0% found this document useful (0 votes)
40 views3 pages

Cyberr Security and Law

dsfddddddddddddddd

Uploaded by

adizriyal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views3 pages

Cyberr Security and Law

dsfddddddddddddddd

Uploaded by

adizriyal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

1.

Need for Cyber Law in India

Cyber laws are essential in India to regulate activities in cyberspace, ensuring legal
protection against cybercrimes like hacking, identity theft, and online fraud. With the
rise of digital transactions and internet use, these laws safeguard users' rights,
ensure data protection, and establish legal frameworks to address online misconduct.
They also facilitate e-commerce and provide a legal foundation for the prosecution
of cybercrimes.

2. Phishing Explained in Detail

Phishing is a type of cyberattack where attackers disguise themselves as trustworthy


entities to steal sensitive information, such as usernames, passwords, and credit card
details. This is usually done through deceptive emails, fake websites, or messages
that appear legitimate. Phishing exploits human psychology by creating a sense of
urgency, fear, or curiosity, leading victims to click on malicious links or provide
personal information.

3. Classification of Cybercrime in Detail

Cybercrimes can be broadly classified into three categories:

1. Crimes Against Individuals: Includes identity theft, harassment, and stalking, where personal
data or privacy is targeted.
2. Crimes Against Property: Involves financial crimes like fraud, credit card theft, or hacking to
damage or steal property.
3. Crimes Against Government: Includes acts like cyberterrorism, hacking government websites,
or spreading propaganda, aiming to destabilize governmental systems.

4. Intellectual Property Aspects in Cyber Law

Intellectual property in cyberspace includes copyrights, trademarks, and patents that


protect digital creations. Cyber law addresses the unauthorized use, distribution, or
modification of such intellectual property. This includes issues like software piracy,
illegal downloading, and trademark infringement on digital platforms. Cyber laws
provide a legal framework to enforce intellectual property rights and combat digital
piracy.

5. Understanding DOS and DDOS Attacks

 DoS (Denial of Service): This attack overloads a system with traffic, making it unavailable to
users by exhausting resources.
 DDoS (Distributed Denial of Service): A more potent version where multiple compromised
systems, often part of a botnet, are used to flood the target, making the attack harder to
mitigate. These attacks can cripple websites, services, or networks, causing significant
downtime and financial loss.
6. How Criminals Plan the Attack

Cybercriminals often follow a systematic approach:

1. Reconnaissance: Gathering information about the target, including vulnerabilities.


2. Weaponization: Crafting the malware or exploit that will be used in the attack.
3. Delivery: Transmitting the weapon to the target via phishing emails, malicious links, or
infected files.
4. Exploitation: Taking advantage of vulnerabilities to gain unauthorized access.
5. Installation: Installing malware to establish a foothold in the target system.
6. Command and Control: Establishing communication with the compromised system to
control it remotely.
7. Execution: Carrying out the intended malicious activity, such as data theft or system
disruption.

7. Short Notes on Selected Topics

I. Spyware: Spyware is malicious software designed to gather information


from a device without the user's knowledge. It tracks user activities, steals
sensitive data, and can lead to identity theft or financial loss. Spyware is
often bundled with legitimate software or downloaded unknowingly from
malicious websites.

II. Buffer Overflow Attack and Its Mitigation: A buffer overflow occurs when
a program writes more data to a buffer (a temporary data storage area) than
it can hold. This extra data can overwrite adjacent memory, leading to
crashes or allowing attackers to inject malicious code. Mitigation strategies
include using programming languages with built-in protection, validating
input data, and employing modern operating system features like address
space layout randomization (ASLR).

III. Identity Theft: Identity theft involves stealing personal information, such
as social security numbers or credit card details, to impersonate someone.
This can result in unauthorized transactions, opening of new accounts, or
even legal actions against the victim. Protecting personal information and
monitoring financial statements are key to preventing identity theft.

8. Understanding Cyberspace, Cybersquatting, and Cyberterrorism

Cyberspace: A metaphorical space where digital communications and


activities occur. It includes the internet, websites, emails, and other online
platforms where people interact and exchange information.

Cybersquatting: The act of registering domain names, especially those that


include trademarks, with the intent to sell them at a higher price to the
rightful owner. It's a form of domain name piracy and is illegal under the Anti-
Cybersquatting Consumer Protection Act.
Cyberterrorism: The use of the internet to conduct violent acts that threaten
or cause fear, damage, or death, often to achieve political goals. It targets
critical infrastructure, such as power grids, communication networks, and
financial systems, to cause widespread disruption.

9. Keyloggers & Their Types in Detail

Keyloggers are malicious programs or devices that record every keystroke made on a
keyboard. They are used to steal sensitive information like passwords, credit card
numbers, and personal messages. Types include:

1. Software Keyloggers: Installed on the victim's computer, these capture keystrokes and send
the data to the attacker. They are often hidden within other legitimate software.
2. Hardware Keyloggers: Physical devices connected to a computer, usually between the
keyboard and computer, to record keystrokes. They are harder to detect than software
keyloggers.
3. Remote Keyloggers: These operate over a network, capturing keystrokes from a remote
location without needing physical access to the target device.

10. SQL Injection Attack and Countermeasures

An SQL injection attack occurs when an attacker inserts malicious SQL code into a
query, allowing unauthorized access to a database. This can lead to data theft,
modification, or deletion.

Countermeasures:

1. Input Validation: Ensure all user inputs are validated and sanitized to remove harmful
characters.
2. Parameterized Queries: Use prepared statements that treat inputs as data, not executable
code, preventing injection.
3. Stored Procedures: Encapsulate SQL queries within stored procedures to limit direct user
interaction with the database.
4. Web Application Firewalls (WAFs): Deploy WAFs to detect and block SQL injection attempts.
5. Least Privilege Principle: Ensure database accounts have the minimum required permissions,
reducing the impact of an SQL injection attack.

You might also like