Viruses Notes
Viruses Notes
Course Objectives:
Appraise the current structure of cyber security roles across the DoD enterprise, including the
roles and responsibilities of the relevant organizations.
Evaluate the trends and patterns that will determine the future state of cyber security
Course Outcomes:
Analyze threats and risks within context of the cyber security architecture
Appraise cyber security incidents to apply appropriate response
Evaluate decision making outcomes of cyber security scenarios
Unit-I
Cyber crime: Mobile and Wireless devices-Trend mobility-authentication service security-Attacks on
mobile phones-mobile phone security Implications for organizations-Organizational measurement for
Handling mobile-Security policies and measures in mobile computing era. Cases.
Unit-II
Tools and methods used in cyber crime-Proxy servers and Anonymizers- Phishing Password cracking-
Key loggers and Spy wares-Virus and worms-Trojan Horse and Backdoors-Steganography-SQL
Injection-Buffer overflow-Attacks on wireless network. Cases.
Unit-III
Understanding computer forensic-Historical background of cyber forensic Forensic analysis of e-mail-
Digital forensic life cycle-Network forensic-Setting up a computer forensic Laboratory-Relevance of
the OSI 7 Layer model to computer Forensic-Computer forensic from compliance perspectives. Cases.
Unit-IV
Forensic of Hand –Held Devices-Understanding cell phone working characteristics-Hand-Held
devices and digital forensic- Toolkits for Hand-Held device-Forensic of i-pod and digital music
devices-Techno legal Challenges with evidence from hand-held Devices. Cases.
Unit-V
Cyber Security –Organizational implications-cost of cybercrimes and IPR issues Web threats for
organizations: the evils and Perils-Social media marketing Security and privacy Implications-
Protecting people privacy in the organizations Forensic best practices for organizations. Cases.
Text book:
1. Nina Godbole & Sunit Belapure “Cyber Security”, Wiley India, 2012.
IV- II SEM CSE, Cyber Security (15A05806) Unit - I
Unit – 1
Cyber Crime
Cybercrime is defined as a crime in which a computer is the object of the crime (hacking,
phishing, spamming) or is used as a tool to commit an offense (child pornography, hate crimes).
Cybercriminals may use computer technology to access personal information, business trade secrets
or use the internet for exploitative or malicious purposes. Criminals can also use computers for
communication and document or data storage. Criminals who perform these illegal activities are often
referred to as hackers.
Cybercrime may also be referred to as computer crime.
Mobile, Wireless Devices and hand-held devices
Fig: Push attack on mobile devices. DDos implies distributed denial-of-service attack.
Following are some tips to protect mobile from mobile malware attacks.
1. Download or accept programs and content (including ring tones, games, video clips
and photos) only from a trusted source.
2. If a mobile is equipped with Bluetooth, turn it OFF or set it to non-discoverable
mode when it is not in use and/or not required to use.
3. If a mobile is equipped with beam (i.e., IR), allow it to receive incoming beams,
only from the trusted source.
4. Download and install antivirus software for mobile devices.
3. Mishing
1. Mishing is a combination of mobile phone and Phishing Mishing attacks are attempted
using mobile phone technology.
2. M-Commerce is fast becoming a part of everyday life. If you use your mobile phone for
purchasing goods/services and for banking, you could be more vulnerable to a Mishing
scam.
3. A typical Mishing attacker uses call termed as Vishing or message (SMS) known as
Smishing.
4. Attacker will pretend to be an employee from your bank or another organization and
will claim a need for your personal details.
5. Attackers are very creative and they would try to convince you with diff erent reasons
why they need this information from you.
4. Vishing
Vishing is the criminal practice of using social engineering over the telephone
system, most often using features facilitated by VoIP, to gain access to personal and
financial information from the public for the purpose of financial reward. The term is a
combination of V – voice and Phishing.
Vishing is usually used to steal credit card numbers or other related data used in ID
theft schemes from individuals.
The most profitable uses of the information gained through a Vishing attack include
1. ID theft;
2. Purchasing luxury goods and services;
3. Transferring money/funds;
4. Monitoring the victims’ bank accounts;
5. Making applications for loans and credit cards.
How Vishing Works
The criminal can initiate a Vishing attack using a variety of methods, each of
which depends upon information gathered by a criminal and criminal’s will to reach a
particular audience.
4. The caller enters his/her date of birth and again receives a prompt from the
automated system:
“Thank you. Now please type your PIN, followed by the pound key.”
5. The caller enters his PIN and hears one last prompt from the system: “Thank
you. We will now transfer you to the appropriate representative.”
How to Protect from Vishing Attacks
Following are some tips to protect oneself from Vishing attacks.
1. Be suspicious about all unknown callers.
2. Do not trust caller ID. It does not guarantee whether the call is really coming from
that number, that is, from the individual and/or company – caller ID Spoofing is
easy.
3. Be aware and ask questions, in case someone is asking for your personal or financial
information.
4. Call them back.
5. Report incidents:
5. Smishing
Smishing is a criminal off ense conducted by using social engineering techniques
similar to Phishing. The nameisderivedfrom“SMSPhISHING.” SMS – Short Message
Service– is the text messages communication component dominantly used into mobile
phones. To know how SMS can be abused byusing diff erent methods and techniques other
than information gathering under cybercrime.
How to Protect from Smishing Attacks
Following are some tips to protect oneself from Smishing attacks:
1. Do not answer a text message that you have received asking for your PI.
2. Avoid calling any phone numbers, as mentioned in the received message, to cancel a
membership and/or confirming a transaction which you have not initiated but
mentioned in the message.
3. Always call on the numbers displayed on the invoice and/or appearing in the bank
statements/passbook.
3. Never click on a hot link received through message on your Smartphone or PDA. Hot
links are links that you can click, which will take you directly to the Internet sites.
6. Hacking Bluetooth
1. Bluetooth is an open wireless technology standard used for communication (i.e.,
exchanging data) over short distances between fixed and/or mobile devices.
2. Bluetooth is a short-range wireless communication service/technology that uses the 2.4-
GHz frequency range for its transmission/communication.
Name of the
S. No. Description
Tool
This toolenables to search for Bluetooth enable device and will try to extract
1 BlueScanner as much information as possible for each newlydiscovered device after
connecting
it with the target.
This isa GUI-based utilityforfindingdiscoverableandhiddenBluetoothenabled
2 BlueSniff
devices.
The buggers exploit the vulnerability of the device and access the images,
3 BlueBugger
phonebook, messages and other personal information.
If a Bluetooth of a device is switched ON, then Bluesnarfing makes it
4 Bluesnarfer possible to connect to the phone without alerting the owner and to gain
access to
restricted portions of the stored data.
Bluediving is testing Bluetooth penetration. It implements attacks like
5 BlueDiving Bluebug
and BlueSnarf.
Bluejacking, Bluesnarfing, Bluebugging and Car Whisperer are common attacks that have
emerged as Bluetooth-specific security issues.
