UNIT-1 Notes
UNIT-1 Notes
UNIT-I
Chapter 1: Introduction to Cyber Space
The World Wide Web was invented in 1989 by the English physicist Tim Berners-Lee, now
the Director of the World Wide Web Consortium, and later assisted by Robert Cailliau, a
Belgian computer scientist, while both were working at CERN in Geneva, Switzerland. In
1990, they proposed building a "web of nodes" storing "hypertext pages" viewed by
1
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
Evolution of Internet
The Internet was the result of some visionary thinking by people in the early 1960s who saw
great potential value in allowing computers to share information on research and development
in scientific and military fields. J.C.R. Licklider of MIT first proposed a global network of
computers in 1962 and moved over to the Defense Advanced Research Projects Agency
(DARPA) in late 1962 to head the work to develop it. Leonard Kleinrock of MIT and later
UCLA developed the theory of packet switching, which was to form the basis of Internet
connections. Lawrence Roberts of MIT connected a Massachusetts computer with a California
computer in 1965 over dial-up telephone lines. It showed the feasibility of wide area
networking, but also showed that the telephone line's circuit switching was inadequate.
Kleinrock's packet switching theory was confirmed. Roberts moved over to DARPA in 1966
and developed his plan for ARPANET. These visionaries and many more left unnamed here
are the real founders of the Internet.
The Internet, then known as ARPANET, was brought online in 1969 under a contract let by
the renamed Advanced Research Projects Agency (ARPA) which initially connected four
major computers at universities in the southwestern US (UCLA, Stanford Research Institute,
UCSB, and the University of Utah). The contract was carried out by BBN of Cambridge, MA
under Bob Kahn and went online in December 1969. By June 1970, MIT, Harvard, BBN, and
Systems Development Corp (SDC) in Santa Monica, Cal. were added. By January 1971,
Stanford, MIT's Lincoln Labs, Carnegie-Mellon, and Case-Western Reserve U were added. In
months to come, NASA/Ames, Mitre, Burroughs, RAND, and the U of Illinois plugged in.
After that, there were far too many to keep listing here. The Internet was designed to provide a
2
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
communications network that would work even if some of the major sites were down. If the
most direct route was not available, routers would direct traffic around the network via alternate
routes. The early Internet was used by computer experts, engineers, scientists, and librarians.
There was nothing friendly about it. There were no home or office personal computers in those
days, and anyone who used it, whether a computer professional or an engineer or scientist or
librarian, had to learn to use a very complex system.
E-mail was adapted for ARPANET by Ray Tomlinson of BBN in 1972. He picked the @
symbol from the available symbols on his teletype to link the username and address. The telnet
protocol, enabling logging on to a remote computer, was published as a Request for Comments
(RFC) in 1972. RFC's are a means of sharing developmental work throughout community. The
ftp protocol, enabling file transfers between Internet sites, was published as an RFC in 1973,
and from then on RFC's were available electronically to anyone who had use of the ftp protocol.
Applications of internet
3
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
We can roughly separate internet applications into the following types: online media, online
information search, online communications, online communities, online entertainment, e-
business, online finance, and other applications. The internet is treated as one of the biggest
invention. It has a large number of uses.
1. Communication
2. Job searches
3. Finding books and study material
4. Health and medicine
5. Travel
6. Entertainment
7. Shopping
8. Stock market updates
9. Research
10. Business use of internet: different ways by which internet can be used for
business are:
I. Information about the product can be provided can be provided online to the
the customer .
II. Provide market information to the business
III. It help business to recruit talented people
IV. Help in locating suppliers of the product
V. Fast information regarding customers view about companies product
VI. Eliminate middle men and have a direct contact with contact with customer
VII. Providing information to the investor by providing companies background
and financial information on website.
4
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
your messages can get to any other computer that’s online and willing to communicate with
you.
The Internet has no center and no one owns it. That’s a good thing. The Internet was designed
to be redundant and fault-tolerant—meaning that if one network, connecting wire, or server
stops working, everything else should keep on running. Rising from military research and work
at educational institutions dating as far back as the 1960s, the Internet really took off in the
1990s, when graphical Web browsing was invented, and much of the Internet’s operating
infrastructure was transitioned to be supported by private firms rather than government grants.
Enough history—let’s see how it all works! If you want to communicate with another computer
on the Internet then your computer needs to know the answer to three questions: What are you
looking for? Where is it? And how do we get there? The computers and software that make up
Internet infrastructure can help provide the answers. Let’s look at how it all comes together.
When you type an address into a Web browser (sometimes called a URL for uniform resource
locator), you’re telling your browser what you’re looking for, Figure 2 describes how to read a
typical URL.
5
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
“Cyberspace refers to the virtual space that provides the infrastructure, electronic medium
and related elements necessary for online global communication”
6
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
Fig.1.4 Cyberspace
7
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
In the 1970s, the true birth of cybersecurity began with a project called The Advanced
Research Projects Agency Network (ARPANET). ARPANET was the network developed
prior to the internet.
Information security (IS) is designed to protect the confidentiality, integrity and availability
of data from those with malicious intentions of misusing that data in many manners. These
are set of techniques used for managing the tools and policies to prevent and detect
information stored in digital or non-digital media. It is often confused with Cyber security
but Information Security (IS) is a crucial part of Cyber security, but it refers exclusively to
the processes designed for data security. Cyber security is a more general term that includes
Information Security as crucial part of itself. History of Information Security: These days,
information plays an important role in day to day lives of every individual, whether it be a
8
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
high profile businessman to being a small shop owner. Information is generated in different
forms from being their smartphones to their transaction receipts and buying patterns. This
presents a wealth of opportunities for people to steal data; that is why information security is
a necessity. But how has information security evolved over the years? Let’s take a look at
the history of information security and how it evolved on the course of this duration. 1960s:
Offline sites security: The Information Security was limited to the access points where
computers were stored, as they used to be large in sizes and required a huge area to be stored
and operated. Multiple layers of security were installed over terminals in form of passwords
and other security measures. 1970s: Evolution of personal computer and hackers: At this
time there was no massive global network connecting every device that wanted to be
connected. Only large organizations, especially governments, were starting to link computers
via telephone lines and peoples started to seek different ways to intercept the information
flowing through those telephone lines in order to steal the data and these group of peoples
became the first hackers. 1980s: Evolution of cyber-crime: Hacking and other forms of
cyber crimes skyrocketed in this decade with people finding different ways to break into the
computer systems and being no strict regulation against the hackers it was a booming craze
for the youth. Many government & Military groups were on the receiving end of these crimes
with loss of over millions of dollars from U.S. Banks and in response to this the government
started pursuing the hackers. 1990s: “Hacking” becoming an organized crime: After the
worldwide web was made available in 1989, people started putting their personal information
online; hackers saw this as a potential revenue source, and started to steal data from people
and governments via the web. Firewalls and antivirus programs helped protect against this,
but the web was a mostly unsecured with hackers finding different ways to infiltrate the
targets devices. 2000s: Cybercrime becoming a serious issue: Hacking wasn’t considered
as serious issues in late 80’s but with evolution of hacking and their dangers governments
started chasing the cyber criminals. Strong measures were taken against cyber criminals,
hackers were jailed for years as punishment for cyber criminal activity and cyber security
cells were formed to deal with the issues involving any form of cyber crime. 2010s:
Information security as we know it: Although different measures in form of firewalls and
antivirus were designed to protect the devices from attacks but hackers who were efficient
9
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
and skilled enough were able to breach the systems anyway. Different cryptographic
algorithms and encryption techniques are being used in order to protect the data over network
and other transmission mediums. Different organizations also implement security policies to
avoid human errors of breaching the data in different ways. Software and antivirus programs
are installed on PC’s to protect them from the outside attacks. With time as the internet and
devices surrounding the internet evolved, the threat to the information security also found
many ways to breach into them. Information security plays a major role in day-to-day life of
every person and organizations.
