Unit 3
Unit 3
Cybersecurity
Cybersecurity means protecting computers from viruses and other types of malware using
anti-virus software or other security programs
Cybersecurity is the technology and process that is designed to protect networks and devices
from attacks, damage, or unauthorized access. The basic cybersecurity concepts involve
reducing cyber-attack risks and preventing unauthorized access to systems, networks, and
technologies
Cybersecurity is essential for a country’s military, hospitals, large corporations, small
businesses, and other organizations and individuals since data is now the cornerstone of any
organization. If that data is exploited, then there are a lot of risks
Fundamentals of Cybersecurity
1. Device Protection
With the rise in cyber threats, individuals and companies should prioritize device
protection. It is crucial to protect devices that connect to the internet using anti-virus
software, enables the lock-and-erase options, activate two-factor authentication, and
perform a regular automatic update of the system software, whether they are laptops, PCs,
mobile phones, AI-based devices (Alexa, smart watches, etc.), iPads, tables, or any device
that connects to the internet. Device protection will significantly reduce the risk of attacks
on individuals and their devices regardless of their location.
Once an individual device is connected online, information transmitted over the Internet
requires more defenses. Furthermore, one should use VPNs: Virtual Private Networks as
they automatically encrypt internet traffic. By using a VPN, all online transactions are
secured, including the user’s identity, location, browsing details, and any sensitive
information such as passwords and bank details.
Backups fall into two categories: Remote backups (offline) and cloud storage (online).
Solutions differ in their advantages and disadvantages.
Remote backup services are convenient and inexpensive, but it is not easily accessible
from anywhere. Alternatively, cloud solutions can be accessed from anywhere and are
suitable for an organization that operates from different locations.
Cyber threats can, however, affect anything connected to the internet. With a database and
infrastructure security management system, the cloud computing solution is highly secure,
with strong network security, application security, and cloud security. Additionally, strong
mobile security enhances cloud computing security.
Penetration Security
Penetration testing, or pen testing, is the practice of running controlled attacks on a computer
system, network, software, or other application in an attempt to find unpatched vulnerabilities
or flaws. By performing pen tests, an organization can find ways to harden their systems
against possible future real attacks, and thus make them less exploitable.
Penetration tests (pen tests) are simulated cyberattacks designed to assess the cybersecurity of
your organizational technologies and systems. Composed of multiple steps, this process:
Pen tests are performed by ethical hackers, meaning the tests involve carrying out attacks on
real systems and data using the same tools and techniques an actual attacker would. However,
the information collected is not sold to malicious third-party groups, and the organization is
not placed in actual danger.
Ideally, software and systems were designed from the start with the aim of eliminating
dangerous security flaws. A pen test provides insight into how well that aim was
achieved. Pen testing can help an organization
Find weaknesses in systems
Determine the robustness of controls
Support compliance with data privacy and security regulations (e.g., PCI
DSS, HIPAA, GDPR)
Provide qualitative and quantitative examples of current security posture and budget
priorities for management
Malware
Malware is malicious software such as spyware, ransomware, viruses and
worms. Malware is usually installed into the system when the user opens a
malicious link or email. Once installed, malware can block access to critical
components of your network, damage your system, and export confidential
information to destinations unknown
Ransomware blocks access to files on a device, rendering any files (and the
systems that rely on them) unavailable. Usually, malicious actors demand a cash
ransom in exchange for a decryption key.
A backdoor circumvents routine authentication procedures to access a system.
This gives the attacker remote access to resources within an application, such as
databases and file servers, and allows malicious actors to issue system
commands and update malware remotely.
Trojans are malware or code that acts as a legitimate application or file to trick
you into loading and executing the malware on your device. A trojan’s goal is to
damage or steal your organization’s data or to inflict some other harm on your
network.
A computer virus is malicious code designed to spread from device to device.
These self-copying threats are usually intended to damage a machine or steal
data.
Worms are malware that spread copies of themselves from computer to
computer without human interaction. They do not need to attach themselves to a
software program to cause damage..
Using reputable antivirus and anti-malware solutions, email spam filters, and
endpoint security solutions.
Ensuring that your cybersecurity updates and patches are all up to date.
Requiring your employees to undergo regular cybersecurity awareness training
to teach them how to avoid suspicious websites and to avoid engaging with
suspicious emails.
Limiting user access and application privileges.
Virus
A virus is a program which attaches itself to another program & causes
damage to the computer system or network.
Types Virus
Boot Sector Virus
Your computer drive has a sector solely responsible for pointing to the operating
system so that it can boot into the interface. A boot sector virus damages or controls
the boot sector on the drive, rendering the machine unusable. Attackers usually use
malicious USB devices to spread this computer virus. The virus is activated when
users plug in the USB device and boot their machine.
