E-Commerce and Cyber Security
E-Commerce and Cyber Security
Concept of ecommerce
E-commerce, or electronic commerce, refers to the buying and selling of
goods and services over the internet. It involves the use of electronic
platforms, such as websites, mobile applications, and social media, to
conduct transactions between businesses and consumers or between
businesses. E-commerce has revolutionized the way businesses operate and
has created new opportunities for entrepreneurs and consumers alike.
One of the primary benefits of e-commerce is that it offers a more
convenient and efficient way to conduct business. Consumers can browse
and purchase products from the comfort of their own homes, while
businesses can reach a global audience without the need for a physical
storefront. E-commerce has also enabled businesses to streamline their
operations by automating many of the tasks involved in the sales process,
such as inventory management, order processing, and shipping.
E-commerce has continued to grow in popularity and importance,
particularly in light of the COVID-19 pandemic, which has led to a surge in
online shopping as people seek to minimize in-person interactions. As a
result, businesses that are able to adapt to the e-commerce landscape are
likely to have a competitive advantage in the years to come.
Aims of ecommerce
Increasing Sales in Ecommerce Store.
One needs to improve on the conversion rates. A high rate of
conversion means that more people are clicking through from the
homepage to make a purchase. This can be attained by creating
attractive content and making sure that the site is easy to navigate.
Introduction to M-commerce
M-commerce (mobile commerce) is the buying and selling of goods and
services through wireless handheld devices such as smartphones and
tablets. M-commerce is a form of e-commerce that enables users to access
online shopping platforms without the use of a desktop computer.
Over time, content delivery through wireless devices has become faster,
more secure and scalable. As a result, mobile commerce has grown rapidly.
M-commerce encompasses three major approaches to mobility and business.
Examples of m-commerce include in-app purchasing; mobile banking virtual
marketplace apps, such as the Amazon mobile app; and digital wallets, such
as Apple Pay, Google Pay and Samsung Wallet.
Types of m-commerce
Mobile shopping enables customers to buy a product using a mobile device
with an application such as Amazon or a web app. A subcategory of mobile
shopping is app commerce, which is a transaction that takes place over
a native app.
Mobile banking is online banking designed for handheld technology. It
enables customers to access accounts and brokerage services, conduct
financial transactions, pay bills and make stock trades. This is typically done
through a secure, dedicated app provided by the banking institution. Mobile
banking services may use SMS or chatbots and other conversational app
platforms to send out alerts and track account activities. For example, the
WhatsApp chatbot lets customers view their account balance, transfer funds,
review loans and conduct other transactions in real time through WhatsApp.
Mobile payments are an alternative to traditional payment methods, such as
cash, check, credit and debit cards. They enable users to buy products in
person using a mobile device. Digital wallets, such as Apple Pay, let
customers buy products without swiping a card or paying with cash. Mobile
payment apps, such as PayPal, Venmo serve the same purpose and are
popular options. Mobile consumers also use QR codes to pay for things on
their mobile phones. With mobile payments, users send money directly to the
recipient's cell phone number or bank account.
Unit 2: Network Infrastructure of e-Com , Payment and Security
Concepts of Information Way:
Electronic commerce needs a network infrastructure to transport the content
data, audio, visual, text, animation and so on. This network infrastructure is
provided by what is known as the I-way or information super highway. The
information super highway may be defined as a high capacity, electronic
pipeline to a consumer or business premise that is capable of simultaneously
supporting a large number of e-commerce applications and providing
interactive connectivity between users and services. The I-way has emerged
as the basic network infrastructure for all types of e-commerce activities due
to its capability to provide integrate voice, data and video services.
Components of I-Way:
It consists of various components which can be broadly categorized as;
1. Network access equipment
2. Access media
3. Global information distribution networks
1. Network access equipment: - which is at the consumer end and enables the
consumer to access the network. It consists of the hardware such as
computers, modems, routers, switches for computer networks, set-top boxes
for television networks and software platforms such as browsers and
operating systems.
2. Access Road or media: - The access roads are the way in which the
consumer homes and work places are linked with the backbone of the
network infrastructure for e-commerce. These can be categorized into four
major types;
1. Telecom based
2. Cable TV based
3. Wireless based
4. Internet
intranet and extranet based Each of these access media has its own benefits
and limitations and is faced with a number of challenges in this fast-growing
world e-commerce.
1. Telecom based
The telecom industry provides both long distance and local telephone
services for e-commerce applications. The telecom companies provide a
high-speed pipeline capable for carrying high volumes of interactive voice,
data and video to homes and businesses connect these to the global
information distribution networks, the backbone of the i-way. The telecom
networks have become the primary foundation for the I-way mainly for two
reasons: It is capable of handling millions of simultaneous calls. It provides
accurate usage tracking and billing. However, they have two limitations: Lack
of digital transmission capability uneven capacity distribution
2. Cable TV based
The cable TV network provides a popular media for pushing high speed data
to homes. Statistics have shown that cable runs through 90 percent of the US
homes today and still has a lot of unutilized capacity. The cable TV based
networks may be wired or wireless.
