Unit 5 Notes
Unit 5 Notes
Cyber Crime and Information Security – classifications of Cyber Crimes – Tools and
Methods – Password Cracking, Keyloggers, Spywares, SQL Injection – Network Access
Control – Cloud Security – Web Security – Wireless Security
• The above figure 5.24 Shows several categories of incidents – virus, insider
abuse, laptoptheft and unauthorized access to the system.
• Typical Network misuses for Internet Radio/ Streaming Audio, Streaming
Video, Filesharing, Instant messaging
• The term spamming is also applied to other media like in mobile text
messaging, socialnetworking spam. Example, sending unwanted email messages
• Spamming is an alteration of a document with the intent to deceive an electronic
catalog
5.2.3. Cyber Defamation
• The offense of injuring a person's character, fame, or reputation by false and
malicious statements.
• In the case of cyber defamation not only includes verbal or written
communications butalso includes statements made in cyberspace through the
internet.
• Libel is written defamation and Slander is Oral defamation.
• The law on defamation attempts to create a workable balance between two
equallyimportant human rights: Unimpaired Reputation & rights to freedom of
expressions.
• For example, Posting morphed photos on Social Networking Websites
5.2.4. Internet Time Theft
• Unauthorized person use Internet hours paid by another person
• Internet Theft comes under hacking, because the person get access to someone
else userID and Password
• It access the internet without other person’s knowledge
• One can identify time theft if the internet has to be recharged often For
example, whenemployees use internet for non purpose
5.2.5 Salami Attack
• A salami attack is a method of cybercrime that attackers or a hacker typically
used tocommit financial crimes.
• These attacks can be difficult to detect
• The goal of this type of attack is to steal small amounts of money from each
account overa long period of time
• For example, a thief might modify a financial application in order to round
down theamount of money being transferred from one account to another.
5.2.6 Data Diddling
• This Attack involves altering raw data before it is processed by a computer.
• Then changing it back after the process is completed.
• For example, Orging, misrepresenting, failure to enter data.
5.2.7 Forgery
• The term forgery usually describes a message related attack
against acryptographic digital signature scheme
• To fabricate a digital signature for a message without having access to the
respectivesigner's private signing key
• For example, Outside many colleges soliciting the sale of fake Certificates
and marksheets
5.2.8 Web Jacking
• It occurs when someone forcefully takes control of a website.
• By cracking the password and later changing it.
• For example, the site abc.com has move on another address.
5.2.9 Newsgroup Scam
• Newsgroup spam is a type of spam where the targets are Usenet(Use
network)newsgroups.
• Spamming of Usenet newsgroups pre-dates e-mail spam.
• Usenet convention defines spamming as "excessive multiple posting", that is,
therepeated posting of a message
• For example, Usenet Spam titled: this world history is coming to end
5.2.10 Industrial Spying
• It refers to the illegal and unethical theft of business trade secrets for use by a
competitorto achieve a competitive advantage
• This activity is often done by an insider or an employee, intends towards
spying andstealing information for a competitor
• Theft of intellectual property, such as manufacturing processes, chemical
formulas,recipes, techniques, or ideas.
5.2.11 Hackers
• Hackers use or write readymade computer programs to attack target computers.
• Their desire is to destruct the computer/network
• Hackers hack for personal monetary gains, such as stealing information,
transferringamount from various account to their own.
• For example, NASA site was hacked by SQL Injection
5.2.12 Online Frauds
• The Purpose of this website is to make the user to enter personal information for
accessing business and bank account
• Fraudsters are increasingly turning to E-Mail to generate traffic to these websites.
• Customers who receive such Emails usually contains a link to Spoof website,
misleaduser to enter ids & Passwords
• For example, Online fraud in banking and Financial Sector
5.2.13 Pornographic Offenses
• Any photograph that to be considered as an obscene
• Computer generated video or image of sexually explicit conduct
• Child Pornography is considered as offense
• For example, chatting with a fifteen-year-old girl over the Internet, then
suggesting ameeting is illegal conduct
5.2.14 Software Piracy
• Software Piracy is the illegal approach of copying, distributing, modifying,
selling, orusing the software which is legally protected.
• Software piracy is the act of stealing legal software in an illegal way.
• This software piracy refers to the unauthorized copy and use of legal software.
• For example, Hard disk loading, Client-server overuse.
5.2.15 Computer Sabotage
• Sabotage is the deliberate damage to equipment
• The use of internet to hinder the normal functioning of a computer system
through theintroduction of worms or Virus.
