Course file Cyber Security
Course file Cyber Security
Session: 2023-2024
Semester: 7th
Subject Name: Cyber Security
Subject Code: PEC-CS702E
Prerequisite knowledge:
1. Basic knowledge of Computer Networks
2. Algorithm Design
3. Basics of Network Security
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
To be a centre of excellence in education and research to produce globally competent professional minds
with human values and ethics to serve the society by taking part in industrial, scientific, innovation,
2. To provide skill oriented training to meet the need of the industry and society.
leadership.
5. To facilitate effective interactions of students, faculty and management with industry personnel,
To empower the students of Computer Science & Engineering department to be technologically adept,
innovative, self-motivated and responsible global citizen possessing human values and contribute
significantly towards high quality technical education with ever changing world.
The department of Computer Science and Engineering strives to prepare students for professional career
entrepreneurship with leadership skills, enabling them to serve the engineering profession and society.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
• The educational objectives of an engineering degree program are the statements that describe the
expected achievements of graduates in their career, and also in particular, what the graduates are
expected to perform and achieve during the first few years after graduation.
• The PEOs, may be guided by global and local needs, vision of the Institution, long term goals etc.
• For defining the PEOs the faculty members of the program must continuously work with all
Stakeholders: Local Employers, Industry, Students and the Alumni
PEO1:
Graduate will compete on a global platform to pursue their professional career in Computer Science
and Engineering and allied disciplines.
PEO2:
Graduates will pursue higher education and/or engage in continuous up gradation of their
professional skills.
PEO3:
Graduate will communicate effectively and will demonstrate professional behaviour while working
in diverse team.
PEO4:
Graduates will demonstrate concern for society and environment.
PEO5:
Studying computer science will give a strong foundation in problem-solving, logical knowledge, and
critical thinking.
PEO6:
Pursue higher education for professional development
PEO7:
Exhibit leadership qualities with demonstrable attributes in lifelong learning to contribute to the
societal needs.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
• PO1. Engineering Knowledge: Apply knowledge of mathematics, science, engineering fundamentals and
an engineering specialization to the solution of complex engineering problems.
• PO2. Problem Analysis: Identify, formulate, research literature and analyse complex engineering problems
reaching substantiated conclusions using first principles of mathematics, natural sciences and engineering
sciences.
• PO3. Design/ Development of Solutions: Design solutions for complex engineering problems and design
system components or processes that meet specified needs with appropriate consideration for public health
and safety, cultural, societal and environmental considerations.
• PO4. Conduct investigations of complex problems: Use research-based knowledge and research methods
including design of experiments, analysis and interpretation of data and synthesis of information to provide
valid conclusions.
• PO5. Modern Tool Usage: Create, select and apply appropriate techniques, resources and modern
engineering and IT tools including prediction and modelling to complex engineering activities with an
understanding of the limitations.
• PO6. The Engineer and Society: Apply reasoning informed by contextual knowledge to assess societal,
health, safety, legal and cultural issues and the consequent responsibilities relevant to professional
engineering practice.
• PO7. Environment and Sustainability: Understand the impact of professional engineering solutions in
societal and environmental contexts and demonstrate knowledge of and need for sustainable development.
• PO8. Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of
engineering practice.
• PO9. Individual and Team Work: Function effectively as an individual, and as a member or leader in
diverse teams and in multi-disciplinary settings.
• PO10. Communication: Communicate effectively on complex engineering activities with the engineering
community and with society at large, such as being able to comprehend and write effective reports and
design documentation, make effective presentations and give and receive clear instructions.
• PO11. Project Management and Finance: Demonstrate knowledge and understanding of engineering and
management principles and apply these to one’s own work, as a member and leader in a team, to manage
projects and in multidisciplinary environments.
• PO12. Life-long Learning: Recognize the need for and have the preparation and ability to Engage in
independent and life- long learning in the broadest context of technological Change.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
• PSO1: The Computer Science and Engineering graduates are able to analyze, design, develop, test
and apply skills on the basis of mathematical and programming foundations in the development of
computational solutions to design software and hardware.
• PSO2: Work with and communicate effectively with professionals in inter-disciplinary fields and
pursue lifelong professional development in computing and identify research gaps and hence to
provide solution to new ideas and innovations to satisfy the environmental and social issues.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
1. Computer Networks
2. Internet
3. Network Security
4. Cyber Technologies
Course Objective 1. Learn the foundations of Cyber security and threat landscape.
2. To equip students with the technical knowledge and skills needed to
protect and defend against cyber threats.
3. To develop skills in students that can help them plan, implement, and
monitor cybersecurity mechanisms to ensure the protection of
information technology assets.
4. To expose students to governance, regulatory, legal, economic,
environmental, social and ethical contexts of cyber security.
5. To expose students to responsible use of online social media
networks.
6. To systematically educate the necessity to understand the impact of
cybercrimes and threats with solutions in a global and societal
context.
7. To select suitable ethical principles and commit to professional
responsibilities and human values and contribute value and wealth for
the benefit of the society.
Course After successful completion of course, the students will be able to Knowledge
Outcomes Level, KL
CO1: Understand the various tools and methods used in cybercrime. K2
PSO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO PO PO PSO1 PSO2
10 11 12
COs
CO1 2 2 1 1 3 3 1 3 - 1 - 3 2 2
CO2 2 2 1 1 - 3 2 3 - 1 - 3 1 3
CO3 2 2 1 1 - 3 1 3 - 1 - 3 - 3
CO4 2 2 1 1 3 3 1 3 - 1 - 3 3 2
CO5 2 2 1 1 - 3 1 3 - 1 - 3 - 3
Average 2 2 1 1 1.2 3 1.2 3 - 1 - 3 1.2 2.6
CORRELATION 1 – LOW (40%<Achievement<50%);
LEVEL: 2 - MEDIUM (50%< Achievement <60%); 3 - HIGH (60%< Achievement)
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
7th Sem
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
CSE1 BREAK
CSE2
CSE3
TUESDAY
CSE3
WEDNESDAY
CSE3
THURSDAY
CSE3
FRIDAY
CSE3
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
Module 1
Long answer type questions -
Answer -
• Ongoing validation processes involving all employees in an organization
• A mandatory security framework involving the selection of appropriate controls
• A foundational security model used to set up security policies and systems
• A set of security controls used to update systems and networks
The CIA triad is a foundational security model used to set up security policies and systems. The core
principles of the model are confidentiality, integrity, and availability.
3. Define Cybersecurity?
Cybersecurity refers to the protection of internet-connected systems such as software, hardware,
electronic data, etc., from cyber attacks. In computing text, it is referred to as protection against
unauthorized access.
● Threat: Someone with the potential to cause harm by damaging or destroying the official data of a
system or organization.
Ex: Phishing attack
● Vulnerability: It refers to weaknesses in a system that makes threat outcomes more possible and
even more dangerous.
