UNIT-2 Cybersecurity Complete Notes
UNIT-2 Cybersecurity Complete Notes
KA
US
HA
L
KI
SH
OR
Cyber Security
Unit-2
CyberCrime
Mobile and wireless devices are like digital companions that don't need
a physical connection to work. They include smartphones, tablets, and
other g a d g e t s t h a t c o m m u n i c a t e wirelessly, allowing users to
s t a y connected and access information on the go.
Features:
1. Portability: These devices are small and easy to carry, allowing
users to stay connected wherever they go.
OR
2. Wireless Connectivity: They use technologies like Wi-Fi,
Bluetooth, and mobile networks to connect to the internet and
other devices. SH
KI
3. Multifunctionality: Beyond c a l l s and messages, they serve
as cameras, GPS devices, entertainment hubs, and more.
L
HA
Common Examples:
US
Importance:
1. Communication: Keeping people connected through calls,
messages, and social media.
2. Information Access: Providing instant access to the internet for
information, news, and entertainment.
3. Productivity: Enabling work and productivity on the go through
various apps and functionalities.
Example: Think of your smartphone as a pocket-sized computer. It's not
just for making calls; it's your camera, map, music player, and more.
Mobile and wireless devices have become essential in our daily lives,
offering convenience and connectivity beyond what traditional devices
can provide.
OR
Key Factors:
1. Technological Advancements: Continuous improvements in
SH
technology make devices more affordable and accessible.
KI
2. Increased C o n n e c t i v i t y : The rise o f high-speed internet
and wireless networks enables seamless communication.
3. Versatility: Mobile devices o ff e r a variety o f functions, f r o m
L
HA
access.
DR
Impact:
1. Global C o n n e c t i v i t y : People worldwide can connect
instantly, transcending geographical boundaries.
2. Digital Transformation: The way we communicate, work, and
access information has undergone a significant shift.
3. Business and Innovation: The proliferation of devices has spurred
innovations in app development, services, and digital solutions.
Challenges:
1. Security Concerns: With more devices in use, there's an increased
risk of cybersecurity threats and privacy issues.
2. Digital Divide: Disparities in access t o mobile technology c a n
create inequalities in information and opportunities.
3. Dependency: Over R e l i a n c e o n m o b i l e d e v i c e s may
i m p a c t face-to-face interactions and physical activities.
Trends in Mobility:
1. 5G Revolution: The 5G Revolution is like the superhero of internet
speed. It's the fth generation of mobile networks, bringing faster speeds
and more reliable connections to mobile and wireless devices.
Impact:
● High-Speed C o n n e c t i v i t y : Faster i n t e r n e t s p e e d s f o r
quicker downloads and smoother streaming.
● IoT Advancements: Enables better connections for the Internet of
OR
Things (IoT) devices.
SH
2. Mobile App Ecosystem: The Mobile App Ecosystem is like a digital
KI
marketplace. It encompasses the diverse range of applications available
for download on mobile devices.
L
HA
Impact:
US
Impact:
● Biometric Authentication: Fingerprint and facial recognition for
enhanced device security.
● Mobile Device Management (MDM): Tools for businesses to secure
and manage mobile devices.
4. Edge Computing: Edge Computing is like having a mini-brain in your
device. Instead of relying solely on a centralised server, computations
happen closer to the source of data.
Impact:
● Reduced Latency: Faster response t i m e s for applications
a n d services.
● Improved P r i v a c y : Processing s e n s i t i v e d a t a locally
w i t h o u t sending it to a central server.
OR
or immersing into the real world, enhancing user experiences.
Impact: SH
KI
● Enhanced User Engagement: AR adds digital elements to the real
world, while VR creates immersive environments.
L
and education.
US
Impact:
● Flexibility: Allows professionals to work from different locations.
● Virtual Meetings: Increased reliance on mobile devices for virtual
collaboration.
