Ecommerce
Ecommerce
Mobile Shopping
Mobile Banking
Mobile Payments
• Mobile Shopping: Mobile Shopping: The mobile device plays an
important role in the success of mobile shopping. But what a
customer expects today is an omnichannel experience, they want
their brands to be available on their preferred channel. For instance, if
a customer scans a QR code in a retail store they can do the shopping
on Viber Chatbot and continue their shopping.
• Mobile Banking: Mobile banking is also popularly known as “Net
Banking” which is like online banking. Financial institutes especially
banks use both SMS, apps, and chatbots to send out alerts and
account activities. With the help of the WhatsApp Chatbot, customers
can view their account balance, bank statement, fund transfer, review
loans, and many other transactions by just communicating via
WhatsApp in real-time.
• Mobile Payments: Mobile payment is an alternative to the traditional
channels of payments such as cash, cheque, credit/debit cards which
are also known as Mobile Money Transfer, mobile money, or m-
payments. Due to physical distancing, customers prefer to use
contactless payments, and that is where mobile payments come in
handy.
1.4 E-Commerce Consumer applications
• People needs entertainment on demand including video, games,
news on-demand, electronic retailing via catalogs etc.
• Currently now we are taking the video on-demand.
• Why most companies betting heavily on this?
1. 93 million homes have television
2. Americans spend nearly half their free time watching television
3. Every evening, more than one-third of the population is in front of
a television
4. Sight, sound, and motion combine to make television a powerful
means of marketing
Consumer Applications and Social Interaction:
• Lessons from history indicate that the most successful technologies
are those that make their mark social
• In 1945, in U.S no one had TV. By 1960 about 86percent of
households did
• Now contrast with Telephone. Bell invented the telephone in 1876
and by1940, 40% of U.S. households and by 1980 about 95-98
percent of households connected
• Penetration was slower for Telephone than for TV because of the
effort needed to set up the wiring infrastructure The impact of both
was good on business, social, consumer behavior and entertainment
habits Radio began in 1960, and by 1989, almost 3 decades later, just
319 radio stations followed the news format
• In 1994, their number exceeded 1000
• What do Consumers really want?
• 1. They want quality and cost of service
• 2.If a new system requires more steps to do essentially the same
things, consumers may resist it
• 3.Some people fit that mold, but most of public prefers to lay back
and just watch television and let someone else do the work of
figuring out the sequence of television programming
• What are Consumers willing to spend?
Introduction
The basic framework of e-commerce enables doing business online. The
framework consists of a comprehensive structure beginning with the
based technology layer to the general service layer. E-commerce has, to a
certain extent, changed markets structure. Traditionally, market ties were
created through the exchange of goods, services, and money. E-commerce
has brought in an essential element: information. Market ties are now
based on information services, information goods and electronic money.
Although the nature of exchanging products remains unchanged, the
channel and the format of doing business have changed. To better
understand the basic framework of e-commerce, the following paragraphs
explain the features of the major layers in the environment of e-commerce.
Basic Framework
This layer is regarded as the essential facilities for doing business because
it is required by both business corporations and individuals in business
transactions. The facilities include standardized product catalogues, price
lists, electronic payment methods, secured transmission of business
information, and the authentication of identity of both trading parties. The
ultimate goal of e-commerce is that the seller gets the payment and the
buyer obtains the product. To ensure transaction security, e-commerce
needs to ensure content reliability, integrity, non- repudiation, and to
provide the relevant evidence in case of disputes. Therefore, payment
security on the web is crucial to ensure smooth completion of a
transaction. The prevailing method of security measure is by electronic
certification which provides „end-to-end‟ security protection.
5. The Fifth layer: Practical Application of E-commerce
1. Consumer access equipment: - which is at the consumer end and enables the consumer to
access the network. It consists of the hardware such as computers, modems, routers, switches for
computer networks, set-top boxes for television networks and software platforms such as browsers
and operating systems.
2. Local on-Ramps: - provide the communication backbone for the transmission of data and
information. The access providers can also be differentiated into four categories: telecom based
cable TV-based, wireless-based, or computer-based online systems.
3. Global information distribution networks: providing the infrastructure for connecting across
the countries and continents. They include such networks as the long-distance telephone lines,
satellite networks, and the internet.
Business - to - Business
A website following the B2B business model sells its products to an
intermediate buyer who then sells the product to the final customer. As an
example, a wholesaler places an order from a company's website and after
receiving the consignment, sells the endproduct to the final customer who
comes to buy the product at one of its retail outlets.
Business - to - Consumer
A website following the B2C business model sells its products directly to a
customer. A customer can view the products shown on the website. The
customer can choose a product and order the same. The website will then send
a notification to the business organization via email and the organization will
dispatch the product/goods to the customer.
Consumer - to - Consumer
A website following the C2C business model helps consumers to sell their
assets like residential property, cars, motorcycles, etc., or rent a room by
publishing their information on the website. Website may or may not charge
the consumer for its services. Another consumer may opt to buy the product of
the first customer by viewing the post/advertisement on the website.
Consumer - to - Business
In this model, a consumer approaches a website showing multiple business
organizations for a particular service. The consumer places an estimate of
amount he/she wants to spend for a particular service. For example, the
comparison of interest rates of personal loan/car loan provided by various
banks via websites. A business organization who fulfills the consumer's
requirement within the specified budget, approaches the customer and provides
its services.
Business - to - Government
B2G model is a variant of B2B model. Such websites are used by governments
to trade and exchange information with various business organizations. Such
websites are accredited by the government and provide a medium to businesses
to submit application forms to the government.
Government - to - Business
Governments use B2G model websites to approach business organizations.
Such websites support auctions, tenders, and application submission
functionalities.
Government - to - Citizen
Governments use G2C model websites to approach citizen in general. Such
websites support auctions of vehicles, machinery, or any other material. Such
website also provides services like registration for birth, marriage or death
certificates. The main objective of G2C websites is to reduce the average time
for fulfilling citizen’s requests for various government services.
