Information Technology and Cyber Security
Information Technology and Cyber Security
Information Technology and Cyber Security
PREPARED BY
LAZARUS MURINDA
1. Course Description 3
2. Course Objectives 4
2
Course Description
3
Course objectives
Upon finishing the course the students will obtain an understanding
and will apply the key concepts including:
Foundational concepts of cyber and information security and
the key practices and processes for managing security
effectively
Basic network fundamentals – including (but limited to)
topologies, protocols, address conservation and services and
the security issues in networks
Basic cryptography and why it is fundamental to computer and
information security
Software program deficiencies and the vulnerabilities
associated with them
Access controls and authentication as they are used to secure
systems and how they can be mitigated
The key elements of incident management, detection,
remediation and recovery
How to translate security into a business driver that is critical
in meeting the organization‘s mission
Legal, ethical and regulatory issues that shape policy
development and the ways in which organization implement
and administer security issues.
4
UNIT 1
1.0 Introduction
5
There are number of key terms that will be used in this module. It is
therefore important that the student is familiar with the definitions
of some the terms. The following sections are dedicated to defining
the meaning and scope of terms such information technology,
information security, and so on.
6
Objectives of Information Technology
7
configured to collect, manipulate, store, and process data into
information‘ (Stair & Reynolds, 2003:16).
For example, the amount of rainfall recorded over the past ten years
is data. When the data is processed it may show that there was
drought every two years during the period. At this stage the data
8
becomes information as it is useful and may be used to predict
future droughts or changes in rainfall patterns. Information in the
form of processed data is important as decisions and actions may be
predicated on such information. For the decision to be meaningful,
the processed data must meet the following criteria:
9
Information security processes and policies typically involve
physical and digital security measures to protect data from
unauthorized access, use, replication or destruction. The primary
objective of information security is to protect the confidentiality,
integrity and availability of information assets, whether in storage,
processing, or transmission. Information security performs four
important functions for an organization, namely: (i) protect the
organization‘s ability to function, (ii) enable the safe operation of
applications implemented on the organization‘s IT systems, (iii)
protect the data the organization collect and uses, and (iv) it
safeguards the technology assets in use at the organization.
10
Cyber security is the collection of tools, policies, security concepts,
security safeguards, guidelines, risk management approaches,
actions, training, best practices, assurance and technologies that
can be used to protect the cyber environment and organization and
user‟s assets. Organization and user‟s assets include connected
computing devices, personnel, infrastructure, applications, services,
telecommunications systems, and the totality of transmitted and/or
stored information in the cyber environment. Cyber security strives
to ensure the attainment and maintenance of the security properties
of the organization and user‟s assets against relevant security risks
in the cyber environment.
11
section focuses on the six information security concepts in greater
detail.
Confidentiality
12
information security seek to guarantee the confidentiality of
information.
Integrity
13
banking, unauthorized changes to customers‘ bank accounts would
certainly defeat the integrity of the banking information. Data
integrity therefore safeguards against unauthorized alteration or
modification of data. In information security, the integrity of data or
information is ensured by the ability to detect data manipulation by
unauthorized parties.
Availability
14
Authentication
Authorization
15
her credentials, but it must then determine the accounts to which
that user has access. Additionally, the system determines what
actions the user can take regarding those accounts, such as viewing
balances and making transfers (Graham et al, 2011).
Non-repudiation
The last of the fundamental pillars of information security is the
concept of non-repudiation. Nonrepudiation refers to the ability to
ensure that a party to a contract or a communication cannot deny the
authenticity of their signature on a document or the sending of a
message that they originated. Non-repudiation prevents an entity
from denying previous commitments or actions and provides a
mechanism for proving that certain actions were taken by the entity.
Computer technology
16
carrying out mathematical functions at high speed and accuracy.
Computers are capable of storing and processing huge quantities of
data and information and performing computations through the data
processing machine. A computer memory may be of Read Only
Memory (ROM) or Random Access Memory (RAM) variety.
17
minicomputer is a type of computer that possesses most of the
features and capabilities of a large computer but is smaller in
physical size. A minicomputer fills the space between the
mainframe and microcomputer, and is smaller than the former but
larger than the latter. Minicomputers are mainly used as small or
midrange servers operating business and scientific applications.
Computer Hardware
Beynon-Davies (2009) succinctly defines computer hardware as the
physical equipment used for input, processing, and output activities
in an information system. It consists of computers of various shapes
and sizes (including mobile handheld devices); various input,
output, and storage devices; and telecommunications devices that
link computers together. According to Stair & Reynolds (2003),
input devices include keyboards, automatic scanning devices,
equipment that can read magnetic ink characters, and many other
devices.
18
(i) Input devices
(ii) Processor
Computer Software
19
traditional tools of physical security, such as locks and keys,
restricts access to and interaction with the hardware components of
an information system. Securing the physical location of computers
and the computers themselves is important because a breach of
physical security can result in a loss of information. Unfortunately,
most information systems are built on hardware platforms that
cannot guarantee any level of information security if unrestricted
access to the hardware is possible.
20
hardware. Equally, computer hardware bereft of software programs
to operate upon cannot be operated and therefore unusable. This
means that relevant software must be loaded into the computer
hardware for the computer to be able to carry out specific functions.
It has been said, if hardware is the ‗heart‘ of a computer system,
then software is its ‗soul‘ as both components are complimentary to
each other.
21
facilitate the interface between humans and computer technologies
have been discussed in section 1.4.2 above.
Telecommunication technology
Computer networks
22
characteristics such as medium used to transport the data,
communications protocol used, scale, topology, and organizational
scope. Typical examples of common networks include the
following:
23
Intranet and Extranet
24
Internet
25
(ii) TCP/IP Protocol
The TCP/IP protocol carries the packets from client to server and
vice-versa, without interpreting what the packet contains. The
function of an application protocol is to interpret and provide the
intended services to the end users such as e-mail, remote login, file
transfer, among others.
Electronic mail
26
World Wide Web
27
also ensures the availability and reliability of Internet services
(Klimburg, 2012).
28
1.6 Chapter Summary/Conclusion
29
UNIT 2
2.0 Introduction
Ethics has risen to the top of the business agenda because the risks
associated with inappropriate behaviour have increased, both in
their likelihood and in their potential negative impact. In the past
decade, we have watched the collapse and/or bailout of financial
institutions. Several trends have increased the likelihood of
unethical behaviour. First, for many organizations, greater
30
globalization has created a much more complex work environment
that spans diverse cultures and societies, making it more difficult to
apply principles and codes of ethics consistently.
Laudon & Laudon (2006: 148) also aptly define ethics as ‗the
principles of right and wrong that individuals, acting as free moral
agents, use to make choices to guide their behaviors.‘ Ethics
therefore refers to moral ‗laws‘ that govern a person or a group of
persons‘ behavior. Morality is integral part of ethics. According to
Reynolds (2015) the term morality refers to social conventions
about right and wrong that are so widely shared that they become
the basis for an established consensus. However, individual views
31
of what behaviour is moral may vary by age, cultural group, ethnic
background, religion, life experiences, education, and gender. There
is widespread agreement on the immorality of murder, theft, and
arson, but other behaviours that are accepted in one culture might be
unacceptable in another.
Although ethics and law tend to dovetail and both guide and
regulate human behavior, it is important to appreciate the difference
between ethical (moral) norms and legal principles. According to
Madhuku (2010:1) ‗law refers to rules and regulations that govern
human conduct or other societal relations and are enforceable by the
state. It is the quality of enforceability by the state that distinguishes
law from other rules.‘ Enforcement of laws is done by state
machinery comprising law enforcement agencies (police),
courts/judiciary, and other quasi-judicial institutions. Thus the main
difference between legal rules and ethical principles is that the
former are enforceable by the state and carry certain sanctions or
penalties if they are not observed. On the other hand, ethical
principles may be described as "moral laws" as these are no
enforceable by the state.
The growth of the Internet, the ability to capture and store vast
amounts of personal data, and greater reliance on information
systems in all aspects of life have increased the risk that information
technology will be used unethically (Reynolds, 2015). Therefore,
the use of computers and other information technologies inevitably
raises fundamental ethical questions. One should always ask the
question: ―how do I use my computer ethically?‖ In other words,
there must be certain principles that guide the manner in which
technology is used to avoid other people being adversely affected.
However, given the diverse and often conflicting interests in
society, people usually find themselves confronted with ethical
dilemmas. An ethical dilemma usually arises in circumstances
where one has to reconcile conflicting interests, demands,
responsibilities or goals. For instance, an organization may face an
32
ethical dilemma where a decision is to be made to install secret
security cameras at the workplace as this may also affect the privacy
of employees. In this example, the need to safeguard the
organization‘s assets may conflict with the requirement to respect
the privacy of employees.
33
As indicated above, the world of computing and information
technology raises a number of ethical questions. The following are
some of the most common unethical issues arising from the field of
information technologies:
It is unethical for a person to use a computer or computer
system to cause harm, loss or any other form of prejudice to
others. Although causing harm or loss to others may or may
not be illegal, it is certainly unethical. Many employers
monitor email and Internet access by employees at the
workplace in breach of the employees‘ privacy rights.
It is both illegal and unethical for anyone to use a computer or
any information technology device to commit a crime such as
theft or fraud. Many crimes are being committed on the
Internet or through the use of the online platform.
It is unethical and, in some cases, illegal for one to use or gain
unauthorized access another person‘s computer resources. In
the cyberspace, hackers break into computer systems to steal
valuable information and customer data which is then used to
commit various offences, such as identity theft.
Copying copyrighted software or other material is not only
unethical but also illegal. Yet millions of people worldwide
download music and movies at no charge in violation of
copyright laws. Similarly, in the academic sphere, students and
researchers download materials from the web and plagiarize
the works of others.
Compromise the privacy of others by using the computer.
Privacy
According to Laudon & Laudon (2006: 155) privacy may be
described as the claim of individuals to be left alone, free from
34
surveillance or interference from other individuals or organizations,
including the state. Information technology and systems threaten
individual claims to privacy by making the invasion of privacy
cheap, profitable, and effective. There are many ways in which
information technology may be used to infringe the privacy of
individuals. Information technology is capable of monitoring,
capturing, and storing vast amounts of data, information and
communications. The following are some of the technologies or
computer programs with a direct bearing on privacy issues:
(i) Cookies
Web sites frequently capture information about users without their
knowledge using ‗cookie‘ technology. ‗Cookies are tiny files
deposited on a computer hard drive when a user visits certain web
sites. Cookies identify the visitor‘s web browser software and track
visits to the web site. When the visitor returns to a site that has
stored a cookie, the web site software will search the visitor‘s
computer, find the cookie, and know what the person has done in
the past‘ (Laudon and Laudon 2014: 166). Website owners may use
the personal data and information collated by cookies from users to
create detailed profiles of people visiting their websites. This
obviously impacts on the privacy of the users and raises important
ethical issues.
35
(iii) Spyware
Spyware refers to software that enables a user to obtain covert
information about another's computer activities by transmitting data
covertly from their hard drive. Spyware program is installed on a
computer secretly and hidden from the owner in a bid to collect the
owner's private data or information including passwords, keystrokes
and other valuable data. Other spyware can secretly install itself on
an Internet user‘s computer by piggybacking on larger applications.
Spyware is often display unsolicited advertisements (called adware)
and track personal or sensitive information.
(iv) Spam
It will be recalled that privacy embraces the right of individuals to
be left alone. One common practice that flies in the face of the right
to be left alone is the nuisance caused by spam especially where
recipients have expressed no interest in receiving unsolicited
messages. Spamming is the abuse of electronic messaging systems
to send unsolicited, undesired bulk messages. Spam media includes:
email spam; instant messaging spam; usenet newsgroup spam; web
search engine spam, mobile phone messaging spam and spam in
blogs.
36
that a sender of spam must provide receivers with an opportunity to
unsubscribe from the mailing list whereupon the spammer must stop
sending the unwanted mail or message. Failure to desist from
sending the unsolicited mail or message after a recipient
unsubscribes constitutes a criminal offence. Thus South African law
provides an opt-out mechanism to manage spam. Opt-out means
that one can send spam provided the recipient is given an
opportunity to indicate whether or not they want to receive further
spam.
37
Managing online privacy
An opt-out model of informed consent permits the collection of
personal information until the consumer specifically requests that
the data not be collected. An opt-in model of informed consent is
where a business is prohibited from collecting any personal
information unless the consumer specifically takes action to
approve collection and use. (Laudon & Laudon 2014: 168)
Intellectual Property
According to Laudon & Laudon (2006: 162) ‗contemporary
information technologies, especially software, pose severe
challenges to existing intellectual property regimes and, therefore,
create significant ethical, social, political issues. Digital media
differ from books, periodicals, and other media in terms of ease of
replication; ease of transmission; difficulty classifying a software
work as a program, book or even music; compactness – making
theft easy; and difficulties in establishing uniqueness.
38
the protection of intellectual property under three different legal
traditions, namely: (i) trade secrets, (ii) copyright, and (iii) patent
law. These will be canvassed below:
39
confidential information;
requiring employees to sign non-disclosure agreements to
maintain confidential information including trade secrets;
incorporating covenant in restraint of trade clauses in
employment contracts to prevent employees using trade secrets
when the leave employment; and
Signing non-disclosure agreements with any third parties who
come into contact with the business or company, such as
consultants and vendors.
(i) Copyright
Copyright law protects creators of intellectual property from having
their work copied by others for any purpose without the permission
of the author. The law protects the copyright owner against
reproduction of the work in any manner or form without the
owner‘s permission. There are a number of ways in which copyright
infringement of a work may be perpetrated in this regard. These
include saving a work on the hard disk of a computer or on a CD
ROM disk, downloading a work placed on a website, displaying a
work on a computer screen uploading a work on a website. For
instance, the making of temporary or permanent electronic copies of
works amount to copyright infringement. Thus the objective of
copyright laws is to encourage creativity and authorship by ensuring
that creative people receive the financial and other benefits of their
work.
(iii) Patents
The law also protects inventors insofar as their inventions are
concerned. A patent grants legal rights to the inventor in the form of
exclusive monopoly on the ideas behind the invention over a period
of time. The rationale behind patent laws is to ensure that inventors
of new machines, devices, or methods receive the full financial and
other rewards of their labour. Other people intending to use a
patented design, device or program requires a licence from the
registered patent‘s owner. The key concepts in patent law are
originality, novelty and invention.
40
Common ethical issues in organizations
Software Piracy
Inappropriate content
The Internet provides an opportunity for people to download and
send inappropriate content such as pornographic materials.
