0% found this document useful (0 votes)
15 views15 pages

Ics Module 2 Notes

Uploaded by

Anitha jesan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views15 pages

Ics Module 2 Notes

Uploaded by

Anitha jesan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

MODULE 2-INTRODUCTION TO CYBER SECURITY [BECL653] NOTES

MODULE 2
CYBER OFFENSES: HOW CRIMINALS PLAN THE ATTACK

CONTENTS
 Understand different types of Cyber attacks
 Overview the steps involved in cybercrime
 Understand tools used for gathering information about the target
 Overview of Social Engineering
 Role of Cybercafes in Cybercrime
 Understand what is cyberstalking
 Learn about Botnet and Attack Vector

INTRODUCTION
Cybercriminals use the World Wide Web (www) and Internet for all illegal activities. These
criminal0 take the advantage of the wide spread lack of awareness about cybercrime and
cyberlaws among the people who are constantly using the Information Technology(IT) for
official and personal purpose.

FEW TERMINOLOGIES

(a) Hacker- Hacker is a person with strong interest in computers who enjoys learning
and experimenting with them. Hackers are usually very talented, smart people who
understand computers better than others.
(b) Brute Force Hacking- it is a technique used to find passwords and Encryption Keys.
It involves trying every possible combination of letters, numbers etc. until the code is
broken.
(c) Cracker- A cracker is a person who breaks into computers. They are computer
criminals. Their act includes Vandalism, theft and snooping in unauthorized areas.
(d) Cracking- It is an act of breaking into computers. Cracking is a popular growing
subject on the internet. Many sites are available to supply Crackers with programs that
allow them to crack computers.
(e) Cracker Tools- These are programs that break into the computers like password
crackers, viruses, war dialer and worms
(f) Phreaking- This is the notorious act of breaking into phones and other
communication systems.
(g) War Dialer- It is a program that automatically dials phone numbers looking for
modems or computers on the other end to which they are connected. It catalogs
numbers so that the hacker can call back and try to break in.
(h) Cyber Bullying- when Internet, phones and other devices are used to send or post
texts or images intended to hurt and embarrass another person is called cyber bullying

Dept. of ECE, EWIT


MODULE 2-INTRODUCTION TO CYBER SECURITY [BECL653] NOTES

CATEGORIES OF VULNERABILITIES THAT HACKERS TYPICALLY


SEARCH FOR
1. Inadequate border protection-Firewall
2. Remote Access Servers (RAS) with weak access controls
3. Application Server with well-known exploits
4. Misconfigured systems and systems with default configurations.

TYPES OF HACKERS
1. Black hat hackers
2. White hat hackers
3. Gray hat hackers
4. Brown hat hackers

1. Black hat hackers


 Malicious and criminal hackers
 They break into information technology systems
 They use the knowledge for personal gain and to target others
 They are meant to do illegal activities
 They use holes/vulnerabilities in the systems to launch attack
2. White hat hackers
 They are Ethical Hackers
 They ethically oppose any cause against computer system
 They focus on securing Information Technology (IT) systems or networks
 They use their knowledge and skill to prevent the black hat hackers
 If a black hat hacker decides to target a victim, it’s a great thing to have white hat
hacker
3. Gray hat hackers
 They are hybrid of both black and white hat hackers
 Like black hat hackers their mission is not to damage system or network but to expose
the flaws in the Security System
 They do it without the concern for how the information will be used by others in
future
4. Brown hat hackers
 They think before acting and committing a malicious or non-malicious deed

Dept. of ECE, EWIT


MODULE 2-INTRODUCTION TO CYBER SECURITY [BECL653] NOTES

CATEGORIES OF CYBERCRIME

Cybercrimes can be categorised based on the following

1. The target of the crime- Targeted against individuals, assets or organisations


2. whether the crime occurs as a Single event or Series of event

1. Target of the Crime

a) Crimes targeted at Individuals-The goal is to exploit human weakness such as Greed and
Innocence. These crimes include financial fraud sale of non-existent or stolen items copyright
violation harassment etc.

b) Crimes targeted at Property-Programs that can disrupt the functions and erase the data
from cell phone, laptops, Personal Digital Assistants (PDA’s) and renewable medias (CDs
and drivers), hard disk etc. Then they can create malfunctioning of the device.