Debit Card
Debit card, like credit card, is a small plastic card with a unique number mapped with
the bank account number. It is required to have a bank account before getting a debit
card from the bank. The major difference between a debit card and a credit card is that
in case of payment through debit card, the amount gets deducted from the card's bank
account immediately and there should be sufficient balance in the bank account for
the transaction to get completed; whereas in case of a credit card transaction, there is
no such compulsion.
Debit cards free the customer to carry cash and cheques. Even merchants accept a
debit card readily. Having a restriction on the amount that can be withdrawn in a day
using a debit card helps the customer to keep a check on his/her spending.
Credit Card
Payment using credit card is one of most common mode of electronic payment. Credit
card is small plastic card with a unique number attached with an account. It has also a
magnetic strip embedded in it which is used to read credit card via card readers. When
a customer purchases a product via credit card, credit card issuer bank pays on behalf
of the customer and customer has a certain time period after which he/she can pay the
credit card bill. It is usually credit card monthly payment cycle. Following are the
actors in the credit card system.
Card brand company authenticates the credit card and pays the
Step 4
transaction by credit. Merchant keeps the sales slip.
Merchant submits the sales slip to acquirer banks and gets the service
Step 5
charges paid to him/her.
Acquirer bank requests the card brand company to clear the credit
Step 6
amount and gets the payment.
Now the card brand company asks to clear the amount from the issuer
Step 6
bank and the amount gets transferred to the card brand company.
E-Cash
eCash is known as Electronic Cash which is a digital currency technique
from which transactions can be achieved anywhere through the internet.
It is an easier form of payment, it is based on the principles of
blockchain technology (Digital Signatures) among the Peer-to-Peer
network. All transactions and dealings are stored in specific digital
databases. It is the alternate payment system to pay for bills, products,
and services without the use of paper or coin currency. Applications of
electronic or digital cash are digital cash, debit cards, electronic cases,
electronic check, and credit cards.
E-cheque:
An electronic check is an electronic version of the conventional paper
check. It is a form of online payment where money is withdrawn from
one account and deposited into another account using the Automated
Clearing House (ACH) network.
Through an ACH merchant account, a business can collect payments for
products or services directly from a customer’s bank account
electronically. However, the payment must first be authorized by the
customer, which is usually done through consent taken in various forms,
such as acceptance of a website’s terms and conditions or a signed
contract.
How to Process Electronic Checks
E-Wallet
The E-Wallet can be simply understood as a prepaid account that allows
customers to store numerous debit cards, credit cards, etc., in a secure
environment that eliminates the need to enter the information every time the
customer wants to make a payment. The use of E-Wallets is rising with each
passing day.
2.5. Security on Web, SSL
System Integrity: This quality that a system has when performing the
intended function in an unimpaired manner, free from unauthorised
manipulation. Integrity is commonly an organisations most important
security objective, after availability. Integrity is particularly important for
critical safety and financial data used for activities such as electronic
funds transfers, air traffic control, and financial accounting.
SSL
Secure Socket Layer (SSL) provides security to the data that is
transferred between web browser and server. SSL encrypts the link
between a web server and a browser which ensures that all data passed
between them remain private and free from attack.
Secure Socket Layer Protocols:
SSL record protocol
Handshake protocol
Change-cipher spec protocol
Alert protocol
SSL Protocol Stack:
Change-cipher Protocol:
This protocol uses the SSL record protocol. Unless Handshake Protocol
is completed, the SSL record Output will be in a pending state. After the
handshake protocol, the Pending state is converted into the current
state.
Change-cipher protocol consists of a single message which is 1 byte in
length and can have only one value. This protocol’s purpose is to cause
the pending state to be copied into the current state.
Alert Protocol:
This protocol is used to convey SSL-related alerts to the peer entity. Each
message in this protocol contains 2 bytes.
The level is further classified into two parts:
3.3.1 IPR Violations (Software piracy, Copyright Infringement, Trademarks Violations, Theft of Computer
source code, Patent Violations)
What is Cybercrime?
Cybercrime is defined as a crime where a computer is the object of the
crime or is used as a tool to commit an offense. A cybercriminal may
use a device to access a user’s personal information, confidential
business information, government information, or disable a device. It is
also a cybercrime to sell or elicit the above information online.
3.1 Category of Cyber Crimes It can be classified in to 4 major categories as
Hacking:
An effort to attack a computer system or a private network inside a
computer is known as hacking.
Simply, it is unauthorized access to or control of computer network
security systems with the intention of committing a crime.
Hacking is the process of finding some security holes in a computer
system or network in order to gain access to personal or corporate
information.
One example of computer hacking is the use of a password cracking
technique to gain access to a computer system. The process of gaining
illegal access to a computer system, or a group of computer systems, is
known as hacking. This is accomplished by cracking the passwords and
codes that grant access to systems. Cracking is the term used to
describe the process of obtaining a password or code. The hacker is the
individual who performs the hacking.
Following are some of the things that can be hacked:
Single systems
Email account
A group of systems
LAN network
A website
Social media sites, etc.
Types of Hacking:
Hacking is something from which you’ve to protect yourself and solely
can be done by anticipating how a hacker might think to get into the
system.
Phishing –
In this type of hacking, hackers intention is to steal critical information
of users like account passwords, MasterCard detail, etc. For example,
hackers can replicate an original website for users interaction and can
steal critical information from the duplicate website the hacker has
created.
Virus –
These are triggered by the hacker into the filters of the website once
they enter into it . The purpose is to corrupt the information or
resources on the net website.
UI redress –
In this technique, the hacker creates a pretend interface and once the
user clicks with the intent of progressing to a particular website, they
are directed to a special website.
Cookie theft –
Hackers access the net website exploitation malicious codes and steal
cookies that contain tips, login passwords, etc. Get access to your
account then will do any factor besides your account.
Distributed Denial-of-service(DDoS) –
This hacking technique is aimed toward taking down a website so that a
user cannot access it or deliver their service. Gets the server down and
stops it from responding, which may cause a condition error constantly.