Businesses have taken a stern position on employees surfing the
web, sending inappropriate messages, and downloading
41
pornographic materials from the Internet. This is due to a negative
impact on productivity, as well as the legal view that companies are
liable for the actions of their employees. Many companies have
established policies for appropriate use and monitoring of
computers and computing resources, as well as etiquette on the
Internet (Krause, 2000: 650).
Code of Ethics
42
make the cyberspace a better place for all users. In other words,
codes of conduct will not be sufficient in themselves, and should be
viewed as an integral part of integrating ethics management within
the broader framework of cyber security.
Computer crime
Apart from ethical issues arising from usage of computer systems, a
number of legal issues are common in cyberspace. The most
worrying issue pertains to the high incidence of computer crime and
its overall adverse impact on society, businesses and individuals.
Computer crime is the commission of illegal acts through the use of
a computer or against a computer system. Computers or computer
systems can be the object of the crime (destroying a company‘s
computer center or a company‘s computer files), as well as the
instrument of a crime (stealing valuable financial data by illegally
gaining access to a computer system using a home computer).
Computer crime may be classified in various ways for ease of
comprehension. The following is one way of classifying computer
offences:
43
(c) Content-related computer offences
Content related computer crimes include offences such as child
pornography, hate speech etc.
(a) Anonymity
The Internet provides a degree of anonymity to users such that
criminal elements can take advantage without the risk of being
easily identified. It is common for a person to masquerade as
another person or assume a different persona on the internet. This
anonymity makes it difficult to detect computer crimes and to
prosecute cyber criminals in courts of law.
44
(b) Complexity of computer environment
The sophistication of the computer environment makes it highly
attractive to criminal elements. Computer crime transcends national
borders and extremely difficult to detect, investigate and prosecute.
For instance, a criminal in Europe may commit cyber crimes in
Zimbabwe by remotely accessing computer systems.
45
share the details and avoid similar errors in future. The flipside of
disclosing the vulnerabilities is that hackers and cyber may take
advantage of the vulnerabilities to launch attacks to the computer
system. This is the domain of ethical disclosure in information
technologies.
Vulnerability disclosure
As discussed above, organizations may a face an ethical dilemma on
whether to disclose computer vulnerabilities or cyber attacks. The
notion of vulnerability disclosure involves the practice of publishing
information about a computer security problem. An organization
may put in place a policy on disclosure of computer vulnerabilities
which involves alerting the computer or software vendors or
reporting the nature of the vulnerability to a professional or industry
body. The policy should contain guidelines for making the
vulnerability disclosures.
46
The organization may choose to disclose the vulnerability to
software companies and system designers; other security
researchers; business customers and end users. The timing of the
disclosure may be immediately; after the vulnerability has been
fixed or after the software vendors or system designers have been
afforded sufficient time to address the problem, regardless of
whether or not the problem is eventually fixed.
Full disclosure
Full disclosure entails publishing the details of the vulnerability as
early as possible and making the information available to everyone
without restriction. For instance, information on the vulnerabilities
may be released to the public through online forums or websites.
Proponents of full disclosure argue that there is an ethical and moral
obligation to disclose vulnerabilities so that potential victims of
attacks are well informed about the nature of attacks.
Responsible disclosure
In computer security terminology, responsible disclosure is a
vulnerability disclosure model based on the requirement that
vulnerabilities should not be disclosed until a solution is available.
Responsible disclosure is similar to full disclosure save for the fact
that all stakeholders agree to allow a period of time for the
vulnerability to be patched before publishing the details. Thus
47
responsible disclosure supports the notion that limited information
should be made available to a selected group after some specified
amount of time has elapsed from the time of discovery of the
vulnerability.
48
Option Description
Complete non-disclosure The organization decides to keep all the details of the
vulnerability secret.
Partial disclosure The organization provides sufficient information for end users
and business clients to mitigate vulnerabilities but not sufficient
for criminals to attack systems
Full disclosure All details of the vulnerability are disclosed to the public.
Limited disclosure The disclosure of the vulnerability is made to a specific group of
people such as the vendor, and perhaps some corporate clients.
Immediate and full public All details of the vulnerability are disclosed to the public
disclosure immediately upon discovering them.
49
usually dominated by states and corporations focusing mainly on
their security, rather than the security of citizens and Internet users.
Creating a cyber security environment that protects human rights,
including the right to privacy, while also ensuring an open and
secure Internet, will not be possible unless there is a paradigm shift.
50
However, the first automatic computing machine called the
Difference Engine was developed in 1822 by Charles Babbage. The
machine was capable of computing several sets of numbers and
making hard copies of the results. However, Babbage was never able
to complete a full-scale functional version of this machine due to
funding challenges. Between 1936 and 1938, Konrad Zuse created
the Z1 which is considered to be the first electro-mechanical binary
programmable computer, and the first really functional modern
computer.
The Turing Machine was first proposed by Alan Turing in 1936 and
became the foundation for theories about computing and computers.
The machine was a device that printed symbols on paper tape in a
manner that emulated a person following a series of logical
instructions. In 1943 Tommy Flowers developed the Colossus as the
first electric programmable computer mainly to help the British code
breakers read encrypted German messages. This was followed by the
development of the Atanasoff Berry Computer (ABC) as the first
digital computer by John Vincent Atanasoff and Cliff Berry between
1937 and 1942. The ABC was an electrical computer that used
vacuum tubes for digital computation, including binary math and
Boolean logic and had no CPU.
The first desktop and mass market computer (Programma 101) was
unveiled in 1964 by Pier Giorgio Perotto. However, in 1968, Hewlett
Packard began marketing the HP 9100A, considered to be the first
mass marketed desktop computer. The first workstation was the
Xerox Alto introduced in 1974. The computer was revolutionary for
51
its time and included a fully functional computer, display, and mouse.
The computer operated like many computers today utilizing
windows, menus and icons as an interface to its operating system. In
1975, Ed Roberts coined the term "personal computer" when he
introduced the Altair 8800. In 1975, the IBM 5100 was introduced as
the first portable computer. Today, computers and hand held devices
come in different shapes and size with massive computing power and
much functionality.
52
applications, came the greater danger of information theft. Private
users gained regular access of the internet. As more computer users
gained Internet access, companies began to use the net as a ―virtual
store‖.
Thus computer security has existed since the end of the 1960s
(Santanya, 2011). Since computers were small and were not broadly
used by the public, protection of data was easier. Today, however,
most households in developed nations have at least one computer.
The developments in information technologies and the increased
dependence on computer systems and networks have resulted in
cyber security becoming a critical field in response to cyber threats.
Landwehr (2001) notes that for many years security systems mainly
focused on confidentiality, integrity and availability. However, other
security concepts have developed such as such as authentication,
authorization and non-repudiation in cyber security. Today,
fingerprints and iris scan can also be used for
53
identification. Nissenbaum (2005) states that threats to security
multiply ―in number and sophistication‖ as information technologies
increase in society.
Despite the global cyber risks and threats attended to information and
communication technologies, Africa remains lagging behind other
continents in terms of cyber security strategies and policies. In spite
of the breathtaking growth of ICT use in African countries, the
development of national cybersecurity legislation has been relatively
stagnant in the region. Mauritius has the most advanced cyber
security policy in Africa and legislation addressing cybercrime, e-
commerce, data protection, and privacy as well as an established
Computer Emergency Response Team (CERT).
54
advancing a country‘s information technologies and cyber
security strategies;
encouraging cooperation on cyber security issues among
academia, industry, and the private sector as well as between
government agencies and the security community;
Advancing research and development in cyberspace and
supercomputing;
Consolidating the administrative aspects of cyber regulation and
advances parliamentary and secondary regulation in the cyber
field.
(a) the range of cyber threats: ranging from deliberate attacks for
military or political advantage to the forms of cybercrime, cyber
warfare, and cyber terror against civil and military objects;
(b) the types of cyber security risks: ranging from concealment
(Trojan horse), infectious malware, malware for profit (vector,
control, maintenance and payload), Botnets, cybercrime business
models (advertising, theft, support) and chokepoints (anti-
malware, registrars, payments, site takedown and blacklisting);
and
(c) the cyber security policy model ought to map cooperative
international arrangements involving governments and civil
society to reduce risks to cyber security.
55
includes the absence of cybersecurity framework. The National ICT
Policy of Zimbabwe defines cybersecurity as:
56
computer and cybercrime, data protection and electronic
transactions and electronic commerce. Such laws are long overdue
if Zimbabwe is to have a comprehensive legal and regulatory
framework consistent with the developments in the field of cyber
security.
57
UNIT 3
3.0 Introduction
58
attacks and thus it is important to grasp meaning of some these
terms used in computer security.
Threats
In cyber security, a threat is a generic term referring to a potential
danger or risk that might exploit a vulnerability to breach security
thereby causing possible harm. Numerous definitions of the term
have been proffered by different organizations. For instance, the
International Organization for Standardization (ISO 27005:2008)
defines a threat in simple terms as ‗a potential cause of an incident,
that may result in harm of systems and organization.‘ A threat may
be an object, person, or other entity that represents a constant
danger to an asset.
59
them. Some of the different types of cyber threats are discussed in
the ensuing sections.
The term threat source refers to the objective and method used by
60
cyber attackers to exploit security vulnerabilities or a certain context
in order to compromise an information system. Thus a threat source
may be described as an entity that desires to breach information or
physical assets‘ security controls. In computer security, a threat
actor is an entity that actually performs the attack to the system. For
instance, a competitor works with an employee to steal trade secrets
from an organization, then the competitor is the threat source and
the employee is the threat actor. Profiling threat actors is essential in
order to understand their motivation, learn their modus operandi
and adopt the necessary countermeasures.
Vulnerability
Security risk
Security risk or cyber risk refers to the probability that a threat will
exploit a vulnerability to breach the security of an asset. It is
common knowledge that functional information technology systems
operate with a degree of exposure to threats given that full
elimination of risk is either too expensive or undesirable. In any
organization, cyber security strategy is a critical component in
managing cyber security risks.
Cyber attacks
61
compromise of security that leads to the accidental or unlawful
destruction, loss, alteration, unauthorized disclosure of, or access to
protected data transmitted, stored or otherwise processed. A cyber
attack is an act or action that exploits vulnerabilities or identified
weaknesses in a controlled system. An attack is described as a
malicious act that attempts to collect, disrupt, deny, degrade or
destroy information system resources or the information itself. A
cyber attack occurs when a threat breaches security controls around
a physical or an information asset.
62
Forces of Nature
63
attachments or copying infected files. Viruses may also spread over
computer systems from infected disks or devices as well as Internet
downloads and web browsing.
64
These and other viruses caused untold havoc and extensive damage
to computer systems worldwide worth millions of dollars.
Accordingly, virus are a form of vicious computer software attacks
that cyber security professionals should be familiar with in order to
prevent or minimize the potency on computer systems.
Organisations must continuously invest in anti-virus software to
protect computer systems from virus attacks and other malware.
65
As with viruses, worms can also be transmitted over the Internet
from files attached to emails and files downloaded from software.
Both viruses and worms can be transmitted to wireless computing
devices. The increased usage of mobile devices such as cellular
phones, and other hand held devices has resulted in enhanced
threats of viruses and worms as many of these devices can connect
to the internet apart from interfacing with computer systems.
Trojan horse
A Trojan horse is another common species of malware. It is a
software program that appears to be harmless in effect but carrying
potential threats to the system. In other words, a Trojan horse is a
computer program that masquerades as a legitimate program when
it is in fact a malicious code. A Trojan horse contains a set of
computer instructions deliberately concealed inside a program. It is
distinguished from a virus on the basis that it does not replicate but
is merely a springboard for introducing viruses or other malicious
code into a computer system.
66
horse can be delivered as an email attachment, downloaded from a
Web site, or contracted via a removable media device such as a
CD/DVD or USB memory stick (Reynolds 2015). Once an
unsuspecting user executes the program that hosts the Trojan horse,
the malicious payload is automatically launched as well. Common
host programs include screen savers, greeting card systems, and
games.
Spyware
67
agreement or policy allow the user to agree to the terms and gauge
the legitimacy of the program before installation.
68
There is no doubt that spyware poses serious risks to the
confidentiality and integrity of data and may result in substantial
financial losses. In summary, data stolen by attackers through
spyware may be used for various reasons including the following:
69
The result is that the unusually vast number of queries overwhelms
the network to the extent that it fails to cope up with them, making
services to legitimate requests unavailable. In other words, users are
prevented from accessing services on the computer system. A
deadly type of such an attack is called a distributed denial of service
(DDoS) attack. DDoS attacks will be discussed in detail below. This
uses several computers to flood and overwhelm a network from
numerous launch points. A common feature of DoS attacks is that
they do not destroy information or access restricted areas of a
company‘s information system but can, for instance, cause a web
site to shut down, making it virtually impossible for legitimate users
to access the site.
Logic bomb
Logic bomb is another type of malicious code that can attack
computer systems. Reynolds (2015) defines a logic bond as another
type of Trojan horse, which executes when it is triggered by a
specific event. For example, logic bombs can be triggered by a
change in a particular file, by typing a specific series of keystrokes,
or by a specific time or date. It is a dormant code, the activation of
which is triggered by a predetermined time or event. Thus, a logic
bomb might, for example, start erasing data files when the system
clock reaches a certain date or when the application has been
loaded. In practice, these various elements can be combined, so that
a virus could gain access to a system via a Trojan, then plant a logic
bomb, which triggers a worm (Cobb, 2000).
Ransomware
This is a type of malware that encrypts the victim‘s data, demanding
ransom for its restoration. According to Croall (2011) offenders can
create and control ‗zombie‘ computers and hold companies to
ransom by threatening a Denial of Service (DoS) attack in which
companies‘ websites, particularly those used for commercial sales,
are rendered inoperative through viruses or barraging the site with
so many emails that the system collapses. Ransomware activities
seek to extort money, access, or corporate secrets from victims.
70
Other types of computer threats and viruses
There are other less common but equally destructive types of
computer malicious codes. These include source code and object
code viruses, stealth and polymorphic viruses, among others. Source
code viruses insert malicious instructions into programs at the
source code level and not through the compiled program. An object
code infects an object rather than an executable, making itself less
open to normal methods of detection such antiviruses which usually
focus on protecting and monitoring executable files (Gove 2000).
Stealth viruses, as their name implies, disguise their presence by
staying in memory to monitor and intercept operating system calls.
Lastly, polymorphic viruses are malicious codes that mutate in
order to escape detection by antiviruses.
