Unit 1
Unit 1
commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in
other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks
to gain unauthorized access, steal sensitive information, disrupt services, and cause financial
1. Cyber: Derived from the word "cybernetics," which comes from the Greek
word "kybernetes," meaning "steersman" or "governor." The term
"cybernetics" was popularized by mathematician Norbert Wiener in the
1940s to describe the control and communication in animals and machines.
Over time, "cyber" came to be associated with computers, networks, and
digital technologies, especially with the rise of the internet.
2. Crime: This part comes from the Latin word "crimen," meaning an accusation
or charge. In English, it evolved to mean an act punishable by law, especially
one that is considered harmful to society.
The term "information security" refers to the practice of protecting information from unauthorized access,
disclosure, alteration, destruction, or disruption. The origins of the words "information" and "security" are
rooted in Latin, but their combination into the specific concept of "information security" has evolved over time.
"Information"
Origin: The word "information" comes from the Latin word informare, meaning "to give form to" or "to
shape." In its modern sense, information refers to data, knowledge, or facts that are communicated or
shared.
Historical Usage: In the context of security, "information" initially referred to tangible data like written
records, which later expanded to include more abstract forms of data with the development of digital
technologies.
"Security"
Origin: The word "security" comes from the Latin securitas, which means "freedom from care" or
"safe." It combines se- (meaning "without") and cura (meaning "care" or "concern"). Over time, it came
to mean protection from danger or harm.
Historical Usage: Historically, security has been associated with physical protection (e.g., securing
property, fortifications, and persons). As society evolved, the concept extended to less tangible assets,
such as data and information.
The combination of the two words into "information security" is relatively modern. Its origins trace back to the
20th century, particularly with the rise of computers and the digitization of data. In the early days of computing,
security focused primarily on physical access to computers. However, as computers became interconnected,
protecting data in digital form became paramount. The first known use of "information security" dates to the
mid-1970s, when organizations began to focus on safeguarding data from unauthorized access or alteration in
computer systems.
Modern Usage
Cybersecurity: The term "information security" has evolved, especially in the digital age. Today, it
includes broader concepts like cybersecurity, data privacy, encryption, and risk management.
Standards: In modern contexts, frameworks and standards like ISO/IEC 27001 and NIST have
formalized the practice of information security, further shaping its meaning and scope.
Thus, "information security" grew from ancient roots to modern application as the protection of both tangible
and intangible data.
Characteristics of Information-
Timeliness: Information should be available to decision-makers before it loses its ability to influence
them.
Accuracy: Inaccurate information can cause serious problems.
Relevance: Relevant information can make a difference in decision making.
Completeness: Information should include all the facts, figures, and data required by the receiver.
Accessibility: Accessibility is an important characteristic of information architecture in interface
design.
Reliability: Reliable information is free from error and bias, and faithfully represents what it is meant to
represent.
Understandability: Understandability is the quality of information that lets reasonable informed users
to see its significance.
1. Confidentiality:
Information security ensures that sensitive data (such as personal, financial, or health information) is
only accessible to authorized individuals or systems. Without this protection, data breaches can occur,
leading to privacy violations or data theft.
2. Integrity:
It guarantees that data is accurate and unaltered. Information security measures protect data from being
tampered with, ensuring that it remains trustworthy and reliable. This is critical for preventing data
corruption or unauthorized modifications.
3. Availability:
Security mechanisms ensure that information and systems are accessible to authorized users when
needed. Denial-of-service attacks, hardware failures, or natural disasters can disrupt access to data, so
security ensures that systems remain functional and resilient.
Many industries are bound by laws and regulations (like GDPR, HIPAA, etc.) to protect sensitive data.
Non-compliance can result in heavy penalties, legal issues, and damage to reputation. Information
security helps organizations stay compliant with these regulations.
5. Prevent Financial Loss:
Cyberattacks, data breaches, and ransomware can lead to significant financial losses for organizations.
Information security measures protect against such incidents, saving costs associated with loss of
business, recovery, and legal fines.
Organizations that experience data breaches often lose customer trust. Ensuring robust information
security helps build and maintain a positive reputation with clients, partners, and the public.