Security System Development Life Cycle (SecSDLC) is defined as the set of procedures
that are executed in a sequence in the software development cycle (SDLC). It is designed
such that it can help developers to create software and applications in a way that reduces the
security risks at later stages significantly from the start. The Security System Development
Life Cycle (SecSDLC) is similar to Software Development Life Cycle (SDLC), but they
differ in terms of the activities that are carried out in each phase of the cycle. SecSDLC
eliminates security vulnerabilities. Its process involves identification of certain threats and
the risks they impose on a system as well as the needed implementation of security controls
to counter, remove and manage the risks involved. Whereas, in the SDLC process, the focus
is mainly on the designs and implementations of an information system. Phases involved in
SecSDLC are:
System Investigation: This process is started by the officials/directives working at the top
level management in the organization. The objectives and goals of the project are considered
priorly to execute this process. An Information Security Policy is defined which contains the
descriptions of security applications and programs installed along with their implementations
in organization’s system.
System Analysis: In this phase, detailed document analysis of the documents from the
System Investigation phase are done. Already existing security policies, applications and
software are analyzed to check for different flaws and vulnerabilities in the system.
10
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
Upcoming threat possibilities are also analyzed. Risk management comes under this process
only.
Logical Design: The Logical Design phase deals with the development of tools and
following blueprints that are involved in various information security policies, their
applications and software. Backup and recovery policies are also drafted in order to prevent
future losses. In case of any disaster, the steps to take in business are also planned. The
decision to outsource the company project is decided in this phase. It is analyzed whether the
project can be completed in the company itself or it needs to be sent to another company for
the specific task.
Physical Design: The technical teams acquire the tools and blueprints needed for the
implementation of the software and application of the system security. During this phase,
different solutions are investigated for any unforeseen issues which may be encountered in
the future. They are analyzed and written down to cover most of the vulnerabilities that were
missed during the analysis phase.
Implementation: The solution decided in earlier phases is made final whether the project is
in-house or outsourced. The proper documentation is provided of the product to meet the
requirements specified for the project to be met. Implementation and integration process of
the project are carried out with the help of various teams aggressively testing whether the
product meets the system requirements specified in the system documentation.
Maintenance: After the implementation of the security program, it must be ensured that it is
functioning properly and is managed accordingly. The security program must be kept up to
date accordingly to counter new threats that can be left unseen at the time of design.
Difference between Cyber Security and Information Security
The terms Cyber Security and Information Security are often used interchangeably. As they
both are responsible for the security and protecting the computer system from threats and
information breaches and often Cybersecurity and information security are so closely linked
that they may seem synonymous and unfortunately, they are used synonymously. If we talk
about data security, it’s all about securing the data from malicious users and threats. Now
another question is what is the difference between Data and Information? So one important
point is that “not every data can be information” data can be informed if it is interpreted in a
11
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
context and given meaning. for example, “100798” is data and if we know that it’s the date
of birth of a person then it is information because it has some meaning. so information means
data that has some meaning. Examples and Inclusion of Cyber Security are as follows:
• Network Security
• Application Security
• Cloud Security
• Critical Infrastructure
Examples and inclusion of Information Security are as follows:
• Procedural Controls
• Access Controls
• Technical Controls
• Compliance Controls
12
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
Information Security is the measures taken to protect the information from unauthorized
access and use. It provides confidentiality, integrity, and availability. It is the superset that
contains cyber security and network security. It is necessary for any organization or firm that
works on a large scale. Examples and inclusion of Information Security are as follows:
• Procedural Controls
• Access Controls
• Technical Controls
• Compliance Controls
Network Security: Network Security is the measures taken by any enterprise or organization
to secure its computer network and data using both hardware and software systems. This aims
at securing the confidentiality and accessibility of the data and network. Every company or
organization that handles a large amount of data, has a degree of solutions against many cyber
threats. Examples and inclusion of Network Security are as follows:
• Firewall
• Network Segmentation
• Remote Access VPN
• Email Security
• Intrusion Prevention Systems (IPS)
• Sandboxing
• Hyperscale Network Security.
• Data Loss Prevention (DLP)
13
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
Definitions of cybersecurity
14
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
Every organization's assets are the combinations of a variety of different systems. These
systems have a strong cybersecurity posture that requires coordinated efforts across all of its
systems. Therefore, we can categorize cybersecurity in the following sub-domains:
o Network Security: It involves implementing the hardware and software to secure a computer
network from unauthorized access, intruders, attacks, disruption, and misuse. This security
helps an organization to protect its assets against external and internal threats.
o Application Security: It involves protecting the software and devices from unwanted threats.
This protection can be done by constantly updating the apps to ensure they are secure from
attacks. Successful security begins in the design stage, writing source code, validation, threat
modeling, etc., before a program or device is deployed.
o Information or Data Security: It involves implementing a strong data storage mechanism to
maintain the integrity and privacy of data, both in storage and in transit.
o Identity management: It deals with the procedure for determining the level of access that each
individual has within an organization.
o Operational Security: It involves processing and making decisions on handling and securing
data assets.
o Mobile Security: It involves securing the organizational and personal data stored on mobile
devices such as cell phones, computers, tablets, and other similar devices against various
malicious threats. These threats are unauthorized access, device loss or theft, malware, etc.
15
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
o Cloud Security: It involves in protecting the information stored in the digital environment or
cloud architectures for the organization. It uses various cloud service providers such as AWS,
Azure, Google, etc., to ensure security against multiple threats.
o Disaster Recovery and Business Continuity Planning: It deals with the processes,
monitoring, alerts, and plans to how an organization responds when any malicious activity is
causing the loss of operations or data. Its policies dictate resuming the lost operations after any
disaster happens to the same operating capacity as before the event.
o User Education: It deals with the processes, monitoring, alerts, and plans to how an
organization responds when any malicious activity is causing the loss of operations or data. Its
policies dictate resuming the lost operations after any disaster happens to the same operating
capacity as before the event.
