cs part1
cs part1
UNIT-1
Introduction:
The internet in India is growing rapidly. It has given rise to new opportunities in every
field we can think of be it entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own disadvantages is Cyber crime-
illegal activity committed on the internet.
Another definition:
• A crime committed using a computer and the internet to steal a person’s identity(identity
theft) or sell contraband or stalk victims or disrupt operations with malevolent programs.
• All criminal activities done using the medium of computers, the Internet, cyberspace and
the WWW.
• Cybercrime refers to the act of performing a criminal act using cyberspace as communication
vehicle.
• Techno- crime
• Techno – vandalism
– Cyberstalking
– Ignoring copyrights
– Software piracy
Categorization of Cybercriminals:
– Hobby hackers
– Terrorist organizations
– Psychological perverts
– State-sponsored hacking
Type 3: Cybercriminals- the insiders
Classification of cybercrimes:
1. Cybercrime against an individual
Individuals
Property
Organizations
• Single event of crime: It is a single wevent from the perspective of the victim
Email spoofing:
Email spoofing is a technique used in spam and phishing attacks to trick users into thinking a
message came from a person or entity they know or trust. In spoofing attacks, the sender
forges email headers so that client software displays the fraudulent sender address, which
most users take at face value. Users don’t realize the sender is forged unless they inspect
the header more closely.
Email spoofing is possible due to how email systems are designed. The client application
assigns a sender address to outgoing messages, so outgoing email servers cannot identify
whether the sender address is legitimate or spoofed.
Recipient servers and antimalware software can help detect and filter spoofed messages.
Unfortunately, not every email service has security protocols in place. Still, users can review
each message’s email header to determine whether the sender address is forged.
Phishing attacks are the practice of sending fraudulent communications that appear to come
from a reputable source. It is usually done through email. The goal is to steal sensitive data like
credit card and login information, or to install malware on the victim's machine.
Spear phishing is a specific and targeted attack on one or a select number of victims, while
regular phishing attempts to scam masses of people. In spear phishing, scammers often use
social engineering and spoofed emails to target specific individuals in an organization.
Spamming:
Spamming is the use of electronic messaging systems like e-mails and other digital delivery
systems and broadcast media to send unwanted bulk messages indiscriminately.
• Spammers use many forms of communication to bulk-send their unwanted messages. Some
of these are marketing messages peddling unsolicited goods. Other types of spam messages
can spread malware, trick you into divulging personal information, or scare you into
thinking you need to pay to get out of trouble.
• Email spam filters catch many of these types of messages, and phone carriers often warn
you of a “spam risk” from unknown callers. Whether via email, text, phone, or social media,
some spam messages do get through, and you want to be able to recognize them and
avoid these threats.
Cyber Defamation:
Cyber defamation, also known as online defamation, is when someone is falsely accused of
something online. Cyber defamation is the use of the internet or a computer to damage another
person's reputation or diminish one's own reputation in the eyes of others.
Cyber Stalking:
Pornographic offenses:
The punishment for a first offence of publishing, creating, exchanging, downloading or browsing
any electronic depiction of children in obscene or indecent or sexually explicit manner is
imprisonment
password sniffing:
Password sniffing is a type of network attack in which an attacker intercepts data packets that
include passwords. The attacker then uses a password-cracking program to obtain the actual
passwords from the intercepted data.
Password sniffing is a type of network attack in which an attacker intercepts data packets
that include passwords. The attacker then uses a password-cracking program to obtain the
actual passwords from the intercepted data.
⚫ Denial-of-service attacks
⚫ Virus attack/dissemination of viruses
⚫ E-Mail bombing/mail bombs
An email bomb is a form of Internet abuse which is perpetrated through the sending of
massive volumes of email to a specific email address with the goal of overflowing the
mailbox and overwhelming the mail server hosting the address, making it into some form of
denial of service attack.
⚫ Salami attack/ Salami technique:
A salami attack is a method of cybercrime that attackers or a hacker typically used to commit
financial crimes. Cybercriminals steal money or resources from financial accounts on a system
one at a time. This attack occurs when several minor attacks combine to create a sturdy attack.
because of this sort of cybercrime, these attacks frequently go undetected. Salami attacks are
used for the commission of economic crimes Those who are found guilty of such an attack face
punishment under Section 66 of the IT Act.
