CH 2
CH 2
CH 2
• Examples:
• Anti-Cyber Crime Law
• E-Commerce Law
• Cloud Cybersecurity Controls
• Critical Systems Cybersecurity Controls - The National Cryptographic
Standards
ﻗﺎﻧون ﻣﻛﺎﻓﺣﺔ ﺟراﺋم اﻟﻣﻌﻠوﻣﺎﺗﯾﺔ
ﻗﺎﻧون اﻟﺗﺟﺎرة اﻹﻟﻛﺗروﻧﯾﺔ
ﺿواﺑط اﻷﻣن اﻟﺳﯾﺑراﻧﻲ اﻟﺳﺣﺎﺑﻲ
ﻣﻌﺎﯾﯾر اﻟﺗﺷﻔﯾر اﻟوطﻧﯾﺔ- ﺿواﺑط اﻷﻣن اﻟﺳﯾﺑراﻧﻲ ﻟﻸﻧظﻣﺔ اﻟﺣرﺟﺔ
Tracking and tracing cyber attacks are technical challenges and global
policy Issues!!! !!ﯾﻌد ﺗﺗﺑﻊ اﻟﮭﺟﻣﺎت اﻟﺳﯾﺑراﻧﯾﺔ وﺗﻌﻘﺑﮭﺎ ﺗﺣدﯾﺎت ﺗﻘﻧﯾﺔ وﻗﺿﺎﯾﺎ ﺳﯾﺎﺳﯾﺔ ﻋﺎﻟﻣﯾﺔ
Main challenges in combating cybercrime:
:اﻟﺗﺣدﯾﺎت اﻟرﺋﯾﺳﯾﺔ ﻓﻲ ﻣﻛﺎﻓﺣﺔ اﻟﺟرﯾﻣﺔ اﻟﺳﯾﺑراﻧﯾﺔ
• Loss of location, unknowing location of attackers
ﻋدم ﻣﻌرﻓﺔ ﻣوﻗﻊ اﻟﻣﮭﺎﺟﻣﯾن، ﻓﻘدان اﻟﻣوﻗﻊ
• Legal aspect challenges include:
:ﺗﺷﻣل ﺗﺣدﯾﺎت اﻟﺟﺎﻧب اﻟﻘﺎﻧوﻧﻲ ﻣﺎ ﯾﻠﻲ
• Challenges associated with national legal frameworks;
اﻟﺗﺣدﯾﺎت اﻟﻣرﺗﺑطﺔ ﺑﺎﻷطر اﻟﻘﺎﻧوﻧﯾﺔ اﻟوطﻧﯾﺔ؛
• Obstacles to international cooperation. .اﻟﻌﻘﺑﺎت اﻟﺗﻲ ﺗﻌﺗرض اﻟﺗﻌﺎون اﻟدوﻟﻲ
• Challenges of public-private partnerships. .ﺗﺣدﯾﺎت اﻟﺷراﻛﺎت ﺑﯾن اﻟﻘطﺎﻋﯾن اﻟﻌﺎم واﻟﺧﺎص
• Definition:
• Cyber Warfare is defined as the use of cyber attacks by a nation or an
organization with the intention to disrupt, damaging, or destroy
another nation’s resources, networks, or civilian infrastructure etc.. to
wreak havoc on government. ﺗﻌرف اﻟﺣرب اﻟﺳﯾﺑراﻧﯾﺔ ﺑﺄﻧﮭﺎ اﺳﺗﺧدام اﻟﮭﺟﻣﺎت اﻟﺳﯾﺑراﻧﯾﺔ ﻣن ﻗﺑل دوﻟﺔ أو
ﻣﻧظﻣﺔ ﺑﻘﺻد ﺗﻌطﯾل أو إﺗﻼف أو ﺗدﻣﯾر ﻣوارد دوﻟﺔ أﺧرى أو ﺷﺑﻛﺎﺗﮭﺎ أو ﺑﻧﯾﺗﮭﺎ
. ﻹﺣداث ﻓوﺿﻰ ﻓﻲ اﻟﺣﻛوﻣﺔ.اﻟﺗﺣﺗﯾﺔ اﻟﻣدﻧﯾﺔ وﻣﺎ إﻟﻰ ذﻟك
• Can cause damage to the state, stope vital resources, disrupt critical
systems and even loss of life.