Today we live in a digital era where all aspects of our lives depend on the network, computer
and other electronic devices, and software applications. All critical infrastructure such as the
banking system, healthcare, financial institutions, governments, and manufacturing industries
use devices connected to the Internet as a core part of their operations. Some of their
information, such as intellectual property, financial data, and personal data, can be sensitive
for unauthorized access or exposure that could have negative consequences. This information
gives intruders and threat actors to infiltrate them for financial gain, extortion, political or social
motives, or just vandalism.
Cyber-attack is now an international concern that hacks the system, and other security attacks
could endanger the global economy. Therefore, it is essential to have an excellent cybersecurity
strategy to protect sensitive information from high-profile security breaches. Furthermore, as
the volume of cyber-attacks grows, companies and organizations, especially those that deal
with information related to national security, health, or financial records, need to use strong
cybersecurity measures and processes to protect their sensitive business and personal
information.
16
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
main objective is to ensure data protection. The security community provides a triangle of three
related principles to protect the data from cyber-attacks. This principle is called the CIA triad.
The CIA model is designed to guide policies for an organization's information security
infrastructure. When any security breaches are found, one or more of these principles has been
violated. We can break the CIA model into three parts: Confidentiality, Integrity, and
Availability. It is a security model that helps people to think about various parts of IT security.
Let us discuss each part in detail.
Integrity: This principle ensures that the data is authentic, accurate, and safeguarded from
unauthorized modification by threat actors or accidental user modification. If any modifications
occur, certain measures should be taken to protect the sensitive data from corruption or loss
and speedily recover from such an event. In addition, it indicates to make the source of
information genuine.
17
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
Availability: This principle makes the information to be available and useful for its authorized
people always. It ensures that these accesses are not hindered by system malfunction or cyber-
attacks.
Malware
Malware means malicious software, which is the most common cyber attacking tool. It is used
by the cybercriminal or hacker to disrupt or damage a legitimate user's system. The following
are the important types of malware created by the hacker:
• Virus: It is a malicious piece of code that spreads from one device to another. It can
clean files and spreads throughout a computer system, infecting files, stoles
information, or damage device.
18
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
• Spyware: It is a software that secretly records information about user activities on their
system. For example, spyware could capture credit card details that can be used by the
cybercriminals for unauthorized shopping, money withdrawing, etc.
• Trojans: It is a type of malware or code that appears as legitimate software or file to
fool us into downloading and running. Its primary purpose is to corrupt or steal data
from our device or do other harmful activities on our network.
• Ransomware: It's a piece of software that encrypts a user's files and data on a device,
rendering them unusable or erasing. Then, a monetary ransom is demanded by
malicious actors for decryption.
• Worms: It is a piece of software that spreads copies of itself from device to device
without human interaction. It does not require them to attach themselves to any program
to steal or damage the data.
• Adware: It is an advertising software used to spread malware and displays
advertisements on our device. It is an unwanted program that is installed without the
user's permission. The main objective of this program is to generate revenue for its
developer by showing the ads on their browser.
• Botnets: It is a collection of internet-connected malware-infected devices that allow
cybercriminals to control them. It enables cybercriminals to get credentials leaks,
unauthorized access, and data theft without the user's permission.
Phishing
19
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
It is a type of cyber threat or malicious attempt where cybercriminals disrupt targeted servers,
services, or network's regular traffic by fulfilling legitimate requests to the target or its
surrounding infrastructure with Internet traffic. Here the requests come from several IP
addresses that can make the system unusable, overload their servers, slowing down
significantly or temporarily taking them offline, or preventing an organization from carrying
out its vital functions.
Brute Force
A brute force attack is a cryptographic hack that uses a trial-and-error method to guess
all possible combinations until the correct information is discovered. Cybercriminals usually
use this attack to obtain personal information about targeted passwords, login info, encryption
keys, and Personal Identification Numbers (PINS).
SQL Injection (SQLI)
SQL injection is a common attack that occurs when cybercriminals use malicious SQL scripts
for backend database manipulation to access sensitive information. Once the attack is
successful, the malicious actor can view, change, or delete sensitive company data, user lists,
or private customer details stored in the SQL database.
20
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
A DNS attack is a type of cyberattack in which cyber criminals take advantage of flaws in the
Domain Name System to redirect site users to malicious websites (DNS hijacking) and steal
data from affected computers. It is a severe cybersecurity risk because the DNS system is an
essential element of the internet infrastructure.
The following are the latest cyber threats reported by the U.K., U.S., and Australian
governments:
Romance Scams
The U.S. government found this cyber threat in February 2020. Cybercriminals used this
threat through dating sites, chat rooms, and apps. They attack people who are seeking a new
partner and duping them into giving away personal data.
Dridex Malware
It is a type of financial Trojan malware identifies by the U.S. in December 2019 that affects
the public, government, infrastructure, and business worldwide. It infects computers through
phishing emails or existing malware to steal sensitive information such as passwords, banking
details, and personal data for fraudulent transactions. The National Cyber Security Centre of
the United Kingdom encourages people to make sure their devices are patched, anti-virus is
turned on and up to date, and files are backed up to protect sensitive data against this attack.
Emotet Malware
Emotet is a type of cyber-attack that steals sensitive data and also installs other malware on our
device. The Australian Cyber Security Centre warned national organizations about this global
cyber threat in 2019.
The following are the system that can be affected by security breaches and attacks:
21
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
• Communication: Cyber attackers can use phone calls, emails, text messages, and
messaging apps for cyberattacks.
• Finance: This system deals with the risk of financial information like bank and credit
card detail. This information is naturally a primary target for cyber attackers.
• Governments: The cybercriminal generally targets the government institutions to get
confidential public data or private citizen information.
• Transportation: In this system, cybercriminals generally target connected cars, traffic
control systems, and smart road infrastructure.
• Healthcare: A cybercriminal targets the healthcare system to get the information stored
at a local clinic to critical care systems at a national hospital.
• Education: A cybercriminals target educational institutions to get their confidential
research data and information of students and employees.
Benefits of cybersecurity
Let us see how to protect ourselves when any cyberattacks happen. The following are the
popular cyber safety tips:
22
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
Conduct cybersecurity training and awareness: Every organization must train their staffs
on cybersecurity, company policies, and incident reporting for a strong cybersecurity policy to
be successful. If the staff does unintentional or intentional malicious activities, it may fail the
best technical safeguards that result in an expensive security breach. Therefore, it is useful to
conduct security training and awareness for staff through seminars, classes, and online courses
that reduce security violations.
Update software and operating system: The most popular safety measure is to update the
software and O.S. to get the benefit of the latest security patches.