• To promote the illegal activities of a terrorists or steal data.
• Email bomb is a form of net abuse that sends large volumes of email to an
address tooverflow the mailbox
• It tends to Denial-of-service (DoS) attack
• The aim is to fill up the recipient's disk space on the server or overload a server
to stop itfrom functioning.
• For example, to inhibit a server by sending a massive number of emails to a
specificperson or system.
5.2.17 Computer Network Intrusion
• Hackers can break into computer systems from anywhere in the world and steal data
• The Cracker (Hacker) bypass existing password protection by creating a
program tocapture logon IDs and password.
• For Example, Man in the Middle Attack
5.2.18 Password Sniffing
• Password sniffing is an attack on the Internet that is used to steal user
names andpasswords from the network
• It monitors and record the name and password of user from the network as they login
• For example, Sniffer can then act like an authorized user and login to access
restricteddocuments.
checking for default login, attacker are able to access a user account without
privileges, attempts to get an administrator or root access
Table : Website and Tools used for finding vulnerabilities
4. Capturing the Network the attacker aims to own the network, the attacker install
set of tools that replace existing files or services with Trojan horse that have a
backdoorpassword. There are number of hacking tools that can clean login files,
Such tool provides copies of system file that act and look like a real thing makes
the attacker backdoor entry into a system and hide the process be running on the
system. The attackercapture the network and gain access to the system.
5. Grab the Data the attacker capture the network and takes advantage of position
to steal confidential data (Credit card information), alter processes and launch
attacks at other sites from the network, causing an embarrassing situation for an
Organization.
6. Covering Tracks It is the last step in any cyber attacks, refers to activity taken
by the attacker to extend the misuse of system without being detected. The attacker
remains undetected and remove evidence of hacking , avoid legal action.
SI.NO Website Description
1. http://www.ibt.ku.dk/jesper/ELSave/ ELSave: Tool used to save
and/or clear an NT Event
Log. The executable is
available on Weblink
2. http://ntsecuriy.nu/toolbox/winzapper/ WinZapper: Tool enables to
erase event records. This
program corrupts even logs
3. http://www.eveidence- Evidence Eliminator: PC
eliminator.com/ Cleaning Program.
Evidence eliminator
permanently wipes out
evidence
4. http://www.traceless.com/computer- Traceless: Privacy Cleaner
forensics/ for Internet
Explorer(IE)that can delete
common Internet
Tracks(Cache, History)
5. http://www.acesoft.net/ Tracks Eraser Pro: Deletes
cookies of IE,Opera,
Internet History files, IE
Plugins
• A client connects to the proxy server, requesting some service, such as a file,
connection, web page, or other resource available from a different server and the
proxy serverevaluates the request as a way to simplify and control its complexity.
• Using a proxy server attacker can hide ID.
• The Proxy server has following Purposes:
✓ Keep the system behind the curtain
✓ Speedup access to resource
✓ Used to filter unwanted content such as Advertisements
✓ It can used as IP address multiplexer to connect number of
computers onthe Internet
Advantages:
• In Proxy server the cache memory serve all users.
• If one or more website are requested frequently by different users to be in
proxy’s cachememory.
• Special Servers available known as Cache
Servers.List of free proxy servers can found:
1. https://www.proxy4free.co
m 2.https://www.proxz.com
3.https://www.surf24h.com
4.https://www.publicproxyser
ver.com
Anonymizer
• Attempts to make activity on the Internet is untraceable.
• It protects personal information by hiding the source computer’s identifying
information.
• Used to make web surfing anonymous by utilizing a website that act as a proxy
server forthe web client.
• The Anonymizer removes all the identifying information from user’s computer
while theuser surfs on the internet.
• Listed are few websites where more information about the anonymizer:
1. https://www.anonymizer.com
2. https://www.anonymize.net
3. https://www.anonymouse.ws
5.3.3 Phishing
• User finds a message from the bank threatening to close the bank accounts if
does notreply immediately.
• The message seems to be suspicious from the contents of the message, it is
difficult toconclude that it is a fake E - mail.
• In addition to steal the data, also infect the system with viruses.
• The messages look authentic and reveal their personal information.
• For example, the user may find some messages like the lottery winner. When the
user clicks on the attachment the malicious code activates that can access sensitive
information details.
How Phishing works?
1. Planning: Phishers (Criminals) decide the target and determine how to get the E
– mailaddress of that target. It uses Mass mailing and address collection techniques as
spammers.