وﺗﻌطل اﻷﻧظﻣﺔ، وﺗوﻗف اﻟﻣوارد اﻟﺣﯾوﯾﺔ، ﯾﻣﻛن أن ﺗﺳﺑب أﺿرارا ﻟﻠدوﻟﺔ
.اﻟﺣﯾوﯾﺔ وﺣﺗﻰ اﻟﺧﺳﺎﺋر ﻓﻲ اﻷرواح
CSE 451 - Computer & Network Security
23
Cyber Warfare
• Example:
• Russia-Ukraine Cyber Warfare in 2022
• A copy of Remote Manipulator System (RMS)
• “malware” being used, a utilities software tool that enables remote
control of devices.
• It has being distributed through a fake emails about “Evacuation
Plan” 2022 اﻟﺣرب اﻹﻟﻛﺗروﻧﯾﺔ ﺑﯾن روﺳﯾﺎ وأوﻛراﻧﯾﺎ ﻓﻲ ﻋﺎم
RMS ﻧﺳﺧﺔ ﻣن ﻧظﺎم اﻟﻣﻧﺎور ﻋن ﺑﻌد
" وھﻲ أداة ﺑرﻣﺟﯾﺔ ﻟﻸدوات اﻟﻣﺳﺎﻋدة ﺗﺗﯾﺢ، اﻟﺑراﻣﺞ اﻟﺿﺎرة" اﻟﻣﺳﺗﺧدﻣﺔ
.اﻟﺗﺣﻛم ﻋن ﺑﻌد ﻓﻲ اﻷﺟﮭزة
"ﺗم ﺗوزﯾﻌﮭﺎ ﻣن ﺧﻼل رﺳﺎﺋل ﺑرﯾد إﻟﻛﺗروﻧﻲ ﻣزﯾﻔﺔ ﺣول "ﺧطﺔ اﻹﺧﻼء
• Definition:
• Any cyber circumstance or event with the potential to cause harm to
a computer, systems, network or any connected equipment.
أي ظرف أو ﺣدث ﺳﯾﺑراﻧﻲ ﻣن اﻟﻣﺣﺗﻣل أن ﯾﺗﺳﺑب ﻓﻲ ﺿرر ﻟﺟﮭﺎز ﻛﻣﺑﯾوﺗر أو
.أﻧظﻣﺔ أو ﺷﺑﻛﺔ أو أي ﻣﻌدات ﻣﺗﺻﻠﺔ
• SQL Injection
• Traffic analysis
62
Computer Viruses
:اﻟﻘﯾود واﻟﺑﯾﺋﺔ
• Limitation and Environment:
• Most viruses work on particular operating systems, or specific
hardware platforms.