Use anti-virus software: It is also useful to use the anti-virus software that will detect and
removes unwanted threats from your device. This software is always updated to get the best
level of protection.
Perform periodic security reviews: Every organization ensures periodic security inspections
of all software and networks to identify security risks early in a secure environment. Some
popular examples of security reviews are application and network penetration testing, source
code reviews, architecture design reviews, and red team assessments. In addition, organizations
should prioritize and mitigate security vulnerabilities as quickly as possible after they are
discovered.
Use strong passwords: It is recommended to always use long and various combinations of
characters and symbols in the password. It makes the passwords are not easily guessable.
Do not open email attachments from unknown senders: The cyber expert always advises
not to open or click the email attachment getting from unverified senders or unfamiliar websites
because it could be infected with malware.
Avoid using unsecured Wi-Fi networks in public places: It should also be advised not to use
insecure networks because they can leave you vulnerable to man-in-the-middle attacks.
23
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
Backup data: Every organization must periodically take backup of their data to ensure all
sensitive data is not lost or recovered after a security breach. In addition, backups can help
maintain data integrity in cyber-attack such as SQL injections, phishing, and ransomware.
Computer ethics
24
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
Commandment 2: Thou shalt not interfere with other people's computer work.
Simply put: Do not use computer technology to cause interference in other users' work.
Explanation: Computer software can be used in ways that disturb other users or disrupt their
work. Viruses, for example, are programs meant to harm useful computer programs or interfere
with the normal functioning of a computer. Malicious software can disrupt the functioning of
computers in more ways than one. It may overload computer memory through excessive
consumption of computer resources, thus slowing its functioning. It may cause a computer to
function wrongly or even stop working. Using malicious software to attack a computer is
unethical.
Commandment 3: Thou shalt not snoop around in other people's computer files.
25
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
Simply put: Do not contribute to the spread of misinformation using computer technology.
Explanation: Spread of information has become viral today, because of the Internet. This also
means that false news or rumors can spread speedily through social networking sites or emails.
Being involved in the circulation of incorrect information is unethical. Mails and pop-ups are
commonly used to spread the wrong information or give false alerts with the only intent of
selling products. Mails from untrusted sources advertising certain products or spreading some
hard-to-believe information, are not uncommon. Direct or indirect involvement in the
circulation of false information is ethically wrong. Giving wrong information can hurt other
parties or organizations that are affected by that particular theme.
Commandment 6: Thou shalt not copy or use proprietary software for which you have not paid
(without permission).
Simply put: Refrain from copying software or buying pirated copies. Pay for software unless
it is free.
Explanation: Like any other artistic or literary work, software is copyrighted. A piece of code
is the original work of the individual who created it. It is copyrighted in his/her name. In case
of a developer writing software for the organization she works for, the organization holds the
copyright for it. Copyright holds true unless its creators announce it is not. Obtaining illegal
copies of copyrighted software is unethical and also encourages others to make copies illegally.
Commandment 7: Thou shalt not use other people's computer resources without authorization
or proper compensation.
Simply put: Do not use someone else's computer resources unless authorized to.
Explanation: Multi-user systems have user specific passwords. Breaking into some other user's
password, thus intruding his/her private space is unethical. It is not ethical to hack passwords
for gaining unauthorized access to a password-protected computer system. Accessing data that
you are not authorized to access or gaining access to another user's computer without her
permission is not ethical.
Commandment 8: Thou shalt not appropriate other people's intellectual output.
26
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
Simply put: It is wrong to claim ownership on a work which is the output of someone else's
intellect.
Explanation: Programs developed by a software developer are her property. If he is working
with an organization, they are the organization's property. Copying them and propagating them
in one's own name is unethical. This applies to any creative work, program or design.
Establishing ownership on a work which is not yours is ethically wrong.
Commandment 9: Thou shalt think about the social consequences of the program you are
writing or the system you are designing.
Simply put: Before developing a software, think about the social impact it can have.
Explanation: Looking at the social consequences that a program can have, describes a broader
perspective of looking at technology. A computer software on release, reaches millions.
Software like video games and animations or educational software can have a social impact on
their users. When working on animation films or designing video games, for example, it is the
programmer's responsibility to understand his target audience/users and the effect it may have
on them. For example, a computer game for kids should not have content that can influence
them negatively. Similarly, writing malicious software is ethically wrong. A software
developer/development firm should consider the influence their code can have on the society
at large.
Commandment 10: Thou shalt always use a computer in ways that ensure consideration and
respect for other humans.
Simply put: In using computers for communication, be respectful and courteous with the fellow
members.
27
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
Cybersecurity plays a crucial role within the field of the digital world. Securing information
and data became one of the most important challenges within the present day. Whenever we
expect cybersecurity the primary thing that involves our mind is cybercrimes which are
increasing immensely day by day. Various Governments and Organizations are taking many
measures to stop these cybercrimes. Besides various measures, cybersecurity remains a
massive concern to several. The top three cybersecurity trends in 2021 are:
• Ransomware
• Cyber-attack Surface (IoT supply chain and Remote work systems)
• Threats to IT infrastructure
In the extensive growth of the IT sector in the different country, ambitious plans for rapid social
transformation and inclusive growth, and providing the right kind of focus for creating a secure
computing environment and adequate trust and confidence in electronic transactions, software,
services, devices, and networks, has become one of the compelling priorities for all.
Acceptable Use of data Systems Policy-The purpose of this policy is to stipulate the suitable
use of computer devices at the corporate/company. These rules protect the authorized user
and therefore the company also. Inappropriate use exposes the corporate to risks including
virus attacks, compromise of network systems and services, and legal issues.
Account Management Policy-The purpose of this policy is to determine a typical for the
creation, administration, use, and removal of accounts that facilitate access to information
and technology resources at the corporate.
28
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
Anti-Virus- This policy was established to assist prevent attacks on corporate computers,
networks, and technology systems from malware and other malicious code. This policy is
meant to assist prevent damage to user applications, data, files, and hardware. Antivirus
software is a computer program that detects, prevents, and takes action to disarm or remove
malicious software programs, such as viruses and worms. Most antivirus programs include
an auto-update feature that enables the program to download profiles of new viruses so that
it can check for the new viruses as soon as they are discovered. Anti-virus software is a must
and a necessity for every system.
E-Commerce Policy- The frequency of cyber-attacks has high in recent years. Ecommerce
security refers to the measures taken to secure businesses and their customers against cyber
threats. This e-commerce policy is to be used as both a suggestion and a summary within the
management of the E-Commerce electronic services.