Parasitic Virus
Parasitic virus attacks the file using the extensions .exe or .com. It spreads
the virus by attaching itself to another program. It is also called a file virus.
The Parasitic virus hides them in a file and runs along with the file. To avoid
this virus, users should avoid clicking unwanted links.
Overwrite Virus – One of the most harmful viruses, the overwrite virus can
completely remove the existing program and replace it with the malicious code by
overwriting it. Gradually it can completely replace the host’s programming code with
the harmful code.
Resident Virus
A virus that can access computer memory and sit dormant until a payload is
delivered is considered a resident virus. This malware may stay dormant until a
specific date or time or when a user performs an action.
Polymorphic Virus
Malware authors can use polymorphic code to change the program’s footprint to
avoid detection. Therefore, it’s more difficult for an antivirus to detect and remove
them.
Macro Virus
Microsoft Office files can run macros that can be used to download additional
malware or run malicious code. Macro viruses deliver a payload when the file is
opened and the macro runs.
Stealth Virus
Stealth virus is computer viruses that are hidden inside a file in the operating
system. It steals the data, changes the encryption of data, and undergoes a
self-modification of the code. It is unnoticeable by the users and usually hide
in the boot part of the system
Most browsers have defenses against malicious web scripts, but older, unsupported
browsers have vulnerabilities allowing attackers to run code on the local device.
Browser Hijacker
A computer virus that can change the settings on your browser will hijack browser
favorites, the home page URL, and your search preferences and redirect you to a
malicious site. The site could be a phishing site or an adware page used to steal
data or make money for the attacker.
To persist on a system, a threat actor uses file infector viruses to inject malicious
code into critical files that run the operating system or important programs. The
computer virus is activated when the system boots or the program runs.
When a user executes a seemingly harmless file attached to malicious code, direct-
action viruses deliver a payload immediately. These computer viruses can also
remain dormant until a specific action is taken or a timeframe passes.
Multipartite Virus
In 2001, a worm named NIMDA spread across the entire network in just
22 minutes
2. Worm
Spyware
Spyware is a type of malicious software -- or malware -- that is installed on a
computing device without the end user's knowledge. It invades the device, steals
sensitive information and internet usage data, and relays it to advertisers, data firms
or external users.
Spyware is one of the most common threats to internet users. Once installed, it
monitors internet activity, tracks login credentials and spies on sensitive
information. The primary goal of spyware is usually to obtain credit card numbers,
banking information and passwords.
Spyware spy on users’s behaviours , They can watch web pages you visit
& report that information to server or person
It shows unwanted advertising popup ads. As it spy pusesh ads that user
likes
Spyware can use unwanted memory & bring performance slow.
They can allow installation of backdoors, can change settings, hijack your
browse
Mobile Protection
Mobile security is the protection of smartphones, tablets, laptops and other portable
computing devices, and the networks they connect to, from threats and vulnerabilities
associated with wireless computing.
Mobile Device Security refers to the measures designed to protect sensitive information
stored on and transmitted by laptops, smartphones, tablets and other portable devices. At the
root of mobile device security is the goal of keeping unauthorized users from accessing the
enterprise network.
Password/Pin protection
One of the most basic ways to prevent unauthorized access to a mobile device is to create a
strong password, and yet weak passwords are still a persistent problem that contributes to the
majority of data hacks. Another common security problem is workers using the same
password for their mobile device, email, and every work-related account. It is critical that
employees create strong, unique passwords (of at least eight characters) and create different
passwords for different accounts.
Leverage biometrics
Instead of relying on traditional methods of mobile access security, such as passwords, some
companies are looking to biometrics as a safer alternative. Biometric authentication is when a
computer uses measurable biological characteristics, such as face, fingerprint, voice, or iris
recognition for identification and access. Multiple biometric authentication methods are now
available on smartphones and are easy for workers to set up and use.
A mobile device is only as secure as the network through which it transmits data. Companies
need to educate employees about the dangers of using public Wi-Fi networks, which are
vulnerable to attacks from hackers who can easily breach a device, access the network, and
steal data. The best defense is to encourage smart user behavior and prohibit the use of open
Wi-Fi networks, no matter the convenience.
Beware of apps
Malicious apps are some of the fastest growing threats to mobile devices. When an employee
unknowingly downloads one, either for work or personal reasons, it provides unauthorized
access to the company’s network and data. To combat this rising threat, companies have two
options: instruct employees about the dangers of downloading unapproved apps, or ban
employees from downloading certain apps on their phones altogether.
