
messages, as well as online search history and location data. We frequently associate mobile
forensics with law enforcement, but they are not the only ones who may depend on evidence
obtained from a mobile device.
Uses of Mobile Forensics:
The military uses mobile devices to gather intelligence when planning military operations or
terrorist attacks. A corporation may use mobile evidence if it fears its intellectual property is
being stolen or an employee is committing fraud. Businesses have been known to track
employees’ personal usage of business devices in order to uncover evidence of illegal
activity. Law enforcement, on the other hand, may be able to take advantage of mobile
forensics by using electronic discovery to gather evidence in cases ranging from identity theft
to homicide
The Definition of Mobile Forensics
Mobile forensics is the process of acquisition and analysis of electronically stored
information to support or contest a premise in court proceedings and civil or criminal
investigations. The proliferation of mobile devices and the amount of data they hold has
made mobile forensics an indispensable resource for digital forensic investigators.
Mobile phone forensics overlaps with digital forensics but has many features of its own.
However, using this wealth of data to unearth the truth without compromising its integrity
requires you to handle and process the evidence very carefully.
Media: Common media types include videos, pictures, and audio. Mobile devices are
capable of both generating and receiving media. A mobile device uses its camera and
microphone to generate media while it can receive media through the internet or a variety of
other sources. Many apps save media in a way that is accessible to all other apps on the
phone. On the other hand, some apps may save media in their proprietary format or even in
an encrypted form.
Call Record: Call record information shows the contact information, time, and duration of
the calls made and received by a device. A user can also install a call recording app on the
device. In this case, the conversation between the parties can also be accessed through saved
audio files.
Messages: There is a wide range of messaging apps, and they are capable of sending and
receiving almost all types of files as attachments. When looking for messages, you must
analyze all pre-installed and user-installed apps and collect relevant evidence.
Contacts: Every mobile has one or more pre-installed apps to store contacts, but user-
installed apps may maintain their own database of contact. Analyzing contacts may offer
useful insights.
Browsing Data: Web browsers save a lot of information about the websites you visit. They
store the web address along with media, and in many cases, login information of the websites.
Task-Management Apps: Calendar entries, to-do lists, and notes can also offer useful
information to investigators.
Location Data: Almost all modern smartphone and tablet devices have built-in GPS, and
depending on the user settings, many apps might be recording this data. Examining the apps
may enable you to correctly identify the time and location of the device at the time of your
interest. In addition to GPS, devices store location data based on the Wi-Fi networks and
cellphone towers they connect to.
Other Data: Other useful data may include data generated by other apps, a word processor or
a spreadsheet for example. Useful data may be found in system files and logs as well.
Please note that these are the examples of the most common data types, but there are many
other data types, which should be based on each mobile forensic case as unique and look for
the data that is most relevant to the case at hand.
Now that you know what to look for, let’s discuss the three steps of Mobile Forensics.
Extra precaution: in addition to the device’s default screen lock, look for other apps that
might lock or encrypt the device.
Logical Extraction: Copying files from the target mobile device to another device for
examination
Hex Dumping / JTAG: A process where the debug interface of mobile devices is used to
extract raw data. This data needs further processing to be usable)
Micro Read: Micro read is a very technical process that requires examination of memory
chips through powerful microscopes. This method is not generally an option to extract data
due to its complexity)
In an ideal situation with unlimited resources, you should be able to analyze all extracted data
and find relevant evidence. With a large amount of data extracted from modern mobile
devices, however, it is often not feasible to pay equal attention to every piece of information.
Thus, the answers to the above questions will help you focus on what matters the most.
By looking into SalvationDATA’s training center, you could learn an all-round analysis
thinking model after getting through the overall BASIC MOBILE FORENSICS
INVESTIGATOR course.
Developed by Israel’s NSO Group, Pegasus is the most sophisticated mobile device
malware. It is mainly used by nation-states for intelligence gathering. However, it is
also occasionally abused for malicious activities.