Hacking
Hacking is major threat to the security of computer systems and
networks. According to Yar (2006) ‗hacking‘ can be likened to
criminal damage or vandalism. Hacking used to require highly
technical skills but is now facilitated by readily available software
packages. ‗Hacktivists‘ are usually politically motivated and are
form of cyber terrorism (Williams 2010). Hackers write the
majority of the viruses that attack computer systems. In simple
terms, hacking involves the act of obtaining or acquiring
unauthorized access to a computer or computer system.
Exploit
71
Zero-day attacks
Spam
Although spam is not a virus per se, it poses serious threats to the
security of computers and information systems as it may be used as
an effective channel for delivering harmful viruses, worms and
other malware. Email spam is defined as the abuse of email systems
to send unsolicited email to large numbers of people. Most spam is
a form of low-cost commercial advertising, sometimes for
questionable products such as pornography. Spam is also an
extremely inexpensive method of marketing used by many
legitimate organizations. For example, a company might send email
to a broad cross section of potential customers to announce the
release of a new product in an attempt to increase initial sales. Spam
is also used to deliver harmful worms and other malware.
Rootkits
72
programs that enables its user to gain administrator-level access to a
computer without the end user‘s consent or knowledge. Once
installed, the attacker can gain full control of the system and even
obscure the presence of the rootkit from legitimate system
administrators.
Attackers can use the rootkit to execute files, access logs, monitor
user activity, and change the computer‘s configuration. Rootkits are
one part of a blended threat, consisting of the dropper, loader, and
rootkit. The dropper code gets the rootkit installation started and can
be activated by clicking on a link to a malicious Web site in an
email or opening an infected PDF file. The dropper launches the
loader program and then deletes itself. The loader loads the rootkit
into memory; at that point, the computer has been compromised.
Rootkits are designed so cleverly that it is difficult even to discover
if they are installed on a computer.
73
legitimate update to their antivirus software or some other
application. By the time the user sees the prompt to install the
software, it is too late, the computer has already been infected by
the rootkit.
Types of Perpetrators
Disgruntled employees
74
forget their passwords to access computer systems or allow
other coworkers to use them, which compromises the system.
Social engineering - malicious intruders seeking system access
sometimes trick employees into revealing their passwords by
pretending to be legitimate members of the company in need of
information.
System errors – employees are also a major source of errors
introduced into an information system. Employees can
introduce errors by entering faulty data or by not following
proper instructions for processing data and using computer
equipment. Information systems specialists can also create
software errors as they design and develop new software
maintain existing programs. (Laudon and Laudon 350)
75
Examples of Code Injection Attack
76
behaviours, such as website defacement, implanting computer
worms, among others.
Security Measures
77
when an attacker can influence the state of the resource between
check and use. This can happen with shared resources such as files,
memory, or even variables in multithreaded programs.
78
possible in some situations. One effective way to avoid TOCTTOU
errors is to choose resource references that are guaranteed to resolve
consistently at both the check and use steps.
79
remote identity in question. However, the drawback of this security
technique is that it can use up large amounts of resources and
bottleneck traffic on the network.
Definition of DDoS
80
data and other small tasks. A distributed denial-of-service attack
does not involve infiltration of the targeted system. Instead, it keeps
the target so busy responding to a stream of automated requests that
legitimate users cannot access the system. A DDoS attack has been
described as the Internet equivalent of dialling a telephone number
repeatedly so that all other callers hear a busy signal. DDoS attacks
are usually launched from what are called botnets. These are large
clusters of connected devices such as personal computers, cell
phones, or routers, infected with malware that allows remote control
by an attacker.
81
reportedly infected several hundred thousand computers around the
world by generating phenomenal amounts of spam advertising
cheap pharmaceutical products. At its peak, the Grum botnet is
estimated to have been responsible for 35 percent of the world‘s
spam.
82
DDoS attacks are increasingly being used as a competitive business
tool. Some of these assaults are designed to keep a competitor from
participating in a significant event, while others are launched with a
goal of completely shutting down online businesses for months. The
motivation behind such attacks is to cause disruption that will cause
customers to flock to the competitor while also causing financial
and reputational damage.
83
testing the state of preparedness against possible attacks.
creating a response plan and a rapid response team, whose
responsibility is to minimize the impact of an assault. The
response plan should establish procedures for customer support
and communication teams, among others.
Signs of attack
Organizations must put early detection tools in place and be on the
look out for possible signs of attack. Not all disruptions to service
are the result of a denial-of-service attack these may be caused by
technical problems with a particular network, or system
administrators may be performing maintenance. However,
unusually slow network performance, unavailability of a particular
website, inability to access any website and dramatic increase in the
amount of spam being received may be symptomatic of a DoS or
DDoS attack.
84
organization. Some such standards include ISO/IEC27001, ISO/IEC
270002, ISO 17799.
Security audits
Organizations must constantly carry out security audits as part of
cyber security management. According to Kulkarni and Chande
(2014), the purpose of security audit and certification is to make
sure that an organization is following best practices in this regard
like proper risk assessment and has the controls or processes to
secure its assets. Conducting comprehensive and systematic audits
helps the organization to know that information systems security
and controls are effective.
85
monitoring. Thus there is need for a paradigm shift where cyber
security needs to transform from being the domain for the IT
professional to that of executive management team and the board of
directors. This will ensure that cyber security become a strategic
issue for the organization and that appropriate budgetary resources
are allocated to manage cyber risks. A risk-focused monitoring
function is required to enable the organization to advance its
business strategies. But making this transition is not an effort that
can be delegated to technical leaders and their teams. It requires
guidance, collaboration, and ongoing governance at the executive
level.
(a) People
(b) Process
(c) Technology
The people in the organization should know the data and network
topology, determine location of internet touch points and creating or
86
storing appropriate event logs. Without sufficient knowledge of the
technology, the organization will not be able to effectively respond
cyber security attacks. An organisation should configure its systems
or networks to assist identify or respond to cyber security incidents,
with inadequate monitoring processes in place. The systems should
be configured to record appropriate events, identify possible
incidents or provide sufficient assistance to investigators.
(d) Information
Disaster recovery
Incident management policies also include disaster recovery
systems designed to ensure business continuity after an attack. As
observed by Laudon and Laudon (2006), disaster recovery planning
devises plans for the restoration of computing and communications
services after they have been disrupted by an event such as an
earthquake, flood, or terrorist attack. Disaster recovery plans focus
primarily on the technical issues involved in keeping systems up
and running, such as which files to back up and the maintenance of
backup computer systems or disaster recovery services. Businesses
should establish hot sites housing spare computers at another
location as part of the offsite disaster recovery strategies.
87
Business continuity planning focuses on how the organization can
restore business operations subsequent to a disaster strikes. It
identifies critical business processes and determines action plans for
handling mission-critical functions in the event of systems going
down. A business impact analysis must be conducted to identify the
organization‘s most critical systems and the impact a systems
outage would have on the business. Management must determine
the maximum amount of time the business can survive with its
systems down and which segments of the business must be restored
first.
88
security viewpoint holds that a trustworthy system must be able to
defend against malicious attacks, building from a trusted computing
base. The fault tolerance viewpoint is that a trustworthy system
cannot depend on any single component functioning correctly,
because that component becomes a vulnerability. These two views
are incompatible because a trusted computing base could become a
single point of failure, and because efficient fault-tolerant
replication protocols assume non-malicious failures.
Load balancing
Another form of managing cyber threats is through load balancing
techniques. Load balancing distributes large numbers of access
requests across multiple servers. The requests are directed to the
most available server so that no single device is overwhelmed. If
one server starts to get swamped, requests are forwarded to another
server with more capacity (Laudon and Laudon 2006).
Mirroring
Organizations may use site mirroring as part of backup and disaster
recovery planning. The mirroring technique uses a backup server
that duplicates all the processes and transactions of the primary
server. Thus a mirror site is an exact copy of another website or
datacenter that contains the same information as the original. If the
primary server fails, the backup server can immediately take its
place without any interruption in service.
89
3.9 Assessing Cyber Threats
90
within the organization. Various pieces of information may be
located in file servers, workstations, laptops, removable media,
personal computers, mobile phones and databases. Knowledge of
location of information assets helps in coming up with appropriate
security measures and strategies to protect information systems
from cyber attacks.
91
measures to manage cyber threats. A systematic ranking of threats
enables organizations to focus their efforts on critical areas and
avoid spending on security technologies or activities that are less
essential or irrelevant to fixing identified cyber security threats.
According Carr (2011), any country can wage cyber war on any
other country, irrespective of resources, because most military
forces are network-centric and connected to the Internet, which is
not secure. For the same reason, non-governmental groups and
individuals could also launch cyberwarfare attacks.
92
a politically motivated attack on an enemy's computer and
information systems. Cyber warfare attacked are orchestrated via
the Internet, for instance, to disable financial and organizational
systems by stealing or altering classified data to undermine
networks, websites and services. Cyberwarfare usually involves the
following attack methods or security breaches:
(a) Sabotage
Military and financial computer systems are at risk for the
disruption of normal operations and equipment, such as
communications, fuel, power and transportation infrastructures.
(b) Espionage
These illegal exploitation methods are used to disable networks,
software, computers or the Internet to steal or acquire classified
information from rival institutions or individuals for military,
political or financial gain.
93
The use of distributed denial of service (DDoS) attacks has become
a widespread method of achieving political ends through the
disruption of online services. A classic example of cyber warfare is
the Stuxnet worm, which some consider the first cyber weapon. The
Stuxnet malware was apparently targeted at Iran and attacked the
computerized industrial control systems on which nuclear
centrifuges operate, causing them to self-destruct. Other examples
of cyber warfare include the hacking by the United States into
Serbia‘s air defense system to compromise air traffic control and
facilitate the bombing of Serbian targets in 1998; the attacks in
Estonia where a botnet of over a million computers brought down
government, business and media websites across the country in
2007 and the hacking of high tech and military agencies in the
United States by an unknown foreign party in 2007.
94
an attack on various civilian targets that causes physical damage
disruption of and attack on critical national information
infrastructures, which causes physical damage
disruption of and attack on military targets in the state‘s
sovereign territory
disruption of and attack on military targets outside the state‘s
sovereign territory.
95
UNIT 4
CYBER SECURITY
4.0 Introduction
Under this section, the meaning and scope of cyber crime will be
canvassed in a bid to highlight the key concepts and techniques used
by cyber criminals.
96
Challenges in defining cyber crime
Despite the growing global interest in fighting cybercrime, there is
no universally accepted definition of ‗cybercrime‘. In some
instances, definitions of cybercrime depend on the purpose and
context in which the term is used. For instance, in the field of cyber
security, the definition of cybercrime may be restricted to various
acts or omissions against the confidentiality, integrity and availability
of computer data or systems. In a broader sense, cyber crime
definitions may encompass other crimes such as identity-related
offences that may result in personal harm or financial loss to the
victims. The long and short of this discourse is that cybercrime is a
term that does not lend itself to a precise definition.
97
of illegal and illicit activities that share in common the unique
electronic environment in which they take place.
There are a variety of reasons why the Internet and other computer
networks provide a conducive environment for cyber criminals to
commit various offences. In general, technology such as the Internet
has altered time and space relationships enabling people to
communicate with thousands of others on a global basis in
milliseconds. As such, fraudsters and other cyber criminals can target
thousands of potential victims quickly and cheaply and with far
fewer risks of detection.
The cyber environment has therefore reduced the need for face-to-
face interaction and people can easily create multiple identities. The
98
anonymity provided by the cyber environment makes it a favourable
hunting ground for criminals. According to Interpol, more and more
criminals are exploiting the speed, convenience and anonymity of the
Internet to commit a diverse range of criminal activities that know no
borders, either physical or virtual, cause serious harm and pose very
real threats to victims worldwide.
99
Causes of cyber crime
There are a number reasons that explain the causes and high
incidence of cyber crime. First and foremost, Cyber crime is billion-
dollar industry for criminal enterprises. Wherever the rate of return
on investment is high and the risk is low, criminals are willing to take
advantage of the situation. Accessing sensitive information and data
and using it means a rich harvest of returns and catching such
criminals is difficult. Hence, this has led to a rise in cyber crime
across the world.
100
mail spoofing, hacking, cracking, cyber stalking, defamation,
cheating, fraud, e-mail spoofing, password sniffing, credit card
frauds, gambling, among others.
101
attacks are varied. Cyber criminals employ various techniques to
attack their victims. The following are some of the types of attacks
cyber criminals use to commit crimes. One of the most sinister
threats to cyber security is represented by diffusion of botnets,
which are networks of infected computers (bots or zombies)
managed by attackers through malware. The controller of a botnet,
also known as botmaster, controls the activities of the entire
structure giving orders through communication channels.
Botnets are a major tool for cybercrime given that they can be
designed to effectively disrupt targeted computer systems in
different ways. A malicious user with no strong technical skills, can
initiate and cause havoc in cyberspace by simply renting botnet
services from a cybercriminal. Botnets are made up of vast numbers
of compromised computers that have been infected with malicious
code, and can be remotely controlled through commands sent via
the Internet. Hundreds or thousands of these infected computers can
operate in concert to disrupt or block Internet traffic for targeted
victims, harvest information, or to distribute spam, viruses, or other
malicious code.
102
4.3 Cyber Crime Methods
Cyber Stalking
Cyber stalking is one of the forms of crime against persons in terms
of classification as it is targeted at individuals. In general terms, the
offence is targeted at causing emotional distress and instilling fear of
physical harm in the victim. Goodno (2007) define stalking as
involving repeated harassing or threatening behavior using the
Internet, e-mail or other means of electronic communication to stalk
or harass another individual. Cyber stalking involves express or
implied physical threats that creates fear through the use of computer
technology such as email, phones, text messages, webcams, websites
or videos. Accordingly, cyber stalking is a form of online harassment
where the victim is subjected to an onslaught of online messages and
emails. Cyber security is often motivated by a desire to exert control
over the victim.
103
Cybercrime may include sending threats or false accusations via
email or mobile phone, making threatening or false posts on
websites, stealing a person‘s identity or data or spying and
monitoring a person‘s computer and Internet use. Sometimes the
threats can escalate into physical spaces. Typically, these stalkers
know their victims and instead of resorting to offline stalking, they
use the Internet to stalk. However, if they notice that cyber stalking is
not having the desired effect, they may begin offline stalking along
with cyber stalking to make the victims‘ lives more miserable.
104
Indirect forms of harassment may involve a cyber stalker
impersonating his or her victim on-line and sending abusive
emails or fraudulent spam in the victim‘s name;
Victims may be subscribed without their permission to a number
of mailing lists with the result that they receive hundreds of
unwanted emails everyday.
105
Cyber stalking and the law
There is no specific law in Zimbabwe dealing with cyber stalking.