Ex: SQL injections, cross-site scripting
● Risk: It refers to a combination of threat probability and impact/loss. In simple terms, it is related to
potential damage or loss when a threat exploits the vulnerability.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
● Malware
● SQL Injection Attack
● Cross-Site Scripting (XSS)
● Denial-of-Service (DoS)
● Man-in-the-Middle Attacks
● Credential Reuse
● Phishing
● Session Hijacking
IDS is Intrusion Detection System and it only detects intrusions and the administrator has to take care
of preventing the intrusion. Whereas, in IPS i.e., Intrusion Prevention System, the system detects the
intrusion and also takes actions to prevent the intrusion.
1. Which element of the CIA triad specifies that only authorized users can access specific information?
a. Confirmation
b. Confidentiality
c. Integrity
d. Access
Answer : Confidentiality
2. A security analyst discovers that certain data is inaccessible to authorized users, which is preventing
these employees from doing their jobs efficiently. The analyst works to fix the application involved in
order to allow for timely and reliable access. Which element of the CIA triad does this scenario
describe?
a. Availability
b. Capacity
c. Applicability
d. Integrity
Answer : Availability
3. Which of the following is a type of cyber security?
a) Cloud Security
b) Network Security
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
c) Application Security
d) All of the above
Answer : All of the above
Module 2
Long answer type questions -
Answer : The person who is skilled in Hacking are divided into 2 categories:
I. Hackers: Hackers are kind of good people who do hacking for a good purpose and to obtain
more knowledge from it. They generally find loopholes in the system and help them to cover the
loopholes. Hackers are generally programmers who obtain advanced knowledge about operating
systems and programming languages. These people never damage or harm any kind of data.
II. Crackers: Crackers are kind of bad people who break or violate the system or a computer
remotely with bad intentions to harm the data and steal it. Crackers destroy data by gaining
unauthorized access to the network. Their works are always hidden as they are doing illegal
stuff. Bypasses passwords of computers and social media websites, can steal your bank details
and transfer money from the bank.
Hacker Cracker
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
The good people who hack for knowledge The evil person who breaks into a system for
purposes. benefits.
Hackers share the knowledge and never If they found any loophole they just delete the
damages the data. data or damages the data.
Hackers program or hacks to check the Crackers do not make new tools but use
integrity and vulnerability strength of a someone else tools for their cause and harm the
network. network.
Hackers have legal certificates with them Crackers may or may not have certificates, as
e.g CEH certificates. their motive is to stay anonymous.
They are known as White hats or saviors. They are known as Black hats or evildoers.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
2. Which of the following is an internet scam done by cyber-criminals where the user is convinced
digitally to provide confidential information?
a) MiTM attack
b) Phishing attack
c) Website attack
d) DoS attack
ANSWER : b
Module 3
Long answer type questions -
Answer - Ethical hacking is also known as penetration testing or intrusion testing where the person
systematically attempts to penetrate/intrude into a computer system, application, network, or some
other computing resources on behalf of its owner and finds out threats and vulnerabilities that a
malicious hacker could potentially exploit. The main objective of ethical hacking is to improve the
security of the system or network and fix the vulnerabilities found during the testing. Ethical
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
hackers employ the same tools and techniques adopted by malicious hackers to improve security
and protect the system from attacks by malicious users with the permission of an authorized entity.
Virus: It is a type of malware that spreads by embedding a copy of itself and becomes a part of other
programs. Viruses spread from one computer to another while sharing the software or document they are
attached to using a network, file sharing, disk, or infected email attachments.
Worm: These are similar to viruses and cause the same type of damage. They replicate functional copies
of themselves and do not require a host program or human help to propagate. Advanced worms leverage
encryption, ransomware, and wipers to harm their targets.
Ans. Social engineering refers to a variety of malicious activities used to manipulate and trick users
into making security mistakes and giving away sensitive information. In social engineering, a
hacker manipulates a target using normal communication medium like calls, texts, and emails and
fetches the sensitive information without any technical expertise. Some of the examples of social
engineering are phishing, whaling attack, spear phishing, water holing, baiting, quid pro quo,
vishing, pretexting, and tailgating.
Social engineering is the term used for a broad range of malicious activities accomplished through
human interactions. It uses psychological manipulation to trick users into making security mistakes
or giving away sensitive information.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
Social engineering attacks happen in one or more steps. A perpetrator first investigates the intended
victim to gather necessary background information, such as potential points of entry and weak
security protocols, needed to proceed with the attack. Then, the attacker moves to gain the victim’s
trust and provide stimuli for subsequent actions that break security practices, such as revealing
sensitive information or granting access to critical resources.
2. The legal risks of ethical hacking include lawsuits due to __________ of personal data.
a) stealing
b) disclosure
c) deleting
d) hacking
ANSWER : b
a) Ethical hacking is legal and sanctioned, while malicious hacking is illegal and unsanctioned.
b) Ethical hacking only involves finding vulnerabilities, while malicious hacking involves
exploiting them.
c) Ethical hacking is done with the permission of the system owner, while malicious hacking is
done without permission.
d) There is no difference between ethical hacking and malicious hacking.
Answer: d
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
Module 4
Long answer type questions -
HMAC uses two passes of has computation. The secret key helps to find the inner and outer keys.
In other words, the first pass of the algorithm generates an internal hash derived from the message
and the inner key. Furthermore, the second pass generates the final HMAC code obtained from the
inner hash result and the outer key. Overall, the algorithm is capable of providing immunity against
length extension attacks.
MAC stands for Message Authentication Code. It is a small piece of information that helps to
authenticate a message. Moreover, it ensures that the message came from the stated sender. The
MAC value protects both a message’s data integrity as well as its authenticity. It helps to figure out
any changes to the message content.
The concept of a security association is germane to IPsec. Security protocols make use of Security
Associations (SAs) as they provide security services (the main responsibility of key management is to
establish and manage SAs). An SA is a relationship between two entities that defines how they are
going to use security services to secure their communications. It includes information on
authentication and/or encryption algorithms, cryptographic keys and key lengths as well as the
Initialization Vectors (IVs) that are shared between the entities. An SA is unidirectional; so, typically
two SAs are needed for a bidirectional flow of traffic – one for inbound (read) traffic and one for
outbound (write) traffic. An SA is uniquely identified by the following three items:
The management of SAs involves two databases: the SPD and the SAD. The SPD contains the
policies by which all inbound and outbound traffic is categorized on a host or a security gateway. The
SAD is a container for all active SAs and related parameters. A set of selectors – IP layer and upper
layer (e.g., TCP and UDP) protocol field values – is used by the SPD to map traffic to a specific SA.
2. An unauthorized individual enters a building following an employee through the employee entrance
after the lunch rush. What type of breach has the individual just performed?
A. Reverse Social Engineering
B. Tailgating
C. Piggybacking
D. Announced
Answer: B
3. If an attacker uses the command SELECT*FROM user WHERE name = ‘x’ AND userid IS NULL;
–‘; which type of SQL injection attack is the attacker performing?
A. End of Line Comment
B. UNION SQL Injection
C. Illegal/Logically Incorrect Query
D. Tautology
Answer: A
4. Which of the following options represents a conceptual characteristic of an anomaly-based IDS over
a signature-based IDS?