3. Wireless based
The wireless operators are typically radio based i.e. cellular, paper and
specialized mobile radio (SMR) based. The wireless-based systems have
revolutionized the ways of thinking about information delivery. Technology is
the most important factor. The rapid growth in technology has impacted the
wireless industry in a number of ways: o Apart from the voice calls, the
cellular technology today has also facilitated short messaging services (SMS)
using alphanumeric display and the multimedia services. o Internet
connectivity using the cellular networks has been made possible. the cellular
networks using the analog technology are now upgrading to digital networks
to provide greater capacity at lower costs as well as increase the quality and
functionality of the cellular network. o Applications have been developed to
facilitate mobile workers to exchange messages and data from their offices
while on the road.
4. The internet
The internet forms a well-known component of the global information
distribution network. It targets a wide range of e-commerce applications such
as video on demand, home shopping, e-mail, EDI, information publishing,
information retrieval, video conferencing and many more. All the components
of the I-way together provide a network infrastructure for the e-commerce
activities. This requires the use of common standards and installing gateways
between various networks. A final requirement is the hardware and software
to move huge amounts of data effortlessly over the complex network.
3. Global information distribution networks:
Providing the infrastructure for connecting across the countries and
continents. They include such networks as the long-distance telephone lines,
the satellite networks and internet. Consumer access equipment [CAE] The
customer access equipment or customer premises equipment or the terminal
equipment consists of the equipment that the customer uses to connect to
the network. This may consist of the TV set-top boxes or the TV signal
descramblers, the computer and the modem, pagers and cellular phones etc.
Global information distribution networks the global information distribution
networks consist of the infrastructure crossing the countries and continents.
They include the long-distance telephone lines, satellite networks, and the
internet. Long distance networks long distance telephone connectivity is
provided through cable by the interexchange carriers. Long distance cellular
networks are using the wireless technologies to connect the consumers
worldwide. Satellite networks It play a vital role in the communication
industry. They have advantages over the terrestrial networks in that: a. They
are accessible from any point of the globe. b. They can provide broad band
digital services to many points without the cost of acquiring wire/cable
installation. c. They can add receiving and sending sites without significant
additional costs.
Transaction Models:
B2C (Business-to-consumer).
B2C businesses sell directly to their end-users. Anything you buy in an online
store as a consumer — from wardrobe and household supplies to
entertainment — is done as part of a B2C transaction.
B2C includes both products and services as well. B2C innovators have
leveraged technology like mobile apps, native advertising and remarketing to
market directly to their customers and make their lives easier.
B2B (Business-to-business).
In a B2B business model, a business sells its product or service to another
business. Sometimes the buyer is the end-user, but often the buyer resells to
the consumer. B2B transactions generally have a longer sales cycle, but
higher-order value and more recurring purchases.
In 2021, 60% of B2B buyers were millennials — nearly double the amount
from 2012. As younger generations enter the age of making business
transactions, B2B selling in the online space is becoming more important.
B2B2C (Business-to-business-to-consumer).
B2B2C stands for Business-to-Business-to-Consumer. It is a business model
where a company sells its product or service in partnership with another
organization to an end customer.
Unlike when you white label a product — where a company rebrands an item
to present it as its own — the end customer understands that they are buying
a product or using a service from the original company.
B2G (Business-to-government).
Business-to-government (B2G) is an ecommerce model where a business
sells and markets its products to government entities or public
administrations — whether local, county, state or federal.
While a more secure business model, B2G differs from other businesses or
consumers. The bureaucratic nature of government agencies often leads to a
much more glacial pace, which can limit potential revenue streams.
C2B (Consumer-to-business).
C2B businesses allow individuals to sell goods and services to companies. In
this ecommerce model, a site might enable customers to post the work they
want to be completed and have businesses bid for the opportunity. Affiliate
marketing services would also be considered C2B.
The C2B ecommerce model’s competitive edge is in pricing for goods and
services. This approach gives consumers the power to name their prices or
have businesses directly compete to meet their needs.
D2C (Direct-to-consumer).
A direct-to-consumer business sells its own product directly to its end
customers, without the help of third-party wholesalers or online retailers.
C2C (Consumer-to-consumer).
C2C ecommerce businesses — sometimes referred to as online marketplaces
— connect consumers to exchange goods and services and typically make
their money by charging transaction or listing fees.
Online businesses like Craigslist, Walmart, Alibaba and eBay pioneered this
model in the early days of the internet.