DNS spoofing –
This essentially uses the cache knowledge of an internet website or
domain that the user might have forgotten keeping up to date. It then
directs the data to a distinct malicious website.
Social Engineering –
Social engineering is an attempt to manipulate you to share personal
info, sometimes by impersonating a trustworthy supply.
Malware-Injection Devices –
Cyber-criminals will use hardware to sneak malware onto your pc. You
would have detected infected USB sticks which can allow hackers
remote access to your device when it is connected to your pc.
Cracking Password –
Hackers will get your credentials through a technique known as key-
logging.
Types of Hackers
These people use the same technique used by the black hat hackers.
They also hack the system, but they can only hack the system that they
have permission to hack in order to test the security of the system. They
focus on security and protecting IT system. White hat hacking is legal.
Gray Hat Hacker
Gray hat Hackers are Hybrid between Black hat Hackers and White hat
hackers. They can hack any system even if they don't have permission to
test the security of the system but they will never steal money or damage
the system.
In most cases, they tell the administrator of that system. But they are
also illegal because they test the security of the system that they do not
have permission to test. Grey hat hacking is sometimes acted legally and
sometimes not.
Advantages of hacking :
Disadvantages of hacking :
Examples of Trojans
Zeus - Also known as Zbot, Zeus is a successful Trojan malware package with
many variants used to carry out a number of different types of attack. It’s perhaps
most well-known for its successful hack of the U.S. Department of
Transportation.
Wirenet - Wirenet is a password-stealing Trojan notable for being among the first
to target Linux and OSX users, many of whom were migrating from Windows
operating systems based on perceived security flaws.
Mobile banking Trojans - Webroot has documented a number of Trojans written
to target mobile banking apps for the purpose of stealing login credentials or
replacing legitimate apps with malicious ones.
Common signs that you have been infected with a Trojan horse virus:
Slow computer performance.
Pop-up ads and unwanted toolbars.
Unusual error messages.
Changes to your homepage or search engine.
Unexplained network activity.
Missing or corrupted files.
Unauthorized access to your accounts or personal information.
Virus
A computer virus is a program which can harm our device and files and infect
them for no further use. When a virus program is executed, it replicates itself by
modifying other computer programs and instead enters its own coding. This code
infects a file or program and if it spreads massively, it may ultimately result in
crashing of the device.
Across the world, Computer viruses are a great issue of concern as they can cause
billions of dollars’ worth harm to the economy each year.
Since the computer virus only hits the programming of the device, it is not visible.
But there are certain indications which can help you analyse that a device is virus-
hit.
Boot Sector Virus – It is a type of virus that infects the boot sector of
floppy disks or the Master Boot Record (MBR) of hard disks. The Boot
sector comprises all the files which are required to start the Operating
system of the computer. The virus either overwrites the existing program or
copies itself to another part of the disk.
Direct Action Virus – When a virus attaches itself directly to a .exe or .com
file and enters the device while its execution is called a Direct Action Virus.
If it gets installed in the memory, it keeps itself hidden. It is also known as
Non-Resident Virus.
Resident Virus – A virus which saves itself in the memory of the computer
and then infects other files and programs when it’s originating program is no
longer working. This virus can easily infect other files because it is hidden in
the memory and is hard to be removed from the system.
Multipartite Virus – A virus which can attack both, the boot sector and the
executable files of an already infected computer is called a multipartite
virus. If a multipartite virus attacks your system, you are at risk of cyber
threat.
Overwrite Virus – One of the most harmful viruses, the overwrite virus can
completely remove the existing program and replace it with the malicious
code by overwriting it. Gradually it can completely replace the host’s
programming code with the harmful code.
Polymorphic Virus – Spread through spam and infected websites, the
polymorphic virus are file infectors which are complex and are tough to
detect. They create a modified or morphed version of the existing program
and infect the system and retain the original code.
File Infector Virus – As the name suggests, it first infects a single file and
then later spreads itself to other executable files and programs. The main
source of this virus are games and word processors.
Spacefiller Virus – It is a rare type of virus which fills in the empty spaces
of a file with viruses. It is known as cavity virus. It will neither affect the
size of the file nor can be detected easily.
Macro Virus – A virus written in the same macro language as used in the
software program and infects the computer if a word processor file is
opened. Mainly the source of such viruses is via emails.
WORMS
What is a computer worm?
A computer worm is a type of malware whose primary function is to self-
replicate and infect other computers while remaining active on infected
systems.
Email worms
Email worms work by creating and sending outbound messages to all the addresses
in a user's contact list. The messages include a malicious executable file that
infects the new system when the recipient opens it.
File-sharing worms
File-sharing worms copy themselves into shared folders and spread through
peer-to-peer file-sharing networks. Worm authors often disguise these
malicious programs as media files.
Stuxnet, one of the most notorious computer worms to date, consists of two
components: a worm to propagate malware through USB devices infected
with the host file, and malware that targets supervisory control and data
acquisition systems.
Cryptoworms
Internet worms
Some computer worms specifically target popular websites with poor security.
If they can infect the site, they can infect a computer accessing the site.
From there, internet worms spread to other devices that the infected computer
connects to through the internet and private network connections.
If the worm hasn't had time to replicate itself onto the computer, the user can
change their password on the chat service account to prevent its spread
Basis of
Sr.No. Comparison WORMS VIRUS
A Virus is a malicious
executable code
A Worm is a form of malware attached to another
that replicates itself and can executable file which can
spread to different computers be harmless or can
1. Definition via Network. modify or delete data.
The main objective of worms is
to eat the system resources. It
consumes system resources
such as memory and
bandwidth and made the
system slow in speed to such The main objective of
an extent that it stops viruses is to modify the
2. Objective responding. information.
It doesn’t need a host to
replicate from one computer to It requires a host is
3. Host another. needed for spreading.
4. Harmful It is less harmful as compared. It is more harmful.
Worms can be detected and Antivirus software is
Detection and removed by the Antivirus and used for protection
5. Protection firewall. against viruses.
Worms can be controlled by Viruses can’t be
6. Controlled by remote. controlled by remote.
Worms are executed via Viruses are executed via
7. Execution weaknesses in the system. executable files.
Worms generally comes from Viruses generally comes
the downloaded files or through from the shared or
8. Comes from a network connection. downloaded files.
Hampering computer Pop-up windows
performance by slowing linking to malicious
9. Symptoms down it websites
Automatic opening and Hampering computer
running of programs performance by
Sending of emails without slowing down it
your knowledge After booting, starting
Affected the performance of of unknown
web browser programs.