However, section 88 of the Postal and Telecommunications Act
deals with offensive or false telephone messages. This Act makes it
a criminal offence for any person to
send by telephone any message that is grossly offensive or is of
an indecent, obscene or threatening character; or
send by telephone any message that is false for the purpose of
causing annoyance, inconvenience or needless anxiety to any
other person; or
make any telephone call or series or combination of telephone
calls without reasonable cause for the purpose of causing
annoyance, inconvenience or needless anxiety.
However, the Act does not define telephone to include mobile
phones or other forms of electronic communications. This implies
that cyber crimes may not be covered by this Act.
106
How to avoid cyber stalking
As indicated above, cases of cyber stalking may be extremely
difficult to control. However, the following ways may be useful in
avoiding being victims of cyber stalking:
Users should be careful what personal information they share
online including on email, networking sites like Facebook and
Twitter and chat rooms. Cyber stalkers can take advantage of
such personal information as arsenal for attacking potential
victims.
Users should create a different email account for registering in
social networking sites and other online spaces. This will help
avoid spam by revealing personal email details.
In online platforms, users should endeavor to select user
profiles that do not identify them such as photos.
It may be useful to consider using a name that is not the user‘s
real name in email addresses. Instead, it is advisable to pick a
name that is gender- and age-neutral.
It is good practice to read and check privacy policy on online
platforms and social networking sites to make sure information
is only shared with trusted people and not the general Internet
public.
Cyber Squatting
107
describes cybersquatting as the term most frequently used to
describe the deliberate, bad faith abusive registration of a domain
name in violation of rights in trade-marks or service marks.
108
4.4 Cyber Extortion and Cyber Cheating
Cyber blackmail
Ransomware
109
payment does not guarantee that further cyber-attacks will not be
launched. Most cyber extortion efforts are initiated through malware
in e-mail attachments or on compromised websites.
110
Example
Once ransomware infects a user‘s system, it either encrypts critical
files or locks a user out of their computer. It then displays a ransom
message that usually demands virtual currency payment in exchange
for a cryptographic key to decrypt or unlock those resources. The
message may also threaten to publicly release compromised data if
the payment demand is not met. Some ransomware can travel from
one infected system to a connected file server or other network hub,
and then infect that system. Once infected, a victim has little
recourse. If they do not pay the ransom, they suffer business down
time, loss of sensitive information or any other penalty specified by
the attacker. And even when they do pay the ransom, they remain
vulnerable to attack from the same attacker or a new one, and reward
attackers for their successful tactics.
Payment of ransom
111
malware in general is through malicious spam mail. This spam is
distributed using botnets, or networks of compromised computers.
The botnet sends out large numbers of spam emails that use social
engineering tactics to trick recipients into compromising their
computers. The infection occurs when the user opens a malicious
attachment that directly installs the ransomware or clicks a link that
points to an exploit kit which ultimately lead to the malware being
installed on the computer.
(c) Malvertising
Malicious ads are placed through ad networks whose ads are
distributed through trusted websites with a high volume of visitors.
112
Organizations should implement the principle of least
privilege, that is, no users should be assigned administrative
access unless absolutely needed and those with a need for
administrator accounts should only use them when necessary.
It is recommended for organizations to implement software
restriction policies or other controls to prevent programs from
executing from common ransomware locations, such as
temporary folders supporting popular Internet browsers.
The individuals and groups use electronic media and the cyberspace
to threaten the international governments and the citizens of a
country. This crime manifests itself into terrorism when a
government or military websites are hacked and vital information is
retrieved. Cybercrime against organization and society mainly
includes unauthorized access of computer, password sniffing, denial
of service attacks, malware attacks, crimes emanating from usenet
group, industrial spying/espionage, network intrusions, forgery, web-
jacking etc.
113
or use of force in cyberspace that may trigger a military response
with a proportional kinetic use of force. Cyberterrorism can be
considered ―the premeditated use of disruptive activities, or the threat
thereof, against computers and/or networks, with the intention to
cause harm or further social, ideological, religious, political or
similar objectives, or to intimidate any person in furtherance of such
objectives.
Terrorism could also benefit from the fragility of some systems and
infrastructures, including airports, air traffic control, transportation,
financial transaction, power distribution and stations, data centres,
and surveillance centres, developing new methods of attack with
significant impact. We should expect to see the arrival of a
generation of individuals who are skilled in computer technology and
communication, wanting to influence the world from the comfort of
their computer screen. The ability to fully or partially operate
remotely and with impunity will be a powerful incentive to act.
114
Computer hackers may also work with terrorist groups, or terrorist-
sponsoring nations to orchestrate cyber terrorism. Membership in the
most highly-skilled computer hacker groups is sometimes very
exclusive and limited to individuals who develop, demonstrate, and
share only with each other, their most closely-guarded set of
sophisticated hacker tools. These exclusive hacker groups do not
seek attention because maintaining secrecy allows them to operate
more effectively. Some hacker groups may also have political
interests that are supra-national, or based on religion, or other socio-
political ideologies, while other hacker groups may be motivated by
profit, or linked to organized crime, and may be willing to sell their
computer services, regardless of the political interests involved.
Cyber espionage
Phishing and hacking are among the most common forms of cyber
attacks in the world. The techniques are employed to illegally obtain
personal information from victims which is then ultimately used for
committing more heinous crimes such as fraud.
115
What is Phishing?
Phishing is one of the fastest growing online crime method used for
stealing personal information. Phishing may be defined as a
criminal activity involving the use of social engineering techniques
to acquire sensitive data, personal data, passwords, credit card
details and other financial information from victims. The
perpetrators usually masquerade as a trustworthy persons or
businesses in online or electronic communications such as email or
instant message. Phishing is any method or technique used by
criminals to entice victims disclose personal information by using
electronic communication technique such as emails, masquerading
to be from a legitimate source.
116
Phishing may therefore be described as a form of identity theft.
According to Laudon and Laudon (2006), identity theft is a crime in
which an imposter obtains key pieces of personal information, such
as social security identification numbers, drivers‘ licence numbers,
or credit card numbers, to impersonate someone else. The
information may be used to obtain credit, merchandise, or services
in the name of the victim or to provide the thief with false
credentials.
The Internet has made it easy for identity thieves to use stolen
information because goods can be purchased online without any
personal interaction. Credit card files are a major target of web site
hackers. Moreover, e-commerce sites are wonderful sources of
customer personal information – name, address, and phone number.
Armed with this information, criminals can assume a new identity
and establish new credit for their own purposes (Laudon and
Laudon 2006)
117
Phishing websites: websites that look similar to those of
genuine companies or banks are setup to mislead the victim
into entering important details such as the username and
password.
Phishing phone calls: the criminal makes phone calls to the
victims in the name of a bank or similar institution requesting
the victim to enter or tell confidential data such as PIN
numbers.
Variants of phishing
Spear-phishing
Smishing
118
under the guise that there is a problem with their bank account or
credit card that requires immediate attention. However, the phone
number or Web site is phony and is used to trick unsuspecting
victims into providing personal information such as a bank account
number, personal identification number, or credit card number. This
information can be used to steal money from victims‘ bank accounts,
charge purchases on their credit cards, or open new accounts. In
some cases, if victims log on to a Web site, malicious software is
downloaded onto their phones, providing criminals with access to
information stored on the phones. The number of smishing scams
increases around the holidays as people use their cell phones to make
online purchases.
Pharming
Vishing
119
Tabnabbing
120
information in order to receive it.
Administrator requests – the attacker may call pretending to be
a network or account administrator and asking for the victim's
password to perform maintenance
Hacking
Traditionally, a hacker is someone who enjoys tinkering with
software or electronic systems. However, the term hacker has
121
assumed a new meaning in a world characterized by high incidence
of cyber crime. Thus a hacking commonly involves breaking into
computer systems with a malicious intent, usually for personal gain,
fame, profit or even revenge. There is a distinction between ethical
(white-hat) hackers and malicious (black-hat) hackers.
Ethical hacking
Ethical hacking refers to hacking performed by a company or
individual to help identify potential threats on a computer or
network. An ethical hacker attempts to bypass system security and
search for any weak points that could be exploited by malicious
hackers. This information is then used by the organization to improve
the system security, in an effort to minimize or eliminate any
potential attacks.
122
Criminal Hacking (Cracking)
Criminal hackers are technically referred to as ‗crackers‘ as they
crack into computer systems and networks with malicious intent.
There are a number of reasons why criminals hack systems:
Hacking for fun - some hackers make attempts on computers,
servers or network systems just for the personal gratification.
Thus hacking may be done to prove a point or just for the
challenge.
Hacking for profit or gain – most hackers target businesses for
hacking in order to gain financially or some other form of
reward or advantage. Another reason to hack a system is to steal
information or business secrets. A large portion of hacking
attempts falls into this category of hacking for profit or gain.
Banks and large companies are common targets for hacking jobs.
Hacking to disrupt - some hackers target a company or
organization just to disrupt business, create chaos or to be a
nuisance. Such hackers would be often trying to make a
statement with their hacking, demonstrate security inadequacies,
or to show general disapproval for the business itself.
Hacking for revenge – some aggrieved persons may turn to
hacking a system as a way of revenging. A typical example is a
former employee who hacks computer systems as a revenge for
being dismissed by the company.
Trojan horses
A Trojan is malware disguised as harmless software. The intent of
the hacker is to get the targeted victim to install the malware by
believing that it is safe. Once installed on the computer, a Trojan can
123
do anything from logging keystrokes, to opening a backdoor and
giving the hacker access to victim‘s computer system.
Drive-By Downloads
Hackers also use what are known as ‗drive-by download‘ attacks to
hack into computers. In this case, the victim does not have to click on
anything to initiate the download and installation of malware. Just
visiting a website that has been compromised is enough to get the
victim‘s computer infected. The stealth and effectiveness of a drive-
by download makes it one of the best methods in a hacker‘s arsenal
today.
Rootkits
A rootkit is a malicious segment of code injected into a computer
system, designed to hide any unauthorized activity taking place.
Rootkits grant administrative control to the attacker and the victim‘s
computer can be used without restrictions and without their
knowledge. A rootkit can attack and replace important operating
system files, allowing it to hide or disguise itself and other malware.
Once a rootkit has buried itself deep within your system, it can cover
an intruder‘s tracks (by altering system logs), cover up evidence of
malicious processes running in the background, hide files of all
types, and open a port to create a backdoor.
Malvertising
Malvertising is a method whereby users download malicious code by
simply clicking at some advertisement on any website that is
infected. In most cases, the websites are genuine but cyber criminals
insert malicious advertisements on the websites without the
knowledge of the website owner. Malvertising is one of the fastest,
increasing types of cybercrime.
124
persons, property and governments/organizations. Some of the cyber
crimes covered include cyber stalking and cyber squatting; cyber
extortion and cyber cheating; cyber warfare and cyber terrorism, as
well as phishing and hacking.
125
UNIT 5
Learning Objectives
By the end of this Unit, students will be able to:
126
non-standard hieroglyphs to convey secret messages as early as
1900 BC. A classical example of data hiding techniques is found in
a story told of an ancient man called Histiaeus who shaved the head
of his most trusted slave, tattooed a message on his head, and then
waited for his hair to grow back. The slave was send to Aristagoras,
with instructions to shave the slave's head again and read the
message, directing him to revolt against the Persians.
Morkel et al observe that since the rise of the Internet one of the
most important factors of information technology and
communication has been the security of information. Cryptography
127
was created as a technique for securing the secrecy of
communication and many different methods have been developed to
encrypt and decrypt data in order to keep the message secret.
Unfortunately it is sometimes not enough to keep the contents of a
message secret, it may also be necessary to keep the existence of the
message secret. The technique used to implement this, is called
steganography.
The importance of securing data stems from the need to preserve the
confidentiality, integrity and availability of personal data, sensitive
data, confidential data and trade secrets. Data may also be secured
to avoid misuse of the data, inadvertent damage to data, human
error and accidental deletion of data. A variety of methods have
been developed to ensure that information remains safe and secure.
Data hiding techniques provide a level of security of data from
unauthorized users and potential attackers. Conversely,
cybercriminals may also seek to secure information in order to hide
evidence or traces of crime.
Although data hiding is as old as the human race, there are new
techniques for hiding data on mobile devices, operating systems,
virtual images, social networks, and other dominating technologies
in the modern digital society. There are also various analytical
methods for reckoning hidden data, as well as jamming methods for
disrupting data hiding operations. Other emerging technologies and
attack methods, including cloud considerations, privacy protection,
and derivative data hiding and detection theories have developed.
As data hiding detection and forensic techniques continue to
128
advance, so are more sophisticated stealth methods for spying,
corporate espionage, terrorism, and cyber warfare designed to
escape detection. It is therefore important to explore the current and
next generation of tools and techniques used in covert
communications and data concealment tactics.
129
to hide internal object details (data members). Data hiding ensures
exclusive data access to class members and protects object integrity
by preventing unintended or intended changes. Data hiding also
reduces system complexity for increased robustness by limiting
interdependencies between software components. Data hiding is
also known as data encapsulation or information hiding.
130
any adverse effects and destroying hidden information. In other
words, a data hiding technique must be robust enough to preserve
the hidden information. The last attribute of a good data hiding
technique is perceptibility. The data hiding method should hide data
in such a manner that the original cover signal and the hidden data
signal are perceptibly indistinguishable.
The data hiding technique should secure the data in a host media
with minimal or no deterioration in host and provide a method of
extracting the secure data afterwards. However, data hiding
techniques may be classified into reversible data hiding and
irreversible data hiding methods.
There are various data hiding techniques used in cyber security. The
most common and frequently used techniques are cryptography,
watermarking and steganography. These techniques will be
discussed in greater detail in the ensuing sections.
5.2 Cryptography
131
two. Cryptography is a wider concept involved with the science of
secret communication while encryption is one component of
cryptography. In this study the term cryptography will be used
extensively although reference may also be made to encryption.
Definition of cryptography
In simple terminology, cryptography may be defined as the art of
transforming data into an unreadable format to prevent unauthorized
persons from comprehending the message. The etymology of the
word ‗cryptography‘ can be traced back to a Greek word meaning
‗secret writing‘ or ‗hidden writing‘. Similarly, encryption may be
defined as the process of making information unreadable by
unauthorized persons (Gove 2000). The modern concept of
cryptography is therefore synonymous with encryption.
132
is able to read the secret message. Cryptography has three basic
steps, namely: encryption, message transfer and decryption. Since
modern digital cryptography has become synonymous with
encryption, the latter concept is discussed in greater detail below.
Encryption
The first step in cryptography is the encryption process. Voors
(2003) defines encryption as a technique that changes a plaintext
message from its original form by replacing or rearranging the
letters and numbers and converting the message into an
indecipherable form using a mathematical algorithm and a key.