E-cash
E-cash is a paperless cash system which facilitates the transfer of funds
anonymously. E-cash is free to the user while the sellers have paid a fee for
this. The e-cash fund can be either stored on a card itself or in an account
which is associated with the card. The most common examples of e-cash
system are transit card, PayPal, Google Pay, Paytm, etc.
Eavesdropping
This is an unauthorized way of listening to private communication over the
network. It does not interfere with the normal operations of the targeting
system so that the sender and the recipient of the messages are not aware
that their conversation is tracking.
Some of the important threats associated with the debit/credit card are-
Skimming
It is the process of attaching a data-skimming device in the card reader of the
ATM. When the customer swipes their card in the ATM card reader, the
information is copied from the magnetic strip to the device. By doing this, the
criminals get to know the details of the Card number, name, CVV number,
expiry date of the card and other details.
Unwanted Presence
It is a rule that not more than one user should use the ATM at a time. If we
find more than one people lurking around together, the intention behind this
is to overlook our card details while we were making our transaction.
Vishing/Phishing
Phishing is an activity in which an intruder obtained the sensitive information
of a user such as password, usernames, and credit card details, often for
malicious reasons, etc.
Online Transaction
Online transaction can be made by the customer to do shopping and pay
their bills over the internet. It is as easy as for the customer, also easy for the
customer to hack into our system and steal our sensitive information. Some
important ways to steal our confidential information during an online
transaction are-
SSL certificates are not only limited to websites dealing with financial
transactions. All websites that store user data in some way or the other
must use SSL certificates for data encryption. Social media websites like
Facebook, YouTube, Twitter use SSL certificates to bar users with malicious
intent from intercepting transactions and user search queries from websites.
An unlawful act done with the intention of causing harm to the cyberspace
will affect large number of persons. These offences include:
What is Virus?
A virus is a computer program that connects to another computer software or
program to harm the system. When the legitimate program runs, the virus
may execute any function, like deleting a file. The main task of a virus is that
when an infected software or program is run, it would first run the virus and
then the legitimate program code will run. It may also affect the other
programs on the computer system.
After damaging all files on the current user's computer, the virus spreads and
sends its code via the network to the users whose e-mail addresses are
stored on the current user's computer system. Specific events may also
trigger a virus. Several types of viruses include parasitic, polymorphic,
stealth, boot sector, memory resident, and metamorphic viruses. Infection
with a virus can be avoided by blocking the entry of a virus.
What is Worm?
A worm is a form of a malicious program (virus) that replicates itself as it
moves from one system to another and leaves copies of itself in the memory
of each system. A worm discovers vulnerability in a computer and spreads
like an infection throughout its related network, continuously looking for
more holes. E-mail attachments spread the worms from reliable senders.
Worms are spread to a user's contacts through an address book and e-mail
account.
Some worms reproduce before going dormant, while others cause harm. In
such circumstances, the code of the worm's virus is known as the payload.
Infection Viruses spread Worms take advantage of The Trojan horse runs
through system flaws. as a program and is
executable files. interpreted as utility
software.
Email spoofing is possible due to how email systems are designed. The client
application assigns a sender address to outgoing messages, so outgoing
email servers cannot identify whether the sender address is legitimate or
spoofed.
Recipient servers and antimalware software can help detect and filter
spoofed messages. Unfortunately, not every email service has security
protocols in place. Still, users can review each message’s email header to
determine whether the sender address is forged.
Spamming:
Spamming in cybersecurity is the act of sending unsolicited messages, often
with commercial or malicious purposes, to a large number of people. E-mails,
texts & instant messages can be used as forms of communication. Spamming
can be used to spread malware, steal personal information, or promote
scams & phishing schemes. It can also be used to overload networks &
servers, causing them to crash. It is important for individuals to be cautious
when opening emails or messages from unknown senders, & to avoid clicking
on suspicious links or providing personal information.
Bombing:
Email bombing is a form of cyber-crime consisting of sending huge volumes
of email to an address in order to overflow the mailbox or overwhelm the
server where the email address is hosted. This results in the server crashing
there by disrupting the website or web portal and its online functioning.
There are two general methods of DoS attacks: flooding services or crashing
services. Flood attacks occur when the system receives too much traffic for
the server to buffer, causing them to slow down and eventually stop. Popular
flood attacks include:
Buffer overflow attacks – the most common DoS attack. The concept is to
send more traffic to a network address than the programmers have built the
system to handle. It includes the attacks listed, in addition to others that are
designed to exploit bugs specific to certain applications or networks
Other DoS attacks simply exploit vulnerabilities that cause the target system
or service to crash. In these attacks, input is sent that takes advantage of
bugs in the target that subsequently crash or severely destabilize the system,
so that it can’t be accessed or used.