c) Crimes targeted at Organisation-Cyber terrorism one of the vital crime against


organisation or governments attackers use computer tools and the internet to usually target
the citizens of a particular country by stealing the private information and also damage the
programs and files or important programs to get control of the network and/or system

2.Single event or series of event

a) Single event of Cybercrime -It is a single event from the perspective of victims. For
example unknowingly open and attachment that contain virus that will affect the system

b) Series of events-This involves attackers interacting with the victims repetitively. For
example, attacker internets with the victim over the phone or via chat rooms to establish
relationship first and then use the relationship to commit illegal activities

How criminals plan the attack

Criminals use various tools and methods to locate vulnerability of the target. Criminals plan
either Active or Passive Attacks.

a) Active attacks- Attacks used to alter the system or network


b) Passive attacks- Attempts to gain information about target

Attacks can also be classified as either Inside attacks or Outside attacks

a) Inside attack-An attack originating and/or attempted within the security parameters
of an organisation. It is usually attempted by an insider who gains access to more
resources.

Dept. of ECE, EWIT


MODULE 2-INTRODUCTION TO CYBER SECURITY [BECL653] NOTES

b) Outside attack- Attempted by a source outside the security parameter. Maybe


attempted by an insider or outsider indirectly associated with the organisation. It is
attempted through Internet or a Remote Access Connection.

Following phases are involved in Planning Cybercrime

1) Reconnaissance (Information Gathering)- This is the first Phase and it is treated as


passive attack

2) scanning and scrutinizing(examining)-They do this to check whether the collected


information this valid or not as well as to identify existing vulnerability or weak
points in the system

3) Launching the Attack-Gaining and maintaining the system access.

1) RECONAISSANCE [INFORMATION GATHERING

 It is an art of reconnoitring (exploring) often with a goal to find somebody or


something
 Used to gain information about enemy or target
 First phase of reconnaissance is Foot printing
 Foot printing involves accumulating data about target environment and computer
architecture to find a way to intrude into the environment
 Foot printing involves finding vulnerabilities weakness and making use of it
 It is to understand the system, it's networking ports and services needful for launching
the attack

In the reconnaissance stage an attacker attempts to gather information in two phases

a) Passive attacks
b) Active attacks

a) Passive attacks involve gathering information about the target without his/her
knowledge. Example watching a building to identify what time employees Enter
building premises. It is done by internet searches or by googling about and individual
or organisation to gain information

Some of the methods used to gather information in passive attack are

1. Google search- Used to gain information about person or organisation


2. Surfing online community groups -For example Facebook to gain information about
individuals
3. Organisation website-Providing personal or official information about key
employees contact details, email address etc. It is also called as Social Engineering
4. Blogs, newspapers and press releases- Used as medium to gain information about
company or employees

Dept. of ECE, EWIT


MODULE 2-INTRODUCTION TO CYBER SECURITY [BECL653] NOTES

5. Going through job postings in a particular job profile-To get information about
what kind of Technology their company is working on. Example- Naukri, LinkedIn
etc
6. Network sniffing -It is used to get Useful information such as internet protocol
address servers or networks and other available services on the system or network

b) Active attacks -Involves enquiring the information or network to discover individuals


and to confirm the information gathered in passive attack. It is also called as active
reconnaissance. Active r reconnaissance provides information about security
measures in place but the process can also increase the chance of being caught or raise
a suspicion. It involves risk of detection since alterations are made to data in the
system or system itself.

2) Scanning and Scrutinizing

Scanning is the It is the key step to examine intelligently the gathered information about the
target.The objectives of scanning are

a) Port scanning -Identify open or close sports or services


b) Network scanning -Understand IP address and related information about the
computer network systems (network name database in server
c) Vulnerability scanning understand the existence weakness in the system

Scrutinizing- Scrutinizing phase is always called enumeration in the hacking world.The


objectives behind this steps is to identify

a) Valid user accounts/groups


b) network resources/shared resources
c) OS and different applications running on OS

3) Launching the attack (Gaining and maintaining the system access)

After scanning and scrutinizing the attack is launched using the following steps

a) Crack the password


b) Exploit the privileges
c) Execute malicious comments/applications
d) Hide the files (if needed)
e) Cover the tracks (delete logs) so that there is no trace of illegal activity