1. Bluejacking: It means Bluetooth Jacking where Jacking is short name for hijack – act of
taking over something. Bluejacking is sending unsolicited messages over Bluetooth to
Bluetooth-enabled devices such as mobile phones, PDAs or computers.
2. Bluesnarfing: It is the unauthorized access from a wireless device through a Bluetooth
connection between cell phones, PDAs and computers. This enables the attacker to access
a calendar, contact list, SMS and E-Mails as well as enable attackers to copy pictures and
private videos.
3. Bluebugging: It allows attackers to remotely access a user’s phone and use its features
without user’s attention.
4. Car Whisperer: It is a piece of software that allows attackers to send audio to and receive
audio from a Bluetooth-enabled car stereo.
Mobile Devices: Security Implications for Organizations
1. Managing diversity and proliferation of hand-held devices
We have talked about the micro issues of purelytechnical nature in mobile device
security. Given the threats to information systems through usage of mobile devices, the
organizations need to establish security practices at a level appropriate to their security
objectives, subject to legaland otherexternalconstraints.
We have discussed micro- and macro level security issues with mobile devices used for
mobile computing purposes and what individuals can do to protect their personal data on
mobile devices. We discuss what organizations can do toward safeguarding their information
systems in the mobile computing paradigm.
1. Encrypting Organizational Databases
Critical and sensitive data reside on databases [say, applications such as customer
relationship management (CRM) that utilize patterns discovered through data warehousing
and data mining (DM) techniques] and with the advances in technology, access to these data
is not impossible through hand-held devices. It is clear that to protect the organizations’ data
loss, such databases need encryption.
2. Including Mobile Devices in Security Strategy
These discussion so far makes a strong business case – in recognition of the fact that
our mobile workforce is on the rise, organizational IT departments will have to take the
accountability for cyber securitythreats that come through inappropriate access to
organizational data from mobile-device–user employees. Encryption of corporate databases is
not the end of everything.
1. Determine whether the employees in the organization need to use mobile computing
devices at all, based on their risks and benefits within the organization, industry and
regulatory environment.
2. Implement additional security technologies, as appropriate to fit both the organization
and the types of devices used.
3. Standardize the mobile computing devices and the associated security tools being used
with them. As a matter of fundamental principle, security deteriorates quickly as the tools
and devices used become increasingly disparate.
4. Develop a specific framework for using mobile computing devices, including guidelines
for data- syncing, the use of firewalls and anti-malware software and the types of
information that can be stored on them.
5. Centralize management of your mobile computing devices. Maintain an inventory so that
you know who is using what kinds of devices.
6. Establish patching procedures for software on mobile devices. This can often be
simplified by integrating patching with syncing or patch management with the centralized
inventory database.
7. Label the devices and register them with a suitable service that helps return recovered
devices to the owners.
8. Establish procedures to disable remote access for any mobile devices reported as lost or
stolen. Many devices allow the users to store usernames and passwords for website
portals, which could allow a thief to access even more information than on the device
itself.
9. Remove data from computing devices that are not in use or before re-assigning those
devices to new owners (in case of company-provided mobile devices to employees). This
is to preclude incidents through which people obtain “old” computing devices that still
had confidential company data.
10. Provide education and awareness training to personnel using mobile devices. People
cannot be expected to appropriately secure their information if they have not been told
how.
Unit-2
Tools and methods used in Cyber Crime
Network attack incidents reveal that attackers are often very systematic in launching their attacks.
The basic stages of an attack are described here to understand how an attacker can compromise a
network here
1. Initial Uncovering
2. Network probe
3. Crossing the line toward electronic crime (E-crime)
4. Capturing the network
5. Grab the data
6. Covering tracks
1. Initial Uncovering
Two steps are involved here. In the first step called as reconnaissance, the attacker
gathers information, as much as possible, about the target by legitimate means – searching the
information about the target on the Internet byGoogling social networking websites and people
finder websites.
2. Network probe
At the network probe stage, the attacker uses more invasive techniques to scan the
information. Usually, a “ping sweep” of the network IP addresses is performed to seek out
potential targets, and then a “port scanning” tool.
3. Crossingthe line towardelectroniccrime (E-crime)
Now the attacker is toward committing what is technically a “computer crime.” He/she does
this by exploiting possible holes on the target system.
4. Capturing thenetwork
At this stage, the attacker attempts to “own” the network. The attacker gains a foothold in
the internal network quickly and easily, by compromising low-priority target systems. The next
step is to remove any evidence of the attack.
5. Grab the data: Now that the attacker has “captured the network” he/she takes advantage of
his/her positiontostealconfidentialdata, customercreditcardinformation, defacewebpages,
alterprocesses and even launch attacks at other sites from your network, causing a potentially
expensive and embarrassing situation for an individual and/or for anorganization.
6. Covering tracks
This is the last step in any cyber-attack, which refers to the activities undertaken by the
attacker to extend misuse of the system without being detected.
Proxy Servers and Anonymizers
Proxy server is a computer on a network which acts as an intermediary for connections with
connection with the target system through existing connection with proxy.
A proxy server has following purposes:
One of the advantages of a proxy server is that its cache memory can serve all users. If one
or more websites are requested frequently, may be by diff erent users, it is likely to be in the proxy’s
cache memory, whichwillimproveuserresponsetime.
Infacttherearespecialserversavailableknownascache servers? A proxy can also do logging.
Listed are few websites where free proxy servers can be found:
1. http://www.proxy4free.com
2. http://www.publicproxyservers.com
3. http://www.proxz.com
4. http://www.anonymitychecker.com
5. http://www.surf24h.com
6. http://www.hidemyass.com
An Anonymizers or an anonymous proxy is a tool that attempts to make activityon the
Internet untraceable. It accesses the Internet on the user’s behalf, protecting personal information by
hiding the source computer’s identifying information.
Listed are few websites where more information about Anonymizers can be found:
1. http://www.anonymizer.com
2. http://www.browzar.com
3. http://www.anonymize.net
4. http://www.anonymouse.ws
5. http://www.anonymousindex.com
Phishing Password Cracking
While checking electronic mail (E-Mail) one day a user finds a message from the bank
threatening him/her to closethebankaccount ifhe/shedoesnotreplyimmediately. Althoughthemessage
seems to be suspicious fromthe contents of the message, it is difficult to conclude that it is a
fake/false E- Mail.
It is believed that Phishing is an alternative spelling of “fishing,” as in “to fish for information.”
The first documented use of the word “Phishing” was in 1996.
2. 382465304H: It is mix of numbers and a letter at the end, usually used on mass
user accounts and such passwords can be generated randomly.
3. 4pRte!ai@3: It is not a dictionary word; however it has cases of alpha along
with numeric and punctuation characters.
4. MoOoOfIn245679: It is long with both alphabets and numerals.
5. t3wahSetyeT4: It is not a dictionary word; however, it has both alphabets and numerals.