Various crimes:
Infringement Of Intellectual Property Rights (IPR) Of E-Commerce Platforms
The rapid growth of e-commerce platforms has revolutionized the way we
shop and conduct business. However, along with the benefits, this digital
age has also brought about challenges in protecting intellectual property
rights (IPR). E-commerce platforms provide a global marketplace where
counterfeit products, trademark infringement, copyright violations, and
patent infringements thrive. This article aims to explore the various forms
of IPR infringement on e-commerce platforms and analyses relevant case
laws to understand the legal landscape surrounding these issues.
Trademark Infringement:
Trademark infringement occurs when a third party uses a mark that is
identical or similar to a registered trademark in connection with goods or
services without permission from the trademark owner. E-commerce
platforms often face challenges in preventing the sale of counterfeit
products bearing well-known trademarks. The burden lies on the platforms
to implement robust measures to identify and remove infringing listings.
Copyright Infringement:
Copyright infringement involves the unauthorized use of copyrighted
works, such as images, text, music, or videos, without the owner's consent.
E-commerce platforms face challenges in detecting and removing listings
that infringe upon copyrighted content.
Patent Infringement:
Patent infringement occurs when a product or process is made, used, or
sold without the patent owner's permission. E-commerce platforms face
challenges in monitoring the sale of patented products and preventing the
infringement of patented methods or technologies.
Theft of Computer source code:
Source Code theft is a severe and unspoken problem that is faced by
almost all software companies. Generally, source code & trade secrets are
stolen by the rouge employees mainly software developers or engineers of
any organization or company. Two types of organizations suffer most- One
is Indian businesses who operate in IT development themselves & another
is the burgeoning IT outsourcing sector. The problem of source code theft is
about the reuse of large portions of code that is specifically used to create
a product any company uses or sells.
The main reason of Source Code Theft is attaining illegal financial benefits.
Generally, this source code is sold by the offender to the competitor
company or organization that surely impacts the business & ideas of the
victim company.
India registered its first case of Source Code Theft in year 2002. An
employee, Shekhar Verma, who was fired from his job at Geometric
Software Solutions Ltd. (GSSL) offered to sell stolen source code to
someone who was actually a federal agent in the FBI’s cyber-crime unit.
The stolen source code belonged to SolidWorks, an American computer
aided design software company. They had outsourced development work
to GSSL. Shekar Verma was later prosecuted.
Cyber Squatting:
Cybersquatting is a form of cybercrime where the perpetrator buys or
registers a domain name that is identical or similar to existing domain with
the intention of profiting from a recognizable trademark, company name, or
personal name. Crucially, the act is illegal because of the bad faith intent of
the squatter. Due to its nature, domain squatting can be considered a form
of trademark infringement, though there are differences between the two.
There are several types of cybersquatting, and attacks may be carried out
with different goals in mind.
In many cases, squatters register domains with the intention of later selling
them to established businesses or brand owners for a significant profit.
However, some cyber squatters are more malicious and engage in web
squatting with more nefarious intent. For example, they may use similar
domains to create phishing page, scams, or even fake surveys to collect
user data.
Convinces visitors to download and launch malware on their computers.
Cybersquatting can have wide-ranging implications for legitimate
businesses. It can result in fraud, data breaches, and damage to their public
reputations.
Cyber Smearing:
Cyber-smearing refers to an intentional effort waged to damage the
reputation of an individual or a corporation using the Internet as a medium
(Workman, 2012). Examples of cyber-smearing, include writing untrue
negative content on a blog or fake negative reviews on a review site, with
the intent to cause harm to individuals or corporation's reputation.
Likewise, posting offensive content with personal attacks or content that
encourages illegal actions against individuals or a corporation fall under
cyber -smearing activities. Many reports have pointed to the rise of cyber -
smearing targeting business. In many instances, small companies have
been costly impacted by cyber-smearing, and large corporations as well
(Workman, 2012). Cyber-smearing has been also well-documented in
press papers and public media reporting many cases of lawsuits alleging
cyber defamation and cyber-smearing, several of which have resulted from
unhappy customers who have purportedly posted a false and defamatory
statement against the corporation or its employees, through tweets, blogs,
online reviews, and social media, that could quickly and easily cause
widespread damage to a company’s reputation.
Cyberstalking:
Cyberstalking is a crime committed when someone uses the internet and
other technologies to harass or stalk another person online. Even though
cyberstalking is a broad term for online harassment, it can include
defamation, false accusations, teasing, and even extreme threats. Often
these connections will not end even though the receiver requests the
person to stop. The content addressed at the target is frequently improper
and, at times, disturbing, leaving the individual beginning to feel fear.
Financial Crimes:
When criminals intercept a business transaction on an e-commerce store to
gain a personal or financial advantage, this is referred to as e-commerce
fraud. It's criminal conduct in which scammers take money from either the
client, the business, or both. It's also known as payment fraud.