Credit Card Frauds in Mobile: Credit Card Frauds in Mobile are like
digital heists targeting your nancial information on mobile devices. It
involves unauthorised access to credit card details, leading to nancial
losses and potential identity theft.
OR
Common Techniques:
SH
1. Phishing: Fraudsters use fake messages or emails to trick users
into revealing credit card information.
KI
2. Mobile M a l w a r e : Malicious s o f t w a r e on m o b i l e
devices can capture credit card details.
L
Preventive Measures:
DR
1. Use Trusted Apps: Only download apps from official app stores to
avoid fake applications.
2. Secure Wi-Fi: Avoid sensitive t r a n s a c t i o n s on p u b l i c
W i -Fi networks; use secure connections.
3. Two-Factor Authentication: Enable additional layers of security
for mobile transactions.
4. Regular Monitoring: Keep a close eye on credit card statements for
any unauthorised transactions.
Impact:
1. Financial L o s s : Unauthorized transactions c a n l e a d to
d i r e c t monetary losses.
2. Identity Theft: Stolen credit card information may be used for
identity theft.
3. Credit Score Impact: Fraudulent activities can negatively impact
credit scores.
Example: Imagine receiving a message that looks like it's from your
bank, asking for your credit card details to resolve an issue. If you
provide this information, you've fallen victim to Credit Card Frauds in
Mobile. It's crucial to stay vigilant, verify messages, and adopt secure
practices to protect your nancial information on mobile devices.
OR
Wireless Computing Era: The Wireless Computing Era is like a
technological revolution, marking a shift from traditional wired
SH
connections to a world where computing devices communicate and
KI
connect wirelessly.
L
Key Elements:
HA
Characteristics:
1. Mobility: Computing devices can be used and moved without the
constraints of physical cables.
2. Instant Connectivity: Devices can connect to the internet and
each other instantly, enhancing communication.
3. Ubiquitous Access: Information and applications are accessible
from almost anywhere, fostering a connected environment.
Technological Enablers:
1. 5G Technology: High-speed, low-latency wireless networks
supporting advanced applications.
2. IoT Integration: Interconnected devices, from smart homes to
industrial sensors, communicating wirelessly.
3. Edge Computing: Processing data closer to the source, reducing
reliance on centralised servers.
Impact on Society:
1. Digital Transformation: Changing the way businesses operate,
communicate, and deliver services.
2. Remote Work Revolution: Allowing individuals to work from
OR
anywhere, transforming traditional workspaces.
SH
3. Smart Living: Integration of wireless technologies in homes,
making them smart and connected.
KI
OR
Challenge: Mobile devices are small and portable, making them easy
targets for theft or misplacement. If not secured, sensitive information
can be accessed. SH
KI
Mitigation:
L
authentication methods.
US
2. Malicious Apps:
DR
Mitigation:
● Official App Stores: Download apps only from trusted sources like
Google Play or the Apple App Store.
● App P e r m i s s i o n s : Review a n d l i m i t app p e r m i s s i o n s
to t h e essentials.
3. Phishing Attacks:
Challenge: Mobile users may fall victim to phishing attempts through
fraudulent emails, messages, or websites seeking personal information.
Mitigation:
● User E d u c a t i o n : Train u s e r s to identify and a v o i d
p h i s h i n g attempts.
● Security Software: Use mobile security apps to detect and block
phishing threats.
OR
devices to potential eavesdropping and data interception.
Mitigation:
SH
KI
● Use VPNs: Employ Virtual Private Networks for secure data
transmission.
L
● Avoid P u b l i c W i -Fi
HA
on u n s e c u r e d networks.
KA
5. Outdated Software:
DR
Mitigation:
● Regular Updates: Keep both the operating system and apps up to
date.
● Automatic Updates: Enable automatic updates for added
convenience.
6. Jailbreaking or Rooting:
Challenge: Jailbreaking (iOS) or rooting (Android) devices to remove
restrictions can expose them to malicious software and compromise
security.
Mitigation:
● Avoid Jailbreaking or Rooting: Discourage users from bypassing
device security features.
