Unit I 1
Unit I 1
Cyber
1) Application Security
2) Information Security
3) Disaster recovery
4) Network Security
b) Cryptography.
Confidentiality
In the context of information security, confidentiality means that
information that should stay secret stays secret and only those
persons authorized to access it may receive access. From ancient
times, mankind has known that information is power, and in our
information age, access to information is more important than ever.
Unauthorized access to confidential information may have
devastating consequences, not only in national security
applications, but also in commerce and industry. Main
mechanisms of protection of confidentiality in information systems
are cryptography and access controls. Examples of threats to
confidentiality are malware, intruders, social engineering, insecure
networks, and poorly administered systems.
Integrity
Integrity is concerned with the trustworthiness, origin,
completeness, and correctness of information as well as the
prevention of improper or unauthorized modification of information.
Integrity in the information security context refers not only to
integrity of information itself but also to the origin integrity—that is,
integrity of the source of information.
Availability
Availability of information, although usually mentioned last, is not
the least important pillar of information security.
Identification
Identification is the first step in the identify-authenticate-authorize
sequence that is performed every day countless times by humans
and computers alike when access to information or information
processing resources are required. While particulars of dentification
systems differ depending on who or what is being identified, some
intrinsic properties of identification apply regardless of these
particulars—
just three of these properties are the scope, locality, and uniqueness
of IDs. Identification name spaces can be local or global in scope. To
illustrate this concept, let’s refer to the familiar notation of Internet
e-mail addresses: while many e-mail accounts named jack may
exist around the world, an e-mail address [email protected]
unambiguously refers exactly to one such user in the company
.com locality. Provided that the company in question is a small one,
and that only one employee is named Jack, inside the company
everyone may refer to that particular person by simply using his
first name. That would work because they are in the same locality
and only one Jack works there. However, if Jack were someone on
the other side of the world or even across town, to refer to
[email protected] as simply jack would make no sense, because
user name jack is not globally unique and refers to different persons
in different localities. This is one of the reasons why two user
accounts should never use the same name on the same system—
not only because you would not be able to enforce access controls
based on non-unique and ambiguous user names, but also because
you would not be able to establish accountability for user actions.
To summarize, for information security purposes, unique names are
required and, depending on their scope, they must be locally unique
and possibly globally unique so that access control may be enforced
and accountability established.
Authentication
Authentication, which happens just after identification and before
authorization, verifies the authenticity of the identity declared at
the identification stage. In other words, it is at the authentication
stage that you prove that you are indeed the person or the system
you claim to be.
The three methods of authentication are what you know, what you
have, or what you are.
Perhaps the most widely used and familiar what you have
authentication methods are keys—keys we use to lock and unlock
doors, cars, and drawers; just as with doors, what you have
authentication in information systems implies that if you possess
some kind of token, such as a smart card or a USB token, you are
the individual you are claiming to be. Of course, the same risks that
apply to keys also apply to smart cards and USB tokens—they may
be stolen, lost, or damaged. What you have authentication methods
include an additional inherent per-user cost. Compare these
methods with passwords: it costs nothing to issue a new password,
whereas per-user what you have authentication costs may be
considerable.
Authorization
After declaring identity at the identification stage and proving it at
the authentication stage, users are assigned a set of authorizations
(also referred to as rights, privileges, or permissions) that define
what they can do on the system. These authorizations are most
commonly defined by the system’s security policy and are set by the
security or system administrator. These privileges may range from
the extremes of ―permit nothing‖ to ―permit everything‖ and include
anything in between. As you can see, the second and third stages
of the identify-authenticate-authorize process depend on the first
stage, and the final goal of the whole process is to enforce access
control .
Accountability
Accountability is another important principle of information security
that refers to the possibility of tracing actions and events back in
time to the users, systems, or processes that performed them, to
establish responsibility for actions or omissions.