Thus the process entails encrypting the original data (plain text) to
some non-readable form. Gove (2000) describes that process of
encryption as consisting of a sender and a receiver, a message
(called the plain text), the encrypted message (called the cipher text)
and an item called a ‗key‘. The converse of the encryption process
is decryption. A more explicit description is given by Forouzan &
Mosharraf (2011) observe that encryption is analogous to locking a
message in a box, while decryption can be thought of as unlocking
the box using the ‗key‘.
133
Algorithm
Secret Key
Secret Key
Biometric encryption
134
retinas, and walking and typing patterns. Advances in processing
speed appear to have made biometrics appropriate for everyday use.
Drawbacks of cryptography
Though data encryption is proved to be a secure method to hide
data, it has some weaknesses. For example, sometimes the
appearance of ciphertexts could give a clear impulse (incentive) to
an unauthorized user and this might lead to unauthorized access to
the original content by breaking it. As a result the original receiver
would not be able to receive the ciphertext sent by the sender.
135
Medical institutions use encryption to safeguard the privacy of
medical records.
Cryptographic methods
Generally, there are three basic cryptographic methods often used in
network security, namely: hash functions, symmetric key encryption
and asymmetric key encryption. ‗Encryption is used to convert data
into a format that can only be read by someone with secret
knowledge.
Symmetric-key cryptography
There are a number of important cryptographic tools that can be
used to secure information. Symmetric key encryption, also known
as private key encryption, is a class of reversible encryption
algorithms that use the same key for both encrypting and decrypting
messages. With symmetric key encryption the secret key is known
by everyone that requiring to encrypt and decrypt the data. In other
words, the encryption and decryption algorithms are the same.
When the key is applied to the original data, it is converted to cipher
text. Basically, encryption is a mathematical function that uses the
key to manipulate the data. The cipher text is converted back to the
original data by using the same key that was used to encrypt the
data.
136
for hiding information from intruders, namely: the substitution and
transposition techniques. These techniques will be explored in the
ensuing sections.
The plain text is created from the normal alphabetic from a-z. In
order to create the cipher text the letters are shift so that letter a
corresponds with letter d while letter b with letter e and so on. The
recipient will need to now the key in order to decrypt the secret
message. For instance, when shifting three letters to the right as the
key, the plain text message: ―the secret meeting is on today‖ would
be written in cipher text as ―wkh vhfuhw phhwlqj lv rq wrgdb”. In
other words, the characters in the key are rotated three spaces to the
left. However, Graham et al (2011) observe that substitution ciphers
are very vulnerable to cryptanalysis, the practice of breaking codes.
With enough text, it would be simple to begin replacing characters
in the cipher text with their possible clear text counterparts.
137
eighth position of in the plaintext may appear in the first position of
the cypher text. In other words, a transposition cipher reorders
(transposes) the symbols. The traditional ciphers had numerous
shortcomings and not safe for use in the modern day cyber world
where attackers can easily break the ciphers.
Management of keys
There are several security-related issues that need to be considered
with the use of symmetric key encryption. The first is key
distribution. Graham et al (2011) aptly observe that key exchange
and protection are the most important aspects of symmetric
cryptography because anyone who has the key can both encrypt and
decrypt messages. The strength of any system that uses symmetric
key encryption is dependent on the methods used to share and
protect the shared secret (Jacobson 2009).
138
Similarly, users have to grapple with the possibility of breaking the
encryption. The goal is to make the key sufficiently long so that it is
not easily broken by trying every possible combination. The length
of the encryption key is measured in bits and determines the
strength of the encryption program. For example, an encryption key
that is 40 bits in length yields 1 billion possible keys or
combinations, a key with 56 bits has 72 trillion, and a key that
measures 128 bits produces a gazillion solutions (Voors, 2003).
Attackers often try to attack the key generation methods or the key
distribution system instead of guessing all possible keys. Symmetric
encryption remains fast and effective technique for safeguarding the
confidentiality of the encrypted data despite that it requires a shared
key and therefore depends upon the secrecy of that key.
Asymmetric encryption
Asymmetric key encryption, also known as public key encryption,
uses two keys that are mathematically related. The first key is used
for encryption while the other is for decryption. The essence of
public key encryption is therefore that one of the matched keys is a
public key known by everyone and freely distributed, while the
other matched key is a private key kept secret. Asymmetric
encryption falls under the ambit of cryptography for which the
distinctive aspect of the system is the use of two linked keys for
encryption and decryption, rather than a single key. In other words,
public key system uses one key, known as the public key, to encrypt
data, and a second key, known as the private key, to decrypt the
encrypted data.
139
key to decode the secret message. Asymmetric algorithms therefore
use different keys for encryption and decryption. The process of
asymmetric key encryption is diagrammatically presented as
follows:
Public Key
Private Key
140
signature. For instance, the first international standard for digital
signatures (ISO/IEC 9796) was adopted in 1991. Various
cryptography standards and infrastructure continue to be developed
to secure information. Data encryption is one of the fundamental
technical measures to enhance the security of information.
Organizations should endeavor to use the latest advanced
encryption algorithms as part of security strategies to safeguard
information.
Steganography
A related but slightly different technique used in secret
communications to is ‗steganography‘, which simply means
‗covered writing‘ or ‗concealed writing‘. Gupta et al (2014) define
steganography as a practice of hiding or concealing a message, file
or image within another message, file or image. A more lucid
definition is provided by Kayarkar and Sanyal (2012), who observe
that steganography is the process of concealing sensitive
information in any media to transfer it securely over the underlying
unreliable and unsecured communication network. According to
Maiti et al (2011) steganography is the art of hiding data in a
seemingly innocuous cover medium. For example, any sensitive
data can be hidden inside a digital image.
141
message can only be detected by its intended recipient (Agarwal,
2013). It is an ancient art of hiding messages for making the
messages not detectable to malicious users. In this case, no
substitution or permutation was used. The hidden message is plain,
but unsuspected by the reader. Steganography includes the
concealment of information within computer files. In digital
steganography, electronic communications may include
steganographic coding inside of a transport layer such as a
document file, image file, program or protocol. Media files are ideal
for steganographic transmission because of their large size. The
essence of steganography is that it disguises sensitive or
confidential data in any cover media such as images, audio, or video
in a way that hides the existence of the data so that unintended
recipients do not detect it. In other words, the main objective of
steganography is to hide messages inside other messages to keep the
communication from the prying eyes of potential attackers or
unauthorized users. The main objectives of the steganographic
algorithms are to provide confidentiality, data integrity and
authentication.
Components of steganography
There are basically four stages involved in using steganography as a
data hiding technique. The first step involves the selection of the
cover media to be used for hiding the data. This could be images,
videos, or audio files. The second component of steganography is
the secret message or information intended to be camouflaged in the
cover media. There is also need for a function that will be used to
hide data in the cover media and its inverse to retrieve the hidden
142
data. The last component is the optional key or password to
authenticate or hide and unhide the data (Gupta et al 2014). Digital
steganography has three basic components (a) obtain the data to be
hidden i.e. secret message (b) embed the secret message into the
cover medium i.e. images, sounds or videos etc and (c) lastly, obtain
the stego-carrier to be sent.
Types of steganography
There are various types of steganography but three basic types of
steganographic protocols are available. Some of the types of
steganography techniques can be combined with other data hiding
methods such cryptography. In fact, it is for this reason that
steganography is sometimes confused with cryptography. Gupta et
al (2014) highlight the following types of steganography:
143
(b) Secret key steganography
Secret key steganography as a technique uses a key to embed secret
messages into the media cover. The key is only known to the sender
and the receiver. In order to enhance the security of data using this
technique, the key should be exchanged in a secure medium. A
major drawback of secret key steganography is that it may be
susceptible to interception as it involves the sending of the key to
the receiver.
144
random character sequences or using context-free grammars to
generate readable texts.
IP based steganography
145
the existence of the message, while cryptography scrambles a
message so that it cannot be understood.
146
Steganographic messages are often first encrypted by some
traditional means and then a cover image is modified in some way
to contain the encrypted message. The detection of
steganographically-encoded packages is called ―steganalysis.‖ Both
steganography and cryptography techniques may be combined to
create a more secure and robust level of protection to data. This
entails encrypting the message first using cryptography techniques,
that is, the cipher text is encrypted before being embedded in a
cover media.
147
intellectual property such as copyrights. In watermarking all of the
instances of an object are ―marked‖ in the same way. The kind of
information hidden in objects when using watermarking is usually a
signature to signify origin or ownership for the purpose of copyright
protection (Marvel et al, 1999).
148
becomes critical given sensitive data in online databases, such as
government records, medical records, and voters' lists. This poses a
threat to personal privacy. In many jurisdictions laws have been
promulgated to safeguard personal privacy. A number of highly
publicized information breaches have focused the need for
organizations to better understand their data protection obligations -
to understand the risks and how to protect that data.
149
According to Technopedia, data obfuscation is a form of data
masking where data is purposely scrambled to prevent unauthorized
access to sensitive materials. This form of encryption results in
unintelligible or confusing data. Data masking or data obfuscation is
the process of hiding original data with random characters or data.
The main reason for applying masking to a data field is to protect
data that is classified as personal identifiable data, personal
sensitive data or commercially sensitive data, however the data
must remain usable for the purposes of undertaking valid test
cycles.
150
transmission. However, with encryption, authorised users can still
have access to the underlying data. Data obfuscation protects
individual's data in non-production environments by replacing it
with representative but fictitious data. In the event of a data loss
involving obfuscated data, a non-authorised user may be able to
read the data (including field headings), however it will not reflect
any individual's details.
The number and date variance technique has been applied to mask
financial data sets such as payroll. On the other hand, nulling out or
deletion techniques have been used through applying a null value to
a particular field. The null value approach is really only useful to
prevent visibility of the data element. Similarly, masking out
technique is also use to obfuscate data. Data Masking is the
replacement of existing sensitive information in test or development
databases with information that looks real but is of no use to anyone
151
who might wish to misuse it. This technique involves character
scrambling or masking out certain fields sensitive data to prevent it
from being viewed by unauthorized users. Data masking technique
is commonly applied to credit card data in production systems.
Code obfuscation
152
There are several advantages of automated code obfuscation that
have made it popular and widely useful across many platforms. A
main advantage of automated code obfuscation is that it helps
protect the trade secrets (intellectual property) contained within
software by making reverse engineering a program difficult and
economically unfeasible. Other advantages might include helping to
protect licensing mechanisms and unauthorized access, and
shrinking the size of the executable.
Hardware obfuscation
Hardware obfuscation is a technique by which the description or the
structure of electronic hardware is modified to intentionally conceal
its functionality. The notion behind hardware obfuscation is to make
it more difficult to reverse-engineer. Hardware obfuscation
techniques can be classified into two: (i) the passive techniques
which do not directly affect the functionality of the electronic
system and (ii) the active techniques which directly alter the
functionality of the system. Often the active hardware obfuscation
are ‗key-based‘ such that normal functionality of the obfuscated
153
design can only be enabled by the successful application of a single
pre-determined key or sequence of secret keys at the input.
154
unauthorized users, destroyed or manipulated by hackers for
malicious purposes. Sensitive information in databases may be
prone to disclosure resulting in the privacy of the information being
violated. Similarly, statistical information in database may also be
altered or manipulated resulting in the information being inaccurate.
Data mining techniques may be used to search information and
databases thereby exposing sensitive to the threats of disclosure.
155
child-pornography collections or terrorist plots. In the justice
system, the rise of digital encryption poses a distinct problem: the
unavailability, or indecipherability of encrypted evidence. Thus
whereas cyber crime is on the rise, law enforcement agents have to
contend with the challenges posed by some counter cyber security
measures employed by criminals.
156
cyber security standpoint. For instance, hackers use encryption to
protect their communication channels from interception. In addition,
hackers can also install their own encryption software on computers
they have penetrated. The software is then used to set up a secure
channel between the hacker's computer and the compromised
computer. The corollary is that cyber attackers and criminals use the
same cyber security techniques to prevent their malicious and
criminal activities from detection and investigation.
157
mandatory for the use of encryption software to be licensed. Yet
some countries forbid citizens from encrypting their Internet
communication while others countries require decryption keys to be
recoverable in case of a criminal investigation.
158
It is a serious offence in terms of the IoCA for a person to fail to
make the disclosure of protected information where they are
required to do so by operation of the law. Accordingly, a person is
compelled under sanction of a fine not exceeding level fourteen or
imprisonment for a period not exceeding five years or both to
disclose protected information for purposes of the interception of
communications under the Act.
Legal cases
There are various legal cases in which criminal suspects have been
compelled to provide passwords to potentially incriminating data
encrypted on hard drives. An increasing number of individuals and
organizations have been arraigned before the courts on issues
relating to evidence on encrypted hard disks. Legal issues have been
raised pertaining to whether compelling a suspect to reveal a key or
password to encrypted documents constitutes self-incrimination? In
the United States some courts have held that compelling suspects to
provide the password necessary to unencrypt hard drive would be a
violation of the Fifth Amendment assurance that no one shall be
compelled in any criminal case to be a witness against himself.
159
court ordered defendant to reveal the decryption password to the
contents of the hard-drive.
160
UNIT 6
COMPUTER INSECURITY
6.0 Introduction
161
Internet fraud and online scams
A number of fraudulent activities and online scams have and
continue to be reported with the growth of e-commerce transactions.
An Internet fraud or online scam may be defined as the use of
Internet services or software with Internet access to defraud victims
or to otherwise take advantage of them; for example, by stealing
personal information, which can even lead to identity theft. Internet
services can be used to present fraudulent solicitations to
prospective victims, to conduct fraudulent transactions, or to
transmit the proceeds of fraud to financial institutions or to others
connected with the scheme.
162
promised a percentage of the transfer amount, usually totaling
hundreds of thousands of dollars to a few million. The targeted
victim is then tricked into providing bank account details or
depositing some amount as security. The result is that the victim
ends up losing money due the scam.
Pyramid schemes
Pyramid schemes are illegal and very risky ‗get-rich-quick‘
schemes that can end up costing victims a lot of money. Victims
might hear about a pyramid scheme from friends, family or
neighbours. Usually, pyramid schemes recruit members at seminars,
home meetings, over the phone, by email, post or social media. In a
typical pyramid scheme, the victim pays to join. The scheme relies
on convincing other people to join up and to part with their money
as well. In order for everyone in the scheme to make a profit
there needs to be an endless supply of new members. The promoters
at the top of the pyramid make their money by having people join
the scheme. They pocket the fees and other payments made by those
who join under them until the scheme collapses and victims suffer
financial prejudice.