E-Mail Policy- Email security may be a term for describing different procedures and
techniques for shielding email accounts, content, and communication against unauthorized
access, loss, or compromise. Email is usually wont to spread malware, spam, and phishing
attacks. Attackers use deceptive messages to entice recipients to spare sensitive information,
open attachments, or click on hyperlinks that install malware on the victim’s device. Email
is additionally a standard entry point for attackers looking to realize an edge in an enterprise
network and acquire valuable company data. Email encryption involves encrypting, or
disguising, the content of email messages to guard potentially sensitive information against
being read by anyone aside from intended recipients. Email encryption often includes
authentication. The purpose of this policy is to determine rules for the utilization of corporate
email for sending, receiving, or storing electronic messages.
29
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
30
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
31
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
Website Operation Policy - The purpose of this policy is to determine guidelines with
reference to communication and updates of the company’s public-facing website. Protecting
the knowledge on and within the corporate website, with equivalent safety and confidentiality
standards utilized within the transaction of all the corporate business, is significant to the
company’s success.
Workstation Configuration Security Policy-The purpose of this policy is to reinforce
security and quality operating status for workstations utilized at the corporate. IT resources
are to utilize these guidelines when deploying all new workstation equipment. Workstation
users are expected to take care of these guidelines and to figure collaboratively with IT
resources to take care of the rules that are deployed.
Server Virtualization-The purpose of this policy is to determine server virtualization
requirements that outline the acquisition, use, and management of server virtualization
technologies. This policy provides controls that make sure that Enterprise issues are
considered, alongside business objectives, when making server virtualization-related
decisions. Platform Architecture policies, standards, and guidelines are going to be wont to
acquire, design, implement and manage all server virtualization technologies.
Wireless Connectivity Policy-The purpose of this policy is to secure and protect the
knowledge assets owned by the corporate and to determine awareness and safe practices for
connecting to free and unsecured Wi-Fi, which can be provided by the corporate. The
corporate provides computer devices, networks, and other electronic information systems to
goals, and initiatives. The corporate grants access to those resources as a privilege and must
manage them responsibly to take care of the confidentiality, integrity, and availability of all
information assets.
Telecommuting Policy- For the needs of this policy, reference is formed to the defined
telecommuting employee who regularly performs their work from an office that’s not within
a corporate building or suite. Casual telework by employees or remote work by non-
employees isn’t included herein. That specializes in the IT equipment typically provided to
a telecommuter, this policy addresses the telecommuting work arrangement and therefore the
responsibility for the equipment provided by the corporate.
32
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
Firewall- A firewall is a software program or piece of hardware that helps screen out hackers,
viruses, and worms that try to reach your computer over the Internet. All messages entering
or leaving the Internet pass through the firewall present, which examines each message and
blocks those that do not meet the specified security criteria. Hence, firewalls play an
important role in detecting malware.
Malware scanner-This is software that sometimes scans all the files and documents present
within the system for malicious code or harmful viruses. Viruses, worms, and Trojan horses
are samples of malicious software that are often grouped together and mentioned as malware.
33
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
34
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
• Cyber crimes
• Electronic and digital signatures
• Intellectual property
• Data protection and privacy
35
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
36
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
37
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
network and may be in any form (including computer printouts magnetic or optical storage
media, punched cards, punched tapes) or stored internally in the memory of the computer.
"Digital Signature" means authentication of any electronic record by a subscriber by means
of an electronic method or procedure in accordance with the provisions of section 3.
"Electronic Form" with reference to information means any information generated, sent,
received or stored in media, magnetic, optical, computer memory, micro film, computer
generated micro fiche or similar device.
"Electronic Record" means data, record or data generated, image or sound stored, received
or sent in an electronic form or micro film or computer generated micro fiche.
"Electronic signature" means authentication of any electronic record by a subscriber by
means of the electronic technique specified in the second schedule and includes digital
signature.
"Function", in relation to a computer, includes logic, control, arithmetical process, deletion,
storage and retrieval and communication or telecommunication from or within a computer.
"Information" includes data, message, text, images, sound, voice, codes, computer
programmes, software and databases or micro film or computer generated micro fiche.
"Intermediary" with respect to any particular electronic records, means any person who on
behalf of another person receives, stores or transmits that record or provides any service
with respect to that record and includes telecom service providers, network service providers,
internet service providers, web hosting service providers, search engines, online payment sites,
online-auction sites, online market places and cyber cafes.
"Key Pair", in an asymmetric crypto system, means a private key and its mathematically
related public key, which are so related that the public key can verify a digital signature created
by the private key.
"Originator" means a person who sends, generates, stores or transmits any electronic message
or causes any electronic message to be sent, generated, stored or transmitted to any other person
but does not include an intermediary
"Private Key" means the key of a key pair used to create a digital signature.
"Public Key" means the key of a key pair used to verify a digital signature and listed in the
Digital Signature Certificate. (Sec.2(1)(zd) of IT Act, 2000)
38
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
In India, cyber laws are contained in the Information Technology Act, 2000
("IT Act") which came into force on October 17, 2000. The main purpose
of the Act is to provide legal recognition to electronic commerce and to
facilitate filing of electronic records with the Government.
The following Act, Rules and Regulations are covered under cyber laws:
• Information Technology Act, 2000
• Information Technology (Certifying Authorities) Rules, 2000
• Information Technology (Security Procedure) Rules, 2004
• Information Technology (Certifying Authority) Regulations, 2001
Need for cyber law in India
• India has an extremely detailed and well-defined legal system in place.
• The existing laws of India, even with the most benevolent and liberal interpretation,
could not be interpreted in the light of the emerging cyberspace, to include all aspects
relating to different activities in cyberspace.
• None of the existing laws gave any legal validity or sanction to the activities in
Cyberspace.
• Internet requires an enabling and supportive legal infrastructure in tune with the times.
39
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
ii. A new section has been inserted to define 'communication device' to mean cell phones,
personal digital assistance or combination of both or any other device used to communicate,
send or transmit any text video, audio or image.
iii. A new section has been added to define cyber cafe as any facility from where the
access to the internet is offered by any person in the ordinary course of business to the
members of the public.
iv. A new definition has been inserted for intermediary.
v. A new section 10A has been inserted to the effect that contracts concluded
electronically shall not be deemed to be unenforceable solely on the ground that electronic form
or means was used.
vi. The damages of Rs. One Crore prescribed under section 43 of the earlier Act of 2000
for damage to computer, computer system etc. has been deleted and the relevant parts of the
section have been substituted by the words, 'he shall be liable to pay damages by way of
compensation to the person so affected'.
vii. A new section 43A has been inserted to protect sensitive personal data or information
possessed, dealt or handled by a body corporate in a computer resource which such body
corporate owns, controls or operates. If such body corporate is negligent in implementing and
maintaining reasonable security practices and procedures and thereby causes wrongful loss or
wrongful gain to any person, it shall be liable to pay damages by way of compensation to
the person so affected.
viii. Sections 66A to 66F has been added to Section 66 prescribing punishment for offences
such as obscene electronic message transmissions, identity theft, cheating by impersonation
using computer resource, violation of privacy and cyber terrorism.
