Cyber Security 4
Cyber Security 4
• Cyber Law is a framework created to give legal recognition to all risks arising
out of the usage of computers, computer network or related technology.
• “Cyber Law” is a term used to describe the legal issues related to use of
Computer and Communications Technology.
• The Indian Parliament passed the Information Technology Bill on 17th May
2000, known as the ITA 2000, aimed at providing legal infrastructure for
E-Commerce in India.
Cyber Crime Classification
• We can categorize Cyber crimes in two ways
• Types of Cybercrime
• The term hacker was originally a term of respect for computer experts
who knew all about computers, and could do cool things with them
• Some hackers crossed over to the dark side, and these villains were more
properly known as "crackers“
• An attack vector is a path or means by which a hacker (or cracker) can gain
access to a computer or network server in order to deliver a payload or
malicious outcome.
• Attack vectors are routes or methods used to get into computer systems,
usually for malicious purposes.
• They take advantage of known weak spots to gain entry. Many attack
vectors take advantage of the human element in the system, because that's
often the weakest link.
Cont...
Cont...
• An attack vector is a path or means by which a hacker can gain access to a
computer or network server in order to deliver a malicious payload or malware.
• Attack vectors enable hackers to exploit system vulnerabilities, including the
human element.
• Attack vectors include viruses, e-mail attachments, Web pages, pop-up windows,
instant messages, chat rooms, and deception. All of these methods involve
programming except deception
• To some extent, firewalls and anti-virus software can block attack vectors. But no
protection method is totally attack-proof.
• A defense method that is effective today may not remain so for long, because
hackers are constantly updating attack vectors, and seeking new ones to gain
unauthorized access to computers and servers.
• The most common malicious payloads are viruses, Trojan horses, worms, and
spyware.
Cont...
Different ways to launch attack vectors
1. Attack by E-Mail
2. Attachments (and other files)
3. Attack by deception
4. Hackers
5. Heedless guests (attack by webpage)
6. Attack of the worms
7. Malicious macros
8. Foistware (sneakware)
9. Viruses
Cont...
Attack by E-mail: The hostile content is either embedded in the message or linked
to
by the message. Sometimes attacks combine the two vectors, so that if the
message does not get you, the attachment will.
• Spam is almost always carrier for scams, fraud, dirty tricks, or malicious
actions of some kind.
• Any link that offers something “free” or tempting is a suspect.
Attachments (and other files): Malicious attachments install malicious computer
code.
• The code could be a virus, Trojan horse, Spyware, or any other kind of
malware.
• Attachments attempt to install their payload as soon as you open them.
Cont...
Attack by deception: Deception is aimed at the user/operator as a vulnerable
entry point.
• It is not just malicious computer code that one needs to monitor.
• Fraud, scams, hoaxes, and to some extent spam, not to mention viruses,
worms and such require the unwitting cooperation of the computer’s
operator to succeed.
• Social engineering and hoaxes are other forms of deception that are often an
attack vector too.
Hackers: Hackers/crackers are a formidable attack vector because, unlike
ordinary malicious code, people are flexible and they can improvise.
Cont...
Heedless guests (attack by webpage): Counterfeit websites are used to extract
personal information. Such websites look very much like the genuine websites
they imitate.
• One may think he/she is doing business with someone you trust.
However he/she is really giving their personal information, like address, credit
card number, and expiration date.
• They are often used in conjunction with Spam, which gets you there in the
first place.
• Pop-up webpages may install Spyware, Adware or Trojans.
Cont...
Attack of the worms: Many worms are delivered as E-Mail attachments, but
network
• worms use holes in network protocols directly. Any remote access service, like
file sharing, is likely to be vulnerable to this sort of worm. In most cases,
firewalls will block system worms.
• Many of these system worms install Trojan Horses. Next, they begin scanning
the internet from the computer they have just infected and start looking for
other computers to infect.
• If the worm is successful, it propagates rapidly.
• The worm owner soon has thousands of “zombie” computers to use for more
mischief.
Cont...
Malicious macros: Malicious macros refer to a type of cyber threat that involves
the use of macros, which are small scripts or commands, typically written in
scripting languages like Visual Basic for Applications (VBA), to carry out malicious
activities within documents such as Microsoft Word or Excel files.
Social Engineering.
Macro Execution.
Payload Delivery
Cont...
Foistware (sneakware): Foistware is the software that adds hidden components
to the system on the sly.
• Spyware is the most common form of foistware.
• Foistware is quasi-legal software bundled with some attractive software.
• Sneak software often hijacks your browser and diverts you to some
“revenue opportunity” that the foistware has set up.
Viruses: These are the malicious computer codes that hitch a ride and make the
payload.
• Now-a-days, virus vectors include E-Mail attachments, downloaded files,
worms, etc.
cyber space and criminal behaviour
• Cyberspace refers to the virtual space that provides the infrastructure, electronic
medium and related elements necessary for online global communication.
• It can be thought of as the second life space where human beings operate for
social interactions, entertainment, business operations as well as for personal
activities and interests.