With the rise of cybercrime, organizations face threats like hacking, phishing, malware, and
ransomware. Information security helps detect and prevent these threats, safeguarding sensitive
information and systems from being compromised.
Organizations and individuals must protect intellectual property such as patents, trade secrets, and
proprietary technology. Information security helps prevent theft or espionage of such valuable assets.
9. Business Continuity:
Security measures help ensure that an organization can continue to operate even during or after a
cyberattack or data loss. This is crucial for maintaining critical operations and minimizing downtime.
Not all security threats come from external attackers; sometimes, threats come from within the
organization (whether maliciously or accidentally). Information security helps in monitoring, controlling
access, and reducing risks from insider threats.
These involve offenses where the primary target is an individual or a group of individuals. Common examples
include:
These crimes target computers, networks, or data to cause damage, steal valuable information, or disrupt
services:
These offenses target institutions, public or private, often for political, financial, or ideological reasons:
Cyberterrorism: Using cyberattacks to cause fear, disrupt critical infrastructure, or achieve political
goals.
Espionage and Data Breaches: Stealing classified or sensitive government or corporate information.
Hacktivism: Political or ideological cyberattacks aimed at causing disruption or drawing attention to a
cause.
Website Defacement: Altering the appearance of a government or organizational website for
ideological purposes.
Online Scams and Fraud: Email scams, fake websites, and fraudulent online sales aimed at stealing
money.
Credit Card Fraud: Stealing credit card information to make unauthorized purchases.
Cryptocurrency Fraud: Manipulating or stealing cryptocurrency for financial gain.
Banking Trojans: Malware that specifically targets financial institutions or online banking platforms to
steal credentials or funds.
These offenses involve the use of cyber tools to cause widespread disruption or destruction:
Crimes in this category involve the exploitation or abuse of children through the internet:
More Details: 1.
No Borders: Cybercrimes don't follow country lines. They can happen anywhere, and bad
actors from different countries might even work together.
Digital Challenges Everywhere: It's not just a problem in one place. People worldwide face
similar digital troubles, and everyone needs to be careful online.
CyberCrime Era-
The Cybercrime Era is like living in a time where digital mischief is a common challenge. Survival Mantra for
the Netizens means having a set of rules or practices to stay safe in this digital age.
Survival Mantra for Netizens
2. Use Strong Passwords: Create and regularly update strong, unique passwords.
3. Keep Software Updated: Ensure your computer and apps have the latest security updates.
4 . Keep Software Updated: Ensure your computer and apps have the latest security updates.
5. Be Sceptical of Emails: Don't trust every email; be cautious, especially with links or attachments.
6 . Use Trusted Websites: Stick to reputable websites to minimise risks. Secure Personal Information: Be
cautious about sharing sensitive info online.
7. Install Antivirus Software: Have reliable antivirus software to protect against digital threats.
1) Reconnaissance
2) Scanning and Scrutinizing
3) Gaining Access
4) Maintaining Access and
5) Covering the tracks
1) Reconnaissance
2) Scanning and Scrutinizing and
3) Launching an Attack
Reconnaissance
Reconnaissance is an act of exploring to find someone or something. Reconnaissance phase begins
with Footprinting. Footprinting involves gathering information about the target’s environment to
penetrate it. It provides an overview of system vulnerabilities. The objective of this phase
(reconnaissance) is to understand the system, its networking ports and services, and any other
related data. An attacker attempts to gather information in two phases:
Passive Attacks
This attack is used to gather information about a target without their knowledge. These attacks
include:
Port scanning
Network scanning
Vulnerability scanning
Scrutinizing is also called enumeration. 90% of the time in hacking is spent in reconnaissance,
scanning and scrutinizing information. The objectives are:
Launch an Attack
An attack follows the below steps:
Social Engineering-
Social engineering is a type of cyber attack that involves manipulating people to gain
access to sensitive information or devices. Social engineering attacks exploit human error,
such as trust, respect for authority, or sympathy, rather than vulnerabilities in software or
operating systems
Social engineering is the term used for a broad range of malicious activities
accomplished through human interactions. It uses psychological manipulation
to trick users into making security mistakes or giving away sensitive
information.
Social engineering attacks come in many different forms and can be performed
anywhere where human interaction is involved. The following are the five most
common forms of digital social engineering assaults.