.ﺗﻌﻣل ﻣﻌظم اﻟﻔﯾروﺳﺎت ﻋﻠﻰ أﻧظﻣﺔ ﺗﺷﻐﯾل ﻣﻌﯾﻧﺔ أو ﻣﻧﺻﺎت أﺟﮭزة ﻣﺣددة
• They are designed to take advantage of the weaknesses of target
systems. .وھﻲ ﻣﺻﻣﻣﺔ ﻟﻼﺳﺗﻔﺎدة ﻣن ﻧﻘﺎط اﻟﺿﻌف ﻓﻲ اﻷﻧظﻣﺔ اﻟﻣﺳﺗﮭدﻓﺔ
• 1988 - Jerusalem
• Infected both .EXE and .COM files .EXE . وCOM إﺻﺎﺑﺔ ﻛل ﻣن ﻣﻠﻔﺎت
• Friday 13th it deleted all programs in the infected system
ﻗﺎم ﺑﺣذف ﺟﻣﯾﻊ اﻟﺑراﻣﺞ ﻓﻲ اﻟﻧظﺎم اﻟﻣﺻﺎب13 اﻟﺟﻣﻌﺔ
. اﺳﻣﺎ ﻓﻲ ﻗﺎﺋﻣﺔ ﺟﮭﺎت اﺗﺻﺎل اﻟﻣﺳﺗﺧدم50 ﻹرﺳﺎل رﺳﺎﺋل ﺑرﯾد إﻟﻛﺗروﻧﻲ ﺧﺎﺻﺔ ﺑﮫ إﻟﻰOutlookاﺳﺗﺧدم
." "ھذه ھﻲ اﻟوﺛﯾﻘﺔ اﻟﺗﻲ طﻠﺑﺗﮭﺎ ﻻ ﺗظﮭر ﻷي ﺷﺧص آﺧر:وﺟﺎء ﻓﻲ اﻟرﺳﺎﻟﺔ
ﺑﺎﻟﻣﺎﺋﺔ ﻣن ﺟﻣﯾﻊ أﺟﮭزة اﻟﻛﻣﺑﯾوﺗر اﻟﺗﺟﺎرﯾﺔ20 إﻟﻰ15 ﻣﺻﺎب ﺑﻧﺳﺑﺔ
ﻣﻠﯾون دوﻻر600 و300 اﻷﺿرار اﻟﻣﻘدرة ﺑﯾن
CSE 451 - Computer & Network Security
67
Computer Viruses
• 1999 - Melissa
• Melissa attacked computers in March 1999, infecting machines when users
opened a Word document attachment. Though the effect the virus had on
individuals' computers was minimal, users of Outlook Express unintentionally
sent the virus on to the first 50 people who were in their Global Address Book.
For companies, however, the virus had a larger impact. The virus was sent to
users with the subject, "Important message from [name]." More than a million
users were affected, the BBC reported. The virus also caused $80 million in
damage, and was the first virus to travel through e-mail.”
وأﺻﺎﺑت اﻷﺟﮭزة ﻋﻧدﻣﺎ ﻓﺗﺢ، 1999 ھﺎﺟﻣت ﻣﯾﻠﯾﺳﺎ أﺟﮭزة اﻟﻛﻣﺑﯾوﺗر ﻓﻲ ﻣﺎرس
Word. اﻟﻣﺳﺗﺧدﻣون ﻣرﻓﻖ ﻣﺳﺗﻧد
ﻋﻠﻰ اﻟرﻏم ﻣن أن ﺗﺄﺛﯾر اﻟﻔﯾروس ﻋﻠﻰ أﺟﮭزة اﻟﻛﻣﺑﯾوﺗر اﻟﺧﺎﺻﺔ ﺑﺎﻷﻓراد ﻛﺎن