• The term cyberspace is derived from the word cybernetics which in turn is
extracted from ancient Greek word kubernētēs, that refers to steersman or to give
direction.
• The term cyberspace first came into existence in various contexts in visual arts and
science fiction during 1940, 1960 and 1984.
• However, the first reference was made by the founder of Electronic Frontier
Foundation, in the year 1990 and later in 1991 by Mr. Benedict, which is close to
the existing relationship of computer and telecommunication systems.
Cont...
• A cybercriminal is an individual who commits cybercrimes, where he/she makes
use of the computer either as a tool or as a target or as both.
• Cybercriminals tries to use the computers in three broad ways.
• Firstly, they use the computer as their target for attacking other people's
computers for the purpose of fulfilling their malicious activities like spreading
viruses, data theft, identity theft, etc.
Cont...
• Secondly, they use the computer as their weapon for the purpose of carrying
out conventional crime like spam, fraud, illegal gambling, etc.
• Thirdly, they use the computer as their accessory for the purpose of saving
stolen or illegal data.
• Thus cyberspace provides a platform for all criminal activities.
• The advantages of cyberspace include
i. Informational resources
ii. Entertainment
iii. Social networking
Cont...
• Cyberspace is most definitely a place where you chat, explore, research and
play.
• The Information or Digital Revolution has created a new forum for both
terrorist activity and criminal behavior.
• The advent of the computer has changed the way individuals behave.
• Crimes related to health care, insurances are also performed by hacking and
forging identities.
• Gathering information and then prioritizing individual incidents and steps for
a response.
6) Recovery
• Develop a near-term remediation strategy and roadmap
• Focus on resuming normal business operations
• Develop a long-term risk mitigation strategy
• Document the incident to improve the IR plan and update security measures
to avoid such incidents in future
Cont...
Digital Forensics
• Digital forensics is a fairly novel science.
• Intranets are small, local networks connecting computers which are within one
organization and which are controlled by a common system administrator.
• internets, on the other hand, connect several networks, and are distinguished
in the literature by a lower case (i.e., internet as opposed to Internet).
• These networks are usually located in a small geographic area, and share a
common protocol (usually TCP-Transmission Control Protocol/ IP-Internet
Protocol).
• The Internet, on the other hand, is the largest network in the world, an
international connection of all types and sizes of computer systems and
Recognizing and Defining Computer Crime
• It is unclear exactly when and where the first “computer crime” actually
occurred.
• It is safe to assume that these types of activities occurred long before written
or formal documentation was in vogue.
• who would never walk into an adult book store in search of photographs or
videos, download those same materials in the privacy of their home from
web.
• Instead of looting bank with a gun criminal may feel comfortable altering
Contaminants and Destruction of Data
• Data destruction is the process of destroying data stored on tapes, hard disks and
other forms of electronic media so that it is completely unreadable and cannot be
accessed or used for unauthorized purposes.
• Environment surrounding of data storage area may affect on the stored data. Like
environment polluted with Ferrous metal particles, Corrosive gases,
Chlorides/salts, Electrostatic dust, electricity generation,
1. Power Outage
• Let us look into some common cyber-crime scenarios which can attract
prosecution as per the penalties and offences prescribed in IT Act 2000
(amended via 2008) Act.
1. Harassment via fake public profile on social networking site
– A fake profile of a person is created on a social networking site with the
correct address, residential information or contact details but he/she is
labeled as ‘prostitute’ or a person of ‘loose character’. This leads to
harassment of the victim.
– Provisions Applicable: Sections 66A, 67 of IT Act and Section 509 of the
Indian Penal Code.
Cont...
2. Online Hate Community
Online hate community is created inciting a religious group to act or pass
objectionable remarks against a country, national figures etc.
Provisions Applicable: Section 66A of IT Act and 153A & 153B of the Indian Penal
Code.
9.Cyber Pornography
Among the largest businesses on Internet. Pornography may not be illegal in many
countries, but child pornography is.
Provisions Applicable: Sections 67, 67A and 67B of the IT Act.
Cont...
10. Phishing and Email Scams
– Phishing involves fraudulently acquiring sensitive information through
masquerading a site as a trusted entity. (E.g. Passwords, credit card
information).
– Provisions Applicable: Section 66, 66A and 66D of IT Act and Section 420
of IPC.
11. Theft of Confidential Information
– Many business organizations store their confidential information in
computer systems. This information is targeted by rivals, criminals and
disgruntled employees.
– Provisions Applicable: Sections 43, 66, 66B of IT Act and Section 426 of
Cont...
12. Source Code Theft
– A Source code generally is the most coveted and important "crown jewel"
asset of a company.
– Provisions applicable: Sections 43, 66, 66B of IT Act and Section 63 of
Copyright Act.
13. Tax Evasion and Money Laundering
– Money launderers and people doing illegal business activities hide their
information in virtual as well as physical activities.
– Provisions Applicable: Income Tax Act and Prevention of Money
Laundering Act. IT Act may apply case-wise.
Cont...