163
Investment fraud and stock scams
According to Investopedia, the Internet is a great tool for investors,
providing a source for researching investments and trading
securities with unprecedented ease. Unfortunately, the lack of rules
on the web also makes it the perfect place for fraud to flourish.
Investment fraud and stock scams occur through the sale of bogus
investments online. The scammer buys the stock at a low price,
spreads false rumors that help drive the stock price up, and the sells
at an artificially high price before the bottom falls out (Stair &
Reynolds 2003). Users are discouraged from dealing with
unregistered securities and brokers.
Cyber theft
This involves using a computer to steal. Cyber theft is generally
broad in scope and may include breaking and entering into
computer systems to steal data, embezzlement and unlawful
appropriation, espionage, identity theft, fraud, malicious hacking,
plagiarism, and piracy.
Internet crimes
There are other various Internet crimes which do not necessary
relate to fraud but are considered criminal offences. The following
are some of the Internet crimes:
164
Internet transcend national borders and therefore difficult to
manage.
Drug sales
Electronic commerce enables people across the world to trade in
various goods and services including illegal substances. For
instance, selling illegal and prescription drug through the Internet is
an offence in most countries except through a state-licensed
pharmacy.
Cyber contraband
The Internet may also be used as a vehicle for transferring illegal
items that is banned in some locations. Typical examples of such
Internet crimes include transferring banned encryption technology,
among others.
Cyber laundering
Money laundering is also rampant over the Internet. This involves
the electronic transfer of illegally-obtained monies with the goal of
hiding its source and possibly its destination. The monies may be
proceeds of illegal transactions such as drug dealing, illegal dealing
in minerals, among other things.
Cyber trespass
Cyber trespass involves accessing computer or network resources
without authorization or permission from the owner, but does not
alter, disturb, misuse, or damage the data or system. Cyber trespass
is therefore hacking for the purpose of entering an electronic
network without permission. A typical example is reading email,
files, or noting which programs are installed on a third-party's
computer system without permission just for fun, because you can.
This is sometimes simply called snooping.
Cyber vandalism
This crime involves damaging or destroying data or other
information in computer systems. This can include a situation where
network services are disrupted or stopped. This deprives the
165
computer/network owners and authorized users (website visitors,
employees) of the network itself and the data or information
contained on the network. For instance, cyber vandalism may
involve entering a network without permission and altering,
destroying, or deleting data or files.
166
User errors
It is a truism that any tool is only as good as the workman who uses
it and computers are no different. Most computer failures are due to
errors of the users. Actions such as not powering down properly,
skipping scan disks or continual button pushing while a computer is
processing can damage a computer's hardware, particularly drives
and processors. Always follow the correct guidance in using a
computer machine.
Faulty manufacture
Computer failures may be attributed to faulty designs by
manufacturers. It seems there are an almost infinite number of
manufacturers and assemblers making computers and while some
have vast experience and resources, others are no more than two
guys in a garage so it is not surprising that an increasing number of
computer systems are faulty when purchased.
Bad upgrades
Software upgrades by inexperienced computer fitters can cause
serious problems. Faulty add-ons such as RAM can kill a processor
instantly, also attempting to 'overclock' or interfere with a processor
can often lead to a fatal melt-down.
USB Devices
Most gadgets can be plugged into a USB port of a computer these
days. However, the USB device may not be suited to the operating
system being used or it may be faulty leading to a fatal short circuit.
Users should therefore be careful when using USB devices to avoid
computer failures.
167
therefore good practice for users to constantly load software
upgrades on the computer systems.
Environmental factors
A dusty environment will clog a computer and block cooling vents
causing a computer to overheat. Dust can also contain conductive
material and particles can stick to circuit boards and cause a short
circuit. Computers are electrical devices and as with all electrical
equipment, computers and water do not mix as this could result in
permanent damage to the computer. In addition, different
temperatures may also affect computers. For instance, processors
can run exceptionally hot and if a computers cooling system is
inadequate it will only be a matter of time before it packs up for
good. Similarly, extreme cold conditions may affect the computer.
Processors will not operate at all if the operating temperature is too
cold as condensation inside the machine can freeze and expand
damaging the processor and electronics.
Power problems
Power surges or unexpected electrical power cuts may not only
cause instant loss of data but can fry a processor. Lightning can
surge through cables frazzling the computer system. Thus voltage
spikes, that is, momentary changes in the supply of electric power
may cause computer failures. Even a small power glitch can damage
a computer and corrupt data.
The rising cases of cyber attacks present a major threat to banks and
financial institutions all over the world. Reports of major banks
168
losing millions of dollars as a result of cyber crime have been
extensively reported. For instance, in February 2016, hackers
successfully stole nearly $100 million from Bangladesh‘s central
bank. This cyber attack was immediately followed by reports that
hackers had successfully stolen more than $31 million from the
Russian central bank.
169
In order to understand their adversaries, banks must anticipate new,
sophisticated forms of attack, or new versions of old tricks. At the
same time, they must also work to ensure that their partners and
stakeholders are secure, as part of strengthening the entire supply
chain of information to minimize attacks against the weakest links.
The following tips may be useful to banks and other financial
institutions:
170
pejoratively. In the computing profession, hackers refer to a distinct
group of particularly skilled programmers or experts with the
ability to write novel software. In the other sense however, hackers
generally refer to computer intruders or criminals (Cavelty, 2013).
In order to win the war against cyber crime, there is need to first
understand the incentives and motivations for the attacks. In other
words, what motivates cyber attackers to carry out cyber attacks?
According to Gelbstein and Kamal (2002), the most important
defence in cyber-space is twofold. First, having a correct analysis of
one‘s own vulnerabilities and second, trying to determine the
opponent‘s motivations. Vulnerability and motivation are then the
171
two keys to a correct understanding of and reaction to the dangers of
cyber-threats and cyber-attack.
172
Some of the categories of cyber attackers will be discussed below in
a bid to highlight the various incentives and motives for committing
cyber crimes.
Organized attackers
173
Hackers
Amateurs
174
6.6 Reducing Systemic Cyber Security Risk
175
to enhance their cyber resilience, and ensure they are able to recover
from a systemic cyber event, is therefore more important than ever.
176
widespread loss of trust and confidence in the payment and
settlement systems (World Economic Forum 2016).
177
states in mind, nor to address risks that exist outside the realm of a
given entity‘s control.
178
UNIT 7
Learning Objectives
By the end of this unit, students will be able to:
Explain why cyber crimes are on the rise
Highlight reasons for cyber crime under-reporting
Explain the cyber crime investigations
Outline methods of cyber crime management
Understand the process of evidence collection and chain of
custody
Explain the process of cyber crime risk management
Define and understand the concept of cyber forensics
7.0 Introduction
179
security, the definition of cybercrime may be restricted to various
acts or omissions against the confidentiality, integrity and
availability of computer data or systems. In a broader sense, cyber
crime definitions may encompass other crimes such as identity-
related offences that may result in personal harm or financial loss to
the victims. The long and short of this discourse is that cybercrime
is a term that does not lend itself to a precise definition. As aptly
observed by Yar (2006, quoted in Croall, 2011), the term
‗cybercrime‘ refers to a diverse range of illegal and illicit activities
that share in common the unique electronic environment in which
they take place.
180
internet-based illegal or criminal acts. A person that commits
cybercrime is called a cybercriminal. Cybercriminals may also use
software for their crimes, that kind of software is called crimeware.
Perpetrators of cybercrime
There are many crimes that are being committed using information
technologies, particularly the Internet. The perpetrators of
cybercrime frequently include computer hackers, cyber stalkers,
cyber terrorists and identity thieves. There are various categories of
cybercrime perpetrators including the following:
(b) Hacker
A hacker is a person who accesses a computer or network illegally.
Some hackers make a claim or justify their intent for hacking, are to
181
improve security.
(c) Cracker
Someone who accesses a computer or network illegally, with the
intent of destroying data, stealing information, or any other
malicious action. A cracker usually has advanced network skills.
Cyber extortionist
A cyber extortionist is a person who uses e-mails as their drive
force for extortion. A cyber extortionist usually performs actions,
such as threatening to expose confidential information about a
company, unless they are paid a certain sum of money.
Cyber terrorist
A cyber terrorist is someone who uses the Internet or a network to
destroy or damage computers for political reasons. Cyberterrorists
are also associated with cyberwarfare, which is described as an
attack whose goal ranges from disabling a government‘s computer
network to crippling a country.
Script kiddie
Someone who has the same intent as a cracker but does not have the
technical expertise, so in turn use pre-written hacking and cracking
programs to breach computers or networks.
Unethical employee
Employees may break into their employer‘s computer or network
maybe either to simply exploit a security weakness or to seek
financial gains from selling confidential information. Some
employees may just want revenge.
182
Consequently, numerous cybercrimes go undetected, and where
they are detected, victims are usually reluctant to report the cases.
The precise magnitude of the global computer crime problem
remains unknown as many cyber crimes go unreported. According
to Yar (2006), ‗estimating the extent of cyber crime is extremely
difficult. Like fraud, many cyber crimes are not detected and
companies may not want to reveal their vulnerability. Individual
victims may feel that there is little to be gained by reporting
incidents, and would not know who to report them to.‘ Grabosky (
:70) also echoes the same sentiments that ―many institutional
victims, such as banks, may not wish the world to know that their
systems have been successfully attacked. Their main concerns are
securing their systems (i.e. hardening the target) and recovering
their losses, if possible. If the offender is an insider or a disgruntled
former employee, this can, in some cases, be achieved without
resort to prosecution.‖
183
reluctant to report computer crimes because the crimes may involve
employees or the company fears that publicizing its vulnerability
will hurt its reputation.‘ For instance, a bank may not wish to report
that it has been hacked as this may result in panic withdrawals of
money by accountholders.
(iii) Lawsuits
Businesses may also be wary of reporting cybercrime for the reason
that customers may institute legal action against them if they feel
that the privacy of their information held by the businesses is
compromised.
184
threats and attacks caused by cybercrimes. It is widely known that
victims of Internet crimes are often reluctant to report an offence to
authorities. In some cases the individual or organization may not
even be aware a crime has been committed. Even though facilities
for reporting incidents of cyber-crime have improved in recent years
many victims remain reluctant due essentially to embarrassment.
185
subscribers for certain period of time. In Zimbabwe, the Postal and
Telecommunications (Subscriber Registration) Regulations
(Statutory Instrument 142 of 2013) make it mandatory for
telecommunications operators including ISPs to create a central
subscriber database for all of their users. Telecommunications
operators are not allowed to activate any subscriber identity module
(SIM) card without the details of the subscriber such as name,
address, gender, nationality and passport or national identification
numbers. These subscribers may be crucial when investigating cases
of cyber crime.
186
The devices that are subject to an investigation, like any other
physical evidence, should be properly secured and stored might
contain; traces of DNA, fingerprints, and/or other evidence relevant
to the investigation. If evidence is not handled properly it may be
discredited and rendered inadmissible in a court of law. It is
therefore important for cyber security professionals and computer
forensic experts to exercise extreme caution when handling
potential digital evidence.
187
(a) Knowledge of information technology
The war against cybercrime can never be won without sufficient
knowledge and understanding of the dynamics of computer systems
and information technologies. The major reason why it is difficult to
combat cybercrime is because the majority of people and
organizations using computers may be victims of cybercrime
without even knowing that this is happening. As such, IT
professionals and computer security experts have a daunting task of
educating users of computers on the various threats and risks
associated with computer and information technology as part of
efforts to manage cyber crime.
188
Secure Computer configurations
Configuring computers properly and securely is a good step towards
managing potential cyber threats. This is particularly important
when configuring newly purchased computers as they naturally
come with inadequate levels of security. When installing computers
at work or at home, there is need to pay attention to the security
features to ensure that the computer is protected. Equally important,
properly configuring Internet applications such as Web browsers
and email software is of cardinal importance in safeguarding the
computer from online threats. Security and privacy settings on the
computer should also be properly configured as part of efforts to
tame the tide of rising incidence of cybercrime.
Password policy
Password policies are necessary to protect the confidentiality of
information and the integrity of systems by keeping unauthorized
users out of computer systems. Users of computers must have
password policies dealing with how to store and secure passwords,
procedure on and frequency of changing passwords and the
fiduciary duties of the users. A good password policy must specify
certain key features of passwords such as minimum length, allowed
character set, prohibited strings (all numbers, dictionary words,
variations of the username or ID), and the duration of use
(expiration) of the password. In order to prevent social engineering,
a password policy should require that only the employee who needs
access to the computer should know the password. Employees must
not under any circumstances disclose their passwords in an
unsolicited phone call or email message.
189
Although longer, complex and difficult passwords may be a
challenge for most employees or users to remember, organizations
should still encourage the use of such passwords for security
reasons. The password policy must provide for the requirement for
regularly changing the passwords. For instances, the organization
may have a policy for changing passwords every month. Changing
passwords frequently may be monotonous for users. As such,
organizations may consider using password management software
platforms such as 1Password, PassPack and LastPass.
190
Email protection
Email facilities are prone to vulnerabilities if not properly secured.
It is therefore important to ensure that emails are encrypted to
provide another layer of protection against intrusion. Users are
urged to keep their passwords safe and to always log out to prevent
others from hacking their email accounts. It is also recommended
for security reasons that use choose complicated email addresses so
that it is difficult to guess such as when using one‘s name. A good
practice is to combine one‘s name with numbers in the email
address (such as [email protected]).
Security software
Software security encompasses firewall and antivirus programs
intended to provide basic online security. The first line of defence is
usually provided by firewalls that monitor the flowing of data in and
out of computer systems and screening out bad traffic. Antivirus
software also plays a critical security role by monitoring online
activities such as email messages and Web browsing thereby
protecting the computer from viruses, worms, Trojan horse and
other types malicious programs. According to Reynolds (2016)
antivirus software should be installed on each user‘s personal
computer to scan a computer‘s memory and disk drives regularly
for viruses. Other renowned antivirus programs, such as Norton
AntiVirus, also provide protection from spyware and adware.
Antivirus and antispyware software should be properly configured
to automatically update itself.
191
precautions on how to manage and safely share personal
information online:
192
Training
According to Kaspersky cyber threats are often blamed on outsiders
such as nefarious programmers writing malicious code designed to
pilfer corporate intelligence, siphon confidential customer
information and/or raid financial data. Yet sometimes, the threat
may actually originates from within, when employees‘ ignorance
and/or negligence opens the door for cyber criminals. Therefore, an
organization may invest in the best cyber security systems but
remains exposed if employees are not trained on the risk of cyber
crime. A system is only as secure as the weakest link. Employees,
like all humans, have inherent weaknesses and make errors that may
inadvertently expose the business to threats of cyber attacks.