A. Produces less false positives
B. Can identify unknown attacks
C. Requires vendor updates for a new threat
D. Cannot deal with encrypted network traffic
Answer: B
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
Module 4
Ans - Digital evidence from cybercrime, like harmful software, computer viruses, and
cyberbullying, is the focus of cyber forensics. On the contrary, the recovery and analysis of digital
evidence from any form of digital devices, including computers, phones, tablets, and digital
cameras, is the focus of digital forensics. Cyber forensics is employed in cases involving fraud,
intellectual property theft, and other cyber security concerns, whereas digital forensics is frequently
used throughout criminal investigations.
Ans - Digital evidence needs to be preserved for a number of explanations. It can offer concrete
evidence of criminal activity or other illegal behavior, serve as proof in court, and enable the
prosecution of individuals who committed the crime. Furthermore, keeping track of digital
evidence might aid in finding those who have been the victims of internet scams, cyberbullying, or
other types of digital abuse. Lastly, digital evidence can assist organizations in defending
themselves against future legal concerns or responsibilities.
Ans - A cyber forensic investigator is in charge of looking through digital proof of crimes using
computers and networks. To locate, gather, and examine digital evidence, they employ a range of
strategies and instruments. They could also offer professional testimony in court. To adequately
examine and analyze digital evidence, cyber forensics investigators need to be technically and
legally knowledgeable.
4. How do you handle and analyze mobile device data in a cyber forensic investigation?
Adapting the following steps, I can simply handle and analyze mobile device data in a cyber
forensic investigation:
Module 5
Multiple choice questions -
b) 2001
c) 2002
d) 2003
Ans : a
2. Under which section of IT Act, stealing any digital asset or information is written a cyber-crime.
a) 65
b) 65-D
c) 67
d) 70
Ans : a
(b) 66 B
(c) 66 D
(d) 66F
Answer : d
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
5. The following Section draws a presumption that a secure electronic record has not been altered
since the point of time to which the secure status relates:
a. Section 85 B of the Indian Evidence Act, 1872
b. Section 3 of the I.T. Act, 2000
c. Section 192 of the Indian Penal Code, 1860
d. Section 200 of Cr. P. C.
Answer : a
10. Class test, Mid, End semester exam question papers with solutions
CA-1 Question Paper
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
For Answers, refer Standard Text Book as prescribed in Lesson Plan and also refer to the Lecture
Notes.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
For Answers, refer Standard Text Book as prescribed in Lesson Plan and also refer to the Lecture
Notes.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
For Answers, refer Standard Text Book as prescribed in Lesson Plan and also refer to the Lecture
Notes.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
Cyber security is the most concerned matter as cyber threats and attacks are overgrowing.
Attackers are now using more sophisticated techniques to target the systems. Individuals,
small-scale businesses or large organization, are all being impacted. So, all these firms
whether IT or non-IT firms have understood the importance of Cyber Security and focusing
on adopting all possible measures to deal with cyber threats.
"Cyber security is primarily about people, processes, and technologies working together to
encompass the full range of threat reduction, vulnerability reduction, deterrence, international
engagement, incident response, resiliency, and recovery policies and activities, including
computer network operations, information assurance, law enforcement, etc."
OR
Cyber security is the body of technologies, processes, and practices designed to protect
networks, computers, programs and data from attack, damage or unauthorized access.
• The term cyber security refers to techniques and practices designed to protect digital
data.
OR
Cyber security is the protection of Internet-connected systems, including hardware, software,
and data from cyber attacks.
It is made up of two words one is cyber and other is security.
• Cyber is related to the technology which contains systems, network and programs or
data.
• Whereas security related to the protection which includes systems security, network
security and application and information security.
• Regulations such as GDPR are forcing organizations into taking better care of the
personal data they hold.
Because of the above reasons, cyber security has become an important part of the
business and the focus now is on developing appropriate response plans that minimize
the damage in the event of a cyber attack.
But, an organization or an individual can develop a proper response plan only when
he has a good grip on cyber security fundamentals.
It also means trying to keep the identity of authorized parties involved in sharing and holding
data private and anonymous.
• Data encryption
• Two-factor authentication
• Biometric verification
• Security tokens
Integrity
• Cryptographic checksums
• Using file permissions
• Uninterrupted power supplies
• Data backups
Availability
Availability is making sure that authorized parties are able to access the information when
needed.
1) Web-based attacks
2) System-based attacks
Web-based attacks
These are the attacks which occur on a website or web applications. Some of the important
web-based attacks are as follows-
1. Injection attacks
It is the attack in which some data will be injected into a web application to manipulate the
application and fetch the required information.
Example- SQL Injection, code Injection, log Injection, XML Injection etc.
2. DNS Spoofing
DNS Spoofing is a type of computer security hacking. Whereby a data is introduced into a
DNS resolver's cache causing the name server to return an incorrect IP address, diverting
traffic to the attackers computer or any other computer. The DNS spoofing attacks can go on
for a long period of time without being detected and can cause serious security issues.
3. Session Hijacking
It is a security attack on a user session over a protected network. Web applications create
cookies to store the state and user sessions. By stealing the cookies, an attacker can have
access to all of the user data.
4. Phishing
Phishing is a type of attack which attempts to steal sensitive information like user login
credentials and credit card number. It occurs when an attacker is masquerading as a
trustworthy entity in electronic communication.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
5. Brute force
It is a type of attack which uses a trial and error method. This attack generates a large number
of guesses and validates them to obtain actual data like user password and personal
identification number. This attack may be used by criminals to crack encrypted data, or by
security, analysts to test an organization's network security.
6. Denial of Service
It is an attack which meant to make a server or network resource unavailable to the users. It
accomplishes this by flooding the target with traffic or sending it information that triggers a
crash. It uses the single system and single internet connection to attack a server. It can be
classified into the following-
Volume-based attacks- Its goal is to saturate the bandwidth of the attacked site, and is
measured in bit per second.
Application layer attacks- Its goal is to crash the web server and is measured in request per
second.
7. Dictionary attacks
This type of attack stored the list of a commonly used password and validated them to get
original password.
8. URL Interpretation
It is a type of attack where we can change the certain parts of a URL, and one can make a
web server to deliver web pages for which he is not authorized to browse.
It is a type of attack that allows an attacker to access unauthorized or essential files which is
available on the web server or to execute malicious files on the web server by making use of
the include functionality.
It is a type of attack that allows an attacker to intercepts the connection between client and
server and acts as a bridge between them. Due to this, an attacker will be able to read, insert
and modify the data in the intercepted connection.
System-based attacks
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
These are the attacks which are intended to compromise a computer or a computer network.
Some of the important system-based attacks are as follows-
1. Virus
It is a type of malicious software program that spread throughout the computer files without
the knowledge of a user. It is a self-replicating malicious computer program that replicates by
inserting copies of itself into other computer programs when executed. It can also execute
instructions that cause harm to the system.
2. Worm
3. Trojan horse
It is a malicious program that occurs unexpected changes to computer setting and unusual
activity, even when the computer should be idle. It misleads the user of its true intent. It
appears to be a normal application but when opened/executed some malicious code will run
in the background.
