Unit 3 Information Security and Cyber Laws
Unit 3 Information Security and Cyber Laws
Unit: 3
What is cyber warfare?
Cyber warfare is the use of digital attacks to attack a nation, causing comparable
harm to actual warfare and/or disrupting the vital computer systems.
However, there has been some debate among experts regarding what acts
specifically qualify as cyber warfare. While the United States Department of
Defense (DOD) states that the use of computers and the internet to conduct warfare
in cyberspace is a threat to national security, why certain activities qualify as
warfare, while others are simply cybercrime, is unclear.
Although cyber warfare generally refers to cyber attacks perpetrated by one nation-
state on another, it can also describe attacks by terrorist groups or hacker groups
aimed at furthering the goals of particular nations. While there are a number of
examples of suspected cyber warfare attacks in recent history, there has been no
formal, agreed-upon definition for a cyber act of war, which experts generally agree
would be a cyber attack that directly leads to loss of life.
infrastructure.
Distributed denial-of-service (DDoS) attacks that prevent legitimate users
businesses.
Spyware or cyber espionage that results in the theft of information that
ping is used to verify whether or not a network data packet can be distributed
to an IP address without errors. Ping scans are internet control message
protocol (ICMP) requests and send out an automated blast of several ICMP
requests to different servers to bait responses. IT administrators may use this
technique to troubleshoot, or disable the ping scan by using a firewall —
which makes it impossible for attackers to find the network through pings.
Half-open or SYN scans: A half-open scan, or SYN (short for synchronize)
scan, is a tactic that attackers use to determine the status of a port without
establishing a full connection. This scan only sends a SYN message and
doesn‘t complete the connection, leaving the target hanging. It‘s a quick and
sneaky technique aimed at finding potential open ports on target devices.
XMAS scans: XMAS scans are even quieter and less noticeable by firewalls.
For example, FIN packets are usually sent from server or client to terminate a
connection after establishing a TCP 3-way handshake and successful transfer
of data and this is indicated through a message ―no more data is available
from the sender.‖ FIN packets often go unnoticed by firewalls because SYN
packets are primarily being looked for. For this reason, XMAS scans send
packets with all of the flags — including FIN — expecting no response, which
would mean the port is open. If the port is closed, a RST response would be
received. The XMAS scan rarely shows up in monitoring logs and is simply a
sneakier way to learn about a network‘s protection and firewall.
Trojan Horses
Unlike a computer virus or a worm – the trojan horse is a non-replicating program
that appears legitimate. After gaining the trust, it secretly performs malicious and
illicit activities when executed. Hackers make use of trojan horses to steal a user‘s
password information, destroy data or programs on the hard disk. It is hard to
detect!
Spyware/Adware
Spyware secretly records information about a user and forwards it to third parties.
The information gathered may cover files accessed on the computer, a user‘s online
activities or even user‘s keystrokes.
Adware as the name interprets displays advertising banners while a program is
running. Adware can also work like spyware, it is deployed to gather confidential
information. Basically, to spy on and gather information from a victim‘s computer.
Rootkit
A rootkit is a malicious software that alters the regular functionality of an OS on a
computer in a stealthy manner. The altering helps the hacker to take full control of
the system and the hacker acts as the system administrator on the victim‘s system.
Almost all the rootkits are designed to hide their existence.
What is Session Hijacking?
Session hijacking, also known as TCP session hijacking, is a method of taking over
a web user session by surreptitiously obtaining the session ID and masquerading as
the authorized user. Once the user's session ID has been accessed, the attacker can
masquerade as that user and do anything the user is authorized to do on the
network.
One of the most valuable byproducts of this type of attack is the ability to gain
access to a server without having to authenticate to it. Once the attacker hijacks a
session, they no longer have to worry about authenticating to the server as long as
the communication session remains active. The attacker enjoys the same server
access as the compromised user because the user has already authenticated to the
server prior to the attack.
What Do Attackers Gain from Session Hijacking?
When cybercriminals have hijacked a session, they can do virtually anything that
the legitimate user was authorized to do during the active session. The most severe
examples include transferring money from the user‘s bank account, buying
merchandise from web stores, accessing personally identifiable information (PII)
for identity theft, and even stealing data from company systems.