Random Passwords
We have explained in the previous section how most secure passwords are long with
random strings of characters and how such passwords are generally most difficult to remember.
Password is stronger if it includes a mix of upper and lower case letters, numbers and other
symbols, when allowed, for the same number of characters.
The general guidelines applicable to the password policies, which can be implemented
organization-wide, are as follows:
1. Passwords and user logon identities (IDs) should be unique to each authorized user.
2. Passwords should consist of a minimum of eight alphanumeric characters.
3. There should be computer-controlled lists of prescribed password rules and periodic
testing to identify any password weaknesses.
4. Passwords should be kept private, that is, not shared with friends, colleagues.
5. Passwords shall be changed every 30/45 days or less.
6. User accounts should be frozen after five failed logon attempts.
7. Sessions should be suspended after 15 minutes (or other specified period) of inactivity and
require the passwords to be re-entered.
8. Successful logons should display the date and time of the last logon and logoff .
9. Logon IDs and passwords should be suspended after a specified period of non-use.
10. For high-risk systems, after excessive violations, the system should generate an alarm and
be able to simulate a continuing session (with dummy data) for the failed user.
Keyloggers and Spywares
Keystroke logging, often called keylogging, is the practice of noting (or logging) the keys
struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware
that such actions are being monitored.
1. Software Keyloggers
Software keyloggers are software programs installed on the computer systems which
usually arelocatedbetweenthe OSandthekeyboardhardware, andeverykeystrokeisrecorded.
SC-KeyLog PRO
It allows to secretly record computer user activities such as E-Mails, chat conversations,
visited websites, clipboard usage, etc. in a protected log file.
The features and functions of such Spywares are beyond simple monitoring.
1. 007 Spy: It has following key features:
• Capability of overriding “antispy” programs like “ad-aware”;
• Record all websites url visited in internet;
• Powerful keylogger engine to capture all passwords;
• View logs remotely from anywhere at any time;
• Export log report in html format to view it in the browser;
• Automatically clean-up on outdated logs;
• Password protection.
2. Spector Pro: It has following key features:
• Captures and reviews all chats and instant messages;
• captures E-Mails (read, sent and received);
• captures websites visited;
• captures activities performed on social networking sites such as MySpace and
Facebook;
• enables to block any particular website and/or chatting with anyone;
• acts as a keylogger to capture every single keystroke (including usernames and
passwords).
3. eBlaster: Besides keylogger and website watcher, it also records E-Mails sent
and received, files uploaded/downloaded, logging users’ activities, record online searches,
recording Myspace and Facebook activities and anyother program activity.
4. Remotespy: Besides remote computer monitoring, silently and invisibly, it
also monitors and records users’ PC without any need for physical access. Moreover, it
records keystrokes(keylogger), screenshots, E-Mail, passwords, chats,
instantmessengerconversations and websites visited.
5. Stealth Recorder Pro: It is a new type of utility that enables to record a variety of sounds
and transfer them automatically through Internet without being notified by original location
or source. It has following features:
• Real-time mp3 recording via microphone, cd, line-in and stereo mixer as mp3, wma
or wav formatted files;
• Transferring via e-mail or ftp, the recorded files to a user-defined e-mail address or
ftp automatically;
• Controlling from a remote location;
• Voice mail, records and sends the voice messages.
6. Stealth Website Logger: It records all accessed websites and a detailed report can be
available on a specified E-Mail address.
Types of Viruses
Computer viruses can be categorized based on attacks on various elements ofthe
systemand can putthe system and personal data on the system in danger.
1. Boot sector viruses: It infects the storage media on which OS is stored (e.g., floppydiskettes
and hard drives) and which is used to start the computer system. The entire data/programs are
stored on the floppy disks and hard drives in smaller sections called sectors..
2. Program viruses: These virusesbecome active when the program file (usually with extensions.bin,
.com, .exe, .ovl, .drv) is executed (i.e., opened – program is started). Once these program files
get infected, the virus makes copies of itself and infects the other programs on the computer
system.
3. Multipartite viruses: It is a hybrid of a boot sector and program viruses. It infects program
files along with the boot record when the infected program is active.
Prepared by A N SREEDHAR Asst. Professor, Dept. of Page 12 of
Prepared by A N SREEDHAR Asst. Professor, Dept. of Page 13 of
IV- II SEM CSE, Cyber Security Unit - II
4. Stealth viruses: It camouflages and/or masks itself and so detecting this type of virus is very
difficult. It can disguise itself such a way that antivirus software also cannot detect it thereby
preventing spreading into the computer system.
5. Polymorphicviruses: It acts likea “chameleon” that changesitsvirus signature (i.e.,
binarypattern) everytime it spreads through the system (i.e., multiplies and infects a new file).
6. Macro viruses: Manyapplications, such as Microsoft Wordand Microsoft Excel, support
MACROs (i.e., macro languages). These macros are programmed as a macro embedded in
adocument.
7. Active X and Java Control: All the web browsers have settings about Active X and Java
Controls. Little awareness is needed about managing and controlling these settings of a web
browser.
A typical definition of computer virus/worms might have various aspects such as:
1. A virus attacks specific file types (or files).
2. A virus manipulates a program to execute tasks unintentionally.
3. An infected program produces more viruses.
4. An infected program may run without error for a long time.
5. Viruses can modify themselves and may possibly escape detection this way.
Trojan Horses and Backdoors
Trojan Horse is a program in which malicious or harmful code is contained inside apparently
harmless programming or data in such a way that it can get control and cause harm, for example,
ruining the file allocation table on the hard disk. ATrojan Horse mayget widelyredistributed as part
ofa computer virus. The term Trojan Horse comes from Greek mythology about the Trojan War.
Some typical examples of threats by Trojans are as follows
1. They erase, overwrite or corrupt data on a computer.
2. They help to spread other malware such as viruses (by a dropper Trojan).
3. They deactivate or interfere with antivirus and firewall programs.
4. They allow remote access to your computer (by a remote access Trojan).
5. They upload and download files without your knowledge.
6. They gather E-Mail addresses and use them for Spam.
7. They log keystrokes to steal information such as passwords and credit card numbers.
8. They copy fake links to false websites, display porno sites, play sounds/videos and
display images.
9. They slow down, restart or shutdown the system.
10. They reinstall themselves after being disabled.
11. They disable the task manager.
12. Theydisablethecontrol panel.
Backdoor
A backdoor is a means of access to a computer program that bypasses security
mechanisms. A programmer may sometimes install a backdoor so that the program can be
accessed for troubleshooting or other purposes.
Following are a few examples of backdoor Trojans:
1. Back Orifice: It is a well-known example of backdoor Trojan designed for remote system
administration. It enables a user to control a computer running the Microsoft Windows OS froma
remote location. The name is a word play on Microsoft BackOffice Server software. Readers
may visit http://www.cultdeadcow.com/tools/bo.html to know more about backdoor.