4. Backdoors
It is a method that bypasses the normal authentication process. A developer may create a
backdoor so that an application or operating system can be accessed for troubleshooting or
other purposes.
5. Bots
A bot (short for "robot") is an automated process that interacts with other network services.
Some bots program run automatically, while others only execute commands when they
receive specific input. Common examples of bots program are the crawler, chatroom bots,
and malicious bots.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
The 7 layers of cyber security should centre on the mission critical assets you are seeking to
protect.
Cyber threats are security incidents or circumstances with the potential to have a negative
outcome for your network or other data management systems.
Examples of common types of security threats include phishing attacks that result in the
installation of malware that infects your data, failure of a staff member to follow data
protection protocols that cause a data breach, or even a tornado that takes down your
company’s data headquarters, disrupting access.
Vulnerabilities are the gaps or weaknesses in a system that make threats possible and tempt
threat actors to exploit them.
Types of vulnerabilities in network security include but are not limited to SQL injections,
server misconfigurations, cross-site scripting, and transmitting sensitive data in a non-
encrypted plain text format.
When threat probability is multiplied by the potential loss that may result, cyber security
experts, refer to this as a risk.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
Computer criminals
Computer criminals have access to enormous amounts of hardware, software, and data; they
have the potential to cripple much of effective business and government throughout the
world. In a sense, the purpose of computer security is to prevent these criminals from doing
damage.
We say computer crime is any crime involving a computer or aided by the use of one.
Although this definition is admittedly broad, it allows us to consider ways to protect
ourselves, our businesses, and our communities against those who use computers maliciously.
One approach to prevention or moderation is to understand who commits these crimes and
why. Many studies have attempted to determine the characteristics of computer criminals. By
studying those who have already used computers to commit crimes, we may be able in the
future to spot likely criminals and prevent the crimes from occurring.
CIA Triad
The CIA Triad is actually a security model that has been developed to help people think
about various parts of IT security.
Confidentiality
It's crucial in today's world for people to protect their sensitive, private information from
unauthorized access.
Protecting confidentiality is dependent on being able to define and enforce certain access
levels for information.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
In some cases, doing this involves separating information into various collections that are
organized by who needs access to the information and how sensitive that information actually
is - i.e. the amount of damage suffered if the confidentiality was breached.
Some of the most common means used to manage confidentiality include access control lists,
volume and file encryption, and Unix file permissions.
Integrity
This is an essential component of the CIA Triad and designed to protect data from deletion or
modification from any unauthorized party, and it ensures that when an authorized person
makes a change that should not have been made the damage can be reversed.
Availability
This is the final component of the CIA Triad and refers to the actual availability of your data.
Authentication mechanisms, access channels and systems all have to work properly for the
information they protect and ensure it's available when it is needed.
The CIA Triad is all about information. While this is considered the core factor of the
majority of IT security, it promotes a limited view of the security that ignores other important
factors.
For example, even though availability may serve to make sure you don't lose access to
resources needed to provide information when it is needed, thinking about information
security in itself doesn't guarantee that someone else hasn't used your hardware resources
without authorization.
It's important to understand what the CIA Triad is, how it is used to plan and also to
implement a quality security policy while understanding the various principles behind it. It's
also important to understand the limitations it presents. When you are informed, you can
utilize the CIA Triad for what it has to offer and avoid the consequences that may come along
by not understanding it.
information assets. These are things such as databases and physical files – i.e. the sensitive
data that you store
What is a threat: A threat is any incident that could negatively affect an asset – for
example, if it’s lost, knocked offline or accessed by an unauthorized party.
Intentional threats include things such as criminal hacking or a malicious insider stealing
information, whereas accidental threats generally involve employee error, a technical
malfunction or an event that causes physical damage, such as a fire or natural disaster.
Motive of Attackers
Masquerade: in this attack, the intruder pretends to be a particular user of a system to gain
access or to gain greater privileges than they are authorized for. A masquerade may be
attempted through the use of stolen login IDs and passwords, through finding security gaps in
programs or through bypassing the authentication mechanism.
Session replay: In this type of attack, a hacker steals an authorized user’s log in information
by stealing the session ID. The intruder gains access and the ability to do anything the
authorized user can do on the website.
Message modification: In this attack, an intruder alters packet header addresses to direct a
message to a different destination or modify the data on a target machine.
In a denial of service (DoS) attack, users are deprived of access to a network or web
resource. This is generally accomplished by overwhelming the target with more traffic than it
can handle.
Passive Attacks:Passive attacks are relatively scarce from a classification perspective, but
can be carried out with relative ease, particularly if the traffic is not encrypted.
Eavesdropping (tapping): the attacker simply listens to messages exchanged by two entities.
For the attack to be useful, the traffic must not be encrypted. Any unencrypted information,
such as a password sent in response to an HTTP request, may be retrieved by the attacker.
Traffic analysis: the attacker looks at the metadata transmitted in traffic in order to deduce
information relating to the exchange and the participating entities, e.g. the form of the
exchanged traffic (rate, duration, etc.). In the cases where encrypted data are used, traffic
analysis can also lead to attacks by cryptanalysis, whereby the attacker may obtain
information or succeed in unencrypting the traffic.
Logic A Logic Bomb is malware that lies dormant until triggered. A logic bomb is a
Bomb specific example of an asynchronous attack.
Hardware Attacks:
Common hardware attacks include:
• Backdoor creation; the presence of hidden methods for bypassing normal computer
authentication systems
• Counterfeiting product assets that can produce extraordinary operations and those
made to gain malicious access to systems.
Cyber Threats-Cyber Warfare:Cyber warfare refers to the use of digital attacks -- like
computer viruses and hacking -- by one country to disrupt the vital computer systems of
another, with the aim of creating damage, death and destruction. Future wars will see
hackers using computer code to attack an enemy's infrastructure, fighting alongside
troops using conventional weapons like guns and missiles.
Cyber warfare involves the actions by a nation-state or international organization to
attack and attempt to damage another nation's computers or information networks
through, for example, computer viruses or denial-of-service attacks.
Cyber Crime:
Cybercrime is criminal activity that either targets or uses a computer, a computer
network or a networked device.Cybercrime is committed by cybercriminals or hackers
who want to make money. Cybercrime is carried out by individuals or organizations.
Some cybercriminals are organized, use advanced techniques and are highly technically
skilled. Others are novice hackers.
Cyber Terrorism:
Cyber terrorism is the convergence of cyberspace and terrorism. It refers to unlawful
attacks and threats of attacks against computers, networks and the information stored
therein when done to intimidate or coerce a government or its people in furtherance of
political or social objectives.
Examples are hacking into computer systems, introducing viruses to vulnerable
networks, web site defacing, Denial-of-service attacks, or terroristic threats made via
electronic communication.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
Cyber Espionage:
Cyber spying, or cyber espionage, is the act or practice of obtaining secrets and
information without the permission and knowledge of the holder of the information
from
individuals, competitors, rivals, groups, governments and enemies for personal,
economic, political or military advantage using methods on the Internet
.