⚫ Logic bomb
A logic bomb is a set of instructions in a program carrying a malicious payload that can attack
an operating system, program, or network. It only goes off after certain conditions are met. A
simple example of these conditions is a specific date or time.
⚫ Trojan Horse
A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a
legitimate program. The delivery method typically sees an attacker use social engineering to
hide malicious code within legitimate software to try and gain users' system access with their
software.
⚫ Data diddling
Data diddling is a type of cybercrime in which data is altered as it is entered into a computer
system, most often by a data entry clerk or a computer virus. Computerized processing of the
altered data results in a fraudulent benefit.
⚫ Industrial spying/ industrial espionage
Industrial espionage is the covert, and sometimes illegal, practice of investigating competitors
to gain a business advantage. The target of an investigation might be a trade secret, such as a
proprietary product specification or formula, or information about business plans.
⚫ Computer network intrusions
⚫ Software piracy
• Forgery
• Cyberterrorism
• Web jacking
• The categories of vulnerability that hackers typically search for are the following
3. Application Servers
4. Misconfigured systems
1. Passive attack:
gains information about target
Breach of confidentiality
2. Active attack:
a. Port scanning
b. Network scanning
c. Vulnerability scanning
Social engineering:
• Social Engineering is the “technique to influence” and “persuation to deceive” people
• The goal of social engineer is to fool someone into providing valuable information or access
to that information
Shoulder surfing
Dumpster diving
E-mail attachments
Pop-up windows
Cyberstalking:
• Types of stalkers
1. Key loggers/spyware
2. Shoulder surfing- a situation where the attacker can physically view the device screen and
keypad to obtain personal information.
• A recent survey reveals the following facts about the cyber cafes:
3. Deepfreeze
4. Annual maintenance contract found not in a place for servicing the system
1. Always logout
4. Be alert
6. Change passwords
7. Virtual keyboard
8. Security warnings
• One can ensure the following to secure their system from becoming a part of botnet:
3. Use a firewall
4. Disconnect from the internet when you are away from the computer
5. Download the freeware only from the websites that are known and trustworthy
6. Check regularly the folders in the mailox for those you did not send.
1. Attack by e-mail
2. Attachments
3. Attack by deception
4. Hackers
5. Attack by webpages
7. Malicious macros
9. Viruses
Cloud computing:
• Cloud computing is internet-based development and use of computer technology used for
hosted services delivered over the internet
1. it is sold on demand
• Types of services
1. Infrastructure –as-a-service(IaaS)
2. Platform–as-a-service(PaaS)
3. Software–as-a-service(SaaS)
• Cybercrime and cloud computing
2. Regulatory complaince
3. Location of data
4. Segregation of data
5. Recovery of data
UNIT-2
Proliferation of mobile and wireless devices:
⚫ You see them everywhere: people hunched over their smartphones or tablets in
cafes, airports, supermarkets and even at bus stops, seemingly oblivious to anything
or anyone around them.
⚫ They play games, download email, go shopping or check their bank balances on the
go.
⚫ They might even access corporate networks and pull up a document or two on their
mobile gadgets.
TRENDS IN MOBILITY:
⚫ Mobile computing is moving into a new era, third generation ( 3G), which promises
greater variety in applications and have highly improved usability as well as speedier
networking. smart mobile technology is rapidly gaining popularity and the attackers
(hackers and crackers) are among its biggest fans.
⚫ It is worth noting the trends in mobile computing; this will help readers to readers to
realize the seriousness of cybersecurity issues in the mobile computing domain.
Figure below shows the different types of mobility and their implications.
1. Keep Details: Record all your phone's information (e.g., phone number, make,
model, colour, security codes, IMEI number) and store it safely.
2. Add Security Marks: Mark your phone with a UV pen, including your postcode,
house number, or alternate contact info, so it can be easily identified if lost.
3. Use Security Codes: Activate security lock codes or PIN features on your phone to
make it less valuable to thieves and protect personal data.
4. Register with Network Operator: Register your phone with your service provider. In
case of theft, report it immediately and provide the IMEI number for possible device
blocking.
5. Keep Records of Theft Reporting: Document your call to the carrier with details of
when you reported the theft and any confirmation that your phone was disabled.