2. Bifrost: It is another backdoor Trojan that can infect Windows 95 through Vista. It uses the
typical server, server builder and client backdoor program configuration to allow a remote
attacker, who uses client, to execute arbitrary code on the compromised machine.
3. SAP backdoors: SAP is an Enterprise Resource Planning (ERP) system and nowadays ERP is
the heart of the business technological platform. These systems handle the key business
processes of the organization, such as procurement, invoicing, human resources management,
billing, stock management and financial planning.
4. Onapsis Bizploit: It is the open-source ERP penetration testing framework developed by the
Onapsis Research Labs. Bizploit assists security professionals in the discovery, exploration,
vulnerability assessment and exploitation phases of specialized ERP penetration tests. Readers
may visit http://www.onapsis.com/research.html to know more about this tool.
How to Protect from Trojan Horses and Backdoors
Follow the following steps to protect your systems from Trojan Horses and backdoors:
1. Stay away from suspect websites/weblinks: Avoid downloading free/pirated software’s
that often get infected by Trojans, worms, viruses and other things.
2. Surf on the Web cautiously: Avoid connecting with and/or downloading any information
from peer-to-peer (P2P) networks, which are most dangerous networks to spread Trojan
Horses and other threats.
3. It may be experienced that, after downloading the file, it never works and here is a threat
that although the file has not worked, something must have happened to the system the
malicious software deploys its gizmos and the system is at serious health risk.
4. Install antivirus/Trojan remover software: Nowadays antivirus software(s) have built-in
feature for protecting the system not only from viruses and worms but also from malware
such as Trojan Horses.
1. Hybrid P2P: There is a central server that keeps information about the network. The
peers are responsible for storing the information.
2. Pure P2P: There is absolutely no central server or router. Each peer acts as both client
and server at the same time. This is also sometimes referred to as “serverless” P2P.
2. Mixed P2P: It is between “hybrid” and “pure” P2P networks. An example of such a network
is Gnutella that has no central server but clusters its nodes around so-called “supernodes.”
Steganography
Steganography is a Greek word that means “sheltered writing.” It is a method that
attempts to hide the existence of a message or communication. The word “steganography”
comes fromthe two Greek words: steganos meaning “covered” and graphein meaning “to write”
that means “concealed writing.”
Invisible Folders
It has the ability to make any file or folder invisible to anyone using your PC
even on a network.
Invisible Secrets
It not only encrypts the data and files for safe-keeping or for secure transfer across the
Net but also hides them in places such as picture or sound files or webpages. These types of
files are a perfect disguise for sensitive information.
Stealth Files
It hides any type of file in almost any other type of file. Using steganography
technique, Stealth Files compresses, encrypts and then hides any type of file inside various
types of files (including EXE, DLL, OCX, COM, JPG, GIF, ART, MP3, AVI, WAV,
DOC, and BMP) and other types of video, image and executable files.
2. Steganalysis
Steganalysis is the art and science of detecting messages that are hidden in images,
audio/video files using steganography. The goal of steganalysis is to identify suspected
packages and to determine whether or not theyhave a payload encoded into them, and if
possible recover it. Automated tools are used to detect such steganographed data/information
hidden in the image and audio and/or video files.
SQL Injection
Structured Query Language (SQL) is a database computer language designed for
managing data in relational database management systems (RDBMS). SQL injection is a code
injection technique that exploits a security vulnerability occurring in the database layer of an
application.
The vulnerability is present when user input is either filtered incorrectly for string literal
escape characters embedded in SQL statements or user input is not strongly typed and thereby
unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur
whenever one programming or scripting language is embedded inside another. SQL injection
attacks are also known as SQL insertion attacks
1. Steps for SQL Injection Attack
Following are some steps for SQL injection attack:
1. The attacker looks for the webpages that allow submitting data, that is, login page, search
page, feedback, etc.
2. To check the source code of any website, right click on the webpage and click on “view
source” (if you are using IE – Internet Explorer) – source code is displayed in the notepad.
The attacker checks the source code of the HTML, and look for “FORM” tag in the HTML
code. Everything between the
<FORM< and </FORM> have potential parameters that might be useful to find the
vulnerabilities.
<FORM action=Search/search.asp method=post>
In C and C++, there are no automatic bounds checking on the buff er – which means a user
can write past a buff er. For example,
int main ()
{
int buffer[10]; buffer[20] = 10;
}
Types of Buffer Overflow
1. Stack-Based Buffer Overflow
1. Stack buff er overflow occurs when a program writes to a memory address on the program’s
call stack out- side the intended data structure usually a fixed length buff er.
2. “Stack” is a memory space in which automatic variables are allocated.
3. Function parameters are allocated on the stack and are not automatically initialized by
the system, so they usually have garbage in them until they are initialized.
4. Once a function has completed its cycle, the reference to the variable in the stack
is removed.
The attacker may exploit stack-based buff er overflows to manipulate the program in various
ways by overwriting:
1. A local variable that is near the buff er in memory on the stack to change the behavior
of the program that may benefit the attacker.
2. The return address in a stack frame. Once the function returns, execution will resume
at the return address as specified by the attacker, usually a user input-filled buff er.
3. A function pointer, or exception handler, which is subsequently executed. The factors
that contribute to overcome the exploits are
1. Null bytes in addresses.
2. Variability in the location of shell code.
3. Diff erences between environments.
2. NOPs
NOP or NOOP (short form of no peration or no operation performed) is an
assembly language instruction/ command that eff ectively does nothing at all.
3. Heap Buffer Overflow
Heap buff er overflow occurs in the heap data area and may be introduced
accidentally by an application programmer, or it may result from a deliberate exploit. In either
case, the overflow occurs when an application copies more data into a buff er than the buff er
was designed to contain. The characteristics of stack-based and heap-based programming are
as follows:
1. “Heap” is a “free store” that is a memory space, where dynamic objects are allocated.
2. The heap is the memory space that is dynamically allocated new(), malloc() and
calloc() functions.
3. Dynamically created variables are created on the heap before the execution program
is initialized to zeros and are stored in the memory until the life cycle of the object
has completed.
How to Minimize Buffer Overflow
Although it is difficult to prevent all possible attacks, the following methods will definitely help to
minimize such attacks:
Unit-3
Cyber forensics plays a key role in investigation of cybercrime. “Evidence” in the case of
“cyber off enses” is extremely important from legal perspective. There are legal aspects involved
in the investigation as well as handling of the digital forensics evidence. Only the technically
trained and experienced experts should be involved in the forensics activities.
The Florida Computer Crimes Act was the first computer crime law to address computer
fraud and intrusion. It was enacted in Florida in 1978.
There are two categories of computer crime: one is the criminal activity that involves
using a computer to commit a crime, and the other is a criminal activity that has a computer as a
target.
Forensics means a “characteristic of evidence” that satisfies its suitability for admission as
fact and its ability to persuade based upon proof.
The goal of digital forensics is to determine the “evidential value” of crime scene and
related evidence.