Error messages concerning Passwords get
to system and operating changed without your
system knowledge
Installation of
Antivirus software
Never open email
attachments
Keep your operating system Avoid usage of
and system in updated state pirated software
Avoid clicking on links from Keep your operating
untrusted or unknown system updated
websites Keep your browser
Avoid opening emails from updated as old
unknown sources versions are
Use antivirus software and a vulnerable to linking
10. Prevention firewall to malicious websites
Boot sector virus, Direct
Action virus,
Internet worms, Instant Polymorphic virus,
messaging worms, Email Macro virus, Overwrite
worms, File sharing worms, virus, File Infector virus
Internet relay chat (IRC) worms are different types of
11. Types are different types of worms. viruses
Examples of viruses
Examples of worms include include Creeper, Blaster,
12. Examples Morris worm, storm worm, etc. Slammer, etc.
It does not need human action It needs human action to
13. Interface to replicate. replicate.
Its spreading speed is
slower as compared to
14. Speed Its spreading speed is faster. worms.
3.2.3 E-Mail related Crimes: Spoofing, Spamming, Bombing
What is spoofing?
Spoofing is a broad term for the type of behavior that involves a
cybercriminal masquerading as a trusted entity or device to get you to do
something beneficial to the hacker — and detrimental to you. Any time
an online scammer disguises their identity as something else, it’s
spoofing.
Spoofing can apply to a range of communication channels and can
involve different levels of technical complexity. Spoofing attacks
usually involve an element of social engineering, where scammers
psychologically manipulate their victims by playing on human
vulnerabilities such as fear, greed, or lack of technical knowledge.
Email spoofing
Among the most widely-used attacks, email spoofing occurs when the
sender forges email headers to that client software displays the
fraudulent sender address, which most users take at face value. Unless
they inspect the header closely, email recipients assume the forged
sender has sent the message. If it’s a name they know, they are likely to
trust it.
Spoofed emails often request a money transfer or permission to access a
system. Additionally, they can sometimes contain attachments that
install malware — such as Trojans or viruses — when opened. In many
cases, the malware is designed to go beyond infecting your computer
and spread to your entire network.
Email spoofing relies heavily on social engineering — the ability to
convince a human user to believe that what they are seeing is legitimate,
prompting them to take action and open an attachment, transfer money,
and so on.
How to prevent spoofing
In general, following these online safety tips will help to minimize your
exposure to spoofing attacks:
1. Avoid clicking on links or opening attachments from unfamiliar
sources. They could contain malware or viruses which will infect your
device. If in doubt – always avoid.
2. Don’t answer emails or calls from unrecognized senders. Any
communication with a scammer carries potential risk and invites further
unwanted messages.
3. Where possible, set up two-factor authentication. This adds another
layer of security to the authentication process and makes it harder for
attackers to access your devices or online accounts.
4. Use strong passwords. A strong password is not easy to guess and
ideally made up of a combination of upper- and lower-case letters,
special characters, and numbers. Avoid using the same password across
the board and change your password regularly. A password manager
tool is an excellent way to manage your passwords.
5. Review your online privacy settings. If you use social networking
sites, be careful who you connect with and learn how to use your privacy
and security settings to ensure you stay safe. If you recognize suspicious
behavior, have clicked on spam, or have been scammed online, take
steps to secure your account and be sure to report it.
6. Don’t give out personal information online. Avoid disclosing personal
and private information online unless you are 100% sure it is a trusted
source.
7. Keep your network and software up to date. Software updates include
security patches, bug fixes, and new features – keeping up to date
reduces the risk of malware infection and security breaches.
8. Look out for websites, emails, or messages with poor spelling or
grammar – plus any other features that look incorrect, such as logos,
colors, or missing content. This can be a sign of spoofing. Only visit
websites with a valid security certificate.
Spamming
What is Spamming?
What is spam messages, you ask? In simple terms, spam messages are
unsolicited & unwanted messages sent to a large group of people with the intent
to deceive, steal information, or spread malware. Spam messages can take
different forms. Let us see the various types of spamming in cyber security:
1. Email Spam: This type of spam is sent through email. Cybercriminals send
phishing emails that appear to be from legitimate sources, but contain
malicious links or requests for personal information.
2. Instant Messaging Spam: Instant messaging spam is sent through
messaging platforms such as WhatsApp & Telegram. They often contain
tempting offers such as job openings, contests or lottery wins that are too
good to be true.
3. Social Media Spam: There are several types of social media spam, like fake
profiles, fake likes, spam comments, & malicious links that can trick users
into downloading malware.
4. Comment Spam: Often found in the comments section of blogs, comment
spam are mostly automated messages that can include unrelated links or
promotional content.
5. SMS Spam: This type of spam messages are sent in bulk to mobile phones.
They may contain fake lottery wins, offers for free stuff or requests to click a
link that will download malware to the phone.
6. Voice Call Spam: Cybercriminals use robocalls to make unsolicited calls to
mobile or landline phones to promote products, spread scams or demand
payments.
7. Forum & Blog Spam: Spam comments on blogs & forums are mostly
irrelevant, & could contain links that lead to malware downloads.
Bombing
What is an e-mail bomb?
There are two main types of e-mail bombs, one floods the system and
the other triggers massive subscription sign ups.
Denial-of-service attack
In this type of bomb, the attacker sends a massive number of emails to
one address.
The system floods, resulting in a denial-of-service, i.e., the system
crashes.
Mass subscriptions
We call this type ‘e-mail subscription bombing.’ The attacker
automatically subscribes someone, i.e., the victim, to many electronic
mailing lists.