Security Policies:
Security policies are a formal set of rules which is issued by an organization to ensure that
the user who are authorized to access company technology and information assets comply
with rules and guidelines related to the security of information.
A security policy also considered to be a "living document" which means that the document
is never finished, but it is continuously updated as requirements of the technology and
employee changes.
We use security policies to manage our network security. Most types of security policies are
automatically created during the installation. We can also customize policies to suit our
specific environment.
1) It increases efficiency.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
There are some important cyber security policies recommendations describe below-
Firewall Policy:
• It blocks the unauthorized users from accessing the systems and networks that
connect to the Internet.
• It detects the attacks by cybercriminals and removes the unwanted sources of
network traffic.
• This policy automatically detects and blocks the network attacks and browser attacks.
• It also protects applications from vulnerabilities and checks the contents of one
or more data packages and detects malware which is coming through legal ways.
• This policy protects a system's resources from applications and manages the
peripheral devices that can attach to a system.
• The device control policy applies to both Windows and Mac computers
whereas application control policy can be applied only to Windows clients.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
CYBERSPACE
Cyberspace can be defined as an intricate environment that involves interactions between
people, software, and services. It is maintained by the worldwide distribution of information
and communication technology devices and networks.
With the benefits carried by the technological advancements, the cyberspace today has
become a common pool used by citizens, businesses, critical information infrastructure,
military and governments in a fashion that makes it hard to induce clear boundaries among
these different groups. The cyberspace is anticipated to become even more complex in the
upcoming years, with the increase in networks and devices connected to it.
REGULATIONS
There are five predominant laws to cover when it comes to cybersecurity:
Information Technology Act, 2000 The Indian cyber laws are governed by the Information
Technology Act, penned down back in 2000. The principal impetus of this Act is to offer
reliable legal inclusiveness to eCommerce, facilitating registration of real-time records with
the Government.
But with the cyber attackers getting sneakier, topped by the human tendency to misuse
technology, a series of amendments followed.
The ITA, enacted by the Parliament of India, highlights the grievous punishments and
penalties safeguarding the e-governance, e-banking, and e-commerce sectors. Now, the
scope of ITA has been enhanced to encompass all the latest communication devices.
The IT Act is the salient one, guiding the entire Indian legislation to govern cybercrimes
rigorously:
Section 43 - Applicable to people who damage the computer systems without permission
from the owner. The owner can fully claim compensation for the entire damage in such
cases.
Section 66 - Applicable in case a person is found to dishonestly or fraudulently committing
any act referred to in section 43. The imprisonment term in such instances can mount up to
three years or a fine of up to Rs. 5 lakh.
Section 66B - Incorporates the punishments for fraudulently receiving stolen
communication devices or computers, which confirms a probable three years imprisonment.
This term can also be topped by Rs. 1 lakh fine, depending upon the severity.
Section 66C - This section scrutinizes the identity thefts related to imposter digital
signatures, hacking passwords, or other distinctive identification features. If proven guilty,
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
Section 66 D - This section was inserted on-demand, focusing on punishing cheaters doing
impersonation using computer resources.
NIST Compliance
The Cybersecurity Framework (NCFS), authorized by the National Institute of Standards
and Technology (NIST), offers a harmonized approach to cybersecurity as the most reliable
global certifying body.
NIST Cybersecurity Framework encompasses all required guidelines, standards, and best
practices to manage the cyber-related risks responsibly. This framework is prioritized on
flexibility and cost-effectiveness.
It promotes the resilience and protection of critical infrastructure by: Allowing better
interpretation, management, and reduction of cybersecurity risks – to mitigate data loss,
data misuse, and the subsequent restoration costs Determining the most important activities
and critical operations - to focus on securing them Demonstrates the trust-worthiness of
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
organizations who secure critical assets Helps to prioritize investments to maximize the
cybersecurity ROI Addresses regulatory and contractual obligations Supports the wider
information security program By combining the NIST CSF framework with ISO/IEC 27001
- cybersecurity risk management becomes simplified. It also makes communication
easier
throughout the organization and across the supply chains via a common cybersecurity
directive laid by NIST.
Final Thoughts As human dependence on technology intensifies, cyber laws in India and
across the globe need constant up-gradation and refinements. The pandemic has also pushed
much of the workforce into a remote working module increasing the need for app security.
Lawmakers have to go the extra mile to stay ahead of the impostors, in order to block them
at their advent.
Cybercrimes can be controlled but it needs collaborative efforts of the lawmakers, the
Internet or Network providers, the intercessors like banks and shopping sites, and, most
importantly, the users. Only the prudent efforts of these stakeholders, ensuring their
confinement to the law of the cyberland - can bring about online safety and resilience.
ROLE OF INTERNATIONAL LAWS
In various countries, areas of the computing and communication industries are regulated by
governmental bodies λ There are specific rules on the uses to which computers and
computer networks may be put, in particular there are rules on unauthorized access, data
privacy and spamming λ There are also limits on the use of encryption and of equipment
which may be used to defeat copy protection schemes λ There are laws governing trade on
the Internet, taxation, consumer protection, and advertising λ There are laws on censorship
versus freedom of expression, rules on public access to government information, and
individual access to information held on them by private bodies λ Some states limit access
to the Internet, by law as well as by technical means.
INTERNATIONAL LAW FOR CYBER CRIME
Cybercrime is "international" that there are ‘no cyber-borders between countries’ λ The
complexity in types and forms of cybercrime increases the difficulty to fight back fighting
cybercrime calls for international cooperation λ Various organizations and governments
have already made joint efforts in establishing global standards of legislation and law
enforcement both on a regional and on an international scale
Indian cyberspace was born in 1975 with the establishment of National Informatics Centre
(NIC) with an aim to provide govt with IT solutions. Three networks (NWs) were set up
between 1986 and 1988 to connect various agencies of govt. These NWs were, INDONET
which connected the IBM mainframe installations that made up India’s computer
infrastructure, NICNET (the NIC NW) a nationwide very small aperture terminal (VSAT)
NW for public sector organisations as well as to connect the central govt with the state
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
govts and district administrations, the third NW setup was ERNET (the Education and
Research Network), to serve the academic and research communities.
New Internet Policy of 1998 paved the way for services from multiple Internet service
providers (ISPs) and gave boost to the Internet user base grow from 1.4 million in 1999 to
over 150 million by Dec 2012. Exponential growth rate is attributed to increasing
Internet
access through mobile phones and tablets. Govt is making a determined push to increase
broadband penetration from its present level of about 6%1. The target for broadband is 160
million households by 2016 under the National Broadband Plan.
NATIONAL CYBER SECURITY POLICY
National Cyber Security Policy is a policy framework by Department of Electronics and
Information Technology. It aims at protecting the public and private infrastructure from
cyberattacks. The policy also intends to safeguard "information, such as personal
information (of web users), financial and banking information and sovereign data". This
was particularly relevant in the wake of US National Security Agency (NSA) leaks that
suggested the US government agencies are spying on Indian users, who have no legal or
technical safeguards against it. Ministry of Communications and
Information Technology (India) defines Cyberspace as a complex environment
consisting of interactions between people, software services supported by worldwide
distribution of information and communication technology.