6. Disable Phone Number: Deactivate your phone number if the handset is stolen to
avoid unauthorized charges, even if the phone itself is disabled.
7. Request a Formal Investigation: Ask your carrier to investigate if your phone is
stolen, especially to prevent potential collections issues if fraudulent charges occur.
8. File a Police Report: Reporting theft to the police serves as proof, which might be
required by your carrier or insurance provider.
9. Install Anti-Theft Software: Install anti-theft software to remotely track or control
your phone, especially for Symbian, Android, Windows Mobile, or Blackberry
devices.
10. Keep Your Phone Close: Avoid letting your phone out of your sight to prevent theft
opportunities.
2) Mobile Viruses
⚫ 40 virus families
⚫ 300+ mobile viruses identified
⚫ First mobile virus :june 2004
⚫ Spread through dominant communication protocols
⚫ Bluetooth, MMS
How to protect from mobile malware attacks:
⚫ Download or accept programs and content only from a trusted source
⚫ Turn off blue tooth or set it to non-discoverable when not in use
⚫ Receive IR beams only from trusted source
⚫ Install antivirus software
3) Mishing
⚫ 'Mishing' is a combination of the words mobile phone and phishing.
⚫ Mishing is very similar to phishing—the only difference is the technology.
⚫ Phishing involves the use of emails to trick you into providing your personal details,
whereas mishing involves mobile phones.
⚫ If you use your mobile phone for purchasing goods and services and convenient
banking, you could be more vulnerable to a mishing scam.
Variants of Mishing:
⚫ Vishing : Mishing attacker makes call for phishing
⚫ Smishing: Mishing attacker sends SMS for phishing
4) Vishing
⚫ The term "vishing" is a socially engineered technique for stealing information or
money from consumers using the telephone network.
⚫ The term comes from combining "voice" with "phishing," which are online scams
that get people to give up personal information.
⚫ Vishing is very similar to phishing—the only difference is the technology.
⚫ Vishing involves voice or telephone services. If you use a Voice over Internet
Protocol (VoIP) phone service, you are particularly vulnerable to a vishing scam.
⚫ Vishing is usually used to steal credit card numbers or other related data used in ID
theft schemes from individuals.
Profitable uses of the information gained through a Vishing attack include:
⚫ ID theft
⚫ Purchasing luxury goods and services
⚫ Transferring money/ funds
⚫ Monitoring the victims bank accounts
⚫ Making applications for loans and credit cards
How Vishing works?
⚫ a vishing perpetrator (visher) may gain access to a group of private customer phone
numbers.
⚫ The visher may then call the group(may use war dialer)
⚫ When a potential victim answers the phone, he or she hears an automated
recording informing him that his bank account has been compromised.
⚫ He then calls the specified toll-free number to reset his security settings and hears
another automated message requesting the user’s bank account number and/or
other personal details via the phone keypad..
How to protect from Vishing attack?
⚫ Be suspicious of all unknown callers
⚫ Don't trust caller ID: caller ID spoofing is easy
⚫ Ask questions: ask them to identify who they work for, and then check them out to
see if they are legitimate.
⚫ Call them back: call them back using a number from your bill or your card. Never
provide credit card information or other private information to anyone who calls you
⚫ Report incidents: to nearest cyber police cell
5) Smishing
⚫ Short for SMS Phishing, smishing is a variant of phishing email scams that
instead utilizes Short Message Service (SMS) systems to send bogus text
messages.
⚫ Also written as SMiShing, SMS phishing made recent headlines when a vulnerability
in the iPhone's SMS text messaging system was discovered that made smishing on
the mobile device possible.
How smishing works?
⚫ Smishing scams frequently seek to direct the text message recipient to visit a
website or call a phone number, at which point the person being scammed is enticed
to provide sensitive information such as credit card details or passwords.
⚫ Smishing websites are also known to attempt to infect the person's computer with
malware.
Example:
Text message originating from either notice@jpecu or message@cccu :
⚫ ABC CU – has –deactivated – your Debit card. To reactivate contact:210957XXXX
This is an automated message from ABC Bank.
⚫ Your ATM card has been suspended. To reactivate call urgent at 1 866 215 XXXX
Text message originating from [email protected] :
⚫ [email protected]/VISA. (Card Blocked) Alert. For more information please call 1-
877-269-XXXX
How to protect from Smishing attacks?