Digital forensics is the application of analyses techniques to the reliable and unbiased collection,
analysis, interpretation and presentation of digital evidence.
1. Computer forensics
It is the lawful and ethical seizure, acquisition, analysis, reporting and safeguarding of
data and metadata derived from digital devices which may contain information that is notable
and perhaps of evidentiary value to the trier of fact in managerial, administrative, civil and
criminal investigations. In other words, it is the collection of techniques and tools used to find
evidence in a computer.
2. Digital forensics
It is the use of scientifically derived and proven methods toward the preservation,
collection, validation, identification, analysis, interpretation, documentation and presentation of
digital evidence derived from digital sources for the purpose of facilitation or furthering the
reconstruction of events found to be criminal, or helping to anticipate unauthorized actions
shown to be disruptive to planned operations.
Data seen using forensics tools. FAT means file allocation table.
Chain of custody means the chronological documentation trail, etc. that indicates
the seizure, custody, control, transfer, analysis and disposition of evidence, physical or
electronic.
“Fungibility” means the extent to which the components of an operation or product can
be inter- changed with similar components without decreasing the value of the operation or
product.
Chain of custody is also used in most evidence situations to maintain the integrity of
the evidence by providing documentation of the control, transfer and analysis of evidence.
1. Computer forensics.
2. Network forensics.
Network forensics is the study of network traffic to search for truth in civil, criminal and
administrative matters to protect users and resources fromexploitation, invasion of privacy
and any other crime fostered by the continual expansion of network connectivity.
As compared to the “physical” evidence, “digital evidence” is diff erent in nature because
it has some unique characteristics. First of all, digital evidence is much easier to
change/manipulate! Second, “perfect” digital copies can be made without harming original.
This is a very important discussion, especially, for those who are students of legal
courses. It was mentioned in that the Indian IT Act amended the Indian Evidence Act.
According to the “Indian Evidence Act 1872,” “Evidence” means and includes:
1. All statements which the court permits or requires to be made before it by witnesses, in
relation to matters of fact under inquiry, are called oral evidence.
2. All documents that are produced for the inspection of the court are called documentary
evidence.
Paper evidence, the process is clear and intuitively obvious. Digital evidence by its very
nature is invisible to the eye. Therefore, the evidence must be developed using tools other
than the human eye.
There are number of contexts involved in actually identifying a piece of digital evidence:
1. Physical context: It must be definable in its physical form, that is, it should reside on a specific
piece of media.
2. Logical context: It must be identifiable as to its logical position, that is, where does it
reside relative to the file system.
3. Legal context: We must place the evidence in the correct context to read its meaning. This
may require looking at the evidence as machine language, for example, American
Following are some guidelines for the (digital) evidence collection phase:
1. Adhere to your site’s security policy and engage the appropriate incident handling and
law enforcement personnel.
2. Capture a picture of the system as accurately as possible.
Mail server software is a network server software that controls the flow of E-Mail and
the mail client software helps each user read, compose, send and delete messages.
As per FBI’s (Federal Bureau of Investigation) view, digital evidence is present in nearly every
crime scene. That is why law enforcement must know how to recognize, seize, transport and
store original digital evidence to preserve it for forensics examination.
1. Is admissible.
2. Is authentic.
3. Is complete.
4. Is reliable.
5. Is understandable and believable.
Let us now understand what is involved in the digital forensics process.
The digital forensics process needs to be understood in the legal context starting from
preparation of the evidence to testifying. Digital forensics evidence consists of exhibits, each
consisting of a sequence of bits, presented by witnesses in a legal matter to help jurors establish
the facts of the case and support or refute legal theories of the case.
Fig: Process model for understanding a seizure and handling of forensics evidence legal
framework.
In order to be processed and applied, evidence must first be identified asevidence. It can
happen that there is an enormous amount of potential evidence available for a legal matter, and
it is also possible that the vast majority of the potential evidence may never get identified.
Digital evidence can be collected from many sources. Obvious sources include
computers, cell phones, digital cameras, hard drives, CD-ROM, USB memory devices and so
on. Non-obvious sources include settings of digital thermometers, black boxes inside
automobiles, RFID tags and webpages (which must be preserved as they are subject to
change).
As a general rule, one should not examine digital information unless one has the legal authority to
do so. Amateur forensics examiners should keep this in mind before starting any unauthorized
investigation.
For the purpose of digital evidence examination, “imaging of electronic media” (on which the
evidence is believed to be residing) becomes necessary.
Analysis, interpretation and attribution of evidence are the most difficult aspects encountered by
most forensics analysts. In the digital forensics arena, there are usually only a finite number of
possible event sequences that could have produced evidence.
Recall the mention of network forensics. We have already discussed that opennetworks
can be the source of many network-based cyberattacks. A situation like this leads to the point
that network forensics professionals need to understand how wireless networks work and the
fundamentals of related technology.
Wireless forensics is a discipline included within the computer forensics science, and
specifically, within the network forensics field. The goal of wireless forensics is to provide the
methodology and tools required to collect and analyze (wireless) network traffic that can be
presented as valid digital evidence in a court of law.
Approaching a Computer Forensics Investigation
From the discussion so far, we can appreciate that computer forensics investigation is a
detailed science. Now, let us understand how a forensics investigation is typically approached
and the broad phases involved in the investigation. The phases involved are as follows:
1. Secure the subject system (from tampering or unauthorized changes during
the investigation);
2. take a copy of hard drive/disk (if applicable and appropriate);
3. identify and recover all files (including deleted files);
4. access/view/copy hidden, protected and temp files;
5. study “special” areas on the drive (e.g., the residue from previously deleted files);
6. investigate the settings and any data from applications and programs used on the
system;
7. consider the system as a whole from various perspectives, including its structure and
overall contents;
8. consider general factors relating to the user’s computer and other activity and habits
in the context of the investigation;
1. Customer’s representation: Customer needs to warrant the forensics laboratory that he/she is
the owner of, and/or has the right to be in possession of, all equipment/data/media furnished to
the laboratory and that collection, possession, processing and transfer of such
equipment/data/media are in compliance with data protection laws to whichcustomer is subject
to.
2. Legal aspects/the law side: Both the parties need to agree that the agreement shall be governed
by prevailing law in every particular way including formation and interpretation and shall be
deemed to have been made in the country where the contract is signed.
3. Data protection: The computer forensics laboratory (engaged in the investigation) will hold the
information that the customer has given verbally, electronically or in any submitted form for
the purpose of the forensics investigation to be carried out as per contracted services from the
forensics laboratory.
4. Waiver/breach of contract: The waiver by either party of a breach or default of any of the
provisions on this agreement by either party shall not be construed as a waiver of any
succeeding breach of the same or other provisions, nor shall any delay or omission on the part
of either party to exercise or avail itself of any right, power or privilege that it has, or may have
hereunder operates as a waiver of any breach or default by either party.
These are just some broad illustrative steps and they may vary depending on the specific
case in hand.