Each mailing list sends many messages regularly. Subsequently, there is
a flood of mail hitting the victim’s e-mail account virtually all the time.
Text bomb vs. e-mail bomb
A text bomb is like an e-mail bomb, but the attacker uses text messages
over SMS. The attacker floods the victim with SMS text messages.
Text bombing is a means of online harassment or cyber-bullying.
Some Android apps had to be banned because of text bombs. In some
cases, the bombs led to extremely high phone bills.
Some Android apps exist that can help protect the Android phone user
from bombs.
While most DoS attacks do not result in lost data and are typically resolved without
paying a ransom, they cost the organization time, money and other resources in
order to restore critical business operations.
Copyright Infringement
Primary Infringement
Primary infringement refers to the real act of
copying the work of the copyright holder. For
example, photocopying a book and then
distributing it for commercial purposes.
However, sometimes a person may only copy a
part of the work, for example, a paragraph of an
article. In such a case, the copyright holder is
required to establish two things:
Substantial Taking
A copyright is infringed only when an
unauthorized person copies a substantial part of
the work. For example, copying a catchy phrase
of a lyricist.
While deciding the case, the court also tries to
conceive, how an ordinary person will perceive
the work. If an ordinary person will perceive
that the work is copied from a different source
then it will be considered infringement.
If the writing style, language and errors are
similar to the copyrighted work then it will
serve as evidence of copying in a court of law.
The minor alterations made by the person in the
work of a copyright holder will not affect the
claim of infringement.
Casual Connection
The copyright holder must prove that there is a
similarity in the works of the copyright holder
and the infringer. However, this may be because
of several other reasons like both of them have
used the same source for the research. In such a
case, the copyright holder can not claim for
infringement.
Secondary Infringement
Secondary Infringement refers to the
infringement of copyright work without actually
copying it. This can happen in the following
ways:
Trademarks Violations
What is a Trademark?
A trademark is a symbol, design, word or phrase that is
identified with a business and when a trademark is registered, its
owner can claim “exclusive rights” on its use.
The Trademark Act 1999 guarantees protection for a
trademark that is registered with the Controller General of
Patents, Designs, and Trademarks, also known as
the trademark registry.
A trademark is valid for 10 years, and can be renewed by the
owner indefinitely every 10 years.
What Constitutes a Trademark Violation?
Using a registered trademark without authorisation of the
entity that owns the trademark is a violation or infringement
of the trademark.
There are several ways in which a trademark can be infringed
such as Deceptive similarity, passing off (Say, a brand logo is
misspelt in a way that’s not easy for the consumer to discern).
In such cases, courts have to determine whether this can cause
confusion for consumers between the two.
In such cases, the infringing products need not be identical, but
similarity in the nature, character and performance of the goods
of the rival traders has to be established.
o For example, Cadila Healthcare Limited vs Cadila
Pharmaceuticals Limited.
There are two types of infringement – direct and indirect
infringement.
Direct Infringement
Unauthorized person – this means a person who is not the
owner or the licensee of the registered trademark.
‘Identical’ or ‘Deceptively similar ‘– the test for determining
whether marks are identical or not is by determining whether
there is a chance for a likelihood of confusion among the public.
If the consumers are likely to get confused between the two
marks, then there is an infringement.
Registered Trademark – You can only infringe a registered
trademark. For an unregistered Trademark, the common law
concept of passing off will apply.
Goods/ Services – In order to establish infringement even the
goods/ services of the infringer must be identical with or similar
to the goods that the registered Trademark represents.
Indirect infringement
What is cybersquatting?
Types of Cybersquatting
There are several different kinds of cybersquatting, all of
which are illegal.
Typo squatting
One of the most prevalent forms of cybersquatting is typo
squatting. In this case, the cyber squatter purchases
misspelled domain names for well-known brands on
purpose. The objective is to take users to a fraudulent
website if they type a domain name incorrectly.
Yajoo.com
Googgle.com
Fxnews.com
ABCnewss.com
Identity Theft
Cybersquatting can also be used for identity theft because
someone can take a company’s identity and use it to
create a similar Uniform Resource Locator (URL). If a
user goes to that company’s website, they may end up on
the fake site instead. At that point, the cyber squatter has,
in effect, stolen the digital identity of their target.
Reverse Cybersquatting
Reverse domain name hijacking (RDNH), also known as
reverse cybersquatting, is a technique that is, in some
ways, the opposite of cybersquatting. While purchasing a
domain name that contains a trademark with the goal of
making money off that trademark is cybersquatting,
reverse domain hijacking is a little different. It happens
when a person or business makes a false claim that she,
he, or it owns a trademark and then takes unjustified steps
to take your legitimate domain name away.
Cyber smearing
What is cyber smearing?
“Cyber smear” is the practice of anonymously posting
messages on the Internet through the use of message
boards and chat rooms, which assert disparaging, or even
defamatory, rumors or statements about a company, its
executives or its stock.
Cyber Stalking
In Cyber Stalking, a cybercriminal uses the internet to
consistently threaten somebody. This crime is often
perpetrated through email, social media, and the other
online medium. Cyber Stalking can even occur in
conjunction with the additional ancient type of stalking,
wherever the bad person harasses the victim offline.
There’s no unified legal approach to cyber stalking,
however, several governments have moved toward
creating these practices punishable by law. Social media,
blogs, image sharing sites and lots of different ordinarily
used online sharing activities offer cyber Stalkers with a
wealth of data that helps them arrange their harassment. It
includes actions like false accusations, fraud, information
destruction, threats to life and manipulation through
threats of exposure. It has stalkers take the assistance of
e-mails and other forms of message applications,
messages announce to an online website or a discussion
cluster, typically even the social media to send unwanted
messages, and harass a specific person with unwanted
attention. Cyber Stalking is typically cited as internet
stalking, e-stalking or online stalking.