Awareness and training employees is therefore a critical and
indispensible component of cyber security management.
193
7.5 Evidence Collection and Chain of Custody
Evidence collection
Reynolds (2016:111) underscores the importance of evidence
collection by observing that ―an organization should document all
details of a security incident as it works to resolve the incident.
Documentation captures valuable evidence for a future prosecution
and provides data to help during the incident eradication and
follow-up phases. It is especially important to capture all system
events, the specific actions taken (what, when, and who), and all
external conversations (what, when, and who) in a logbook.
Because this data may become court evidence, an organization
should establish a set of document handling procedures using the
legal department as a resources.‖ There is no doubt therefore that
proper procedures must be followed during evidence collection to
avoid the possibility of such evidence from being challenged and
rendered inadmissible in a court of law.
194
Evidence collection entails a number of important activities. This
may include seizing and securing physical pieces of evidence such
as smart phones as well as other mobile devices. The process may
also include the collection of forensic evidence such as fingerprints,
biological samples, DNA, and so on. Welch (2000) observes that
when seizing evidence from a computer-related crime, the
investigator should collect any and all physical evidence, such as
the computer, peripherals, notepads, documentation, etc., in addition
to computer-generated evidence. The following are a few tips on
how to collect and secure pieces of computer evidence:
At the point of collection, the evidence must be properly
marked so that it can be easily identified as the specific piece
of evidence gathered at the crime scene.
The collection must be recorded in a logbook identifying the
particular piece of evidence, the person who discovered it, and
the date, time and location discovered. All other types of
identifying marks such as make, model, or serial number,
should also be logged.
Depending on the nature of the crime, latent fingerprints may
need to be preserved. In that case, the investigator should use
static-free gloves instead of standard latex gloves.
Data and power cables on computer devices containing
potential evidence should be secured. It may also be useful to
consider collecting computers that may contain device
backups;
Any devices identified as potential evidence should be properly
packaged to ensure that they are not physically damaged,
deformed or otherwise contaminated. The devices may be
packaged in evidence bags or boxes. Evidence should be
protected against heat, extreme cold, humidity, water, magnetic
fields, and vibration by storing it in proper packing materials.
For instance, hard disks should be packed in sealed, static free
bags, within a cardboard box with a foam container.
Evidence should be safely transported to a location where it
can be stored and locked. However, where the evidence is too
bulky to be transported, the forensic examination of the system
may need to take place on site.
195
Chain of custody
In order to ensure successful prosecution of criminal activities, the
legal system requires that evidence presented in court must be
authentic and not been tainted or tampered with in any way. The
legal system has developed mechanisms of preserving the integrity
and authenticity of evidence. The notion of chain of custody is one
way in which the law endeavors to guarantee the integrity of
evidence. In legal parlance, the term chain of custody refers to the
logical and chronological documentation or paper trail, showing the
collection, seizure, custody, control, transfer, analysis, and
disposition of physical or electronic evidence.
196
a secure location where no one but the person in custody had access
to it). The chain of custody process may be best explained by
looking at the evidence life cycle model. The following illustrates
the model:
Figure 7.1: Evidence Life Cycle
Evidence
Discovery &
collection
Evidence
returned to Analysis of
owner/dispo evidence
sed
Evidence
Presentation of storage,
evidence in preservation &
court transportation
The Evidence Life Cycle model commences with the discovery and
collection of the evidence and progresses through various distinct
stages until the evidence is returned to the owner or otherwise
disposed. Each distinct stage in the evidence life cycle is important
and proper procedures must be adhered to in order to preserve the
integrity of the evidence. Therefore, the need to maintain the chain
of custody cannot be overemphasized. For instance, if the evidence
is challenged in a courtroom, one must be able to trace the chain of
custody in a bid to ascertain and prove that the evidence was not in
any way contaminated. However, if the chain of custody is broken
resulting in anomalies in the way the evidence was handled from the
time of collection to the time of presentation in court, the accused
person may move for the evidence to be rendered inadmissible.
197
Section of the U.S. Department of Justice developed Federal
Guidelines for Searching and Seizing Computers in 1994. The
guidelines have been revised and updated periodically since then,
most recently in 2002. In March 1998, the International
Organization on Computer Evidence (IOCE) was established to
develop international principles for the procedures relating to digital
evidence, to ensure the harmonization of methods and practices
among nations, and to guarantee the ability to use digital evidence
collected by one nation in the courts of another nation. Standardized
forensic procedures have also been developed by the FBI‘s
Computer Analysis Response Team (CART).
Definition of evidence
In simple terms, evidence may be defined as anything tendered in
court to prove the truth or false of a fact at issue. Thus the law of
evidence relates to the proof or principles that govern the proof of a
fact at issue. The proof may take the form of oral testimony of
witnesses, physical objects or documentary evidence. In criminal
proceedings, evidence is anything that proves directly or indirectly
that a person committed an offence. In the field of cyber security,
the terms ‗computer evidence‘, ‗electronic evidence‘ or ‗digital
198
evidence‘ are frequently used. Digital evidence may be defined as
any information or data of value to an investigation that is stored on,
received by, or transmitted by an electronic device. Digital evidence
comes in different shapes and forms such as text messages, emails,
pictures and videos, and Internet searches. In the world of
computers, suspects usually leave a digital trail that may provide
evidence of the identity of the perpetrator, location and time of the
crime, among other important details. Welch (2000) identifies four
types of computer-generated evidence, namely: (i) visual output on
the monitor; (ii) printed evidence on a printer; (iii) printed evidence
on a plotter; and (iv) film recorder (includes magnetic
representation on disk, tape, or cartridge, and optical representation
on CD).
Types of evidence
199
(c) Real evidence
Real evidence is tangible or physical evidence that can be tendered
in court as an exhibit. This may be in the form of a physical object,
a record or any other documentary evidence. In the field of
computer crime, documentary evidence is the most common type of
evidence usually presented in courts in the form of business records,
manuals and printouts. Real evidence may thus include tools used in
the commission of the crime or fruits of the criminal venture. The
main purpose of real or physical evidence is to link the suspect to
the scene of the crime. For example, a laptop computer containing
pornographic images may be tendered in court as real evidence to
prove that a person is guilty of distributing pornography in violation
of the law. Similarly, a compact disc containing software for
hacking computer systems or a fake credit card used by criminal
may be presented as real evidence in court.
200
supports the testimony of an expert witness through the use of
demonstrations.
Rules of evidence
(a) Admissibility
Evidence may or may not be admissible in a court of law. If a
specific piece of evidence can properly be brought before the court,
it is said to be admissible. Thus for evidence to be useful in court in
establishing the veracity of certain facts, it must first pass the key
criterion of admissibility. The court will only assess the depth and
persuasiveness of the evidence after being satisfied that the
evidence is admissible. On the other hand, if evidence cannot be
properly admitted in court for one reason or another, then such
evidence is said to be inadmissible.
(b) Relevance
The basic principle upon which admissibility of evidence is based is
relevance. This means that the evidence being tendered in court
must be relevant to the issues before the court. Thus evidence that is
irrelevant to the issue for determination by the court is inadmissible
as it is immaterial and does not facilitate the resolution of the issue.
Section 252 of the Criminal Procedure and Evidence Act deals with
inadmissibility of irrelevant evidence. It provides that no evidence
as to any fact, matter or thing shall be admissible which is irrelevant
or immaterial and cannot conduce to prove or disprove any point or
fact at issue in the case which is being tried.
201
Similarly, section 26 of the Civil Evidence Act provides that
‗evidence that is irrelevant or immaterial and cannot lead to the
proving or disproving of any point or fact in issue shall not be
admissible.‘ All relevant evidence is admissible unless there is
another rule of law that excludes it. e.g. evidence may be relevant
but privileged. Evidence may also be relevant but unreliable and
therefore inadmissible, e.g. hearsay evidence.
The best evidence rule was extensively used as a yardstick for the
test of admissibility of evidence. The principle was that the best
evidence available must be given to prove the facts in issue. This
was a liberal way of admitting evidence in courts. However, the
rules and standards of evidence are much stricter. The best evidence
rule was designed to prevent any intentional or inadvertent
alteration of evidence by requiring the original evidence at trial as
opposed to copies of the evidence. However, the courts would
accept a duplicate in the following circumstances:
Where the original is lost or destroyed by fire, flood or other
acts of God;
The original is destroyed in the normal course of business; and
The original is in possession of a third party who is beyond the
court‘s subpoena power.
The best evidence rule has been relaxed to allow duplicates unless
there is a genuine question as to the original‘s authenticity, or if
admission of the duplicate would, under the circumstances, be
unfair.
202
witness but from another source. Such statements are generally
excluded if the purpose of leading such statements is to prove their
contents as the truth. Under common law, hearsay evidence is
inadmissible unless it can be admitted in terms of one of the
recognized exceptions to the hearsay rule. The necessary corollary
is that hearsay evidence falling within the ambit of any of the
common law and/or statutory exceptions is generally admissible as
evidence of the truth of the facts contained in the statement.
203
time being has custody of the document or is responsible for
managing the activity for which the document was produced.
Section 282 of the Criminal Procedure and Evidence Act may also
be relevant to evidence emanating from computer documents. It
provides that in any criminal proceedings in which direct oral
evidence of fact would be admissible, any statement of such fact
contained in any document would be admissible as evidence of that
fact if that fact relates to any transaction in the course of any trade,
business or occupation. Thus computer information or documents in
the ordinary course of business would be admissible as evidence as
an exception to the rule against hearsay.
204
Admissibility of computer evidence
The admissibility of computer-generated evidence is, at best, a
moving target. Computer-generated evidence is always suspect
because of the ease with which it can be tampered - usually without
a trace! Precautionary measures must be taken in order to ensure
that computer-generated evidence has not been tampered with,
erased, or added to. In order to ensure that only relevant and reliable
evidence is entered into the proceedings, the judicial system has
adopted the concept of admissibility.
205
Cyber crime risk management involves systematically identifying
and valuation of assets potentially at risk, an assessment of risk and
cost-effective recommendations for risk reduction. The processes
requires establishing a sound information risk management policy
(IRM) that effectively addresses all elements of information
security. There is also need to establish IRM methodology and
tools. There are two fundamental applications of risk assessment to
be addressed (1) determining the current status of information
security in the target environment(s) and ensuring that associated
risk is managed (accepted, mitigated, or transferred) according to
policy, and (2) assessing risk strategically.
Project sizing
This task includes the identification of background, scope,
constraints, objectives, responsibilities, approach and management
support. Clear project sizing statements are essential to a well-
defined and well-executed risk assessment project.
206
Threat analysis
This task includes the identification of threats that may adversely
impact the target environment. This task is important to the success
of the entire IRM program and should be addressed, at least
initially, by risk assessment experts to ensure that all relevant risks
are adequately considered.
Vulnerability analysis
This task includes the qualitative identification of vulnerabilities
that could increase the frequency or impact of threat events
affecting the target environment.
Risk evaluation
This task includes the evaluation of all collected information
regarding threats, vulnerabilities, assets, and assets values in order
to measure the associated chance of loss and the expected
magnitude of loss for each of an array of threats that could occur.
Mitigate risk
The first step in this task is to complete the risk assessment with the
risk mitigation, costing, and cost/benefit analysis. This task provides
management with the decision support information necessary to
plan for, budget, and execute actual risk mitigation measures.
207
Monitor information risk management performance
Having established the IRM program, and gone this far –
recommended risk mitigation measures have been
acquired/developed and implemented – it is time to begin and
maintain a process of monitoring IRM performance. This can be
done by periodically reassessing risks to ensure that there is
sustained adherence to good control or that failure to do so is
revealed, consequences considered, and improvement, as
appropriate, duly implemented.
208
networks, and storage devices in a manner that preserves the
integrity of the data gathered so that it is admissible as evidence in a
court of law. A computer forensics investigation may be instigated
for a number of reasons. It may be embarked on
in response to a criminal investigation or civil litigation;
to retrace steps taken when data has been lost;
to assess damage following a computer incident
to investigate the unauthorized disclosure of personal or
corporate confidential data
to confirm or evaluate the impact of industrial espionage.
209
retrieved from computer storage media in such a way that the
information can be used as evidence in a court of law. It deals with
the following problems:
Recovering data from computers while preserving evidential
integrity
Securely storing and handling recovered electronic data
Finding significant information in large volume of electronic
data
Presenting the information to a court of law.
210
Conduct a Disk Image Backup of the Suspect System
A disk image backup is different from a file system backup in that it
conducts a bit level copy of the disk, sector by sector, rather than
merely copying the system files. This process provides the
capability to back up deleted files, unallocated clusters, and slack
space. The backup process can be accomplished by using either disk
imaging hardware, such as the ImageMaster 1000, or through a
variety of software programs.
211
A file can also be hidden is slack space. Slack space is the area left
over in a cluster that is not utilized by a file. Files and directories
can also be deleted. But when DOS or Windows deletes a file, it
only changes the first character of the file name to 0xE5, which
merely makes the file space available. The file is not actually
removed. The data in the cluster previously allocated by the file is
still available until overwritten by a new file. On DOS and
Windows systems, the analyst can use the un-erase utility to recover
deleted files.
Steganography
Steganography is the art of hiding communications. Unlike
encryption, which utilizes an algorithm and a seed value to scramble
or encode a message in order to make it unreadable, steganography
makes the communication invisible. This takes concealment to the
next level – that is to deny that the message even exists, if a forensic
analyst were to look at an encrypted file, it would be obvious that
some type of cypher process has been used. It is even possible to
determine what type of encryption process was used to encrypt the
file, based upon the unique signature. However, steganography
hides data and messages in a variety of picture files, sound files, and
even slack space on floppy diskettes. Even the most trained security
specialist or forensic analyst may miss this type of concealment
during a forensic review (Welch 2000: 638).
212
UNIT 8
ELECTRONIC TRANSACTIONS
8.0 Introduction
213
What is e-commerce?
Stair and Reynolds (2003) define ecommerce as any business
transaction executed electronically between parties such as
companies (business-to-business), companies and consumers
(business-to-consumer), business and the public sector, and
consumers and the public sector. Laudon & Laudon (2014) also
observe that e-commerce is that part of e-business that deals with
the buying and selling of goods and services over the Internet.
214
8.2 Online Transactions
215
Online processing systems accumulate and store colossal
amounts of transaction data. For instance, databases store
customer or user data and account information. The servers
may be hacked by intruders resulting in sensitive and
personal customer information being compromised.