Baiting
As its name implies, baiting attacks use a false promise to pique a victim’s
greed or curiosity. They lure users into a trap that steals their personal
information or inflicts their systems with malware.
The most reviled form of baiting uses physical media to disperse malware. For
example, attackers leave the bait—typically malware-infected flash drives—in
conspicuous areas where potential victims are certain to see them (e.g.,
bathrooms, elevators, the parking lot of a targeted company). The bait has an
authentic look to it, such as a label presenting it as the company’s payroll list.
Victims pick up the bait out of curiosity and insert it into a work or home
computer, resulting in automatic malware installation on the system.
Baiting scams don’t necessarily have to be carried out in the physical world.
Online forms of baiting consist of enticing ads that lead to malicious sites or
that encourage users to download a malware-infected application.
Scareware
Scareware involves victims being bombarded with false alarms and fictitious
threats. Users are deceived to think their system is infected with malware,
prompting them to install software that has no real benefit (other than for the
perpetrator) or is malware itself. Scareware is also referred to as deception
software, rogue scanner software and fraudware.
Scareware is also distributed via spam email that doles out bogus warnings, or
makes offers for users to buy worthless/harmful services.
Pretexting
All sorts of pertinent information and records is gathered using this scam, such
as social security numbers, personal addresses and phone numbers, phone
records, staff vacation dates, bank records and even security information
related to a physical plant.
Phishing
As one of the most popular social engineering attack types, phishing scams are
email and text message campaigns aimed at creating a sense of urgency,
curiosity or fear in victims. It then prods them into revealing sensitive
information, clicking on links to malicious websites, or opening attachments
that contain malware.
Spear phishing
Moreover, the following tips can help improve your vigilance in relation to
social engineering hacks.
Cybercriminals prefer cybercafes to carry out their activities. The criminals tend to identify one
particular personal computer PC to prepare it for their use. Cybercriminals will visit these cafes at a
particular time and on the prescribed frequency, maybe alternate day or twice a week.
A recent survey conducted in one of the metropolitan cities in India reveals the following facts,
Pirated software(s) such as OS, browser, office automation software(s) (e.g., Microsoft Office)
are installed in all the computers.
Antivirus software is found to be not updated to the latest patch and/or antivirus signature.
Several cybercafes had installed the software called "Deep Freeze" for protecting the
computers from prospective malware attacks.
Annual maintenance contract (AMC) found to be not in a place for servicing the computers;
hence, hard disks for all the computers are not formatted unless the computer is down. Not
having the AMC is a risk from cybercrime perspective because a cybercriminal can install a
Malicious Code on a computer and conduct criminal activities without any interruption.
Pornographic websites and other similar websites with indecent contents are not blocked.
Cybercafe owners have very less awareness about IT Security and IT Governance.
Government/ISPs/State Police (cyber cell wing) do not seem to provide IT Governance
guidelines to cybercafe owners.
Cybercafe association or State Police (cyber cell wing) do not seem to conduct periodic visits
to cybercafes - one of the cybercafe owners whom we interviewed expressed a view that the
police will not visit a cybercafe unless criminal activity is registered by fling an First Information
Report (FIR). Cybercafe owners feel that police either have a very little knowledge about the
technical aspects. involved in cybercrimes and/or about conceptual understanding of IT
security.
There are thousands of cybercafes across India. In the event that a central agency takes up the
responsibility for monitoring cybercafes, an individual should take care while visiting and/or operating
from cybercafe.
Here are a few tips for safety and security while using the computer in a cybercafe:
1. Always logout: While checking E-Mails or logging into chatting services such as instant
messaging or using any other service that requires a username and a password, always click "logout"
or sign out" before leaving the system. Simply closing the browser window is not enough, because if
somebody uses the same service after you then one can get an easy access to your account.
However, do not save your login information through options that allow automatic login. Disable such
options before logon.
body uses the same service after you then one can get an easy access to your account. However, do
not save your login information through options that allow automatic login. Disable such options
before logon.
2. Stay with the computer: While surfing/browsing, one should not leave the system unattended for
any period of time. If one has to go out, logout and close all browser windows.