Outlook Express إﻻ أن ﻣﺳﺗﺧدﻣﻲ، ﺿﺋﯾﻼ
ﻛﺎن، ﺑﺎﻟﻧﺳﺑﺔ ﻟﻠﺷرﻛﺎت، وﻣﻊ ذﻟك. ﺷﺧﺻﺎ ﻛﺎﻧوا ﻓﻲ دﻓﺗر اﻟﻌﻧﺎوﯾن اﻟﻌﻣوﻣﻲ اﻟﺧﺎص ﺑﮭم50 أرﺳﻠوا اﻟﻔﯾروس ﻋن ﻏﯾر ﻗﺻد إﻟﻰ أول
[name]." "رﺳﺎﻟﺔ ﻣﮭﻣﺔ ﻣن، ﺗم إرﺳﺎل اﻟﻔﯾروس إﻟﻰ اﻟﻣﺳﺗﺧدﻣﯾن ﻣﻊ اﻟﻣوﺿوع.ﻟﻠﻔﯾروس ﺗﺄﺛﯾر أﻛﺑر
ﻛﻣﺎ ﺗﺳﺑب اﻟﻔﯾروس ﻓﻲ أﺿرار. ﺣﺳﺑﻣﺎ ذﻛرت ھﯾﺋﺔ اﻹذاﻋﺔ اﻟﺑرﯾطﺎﻧﯾﺔ،وﺗﺄﺛر أﻛﺛر ﻣن ﻣﻠﯾون ﻣﺳﺗﺧدم
. وﻛﺎن أول ﻓﯾروس ﯾﻧﺗﻘل ﻋﺑر اﻟﺑرﯾد اﻹﻟﻛﺗروﻧﻲ، ﻣﻠﯾون دوﻻر80 ﺑﻘﯾﻣﺔ 68
Computer Viruses
I love u girls <3
2000 - I Love You virus – spread via Outlook
VBS attachment that over-writes files
VBSﻣرﻓﻖ
اﻟذي ﯾﻛﺗب اﻟﻣﻠﻔﺎت ﺑﺷﻛل زاﺋد
70
Computer Viruses
ﯾﻣﻛﻧﮫ ﻧﺳﺦ ﻧﻔﺳﮫ إﻟﻰ ﻣﺳﺗﻧدات أﺧرى وﺣذف، ﺑﻣﺟرد ﺗﺷﻐﯾل اﻟﻣﺎﻛرو. ﺑدء ﺗطﺑﯾﻖ، إﻏﻼق ﻣﻠف، ﻓﺗﺢ ﻣﻠف
• Macro Viruses: ﻏﺎﻟﺑﺎ ﻋن طرﯾﻖ اﻟﺑرﯾد اﻹﻟﻛﺗروﻧﻲ، ﺗﻧﺗﺷر ﺑﺳﮭوﻟﺔ.اﻟﻣﻠﻔﺎت وﻣﺎ إﻟﻰ ذﻟك
• Detection: Once the infection has occurred, determine that it has occurred and
locate the virus. . ﺣدد أﻧﮭﺎ ﺣدﺛت وﺣدد ﻣوﻗﻊ اﻟﻔﯾروس، ﺑﻣﺟرد ﺣدوث اﻟﻌدوى:اﻟﻛﺷف
• Identification: Once detection has been achieved, identify the specific virus that
has infected a program.
. ﺣدد اﻟﻔﯾروس اﻟﻣﺣدد اﻟذي أﺻﺎب اﻟﺑرﻧﺎﻣﺞ، ﺑﻣﺟرد ﺗﺣﻘﯾﻖ اﻻﻛﺗﺷﺎف:ﺗﺣدﯾد اﻟﮭوﯾﺔ
• Removal: Once the specific virus has been identified, remove all traces of the
virus from the infected program and restore it to its original state. Remove the
virus from all infected systems so that the virus cannot spread further.
ﻗم ﺑﺈزاﻟﺔ ﺟﻣﯾﻊ آﺛﺎر اﻟﻔﯾروس ﻣن اﻟﺑرﻧﺎﻣﺞ اﻟﻣﺻﺎب واﺳﺗﻌﺎدﺗﮫ، ﺑﻣﺟرد ﺗﺣدﯾد اﻟﻔﯾروس اﻟﻣﺣدد:اﻹزاﻟﺔ
. ﻗم ﺑﺈزاﻟﺔ اﻟﻔﯾروس ﻣن ﺟﻣﯾﻊ اﻷﻧظﻣﺔ اﻟﻣﺻﺎﺑﺔ ﺣﺗﻰ ﻻ ﯾﻧﺗﺷر اﻟﻔﯾروس أﻛﺛر.إﻟﻰ ﺣﺎﻟﺗﮫ اﻷﺻﻠﯾﺔ