Difference Between Active Attack and Passive Attack

Active Attack Passive Attack


Data modification Data monitoring
Affect the system Does not affect the system

Dept. of ECE, EWIT


MODULE 2-INTRODUCTION TO CYBER SECURITY [BECL653] NOTES

Easy to detect Difficult to detect


Attack on availability and integrity Attack on Confidentiality
Victim gets informed Victim does not get informed
Examples-Spying, Eavesdropping and Examples- Man in the middle, DOS, DDOS
Dumpster diving Attacks
Techniques used to avoid are Firewalls, Techniques used to avoid are using strong
VPN etc passwords and encryption methods

Tools used to Launch passive attacks

1. People search -Provides details about personal information, date of birth, residential
address, contact information etc of a person
2. Domain name confirmation -Perform searches for domain names. This helps to find
registered domain names like “.Com”, “.net”, “.org” and “.edu”
3. Trace route- best tool to find routes to the target system by knowing the packets
(data) transmitted across network
4. Email Tracker Pro-Analysis the email address and provides IP address of the system
that sent the email
5. Competitive intelligence- Provides information related to almost any product on
recent industry trends
6. Visual Route Trace- This is a tool which determines traffic(data) on computer
flowing between source and target

Tools used to Launch Active attacks

1. NMap-Automated mechanism tool used to find the open port and also to identify the
OS being used in the system
2. Dsniff-This is a networki monitoring tool to capture usernames, Password and
authentication information
3. FileSnarf-This tool is used to capture file transfers and data
4. MsgSnarf-Tool used to capture instant messages. Example Yahoo chat
5. URLSnarf-Tool used to capture Http traffic
6. Xprobe2-Tool used to find the type of operating system of target host

SOCIAL ENGINEERING

 It is a “technique to influence” and “make someone to believe” for obtaining the


information
 The person who does it is called a Social Engineer
 Social engineering uses natural tendency and quality of people such as desire to be
helpful, attitude to trust people and fear of getting into trouble. This makes people
a weak link in security

Dept. of ECE, EWIT


MODULE 2-INTRODUCTION TO CYBER SECURITY [BECL653] NOTES

 Social engineering involves gathering sensitive information or unauthorized


access by building inappropriate trust relationships
 Social engineer uses telecommunication or internet to get victims to do something
that is against the security practices and/or policies
 The goal of social engineer is to fool someone into providing valuable information
or access the information
 The sign of a truly successful social engineers is that they receive information
without any suspicion

CLASSIFICATION OF SOCIAL ENGINEERING

1. Human based social engineering


2. Computer Based social engineering

1. Human based social engineering

a. Impersonating an employee or valid user-Impersonation posing oneself as an


employee of the same organisation is Greater technique of making somebody believe
something that is not true
b. Posing as an important user -The Attacker pretends to be the chief executive officer
CEO or High-Level Manager who needs Immediate assistants to gain access to
system. The attacker takes advantage of Low-Key employees. Most of the low-level
employees will not question to someone who appears to be in position of authority.
c. Using a third person name-Attacker pretends to have permission from authorised
source to use the system. This trick is useful when the supposed authorised person is
on Vacation and cannot be contacted for verification
d. Calling Technical Support-Helpdesk and Technical Support people are trained to
help users. Attackers call them for assistance which makes them good prey for social
engineering attacks
e. Shoulder surfing-It is a technique of gathering information such as usernames and
passwords by watching over a person's shoulder while he/she logs into the system
f. Dumpster diving-It involves looking in the trash for information written on pieces of
paper or computers printouts. This is also called as Dumpster” binning” , “trashing”
or “garbing”. Practice is referred to as “binning” or “skipping” and the person doing it
is called a “Binner” or “Skipper”
g. Scavenging-It is equivalent to Dumpster diving but in digital world. It is a form in
which discarded articles and information are obtained and recovered from recycle bin.