ATM card skimming
Skimming devices are installed in ATM machines by fraudsters who take
data from the customer's card. According to the RBI release, “Fraudsters
may also install a dummy keypad or a small / pinhole camera, well-hidden
from plain sight to capture ATM PIN Sometimes, fraudsters pretending to
be other customer standing near-by gain access to the PIN when the
customer enters it in an ATM machine. This data is
Unit-4
What is cybersecurity?
Cybersecurity is a practice organization engage in to protect their
information, systems and devices from unwanted attacks and digital
threats. Also called information technology security, efforts to prevent
cyberattacks are extremely important because they can help organizations
protect sensitive data, prevent losses from system downtime and save
money on breach responses. Having a robust and comprehensive
cybersecurity strategy is incredibly important for businesses, especially
those responsible for protecting sensitive customer information.
2. Cyberattacks
Another concept that's important for cybersecurity professionals to
understand is cyberattacks. Learning to protect against different attacks
can help organizations prepare effective defensives and expect threats.
Here's a breakdown of five of the most common cyberattack types:
Basic Terminologies:
A router works on the third layer of the OSI model, and it is based on the IP
address of a computer. It uses protocols such as ICMP to communicate
between two or more networks. It is also known as an intelligent device as
it can calculate the best route to pass the network packets from source to
the destination automatically.
A virtual router is a software function or software-based framework that
performs the same functions as a physical router. It may be used to
increase the reliability of the network by virtual router redundancy protocol,
which is done by configuring a virtual router as a default gateway. A virtual
router runs on commodity servers, and it is packaged with alone or other
network functions, like load balancing, firewall packet filtering, and wide
area network optimization capabilities.
Bots:
Bots typically imitate or replace human user behavior. Because they are
automated, they operate much faster than human users. They carry out
useful functions, such as customer service or indexing search engines, but
they can also come in the form of malware – used to gain total control over
a computer.
Vishing
The Vishing is phishing using voice communication technology. Criminals
can spoof calls from authorized sources using voice-over IP technology.
Victims may also receive a recorded message that appears authorized.
Criminals want to obtain credit card numbers or other information to steal
the victim’s identity. Vishing takes advantage of the fact that people trust
the telephone network. Spear phishing is a targeted version of phishing
that involves sending customized emails to a specific individual or group of
individuals. These emails are designed to look like they come from a
trusted source and are personalized to increase the likelihood of the victim
falling for the attack. One advantage of this attack is that it can be highly
effective, as the attacker has done research on the victim to make the email
seem more legitimate.
Smishing
Smishing is phishing using text messaging on mobile phones. Criminals
impersonate a legitimate source in an attempt to gain the trust of the
victim. For example, a smishing attack might send the victim a website link.
When the victim visits the website, malware is installed on the mobile
phone.
Whaling
The Whaling is a phishing attack that targets high-profile targets within an
organization such as senior executives. Additional targets include
politicians or celebrities. Whaling is a type of spear phishing attack that
targets high-level executives or other high-value targets within an
organization. These emails are designed to look like they come from a
senior executive, such as the CEO or CFO, and often involve requests for
money transfers or other sensitive information. One advantage of this
attack is that it can be highly lucrative for the attacker, as they can
potentially steal large sums of money or valuable information.
Pharming
Pharming is the impersonation of an authorized website in an effort to
deceive users into entering their credentials. Pharming misdirects users to a
fake website that appears to be official. Victims then enter their personal
information thinking that they are connected to a legitimate site.
Spyware
Spyware is software that enables a criminal to obtain information about a
user’s computer activities. Spyware often includes activity trackers,
keystroke collection, and data capture. In an attempt to overcome security
measures, spyware often modifies security settings. Spyware often bundles
itself with legitimate software or with Trojan horses. Many shareware
websites are full of spyware.
Scareware
Scareware persuades the user to take a specific action based on fear.
Scareware forges pop-up windows that resemble operating system
dialogue windows. These windows convey forged messages stating that
the system is at risk or needs the execution of a specific program to return
to normal operation. In reality, no problems exist, and if the user agrees
and allows the mentioned program to execute, malware infects his or her
system.
Adware
Adware typically displays annoying pop-ups to generate revenue for its
authors. The malware may analyze user interests by tracking the websites
visited. It can then send pop-up advertising relevant to those sites. Some
versions of software automatically install Adware.
Spam
Spam (also known as junk mail) is an unsolicited email. In most cases, spam
is a method of advertising. However, spam can send harmful links,
malware, or deceptive content. The end goal is to obtain sensitive
information such as a social security number or bank account information.
Most spam comes from multiple computers on networks infected by a virus
or worm. These compromised computers send out as many bulk email as
possible.
Password Attack:
Phishing attacks
A phishing attack is by far the most common type of password attack. It
uses a social engineering approach in which the hacker masquerades as a
trustworthy site by giving the victim a malicious link. The victim assumes
they are authenticating to a legitimate web server and clicks the link,
supplying the attacker with their account details.