ix. Section 67 of the IT Act, 2000 has been amended to reduce the term of imprisonment
for publishing or transmitting obscene material in electronic form to three years from five
years and increase the fine thereof from Rs.100,000 to Rs. 500,000. Sections 67A to 67C
have also been inserted. While Sections 67A and B deals with penal provisions in respect
of offences of publishing or transmitting of material containing sexually explicit act and child
pornography in electronic form, Section 67C deals with the obligation of an intermediary to
40
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
preserve and retain such information as may be specified for such duration and in such
manner and format as the central government may prescribe.
x. In view of the increasing threat of terrorism in the country, the new amendments include
an amended section 69 giving power to the state to issue directions for interception or
monitoring of decryption of any information through any computer resource. Further, sections
69A and B, two new sections, grant power to the state to issue directions for blocking for public
access of any information through any computer resource and to authorize to monitor and
collect traffic data or information through any computer resource for cyber security.
xi. Section 79 of the Act which exempted intermediaries has been modified to the effect
that an intermediary shall not be liable for any third party information data or
communication link made available or hosted by him if; (a) The function of the intermediary
is limited to providing access to a communication system over which information made
available by third parties is transmitted or temporarily stored or hosted; (b) The intermediary
does not initiate the transmission or select the receiver of the transmission and select or
modify the information contained in the transmission; (c) The intermediary observes due
diligence while discharging his duties. However, section 79 will not apply to an intermediary
if the intermediary has conspired or abetted or aided or induced whether by threats or promise
or otherwise in the commission of the unlawful act or upon receiving actual knowledge or
on being notified that any information, data or communication link residing in or connected to
a computer resource controlled by it is being used to commit an unlawful act, the
intermediary fails to expeditiously remove or disable access to that material on that resource
without vitiating the evidence in any manner.
xii. A proviso has been added to Section 81 which states that the provisions of the Act shall
have overriding effect. The proviso states that nothing contained in the Act shall restrict any
person from exercising any right conferred under the Copyright Act, 1957.
41
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
The Internet has become a basic fact of everyday life for millions of people worldwide, from
e-mail to online shopping. Ever faster and more accessible connections available on a wider
range of platforms, such as mobile phones or person to person portable devices, have spurred
new e-commerce opportunities. Online shopping and banking are increasingly widespread and
over the next 10 years, the Net is expected to become as common as gas or electricity. The
invention of the computers has opened new avenues for the fraudsters. It is an evil having its
origin in the growing dependence on computers in modern life.
Fraud is the intentional deception of a person or group for the purpose of stealing property or
money.
42
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
Internet fraud includes any scheme using Web sites, chat rooms, and email to offer nonexistent
goods and services to consumers or to communicate false information to consumers. Customers
then pay for the fraudulent goods over the Internet with their credit cards. Internet fraud
involves a wide variety of schemes limited only by the imagination and creativity of a seller
intent on deceiving a buyer. A few general characteristics one can find in all cyber scams. Most
scams are done by e-mail. They entice users to give them critical information like usernames,
passwords, credit card information, or other types of account information.
Cyber fraud has the potential of hindering the economic and social development of any nation.
This is because among other dire consequences, foreign investment is seriously discouraged.
Cyber fraud can also destroy our good and morally sound culture. This is because the youth
will no longer work but resort to that means to earn their living.
43
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
(usually in Africa), promising substantial sums of money in return for assistance in transferring
money out of the country. Commonly known as the “Nigerian”, “West African” or “419”
scam, once it has sucked in victims it convinces them to make small advance payments for
various reasons, such as banking transaction fees. Needless to say, the victim never receives
the promised
substantial sums in return. Many pyramid and work-at-home schemes are also distributed
through spam and follow the “advance fee fraud” format of requiring up-front payment or
investment on the promise of high returns that are never forthcoming.
Spam is a key tool for the spread of ID theft, luring people into disclosing sensitive
information such as credit card numbers or passwords. For example, phishing spams falsely
claim to come from legitimate and well-known financial institutions or merchants. They ask
recipients to click through on hyperlinks in order to verify or update their online accounts.
These hyperlinks direct users to fake “look alike” websites where users are tricked into
divulging personal information which can be used to access and illegally transfer money out of
the victim’s bank account(s), open new bank or credit card accounts in the victim’s name, make
unlawful online purchases, etc.
These attacks are continually becoming more sophisticated. The past year has seen the growth
of a new practice known as spear-phishing where accurate information about the recipient, such
as the full name and home address, is included in the phishing e-mail making it even more
convincing. Another new phenomenon known as vishing tricks people into making phone calls
rather than clicking on links to websites. The number given is to a VoIP phone which records
digits (such as account numbers) entered into the telephone, again enabling crooks to steal and
use the information.
Other variants of fraud rely on the use of identity stolen through technological methods. For
example, pharming interferes with the domain name system (DNS) look up process and
redirects users attempting to reach a particular website to a “spoofed” one where they divulge
personal information to the crooks. Malware (or malicious software), can be downloaded
unwittingly by consumers from spam attachments or as they surf on line. Such malicious
44
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
code, which increasingly targets mobile phones and other portable devices in addition to
computers, can install “key stroke” loggers and other programs to steal information stored on,
entered into, or received by these devices. The information collected through these kinds of
technological attacks, such as passwords and other sensitive data, can then be used to perpetrate
fraud.
Preventive measures
The first line of defence to prevent online consumers from becoming online victims is good
education. Tips on the major forms of Internet fraud and how to combat them have been
developed by public authorities, enforcement agencies, and the private sector on various
platforms such as government websites, brochures, posters, videos, reports, etc. The
International Consumer Protection and Enforcement Network (ICPEN), an informal network
of enforcement authorities from OECD and other countries, has launched Fraud Prevention
Month, an awareness campaign taking place on a designated month every year.
The private sector also offers a number of technical tools to provide consumers with real-time
protection against cyber fraud. For example, business has developed means to counter spam
messages, which are a significant source of fraud, through authentication, filters, and listings.
Likewise, anti-phishing systems have been put in place allowing Internet users to report
phishing sites and block them.
Preventive measures to be taken to protect their businesses –
o Setup an e-security program for your business.
o Ensure your security program facilitates confidentiality, integrity and
availability.
o Identify the sources of threats to your data from both internal and external
sources. Examples: disgruntled employees - leaving bugs behind in your
system, hackers looking to steal confidential information.
o The security program that you create for your business must have provisions to
maintenance and upgrades of your systems.
o Administrators have access to all files and data. Therefore, one must be mindful
of who is guarding the guards.
45
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
o Roles for security should be defined, documented, and implemented for both
your company and external contractors.
o Establish a security awareness program for all users. Content should be
communicated in non-technical terms. This could include briefings, posters,
clauses in employee contracts, security awareness days etc.
o Implement security training for technical staff that is focused on the security
controls for their particular technical areas.
o Maintain logs of all possible activities that may occur on your system. System
records must note who was using the system, when, for how long, deletions
etc.
o User accounts should not be shared. User authorization should be mandatory.