⚫ Do not answer a text message
⚫ Avoid calling any phone numbers
⚫ Never click on a hot link received through messages
6) Hacking Bluetooth
⚫ Bluetooth hacking is a technique used to get information from another Bluetooth
enabled device without any permissions from the host.
⚫ This event takes place due to security flaws in the Bluetooth technology.
⚫ It is also known as Blue snarfing.
⚫ Bluetooth hacking is not limited to cell phones, but is also used to hack PDAs,
Laptops and desktop computers.
⚫ Bluetooth hacking is illegal and can lead to serious consequences.
Following are threats a person can face when his/her mobile phone gets blue snarfed:
⚫ The hacker can steal, delete contacts
⚫ Hacker can extract personal files/pictures etc
⚫ Your cell phone can be used for making calls and using internet at your expense
⚫ The hacker may call or text your contacts to annoy them
⚫ Your mobile phone can be reset to default factory settings hence deleting your
personal settings
⚫ Hacker can even access your calendar, clock, International Mobile Equipment
Identity (IMEI) number. IMEI number can be used to clone your cell phone so that
your messages are also routed to another number. Cloning is also considered illegal.
Common attacks:
Blue jacking:
⚫ Blue jacking is the sending of unsolicited messages over Bluetooth to Bluetooth-
enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard
which typically contains a message in the name field (i.e., for blue dating or blue
chat) to another Bluetooth-enabled device.
⚫ Blue jacking is also known as blue hacking.
⚫ Blue jacking exploits a basic Bluetooth feature that allows devices to send
messages to contacts within range.
⚫ Blue jacking is harmless
Blue snarfing:
⚫ Blue snarfing is the unauthorized access of information from a wireless device
through a Bluetooth connection, often between phones, desktops, laptops, and
PDAs (personal digital assistant.).
⚫ This allows access to a calendar, contact list, emails and text messages, and on some
phones, users can copy pictures and private videos.
⚫ Both Blue snarfing and Blue jacking exploit others' Bluetooth connections without
their knowledge.
⚫ While Blue jacking is essentially harmless as it only transmits data to the target
device, Blue snarfing is the theft of information from the target device.
Blue bugging
⚫ Blue bugging is a form of Bluetooth attack often caused by a lack of awareness.
⚫ It was developed after the onset of blue jacking and blue snarfing. Similar to blue
snarfing, blue bugging accesses and uses all phone features
⚫ Blue bugging manipulates a target phone into compromising its security, this to
create a backdoor attack before returning control of the phone to its owner. Once
control of a phone has been established, it is used to call back the hacker who is
then able to listen-in to conversations.
⚫ The Blue bug program also has the capability to create a call forwarding application
whereby the hacker receives calls intended for the target phone.[1]
⚫ Not only can a hacker receive calls intended for the target phone, he can
send messages, read phonebooks, and examine calendars.
Car wishper:
⚫ Software that intercepts a hands-free Bluetooth conversation in a car.
⚫ the Car Whisperer enables an attacker to speak to the driver as well as eavesdrop on
a conversation.
⚫ By exploiting the fact that a common security code (passkey) is used by many
Bluetooth hands-free system vendors, the Car Whisperer sets up a two-way session
with the car and a Linux computer.
⚫ an attacker could access a telephone address book once he has connected with the
Bluetooth system,
⚫ May disable airbags or breaks
Mobile devices can also facilitate threats from employees and other insiders.
Laptops:
addresses the increasing concerns related to cybersecurity in the context of portable devices
like laptops and mobile phones. Below is a summary of key points along with some
countermeasures to mitigate risks:
Key Risks
1. Laptops and Mobile Devices: While laptops offer mobility and convenience for
businesses, they are also susceptible to theft and misuse. These devices often contain
sensitive corporate and personal data, which can be exploited if stolen.
2. Spyphone Software: Spyphone software is used by employers to track employees'
mobile phone activities, including calls, messages, and GPS locations. While it can be
beneficial for monitoring, it raises concerns over privacy violations.
3. Wireless Capabilities: Laptops' wireless features increase their exposure to cyber
threats, such as data being intercepted over unsecured networks, which is difficult to
detect.