In early 2021, the LIFARS team analyzed multiple devices (iPhones) compromised by
the Pegasus spyware.
In analyzing all of the devices, we used Indicators of Compromise (IoCs) that we have
developed internally from our digital forensics work, as well as from collaborating
with other investigators.
Here are the first suspicious processes the LIFARS team identified:
Wifi Wan
Wifi In Wan Out Timestamp Process
Out In
(MB) (MB) (UTC) Name
(MB) (MB)
2/1/2021
1.6554 0.178541 0 0 wifip2ppd
13:02:30
2/1/2021 ABSCarryLog
0.007 0.0019 0 0
13:02:31
2/11/2021
1.6548 0.1939 0 0 cfprefssd
23:31:38
2/11/2021
0.007 0.0019 0 0 gssdp
23:31:38
“misbrigd” and “libbmanaged” performed data exfiltration, meaning, these are system
artifacts that show what tools the Threat Actors used to take data out from the iPhone.
The libbmanaged process was running for over a week, based on a record from
the DataUsage.sqlite database:
Wifi I Times
n Wifi Out Wan In Wan Out tamp Process
(MB) (MB) (MB) (MB) (UTC Name
)
2/19/2
021 1: libbmanaged
0 0 7.99 5.07
16:18
This implies not only data exfiltration, but also real time monitoring and voice
recording of the victim. This is important to note, since in most attacks threat actors
just want to get data and move on. This time, it seems monitoring was also part of
their key objective.
Forensic Soundness: Ensuring that the process of evidence collection, examination, and
analysis does not alter the data. This is crucial for the admissibility of evidence in court.
Acquisition Types: The methods used to extract data from mobile devices. This includes
physical acquisition (bit-by-bit copy of the entire device), logical acquisition (extracting
logical storage files like messages, call logs), and file system acquisition (copying the file
system).
Chain of Custody: Maintaining and documenting the handling of evidence from the point
of collection to the presentation in court to ensure its integrity.
Device Diversity: There are numerous makes and models of mobile devices, each with
different operating systems, hardware, and security features, requiring different forensic
approaches.
Encryption and Security Features: Modern devices come with strong encryption and
security features like biometric locks, making data extraction challenging without the
appropriate tools or methodologies.
App Ecosystem: The vast and ever-growing number of mobile applications complicates
forensic investigations as each app may store data in unique, often encrypted formats.
Forensic Software: Tools such as Cellebrite UFED, Oxygen Forensics, and XRY are used
to bypass security features and acquire data from mobile devices.
Manual Examination: Involves manually searching the device through its user interface.
This method is less intrusive but may not access all data.
Cloud Extraction: As many mobile devices back up data to cloud services, forensic
analysts may also need to retrieve data from cloud storage, following legal and ethical
guidelines.
4. Data Analysis
Timeline Analysis: Examining the timestamps of files and logs to reconstruct the sequence
of events.
Geolocation Analysis: Using GPS, Wi-Fi, and cell tower data to track the movement of
the device owner.
App Data Analysis: Extracting and interpreting data from installed applications, which
can include messages, search history, and usage patterns.
6. Future Trends
Cloud and Encryption Challenges: As encryption becomes more sophisticated and data
storage moves to the cloud, forensic investigators must evolve their techniques and tools.
Artificial Intelligence: AI and machine learning are increasingly being used to automate
data analysis, helping to manage the volume of data extracted from devices.
There is growing need for mobile forensics due to several reasons and some of the prominent
reasons are:
Use of mobile phones to store and transmit personal and corporate information
Use of mobile phones in online transactions
Law enforcement, criminals and mobile phone devices
6. Future Trends:
Advanced Security Features: As manufacturers continue to enhance the security features of
cell phones, forensic analysts must develop new techniques for data extraction.
Cloud-Based Data: With more data being stored in the cloud, forensic focus may shift
towards cloud storage and data synchronization analysis.
Artificial Intelligence: AI and machine learning tools are increasingly used to automate and
enhance the analysis of large datasets collected from mobile devices.