2. Setup: Once phishers knows which business to spoof, they will create methods for
deliveringmessages and to collect data about the target.
3. Attack: The phisher sends a phony message that appears to be from a reputable source.
4.Collection: Phishers record the information of victims entering into webpages or
pop – upwindows.
5. Identify Theft and Fraud: Phishers use the information that they have gathered to
commitfraud.
• When a victim client connects to the fraudulent server, the MITM server intercepts
the call, hashes the password and passes the connection to the victim server (e.g.,
an attacker within reception range of an unencrypted Wi-Fi wireless access point
can insert himselfas a man-in-the-middle).
• This type of attack is used to obtain the passwords for E-Mail accounts on public
websites such as Yahoo, Hotmail and Gmail and can also used to get the passwords
for financial websites that would like to gain the access to banking websites.
Table: Password Cracking Tools
5.4.2 Offline Attacks
• Mostly offline attacks are performed from a location other than the target
where thesepasswords reside or are used.
• Offline attackers usually require physical access to the computer and copying
thepassword file on to the removable media.
• Different types of offline password attacks are described and Few tools listed
in Tablealso use these techniques to get the password in the clear text format.
1.Passwords and user logon identities (Ds) should be unique to each authorized
users.
2.Passwords should consist of a minimum of eight alphanumeric characters.
3. There should be computer-controlled lists of prescribed password rules and
periodic testing (eg. Letter,phrases and number sequences, character repetition,
initials, common words and standard names) to identity any password weaknesses.
4. Passwords should be kept private, that is, not shared with friends, colleagues etc.
Similarly, netizens should practice password guidelines to avoid being victim of getting their
personal E-Mail accounts hacked/attacked by the attackers.
1. Passwords used for business EMail accounts, personal EMail accounts
(Yahoo/Hotmail/Gmail) and banking financial user accounts (eg, online banking/
securities trading accounts) should be kept separate.
Spywares
• Spyware is a type of malware that is installed on computers which collects
information about users without their knowledge.
• The presence of Spyware is typically hidden from the user; it is secretly installed
on the user's personal computer.
• It is clearly understood from the term Spyware that secretly monitors the user. The
features and such Spywares are beyond simple monitoring,
• Spyware programs collect personal information about the victim, such as the
Internet surfing habits/patterns and websites visited.
• The Spyware may also have an ability to change computer settings, showing of
response time chat may result into user complaining about the Internet speed
connection with Interact Service Provider (ISP).
• Various Spyware are available in the marker and the one chat are popular are listed
in Table
5.6 SQL Injection
• SQL Injection is a code-based vulnerability that allows an attacker to read and
access sensitive data from the database.
• Attackers can bypass security measures of applications and use SQL queries to
modify, add, update, or delete records in a database.
• A successful SQL injection attack can badly affect websites or web applications
using relational databases such as MySQL, Oracle, or SQL Server.
• Attackers target the SQL servers common database servers used by many
organizations to store confidential data.
• The prime objective behind SQL injection attack is to obtain the information while
accessing a database table that may contain personal information such as credit card
numbers, social security numbers or passwords.
• During an SQL injection attack, Malicious Code is inserted into a web formfield or
the website's code to make a system execute a command shell or other arbitrary
commands.
• Just as a legitimate user enters queries and additions to the SQL database via a web
form, the attacker can insert commands to the SQL server through the same web
form field.
1. Blah' or 1-1-
2. Login:blah' or 1-1-
3. Password::blah or 1=1-
4. http://search/index.asp?id=blah or 1-1-
Similar SQL commands may allow bypassing of a login and may return many rows in a
table or even an entire database table because the SQL server is interpreting the terms
literally. The double dashes near the end of the command tell SQL to ignore the rest of the
command as a comment.
Blind SQL Injection
• Blind SQL injection is used when a web application is vulnerable to an SQL
injection butthe results of the injection are not visible to the attacker.
• The page with the vulnerability may not be the one that displays data: however, it
will display differently depending on the results of a logical statement injected into
thelegitimate SQL statement called for that page.
• This type of attack can become time-intensive because a new statement must be
crafted for each bit recovered.
• There are several tools that can automate these attacks once the locationof the
vulnerability and the target information have been established.
Additional Useful Web References, Further Reading to know about white
paper.In summary, using SQL injections, attackers can:
1. Obtain some basic information if the purpose of the attack is reconnaissance
✓ To get a directory listing: Blah' exec master..xp_cmdshell "dir c:\".
