Irjet V9i8255

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056

Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072

A Review Paper on Cyber-Security


Aishwarya Pradeep Zope1, Rashmi Ravindra Chaudhari2

1 Passed Out Student, Dept. of Computer Engineering, Government College of Engineering, Jalgaon
2 Visiting Faculty, Dept. of Computer Engineering, Government College of Engineering, Jalgaon
--------------------------------------------------------------------***---------------------------------------------------------------------
Abstract: Internet, the worldwide connection of loosely It is an illegal activity committed over the internet.
held networks, has made the flow of data and information
between different networks easier. With data and
information being transferred between networks at distant
locations, security issues have become a major concern from
the past few years. The internet has also been used by few
people for criminal activities like unauthorized access to
others networks, scams, etc. These criminal activities related
to the internet are termed as Cyber Crimes. With the
increasing popularity of online activities like online banking,
online shopping, etc., it is a term that we often hear in the
news now-a-days. Therefore, in order to stop and punish the
cyber criminals, “Cyber Law” was introduced. Cyber Law can
be defined as law of the web, i.e., it is a part of the legal
systems that deals with the Internet, Cyberspace and with
other legal issues like online security or online privacy.

Therefore, keeping the objectives in mind, this chapter is


divided into different sections in order to provide a brief Definition:-
overview of what is cybercrime, the perpetrators of
cybercrime-hackers and crackers, different types of The word "cyber" is slang fr anything relating to
cybercrimes and the evolution of cyber laws in India. The computers, Information Technology, and virtual reality.
chapter further throws light on how these laws work and Therefore, is stans to reason that "cybercrime" are
the various preventive measures which can be used to offences relating to computers, Information Technology,
combat this “hi-tech” crime in India. the internet, and virtual reality.

Keywords:- Cybercrime, Cyber-Security,Hacking, Trojans, Crime committed using a computer and the internet to
Worms, Botnets, Phishing, Keylogger attacks, Brute-force steal data and information is a cybercrime.
attacks.
3.EXAMPLEs:-
1.INTRODUCTION
1). Stealing credit card information.
Cyber-attacks are taking place all the time; even as we
speak security of some organizations big or small is being 2). Breaking into the government website
compromised. For example, if you visit the site ‘threat
3). Email and Internet fraud.
cloud’ we can view all the cyber-attacks that are
happening right now. It gives us the scale of actual cyber- 4). Identity fraud.
attacks happening all the time in the world.Nowadays we
use the internet for many day-to-day activities. However, 5). Theft and sale of corporate data.
we need to stay alert to the notifications we receive and
about the system. With the advancement in Information 6). Ransomeware attacks.
Technology, the way cybercriminals commit the crime is
also changing day by day. 7). Cyberextortion(demanding money to prevent a
threatened attack).
2.DEFINITION
8). Cyber Spying (where hackers access government or
Cyber Crime:-Cybercrime or computer crime is a criminal company data).
activity that involves unlawful access to computer
systems. 9). Cryptojacking(where hackers mine cryptocurrency
using the resources they do not own).

© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1561
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072

4.HISTORY:- 5.1 MALWARE ATTACKS:-

The exact origin of cybercrime, the very first instance in It is an attack where a computer system or network is
which someone committed a crime across a computer infected with a computer virus or other type of malware. It
network, is impossible to know. is an all-encompassing term for a variety of cyberattacks
including trojan viruses. It is defined as code with
The first case of use of computer theft was in 1973, A teller malicious intent that typically steals data or destroys
at a local New-York bank used a computer to embezzle something on the computer.
over 2 million dollars.
A famous example of a malware attack is the WannaCry
The first spam email took place in the year 1978. Sending ransomware attack, a global cybercrime committed in May
spam emails is a cybercrime. In certain countries, we can 2017.
be behind bars if we send spam emails.
When the WannaCry ransomware attack hit, 230,000
In 1980’s MNC Database (pentagon and IDM) was hacked. computers were affected across 150 countries. Users were
locked out of their files and sent a message demanding
The first virus was installed on Apple computers was in that they pay a BitCoin ransom to regain access.
the year 1982.
Many cyber criminals use computer viruses to gain
In 1981, Ian Murphy, known as Captain Zap was the first unauthorized access to systems and steal data. A computer
person convicted of cybercrime. He hacked into the AT&T virus is a malware(malicious software program) loaded
network and changed the internal clock to charge off- into a computer without the knowledge of the user.
hours rates at peak times. He received 1,000 hours of
community service and 2.5 years of probation. 5.1.1 Viruses:-