Hackers may use the information to commit financial
crimes such as credit card fraud.
216
Digital wallets
Emerging trends in online transactions also include the introduction
of digital wallets. The essence of digital wallets is to facilitate
efficient payments for purchases made over the web by eliminating
the need for shoppers to enter their address and credit card
information repeatedly each time they buy something. A digital
wallet securely stores credit card and owner identification
information and provides that information at an electronic
commerce site‘s ‗checkout counter‘. Details of the shoppers such as
names, credit card numbers, and shipping information are entered
automatically using the digital wallet when invoked to complete the
purchase.
Micropayment systems
In other developed countries, advances in technology have seen the
use of micropayment systems for purchases for less than $10 mainly
used as payment systems for downloads of individual articles or
music clips that would be too insignificant for conventional credit
card payments. Similarly, accumulated balance digital payment
systems have been developed to enable users to make
micropayments and purchases on the web, accumulating a debit
balance that they must pay periodically on their credit card or
telephone bills.
Digital cash
The increased reliance on electronic transactions has also seen the
emergence of ‗digital cash‘ or electronic cash. Digital cash can be
217
described as currency represented in electronic form that moves
outside the normal network of money (paper currency, coins,
checks, credit cards). Users are supplied with client software and
can exchange money with another e-cash user over the Internet or
with a retailer accepting e-cash. Digital cash can be used for
micropayments or larger purchases. In Zimbabwe, the use of mobile
money over systems such as Ecocash is typical example of digital
cash as people can make payments and transfer funds electronically
without necessarily having the need for physical cash.
218
methods. The major threat to online transactions is phishing that has
become one of the main weapons in the hacker‘s armory. For
instance, hackers use phishing emails to steal online banking
credentials and break into user accounts. In response, banks and
other financial institutions have deployed technologies like device
identification, challenge questions and one-time password tokens.
219
Self-regulation model
A self-regulation model has been proposed where service providers
of online services, users and technical infrastructure providers can
work together to develop codes of practice to govern the rights and
obligations of the various stakeholders in online business
transactions. Under the self-regulation model, industry codes of
practice may be developed and used to facilitate secure and
productive use of online services. However, although industry codes
of practice for online service providers may work in regulating the
online services, electronic commerce may require additional
controls at both national and international levels. Participants and
stakeholders in the online transactions ecosystem include mobile
network operators, equipment manufacturers and vendors,
regulators, banks, other institutions, and users.
Regulatory models
Regulatory models include the electronic commerce model, that is,
for instance the all-embracing legal framework based on the United
Nations Commission on International Trade Law (UNICITRAL)
Model Law on Electronic Commerce. These regulatory models
provide legal certainty to undertake electronic activities but are not
so specific so as to tie it to particular technologies or business
models. The advantage of the electronic commerce model is that
works within an international model that has a proven track record
for enforcing contracts in different jurisdictions.
220
manually signed documents. Such laws establish ―equivalence‖ and
impart on electronic records and signatures the same legal standing
as manually signed paper documents.
221
with unscrupulous product claims and bids but deliberate fraud is
statistically less of a risk in many online purchases. Purchase
delivery problems as well as credit and debit card failures and plain
misunderstandings between seller and buyer are more widespread
than outright frauds. The risk of online fraud is more pronounced on
the buyers‘ side as they have to pay first before the purchase is
delivered.
Consumer protection
Due to the inherent risks in online transactions, there must be laws
to protect consumers from unscrupulous web traders. In Zimbabwe,
there are currently no specific laws providing consumer protection
in electronic transactions. However, in South Africa the Electronic
Communications and Transactions Act (ECT Act) provide
minimum requirements designed to protect consumers. The ECT
Act requires businesses trading on websites to ensure that the
website incorporates the minimum information prescribed in s 43(1)
Act. These include a transaction summary display for the consumers
to review and correct or withdraw from the transaction, a secure
payment system, a cooling-off period and the execution of the
222
contract within 30 days of receiving an order.
The website must also disclose the full price of the goods or
services including transport costs, taxes and any others costs; the
payment modalities; as well as any terms of agreement such as
guarantees applicable to the transaction and how these terms may be
accessed, stored and reproduced electronically by consumers. The
law also requires that the delivery terms are stipulated on the
website; the manner and period within which consumers can access
and maintain a full record of the transaction; and the return,
exchange and refund policy.
223
overriding concern. Such personal information are taken as a
necessary part of any online payment mode. Accordingly, the
potential for consumer identity theft of such data transmitted over
the telecommunications infrastructure poses a clear threat to
consumer security.
224
request to the customer's issuing bank. Barring any issues (such as
lack of funds, a lost or stolen card report, etc.), the issuing bank
sends an authorization code through the card network to the
acquirer, which sends it back to the merchant to complete the
transaction. The entire payment process occurs in a matter of
seconds.
At this point, the consumer can leave with his or her purchase
complete, but the merchant has not actually received any funds. The
second stage involves the processing of the transactions to facilitate
the merchant to receive funds. All transactions for the day must be
batched and cleared before that happens. The batch, or the
aggregation of all the day's transactions, goes to the acquirer, which
then requests payment on the merchant's behalf from the necessary
card networks. These networks then send requests for funds to the
appropriate issuing bank.
The third and final stage involves the actual funding of the
transaction. The issuing bank sends the funds to the acquirer
through the card network, minus a small interchange fee. The card
network also takes a minuscule assessment fee and transfers the
funds to the acquirer, which finishes the clearing process. The card
transaction authorization process is illustrate in Figure 8.1 below.
225
payment processing services and advance fraud management
solutions. GateKeeper provides end-to-end fraud monitoring,
detection and prevention. Using a multi-dimensional approach it
tackles fraud and risk from every angle by layering security
strategies and technologies that balance protection and profitability
at every stage of the payment lifecycle during:
Account Registration - screening and evaluating consumer
account registration risk;
Payment Authentication - analyzing and defining security
strategies to verify genuine customers;
Transaction Processing - identifying, detecting and reviewing
high-risk transactions based on unique risk profiles;
Dispute and Recovery - managing and resolving chargeback
disputes to recover losses; and
Evaluation and Refinement - analyzing and refining fraud
performance against trends.
There are various secure global payment networks. For example, the
Society for Worldwide Interbank Financial Telecommunications
(SWIFT) is a highly secured private telecommunications network
set up originally for the exclusive use of banks, financial institutions
and related market infrastructures. SWIFT is one example of several
systems underpinning global financial systems that connect into
broader bank networks and are remotely accessible. Most financial
institutions in the world have a SWIFT connection, which provides
a critical global messaging platform to the financial sector and is
designed to service more than 10,000 financial institutions in 212
different countries.
226
The Trans-European Automated Real-time Gross settlement
Express Transfer (TARGET) system is another global payment
network. It is a payment system comprising a number of national
real-time gross settlement (RTGS) systems and the ECB payment
mechanism (EPM). The national RTGS systems and the EPM are
interconnected by common procedures (interlinking) to provide a
mechanism for the processing of euro payments throughout the euro
area and some non-euro area EU Member States.
227
Near-field communication technology works by bringing together
two electronic devices, typically a mobile device such as a
smartphone and a reader of some kind. In terms of payments
technology, the reader would be the initiator and the smartphone
(which contains the stored credit card information) would be the
target. Similarly, bluetooth payment technology is also being used
as electronic payment systems. Bluetooth offers a much longer
range, provides faster processing and creates a truly hands-free
experience because shoppers would not even need to take out their
phones to tap them to a reader. Bluetooth payment systems also
facilitate multiple transactions at once from a single payments
terminal, which would further speed up the checkout process.
228
Figure 8.1: Card transaction process (adopted from
http://www.businessinsider.com)
Build and maintain a secure network Install and maintain a firewall configuration to protect
cardholder data
Do not use vendor-supplied defaults for system passwords
and other security parameters.
Protect cardholder data Protect stored cardholder data
Encrypt transmission of cardholder data across open, public
networks
Maintain a vulnerability management Use and regularly update anti-virus software on all systems
program commonly affected by malware
Develop and maintain secure systems and applications
Implement strong access control Restrict access to cardholder date by business need-to-know
measures Assign a unique ID to each person with computer access
Restrict physical access to cardholder data
Regularly monitor and test networks Track and monitor all access to network resources and
229
cardholder data
Regularly test security systems and processes
Maintain an information security policy Maintain a policy that addresses information security
230
According to Adler et al (2004), many cards are stolen while in
transit from the issuer to the cardholder. In other instances an
offender may simply use false information about a real person to
obtain a genuine card. A fraudster may also make a purchase by
mail order or telephone using a genuine card number, but have the
goods delivered to an address other than the address of the card
owner. Traffickers in stolen electronic payment cards sell them for
cash, with the amount based on the credit limit of the account.
The rapid growth of credit card use on the Internet has made
database security lapses particularly costly; in some cases, millions
of accounts have been compromised. Stolen cards can be reported
quickly by cardholders, but a compromised account can be hoarded
by a thief for weeks or months before any fraudulent use, making it
difficult to identify the source of the compromise.
The economic rewards of credit card fraud are quick and relatively
easy. The risks are low. Usually merchants do not ask for personal
identification; cards are issued in banks that are often in other states
231
or countries; and authorization procedures are weak.
Application fraud
Application fraud occurs when a person uses stolen or fake
credentials to open an account in another person's name. Criminals
may steal documents such as utility bills and bank statements to
build up useful personal information. Alternatively, they may create
fake documents. With this information, they could open a credit
card account or loan account in the victim's name.
Account takeover
An account takeover takes place when a criminal poses as a genuine
customer, gains control of an account and then makes unauthorized
transactions. The most common method of account takeover is a
hacker gaining access to a list of user names and passwords.
Skimming
Skimming involves obtaining private information about another
person's credit card used in an otherwise normal transaction. The
thief can procure a victim's card number using basic methods such
as photocopying receipts or more advanced methods such as using a
small electronic device (skimmer) to swipe and store hundreds of
victims‘ card numbers. Instances of skimming have been reported
where the perpetrator has put over the card slot of an ATM
(automated teller machine) a device that reads the magnetic strip as
the user unknowingly passes their card through it. These devices are
often used in conjunction with a miniature camera inconspicuously
attached to the ATM to read the user's PIN at the same time.
232
Card fraud prevention
The banking industry has studied credit card schemes and has
improved the electronic system with target-hardening responses.
Several fraud-prevention initiatives have been developed in
response to the prevalence of credit card fraud. The use of laser-
engraved photography and signatures in credit cards makes
impersonation more difficult.
233
identity of the cardholder. According to Croall (2011), while cheque
and credit card frauds have declined, particularly since the
introduction of chip and PIN technology, there has been an increase
of card not present (CNP) frauds, in which false details are provided
in Internet and telephone sales.
234
electronically such as the buying and selling of products and
services over the Internet.
235
UNIT 9
236
9.1 Cyber Law in Zimbabwe
237
(c) storing and additionally, or alternatively, reproducing
data before or after processing the data; and includes -
238
Specific computer-related crimes
In general, Chapter VIII of the Criminal Law Code provides for
various computer-related crimes classified into five broad
categories. These categories include cyber crimes relating to (a)
unauthorized access or use of computers; (b) introduction of
computer viruses; (c) unauthorized manipulation of computer
programs; (d) unauthorized use or possession of credit or debit
cards; (e) unauthorized use of password or pin number. Another
category deals with computer crimes committed in furtherance of
other serious crimes such as terrorism, sabotage, theft, and fraud,
among many others.
239
(e) obstructs, intercepts, diverts, interrupts or interferes with the
use of any data, programme or system which is held in a
computer or computer network.
240
The Criminal Law Code also makes it a statutory offence for a
person to intentionally copy or transfer any data held in a computer
without authority. This offence is accordingly intended to protect
intellectual property rights. Typically, data or information in
database is valuable and should be protected against unwarranted
duplication.
The onus of proof lies with the State to prove ‗beyond reasonable
doubt‘ that the accused person did not have the authority of the
owner to access or use the computer and that he/she intentionally
committed any of the unlawful acts stipulated in the section. Section
163 (2) however provides that it shall be a defence for the accused
person to prove that the conduct was not motivated by malice, and
241
the conduct did not materially affect the data, programme or system
nor the interests of the owner of the computer or computer network.
242
Any person who, without authority from the owner of the
computer or computer network, knowingly introduces or
causes to be introduced any computer virus into any
computer or computer network shall be guilty of deliberate
introduction of a computer virus into a computer or
computer network.
The penalties for committing the offence are equally severe. Section
162 (1) of the Criminal Law Code broadly defines computer virus
as ―any set of computer instructions that are, or any data,
programme or system that is designed directly or indirectly to
destroy or alter; or render meaningless, useless or ineffective; or
obstruct, intercept, divert, interrupt or interfere with the use of any
computer or computer network.‖ Although the Code uses the
generic term ‗computer virus‘, it is clear that the intention of the
legislature was to prohibit any forms of malicious software or
programs including worms, Trojan horses, spyware and a host of
other malware as these malignant programs are strictly not viruses
but may directly or indirectly destroy, alter, manipulate or generally
interfere with the use of a computer or computer networks.
243
memory flash cards to transfer data from one computer to another
may result in the spreading of computer viruses without the
knowledge of the users.
244
which, directly or indirectly, causes a computer to function.‖
245
Aggravated computer crimes
The last category of computer-related crimes in the Criminal Law
Code pertains to what are called ‗aggravated‘ computer crimes.
This categorization of computer crimes is particularly interesting as
it links the rest of the computer crimes stipulated in the Criminal
Law Code to the commission or furtherance of a host of other
generally serious crimes including, inter alia, insurgency, banditry,
sabotage, terrorism, theft, fraud, forgery and many others. In this
instance, the computer is illegally used as an instrument to facilitate
the perpetration of other serious crimes specified in section 166 of
the Code. An aggravated computer crime committed in conjunction
with any of the other serious offences attracts more stringent
penalties in the form of level twelve fines or imprisonment for a
period not exceeding ten years.
246
It provides for the establishment, composition and functions of
the regulatory authority;
It provides for the licensing and regulation of cellular
telecommunication, postal and telecommunication services.
247
The convergence in ICT is challenging traditional policy and
regulatory frameworks. Traditionally, regulatory frameworks were
designed for an era when clear functional differences existed
between services and infrastructure, but these regulations are
increasingly inadequate for dealing with today‘s world. This
convergence of technologies also comes with new challenges for
cyber security.
Proposed legislation
248
unauthorized use of passwords or pin numbers. An attempt has been
made to establish how these various computer crimes relate to
fundamental pillars of information and cyber security such as
confidentiality, integrity and availability of data.
249
250