VISION
To build a secure and resilient cyberspace for citizens, business, and government and also
to protect anyone from intervening in user's privacy.
MISSION
To protect information and information infrastructure in cyberspace, build capabilities to
prevent and respond to cyber threat, reduce vulnerabilities and minimize damage from
cyber incidents through a combination of institutional structures, people, processes,
technology, and cooperation.
OBJECTIVE
Ministry of Communications and Information Technology (India) define objectives as
follows:
• To create a secure cyber ecosystem in the country, generate adequate trust and
confidence in IT system and transactions in cyberspace and thereby enhance
adoption of IT in all sectors of the economy.
• To create an assurance framework for the design of security policies and promotion
and enabling actions for compliance to global security standards and best practices
by way of conformity assessment (Product, process, technology & people).
• To strengthen the Regulatory Framework for ensuring a SECURE CYBERSPACE
ECOSYSTEM.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
• To enhance and create National and Sectoral level 24X7 mechanism for obtaining
strategic information regarding threats to ICT infrastructure, creating scenarios for
response, resolution and crisis management through effective predictive, preventive,
protective response and recovery actions.
The forensic examination of computers, and data storage media, is a complicated and highly
specialized process. The results of forensic examinations are compiled and included in
reports. In many cases, examiners testify to their findings, where their skills and abilities are
put to ultimate scrutiny.
DIGITAL FORENSICS:
Digital Forensics helps the forensic team to analyzes, inspect, identifies, and preserve the
digital evidence residing on various types of electronic devices.
Digital forensic science is a branch of forensic science that focuses on the recovery and
investigation of material found in digital devices related to cybercrime.
Digital evidence is information stored or transmitted in binary form that may be relied on in
court. It can be found on a computer hard drive, a mobile phone, among other places.
Digital evidence is commonly associated with electronic crime, or e-crime, such as child
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
pornography or credit card fraud. However, digital evidence is now used to prosecute all
types of crimes, not just e-crime. For example, suspects' e-mail or mobile phone files might
contain critical evidence regarding their intent, their whereabouts at the time of a crime and
their relationship with other suspects. In 2005, for example, a floppy disk led investigators
to the BTK serial killer who had eluded police capture since 1974 and claimed the lives of
at least 10 victims.
In an effort to fight e-crime and to collect relevant digital evidence for all crimes, law enforcement
agencies are incorporating the collection and analysis of digital evidence, also known as computer
forensics, into their infrastructure. Law enforcement agencies are challenged by the need to train officers
to collect digital evidence and keep up with rapidly evolving technologies such as computer operating
systems.
• Header Analysis – Meta data in the e-mail message in the form of control
information i.e. envelope and headers including headers in the message body
contain information about the sender and/or the path along which the message has
traversed. Some of these may be spoofed to conceal the identity of the sender. A
detailed analysis of these headers and their correlation is performed in header
analysis.
• Bait Tactics – In bait tactic investigation an e-mail with http: “<imgsrc>” tag
having image source at some computer monitored by the investigators is send to the
sender of e-mail under investigation containing real (genuine) e-mail address. When
the e-mail is opened, a log entry containing the IP address of the recipient (sender of
the e-mail under investigation) is recorded on the http server hosting the image and
thus sender is tracked. However, if the recipient (sender of the e-mail under
investigation) is using a proxy server then IP address of the proxy server is
recorded. The log on proxy server can be used to track the sender of the e-mail
under investigation. If the proxy server’s log is unavailable due to some reason, then
investigators may send the tactic e-mail containing a) Embedded Java Applet that
runs on receiver’s computer or b) HTML page with Active X Object. Both aiming to
extract IP address of the receiver’s computer and e-mail it to the investigators.
Erasing or deleting an email doesn’t necessarily mean that it is gone forever. Often emails
can be forensically extracted even after deletion. Forensic tracing of e-mail is similar to
traditional detective work. It is used for retrieving information from mailbox files.
• OST and PST Viewer – Nucleus Technologies’ OST and PST viewer tools help
you view OST and PST files easily without connecting to an MS Exchange server.
These tools allow the user to scan OST and PST files and they display the data
saved in it including email messages, contacts, calendars, notes, etc., in a proper
folder structure.
Collection: The first step in the forensic process is to identify potential sources of data and
acquire data from them.
Examination:After data has been collected, the next phase is to examine the data, which
involves assessing and extracting the relevant pieces of information from the collected data.
This phase may also involve bypassing or mitigating OS or application features that obscure
data and code, such as data compression, encryption, and access control mechanisms.
Analysis: Once the relevant information has been extracted, the analyst should study and
analyze the data to draw conclusions from it. The foundation of forensics is using a
methodical approach to reach appropriate conclusions based on the available data or
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
FORENSICS INVESTIGATION:
Forensics are the scientific methods used to solve a crime. Forensic investigation is the
gathering and analysis of all crime-related physical evidence in order to come to a
conclusion about a suspect. Investigators will look at blood, fluid, or fingerprints, residue,
hard drives, computers, or other technology to establish how a crime took place. This is a
general definition, though, since there are a number of different types of forensics.
TYPES OF FORENSICS INVESTIGATION
• Technical challenges
• Legal challenges
• Resource Challenges
TECHNICAL CHALLENGES
As technology develops crimes and criminals are also developed with it. Digital forensic
experts use forensic tools for collecting shreds of evidence against criminals and criminals
use such tools for hiding, altering or removing the traces of their crime, in digital forensic
this process is called Anti- forensics technique which is considered as a major challenge in
digital forensics world.
LEGAL CHALLENGES
The presentation of digital evidence is more difficult than its collection because there are
many instances where the legal framework acquires a soft approach and does not recognize
every aspect of cyber forensics, as in Jagdeo Singh V. The State and Ors case Hon’ble High
Court of Delhi held that “while dealing with the admissibility of an intercepted telephone
call in a CD and CDR which was without a certificate under Sec. 65B of the Indian
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
Evidence Act, 1872 the court observed that the secondary electronic evidence without
certificate u/s. 65B of Indian Evidence Act, 1872 is not admissible and cannot be looked
into by the court for any purpose whatsoever.” This happens in most of the cases as the
cyber police lack the necessary qualification and ability to identify a possible source of
evidence and prove it. Besides, most of the time electronic evidence is challenged in the
court due to its integrity. In the absence of proper guidelines and the nonexistence of proper
explanation of the collection, and acquisition of electronic evidence gets dismissed in itself.
Legal Challenges
• Privacy Issues
• Admissibility in Courts
• Preservation of electronic evidence
• Power for gathering digital evidence
• Analyzing a running computer
Resource Challenges
As the rate of crime increases the number of data increases and the burden to analyze such
huge data is also increasing on a digital forensic expert because digital evidence is more
sensitive as compared to physical evidence it can easily disappear. For making the
investigation process fast and useful forensic experts use various tools to check the
authenticity of the data but dealing with these tools is also a challenge in itself.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
• Change in technology
Due to rapid change in technology like operating systems, application software and
hardware, reading of digital evidence becoming more difficult because new version
software’s are not supported to an older version and the software developing companies did
provide any backward compatible’s which also affects legally.