Que. Discuss Working of Firewall & Characteristics of Firewall & also writes its Goal.
Que. Explain Firewall Design Principles, What are the different Types of Firewall.
Firewall
A firewall is a network security device that monitors incoming and outgoing
network traffic and decides whether to allow or block specific traffic based on a
defined set of security rules.
All communication must pass through firewall
The firewall permits only traffic that is athorized
Why Firewall
Firewalls are primarily used to prevent malware and network-based attacks.
Additionally, they can help in blocking application-layer attacks. They monitor
every attempt between our computer and another network. They do not allow
data packets to be transferred through them unless the data is coming or going
from a user-specified trusted source.
Firewalls are designed in such a way that they can react quickly to detect and
counter-attacks throughout the network. They can work with rules configured to
protect the network and perform quick assessments to find any suspicious
activity. In short, we can point to the firewall as a traffic controller.
Functions of Firewall
o Network Threat Prevention
o Application and Identity-Based Control
o Hybrid Cloud Support
o Scalable Performance
o Network Traffic Management and Control
o Access Validation
o Record and Report on Events
Types of Firewall:
Firewalls are categorized into eight main types concerning their general structure and
operation behaviour. All the types are listed and briefly described below.
1. Packet Filtering
2. Circuit Level Gateways
3. Application Level Firewalls
1. Packet Filtering:
The type of filter is present between the clients’ network and the source where
incoming traffic will be filtered. The firewall operates at the application layer.
That is why the type of firewall is known as an application-level gateway. The
functionality of such kinds of firewalls can be achieved through clouds or
proxy devices. Proxies develop a connection with the traffic source and
evaluate the data packets, then dispatch each packet after verification to the
destination. Stateful inspection firewall evaluates the packets in the same
manner that monitors both the data packets along with TCP protocol.
Advantages:
Higher security that packet filtering,
Easy to log & audit all incoming traffics
3. Circuit Level Gateways:
Circuit-level gateways serve as a key gateway group by testing the consensus
of the transmission control protocol (TCP) that is designed to allow or deny
data easily and effectively without needing considerable computational power.
This quest for TCP contact is intended to guarantee that the packet is from a
valid link.
Though extremely resource-efficient, these gateways don’t test the data packet
itself. So if a packet is harmful, but had the correct TCP arrangement, it must
pass through it positively. Therefore, circuit-level firewalls are not adequate to
secure the entity alone.
Firewall Characteristics:
Major characteristics related to firewall protection are described below.
Goal of Firewall
Firewalls are commonly used to secure home networks from
threats coming external networks such as the Internet. They can prevent
outsiders from gaining access to private information and taking control of
devices on a network.
Data packets with threats and malicious elements will be blocked from
reaching you or your device. This includes malware like Trojans.
It will prevent hackers and automated bots from reaching your computer.
Hackers and bots can attempt to use your computer to mine
cryptocurrency, spread viruses, and perform other actions that range from
actively malicious to using up your processing power.
Firewalls protect your privacy so third-party agents and systems can’t
access your personal data, passwords, and even your IP address.
Types of VPN
There are many different types of VPNs, but you should definitely be familiar with the three
main types:
1. Remote Access VPN: A remote access VPN is designed to link remote users
securely to a corporate network. For instance when the COVID-19 pandemic
emerged in 2020, many organizations transitioned to a remote workforce, and set
up secure remote access VPNs from the remote clients to connect to critical
business operations at the corporate site.
2. Site-to-site VPN
A site-to-site VPN is essentially a private network designed to hide private intranets and
allow users of these secure networks to access each other's resources.
A site-to-site VPN is useful if you have multiple locations in your company, each with its
own local area network (LAN) connected to the WAN (Wide Area Network). Site-to-site
VPNs are also useful if you have two separate intranets between which you want to send files
without users from one intranet explicitly accessing the other.
Site-to-site VPNs are mainly used in large companies. They are complex to implement and
do not offer the same flexibility as SSL VPNs. However, they are the most effective way to
ensure communication within and between large departments.
3.Client-to-Server VPN
Connecting via a VPN client can be imagined as if you were connecting your home PC to the
company with an extension cable. Employees can dial into the company network from their
home office via the secure connection and act as if they were sitting in the office. However, a
VPN client must first be installed and configured on the computer.
This involves the user not being connected to the internet via his own ISP, but establishing a
direct connection through his/her VPN provider. This essentially shortens the tunnel phase of
the VPN journey. Instead of using the VPN to create an encryption tunnel to disguise the
existing internet connection, the VPN can automatically encrypt the data before it is made
available to the user.
4. VPN as a Service: