TYBCA Cyber Security Notes 1
TYBCA Cyber Security Notes 1
Cyber Crime
Meaning –
Criminal activities carried out by means of computers or the internet.
Definition –
Cybercrime is defined as a crime where a computer is the object of the crime or is
used as a tool to commit an offense.
A cybercriminal may use a device to access a user's personal information,
confidential business information, government information, or disable a device.
Cybercrime, also called computer crime, the use of a computer as an instrument to
further illegal ends, such as committing fraud, trafficking in child pornography
and intellectual property, stealing identities, or violating privacy.
Cybercrime, especially through the Internet, has grown in importance as the
computer has become central to commerce, entertainment, and government.
Cyber crime or computer-oriented crime is a crime that includes a computer and a
network. The computer may have been used in the execution of a crime or it may be
the target.
Cyber crime encloses a wide range of activities, but these can generally be divided into
two categories:
a) Crimes that aim computer networks or devices. These types of crimes
involve different threats (like virus, bugs etc.) and denial-of-service
attacks.
b) Crimes that use computer networks to commit other criminal
activities. These types of crimes include cyber stalking, financial
fraud or identity theft.
Origin of the word Cyber Crime
Cyber came from cybernetics. Cybernetics influences game, system, and
organizational theory. Cybernetics derived from the Greek kubernētēs which refers to a
Forgery
Forger" redirects here.
Prof. Ashwini Kulkarni www.dacc.edu.in
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
Industrial Espionage
Industrial espionage describes a series of covert activities in the corporate
world such as the theft of trade secrets by the removal, copying, or recording of
confidential or valuable information in a company. The information obtained is
meant for use by a competitor.
Economic or industrial espionage commonly occurs in one of two ways.
i) a dissatisfied employee appropriates information to advance interests or to
damage the company.
ii) Secondly, a competitor or foreign government seeks information to advance
its own technological or financial interest.
Industrial espionage and spying can occur in any industry -- from food and
beverage to fashion and entertainment.
However, technology is one of the most targeted industries.
Key technology industries that are often targeted include computer,
semiconductor, electronics, automotive, aerospace, biotechnology, energy,
pharmaceutical and high-tech manufacturing.
Hacking
Hacking refers to activities that seek to compromise digital devices, such as
computers, smartphones, tablets, and even entire networks.
Hacking is an attempt to exploit a computer system or a private network inside a
computer. Simply put, it is the unauthorized access to or control over computer
network security systems for some illicit purpose.
They can destroy, steal or even prevent authorized users from accessing the
system.
Kevin Mitnick likely holds the title as the world's best hacker ever. Kevin
Mitnick started hacking at an early age. He broke into the realm of public
attention in the 1980s after he hacked into the North American Defense
Command
Prof. Ashwini Kulkarni www.dacc.edu.in
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
Ankit Fadia (born 1985) is an Indian author, speaker, television host, a security
charlatan, and self-proclaimed white-hat computer hacker.
Types of Hackers
a) White Hat Hackers – These hackers utilize their programming aptitudes for a
good and lawful reason. These hackers may perform network penetration tests
in an attempt to compromise networks to discover network vulnerabilities.
Security vulnerabilities are then reported to developers to fix them.
b) Black Hat Hackers –
These hackers are unethical criminals who violate network security for personal
gain. They misuse vulnerabilities to bargain PC frameworks.
c) Gray Hat Hackers – These hackers carry out violations and do seemingly
deceptive things however not for individual addition or to cause harm. These
hackers may disclose a vulnerability to the affected organization after having
compromised their network.
Email bombing
An email bomb or "mail bomb" is a malicious act in which a large number
of email messages are sent to a single email address in a short period of time.
The purpose of an email bomb is typically to overflow a user's inbox. In some
cases, it will also make the mail server unresponsive.
Email bombing is often done from a single system in which one user sends
hundreds or thousands of messages to another user. In order to send the
messages quickly, the email bomber may use a script to automate the process.
By sending emails with a script, it is possible to send several thousand messages
per minute.
Fortunately, most mail servers are capable of detecting email bombs before a
large number of messages are sent. For example, if the server detects that more
than ten messages are received from the same email address within one minute,
Intrusion
The definition of an intrusion is an unwelcome interruption or a situation where
somewhere private has an unwelcome visit or addition. When you are having a
quiet nap in your backyard and your neighbor's dog comes in uninvited and
jumps all over you to wake you up, this is an example of an intrusion.
A network intrusion refers to any unauthorized activity on a digital network.
Network intrusions often involve stealing valuable network resources and
almost always jeopardize the security of networks and/or their data. In order
to proactively detect and respond to network intrusions, organizations and their
cybersecurity teams need to have a thorough understanding of how network
intrusions work and implement network intrusion, detection, and response
systems that are designed with attack techniques and cover-up methods in mind.
Password sniffing
Password Sniffing is a hacking technique that uses a special software
application that allows a hacker to steal usernames and passwords simply by
observing and passively recording network traffic. This often happens on public
WiFi networks where it is relatively easy to spy on weak or unencrypted traffic.
Password sniffing is an attack on the Internet that is used to steal user names and
passwords from the network. Today, it is mostly of historical interest, as most
protocols nowadays use strong encryption for passwords. However, it used to be
the worst security problem on the Internet in the 1990s, when news of major
password sniffing attacks were almost weekly.
The typical implementation of a password sniffing attack involves gaining
access to a computer connected to a local area network and installing
a password sniffer on it. The password sniffer is a small program that listens to
all traffic in the attached network(s), builds data streams out of TCP/IP packets,
CYBER SECURITY
Definition-
Cyber security is the technique of protecting computers, networks, programs and data
from unauthorized access or attacks that are aimed for exploitation.
OR
Cyber security refers to the measures taken to keep electronic information private and
safe from damage or theft. It is also used to make sure electronic devices and data are
not misused.
OR
Cyber security is the body of technology, processes and practices designed to protect
network, computers, computer programs and data from attack, damage or unauthorized
access.
Cyber Security Threats-
A cyber or cyber security threat is a malicious act that seeks to damage data, steal data,
or disrupt digital life in general.
Cyber threats include computer viruses, data breaches, Denial of Service (DoS) attacks
and other attack vectors.
Viruses-
A computer virus is a program which can harm our device and files and infect
them for no further use.
When a virus program is executed, it replicates itself by modifying
other computer programs and instead enters its own coding.
This code infects a file or program and if it spreads massively, it may ultimately
result in crashing of the device.
Viruses affect your computer by corrupting files, interrupting Internet traffic and
taking over basic functions of your operating system.
Unit – 2
Cyber Offenses and Cyber Stalking
Attacks
The attack phase is the last step in the attack process. It involves the hacker gaining
and maintaining full control of the system access. It comes immediately after scanning
and enumeration, and it launched sequentially as listed in the below steps.
Brute force attack or any other relevant method to bypass the password.
Exploit the password.
Launch the malicious command or applications.
If requires, then hide the files.
Cover the tracks, don’t leave any trail that can lead back to you as the
malicious third party. This can be achieved by deleting logs so that there is no trail for
your illicit actions.
Types of Attacks-
Cyber Attck
Types of Attacks-
Reconnaissance attack
Passive Attack
In Passive attack, an attacker observes the messages, copies them and may use them
for malicious purposes.
The main goal of a passive attack is to obtain unauthorized access to the information
Social Engineering
• Social engineering is a manipulation technique that exploits human error to gain
private information, access, or valuables.
• Social engineers are clever and use manipulative tactics to trick their victims
into disclosing private or sensitive information.
• Social engineering is a term that encompasses a broad spectrum of malicious
activity.
• The five most common attack types that social engineers use to target their
victims. These are
1) Phishing
2) Vishing and Smishing
3) Pretexting
4) Paiting
5) Quid Pro Quo
6) Tailgating and Piggybacking
1) Phishing
Phishing is a cybercrime in which a target or targets are contacted by email,
telephone or text message by someone posing as a genuine (legal)
organization to ensnare individuals into providing sensitive data such as
personally identifiable information, banking and credit card details, and
passwords.
The information is then used to access important accounts and can result in
identity theft and financial loss.
Phishers frequently use emotions like fear, curiosity, urgency, and greed to
force recipients to open attachments or click on links.
Phishing attacks are designed to appear to come from legitimate (legal)
companies and individuals.
Types of Phishing
Spear phishing -
Spear phishing targets specific individuals instead of a wide group of
people.
Cyber Stalking
Cyberstalking is a crime in which someone harasses or stalks a
victim using electronic or digital means, such as social
media, email, instant messaging (IM), or messages posted to
a discussion group or forum.
Cyberstalkers take advantage of the anonymity afforded by the
internet to stalk or harass their victims, sometimes without being
caught, punished or even detected.
Although cyberstalking is a general term for online harassment, it
can take many forms, including slander, defamation, false
accusations, trolling and even outright threats.
In many cases, especially when both the harasser and victim are individuals, the
motive may be the following:
a) monitor the victim's online -- and, in some cases, offline -- activities;
b) track the victim's locations and follow them online or offline;
c) intimidate (scare), frighten, control or blackmail the victim;
Credit card fraud is an inclusive term for fraud committed using a payment card,
such as a credit card or debit card. The purpose may be to obtain goods or services
or to make payment to another account, which is controlled by a criminal.
The Payment Card Industry Data Security Standard (PCI DSS) is the data security
standard created to help financial institutions process card payments securely and
reduce card fraud.
Credit card fraud can be authorized, where the genuine customer themselves
processes a payment to another account which is controlled by a criminal, or
unauthorized, where the account holder does not provide authorization for the
payment to proceed and the transaction is carried out by a third party.
In 2018, unauthorized financial fraud losses across payment cards and remote
banking totaled £844.8 million in the United Kingdom. Whereas banks and card
companies prevented £1.66 billion in unauthorized fraud in 2018.
Credit cards are more secure than ever, with regulators, card providers and banks
taking considerable time and effort to collaborate with investigators worldwide to
ensure fraudsters aren't successful. Cardholders' money is usually protected from
scammers with regulations that make the card provider and bank accountable. The
technology and security measures behind credit cards are becoming increasingly
sophisticated making it harder for fraudsters to steal money.
There are two kinds of card fraud: card-present fraud (not so common nowadays)
and card-not-present fraud (more common). The compromise can occur in a
Prof. Ashwini Kulkarni www.dacc.edu.in
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
When a credit card is lost or stolen, it may be used for illegal purchases until the
holder notifies the issuing bank and the bank puts a block on the account. Most
banks have free 24-hour telephone numbers to encourage prompt reporting. Still, it
is possible for a thief to make unauthorized purchases on a card before the card is
canceled.
Mobile Devices
A lack of adequate security in wireless networks can lead to criminal attacks such
as theft of data, corruption of system integrity, hacking, sabotage, espionage, theft
of capacity, and loss or theft of mobile and portable devices.
Phishing Scams – Phishing scams can use your email, text messaging and
even push notifications from social media to trick you into entering sensitive
information. What makes them so hard to avoid is the sophisticated nature of
the scams, many are impossible to distinguish from well know and trusted
sites and often times all it takes is a simple click or like of a suggested page
for malware to be downloaded to your device. Adding to the problem are
small screen sizes and browsers that don’t display full URLs for links which
makes it even easier to follow a bad one.
Social Engineering is the latest buzzword in mobile attacks. These can
range in degree but are aimed at using a person’s natural curiosity against
them. One example is simply dropping a flash drive in a parking lot and
waiting for someone to pick it up, and maybe look to see what’s on it. In
some cases it may just be a lost drive, in others the drive could set to deliver
malware into a device or network.
Drive By Downloads – Some websites are set up to automatically download
apps to your device whether you want it to or not. In most cases you will
have to enable the app for it to work but this is not always the case. The apps
could be innocent, and they could be malware or spyware.
Browser Flaws – Some websites and applications can exploit flaws in your
browser software or other programs used by it such as a Flash, PDF or media
application. Visiting the wrong webpage can trigger an automatic exploit,
just like a drive by.
Operating System Flaws– The operating systems of mobile devices are a
common point of attack as well as hackers seek new points of entry. Android
powered devices are most at risk, they are the ones most often targeted by
hackers, and fixed with patches and updates. Data Storage – We store a lot
of data on our phones and that amount grows daily. Most phones utilize
some form of encryption to protect your data but once a hacker gets past
your security it doesn’t really matter.
4. Physical Threats
Unlike a desktop sitting at your workstation, or even a laptop in your bag, a mobile
device is subject to a number of everyday physical threats.
Turn off the Bluetooth. It is a good idea to turn off the Bluetooth on your
mobile device when not using it. Aside from closing down a potential point
of entry it will also cut down on your battery usage.
Set up remote locate/wipe. Most phones have features that can be used to
remotely wipe your phones memory and/or geolocate it. This feature is
especially useful if there is sensitive data on your phone or you do not
Back up your data. Most mobile users back up their data about as often as
they update their operating systems, which is to say not too often. You can
upload your phone’s settings, data, pictures, music and etc. to the cloud,
which in itself poses a risk to your security, or directly to a laptop or PC.
Don’t root your phone. The difference depends on whether your device is
iOS or Android but the meaning is the same: you’ve bypassed manufacturer
settings in order to use your phone in a way not originally intended. Doing
this weakens your device’s natural security settings and exposes it to
additional risks as well.
Update the operating system. I know it’s a pain but it needs to be done.
When you get the message that says a new OS is available, take the time to
set it up and do the download.
Download anti-malware. Yes, it does exist and you can get it from a
number of sources. If you are using an Android device I highly recommend
it.
Use public WiFi with caution. Public WiFi is one of the many perks of
using a mobile device, you can connect anywhere, it’s free and you can save
on data minutes by using it. The downside is two-fold. First, the WiFi
security – these connections are inherently insecure as they are open and
available to anyone who wants to connect to them. This leads to the second
problem which is that public WiFi connections attract black hats and
hackers as a high-target environment. One way to protect yourself is with a
VPN.
1) Data Leakage
Mobile apps are often the cause of unintentional data leakage. For example,
“riskware” apps pose a real problem for mobile users who grant them broad
permissions, but don’t always check security. These are typically free apps found
in official app stores that perform as advertised, but also send personal—and
potentially corporate—data to a remote server, where it is mined by advertisers,
and sometimes, by cybercriminals.
Data leakage can also happen through hostile enterprise-signed mobile apps. These
mobile malware programs use distribution code native to popular mobile operating
systems like iOS and Android to move valuable data across corporate networks
without raising red flags.
o avoid these problems, only give apps the permissions that they absolutely need in
order to properly function. And steer clear of any apps that asks for more than
necessary. The September 2019 updates for Android and Apple iOS both added
protocols to make users more aware of it and why apps collect users’ location data.
2) Unsecured Wi-Fi
No one wants to burn through their cellular data when wireless hot spots are
available—but free Wi-Fi networks are usually unsecured. According to V3, in
fact, three British politicians who agreed to be part of a free wireless security
Prof. Ashwini Kulkarni www.dacc.edu.in
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
3) Network Spoofing
In some cases, attackers require users to create an “account” to access these free
services, complete with a password. Because many users employ the same email
and password combination for multiple services, hackers are then able to
compromise users’ email, e-commerce and other secure information. In addition to
using caution when connecting to any free Wi-Fi, never provide personal
information. And whenever you are asked to create a login, whether for Wi-Fi or
any application, always create a unique password.
4) Phishing Attacks
Because mobile devices are always powered-on, they are the front lines of
most phishing attack. According to CSO, mobile users are more vulnerable
because they are often monitor their email in real-time, opening and reading emails
when they are received. Mobile device users are also more susceptible because
email apps display less information to accommodate the smaller screen sizes. For
example, even when opened, an email may only display the sender’s name unless
you expand the header information bar. Never click on unfamiliar email links. And
if the matter isn’t urgent, then let the response or action items wait until you’re at
your computer.
5) Spyware
Although many mobile users worry about malware sending data streams back to
cybercriminals, there’s a key threat closer to home: Spyware. In many cases, it’s
not malware from unknown attackers that users should be worried about, but rather
spyware installed by spouses, coworkers or employers to keep track of their
Prof. Ashwini Kulkarni www.dacc.edu.in
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
Phishing
Phishing is a cybercrime in which a target or targets are contacted by
email, telephone or text message by someone posing as a genuine (legal)
organization to ensnare individuals into providing sensitive data such as
personally identifiable information, banking and credit card details, and
passwords.
The information is then used to access important accounts and can result
in identity theft and financial loss.
Phishers frequently use emotions like fear, curiosity, urgency, and greed
to force recipients to open attachments or click on links.
Phishing attacks are designed to appear to come from legitimate (legal)
companies and individuals.
Prof. Ashwini Kulkarni www.dacc.edu.in
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
Keylogger -
Keyloggers are a form of spyware where users are unaware their actions
are being tracked.
Keyloggers can be used for a variety of purposes; hackers may use them
to maliciously gain access to your private information, while employers
might use them to monitor employee activities.
A keylogger is a tool that captures and records a user's keystrokes. It can
record instant messages, email, passwords and any other information you
type at any time using your keyboard.
Prof. Ashwini Kulkarni www.dacc.edu.in
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
Keyloggers
Keyloggers are a form of spyware where users are unaware their actions are being
tracked. Keyloggers can be used for a variety of purposes; hackers may use them to
maliciously gain access to your private information, while employers might use
them to monitor employee activities.
Spyware is largely invisible software that gathers information about your computer
use, including browsing. Key loggers are a form of spyware that capture every
keystroke you type; they can send this information to remote servers, where log-in
information--including your passwords--can be extracted and used.
Spyware is any software that installs itself on your computer and starts covertly
monitoring your online behavior without your knowledge or permission. Spyware
is a kind of malware that secretly gathers information about a person or
organization and relays this data to other parties.
There are two common types of keyloggers. Software and Hardware keyloggers.
Software Keyloggers.
Hardware Keyloggers.
Spear Phishing.
Drive-by-Downloads.
Trojan Horse.
2-Step Verification.
Install Anti Malware Software.
Use Key Encryption Software.
Spyware is mostly classified into four types: adware, system monitors, tracking
including web tracking, and trojans; examples of other notorious types include
digital rights management capabilities that "phone home", keyloggers, rootkits, and
web beacons.
Keystroke logging, often called keylogging, is the practice of noting (or logging)
the keys struck on a keyboard, typically in a covert manner so that the person using
the keyboard is unaware that such actions are being monitored.
Keystroke logger or keylogger is quicker and easier way of capturing the
passwords and monitoring the victims' IT savvy behavior. It can be classified as
software keylogger and hardware keylogger.
1. Software Keyloggers
Software keyloggers are software programs installed on the computer systems
which usually are located between the OS and the keyboard hardware, and every
keystroke is recorded. Software keyloggers are installed on a computer system by
Trojans or viruses without the knowledge of the user. Cybercriminals always
install such tools on the insecure computer systems available in public places and
can obtain the required information about the victim very easily. A keylogger
Prof. Ashwini Kulkarni www.dacc.edu.in
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
4. Spywares
Spyware is a type of malware, that is installed on computers which collects
information about users without their knowledge. The presence of Spyware is
typically hidden, from the user, it is secretly installed on the user's personal
computer. Sometimes, however, Spywares such as keyloggers are installed by the
owner of a shared, corporate or public computer on purpose to secretly monitor
other users.
It is clearly understood from the term Spyware that it secretly monitors the user.
The features and functions of such Spywares are beyond simple monitoring.
Spyware programs collect personal information about the victim, such as the
Internet surfing habits/patterns and websites visited. The Spyware can also redirect
Prof. Ashwini Kulkarni www.dacc.edu.in
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
STEGANOGRAPHY
Steganography is the practice of hiding a secret message inside of (or even on top
of) something that is not secret. It is a form of covert communication and can
involve the use of any medium to hide messages. It's not a form of cryptography,
because it doesn't involve scrambling data or using a key.
Steganography Examples
SQL Injection
SQL injection (SQLi) is a type of cyberattack against web applications that use
SQL databases such as IBM Db2, Oracle, MySQL, and MariaDB. As the name
suggests, the attack involves the injection of malicious SQL statements to interfere
with the queries sent by a web application to its database.
Using SQL injection, a hacker will try to enter a specifically crafted SQL
commands into a form field instead of the expected information. The intent is to
secure a response from the database that will help the hacker understand the
database construction, such as table names.
What types of resources are targeted by such DoS attacks? Prevents the authorized
use of networks, systems, or applications with the help of resources such
as memory, bandwidth, CPU, system resources, network connectivity, and disk
space.
DOS DDOS
Password Cracking
Password cracking can be done for several reasons, but the most malicious reason
is in order to gain unauthorized access to a computer without the computer owner’s
awareness. This results in cybercrime such as stealing passwords for the purpose of
accessing banking information.
Other, nonmalicious, reasons for password cracking occur when someone has
misplaced or forgotten a password. Another example of nonmalicious password
cracking may take place if a system
Chapter No. - 4
Cyber Crime and Cybe Security – The legal Perspective
In today’s highly digitalized world, almost everyone is affected by cyber law. For
example:
Cyber-law is important in a country like India where the internet is used to a large
extent. The law is enacted to save people and organizations from cybercrime and
other internet-related crimes. It protects the privacy of every individual and
Prof. Ashwini Kulkarni www.dacc.edu.in
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
Further, this act amended the Indian Penal Code 1860, the Indian Evidence Act
1872, the Bankers’ Books Evidence Act 1891, and the Reserve Bank of India Act
1934.
i. Grant legal recognition to all transactions done via electronic exchange of data
or other electronic means of communication or e-commerce, in place of the
earlier paper-based method of communication.
ii. Give legal recognition to digital signatures for the authentication of any
information or matters requiring legal authentication
iii. Facilitate the electronic filing of documents with Government agencies and
also departments
iv. Facilitate the electronic storage of data
v. Give legal sanction and also facilitate the electronic transfer of funds
between banks and financial institutions
vi. Grant legal recognition to bankers under the Evidence Act, 1891 and
the Reserve Bank of India Act, 1934, for keeping the books of accounts in
electronic form.
The Information Technology (Amendment) 2008 Act has been debated since it was
passed by the Indian Parliament in December 2008, about a month after the
terrorist attacks in Mumbai. Certain sections like Section 69 which provides
Prof. Ashwini Kulkarni www.dacc.edu.in
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
a) Section 43 and 66 –
Section 43 and 66 of the IT Act punishes a person committing data theft,
transmitting virus into a system, hacking, destroying data, or denying access to the
network to an authorized person with maximum imprisonment up to 3 years or a
fine of rupees 5 lacs or both. At the same time data theft is also punishable under
Section 378 and Section 424 of IPC with maximum imprisonment of 3 years or
fine or both; and imprisonment of 2 years or fine or both respectively. Denying
access to an authorized person or damaging a computer system is penalized under
Section 426 of IPC with imprisonment of up to 3 months or fine or both.
66F
Section 66F covers a crucial matter which is cyber terrorism and prescribes
punishment for the same. It provides the acts which constitute cyber terrorism like
denial of access or penetrating through a network or transmitting virus/malware
utilizing which he is likely to cause death or injury to any person, which is all done
with the purpose to threat the integrity, sovereignty, unity, and security of India or
create terror in the minds of its citizen.
Apart from the provisions for punishment, the IT Act also empowers the Central
Government to issue directions to block access of any information on an
intermediary or computer resource for the public, if it feels necessary in the interest
of the State. It can also intercept, decrypt or monitor such information.
The IT Act 2000 w1as mainly to ensure legal recognition of e-commerce within
India. Due to this most provisions are mainly concerned with establishing digital
certification processes within the country. Cybercrime as a term was not defined in
the act. It only delved with few instances of computer-related crimes. These acts as
defined in Chapter XI of the Act are:
Digital Signature
A digital signature is a way to identify yourself online. Just like passports, driving
licenses, and PAN cards allow you to prove your identity offline, digital signatures
let you prove your identity online. To do this, you need a digital signature
certificate and that lets you sign documents digitally.
Digital signatures work by proving that a digital message or document was not
modified—intentionally or unintentionally—from the time it was signed. Digital
signatures do this by generating a unique hash of the message or document and
encrypting it using the sender's private key.
You can use digital signature certificates to e-file your income tax returns, for a
Registrar of Companies e-filing, online auctions (such as e-tenders), and to sign
documents such as PDFs
Digital signatures were given legal status in India, by Information Technology (IT
ACT 2000) in the year 2000. It granted e-signatures on electronic documents, the
same legal status as the handwritten signatures on physical documents.
The IT Act, 2000 introduced the concept of digital signatures under Sec. 2(1)(p)
as authentication of any electronic record by a subscriber, i.e., a person in whose
name the Digital Signature Certificate' (DSC) is issued,by means of an electronic
method or procedure in accordance with the provisions of Sec. 3
Chapter No. - 5
Cyber Forensics
Digital Forensics
Digital Forensics helps the forensic team to analyzes, inspect, identifies, and
preserve the digital evidence residing on various types of electronic devices.
Hans Gross (1847 -1915): First use of scientific study to head criminal
investigations
FBI (1932): Set up a lab to offer forensics services to all field agents and
other law authorities across the USA.
In 1978 the first computer crime was recognized in the Florida Computer
Crime Act.
Francis Galton (1982 – 1911): Conducted first recorded study of fingerprints
In 1992, the term Computer Forensics was used in academic literature.
1995 International Organization on Computer Evidence (IOCE) was formed.
In 2000, the First FBI Regional Computer Forensic Laboratory established.
In 2002, Scientific Working Group on Digital Evidence (SWGDE)
published the first book about digital forensic called “Best practices for
Computer Forensics”.
In 2010, Simson Garfinkel identified issues facing digital investigations.
Disk Forensics:
It deals with extracting data from storage media by searching active, modified, or
deleted files.
Network Forensics:
It is a sub-branch of digital forensics. It is related to monitoring and analysis of
computer network traffic to collect important information and legal evidence.
Database Forensics:
It is a branch of digital forensics relating to the study and examination of databases
and their related metadata.
Malware Forensics:
This branch deals with the identification of malicious code, to study their payload,
viruses, worms, etc.
Email Forensics
Deals with recovery and analysis of emails, including deleted emails, calendars,
and contacts.
Memory Forensics:
It deals with collecting data from system memory (system registers, cache, RAM)
in raw form and then carving the data from Raw dump.
Identification
Preservation
Analysis
Documentation
Presentation
Electronic storage media can be personal computers, Mobile phones, PDAs, etc.
Preservation
In this phase, data is isolated, secured, and preserved. It includes preventing people
from using the digital device so that digital evidence is not tampered with.
Analysis
In this step, investigation agents reconstruct fragments of data and draw
conclusions based on evidence found. However, it might take numerous iterations
of examination to support a specific crime theory.
Documentation
In this process, a record of all the visible data must be created. It helps in
recreating the crime scene and reviewing it. It Involves proper documentation of
the crime scene along with photographing, sketching, and crime-scene mapping.
Presentation
In this last step, the process of summarization and explanation of conclusions is
done.
Email forensics is the study of source and content of email as evidence to identify
the actual sender and recipient of a message along with some other information
such as date/time of transmission and intention of sender. It involves investigating
metadata, port scanning as well as keyword searching.
Some of the common techniques which can be used for email forensic
investigation are
Header Analysis
Server investigation
Network Device Investigation
Sender Mailer Fingerprints
Software Embedded Identifiers
Digital evidence can be any sort of digital file from an electronic source. This
includes email, text messages, instant messages, files and documents extracted
from hard drives, electronic financial transactions, audio files, video files.
Digital forensics is the process of uncovering and interpreting electronic data. The
goal of the process is to preserve any evidence in its most original form while
performing a structured investigation by collecting, identifying, and validating the
digital information to reconstruct past events.
Prof. Ashwini Kulkarni www.dacc.edu.in
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
There are many type of Cyber crimes taking place in the digital world, it is
important for the investigator to collect, analyze, store and present the evidence in
such a manner that court will believe in such digital evidences and give appropriate
punishment to the Cyber criminal.
The steps in a digital forensics follow an life cycle approach and consists of
following steps
Review of Evidence – After getting all the data from the suspected resources
it is most important things that how we get the data that can consider as
evidence in the court of law. We require proper chain of evidence that can’t
be challenge from the opposing party and that is only possible if all the
evidence is relevant to the case. After collecting the large set of information
it is important to extract the evidence data from media, therefore some tools
like Forensic Tool Kit and EnCase are used for the analysis of collected
information from the suspected computer. For Linux environment Coronor’s
Toolkit is used for evidence collection and analysis. The analysis of the
physical media layer of abstraction, which translates a custom storage layout
and contents to a standard interface, IDE or SCSI for example. The
boundary layer is the bytes of the media. Examples include a hard disk,
compact flash, and memory chips. The analysis of this layer includes
processing the custom layout and even recovering deleted data after it has
been overwritten
Representation of Evidence – Here due to lots of uncertainty in the validity
and acceptability in the digital evidence it is equally important to represent
the evidence in such a form that can be understood by the court. For many
types of digital data records or logging data for processes it is obvious that
they can potentially be relevant as digital evidence in the case of disputes.
But sometimes court will not accept the same data as valid evidence because
of the improper representation of the digital evidence.
Prof. Ashwini Kulkarni www.dacc.edu.in
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
Issues related to acquiring, storing, and processing large amounts of data for
forensic purposes have been causing problems for at least a decade, and are now
exacerbated by the availability and widespread marketing of digital information.
“The availability of gigabit class links and multimedia-rich contents accounts for
an explosion in the volume of data to be stored and processed for collecting clues
or detecting incidents. This is of particular relevance in the case of live network
analysis, as the investigator might not be able to capture and store all the necessary
traffic,”
Explosion of complexity
Evidence is no longer confined within a single host but, rather, is scattered among
different physical or virtual locations, such as online social networks, cloud
resources, and personal network–attached storage units. For this reason, more
expertise, tools, and time are needed to completely and correctly reconstruct
evidence. Partially automating some tasks has been highly criticized by the digital
investigation community, because it could quickly deteriorate the quality of the
investigation.
Development of standards
“Despite technological advances, files are still the most popular digital artifacts to
be collected, categorized, and analyzed. Thus, the research community has tried to
agree on standard formats, schema, and ontologies—but without much success,”
the authors say.
Privacy-preserving investigations
Nowadays, people bring into cyberspace many aspects of their lives, primarily
through online social networks or social media sites. Unfortunately, collecting
Legitimacy
Modern infrastructures are becoming complex and virtualized, often shifting their
complexity at the border (such as in fog computing) or delegating some duties to
third parties (such as in platform-as-a-service frameworks).
Thus, say the authors, “an important challenge for modern digital forensics will be
executing investigations legally, for instance, without violating laws in borderless
scenarios.”
Unit No – 6
Nowadays, cyber crimes do not only restrict itself to fraud, cyber bullying, identity
thefts but also infringement (violation ) of copyrights and trademarks of various
business and other organizations. Intellectual Property Rights (IPR) and Cyber
Laws cannot be separated, and online content must be protected.
Online content needs to be protected and hence Intellectual Property Rights and
Cyber laws cannot be separated. In cyberspace, sometimes one person makes a
profit by using another person's creation without the owner's consent. This is a
violation of privacy, and it is protected by IPR.
Threats refer to negative influences which not only hamper the productivity of an
organization but also bring a bad name to it.
A web threat is any threat that uses the World Wide Web to facilitate cybercrime.
Web threats use multiple types of malware and fraud, all of which utilize HTTP ,
but may also employ other protocols and components, such as links in email or
malware attachments or on servers that access the Web.
Web-based threats, or online threats, are a category of cyber security risks that may
cause an undesirable event or action via the internet. Web threats are made
possible by end-user vulnerabilities, web service developers/operators, or web
services themselves.
Web threats pose a broad range of risks, including financial damages, identity
theft, loss of confidential information/data, theft of network resources, damaged
brand/personal reputation, and erosion of consumer confidence in e-
commerce and online banking.
Cloud security breaches and incidents still occur even as security technologies
improve and service providers fix their networks. People can attack network hosts
and web apps as fast as they can be refreshed. Cloud administrators should test
Prof. Ashwini Kulkarni www.dacc.edu.in
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
Security management
The major public cloud vendors continue to invest in their services and improve
cloud security, such as their ability to fend off distributed denial-of-service attacks.
Some experts say that today's cloud attacks are far less shocking than on-premises
ones because cloud attacks are generally limited to a single misconfigured service,
whereas a local attack might devastate an entire infrastructure.
Social media marketing is the use of social media platforms to connect with your
audience to build your brand, increase sales, and drive website traffic.
The term social media marketing (SMM) refers to the use of social media and
social networks to market a company's products and services. Social media
marketing provides companies with a way to engage with existing customers and
reach new ones while allowing them to promote their desired culture, mission, or
tone. Social media marketing has purpose-built data analytics tools that allow
marketers to track the success of their efforts.
Incident Handling
Initial response
Consolidation phase
Recovery phase
Restoration of normality.
It is important for a business to have an internet usage policy in place that sets and
establishes guidelines for employees to follow while using the internet at work.
Such a policy should address issues including preventing software piracy,
decreasing cyber security threats through malware and spyware, deterring misuse
of employer-owned computers and network, and increasing employee productivity.
When leaving your computer, lock the screen with a password to safeguard the
data on your computer. Also, always lock your doors when leaving the computer
unattended.
Never leave your devices or laptop in the car. It’s a best practice to keep
work laptops and devices on your person at all times while on the road. The
This way, you protect your business from various risks like losing or leaking
important information and computer files or getting your computers infected with
malware.
However, businesses aren’t the only ones who benefit from such a policy.
About 92% of computers with pirated software have malware like Trojan horses,
viruses, and worms.
When you have well-defined rules that prohibit the usage of unlicensed or pirated
programs, you can minimize the risk of running into serious security and legal
issues like those mentioned above.
There are many ways in which your employees can misuse your computer and
information resources.
Identity and financial abuses: Financial frauds and handling stolen credit
card information.
Privacy-related laws and monitoring rights might differ according to country and
state.
That’s why it’s important to create a straightforward policy about the degree of
privacy your employees should expect and your company’s monitoring rights in
the workplace.
Prof. Ashwini Kulkarni www.dacc.edu.in
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
Emphasize in the policy that the computers are a company asset and not a device
on which they can conduct personal activities.
Including such aspects in your computer usage policy can help your employees
understand what expectation of privacy and monitoring they should have, and help
them stay away from unproductive internet activities.
1. Overview
This is the introduction to the document. State your company’s name and briefly
mention the reasons for creating a policy.
State briefly what this document will include – and the people, facilities, and
equipment it applies to.
3. Purpose
When you state the purpose of the policy, your employees won’t feel like their
privacy is aimlessly infringed.
Phrase it in a way that your employees can see how this policy will help both the
organization and them to be better at their job.
4. Policy
The policy itself can vary depending on your industry and the type of business
you’re running. But aim to include the following sections which you can customize
depending on your needs:
A. A Blanket Statement
Even though you’ll have lots of specifics on how your employees should conduct
certain procedures, try to include a blanket statement.
This statement should state that your employees can expect to be monitored when
using work computers and the business network.
Describe what’s included in proper employee computer use and internet access.
This section is specific and should be customized to the nature of your business.
For example, many companies prohibit using social media during work hours.
However, if you’re a social media marketing agency, this isn’t feasible.
In this case, you have to specify what their job duties are and the approved
activities to carry out those duties. Also, clarify their level of authorization as
computer users and what the acceptable use of these communication platforms is.
On what occasions do they breach security policies and abuse internet use?
Usage: Computers should not be used for any illegal activities, chain letters
(electronic mail spam), or discriminatory communication. You can include
more specific usage violations.
You can expand on each of these sections to include specifics related to your
industry and business.
In the end, state that violating the policy will lead to disciplinary action. Specify
what this action is, the procedure and whether the employee will get a warning
beforehand.
Now, let’s take a look at a sample computer policy you can refer to when creating
your business’s policy:
This company computer usage policy outlines the guidelines for properly using its
computers, network, and internet.
The aim of this company policy is to avoid inappropriate, illegal, and unauthorized
use of the computing equipment and information technology, and to avoid
jeopardizing the company’s reputation and security.
2. Scope
This computer usage policy applies to all employees and other individuals like
partners, volunteers, independent contractors, and those who have access to the
company’s network and computing facilities.
Employees are expected to use computer devices, the internet, and company
computer network to:
Do work-related research.
Use the email system and social media only for work-related purposes.
Visit unsafe websites that can crash the system or spread a virus in the
company’s network.
Usage
Electronic media should not be used for transmitting chain letters and other email
spam.
The computer devices should only be used for business-related purposes, and
employees should not abuse computer data usage limits.
Monitoring
The company has the right to monitor regularly all electronic communication
channels that happen on business computing devices. These include email accounts
and other forms of communication and data sharing that occur on work computers.
Security
Employees should not give their authorized access information to users without
proper authorization.
They shouldn’t try to obtain other employees’ password information, hack into
other networks, or engage in other activities that put the company’s system security
at risk.
Employees who violate this computer usage policy will face disciplinary action.
A warning will follow violations. Depending on the severity of the violation, the
employee can face termination of employment or other legal actions.
Activities that spread malware like viruses, worms, and Trojan horses.
Prof. Ashwini Kulkarni www.dacc.edu.in
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45
A billion Indian Aadhaar card details were leaked in India and this is one of the
most massive data breaches that happened in 2018. UIDAI released the official
notification about this data breach and mentioned that around 210 Indian
Government websites were hacked. This data breach included Aadhar, PAN, bank
account IFSC codes, and other personal information of the users and anonymous
sellers were selling Aadhaar information for Rs. 500 over Whatsapp. Also, one
could get an Aadhaar card printout for just Rs.300.
The recent data breach at the payment from Mobikwik in India is alarming.
According to reports, the data breach affected 3.5 million customers, revealing
know-your-customer records including addresses, phone numbers, Aadhaar cards,
and PAN cards, among other things. Until recently, the corporation has claimed
that no such data breach occurred. Only until the regulator, the Reserve Bank of
India (RBI), instructed Mobikwik to immediately perform a forensic audit by a
CERT-IN empanelled auditor and submit the findings did the business begin
engaging with the appropriate authorities.
Around mid-2018 a cyber-attack was launched against Canara bank ATM servers
in India. Several bank accounts were emptied of about 20 lakh rupees. According
to reports, cybercriminals had access to ATM data for more than 300 individuals,
resulting in a total of 50 victims. Skimming devices were used by hackers to
collect information from debit cardholders. The value of transactions conducted
using stolen information ranged from Rs. 10,000 to Rs. 40,000.
Baazee.com case
The National Trust in the United Kingdom has joined a growing list of education
and charitable organisations whose alumni or contributors’ data has been
compromised as a result of a two-month-old ransomware attack at US cloud
software provider Blackbaud. The Trust, which manages hundreds of vital and
Prof. Ashwini Kulkarni www.dacc.edu.in
DNYANSAGAR ARTS AND COMMERCE COLLEGE, BALEWADI, PUNE – 45