/s
>c:\directory.txt";
✓ To ping an IP address: Blah' ;exec master..xp_cmdshell "pi
ng192.168.1.1".
2. May gain access to the database by obtaining username and their password
✓ To get a user listing: SELECT FROM users WHERE name =
"OR 'I'="T".""
3. Add new data to the database
✓ Execute the INSERT command: This may enable selling
politicallyincorrect items on an E-Commerce website.
• Some tools are required that can provide the visibility, access control, and
compliancecapabilities to strengthen the network security infrastructure.
• A NAC system can deny network access to non-compliant devices or give
them onlyrestricted access to computing resources.
Responsibilities:
• It allows only compliant, authenticated devices to access network resources
andinfrastructure.
• It controls and monitors the activity of connected devices on the network.
• It provides the availability of network resources of private organizations.
• It regulates the access of network resources to the users.
Benefits:
• Users can be required to authenticate via multi-factor authentication, which is
muchmore secure than identifying users based on IP addresses or username and
password combinations.
• It provides additional levels of protection around individual parts of the network.
Limitations:
• It has low visibility in IoT devices and devices with no specific users associated with
it.
• It does not protect from threats present inside the network.
• It may not work for organizations if it is not compatible with existing security
controls.
5.16.2 Principle Elements of NAC (Network Access Control):
There are mainly three principle elements of NAC which are:
• However, even individual cloud clients could benefit from valuing safe user
behavior policies and training.
Data retention (DR) and business continuity (BC) planning
• Involve technical disaster recovery measures in case of data loss. Central to any DR
and BC plan are methods for data redundancy such as backups.
• Additionally, having technical systems for ensuring uninterrupted operations can
help. Frameworks for testing the validity of backups and detailed employee
recovery instructions are just as valuable for a thorough BC plan.
Legal compliance
• Revolves around protecting user privacy as set by legislative bodies.
• Governments have taken up the importance of protecting private user information
from being exploited for profit.
• One approach is the use of data masking, which obscures identity within data via
encryption methods.
5.17.2 Cloud security risks
✓ Risks of cloud-based infrastructure including incompatible legacy IT
frameworks, and third-party data storage service disruptions.
✓ Internal threats due to human error such as misconfiguration of user access controls.
✓ External threats caused almost exclusively by malicious actors,
suchas malware, phishing, and DDoS attacks.
✓ Misconfiguration Cloud settings keep growing as providers add more services
over time.Many companies are using more than one provider.
5.17.3 How to Secure the Cloud
• Encryption is one of the best ways to secure your cloud computing systems. There
are several different ways of using encryption, and they may be offered by a cloud
provideror by a separate cloud security solutions provider:
✓ Communications encryption with the cloud in their entirety.
✓ Particularly sensitive data encryption, such as account credentials.
✓ End-to-end encryption of all data that is uploaded to the cloud.
• Configuration is another powerful practice in cloud security. Many cloud data
breaches come from basic vulnerabilities such as misconfiguration errors. By
preventing them, youare vastly decreasing your cloud security risk.
• Here are a few principles you can follow:
▪ Never leave the default settings unchanged. Using the default
settings gives a hacker front-door access. Avoid doing this to
complicate a hacker’s path into your system.
▪ Never leave a cloud storage bucket open. An open bucket could
allow hackers to see the content just by opening the storage bucket's
URL.
▪ If the cloud vendor gives you security controls that you can
switch on, use them. Not selecting the right security options can put
you at risk.
• if you want to be as secure as possible online:
a. Use strong passwords. Including a mix of letters, numbers and special
characters will make your password more difficult to crack. The more
random your strings are, the better.
b. Use a password manager. You will be able to give each application,
database, and service you use separate passwords, with a strong primary
password.
c. Protect all the devices you use to access your cloud data, including
smartphones and tablets. If your data is synchronized across numerous
devices, any one of them could be a weak link putting your entire digital
footprint at risk.
d. Back up your data regularly cloud outage or data loss at your cloud
provider, you can restore your data fully. That backup could be on your
home PC, on an external hard drive, or even cloud-to-cloud.
e. Modify permissions to prevent any individual or device from having access
to allyour data unless it is necessary. If you have a home network, use guest
networks for your children, for IoT devices, and for your TV.
f. Protect yourself with anti-virus and anti-malware software. Hackers
can access your account easily if malware makes its way into your system.
g. Avoid accessing your data on public Wi-Fi, particularly if it doesn't use
strong authentication. However, use a virtual private network (VPN) to
protect yourgateway to the cloud.