Brute-force password attacks
The brute-force attack uses trial-and-error approaches to guess a user's
login details. Hackers use automated scripts to run through as many
permutations as possible to guess the user's password successfully. While
this is an old method that involves a lot of patience and effort, a brute force
attack is still used in account breach attempts. This is because it is
automated and relatively simple.
Dictionary password attacks
The dictionary password attack technique employs a prepared list of terms
most likely to be used as passwords by a given target network. The list is
prepared by analyzing a user's behavior patterns and passwords retrieved
from prior data breaches. The lists are generated by altering common word
combinations by case, adding numeric suffixes and prefixes, and employing
common phrases. These lists are then fed into an automate d application,
which attempts to authenticate against a database of known usernames.
Password spraying attack
In password spraying, the hacker attempts to authenticate using the same
password on multiple accounts before resetting the password. This is
effective because most website users use easy passwords, and the practice
doesn't break lockout regulations because it uses many accounts. Attackers
typically orchestrate password spraying on websites where administrators
specify a uniform default password for new users and unregistered
accounts.
Keylogging
During a keylogging attack, a hacker installs monitoring tools on the user's
computer to record the keys the user presses secretly. A keylogger collects
all information that users enter into input fields, and transfers it to a
malicious third party. While keyloggers are often used in workplace
settings, attackers utilize them maliciously to acquire information such as
login credentials for unauthorized access.
Malware Attack:
Malware attacks are any type of malicious software designed to cause
harm or damage to a computer, server, client or computer network and/or
infrastructure without end-user knowledge.
Hackers:
A hacker is an individual who uses computer, networking or other skills to
overcome a technical problem. The term also may refer to anyone who uses
their abilities to gain unauthorized access to systems or networks in order
to commit crimes. A hacker may, for example, steal information to hurt
people via identity theft or bring down a system and, often, hold it hostage
in order to collect a ransom.
The term hacker has historically been a divisive one, sometimes being used
as a term of admiration for individuals who exhibit a high degree of skill
and creativity in their approach to technical problems. However, the term is
also commonly applied to individuals who use this skill for illegal or
unethical purposes.
Hacker was first used in the 1960s to describe a programmer or an
individual who, in an era of highly constrained computer capabilities, could
increase the efficiency of computer code in a way that removed, or hacked,
excess machine code instructions from a program. It has evolved over the
years to refer to someone with an advanced understanding of computers,
networking, programming or hardware.
What is a vulnerability in cybersecurity?
A vulnerability in cybersecurity is a weakness in a host or system, such as a
missed software update or system misconfiguration, that can be exploited
by cybercriminals to compromise an IT resource and advance the attack
path.
Identifying cyber vulnerabilities is one of the most important steps
organizations can take to improve and strengthen their overall
cybersecurity posture.
Common Types of Cyber Vulnerabilities:
When reviewing your company’s cybersecurity posture and approach, it’s
important to realize that cybersecurity vulnerabilities are within the control
of the organization — not the cybercriminal. This is one aspect of the
cybersecurity landscape that enterprises can proactively address and
manage by taking the appropriate action and employing the proper tools,
processes and procedures.
1.Misconfigurations:
Misconfigurations are the single largest threat to both cloud and app
security. Because many application security tools require manual
configuration, this process can be rife with errors and take considerable
time to manage and update.
In recent years, numerous publicly reported breaches started with
misconfigured S3 buckets that were used as the entry point. These errors
transform cloud workloads into obvious targets that can be easily
discovered with a simple web crawler. The absence of perimeter security
within the cloud further compounds the risk associated with
misconfigurations.
To that end, it is important for organizations to adopt security tooling and
technologies and automate the configuration process and reduce the risk of
human error within the IT environment.
2. Unsecured APIs
Another common security vulnerability is unsecured application
programming interfaces (APIs). APIs provide a digital interface that enables
applications or components of applications to communicate with each other
over the internet or via a private network.
APIs are one of the few organizational assets with a public IP address. If
not properly and adequately secured, they can become an easy target for
attackers to breach.
As with misconfigurations, securing APIs is a process prone to human error.
While rarely malicious, IT teams may simply be unaware of the unique
security risk this asset possesses and rely on standard security controls.
Conducting a security awareness training to educate teams on security best
practices specific to the cloud — such as how to store secrets, how to
rotate keys and how to practice good IT hygiene during software
development — is critical in the cloud, just as in a traditional environment.
3. Outdated or Unpatched Software
Software vendors periodically release application updates to either add
new features and functionalities or patch known cybersecurity
vulnerabilities. Unpatched or outdated software often make for an easy
target for advanced cybercriminals. As with system misconfigurations,
adversaries are on the prowl for such weaknesses that can be exploited.
While software updates may contain valuable and important security
measures, it is the responsibility of the organization to update their network
and all endpoints.