2. Computer Based social engineering

a. Fake emails-The attacker sends fake emails to numerous users such that the user
finds it as legitimate mail. This act is called as Phishing
b. Email attachments-Email attachments consisting of Malicious codes and sending it
to victim system which will automatically get executed in their system. Example
keyloggers virus worms and Trojan Horses all these can be included in the attachment

Dept. of ECE, EWIT


MODULE 2-INTRODUCTION TO CYBER SECURITY [BECL653] NOTES

c. Pop-up Windows- They are used in similar manner to email attachments. Pop-up
windows with special offers and free stuffs can encourage users to unintentionally
install malicious software or programs.

CYBERSTALKING

Cyberstalking an act of following the prey trying to approach somebody or something

Definition- It is defined as "The use of Information and Communication Technology,


particularly internet by an individual or group of individuals to harass another individual or
group of individuals or organisations"

Cyberstalking can be done in two ways

a) Through online

1. False accusations
2. Monitoring
3. Transmission of data
4. ID theft
5. Damage the data or system gathering information for harassment purpose

b) Through offline

1. Following a person
2. visiting the persons home or business place
3. making Phone calls
4. Leaving written messages
5. Destroying the victims property

TYPES OF STALKERS

There are two types of stalkers

1. Online stalker
2. Offline stalker

1. Online stalker

 They aim to start the interaction with the victim directly through the internet
 Email and chat rooms are the most popular communication medium to get connected
with the victim

Dept. of ECE, EWIT


MODULE 2-INTRODUCTION TO CYBER SECURITY [BECL653] NOTES

 The stalker makes sure that the victim recognises the Attack made by him or her

2. Offline stalker

 Stalker uses traditional methods such as following victim, watching daily routine of
the victim etc
 Stalker individually searches in newsgroups, personal websites and people finding
services
 All these are done without the knowledge of victim so that victim is not aware about
stalking

HOW STALKING WORKS

1. Personal information gathering about the victim- Name, Family background,


contact details such as phone numbers, residential addresses date of birth etc
2. Establish a contact with them through phone- Once the contact is established
Stalker may call the victim to threaten and harass
3. Establish contact with victim through email- Emails having tone of love
threatening etc. Stalker uses multiple names while contacting the victim
4. Keep on sending repeated emails- Asking for various kinds of favours or threatens
the victim
5. Posting the victims personal information on any websites related to unlawful
services- Posing as if the victim as posted the information and invite people to call the
victim on given contact details
6. Stalker subscribes or register the email account of the victim- Registering or
Subscribing in unwanted websites because of which the victim starts receiving
unsolicited (not asked for) emails messages attachments etc

CASES REPORTED ON CYBERSTALKING

 The majority of Cyber stalkers are men and majority of victims are women
 Some cases also have been reported where women act as cyber stockers and men as
victims as well as cases of same sex
 In many cases cyber stalkers and victims hold a prior relationship and it begins when
the victims try to break the relationship. Example Ex-Lover, Ex-Spouse, -Ex-Boss etc

CYBER CAFE AND CYBER CRIMES

“Cyber Cafe or internet cafe provides internet access to public for a Fee”.

 Since many people you cybercafes IT security and governance should be maintained
by the cybercafe owners
 The most common attacks carried out using cyber cafes are stealing Bank passwords,
fraudulent transaction of money using username and password etc

RISKS IN CYBER CAFES

Dept. of ECE, EWIT


MODULE 2-INTRODUCTION TO CYBER SECURITY [BECL653] NOTES

Public computers in cyber cafes hold two types of risks

1. Risk of malicious programs such as keyloggers and spywares

Keyloggers run on the background capturing keystrokes to know password and other
confidential information and monitoring browsing behaviour

Spywares are software that install itself on the user computer and starts secretly
monitoring online behaviour without users’ knowledge or permission

2. Over the Shoulder peeping

Looking over someone's shoulder to get information about what they are doing on the
system and find out usernames and passwords.