Cybersecurity Threats from Laptop Theft
Theft of Corporate Information: Many executives underestimate the value of the
information stored on laptops, making them vulnerable targets for cybercriminals.
Sensitive Data: Laptops often hold valuable corporate data, including intellectual
property and confidential information, which could be exploited if it falls into the
wrong hands.
Countermeasures Against Laptop Theft
Physical Security
1. Cables and Locks: Use of security cables (e.g., Kensington cables) to physically secure
laptops to desks or fixed objects. These are cost-effective but can be bypassed if the
laptop is detached from removable components (e.g., CDs, memory cards).
2. Laptop Safes: Using robust safes (e.g., polycarbonate safes) for transporting and
storing laptops to protect them from theft. This is more effective than cables in
preventing the theft of the entire device and its peripherals.
3. Motion Sensors and Alarms: Installing alarms and motion sensors on laptops to deter
thieves and track the laptop's location if stolen. These can include keychain devices
that trigger the alarm when the laptop is moved too far away from the owner.
4. Warning Labels and Stamps: Labels with tracking information and unique IDs that
make it difficult for thieves to resell stolen laptops. These labels are designed to be
tamper-resistant.
5. Other Protective Measures:
o Engraving personal information on the laptop.
o Using inconspicuous bags to carry laptops.
o Keeping backups of purchase receipts and laptop serial numbers.
o Installing encryption software and using personal firewalls to protect stored
information.
o Locking laptops in secure places (e.g., lockers) when not in use.
o Disabling unused ports (e.g., USB, wireless cards) and removing removable
drives.
Logical Security (Digital Protection)
1. Avoiding Malicious Software: Protect laptops from malware, viruses, and other
malicious attacks through antivirus software and regular updates.
2. Strong Passwords: Using complex passwords and password management tools to
prevent unauthorized access.
3. Data Encryption: Encrypting sensitive files and using secure file systems to protect data
stored on laptops from unauthorized access.
4. Monitoring and Access Control: Regular monitoring of laptop activities, using security
patches, and disabling unnecessary ports or devices to prevent access through
vulnerabilities.
5. Backup and Recovery: Regular backups of critical data and using secure cloud services
to ensure data recovery in case of theft or loss.
Conclusion
To address the cybersecurity risks posed by laptops, organizations must implement both
physical security measures (such as locks, safes, and motion sensors) and logical security
controls (such as encryption, password management, and regular updates). This dual
approach will help mitigate the risk of data breaches and protect sensitive information from
malicious actors.
Tools and Methods Used in Cyber Crime:
Introduction
Focus of Chapter 4: Different forms of attacks targeting computer systems, tools, and
methodologies used by attackers.
2. Phases of a Cyberattack:
Initial Uncovering (Reconnaissance):
Types of Cyberattacks:
1. Scareware:
o Fraudulent software marketed through unethical means, exploiting fear to
compel users to act.
o Examples: Pop-ups warning about infections to push unnecessary purchases.
2. Malvertising:
o Malicious code embedded in online advertisements.
o Distributes malware through ad networks and downloads.
3. Clickjacking:
o Tricks users into clicking elements that perform unintended actions, such as
revealing confidential information or giving system access.
Key Takeaways:
Cybercriminals are systematic and strategic, using a mix of reconnaissance,
exploitation, and evasion techniques.
Protecting systems requires awareness of these methodologies and implementing
robust preventive measures like monitoring, patch management, and employee
training.
This structured understanding showcases the evolution of cyber threats and preventive
mechanisms, emphasizing the importance of awareness in cybersecurity.
Phishing
Phishing is a deceptive cybercrime method used to steal personal and financial data or
perform online identity theft. Below are its key aspects and workflow:
What is Phishing?
Definition: Phishing involves sending fake emails or messages designed to look like
they are from reputable organizations (e.g., banks, credit card companies, or online
retailers like Amazon and eBay).
Purpose: To trick users into providing sensitive information such as login credentials,
bank details, or personal identification.
Origins: The term “Phishing” is derived from “fishing,” symbolizing the act of luring
victims to reveal information. It was first documented in 1996.
3. Attack
o Phishers send deceptive messages that appear genuine, urging users to take
immediate action (e.g., responding to a threat of account closure).
4. Collection
o Victims enter sensitive information into fake web pages or pop-ups,
unknowingly providing it to phishers.