Employees should only be able to see information that they are authorized to
see.
o Employee user accounts must be disabled or removed when no longer needed.
Example: in case an employee leaves the company.
o Ensure network security from external sources by installing firewalls and
intrusion detection systems.
o Allow remote access to employees only through secure communication
channels like SSL or VPN.
o Install antivirus software on all desktops and servers. Buy Anti-Virus software
solutions that allow real time upgrading of systems with anti- virus patches.
o Create a data backup and disaster recovery plan in case of unforeseen natural
calamities.
o Ensure back-up procedures are in place and tested.
o Ensure back-up procedures include all the critical as well as back office data
such as finance, payroll etc.
o Incident response is the ability to identify, evaluate, raise and address negative
computer related security events.
o In case of an incident, do not panic, and continue to save logs.
46
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
o Incident response - Take a backup of the affected system and notify the
authorities.
The draft National Cyber Security Policy of India has been prepared by CERT- In. The policy
is intended to cater to a broad spectrum of ICT users and providers including Government and
non-Government entities. Besides this CERT-In in coordination with MHA, NIC and other
stakeholders prepared and circulated Computer security guidelines and procedures for
implementation across all Central Government Ministries/Departments.
47
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
pledged with Andhra Bank the copy of a bond certificate purportedly issued by Midland Bank,
Sheffields, London stating that a term deposit of 12.5 million was held in his name.
4. Intellectual Property crimes
These include software piracy, copyright infringement, trademarks violations, theft of
computer source code etc. In other words this is also referred to as cyber squatting. Satyam Vs.
Siffy is the most widely known case. Bharti Cellular Ltd. filed a case in the Delhi High Court
that some cyber squatters had registered domain names such as barticellular.com and
bhartimobile.com with Network solutions under different fictitious names. The court directed
Network Solutions not to transfer the domain names in question to any third party and the
matter is sub-judice. Similar issues had risen before various High Courts earlier. Yahoo had
sued one Akash Arora for use of the domain name ‘Yahooindia.Com’ deceptively similar to its
‘Yahoo.com’. As this case was governed by the Trade Marks Act, 1958, the additional defence
taken against Yahoo’s legal action for the interim order was that the Trade Marks Act was
applicable only to goods.
5. Email spoofing
A spoofed email is one that appears to originate from one source but actually has been sent
from another source. E.g. Gauri has an e-mail address [email protected]. Her enemy,
Prasad spoofs her e-mail and sends obscene messages to all her acquaintances. Since the e-
mails appear to have originated from Gauri, her friends could take offence and relationships
could be spoiled for life. Email spoofing can also cause monetary damage. In an American
case, a teenager made millions of dollars by spreading false information about certain
companies whose shares he had short sold. This misinformation was spread by sending
spoofed emails, purportedly from news agencies like Reuters, to share brokers and investors
who were informed that the companies were doing very badly. Even after the truth came out
the values of the shares did not go back to the earlier levels and thousands of investors lost a
lot of money.
Recently, a branch of the Global Trust Bank experienced a run on the bank. Numerous
customers decided to withdraw all their money and close their accounts. It was revealed that
someone had sent out spoofed emails to many of the bank’s customers stating that the bank
was in very bad shape financially and could close operations at any time. Unfortunately this
48
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
information proved to be true in the next few days. But the best example of the email spoofing
can be given by an Executive’s case, where he pretended to be a girl and cheated an Abu dhabi
based NRI for crores by blackmailing tactics.
6. Forgery
Counterfeit currency notes, postage and revenue stamps, mark sheets etc can be forged using
sophisticated computers, printers and scanners. Outside many colleges across India, one finds
touts soliciting the sale of fake mark sheets or even certificates. These are made using
computers,
and high quality scanners and printers. In fact, this has becoming a booming business involving
thousands of Rupees being given to student gangs in exchange for these bogus but authentic
looking certificates. Some of the students are caught but this is very rare phenomenon.
7. Cyber Defamation:
This occurs when defamation takes place with the help of computers and
/ or the Internet. E.g. someone publishes defamatory matter about someone on a website or
sends e-mails containing defamatory information to all of that person’s friends.
India’s first case of cyber defamation was reported when a company’s employee started
sending derogatory, defamatory and obscene e-mails about its Managing Director. The e-mails
were anonymous and frequent, and were sent to many of their business associates to tarnish the
image and goodwill of the company.
The company was able to identify the employee with the help of a private computer expert and
moved the Delhi High Court. The court granted an ad-interim injunction and restrained the
employee from sending, publishing and transmitting e-mails, which are defamatory or
derogatory to the plaintiffs.
8. Cyber stalking
The Oxford dictionary defines stalking as “pursuing stealthily”. Cyber stalking involves
following a person’s movements across the Internet by posting messages (sometimes
threatening) on the bulletin boards frequented by the victim, entering the chat-rooms
frequented by the victim, constantly bombarding the victim with emails etc.
9. Unauthorized access to computer systems or networks
49
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
This activity is commonly referred to as hacking. The Indian law has, however, given a
different connotation to the term hacking, so we will not use the term “unauthorized access”
interchangeably with the term “hacking”. However, as per Indian law, unauthorized access
does occur, if hacking has taken place. An active hackers’ group, led by one “Dr. Nuker”, who
claims to be the founder of Pakistan Hackerz Club, reportedly hacked the websites of the Indian
Parliament, Ahmedabad Telephone Exchange, Engineering Export Promotion Council, and
United Nations (India).
10. Theft of information contained in electronic form
This includes information stored in computer hard disks, removable storage media etc.
11. Email bombing
Email bombing refers to sending a large number of emails to the victim resulting in the victim’s
email account (in case of an individual) or mail servers (in case of a company or an email
service provider) crashing. In one case, a foreigner who had been residing in Simla, India for
almost thirty years wanted to avail of a scheme introduced by the Simla Housing Board to buy
land at lower rates. When he made an application it was rejected on the grounds that the scheme
was available only for citizens of India. He decided to take his revenge. Consequently he sent
thousands of mails to the Simla Housing Board and repeatedly kept sending e-mails till their
servers crashed.
12. Data diddling
This kind of an attack involves altering raw data just before it is processed by a computer and
then changing it back after the processing is completed. Electricity Boards in India have been
victims to data diddling programs inserted when private parties were computerizing their
systems. The NDMC Electricity Billing Fraud Case that took place in 1996 is a typical
example. The computer network was used for receipt and accounting of electricity bills
by the NDMC, Delhi. Collection of money, computerized accounting, record maintenance
and remittance in his bank were exclusively left to a private contractor who was a computer
professional. He misappropriated huge amount of funds by manipulating data files to show less
receipt and bank remittance.
13. Salami attacks
50
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
These attacks are used for the commission of financial crimes. The key here is to make the
alteration so insignificant that in a single case it would go completely unnoticed. E.g. a bank
employee inserts a program, into the bank’s servers, that deducts a small amount of money (say
Rs. 5 a month) from the account of every customer. No account holder will probably notice
this unauthorized debit, but the bank employee will make a sizeable amount of money every
month.
To cite an example, an employee of a bank in USA was dismissed from his job. Disgruntled at
having been supposedly mistreated by his employers the man first introduced a logic bomb into
the bank’s systems. Logic bombs are programmes, which get activated on the occurrence of a
particular predefined event. The logic bomb was programmed to take ten cents from all the
accounts in the bank and put them into the account of the person whose name was
alphabetically the last in the bank’s rosters. Then he went and opened an account in the name
of Ziegler. The amount being withdrawn from each of the accounts in the bank was so
insignificant that neither any of the account holders nor the bank officials noticed the fault.
It was brought to their notice when a person by the name of Zygler opened his account in that
bank. He was surprised to find a sizeable amount of money being transferred into his account
every Saturday. Being an honest person, he reported the “mistake” to the bank authorities and
the entire scheme was revealed.
51
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
Viruses are programs that attach themselves to a computer or a file and then circulate
themselves to other files and to other computers on a network. They usually affect the data on
a computer, either by altering or deleting it. Worms, unlike viruses do not need the host to
attach themselves to. They merely make functional copies of themselves and do this repeatedly
till they eat up all the available space on a computer’s memory.
The VBS_LOVELETTER virus (better known as the Love Bug or the ILOVEYOU virus) was
reportedly written by a Filipino undergraduate. In May 2000, this deadly virus became the
world’s most prevalent virus. It
struck one in every five personal computers in the world. When the virus was brought under
check the true magnitude of the losses was incomprehensible. Losses incurred during this virus
attack were pegged at US $ 10 billion. VBS_LOVELETTER utilized the addresses in
Microsoft Outlook and e-mailed itself to those addresses. The e-mail which was sent out had
"ILOVEYOU" in its subject line. The attachment file was named "LOVE-LETTER-FOR-
YOU.TXT.vbs". People wary of opening e- mail attachments were conquered by the subject
line and those who had some knowledge of viruses, did not notice the tiny .vbs extension and
believed the file to be a text file. The message in the e-mail was "kindly check the attached
LOVELETTER coming from me".
Probably the world’s most famous worm was the Internet worm let loose on the Internet by
Robert Morris sometime in 1988. The Internet was, then, still in its developing years and this
worm, which affected thousands of computers, almost brought its development to a complete
halt. It took a team of experts almost three days to get rid of the worm and in the meantime
many of the computers had to be disconnected from the network.
16. Logic bombs
These are event dependent programs. This implies that these programs are created to do
something only when a certain event (known as a trigger event) occurs. E.g. even some
viruses may be termed logic bombs because they lie dormant all through the year and become
active only on a particular date (like the Chernobyl virus).
17. Trojan attacks
A Trojan as this program is aptly called is an unauthorized program which functions from
inside what seems to be an authorized program, thereby concealing what it is actually doing.
52
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
There are many simple ways of installing a Trojan in someone’s computer. To cite an example,
two friends Rahul and Mukesh (names changed), had a heated argument over one girl, Radha
(name changed) whom they both liked. When the girl, asked to choose, chose Mukesh over
Rahul, Rahul decided to get even. On the 14th of February, he sent Mukesh a spoofed e-card,
which appeared to have come from Radha’s mail account. The e-card actually contained a
Trojan. As soon as Mukesh opened the card, the Trojan was installed on his computer. Rahul
now had complete control over Mukesh’s computer and proceeded to harass him thoroughly.
18. Internet time theft
This connotes the usage by an unauthorized person of the Internet hours paid for by another
person. In May 2000, the economic offences wing, IPR section crime branch of Delhi police
registered its first case involving theft of Internet hours. In this case, the accused, Mukesh
Gupta an engineer with Nicom System (p) Ltd. was sent to the residence of the complainant to
activate his Internet connection. However, the accused used Col. Bajwa’s login name and
password from various places causing wrongful loss of 100 hours to Col. Bajwa. Delhi police
arrested the accused for theft of Internet time. On further inquiry in the case, it was found that
Krishan Kumar, son of an ex army officer, working as senior executive in M/s Highpoint Tours
& Travels had used Col Bajwa’s login and passwords as many as 207 times from his residence
and twice from his office. He confessed that Shashi Nagpal, from whom he had purchased a
computer, gave the login and password to him. The police could not believe that time could be
stolen. They were not aware of the concept of time-theft at all. Colonel Bajwa’s report was
rejected. He decided to approach The Times of India, New Delhi. They, in turn carried a report
about the inadequacy of the New Delhi Police in handling cyber
crimes. The Commissioner of Police, Delhi then took the case into his own hands and the
police under his directions raided and arrested Krishan Kumar under sections 379, 411, 34 of
IPC and section 25 of the Indian Telegraph Act. In another case, the Economic Offences Wing
of Delhi Police arrested a computer engineer who got hold of the password of an Internet user,
accessed the computer and stole 107 hours of Internet time from the other person’s account.
He was booked for the crime by a Delhi court during May 2000.
19. Web jacking
53
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
This occurs when someone forcefully takes control of a website (by cracking the password and
later changing it). The actual owner of the website does not have any more control over what
appears on that website. In a recent incident reported in the USA the owner of a hobby website
for children received an e-mail informing her that a group of hackers had gained control over
her website. They demanded a ransom of 1 million dollars from her. The owner, a
schoolteacher, did not take the threat seriously. She felt that it was just a scare tactic and ignored
the e-mail.
It was three days later that she came to know, following many telephone calls from all over the
country, that the hackers had web jacked her website. Subsequently, they had altered a portion
of the website which was entitled ‘How to have fun with goldfish’. In all the places where it
had been mentioned, they had replaced the word ‘goldfish’ with the word ‘piranhas’. Piranhas
are tiny but extremely dangerous flesh-eating fish. Many children had visited the popular
website and had believed what the contents of the website suggested. These unfortunate
children followed the instructions, tried to play with piranhas, which they bought from pet
shops, and were very seriously injured!
20. Theft of computer system
This type of offence involves the theft of a computer, some part(s) of a computer or a peripheral
attached to the computer.
21. Physically damaging a computer system
This crime is committed by physically damaging a computer or its peripherals.
This is just a list of the known crimes in the cyber world. The unknown crimes might be far
ahead of these, since the lawbreakers are always one-step ahead of lawmakers.
54
Department of CSE, RVCE
ETC: 22EM1C06/206 - Introduction to Cyber Security UNIT 1 Notes
55
Department of CSE, RVCE