1. Prepare for the forensics examination.
2. Talk to key people to find out what you are looking for and what the circumstances
surrounding the case are.
3. If you are convinced that the case has a sound foundation, start assembling your tools to
collect the data in question. Identify the target media.
4. Collect the data from the target media. You will be creating an exact duplicate image
ofthe device in question. To do this, you will need to use an imaging software application
like the commercial in Case or the open-source Sleuth Kit/Autopsy.
5. To extract the contents of the computer in question, connect the computer you are
investigating to a portable hard drive or other storage media and then boot the computer
under investigation according to the directions for the software you are using.
6. When collecting evidence, be sure to check E-Mail records as well. Quite often, these
messages yield a great deal of information.
7. Examine the collected evidence on the image you have created. Document anything that
you find and where you found it.
8. Analyze the evidence you have collected by manually looking into the storage media and,
if the target system has a Windows OS, check the registry.
9. Report your findings back to your client. Be sure to provide a clear, concise report; this
report may end up as evidence in a court case.
There are four broad types of requirements, namely, the physical space, the hardware
equipment, the software tools and the forensics procedures to be followed to aid those involved in the
cybercrime investigation.
Apart from the physical space requirement, another key requirement for a computer
forensics laboratory is the hardware items. The laboratory requires a number of computers,
including a network server with a large storage capacity (preferably configured for the standard
removable hard drives).
Fig: (a) SIM card reader, (b) iButtons, (c) flash memory, (d) SIM card.
On the software side, there are several requirements for setting up a forensics laboratory. The
standard forensics software package, such as EnCase, Web Case, Forensics Tool Kit, Password
Recovery Tool Kit, etc. are expensive products.
The main issues that are attacked when evidence is presented in a court of law are credentials
and methodology. In some countries, the court may prefer the forensics evidence from government
appointed and/or neutral party laboratories rather than the evidence from private agencies where
opportunities for manipulation/exploitation are perceived.
Steganography is the art of information hiding. The threat raised by steganography is very
real. Its use is not easy to detect or intercept, as the information does not need to be broadcast across
the Internet. the hidden message can reside unsuspectingly on a website, for example, and can be
viewed from around the world.
Steganography is the art of information hiding. The threat raised by steganography is very
real. Its use is not easy to detect or intercept, as the information does not need to be broadcast across
the Internet. The hidden message can reside unsuspectingly on a website, for example, and can be
viewed from around the world.
Rootkits
The term rootkit is used to describe the mechanisms and techniques whereby malware
including viruses, Spyware and Trojans attempt to hide their presence from Spyware blockers,
antivirus and system management utilities.
Information Hiding
Let us now have an overview of some characteristics of information hiding and then we
discuss about analysis methods for determining the existence of and potential locations of hidden
information.
The OSI 7 Layer Model is useful from computer forensics perspective because it addresses
the network protocols and network communication processes. The basic familiarity with the OSI 7
Layer Model is assumed for the discussion in this section.
Foot printing includes a combination of tools and techniques used to create a full profile of
the organization’s security posture. These include its domain names, IP addresses and network
blocks.
The hacker will typically send a ping echo request packet to a series of target IP addresses. As
a result of this exploratory move by the hacker, the machines assigned to one of these IP address will
send out echo response thereby confirming that there is a live machine associated with that address.
Similarly, a TCP scan sends a TCP synchronization request to a series of ports and to the machines
that provide the associated service to respond.
Step 4: Privilege
When a hacker gains access to the system, he will only have the privileges granted to the user
or account that is running the process that has been exploited.
Step 5: Exploit
Gaining root access gives the hacker full control on the network. Every hacker seems to have
his/her own reasons for hacking. Some hackers do it for fun or a challenge, some do it for financial
gain and others do it to “get even”.
Step 6: Retracting
Finally, most hackers will try creating provisions for entry into the network/hacked system
for later use. this, they will do by installing a backdoor to allow them access in the future.
With the rampant use of the Internet, there is so much at stake; corporate data is not safe
anymore given that almost all information assets lie on the corporate networks. We are in the era
of Net-centric digital economy.
Criminals can gather small pieces about you, about your confidential data to generate what
is known as “digital persona,” that is, they keep track about your Internet activities, what resides
on your corporate networks, etc.
1. The Sarbanes Oxley Act (SOX): The Act was enacted to fight corporate fraud.
2. California SB 1386
c) Protect against unauthorized access to or use of such information that could result
in substantial harm or inconvenience to any customer.
HIPAA has the primary goal for healthcare providers to improve the privacy and security
of their clients’ medical information.
Unit-4
Fig: Hand-held devices. (a) iPhone; (b) iPod; (c) palm pilot; (d) digital diary;
(e) Smartphones; 2 GB MP2 player; (g) portable printer; (h) handycam and (i) PDA.
The methodology used is acquiring the evidence without altering or damaging (safe custody of
the evidence) the original digital evidence, authenticating that the recovered evidence is the same as
the original seized and analyzing the data without modifying it (chain of custody concept). They are
relevant here too because we will be introducing some more legal aspects of forensics
The terms “device forensics” and “hand-held forensics” are used interchangeably.
According to the Internet and Mobile Association of India, Internet usage in the country has
risen by 20% in the last year alone with people progressively spending more time online. Indians
are increasingly accessing and transmitting sensitive information from their workstations/PCs,
from home and while in transit through their laptops, netbooks or Smartphones.
While mobile phones outsell personal computers (PCs) three to one, mobile phone
forensics still lags behind computer forensics.
There are diff erent types of digital cellular networks. these networks exist due to the
distinct and incompatible sets of network protocol standards. the two most dominant types of
digital cellular networks are:
There are other common cellular networks; they include Time Division Multiple
Access (TDMA) and Integrated Digital Enhanced Network (iDEN). iDEN networks use a
proprietary protocol designed by Motorola, while the others follow standardized open
protocols.
NTT DoCoMo
Digital Advanced Mobile Phone Service (D-AMPS) is the digital version of the original
analog standard for cellular telephone phone service. Now “Do Communication over the Mobile
Network” (DoCoMo) is also available. NTT DoCoMo is Japan’s largest wireless network
carrier.
Diff erent devices have diff erent technical and physical features/characteristics (e.g.,
size, weight, processor speed and memory capacity). Devices may also use diff erent types of
expansion capabilities to provide additional functionality. Cell phone capabilities sometimes
include those of other devices such as personal digital assistants (PDAs), global positioning
systems (GPS) and cameras.
Irrespective of a cell phone type, all devices support voice and text messaging, a set of
basic personal information management (PIM) applications including phonebook and date
book facilities, and a means to synchronize PIM data with a desktop computer. More
There is no dearth of hand-held devices in the modern world of today. The use of
these devices is rampant given the modern lifestyles in our digital economy.
“Device forensics” has many aspects such as mobile phone forensics, PDA forensics,
digital music forensics, iPod forensics and printer and scanner forensics.
Mobile phone or cell phone is the most familiar hand-held device because it is the
most ubiquitous one. Nathan B. Stubble field invented and patented the first mobile
telephone 100 years ago.
As mentioned before, modern cell phones are highly mobile communications devices
designed to perform a range of functions from that of a simple digital organizer to that of a
low-end PC. Designed for mobility, they are compact in size, battery powered and
lightweight, often use proprietary interfaces or OS and may have unique hardware
characteristics for product diff erentiation.
“Mobile phone forensics” is the science of recovering digital evidence from a mobile
phone under forensically sound conditions using accepted methods.
o PDA Forensics
PDAs differ in several important ways compared with PCs. PDAs vary in areas of OS,
interface style and hardware components, and they work with different OS such as Linux,
Palm OS and Microsoft Pocket PC.
Investigating crimes involving PDAs are more challenging than those involving normal
computers. This is mainly because these devices are more compact, battery operated and store
data in volatile memory.
1. PDD: It is based on the Unix dd. This is the most popular Palm forensics software.
2. CodeWarrior for Palm OS: It is used to put palm devices into “Debug Mode.” This
allows communication via serial port, imaging and can be used to overcome lockout
protection.
Forensics tools acquire data from a device in one of the following two ways: “physical
acquisition” and “logical acquisition.”
o Printer Forensics
One may wonder how printers can pose security risks. Printers are not generally
considered to be “hand- held” devices although “portable printers” are now available in the
market.
Modern day printers have computer-like characteristics with internal storage, FTP
uploading, Simple Network Management Protocol (SNMP), etc. Some printers are loaded
with vulnerable applications.
No two printers of the same model will behave in the exact same pattern. This is because the
mechanical parts that make the printer will not be 100% equivalent.
Today, a large portion of digital image data is available. Acquisition devices such as
digital cameras and scanners are used to create that data. With cameras, it is possible to
digitally reproduce scenes that may look almost as real as natural scenes
Smartphone Forensics
Workforce mobility is on the rise and Smartphones are gaining momentum as a device
option for people working at the field (field workers include, e.g., sales personnel,
technicians, insurance agents, medical officers, pathological laboratory technicians who off er
door-to-door medical service, etc.). The main reason for rising popularity of Smartphones is
their high functionality that comes in a relatively low-cost device.
Smartphones are mobile phones based on high-level OS that are open to third-party
application development.
Printer Forensics
One may wonder how printers can pose security risks. Printers are not generally
considered to be “hand- held” devices although “portable printers” are now available in the
market.
Modern day printers have computer-like characteristics with internal storage, FTP
uploading, Simple Network Management Protocol (SNMP), etc. Some printers are loaded
with vulnerable applications.
So far, we have been through the forensics aspects of PDAs, Smartphones, cell phones,
printers, scanners, iPhones BlackBerrys and digital images/digital cameras.
Acquisition of data from a hand-held device is carried out in the following two ways:
1. Physical acquisition: In this particular type of acquisition, an exact copy bit-by-bit iscollected
of the entire physical storage which can be either a RAM chip or a disk drive.
2. Logical acquisition: This is an exact copy bit-by-bit of the logical storage such as file and
directories, involved residing on a logical store which could be several disk drives.
EnCase
EnCase is a popular software toolkit for hand-held device forensics. Its features support
many features: analytical tools, suspect media acquisition, data capture, documentation and
search features.
These are two famous tools from Paraben. Paraben’s device seizure is one of the many
products used for viewing cell phone data.
Palm DD (PDD)
There was a mention of this tool (PDA Forensics). The PDD tool runs only on Windows
based systems and is mainly used by forensics examiners for physical acquisition.
The Forensics Card Reader (FCR) consists of FCR software. It allows forensics
examiners to acquire data from SIM cards without modification and a smart card reader with
USB connection.
Cell Seizure
Large type of data that can be obtained on most cell phones, using Cell Seizure includes:
MOBILedit!
Forensic SIM
This toolkit comes from Radio Tactic. Its components include: acquisition terminal,
analysis application, control card, data storage cards and the card reader.
In this section we focus on discussion about iPods and other hand-held devices
available for music in digital form. Apple is the leading brand in the market today and there
are three separate digital media players available from Apple Inc. All the players from Apple
have the iPod brand – they are either the original iPod, the iPod Nano or an iPod shuffle.
Criminals can use the iPod with all its features in a variety of ways. Calendar entries
may contain dates of crimes or other events that could be related to a crime. The contact
information of conspirators or victims, along with photos or other documentation, could all be
transferred and stored on the iPod.
Fig: Apple iPods. (a) Apple iPOD (regular), (b) Apple iPOD (mini),
(c) Apple iPOD (fourth generation) and (d) Apple iPOD
As mentioned before, the iPod is one of the most popular digital music devices in
today’s marketplace. The newest versions of the iPod have become similar to PDA/storage like
never before.
The market for digital music device is continuously growing - with that comes higher
use of iPods in criminal activity.
Here are some important considerations when an iPod is found at a crime scene:
1. Before collecting any evidence, the first responder should wait for the advice of a
forensics specialist.
2. Documentation of device location on the crime scene should be notedtaking a photograph
of its location along with the photograph of anything around the device.
3. The device should be left in its current state, as it is possible that the device could be booby
trapped with a delete command set to execute if the device is disconnected from a charger
or computer.
Hackers are getting sophisticated. This is true for mobile phone-based crimes as well as
crimes performed with other small hand-held devices.
The arrival of computers in commercial disputes and in criminal cases did not create
immediate difficulties as judges sought to allow computer-based evidence on the basis that it
was not any different from traditional forms of evidence.
The ultimate aim of a forensics investigation is that the evidence can be used in legal
proceedings. As we have learned by now, forensic computer examinations are unlike ordinary
data recovery eff orts.
Computer evidence in the court is used by the following entities
1. Criminal Prosecutors: They use computer evidence in a variety of crimes where
incriminating documents can be found: homicides, financial fraud, drug and embezzlement
record keeping and child pornography.
2. Civil litigations: They can readily make use of personal and business records found on
computer systems that bear on fraud, divorce, discrimination and harassment cases.
3. Insurance Companies may be able to mitigate costs by using discovered computer
evidence of possible fraud in accident, arson and workman’s compensation cases.
4. Corporations often hire computer forensics specialists to ascertain evidence relating to
sexual harassment, embezzlement, theft or misappropriation of trade secrets and other
internal/confidential information.
5. Law Enforcement Officials frequently require assistance in pre-search warrant
preparations and post-seizure handling of the computer equipment.
6. Individuals sometimes hire computer forensics specialists in support of possible claims of
wrongful termination, sexual harassment or age discrimination.
There are many issues and challenges. Such issues can pose a threat to the validity of
mobile phone forensics. For example, there are difficulties in acquiring certain types of data
that stem from the proprietary nature of mobile phones.
Some ofthe current mobile forensics tools claim that theyacquire evidence from mobile
phones in a forensically sound manner, and maintain their integrity upon further examination.
There are additional challenges apart fromthe “evidence integrity” issues mentioned in
the previous section. When it comes to dealing with digital evidence obtained from mobile
devices, law enforcement and digital forensics still lag behind. ftis could be partly due to some
of the following reasons
A key difference between computers and mobile phones is the data storage medium.
While volatile memory is used to store user data in mobile phones, computers use non-volatile
hard disk drives instead as a storage medium.
Toolkit Constraints
There are constraints for forensics tools and toolkits too and that is for historical
reasons. When initially mobile phones came into market, they did not have the capacity for
large amount of information storage.
There are third-party companies that develop mobile forensics toolkits. However, the
toolkits are not independently verified or tested for forensics soundness.
Principles that are generally accepted in the forensics community about computer based
electronic evidence are as follows:
1. Actions taken by law enforcement agencies or by their agents should NOT modify
data held on a computer or storage media because this is the data on which in the court
relies upon.
When it comes to handling instructions for mobile phones, the following key principles
should be remembered:
Evidence may get lost during any interaction with the handset on a mobile phone;
therefore, it is important not to interrogate the handset or SIM.
Before handling the evidence, consider if any other evidence is required fromthe
phone. In case additional evidence, apart from electronic data, is required, adhere to the
general evidence handling procedures for that particular type of evidence laid out in the
scenes of crime handbook.
Typically, three types of batteries are used in mobile phones: Liion (lithiumion), NiMH
(nickel metal hydride) and Lipolymer.
Unit-5
In the global environment with continuous network connectivity, the possibilities for
cyberattacks can emanate from sources that are local, remote, domestic or foreign. They could be
launched by an individual or a group. They could be casual probes from hackers using personal
computers (PCs) in their homes, hand-held devices or intense scans from criminal groups.
PI is information that is, or can be, about or related to an identifiable individual. It includes
any information that can be linked to an individual or used to directly or indirectly identify an
individual.
Most information the organization collects about an individual is likely to come under “PI”
category if it can be attributed to an individual. For an example, PI is an individual’s first name or
first initial and last name in combination with any of the following data:
A case in point is the infamous “Heartland Payment System Fraud” that was uncovered
in January 2010. This incident brings out the glaring point about seriousness of “insider
attacks. In this case, the concerned organization suff ered a serious blow through nearly 100
million credit cards compromised from at least 650 financial services companies. When a card
is used to make a purchase, the card information is trans- mitted through a payment network.
Yet another incidence is the Blue Cross Blue Shield (BCBS) Data Breach in October
2009 the theft of 57 hard drives from a BlueCross BlueShield of Tennessee training facility
puts the private information of approximately 500,000 customers at risk in at least 32 states.
The two lessons to be learnt from this are:
1. Physical security is very important.
2. Insider threats cannot be ignored.
A key message from this discussion is that cybercrimes do not happen on their own or
in isolation. Cybercrimes take place due to weakness of cybersecurity practices and “privacy”
which may get impacted when cybercrimes happen.
The key challenges from emerging new information threats to organizations are as follows:
1. Industrial espionage: There are several tools available for web administrators to
monitor and track the various pages and objects that are accessed on their
website.
2. IP-based blocking: This process is often used for blocking the access of specific IP
addresses and/or domain names.
3. IP-based “cloaking”: Businesses are global in nature and economies are interconnected.
4. Cyberterrorism: “Cyberterrorism” refers to the direct intervention of a threat source
toward your organization’s website.
5. Confidential information leakage: “Insider attacks” are the worst ones. Typically,
an organization is protected from external threats by your firewall and antivirus
solutions.
Reflecting on the discussion in the previous sections brings us to the point that
cybercrimes cost a lot to organizations.
When a cybercrime incidence occurs, there are a number of internal costs associated
with it for organizations and there are organizational impacts as well.
Detection and recovery constitute a very large percentage of internal costs. This is
supported by a benchmark study conducted by Ponemon Institute USA carried out with the
sample of 45 organizations representing more than 10 sectors and each with a head count of at
least 500 employees.
The internal costs typically involve people costs, overhead costs and productivity
losses. The internal costs, in order from largest to the lowest and that has been supported by the
benchmark study mentioned:
1. Detection costs.
2. Recovery costs.
3. Post response costs.
4. Investigation costs.
5. Costs of escalation and incident management.
6. Cost of containment.
The consequences of cybercrimes and their associated costs, mentioned
1. Information loss/data theft.
2. Business disruption.
The most often quoted reasons by employees, for use of pirated software, are as follows:
There are tools to protect organization’s bandwidth by stopping unwanted traffic before
it even reaches your Internet connection.
Use of mobile handset devices in cybercrimes. Most mobile communication devices for
example, the personal digital assistant
Although the use of social media marketing site is rampant, there is a problem related to
“social computing” or “social media marketing” – the problem of privacy threats.
Exposures to sensitive PI and confidential business information are possible if due care
is not taken by organizations while using the mode of “social media marketing.”
5. To collect potential customer profiles. Social media sites have information such as user
profile data, which can be used to target a specific set of users for advertising
There are other tools too that organizations use; industry practices indicate the following:
1. Twitter is used with higher priority to reach out to maximum marketers in the
technology space and monitor the space.
2. Professional networking tool LinkedIn is used to connect with and create a communityof
top executives from the Fortune 500.
3. Facebook as the social group or social community tool is used to drive more traffic
to Websense website and increase awareness about Websense.
4. YouTube (the video capability tool to run demonstrations of products/services, etc.) is
used to increase the brand awareness and create a presence for corporate videos.
5. Wikipedia is also used for brand building and driving traffic.
There are three kinds of spheres and their characteristics are as follows:
1. User sphere: Here data is stored on users’ desktops, PCs, laptops, mobile phones, Radio
Frequency Identification (RFID) chips, etc. Organization’s responsibility is to provide access to
users and monitor that access to ensure misuse does not happen.
2. Recipient sphere: Here, data lies with recipients: servers and databases of network providers,
service providers or other parties with whom data recipient shares data.
3. Joint sphere: Here data lies with web service provider’s servers and databases. This is the in
between sphere where it is not clear to whom does the data belong.
Protecting People’s Privacy in the Organization
The costs associated with cybercrimes. A key point in that discussion is that people
perceive their PI/SPI to be very sensitive. From privacy perspective, people would hate to be
monitored in terms of what they are doing, where they are moving.
In the US, Social Security Number is a well-established system/mechanism for uniquely
identifying all American citizens; however, similar thoughts are now emerging in India. The
UID Project was started by Government of India and is running through an agency called
Unique Identification Authority of India (UIDAI) based on the similar concept.
The categories of guiding procedures and activities that facilitate DFI are as follows:
1. Retaining information;
2. Planning the response;
3. Training;
4. Accelerating the investigation;
5. Preventing anonymous activities;
6. Protecting the evidence.
In the context of forensic readiness discussion, the key activities are presented. These
are the activities that an organization should consider if they wish to be forensically ready.