● Mobile Device Management (MDM): Implement MDM solutions to
monitor and control device Configuration.
7. Lack of Encryption:
OR
Challenge: Unencrypted data t r a n s m i s s i o n and storage can lead
SH
to unauthorised access and data breaches.
KI
Mitigation:
● Enable Encryption: Encrypt both data at rest and during
L
transmission.
HA
transfer.
KA
Mitigation:
● BYOD Policies: Implement a n d e n f o r c e c l e a r B Y O D
security policies.
● Containerization: Use containerization solutions to segregate work
and personal data on devices.
9. Social Engineering:
Challenge: Cybercriminals may exploit human psychology to manipulate
users into revealing sensitive information.
Mitigation:
● User Education: Train users to recognize and resist social
engineering tactics.
● Multi-Factor Authentication: Implement additional
authentication layers for added security.
Mitigation:
OR
● Training Programs: Conduct regular security awareness training
for users.
SH
● Communication: Keep users informed about emerging threats and
KI
best practices.
L
HA
2. Biometric Authentication:
● Purpose: Enhances device s e c u r i t y with f i ngerprint or
f a c e recognition.
● Configuration: - Settings > Face ID & Passcode (or Touch ID &
Passcode)
3. Find My iPhone:
● Purpose: Allows tracking and remote wiping of a lost or stolen
device.
● Configuration: - Settings > [Your Name] > Find My > Find My
iPhone
4. App Permissions:
● Purpose: Control which apps have access to sensitive data.
● Configuration: - Settings > Privacy > [App Name]
OR
5. Automatic Updates:
SH
● Purpose: Ensures the device is running the latest security patches.
KI
● Configuration: - Settings > General > Software Update
L
HA
US
Android:
1. Screen Lock:
KA
2. Biometric Authentication:
● Purpose: Enhances d e v i c e s e c u r i t y with f i ngerprint or
facial recognition.
● Configuration: - Settings > Security > Biometrics
3. Find My Device:
● Purpose: Allows tracking and remote wiping of a lost or stolen
device.
● Configuration: - Settings > Security > Find My Device
4. App Permissions:
● Purpose: Control which apps have access to sensitive data.
● Configuration: - Settings > Apps & Notifications > [App Name] >
Permissions
6. Automatic Updates:
Purpose: Ensures the device is running the latest security patches.
Configuration: - Settings > System > Software Update
OR
Note: SH
KI
● For enterprise e n v i r o n m e n t s , M o b i l e Device Management
(MDM) solutions can be used to enforce security policies and
remotely manage devices.
L
HA
minimise risks.
DR
These settings may vary slightly based on the device model and
operating system version. It’s crucial to stay updated on the latest
security features and recommendations provided by the device
manufacturers.
OR
Implementation:
SH
● Combine something the user knows (password) with something
KI
they have (token, mobile device, ngerprint).
L
unique passwords.
KA
Implementation:
● Enforce password complexity (length, special characters).
DR
3. Encryption:
Purpose: Protects s e n s i t i v e d a t a transmitted between
u s e r s a n d authentication servers.
Implementation:
● Use strong encryption protocols (e.g., TLS/SSL) for data in transit.
● Hash and salt passwords before storing them.
4. Session Management:
Purpose: Prevents unauthorised access during an active session.
Implementation:
● Implement session timeout policies.
● Use secure session tokens.
● Provide users the ability to log out remotely.
OR
Implementation:
● Implement account lockout policies after a certain number of failed
login attempts. SH
KI
● Use CAPTCHA or similar mechanisms to deter automated attacks.
L
Implementation:
KA
Implementation:
● Keep detailed logs of authentication attempts, including successful
and failed events.
● Regularly review and analyse authentication logs.
8. Monitoring for Anomalies:
Purpose: Detects unusual or suspicious behaviour that m a y indicate
unauthorised access.
Implementation:
● Implement real-time monitoring for unusual login patterns.