3. Clear history and temporary files: Internet Explorer saves pages that you have visited in the
history folder and in temporary Internet files.Your passwords may also be stored in the browser if that
option has been enabled on the computer that you have used.Therefore, before you begin browsing,
do the following in case of the browser Internet Explorer:
Go to Tools →→ Internet options →→ click the Content tab →→ click Auto Complete. If the
checkboxes for passwords are selected, deselect them. Click OK twice.
After you have finished browsing, you should clear the history and temporary Internet files
folders. For this, go to Tools →→ Internet options again →→ click the General tab →→ go to
Temporary Internet Files →→ click Delete Files and then click Delete Cookies.
Then, under history, click clear history. Wait for the process to finish before leaving the
computer.
4. Be alert: One should have to stay alert and aware of the surroundings while using a public
computer. Snooping over the shoulder is an easy way of getting your username and password.
5. Avoid online financial transactions: Ideally one should avoid online banking, shopping or other
transactions that require one to provide personal, confidential and sensitive information such as credit
card or bank account details. In case of urgency one has to do it; however, one should take the
precaution of changing all the passwords as soon as possible. One should change the passwords
using a more trusted computer, such as at home and/or in office.
6. Change password
7. Virtual keyboard: Nowadays almost every bank has provided the virtual keyboard on their
website.
8. Security warnings: One should take utmost care while accessing the websites of any
banks/financial institution.
Individual should take care while accessing computers in public places, that is, accessing the Internet
in public places such as hotels, libraries and holiday resorts. Moreover, one should not forget that
whatever is applicable for cybercafes (i.e., from information security perspective) is also true in the
case of all other all public places where the Internet is made available. Hence, one should follow all
tips about safety and security while operating the systems from these facilities.
Suppose a security firm is tasked with guarding a rare painting that hangs in a museum. There are a
number of ways that a thief could enter and exit the museum — front doors, back doors, elevators,
and windows. A thief could enter the museum in some other way too, perhaps by posing as a
member of the museum's staff. All of these methods represent attack vectors, and the security firm
may try to eliminate them by placing security guards at all doors, putting locks on windows, and
regularly screening museum staff to confirm their identity.
Similarly, digital systems all have areas attackers can use as entry points. Because modern computing
systems and application environments are so complex, closing off all attack vectors is typically not
possible. But strong security practices and safeguards can eliminate most attack vectors, making it far
more difficult for attackers to find and use them.
Email attachments: One of the most common attack vectors, email attachments can contain
malicious code that executes after a user opens the file. In recent years, multiple major ransomware
attacks have used this threat vector, including Ryuk attacks.
Account takeover: Attackers can use a number of different methods to take over a legitimate user's
account. They can steal a user's credentials (username and password) via phishing attack, brute force
attack, or purchasing them on the underground market. Attackers can also try to intercept and use a
session cookie to impersonate the user to a web application.
Lack of encryption: Unencrypted data can be viewed by anyone who has access to it. It can be
intercepted in transit between networks, as in an on-path attack, or simply viewed inadvertently by an
intermediary along the network path.
Insider threats: An insider threat is when a known and trusted user accesses and distributes
confidential data, or enables an attacker to do the same. Such occurrences can be either intentional or
accidental on the part of the user. External attackers can try to create insider threats by contacting
insiders directly and asking, bribing, tricking, or threatening them into providing access. Sometimes
malicious insiders act of their own accord, out of dissatisfaction with their organization or for some
other reason.
Browser-based attacks: To display webpages, Internet browsers load and execute code they receive
from remote servers. Attackers can inject malicious code into a website or direct users to a fake
website, tricking the browser into executing code that downloads malware or otherwise compromises
user devices. With cloud computing, employees often access data and applications solely through
their Internet browser, making this threat vector of particular concern.
Application compromise: Instead of going after user accounts directly, an attacker may aim to infect
a trusted third-party application with malware. Or they could create a fake, malicious application that
users unknowingly download and install (a common attack vector for mobile devices).
Open ports: A port is a virtual entryway into a device. Ports help computers and servers associate
network traffic with a given application or process. Ports that are not in use should be closed.
Attackers can send specially crafted messages to open ports to try to compromise the system, just as
a car thief might try opening doors to see if any are unlocked.