Types of Cyber Stalking:
Webcam Hijacking: Internet stalkers would attempt
4.4 Hackers:
Remote Access Trojan (RAT): RATs are a type of trojan designed to serve as
an access point for follow-on attacks. Once the malware is running on the
infected computer, it provides the attacker with remote access and control,
enabling them to download other malware, steal sensitive data, or take other
actions.
Phishing: Phishing attacks use social engineering techniques to try to trick the
recipient into taking an action that benefits the attacker. Phishing messages
— sent over email, social media, corporate communications apps, or other
messaging platforms — typically are designed to trick a target into clicking a
malicious link, opening a malicious attachment, or handing over sensitive
information such as login credentials.
Spear Phishing: Spear phishing attacks are phishing attacks that are targeted
at a particular person or group and use information about their target to make
the pretext of the phishing message more believable. For example, a spear
phishing email to an employee in the finance department may claim to be an
unpaid invoice from one of the company’s legitimate vendors or suppliers.
Smishing: Smishing attacks are phishing attacks performed using SMS text
messages. These attacks take advantage of the features of mobile devices,
such as the common use of link shortening services (such as bit.ly) and the
ability to mouse over a link to check its destination in SMS messages.
Vishing: Vishing attacks use many of the same techniques as phishing but are
performed over the phone. The attacker attempts to talk the target into
performing some action or handing over sensitive data, such as payment card
information or login credentials.
SQL Injection (SQLI): SQL, which is used when interacting with a database,
intermingles data and instructions, often separated by single (‘) or double (“)
quotes. SQLI attackers provide deliberately malformed data that is used in an
SQL query so that part of the attacker-provided data is interpreted as a
command, enabling the attacker to control the action performed on the
database.
Remote Code Execution (RCE): RCE vulnerabilities are those that allow an
attacker to execute code on the system hosting a vulnerable application. For
example, an attacker may be able to exploit a buffer overflow vulnerability to
run their malicious commands.
Trusted External Software: All companies use third-party software and allow
it inside their networks. Like in the SolarWinds hack, if an attacker can insert
malicious code into third-party software or an update to it, that malicious code
may be trusted within the organization’s environment, providing access to
sensitive data and critical systems.
DoS Attacks
Denial of Service (DoS) attacks are designed to disrupt the availability of a
service. Common DoS threats include the following:
MitM Attacks
Man-in-the-Middle (MitM) attacks are focused on intercepting
communications. Some MitM threats include:
2. Business Continuity
By preventing cyber attacks, organizations can ensure the availability of their systems and services,
minimizing downtime and potential losses.
5. Competitive Benefit
Companies with robust cyber security measures in place are less vulnerable to cyber-attacks and can
gain a competitive edge over competitors who may not prioritize security.
8. Reputation Protection
A strong cyber security posture helps organizations avoid reputational damage caused by data
breaches and other cyber incidents, which can lead to loss of customer trust and decreased business
opportunities.
9. Enhanced Collaboration
Secure communication platforms and tools enable teams to collaborate effectively and share sensitive
information without worrying about unauthorized access or data leaks.
MAC Address stands for Media IP Address stands for Internet Protocol
1.
Access Control Address. Address.
DHCP
DHCP stands for Dynamic Host Configuration Protocol. It is the critical feature
on which the users of an enterprise network communicate. DHCP helps
enterprises to smoothly manage the allocation of IP addresses to the end-user
clients’ devices such as desktops, laptops, cellphones, etc. is an application
layer protocol that is used to provide:
Subnet Mask (Option 1 - e.g., 255.255.255.0)
Router Address (Option 3 - e.g., 192.168.1.1)
DNS Address (Option 6 - e.g., 8.8.8.8)
Vendor Class Identifier (Option 43 - e.g.,
'unifi' = 192.168.1.9 ##where unifi = controller)
Working of DHCP
The working of DHCP is as follows:
DHCP works on the Application layer of the TCP/IP Protocol. The main task of
DHCP is to dynamically assigns IP Addresses to the Clients and allocate
information on TCP/IP configuration to Clients. For more, you can refer to the
Article Working of DHCP.
The DHCP port number for the server is 67 and for the client is 68. It is a
client-server protocol that uses UDP services. An IP address is assigned from a
pool of addresses. In DHCP, the client and the server exchange mainly 4 DHCP
messages in order to make a connection, also called the DORA process, but
there are 8 DHCP messages in the process.
Advantages of DHCP
The advantages of using DHCP include:
Centralized management of IP addresses.
Centralized and automated TCP/IP configuration.
Ease of adding new clients to a network.
Reuse of IP addresses reduces the total number of IP addresses that are
required.
The efficient handling of IP address changes for clients that must be updated
frequently, such as those for portable devices that move to different
locations on a wireless network.
Simple reconfiguration of the IP address space on the DHCP server without
needing to reconfigure each client.
The DHCP protocol gives the network administrator a method to configure
the network from a centralized area.
With the help of DHCP, easy handling of new users and the reuse of IP
addresses can be achieved.
Disadvantages of DHCP
The disadvantage of using DHCP is:
IP conflict can occur.
The problem with DHCP is that clients accept any server. Accordingly, when
another server is in the vicinity, the client may connect with this server, and
this server may possibly send invalid data to the client.
The client is not able to access the network in absence of a DHCP Server.
The name of the machine will not be changed in a case when a new IP
Address is assigned.
Router
What is a router?
A router is a physical or virtual appliance that passes information
between two or more packet-switched computer networks. A router
inspects a given data packet's destination IP address, calculates the best
way for it to reach its destination and then forwards it accordingly.
Types of routers
Some of the different types of routers include the following:
Core routers.
Edge routers.
Branch routers.
Logical routers.
Wireless routers.
Core routers
ISPs use core routers, which are the fastest and most powerful type of
router. Core routers sits at the center of the internet and forward
information along the main fiber optic backbone. Enterprise routers
connect large organizations' networks to core routers.
Edge routers
Branch routers
Logical routers
Wireless routers
Unsecure webpages
Web applications and cloud storage with misconfigured SSL/HTTPS
security protocols can lead to data being uploaded or downloaded
without any encryption. Such unencrypted data in transit can be easily
intercepted and exposed.
Poor access controls
Providing excessive permissions to users who don't need them and a
lack of visibility into who has access to what files, empowers users to
access and share data without any accountability.
Misconfiguration errors
Applications' default permissions settings are meant for maximum
usability, not security. When administrators fail to update the settings
according to their data security requirements or miss security updates, it
can lead to data exposure.
Authentication Protocols
Ch-3
Unit-5:
5.1 Ethical Hacker
5.1.1 Roles and Responsibilities
5.1.2 Benefit of Ethical Hacking
5.1.3 Skills require to become Ethical hacker
5.2 Penetration testing concepts
5.2.1 Phases of Ethical hacking
5.2.2 Areas of penetration testing
5.3 SQL Injection:
5.3.1 Concepts of SQL Injection
5.3.2 Types of SQL Injection
5.3.3 Case study of SQL Injection
5.4 Firewall:
5.4.1 Concepts of Firewall
5.4.2 Types of Firewall
5.4.3 Working, Advantages and Importance of Firewall
2. Computer Skills
3. Linux Skills
4. Programming Skills
6. Reverse Engineering
7. Cryptography Skills
8. Database Skills
9. Problem-solving Skills
1. Reconnaissance:
This phase is also known as the planning phase. In this phase, important
information about the target system is gathered. Reconnaissance is the first
phase of the penetration testing process. It involves gathering information about
the target system or network to identify potential vulnerabilities and attack
vectors. During the reconnaissance phase, the penetration tester will gather
information from a variety of sources, including. Publicly available information,
such as company websites, social media accounts, and domain name
registration records
Network scanning tools, which can be used to identify live hosts, open ports,
and running services
Vulnerability scanning tools, which can be used to identify known vulnerabilities
in the system
OSINT (Open-Source Intelligence) techniques, can be used to gather
information from various sources such as Google, social media, and other
public domains.
The goal of reconnaissance is to gather as much information as possible about
the target system or network, to identify potential weaknesses that can be
exploited during the later phases of the penetration test.
It is a crucial step of the penetration testing process as it allows the testers to
understand the target system environment and to define the scope of the test.
2. Scanning:
In this phase, different scanning tools are used to determine the response of the
system towards an attack. Vulnerabilities of the system are also
checked. Scanning is the second phase of the penetration testing process,
following reconnaissance. It involves using automated tools to actively probe
the target system or network to identify live hosts, open ports, and running
services.
During the scanning phase, the penetration tester will use a variety of tools to
perform different types of scans, such as:
Port scans: which identify open ports on live hosts, and the services running
on those ports.
Vulnerability scans: search for known vulnerabilities in the system based
on the version and configuration of the software running on the open ports.
Network mapping: this creates a visual representation of the target
network, including the hosts, devices, and services. Scanning can be done
internally or externally, depending on the scope of the test and the objectives
of the organization.
It is an important phase of the penetration testing process as it allows the
testers to identify the attack surface of the target system, and to identify
potential vulnerabilities that can be exploited during the next phase of the test.
It is important to note that the results of the scan may not necessarily be
accurate and should be verified by a human tester to avoid false positives.
3. Gaining Access:
In this phase using the data gathered in the planning and scanning phases, a
payload is used to exploit the targeted system. Gaining access is the third
phase of the penetration testing process, following reconnaissance and
scanning. In this phase, the penetration tester will attempt to exploit the
vulnerabilities identified in the previous phases to gain unauthorized access to
the target system or network.
During the gaining access phase, the penetration tester will use a variety of
techniques, such as:
Exploiting software vulnerabilities: using known exploits to gain access to
a system or network.
Social engineering: tricking employees or users into revealing login
credentials or other sensitive information.
Password cracking: using automated tools to guess or crack passwords.
The goal of this phase is to gain access to the system and to establish a
foothold from which the penetration tester can move laterally through the
network. It is an important phase of the penetration testing process as it allows
the testers to assess the real impact of the identified vulnerabilities and to
evaluate the effectiveness of the security controls in place. It is important to
note that gaining access should be done in a controlled environment, with
proper permissions and guidelines, and not to cause any harm to the system or
data.
4. Maintaining Access:
This phase requires taking the steps involved in being able to be continuously
within the target environment to collect as much data as possible.
Maintaining access is the fourth phase of the penetration testing process,
following reconnaissance, scanning, and gaining access. In this phase, the
penetration tester will focus on maintaining their access to the target system or
network and expanding their control over it.
During the maintaining access phase, the penetration tester will use a variety of
techniques, such as:
Establishing backdoors: creating a way to regain access to the system in
case the initial access is closed.
Privilege escalation: increasing their level of access to the system, from a
low-privilege user to an administrator or root user.
Persistence: maintaining access to the system over time by creating a way
to bypass security controls.
Lateral movement: moving through the network to gain access to other
systems and resources.
The goal of this phase is to maintain access to the system or network for as
long as possible and to expand the scope of the attack. It is an important phase
of the penetration testing process as it allows the testers to assess the impact
of a successful attack and to evaluate the effectiveness of the security controls
in preventing or detecting prolonged unauthorized access.
It is important to note that maintaining access should be done in a controlled
environment, with proper permissions and guidelines, and not to cause any
harm to the system or data.
5. Be hidden from the user:
This is the moment where the attacker will have to clear the trace of any activity
done in the target system. It is done to remain hidden from the user/victim. In
the final phase of a penetration test, the tester will focus on being hidden from
the user. This phase is also known as “covering tracks.” The goal of this phase
is to make it as difficult as possible for the system administrator or security team
to detect the tester’s presence and activities on the system.
During the covering tracks phase, the penetration tester will use a variety of
techniques to hide their presence, such as:
Clearing logs: deleting or modifying system logs to remove any evidence of
the tester’s activities
Hiding files: using techniques such as rootkits or hidden directories to
conceal files and tools used during the test.
Disabling security controls: disabling or circumventing security controls
such as firewalls, intrusion detection systems, and antivirus software to
evade detection.
It is an important phase of the penetration testing process as it allows the
testers to assess the ability of the system to detect and prevent prolonged
unauthorized access and to evaluate the incident response plan of the
organization.
It is important to note that covering tracks should be done in a controlled
environment, with proper permissions and guidelines, and not cause any harm
to the system or data. Also, the tester must leave the system in its initial state
after the test.
More in-depth and targeted, web app penetration testing is considered more
complicated and time-consuming. The different stages of penetration testing aim
to identify the interaction endpoints of every web-based app in your system.
As of the first quarter of 2022, there were 3.3million Android apps and 2.11
million apps available for iOS users. Hackers are constantly searching for
personal information stored in the app database. As a business, it’s your
responsibility to ensure your users’ data is safe. Data breaching can cause
irreparable harm to your brand’s reputation.
Mobile app pen testers typically identify weaknesses such as inadequate data
protection and binary compile issues. They also help mitigate more conventional
threats like SQL injection attacks and username enumeration.
Moreover, mobile application pen testing can be done before apps go live,
eliminating most emerging vulnerabilities.
5.4 Firewall:
5.4.1 Concepts of Firewall
5.4.2 Types of Firewall
5.4.3 Working, Advantages and Importance of Firewall
What is a Firewall?
A firewall can be defined as a special type of network security device or a software program that
monitors and filters incoming and outgoing network traffic based on a defined set of security
rules. It acts as a barrier between internal private networks and external sources (such as the
public Internet).
The primary purpose of a firewall is to allow non-threatening traffic and prevent malicious or
unwanted data traffic for protecting the computer from viruses and attacks. A firewall is a
cybersecurity tool that filters network traffic and helps users block malicious software from
accessing the Internet in infected computers.
There are mainly three types of firewalls, such as software firewalls, hardware
firewalls, or both, depending on their structure. Each type of firewall has different
functionality but the same purpose. However, it is best practice to have both to achieve
maximum possible protection.
A hardware firewall is a physical device that attaches between a computer network and a
gateway. For example- a broadband router. A hardware firewall is sometimes referred to
as an Appliance Firewall. On the other hand, a software firewall is a simple program
installed on a computer that works through port numbers and other installed software.
This type of firewall is also called a Host Firewall.
Besides, there are many other types of firewalls depending on their features and the
level of security they provide. The following are types of firewall techniques that can be
implemented as software or hardware:
o Packet-filtering Firewalls
o Circuit-level Gateways
o Application-level Gateways (Proxy Firewalls)
o Stateful Multi-layer Inspection (SMLI) Firewalls
o Next-generation Firewalls (NGFW)
o Threat-focused NGFW
o Network Address Translation (NAT) Firewalls
o Cloud Firewalls
o Unified Threat Management (UTM) Firewalls
Packet-filtering Firewalls
A packet filtering firewall is the most basic type of firewall. It acts like a management program
that monitors network traffic and filters incoming packets based on configured security rules.
These firewalls are designed to block network traffic IP protocols, an IP address, and a port
number if a data packet does not match the established rule-set.
While packet-filtering firewalls can be considered a fast solution without many resource
requirements, they also have some limitations. Because these types of firewalls do not prevent
web-based attacks, they are not the safest.
Circuit-level Gateways
Circuit-level gateways are another simplified type of firewall that can be easily configured to
allow or block traffic without consuming significant computing resources. These types of
firewalls typically operate at the session-level of the OSI model by verifying TCP
(Transmission Control Protocol) connections and sessions. Circuit-level gateways are
designed to ensure that the established sessions are protected.
Unlike basic firewalls, these firewalls transfer requests from clients pretending to be original
clients on the web-server. This protects the client's identity and other suspicious information,
keeping the network safe from potential attacks. Once the connection is established, the proxy
firewall inspects data packets coming from the source. If the contents of the incoming data
packet are protected, the proxy firewall transfers it to the client. This approach creates an
additional layer of security between the client and many different sources on the network.
In most cases, SMLI firewalls are implemented as additional security levels. These types
of firewalls implement more checks and are considered more secure than stateless
firewalls. This is why stateful packet inspection is implemented along with many other
firewalls to track statistics for all internal traffic. Doing so increases the load and puts
more pressure on computing resources. This can give rise to a slower transfer rate for
data packets than other solutions.
NGFW includes higher levels of security than packet-filtering and stateful inspection
firewalls. Unlike traditional firewalls, NGFW monitors the entire transaction of data,
including packet headers, packet contents, and sources. NGFWs are designed in such a
way that they can prevent more sophisticated and evolving security threats such as
malware attacks, external threats, and advance intrusion.
Threat-focused NGFW
Threat-focused NGFW includes all the features of a traditional NGFW. Additionally, they
also provide advanced threat detection and remediation. These types of firewalls are
capable of reacting against attacks quickly. With intelligent security automation, threat-
focused NGFW set security rules and policies, further increasing the security of the
overall defense system.
When multiple devices are used to connect to the Internet, NAT firewalls create a unique
IP address and hide individual devices' IP addresses. As a result, a single IP address is
used for all devices. By doing this, NAT firewalls secure independent network addresses
from attackers scanning a network for accessing IP addresses. This results in enhanced
protection against suspicious activities and attacks.
In general, NAT firewalls works similarly to proxy firewalls. Like proxy firewalls, NAT
firewalls also work as an intermediate device between a group of computers and
external traffic.
Cloud Firewalls
Whenever a firewall is designed using a cloud solution, it is known as a cloud firewall
or FaaS (firewall-as-service). Cloud firewalls are typically maintained and run on the
Internet by third-party vendors. This type of firewall is considered similar to a proxy
firewall. The reason for this is the use of cloud firewalls as proxy servers. However, they
are configured based on requirements.
The most significant advantage of cloud firewalls is scalability. Because cloud firewalls
have no physical resources, they are easy to scale according to the organization's
demand or traffic-load. If demand increases, additional capacity can be added to the
cloud server to filter out the additional traffic load. Most organizations use cloud
firewalls to secure their internal networks or entire cloud infrastructure.