● Set up alerts for multiple failed login attempts or other suspicious
activities.
9. API Security:
Purpose: Ensures that authentication APIs is secure and not vulnerable
to attacks.
OR
Implementation:
SH
● Use secure API authentication methods (e.g., OAuth).
KI
● Regularly test and update API security measures.
L
HA
Implementation:
DR
Implementation:
● Provide regular security awareness training.
● Communicate best practices for protecting personal information.
12. Regulatory Compliance:
Purpose: Ensures adherence t o relevant dat a protection a n d privacy
regulations.
Implementation:
● Stay informed about and compliant with regulations such as GDPR,
HIPAA, or others applicable to your region or industry.
OR
Attacks on Mobile/Cell SH
Phones: Mobile phones are susceptible
KI
to various types of attacks, ranging from traditional malware to
more sophisticated social engineering tactics. Here are some common
L
How to Protect:
● Install reputable antivirus and anti-malware apps.
● Download apps only from official app stores.
● Keep the device's operating system and apps updated.
2. Phishing Attacks: Attempts to trick users into revealing sensitive
information by posing as a trustworthy entity.
How to Protect:
● Be cautious o f unsolicited e m a i l s , messages, o r calls asking for
personal information.
● Verify the legitimacy of websites before entering credentials.
OR
How to Protect:
● Use secure Wi-Fi connections or VPNs.
SH
● Be cautious when connecting to public Wi-Fi networks.
KI
How to Protect:
KA
u n k n o w n attachments.
How to Protect:
● Set up a PIN or password for SIM card changes.
● Contact your mobile c a r r i e r immediately i f y o u
e x p e r i e n c e unexpected loss of service.
How to Protect:
● Regularly review installed apps and permissions.
● Use security software that scans for spyware.
OR
unencrypted Wi-Fi traffic to capture sensitive information.
SH
KI
How to Protect:
● Use secure, encrypted Wi-Fi connections.
L
security.
DR
How to Protect:
● Be sceptical of unsolicited communication asking for sensitive
information.
● Educate yourself and others about common social engineering
tactics.
How to Protect:
● Review and limit app permissions.
● Only install apps from reputable sources.
11. USB Charging Port Attacks: Malicious USB charging stations or
cables that can install malware when connected to a device.
How to Protect:
● Avoid using public charging stations.
● Use only trusted charging cables and adapters.
How to Protect:
● Use secure and updated browsers.
OR
● Download apps only from official app stores.
SH
KI
Ensuring mobile security requires a combination of user awareness,
adopting best practices, and utilising security features and tools
provided by the mobile operating system. Regularly updating devices
L
HA
OR
4. Denial-of-Service (DoS) Attacks: Overwhelming a system with
traffic to make it unavailable to legitimate users.
SH
KI
5. Supply Chain Attacks: Compromising vendors or suppliers to
gain access to an organisation's systems and data.
L
HA
OR
SH
1. Implement a Mobile Device Management (MDM) Solution: MDM
software provides centralised control over mobile devices, enabling IT
KI
administrators to conjure settings, enforce security policies, and
remotely manage devices.
L
HA
OR
● Employee training and awareness: Educate employees on the
policy and its implications. SH
KI
3. Implement Mobile T h r e a t D e f e n s e (MTD) Solutions:
MTD software provides real-time protection against mobile threats,
L
HA
OR
SH
5. Promote Mobile Device Security Awareness: Educating employees
about mobile security risks and best practices is crucial for preventing
KI
human error.
L
HA
OR
SH
KI
L
OR
real-time protection against mobile threats, such as malware, phishing
attacks, and malicious websites. Key features of MTD include:
● Threat detection and SH
prevention: Block malicious
KI
applications, websites, and phishing attempts.
● Vulnerability assessment: Identify and remediate
L
OR
● Optimise applications for mobile usage
● Encourage breaks and digital detox
● Promote mobile-friendly work practices
SH
KI
L
HA
US
KA
DR