The confidentiality, availability, and integrity of electronic documents are easily get
manipulated. The combination of wide-area networks and the internet form a big network
that allows flowing data beyond the physical boundaries. Such easiness of communication
and availability of electronic document increases the volume of data which also create
difficulty in the identification of original and relevant data.
Mobile computing is "taking a computer and all necessary files and software out into the
field." Many types of mobile computers have been introduced since 1990s. They are as
follows:
1. Portable computer: It is a general-purpose computer that can be easily moved from one
place to another, but cannot be used while in transit, usually because it requires some
"setting-up" and an AC power source.
2. Tablet PC: It lacks a keyboard, is shaped like a slate or a paper notebook and has
features of a touchscreen with a stylus and handwriting recognition software. Tablets may
not be best suited for applications requiring a physical keyboard for typing, but are
otherwise capable of carrying out most tasks that an ordinary laptop would be able to
perform.
3. Internet tablet: It is the Internet appliance in tablet form. Unlike a Tablet PC, the
Internet tablet does not have much computing power and its applications suite is limited.
Also it cannot replace a general-purpose computer. The Internet tablets typically feature an
MP3 and video player, a Web browser, a chat application and a picture viewer.
4. Personal digital assistant (PDA): It is a small, usually pocket-sized, computer with
limited functionality. It is intended to supplement and synchronize with a desktop computer,
giving access to contacts, address book, notes, E-Mail and other features.
5. Ultramobile (PC): It is a full-featured, PDA-sized computer running a general-purpose
operating system (OS).
6. Smartphone: It is a PDA with an integrated cell phone functionality. Current
Smartphones have a wide range of features and installable applications.
7. Carputer: It is a computing device installed in an automobile. It operates as a wireless
computer, sound system, global positioning system (GPS) and DVD player. It also contains
word processing software and is Bluetooth compatible.
8. Fly Fusion Pentop computer: It is a computing device with the size and shape of a pen.
It functions as a writing utensil, MP3 player, language translator, digital storage device and
calculator.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
Trends in Mobility:
Mobile computing is moving into a new era, third generation ( 3G), which promises greater
variety in applications and have highly improved usability as well as speedier networking.
"iPhone" from Apple and Google-led "Android" phones are the best examples of this trend
and there are plenty of other developments that point in this direction. This smart mobile
technology is rapidly gaining popularity and the attackers (hackers and crackers) are among
its biggest fans.
It is worth noting the trends in mobile computing; this will help readers to readers to realize
the seriousness of cybersecurity issues in the mobile computing domain. Figure below
shows the different types of mobility and their implications.
The new technology 3G networks are not entirely built with IP data security. Moreover, IP
data world when compared to voice-centric security threats is new to mobile operators.
There are numerous attacks that can be committed against mobile networks and they can
originate from two primary vectors. One is from outside the mobile network - that is, public
Internet, private networks and other operator's networks - and the other is within the mobile
networks- that is, devices such as data-capable handsets and Smartphones, notebook
computers or even desktop computers connected to the 3G network.
Popular types of attacks against 3G mobile networks are as follows:
1. Malwares, viruses and worms: Although many users are still in the transient process of
switching from 2G,2.5G2G,2.5G to 3G,3G, it is a growing need to educate the community
people and provide awareness of such threats that exist while using mobile devices. Here
are few examples of malware(s) specific to mobile devices:
• Skull Trojan: I targets Series 60 phones equipped with the Symbian mobile OS.
• Cabir Worm: It is the first dedicated mobile-phone worm infects phones running on
Symbian OS and scans other mobile devices to send a copy of itself to the first
vulnerable phone it finds through Bluetooth Wireless technology. The worst thing
about this worm is that the source code for the Cabir-H and Cabir-I viruses is
available online.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
2. Denial-of-service (DoS): The main objective behind this attack is to make the system
unavailable to the intended users. Virus attacks can be used to damage the system to make
the system unavailable. Presently, one of the most common cyber security threats to wired
Internet service providers (iSPs) is a distributed denial-of-service (DDos) attack
.DDoS attacks are used to flood the target system with the data so that the response from the
target system is either slowed or stopped.
3. Overbilling attack: Overbilling involves an attacker hijacking a subscriber's IP address
and then using it (i.e., the connection) to initiate downloads that are not "Free downloads"
or simply use it for his/her own purposes. In either case, the legitimate user is charged for
the activity which the user did not conduct or authorize to conduct.
4. Spoofed policy development process (PDP): These of attacks exploit the vulnerabilities
in the GTP [General Packet Radio Service (GPRS) Tunneling Protocol].
5. Signaling-level attacks: The Session Initiation Protocol (SIP) is a signaling protocol
used in IP multimedia subsystem (IMS) networks to provide Voice Over Internet Protocol
(VoIP) services. There are several vulnerabilities with SIP-based VolP systems.
• Mobile - Viruses
• Concept of Mishing
• Concept of Vishing
• Concept of Smishing
• Hacking - Bluetooth
Concept of Laptops:
As the price of computing technology is steadily decreasing, usage of devices such as the
laptops is becoming more common. Although laptops, like other mobile devices, enhance
the business functions owing to their mobile access to information anytime and anywhere,
they also pose a large threat as they are portable Wireless capability in these devices has
also raised cyber security concerns owing to the information being transmitted over other,
which makes it hard to detect.
The thefts of laptops have always been a major issue, according to the cybersecurity
industry and insurance company statistics. Cybercriminals are targeting laptops that are
expensive, to enable them to fetch a quick profit in the black market. Very few laptop.
thieves. are actually interested in the information that is contained in the laptop. Most
laptops contain personal and corporate information that could be sensitive..
Physical Security Countermeasures
Organizations are heavily dependent upon a mobile workforce with access to information,
no matter where they travel. However, this mobility is putting organizations at risk of
having a data breach if a laptop containing sensitive information is lost or stolen. Hence,
physical security countermeasures are becoming very vital to protect the information on the
employees laptops and to reduce the likelihood that employees will lose laptops.
1. Cables and hardwired locks: The most cost-efficient and ideal solution to safeguard any
mobile device is securing with cables and locks, specially designed for laptops. Kensington
cables are one of the most popular brands in laptop security cable. These cables are made of
aircraft-grade steel and Kevlar brand fiber, thus making these cables 40%% stronger than
any other conventional security cables. One end of the security cable is fit into the universal
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
security slot of the laptop and the other end is locked around any fixed furniture or item,
thus making a loop. These cables come with a variety of options such as number locks, key
locks and alarms.
2. Laptop safes: Safes made of polycarbonate - the same material that is used in bulletproof
windows, police riot shields and bank security screens-can be used to carry and safeguard
the laptops. The advantage of safes over security cables is that they protect the whole laptop
and its devices such as CD-ROM bays, PCMCIA cards and HDD bays which can be easily
removed in the case of laptops protected by security cables.