CYBER CRIMINALS TARGETING CYBER CAFES

1. They target one PC in cyber cafe for their use sometimes


2. They install malicious programs (keyloggers and spyware) to launch attack
3. They visit cyber cafes at a particular time of a day or week to monitor the activities of
victim

METROPOLITAN CITIES USES COMPUTERS WITH FOLLOWING


INSECURITIES IN CYBER CAFES

1. Pirated or illegally copied Software- Using pirated operating systems, Browser's


office Automations such as Microsoft Word Excel etc
2. Anti-virus softwares not updated- Cyber Cafe owners not updating Antivirus on
regular basis
3. Using Deep Freeze Software- Several cyber cafes use this software for protecting
their computers from Malware attacks. This software is used to wipe out all the
activities carried out on computer once restart button is clicked. This becomes
challenging for investigating Agencies and cybercrime investigators while collecting
clues of the cyber attacks
4. Annual Maintenance Contract (AMC)- Cyber Cafe owners not servicing the
computer due to this cybercriminal can install malicious code on computer and
conduct criminal activity without interruption
5. Websites not blocked-Indecent or obscene websites are not blocked in cyber café
6. Less awareness-Cybercafe owners having less awareness about IT security and
governance
7. Not providing Guidelines - Government, Internet service providers and State
policies such as Cyber cell wings not providing IT guidelines to Cyber Cafe owners
8. Not conducting periodic visit- cyber cafe Associations or cyber cell wings do not
conduct periodic visit to Cyber Café

Tips And safety measures to be carried out in cyber cafes

Dept. of ECE, EWIT


MODULE 2-INTRODUCTION TO CYBER SECURITY [BECL653] NOTES

1. Always Logout-After checking mail or logging into accounts one should logout or
sign out before leaving the system. Do not save your login information and disable
automatic login option
2. Stay with the Computer-while browsing one should not leave the system unattended
for any period of time. If you get any emergency call or work make sure you have
logged out of the account and close all the browser Windows
3. Clear history and Temporary Files-Internet Explorer saves Pages that users have
visited. Your passwords can be stored in the browser if that option has been enabled
on computer being used
4. Be alert-stay alert and be aware of the surroundings
5. Avoid online financial transactions-Avoid online banking, shopping and other
transactions requiring to provide personal or confidential information. In case if there
is an emergency do it but try to change the password as soon as possible using trusted
computer at home or at office
6. Change Passwords- Change strong passwords at regular intervals of time
7. Use virtual keyboard-Nowadays almost every bank has provided virtual keyboard on
their website providing high security
8. Follow Security warnings-Each Bank provides security warnings like (a) changing
password after using computers outside (b) use virtual keyboards to protect password
from keyloggers, spywares and trojans (c) Do not share your CVV or OTP with
anyone

Individuals should take care while accessing computers or internet in public places such as
hotels, libraries etc. It is required to follow safety and security while operating on systems
outside

BOTNET- THE FUEL TO CYBER CRIME

Bot-It is an automated program or software application program that does a certain task.
Bots are automated that run according to the instructions without human intervention

Botnet-A group of computers infected by Malware and is under the control of malicious
attacker

Activities carried on botnets

1. Distribution of spam and viruses


2. Conducting Dos and DDOS attacks

Zombie networks

Botnet is also called as “Zombie network” here Network of Computers are infected with
malicious programs that allows criminals to control the infected machines remotely without
users knowledge. Zombie Networks become a source of income for group of Cyber criminals

Dept. of ECE, EWIT


MODULE 2-INTRODUCTION TO CYBER SECURITY [BECL653] NOTES

HOW BOTS CREATE A BUSINESS

Botnets have gained popularity and have increased in number due to the following reasons

1. Low cost of maintenance


2. Diminishing degree of knowledge to maintain one

Below figure shows Botnets create business

There are plenty of “Bot for sales” for someone who wants to start a business and has no
programming skills

1. Malware-It is a malicious software designed to damage a computer system without


the user’s knowledge. Example viruses ,worms , Trojan Horse etc
2. Adware-It is advertising supported software which automatically plays, Displays or
downloads advertisements where application is being used
3. Spam-It means unsolicited or undesired emails or messages
4. Spamdexing-It is also called “Search Spam” or “Search Engines Spam”. It
manipulates the relevancy or prominence of sources indexed in search engine
5. DDOS Attack (Distributed Denial of Service Attack)- It occurs when multiple
systems flood the traffic of targeted system or server and make it unavailable or non-
functional