In 1990’s National crackdown on criminals and Microsoft’s Like its biological name says viruses attach themselves to
NT operating system pierced. This is where hacking clean files and infect other clean files and they can spread
started to become main stream. Before this, hacking was uncontrollably damaging a system’s core functionality and
very much limited to organisation. deleting or corrupting files. They usually appear as an
executable file that you might have downloaded from the
In 2001, Cybercriminals launched attacks against eBay, internet.
Yahoo, CNN.com, amazon and others.
5.1.2 Trojans:-
In 2007, Bank hit by biggest ever hack. Swedish bank,
Nordea recorded nearly $1 Million has been stolen in three This kind of malware disguises itself as legitimate
months from 250 accounts. software or is included in legitimate software that can be
tampered with. It tends to act discretely and creates
In 2013, Adobe had 2.9million accounts compromised and backdoors in our security to let other malware enter our
their usernames and passwords were released on the system.
open internet.
5.1.3 Worms:-
In 2016, Kaspersky: one of the leading antivirus providers
to the world reported around 758 million malicious Worms infect entire networks of devices either local or
attacks that occurred . across the internet by using the network interfaces. It uses
each consecutive infected machine to infect more.
5.TYPES OF CYBERCRIME:-
5.1.4 Botnets:-

Botnets are networks of infected computers that are made


to work together under the controller of an attacker.

We can encounter malware if we have os


vulnerabilities or if we download some l legitimate
software from somewhere or we have some email
attachments that were compromised with.

© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1562
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072

5.2 PHISHING:- It is an attempt to obtain or decrypt a user’s password for


illegal use. Hackers can use cracking programs, dictionary
It is a cybercrime where people are contacted through attacks, and password sniffers in password attacks.
phone calls, email, or a message by cybercriminals posing Defence against password attacks is rather limited but
as a person from a legitimate institution. A phishing usually consists of a password policy including a minimum
campaign is when spam emails, or other forms of length, unrecognizable words, and frequent changes.
communication, are sent emails, to trick recipients into
doing something that undermines the security or security This attack can be done for several reasons but the most
of the organization they work for. These cybercriminals malicious reason is to gain unauthorized access to a
collect personal information like bank account details and computer without the computer’s owner's awareness not
passwords and then steal money. Messages sent by being in place; so this results in cybercrime such as
phishing look authentic and attempt to get victims to stealing passwords to access bank information. There are
reveal their information. three common methods used to break into a password-
protected system.
Phishing working:-
1). Brute-force attack: In this, a hacker uses a computer
program or script to try to log in with possible password
combinations usually starting with the easiest to guess
password.

2). Dictionary attacks:- In this, a hacker uses a program


or script and tries to log in by cycling through the
combinations of common words. This attack tries only
those possibilities which are most likely to succeed;
typically derived from a list of words; for example
dictionary.

These attacks are more successful because people tend to


choose easy passwords like their names, birthdates, etc.

The attacker must decide which business to target and 3). Keylogger attacks:- In this, the hacker uses a program
determine how to get the email address of the customers to track all of the user’s keystrokes; so at the end of the
of that business. Then they go through a setup phase; once day, everything the user has typed including the login IDs
they know which business to spoof and who their victims and passwords has been recorded.
are attackers create methods for delivering the messages
5.4 DISTRIBUTED DoS ATTACK
and collecting the information; then they execute the
attack. After that attacker records the information the Distributed DDoS attacks are a type of cybercrime attack
victims enter into the webpage or pop-up windows and in that cybercriminals use to bring down a system or
the last step which is identity theft and fraud the attacker network. Sometimes connected IoT devices are used to
uses the information they have gathered to make illegal launch DDoS attacks. In this attacker sends a high volume
purchases or commit fraud. of data of traffic through the network until the network
becomes overloaded and can no longer function
5.3 PASSWORD ATTACK:-
5.5 MAN IN THE MIDDLE ATTACK:-

© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1563
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072

This attack can obtain information from the end-user and 6). Identity theft:- It is a cybercrime where
the entity he or she is communicating with. cybercriminals steal personal data like passwords or bank
account details.
For example, if you are banking online the man in the
middle would communicate with you by impersonating 7). Cyber bullying:- It is a form of online harassment of a
your bank and communicate with your bank by person using smartphones or computers. It is also known
impersonating you. The man in the middle would receive as cyber harassment or online bullying. Cyberbullying
all of the information transferred between both parties generally occurs on platforms like social media and
which could include sensitive data such as bank accounts gaming platforms. It involves posting hate comments and
and personal information. sharing negative information about a person.

5.5.1 PREVENTION OF MITM 6. CYBERCRIME AND INFORMATION SECURITY


1). Use encrypted WAP(Wireless Access Point) Information security is a potential activity by which
information and other communication systems are
2). Always check the security of your connection. (HTTPS protected from and/or defended against unauthorized use
or HSTS) or modification or exploitation or even theft.
3). Invest in VPN. 6.1 Some steps that we can use to avoid being a victim
of cybercrimes are:-
DRIVE-by Download:-This attack occurs when vulnerable
computers get infected by just visiting a website. 1). Keep Software and operating systems updated:-
Findings from the latest Microsoft Security Intelligence Keeping your software and operating systems up to date
Report reveal that this attack has become the top web ensures that you benefit from the latest security patches to
security threat to worry about. protect your computer.
5.6 ROGUE SOFTWARE:- 2). Manage your social media settings:-
This is also called rogue security. It is designed specifically Keep your personal and private information locked down.
to damage or disrupt a computer system. In this case, not Social Engineering cybercriminals can often get your
only is the software going to disrupt your system, it’s personal information with just a few data points. For
going to try and trick you into making a purchase using instance, if you post your pet’s name, you might expose the
your credit card. answers to common security questions.
Other ways to fool the people are as follows:- 3). Use Anti-Virus software and keep it updated
1). Hacking:- This is one form of cybercrime in which you This is the smart way to protect your system from attacks.
get into somebody's system and then try to use
information, disrupt the working, disrupt the network, etc. 4). Use strong passwords:-

2). Credit card fraud:- The most common fraud Be sure to use strong passwords that people will not guess
performed under cybercrime is credit card fraud which and do not record them anywhere. Or use a reputable
happens over the internet, through the call centers, and lot password manager to generate strong passwords
many ways. randomly to make this easier.

3). Virus disssemination:-Installing, sending viruses via 5). Do not click on links in spam emails or untrusted
the network, vis emails, via messages, etc is one of the websites:-
more common types of cybercrime.
Another way people become victims of cybercrime is by
4).computer vandalism:- is getting a lot of people clicking on links in spam emails or other messages, or
involved nowadays. unfamiliar websites.

5). Software piracy:-The unauthorized copying, 6). Be mindful of which website URLs you visit.
distribution, or use of the software is called software
piracy. Cybercriminals distribute pirated software which Keep an eye on the URLs you are clicking on. Avoid
causes loss to the software company. Southeast Asia is clicking on links with unfamiliar or spammy-looking URLs.
considered one of the bigger markets of software piracy.
1). Avoid the use of public wi-fi networks.

© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1564
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072

2). Avoid using public computers while doing financial ADVANTAGES:


transactions.
1).Protection of our business.
3). Never share your passwords with anyone.
2).Increased productivity
4). Avoid downloading unknown applications on your
system. 3).Inspires customer confidence.

7. SOME KEY POINTS OF THE INFORMATION 4).Stops your website from crashing.
TECHNOLOGY (IT) ACT, 2000 ARE AS FOLLOWS:
5).Protection for your customers or clients.
E-mail is now considered a valid and legal form of
communication.
9. WHY DO WE NEED CYBERSECURITY?

Digital signatures are given legal validity within the Act. Three main pillars of cyber security are:-

The Act has given birth to new business companies to


issue digital certificates by becoming the Certifying
Authorities.

This Act allows the government to issue notices on the


internet through e-governance.

Communication between the companies or between the


company and the government can now be through the
internet also.

Addressing the issue of security is the most important


feature of this Act. It introduced the concept of digital
signatures that verifies the identity of an individual on the
internet.

In case of any loss or harm done to the company by


criminals, the Act provides a remedy in the form of money Fig:- 3 main pillars of cyber security
to the company.
1).Confidentiality:- (Data should be confidential) the
Apart from the above-mentioned Sections under the IPC principal of confidentiality asserts that the information
and ITAA, 2008, the Government of India has taken the and functions can be accessed only by authorized party.
following steps for the prevention of Cybercrimes:
2).Integrity:- (Data Integrity should ne intact) the
Cybercrime cells have been set up in states and U.T’s for principles of integrity assert that information and
reporting and investigation of Cybercrime cases. functions can be added, altered, or removed only by
authorized people and means.
The Government under the IT Act, of 2000 has also set
up Cyber forensics and Training Labs in the states of Kerala, 3).Availability:- (Data should be available) the principles
Assam, Mumbai, Mizoram, Manipur, Nagaland, Arunachal of availability assert that systems, functions, and data
Pradesh, etc., for awareness creation and training against must be available on demand according to agreed-upon
Cybercrimes. parameters based on levels of service.
In collaboration with the Data Security Council of India
10. MOTIVES BEHIND CYBERCRIME:-
(DSCI), NASSCOM, and Cyber Forensic Labs have been set
up in Mumbai, Bengaluru, Pune, and Kolkata for 1). Disrupting business continuity.
awareness creation and training.
2). Information theft and manipulating data.
8. CYBERSECURITY
3).Creating fear and chaos by disrupting critical
It is the technology and process that is designed to protect infrastructure.
networks and devices from attack, damage, or
unauthorized access. 4). Financial loss to the target.

© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1565
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 08 | Aug 2022 www.irjet.net p-ISSN: 2395-0072

5). Achieving state’s military objectives. 2).Bar Association of India (2015). Anti-Bullying Laws in
India. Retrieved from
6). Demanding ransom.
3).https://www.indianbarassociation.org/wp-
7). Demanding reputation of the target. content/uploads/2015/11/Anti-bullying-laws-in-india.pdf

11. FAMOUS PEOPLE IN CYBER SECURITY 4). Brenner, W. Susan (2010). Cybercrime: Criminal
threats from cyber space. Green Wood Publishing Group,
1). In 1988, Robert T Morris was the first person to create Westport.
internet worm.
5).https://www.indiacode.nic.in/bitstream/123456789/1
2). In 1990, Kevin Lee hacked telephone lines of KIIS-FM 3116/1/it_act_2000_updated.pdf.
(Los Angeles).

3). In 1999, David L Smith created Melissa virus. BIOGRAPHIES:

4). In 2004, Adam Botbyl gained unauthorized access to Miss. Aishwarya Zope
corporate computer network via and unsecured access B. Tech Computer,
points. Government College of Engineering,
Jalgaon.
12. DOMAINS IN CYBER SECURITY.
1).Asset Security.

2). Security Architecture and Engineering.


Miss. Rashmi Ravindra Chaudhari
3).Communication and Network Security.
ME (Comp), MBA (HR), DLL, DTL, LLB.
4). Identity and access management. Visiting Faculty,
Department of Computer Engineering,
5).Security operations. Government College of Engineering, Jalgaon.

6). Security assessment and Testing.

7).Software development and Security.

8).Security and risk management.

13. CONCLUSION:-
Today’s technological era is inclining us all towards
internet. And use of internet is playing crucial role in our
life. But, to protect our information and keep it safe and
secure; there is high need to know about cyber security
and use it in out daily lives.

ACKNOWLEDGMENT:-
I would like to acknowledge and give my warmest thanks
to Miss Rashmi Chaudhari who made this work possible.
Her guidance and advice carried me through all the stages
of my paper. Last but not the least, my parents are also an
important inspiration for me. So, with due regards, I would
like to express my gratitude to them.

REFERENCES:-
1).Anderson, T. M. & Gardener, T.J. (2015). Criminal
Law: Twelfth Edition. Stanford, CT: Cengage Learning.

© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1566

You might also like