Audit Trail
The difference between the audit trail and logs is not clearly
defined. However, we may say that logs usually show high-level
actions, such as an e-mail message delivered or a web page served,
whereas audit trails usually refer to lower-level operations such as
opening a file, writing to a file, or sending a packet across a
network. While an audit trail provides more detailed information
about the actions and events that took place on the system, it is not
necessarily more useful, in a practical sense of the word, than logs,
simply because abundance of detail in an audit trail makes it more
resource and time consuming to generate, store, and analyze.
Another aspect by which logs and audit trails differ is their source:
logs are usually and mostly generated by particular system software
or applications, and an audit trail is usually kept by the operating
system or its auditing module.
Nonrepudiation
What is Cybercrime?
Malware Cyberstalking
Types of Cybercrime
D DoS Attacks
These are used to make an online service unavailable and take the
network down by overwhelming the site with traffic from a variety of
sources. Large networks of infected devices known as Botnets are
created by depositing malware on users’ computers. The hacker
then hacks into the system once the network is down.
Cyberstalking
This kind of cybercrime involves online harassment where the user
is subjected to a plethora of online messages and emails. Typically
cyberstalkers use social media, websites and search engines to
intimidate a user and instill fear. Usually, the cyber stalker knows
their victim and makes the person feel afraid or concerned for their
safety.
Social Engineering
Social engineering involves criminals making direct contact with
you usually by phone or email. They want to gain your confidence
and usually pose as a customer service agent so you’ll give the
necessary information needed. This is typically a password, the
company you work for, or bank information. Cybercriminals will
find out what they can about you on the internet and then attempt
to add you as a friend on social accounts. Once they gain access to
an account, they can sell your information or secure accounts in
your name.
Prohibited/Illegal Content
This cybercrime involves criminals sharing and distributing
inappropriate content that can be considered highly distressing and
offensive. Offensive content can include, but is not limited to,
sexual activity between adults, videos with intense violent and
videos of criminal activity. Illegal content includes materials
advocating terrorism-related acts and child exploitation material.
This type of content exists both on the everyday internet and on the
dark web, an anonymous network.
Online Scams
These are usually in the form of ads or spam emails that include
promises of rewards or offers of unrealistic amounts of money.
Online scams include enticing offers that are ―too good to be true‖
and when clicked on can cause malware to interfere and
compromise information.
Exploit Kits
Exploit kits (or exploit packs) are automated programs used by
attackers to exploit known vulnerabilities in systems or
applications. They can be used to secretly launch attacks while
victims are browsing the web, with the goal being to download and
execute some type of malware.
1. Identity Thieves
Identity thieves are cyber criminals who try to gain access to their
victims’ personal information – name, address, phone number,
place of employment, bank account, credit card information and
social security number. They use this information to make financial
transactions while impersonating their victims. Identity theft is one
of the oldest cyber crimes, gaining prominence during the early
years of the Internet. Initially, these cyber criminals leveraged basic
hacking techniques, such as modifying data and leveraging basic
identity fraud to uncover the desired information. Today, the
practice has progressed in scope and technique due to advances in
computing, and now, many identity thieves can hack into a
government or corporate database to steal a high-volume of
identities and personal information. This expansion of strategy has
resulted in major losses for companies and consumers, with recent
studies indicating that approximately $112 billion has been stolen
by identity thieves over the past six years.
2. Internet Stalkers
3. Phishing Scammers
4. Cyber Terrorists
So, now you understand the threat cybercrime represents, what are
the best ways to protect your computer and your personal data?
Here are our top tips:
If you use anti-virus software, make sure you keep it updated to get
the best level of protection.
Be sure to use strong passwords that people will not guess and do
not record them anywhere. Or use a reputable password manager
to generate strong passwords randomly to make this easier.
If you get asked for data from a company who has called you, hang
up. Call them back using the number on their official website to
ensure you are speaking to them and not a cybercriminal.
Keep an eye on the URLs you are clicking on. Do they look
legitimate? Avoid clicking on links with unfamiliar or spammy
looking URLs.
Our tips should help you avoid falling foul of cybercrime. However,
if all else fails, spotting that you have become a victim of cybercrime
quickly is important.