3. Motion sensors and alarms: Even though alarms and motion sensors are annoying
owing to their false alarms and loud sound level, these devices are very efficient in securing
laptops. Once these devices are activated, they can be used to track missing laptops in
crowded places. Also owing to their loud nature, they help in deterring thieves. Modern
systems for laptops are designed wherein the alarm device attached to the laptop transmits
radio signals to a certain range around the laptop.
4. Warning labels and stamps: Warning labels containing tracking information and
identification details can be fixed onto the laptop to deter aspiring thieves. These labels
cannot be removed easily and are a low-cost solution to a laptop theft. These labels have an
identification number that is stored in a universal database for verification, which, in turn
makes the resale of stolen laptops a difficult process. Such labels are highly recommended
for the laptops issued to top executives and/or key employees of the organizations.
5. Other measures for protecting laptops are as follows:
• Engraving the laptop with personal details
• Keeping the laptop close to oneself wherever possible
• Carrying the laptop in a different and unobvious bag making it unobvious to
potential thieves
• Creating the awareness among the employees to understand the responsibility of
carrying a laptop and also about the sensitivity of the information contained in the
laptop
• Making a copy of the purchase receipt, laptop serial number and the description of
the laptop
• Installing encryption software to protect information stored on the laptop
• Using personal firewall software to block unwanted access and intrusion
• Updating the antivirus software regularly
• Tight office security using security guards and securing the laptop by locking it
down in lockers when not in use
• Never leaving the laptop unattended in public places such as the car, parking
lot, conventions, conferences and the airport until it is fitted with an anti theft
device;
• Disabling IR ports and wireless cards and removing PCMCIA cards when not in
use. Information systems security also contains logical access controls. This is
because, information, be it corporate or private, needs high security as it is the most
important asset of an organization or an individual. A few logical or access controls are as
follows:
1. Protecting from malicious programs/attackers/social engineering.
2. Avoiding weak passwords/ access.
3. Monitoring application security and scanning for vulnerabilities.
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
CA2 MARKS
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
Future Institute of Engineering and Management
College Code: 148
P/7/2098 Sonarpur Station Road, Kolkata 700150, INDIA
MANAGEMENT
PUTURE INSTITUTE OFENGINEERING &
CC- 148
UNDER
MAKAUT, WB
Man- in - tta-Middle ataek
TDS, IPS,
CONTINUOUS ASSESSMENT#2
Cylau Secaity
PEC-CS 702£
Odd Semester
Academic Year: 2023-24
SUBMITTED BY
148600Q0007
(ombutea Soisnce Engining
24 Samesto-7
25
matuok and
datastion Syutmo (ID) monita entenkise t t a t . Zhese
ta deteot Aeity ineidenta and inmint
;yslutina Aatt busieass y bsactily atetial eyhescaty metuark
Ablbtin that aotoauspicisus
jmcidonto. tis moiteing
(soc)analyt. hesa aleit analte aeculy eael e
oeatib cent astate euntrmeeules
Bmweatigao sha deteted jsses and aneeuta tha Lue man netwsk
aigniluant danage Bccws.
Is addlso them e7oa IDS - hast-baaed IDS (HIDS) and
dettoymnt oana est for and
(NIDS). HIDS io dallayed at the ndtot lenol
mtask-basd IDS NIDS Asludtiba mouita
sndboint om tileats hile
atoto inddusl
and
ems of tu mesdotoy uaed Bor ideniiyg
locatin, TDS also di{b in baaed 7bg leneragesbhngertlng to
bstetliituains.Siymatua-
uch as mawa Gnee malicisus thelhie i
tieato
denty Ansun ig caktmed and addod ta the datalhaae. ech
idonibied,ito aignatua
datahase io combaed ogainst metLsk leallie in
signatus this capalle ol
tieato. thia tyhe of Ibs io
)ual time to dotet me nebdy and acewstey.
Astecng Rnswn hieato
Paewandion Syatoma (IPS) ojoms ntuain dataction. n
TRS Ssin secuity harduo, ax
io a metwerk ehaiioun Qer thuato,
fienention
Ttuion that aytemohseuesmotuek
coneuay
sofuane sytem. Houweme IPS gaes ne slet
Qik an intuaion detectin
}uat
tahs he spiate actiol?t datat
hoad of TbS and automalically
meaawes Aueh as
tae thpato neudng
a
frm a foticula
Aations can aas kue coniqued to aea
hanyat la
S IPS attacka and d
dmmy datayo miadin
dacoy thot contains
hom ln Bhin aiginl targeto that containm accwste data
maden-day antobiar aecuiy
cmhonent of
o
o a022 have mumeroa
gaiatimal metusnko thuomaking manay
Omd prscsa igh data nolumes an imbosing taak.
thuet
Aeatonding to
Pasmt
D beiation bo
IPS.
Intsion Pronentin Syaem
Tntbuion betection Sym automitieally
lmonitn
Aetie
and stil dalend) amd pasine.
Ininoto datacmmunicalion
n) Placemnt Oat of band rom data
Comnication Satiatical nomaly based
Signate dotetin: dotecti.
1)betectin Enplait fociny aignatus "Signatus dotestion:
mwchaism Eatlat-facig aigatus
Vulmahaility Bacing Aignalues
dotting b ,alutoeleanmaliciela
v) dnemaly Sendo alamlaleto
hastonse matciss lanlie
perlomene Seua laun metwsk
V)Notuek DaLsmat impact matuuenk Anlomanee due t dalay
depbymat of Ib
perlonane due to mo-lne Calsdd y nline IPs cag
Coamnetin.
2) Lollsus
Dongn Nome
) HTTP Spsaling Syitem asctig
Bmoil hijaking
5) Seens Sscto tayn
6) Wi-fi eansdratig
hijacting
Paenention
DSecue cnntin
)Aaid hiang mail
molassk eneylin
3) biiNoar.
TOP SEET
THEORY PAPER
TH
CEPTCSE SEM UNIVERSITY ROLL No. 40D320034
-UL eRKS 25
SIGNATURE OF THE STUDENIT Napeet Das
ie
Emles
Ficewal rotecl ne tole
tw
A
attackens,
Arewoll ields you
hebwole becanse
Lacts ass a 2!24/a f:Aten,
keaviny the dat that attennts to
te
he twolk an
enter Anr pvevent onylhing
A.t Aooles susplel*s fron getting thnough
Siobw} tes ke ep hanfl data
outside ur Computer, Soe ot the top niske
on mhich tiv ewJ potects (ompute
inede batkdoovn S, denialrof -Senvice Do S)
attacks macros, rremote oginsspam ar o viruses
how ativewall
hou
Asiople ay toot explain
worles is te Hhine it as seeurit1
midliens
manditk inimate leno-he dge of sees
riminsl. I4 he quandOut ot
criminad
Ehe
keeps
eDdivg. Siiurewol's voteetln
ating toathi
andnegu
hat goes in ovd ng netwonk
kechrique used
inyection is a eb
yect
to evtract usen ata by Ehongh
as alakementr
ge inp uts
Sal cmmands technique that
eetion
code ine
·Tt is a poro~ise database.
ît is one ot he
haceingLncomlele
tchyiqe