HOW TO REDUCE THE CHANCES OF BECOMING A PART OF


BOT

Dept. of ECE, EWIT


MODULE 2-INTRODUCTION TO CYBER SECURITY [BECL653] NOTES

1. Off The Internet Connection-Leaving your internet connection on and unprotected


is just like leaving the front door of the house wide open for thieves to enter
2. Use anti-virus software and keep it up to date-Settings of software has to be done
during installations so that the software gets updated automatically on daily or
monthly basis
3. Set the operating system to download and install security patches automatically-
OS companies issues security patches for flaws that are found in the system. Do
settings in OS such that software updates are done on regular basis
4. Use firewall to protect the system from hacking attacks while it is connected over
the internet- It is a software or hardware that scans incoming data for Malwares. It
allows only authorized access.
5. Disconnect from the internet when you are away from your computers-Attackers
cannot get into the system when the system is disconnected from the internet.
Sometimes firewalls, antivirus and antispyware have chances of going wrong or being
wrongly used
6. Downloading the freeware only from the websites that are known and
trustworthy- Avoid downloading free software such as games, file sharing etc as they
may contain other “software which may include Spywares

7. Check regularly the folders in the mailbox-Check in “sent items” and “outbox” for
mails or messages you have not sent. If such messages are found then it is a sign that
your system maybe a part of bot
8. Take an immediate action if your system is infected- Steps to be followed
1. Disconnect It from internet
2. Scan entire system with fully updated anti-virus
3. Report to Internet Service Provider (ISP) or Legal Authorities
4. Change the password immediately

ATTACK VECTOR

Definition-" It is a path or means by which an attacker can gain access to the


computer or a network server to deliver the payload"

Note-Payload is a malicious activity performed by attacker. It is a malicious outcome

 Attack Vector enable attackers to exploit vulnerabilities in the system


 Attack vectors include viruses, email attachments, counterfeited webpages,
POPUP windows, instant messages, chat rooms, Deception, Trojan horses
worms etc
 Except Deception all the other attacks vectors need programming
 To some extent firewalls and anti-virus software block attack Victor but they
are not totally attack proof
 Defence vectors (Firewalls and antiviruses) which are effective today may not
remain so for long because attackers constantly update the vectors

Dept. of ECE, EWIT


MODULE 2-INTRODUCTION TO CYBER SECURITY [BECL653] NOTES

LAUNCHING OF ATTACK VECTORS

Attack vectors are launched by the following ways

1. Attack By email - Unwanted contents such as URL’s, Hyperlinks, Responding


Buttons, Downloadable files are attached inside Emails
2. Attachments and other files- Malicious attachments insert malicious codes in our
device. Malicious codes are nothing but viruses and spywares etc. As soon as we open
the attachment it delivers or inserts payloads
3. Attack by Deception-Directly contacting people by fraud or scam Calls, sending
spam and tricking them to obtain confidential information is deception. Social
Engineering is a form of deception
4. Hackers-Hackers are the cause for attack vectors. They use variety of hacking tools
Strategies and social engineering to gain access to our accounts and computers
5. Heedless Guests [not noticeable]-it is an Attack by using counterfeited or duplicated
webpages. Such websites look similar to genuine website. They make internet users to
believe that they are using original website
6. Attack by Worms-Worms propagate through network. They scan network and start
looking for another computer over that network to infect them. Leads to more Zombie
networks used to carry illegal activities
7. Malicious Macros-These macros affect Microsoft Word and Microsoft Excel files.
Messaging and peer-to-peer (P2P) sharing networks which are used to transfer Word
and Excel files are infected by Macros
8. Foistware-It is a software that add hidden component to the system. The hidden
components get into the system when we try to download from website hijacked by
hackers
9. Viruses- These are malicious computer codes that deliver payload

ZERO-DAY ATTACK

 It is a computer threat which attempts to exploit computer applications


vulnerabilities that are unknown to anyone in the world
 Application vulnerability that are not disclosed by software vendors to
software uses and for which software patch is not available
 Zero-day Attacks are done and shared by attackers before the software
vendors know about it
 “Zero-day attack is launched just on or before the First day or Zeroth day of
vendors awareness reason being the vendor should not get any opportunity to
communicate or distribute a security fix or patch to user of such software”
 If the vulnerability is not particularly dangerous software vendors prefer to
hold until multiple updates are collected and later release them together as
package.

Dept. of ECE, EWIT


MODULE 2-INTRODUCTION TO CYBER SECURITY [BECL653] NOTES

Dept. of ECE, EWIT

You might also like