Unfortunately, because updates from different software applications can be
released daily and IT teams are typically overburdened, it can be easy to
fall behind on updates and patching, or miss a new release entirely. Failing
to update even one machine can have potentially disastrous consequences
for the organization, providing an attack path for ransomware, malware and
a host of other security threats
To help address this issue, organizations should develop and implement a
process for prioritizing software updates and patching. To the extent
possible, the team should also automate this activity so as to ensure
systems and endpoints are as up to date and secure as possible.
4. Zero-day Vulnerabilities
A zero-day vulnerability refers to a security flaw that has been discovered
by a threat actor but is unknown to the enterprise and software vendor.
The term “zero-day” is used because the software vendor was unaware of
their software vulnerability, and they’ve had “0” days to work on a security
patch or an update to fix the issue; meanwhile it is a known vulnerability to
the attacker.
Zero-day attacks are extremely dangerous for companies because they can
be very difficult to detect. To effectively detect and mitigate zero-day
attacks, a coordinated defense is needed — one that includes both
prevention technology and a thorough response plan in the event of a
cyberattack. Organizations can prepare for these stealthy and damaging
events by deploying a complete endpoint security solution that combines
technologies including next-gen antivirus (NGAV), endpoint detection and
response (EDR) and threat intelligence.
5. Weak or Stolen User Credentials
Many users fail to create unique and strong passwords for each of their
accounts. Reusing or recycling passwords and user IDs creates another
potential avenue of exploitation for cybercriminals.
Weak user credentials are most often exploited in brute force attacks when
a threat actor tries to gain unauthorized access to sensitive data and
systems by systematically trying as many combinations of usernames and
guessed passwords as possible. If successful, the actor can enter the
system and masquerade as the legitimate user; the adversary can use this
time to move laterally, install back doors, gain knowledge about the system
to use in future cyberattacks, and, of course, steal data.
To address this particular cybersecurity vulnerability, organizations should
set and enforce clear policies that require the use of strong, unique
passwords and prompt users to change them regularly. Organizations
should also consider implementing a multifactor authentication (MFA)
policy, which requires more than one form of identification, such as both a
password and a fingerprint or a password and a one-time security token, to
authenticate the user.
Injection Attack:
An injection attack is a form of cyberattack in which information is sent to
alter the system’s interpretation of commands. An attacker sends harmful
information to the interpreter during an injection attack. An injection attack
can be done on data from many different places, like environment
variables, parameters, online services, and user types, but not just those.
LDAP
In this type of attack, an attacker might modify LDAP statements
Injection
using a local proxy in order to execute arbitrary commands
(granting permissions to unauthorized queries) or modify the
content of the LDAP tree.
Exploits web sites by injecting an operating system command through an
HTTP request to the web application.
OS
Commanding
In this type of attack, an attacker might upload malicious programs or obtain
passwords.
Takes advantage of the SQL syntax to inject commands that can read or
modify a database, or compromise the meaning of the original SQL query.
SQL Injection
In this type of attack, an attacker can spoof identity; expose, tamper,
destroy, or make existing data unavailable; become the Administrator of the
database server.
Allows an attacker to send code to a web application, which will later be
executed locally by the web server.
SSI Injection
In this type of attack, an attacker exploits the failure of the web application
to filter data provided by users before it inserts that data into a server -side
interpreted HTML file.
Exploits web sites that allow an attacker to inject data into an application in
order to execute XPath queries. (XPath is a query language that describes
how to locate specific elements, such as attributes or processing
XPath
instructions in an XML document.)
Injection
In this type of attack, the attacker might be able to bypass authentication or
access information without needing proper authorization.
2. Insecure passwords
When user credentials are stored as plain-text documents without being
hashed and salted, they can be easily misused. Hashing and salting convert
passwords to cipher texts that are difficult to decipher.
3. Unsecure webpages
Web applications and cloud storage with misconfigured SSL/HTTPS
security protocols can lead to data being uploaded or downloaded without
any encryption. Such unencrypted data in transit can be easily intercepted
and exposed.
5. Misconfiguration errors
Applications' default permissions settings are meant for maximum
usability, not security. When administrators fail to update the settings
according to their data security requirements or miss security updates, it
can lead to data exposure.
Authentication Protocols:
Authentication protocols serve as the gatekeepers that validate a user's
identity before granting access. These protocols encompass various
methods such as passwords, biometrics, tokens, multi-factor authentication
(MFA), and cryptographic keys. The primary goal is to ensure that
individuals accessing a system are who they claim to be.
Types of Hackers:
White hat: A white hat hacker refers to a person who uses their hacking
ability to find security vulnerabilities in software, hardware, or networks.
A white hat hacker is different from a black hat hacker. Both black and
white hats hack systems, but white hat hackers do it solely for the
purposes of benefiting the organization for which they work.
Black hat: A black hat is a computer hacker who violates laws or typical
ethical standards for nefarious purposes, such as cybercrime, cyberwarfare
or malice.
Black hat hackers are criminals who break into computer networks with
malicious intent. They may also release malware that destroys files, holds
computers hostage, or steals passwords, credit card numbers, and other
personal information.
Black hats are motivated by self-serving reasons, such as financial gain,
revenge, or simply to spread havoc. Sometimes their motivation might be
ideological, by targeting people they strongly disagree with.
• Web Application:
Web application penetration testing is used to discover vulnerabilities or
security weaknesses in web-based applications. It uses different
penetration techniques and attacks with aims to break into the web
application itself.
The typical scope for a web application penetration test includes web
based applications, browsers, and their components such as ActiveX,
Plugins, Silverlight, Scriptlets, and Applets.
These types of tests are far more detailed and targeted and therefore are
considered to be a more complex test. In order to complete a successful
test, the endpoints of every web-based application that interacts with the
user on a regular basis must be identified.
This requires a fair amount of effort and time from planning to executing
the test, and finally compiling a useful report.
• Client Side:
Client side penetration testing is used to discover vulnerabilities or
security weaknesses in client side applications.
• Have all access points been identified and how many use poor encryption
methods?
• Is the data flowing in and out of the network encrypted and if so, how?
• Are there monitoring systems in place to identify unauthorized users?
• Is there any possibility the IT team could have misconfigured or duplicated a
wireless network?
• What are the current measures in place to protect the wireless network?
• Are all wireless access points using WPA protocol?
• Social Engineering:
Social engineering penetration testing is where a malicious actor attempts
to persuade or trick users into giving them sensitive information, such as a
username and password.
Common types of social engineering attacks used by pen testers include:
• Phishing Attacks
• Vishing
• Smishing
• Tailgating
• Imposters (i.e. Fellow Employees, External Vendors, or
Contractors)
• Name Dropping
• Pre-texting
• Dumpster Diving
• Eavesdropping
• Gifts
Why Should You Perform Social Engineering Tests?
According to recent statistics, 98% of all cyber-attacks rely on social
engineering. This is because internal users are one of the biggest threats
to a network’s security and due to how lucrative the scams are.
Social engineering tests and awareness programs have proven to be one
of the most effective methods of mitigating an attack.
For example, KnowBe4, the popular email phishing platform, simulates an
email phishing attack. When the user clicks on the link, they’re taken to a
page that informs them that it was a phishing test.
• Physical Penetration Testing:
Physical penetration testing simulates a real-world threat whereby a pen
tester attempts to compromise physical barriers to access a business’s
infrastructure, building, systems, or employees.
database.
2. SQL injection is one of the most common web hacking techniques.
3. SQL injection is the injection of malicious code into SQL statements
via web page input.
However, in the example below, the firewall blocks malicious traffic from
entering the private network, thereby protecting the user’s network from
being susceptible to a cyberattack.
This way, a firewall carries out quick assessments to detect malware and
other suspicious activities.
There are different types of firewalls to read data packets at different
network levels. Now, you will move on to the next section of this tutorial
and understand the different types of firewalls.
Why Are Firewalls Important?
Firewalls are designed with modern security techniques that are used in a
wide range of applications. In the early days of the internet, networks
needed to be built with new security techniques, especially in the client-
server model, a central architecture of modern computing. That's where
firewalls have started to build the security for networks with varying
complexities. Firewalls are known to inspect traffic and mitigate threats to
the devices.
Key Uses of Firewalls
➢ Firewalls can be used in corporate as well as consumer settings.
➢ Firewalls can incorporate a security information and event
management strategy (SIEM) into cybersecurity devices concerning
modern organizations and are installed at the network perimeter of
organizations to guard against external threats as well as insider
threats.
➢ Firewalls can perform logging and audit functions by identifying
patterns and improving rules by updating them to defend the
immediate threats.
➢ Firewalls can be used for a home network, Digital Subscriber Line
(DSL), or cable modem having static IP addresses. Firewalls can
easily filter traffic and can signal the user about intrusions.
➢ They are also used for antivirus applications.
➢ When vendors discover new threats or patches, the firewalls update
the rule sets to resolve the vendor issues.
➢ In-home devices, we can set the restrictions using
Hardware/firmware firewalls.
Advantages of Using Firewalls
Now that you have understood the types of firewalls, let us look at the
advantages of using firewalls.
➢ Firewalls play an important role in the companies for security
management. Below are some of the important advantages of using
firewalls.
➢ It provides enhanced security and privacy from vulnerable services.
It prevents unauthorized users from accessing a private network
that is connected to the internet.
➢ Firewalls provide faster response time and can handle more traffic
loads.
➢ A firewall allows you to easily handle and update the security
protocols from a single authorized device.
➢ It safeguards your network from phishing attacks.