5. Identity Theft and Fraud
o Phishers exploit the stolen data to make unauthorized purchases, commit
financial fraud, or impersonate the victim.
Impact of Phishing
Data Theft: Compromised personal and financial details.
System Infection: Emails can carry malicious attachments, infecting systems with
malware or viruses.
Global Scale: Phishing has escalated with the increasing online presence of businesses
and individuals.
Phishing attacks have evolved with advanced social engineering tactics, making awareness and
vigilance critical.
Password Cracking
Password cracking is a technique used to recover or decipher passwords to gain access to
computer systems or resources. While it can be used ethically by system administrators to
identify vulnerabilities, it is often exploited by attackers for unauthorized access.
Precautionary Measures
1. Use different passwords for personal and business accounts.
2. Avoid accessing sensitive accounts from public facilities.
3. Verify legitimacy of emails or SMS requesting password changes.
4. Report hacks immediately to the relevant authorities.
Program viruses
Multipartite viruses
Polymorphic viruses
Damage: Worms can consume bandwidth and overload systems, potentially carrying
malicious payloads.
Examples:
Email worms
Internet worms
Instant messaging worms
3. Types of Viruses:
Boot Sector Viruses: Infect the master boot record (MBR), spreading through infected
media.
Program Viruses: Activate when the infected program is executed.
Multipartite Viruses: Combine boot sector and program virus characteristics.
Stealth Viruses: Mask themselves to avoid detection.
Polymorphic Viruses: Change their signature to evade antivirus programs.
Macro Viruses: Exploit macros in applications like MS Word or Excel.
4. Preventive Measures:
Avoid downloading software from unreliable sources.
Purpose:
o Often left by developers for troubleshooting.
o Exploited by attackers for unauthorized control.
Characteristics:
o Operates in the background, difficult to detect.
o Some are integrated into existing software.
Functions:
1. Modifies files, system settings, and registries.
2. Controls hardware, shuts down/restarts computers.
3. Steals sensitive data (e.g., passwords, documents).
4. Logs user activity and captures screenshots.
5. Uploads data to predefined servers or emails.
6. Infects files and damages systems.
7. Performs attacks on remote hosts.
8. Installs hidden FTP servers for illegal purposes.
9. Hides processes/files to complicate removal.
Examples:
1. Back Orifice: A backdoor for remote system administration.
2. Bifrost: Infects Windows systems using a backdoor program configuration.
3. SAP Backdoors: Exploits ERP systems for unauthorized access.
4. Onapsis Bizploit: A tool for ERP penetration testing.
Protection Measures
1. Avoid Suspicious Websites/Downloads:
o Stay away from pirated software and P2P networks, which often harbor
Trojans.
2. Cautious Web Surfing:
o Avoid downloading files from unverified sources.
3. Use Antivirus Software:
o Install updated antivirus or Trojan remover programs.
4. Enable Spam Filters:
o Although not foolproof, they reduce exposure to malware.
Steganography
Steganography: A Greek word meaning "sheltered writing," it is a method of hiding the
existence of a message or communication.
The word comes from "steganos" (covered) and "graphein" (to write).
In digital images, the least significant bit of each word can carry a hidden message
without noticeable change.
Also used for digital watermarking to detect illegal copying of digital content.
Difference Between Steganography and Cryptography:
Steganography: Hides the existence of a message.
Involves identifying suspected files, determining if they contain hidden data, and
recovering the message.
Automated tools are often used for detection.
o Attackers flood the target's bandwidth with excessive traffic or fill the target's
email inbox with spam, effectively denying access to legitimate users.
Common Targets:
o High-profile web servers like banks, credit card payment gateways, and critical
services like domain name servers (DNS).
Technique:
o IP Address Spoofing:
Attackers forge source IP addresses to send malicious packets.
Victim systems waste resources waiting for responses from nonexistent
sources, consuming bandwidth and causing service failures.
Symptoms of DoS Attacks
1. Sluggish network performance (e.g., opening files or accessing websites).
2. Unavailability of specific websites or services.
3. Complete inability to access online resources.
4. A dramatic increase in spam emails (email bombing).
Buffer Overflow.
Here’s the complete information on Buffer Overflow, including all the points:
Wi-Fi standards and wireless networking technologies. Here's a summary of the key points: