Cybersecurity23 24
Cybersecurity23 24
Definition:
The cybercrimes may be broadly classified into four groups. They are:
1. Crime against the Individuals: Crimes that are committed by the cyber
criminals against an individual or a person. A few cybercrimes against
individuals are:
⮚ E-mail Spoofing -: A spoofed email is one that appears originate from
one source but actually sent from another source.
⮚ Phishing -: Phishing is a special type of intended to trick you into entering
your personal /A/C information to the purpose of breaching your account
and committing theft or fraud.
⮚ Cyber-stalking -: Cyber stalking is a crime in which the attacker harasses
a victim using electronic communication, such as e-mail.
⮚ Defamation -: Cyber defamation occurs when a computer connected to the
internet is used as a tool, or a medium to defame a person or an entity.
⮚ Password Sniffing -:Password sniffer is a software application that scans
and records passwords that are used or broadcasted on a computer or
network interface. It listens to all incoming and outgoing network traffic
and records any instance of a data packet that contains a password.
Unauthorized access:
It is an act of gaining access to a network, system, application or
other resource without permission. Unauthorized access could occur if a user
attempts to access an area of a system they should not be accessing.
Unauthorized access could be result of unmodified default access policies or
lack of clearly defined access policy documentation.
Hacking:
Hacking refers to an array of activities which are done to intrude
someone else’s personal information space so as to use it for malicious
unwanted purposes.
Hacking is a term used to refer to activities aimed at exploiting
security flaws to obtain critical information for gaining access to secured
networks.
Who Is Hacker?
Hacker is a term that first started being used in the 1960s and
described a programmer or someone who hacked computer code. Later the term
evolved into an individual who had an advanced understanding of computers,
networking, programming, or hardware, but did not have any malicious intent .
Today, a malicious hacker is usually referred to as a black hat or criminal
hacker, which describes any individual who illegally breaks into computer
systems to damage or steal information .
Hacking Methods
Types Of Hacking
1.Website Hacking :
Hacking a website means taking control from the Website owner to a
person who hacks the website.
2.Network hacking:
It is generally means gathering information about domain by using tools
like telnet, Ns look UP, Ping, Tracert , Netstat, etc. Over the network.
3. password hacking:
We have passwords for emails, databases, computer systems, servers,
bank accounts, and virtually everything that we want to protect. Passwords are
in general the keys to get access into a system or an account. Password
Hacking. is the process of recovering secret passwords from data that has been
stored in or transmitted by a computer system.
Types of hackers
1. Black Hat Hacker
4· Hacktivist
These hackers are those who are focussed on hacking websites and
leaving contentious information on such websites. This is to spread political,
social, religious messages. This can also take the form of targeting other
nations.
Can be used to recover lost information where the computer password has
been lost
The most common blunder people make when the topic of a computer
virus arises is to refer to a worm or Trojan horse as a virus. While the words
Trojan, worm and virus are often used interchangeably, they are not the same.
Viruses, worms and Trojan Horses are all malicious programs that can cause
damage to your computer, but there are differences among the three, and
knowing those differences can help you to better protect your computer from
their often damaging effects.
Virus
“A Computer Virus is a malicious software program “Malware” that
can infect a computer by modifying or deleting data files, boot sector of a hard
disk drive or causes a software program to work in an unexpected manner”.
A computer virus resides on a host computer and can replicate itself
when executed. Virus can steal user data, delete or modify files & documents,
records keystrokes & web sessions of a user. It can also steal or damage hard
disk space, it can slowdown CPU processing.
Activation Of Virus
When the computer virus starts working, it is called the activation of
virus. A virus normally runs all the time in the computer. Different viruses are
activated in different ways. Many viruses are activated on a certain data. For
example, a popular virus “Friday, the 13th” is activated only if the date is 13 and
the day is Friday.
Damages Caused By Virus
Computer virus cannot damage computer hardware. It may cause many
damages to a computer system. A virus can:
1. A computer virus can damage data or software on the computer.
2. It can delete some or all files on the computer system.
3. It can destroy all the data by formatting hard drive.
4. It may display a false message very few times.
A Boot Sector Virus infects the first sector of the hard drive, where
the Master Boot Record (MBR) is stored. The Master Boot Record (MBR) stores
the disk's primary partition table and to store bootstrapping instructions which
are executed after the computer's BIOS passes execution to machine code. If a
computer is infected with Boot Sector Virus, when the computer is turned on,
the virus launches immediately and is loaded into memory, enabling it to control
the computer.
A File Deleting Virus is designed to delete critical files which are the
part of Operating System or data files.
• Macro viruses:
• Polymorphic Viruses:
• Stealth viruses:
Stealth viruses have the capability to hide from operating system or anti-
virus software by making changes to file sizes or directory structure. Stealth
viruses are anti-heuristic nature which helps them to hide from heuristic
detection.
• Retro virus:
Retrovirus is another type virus which tries to attack and disable the
anti-virus application running on the computer. A retrovirus can be considered
anti-antivirus. Some Retroviruses attack the anti-virus application and stop it
from running or some other destroys the virus definition database.
Worms
A computer worm is a type of malicious program whose primary
function is to infect other computers while remaining active on infected systems.
the network.
● Also rather than spreading and destroying the network, codes are written
inside the worm so that the systems are destroyed with these codes.
These codes steal data or create backdoors so that other systems can
● The codes also called payloads to destroy the system in a way that the
infected systems are used to spread spams and destroy the entire
network.
themselves.
● Worms either modify or delete the files of the system thereby overloading
● The worm creates space for a hacker to enter the system and destroy the
entire network.
● Computer worms destroy the data worth years and are very malicious.
● Morris developed a few lines of code to know how vast the internet is but
the codes had bugs that destroyed the host systems and caused damage
worth millions.
● Storm worm, as the name suggests sends mails of a news report regarding
the storm. Once opened the system is affected and other contacts are also
sent emails. This worm was created in 2007. Many believe that the
systems are still affected by this worm which the user does not know.
nuclear plans.
● IRC Worms: IRC Worms spread through Internet Relay Chat (IRC) chat
● File sharing Worms: File sharing Worms place a copy of them in a shared
One of the most damaging computer worms ever was the ILOVEYOU virus.
ILOVEYOU primarily spread when targeted victims opened an email attachment,
and the malware resent itself to all of the victim's contacts in Microsoft Outlook.
Trojan
A Trojan horse, or Trojan, is a type of malicious code or software
that looks legitimate or harmless but can take control of your computer. A
Trojan is designed to damage, disrupt, steal, or in general inflict some other
harmful action on your data or network.
Viruses can execute and replicate themselves. A Trojan cannot. A user has
to execute Trojans. Even so, Trojan malware and Trojan virus are often used
interchangeably.
Trojans working :
When you execute the program, the malware can spread to other files and
damage your computer.
Types of Trojan
⮚ Backdoor Trojan
⮚ Downloader Trojan
⮚ Fake AV Trojan
⮚ Game-thief Trojan
The losers here may be online gamers. This Trojan seeks to steal their
account information.
This Trojan can give an attacker full control over your computer via a
remote network connection. Its uses include stealing your information or spying
on you.
2. ZeuS/Zbot - This banking Trojan source code was first released in 2011.
It uses keystroke logging — recording your keystrokes as you log into
your bank account, for instance — to steal your credentials and perhaps
your account balance as well.
● Don’t visit unsafe websites. Some internet security software will alert you
that you’re about to visit an unsafe site, such as Norton Safe Web.
● Don’t open a link in an email unless you’re confident it comes from a
legitimate source. In general, avoid opening unsolicited emails from
senders you don’t know.
● Don’t download or install programs if you don’t have complete trust in the
publisher.
● Don’t click on pop-up windows that promise free programs that perform
useful tasks.
● Don’t ever open a link in an email unless you know exactly what it is.
Signs Of Trojan
● Desktop changes
● Increase of spam or pop-ups
● Poor device performance
● Unfamiliar downloads, add-ons, or applications
● Changes to display color, clarity, or orientation
● Strange device behavior
Email fraud
Email fraud is the intentional deception made for personal gain or to damage
another individual through email. Almost as soon as email became widely used, it
began to be used as a means to defraud people.
Types of Email fraud
Spoofing
Email sent from someone pretending to be someone else is known as
spoofing. Spoofing may take place in a number of ways. Common to all of them is
that the actual sender's name and the origin of the message are concealed or
masked from the recipient. Many, if not most, instances of email fraud use at
least minimal spoofing, as most frauds are clearly criminal acts. Criminals
typically try to avoid easy traceability.
Some spoof messages purport to be from an existing company, perhaps one with
which the intended victim already has a business relationship. The 'bait' in this
instance may appear to be a message from 'the fraud department' of, for
example, the victim's bank, which asks the customer to: "confirm their
information"; "log in to their account"; "create a new password", or similar
requests. If the 'fish' takes the 'bait', they are 'hooked' -- their account
information is now in the hands of the con man, to do with as they wish.
See Phishing.
Bogus offers
Email solicitations to purchase goods or services may be instances of attempted
fraud. The fraudulent offer typically features a popular item or service, at a
drastically reduced price.
Items may be offered in advance of their actual availability, for instance, the
latest video game may be offered prior to its release, but at a similar price to a
normal sale. In this case, the "greed factor" is the desire to get something that
nobody else has, and before everyone else can get it, rather than a reduction in
price. Of course, the item is never delivered, as it was not a legitimate offer in
the first place.
Such an offer may even be no more than a phishing attempt to obtain the victim's
credit card information, with the intent of using the information to fraudulently
obtain goods or services, paid for by the hapless victim, who may not know they
were scammed until their credit card has been "used up".
Requests for help
The "request for help" type of email fraud takes this form. An email is sent
requesting help in some way, but including a reward for this help as a "hook,"
such as a large amount of money, a treasure, or some artifact of supposedly
great value.
Other form of fraudulent help requests is represented by romance scam. Under
this, fraudsters (pretended males or females) build online relationships, and after
some time, they ask for money from the victims, claiming the money is needed
due to the fact they have lost their money (or their luggage was stolen), they
have been beaten or otherwise harmed and they need to get out of the country
to fly to the victim's country.
This confidence trick is similar to the face-to-face con, known as the "Stranger
With a Kind Face," which is the likely origin of at least the title of
the vaudevillian routine known by the same name, as "Niagara Falls," or as
"Slowly I turned..."
Email spoofing
Email spoofing is email activity in which the sender address and other parts of
the email header are altered to appear as though the email originated from a
different source. Because core SMTP doesn't provide any authentication, it is easy
to impersonate and forge emails.
Although there are legitimate uses, these techniques are also commonly used in
spam and phishing emails to hide the origin of the email message.[2]
By changing[clarification needed] certain properties of the email, such as the From,
Return-Path and Reply-To fields (which can be found in the message header), ill-
intentioned users can make the email appear to be from someone other than the
actual sender. The result is that, although the email appears to come from the
address indicated in the From field (found in the email headers), it actually
comes from another source.[3
Because many spammers now use special software to create random sender
addresses, even if the user finds the origin of the email it is unlikely that the
email address will be active.
The technique is now used ubiquitously by bulk email software as a means of
concealing the origin of the propagation. On infection, worms such as
ILOVEYOU, Klez and Sober will often try to perform searches for email addresses
within the address book of a mail client, and use those addresses in the From
field of emails that they send, so that these emails appear to have been sent by
the third party. For example:
Email Bombing
There are two methods of perpetrating an email bomb: mass mailing and list
linking.
Mass mailing
Mass mailing consists of sending numerous duplicate mails to the same email
address. These types of mail bombs are simple to design but their extreme
simplicity means they can be easily detected by spam filters. Email-bombing
using mass mailing is also commonly performed as a DDoS attack by employing
the use of "zombie" botnets; hierarchical networks of computers compromised
by malware and under the attacker's control. Similar to their use in spamming,
the attacker instructs the botnet to send out millions or even billions of emails,
but unlike normal botnet spamming, the emails are all addressed to only one or a
few addresses the attacker wishes to flood. This form of email bombing is
similar in purpose to other DDoS flooding attacks. As the targets are frequently
the dedicated hosts handling website and email accounts of a business, this type
of attack can be just as devastating to both services of the host.
This type of attack is more difficult to defend against than a simple mass-
mailing bomb because of the multiple source addresses and the possibility of
each zombie computer sending a different message or employing stealth
techniques to defeat spam filters.
List linking
List linking means signing a particular email address up to several email list
subscriptions. The victim then has to unsubscribe from these unwanted services
manually. In order to prevent this type of bombing, most email subscription
services send a confirmation email to a person's inbox when that email is used
to register for a subscription. This method of prevention is easily circumvented:
if the perpetrator registers a new email account and sets it to automatically
forward all mail to the victim, he or she can reply to the confirmation emails, and
the list linking can proceed.
Zip bombing
Email Spamming
definition
Email spam includes unwanted or unsolicited emails that arrive in a user’s email
inbox. Usually, email spam is sent to a large number of recipients. Spam can be
sent automatically by a botnet or by human senders.
If spam is not appropriately dealt with it can become troublesome for users to
conduct work activity without disruption from unwanted emails. Email spam also
poses a security threat because messages can contain malicious links or
malware that can allow a cyber-criminal access to a user’s device or ability to
find sensitive data/account information.
What is a spammer?
The method of spamming has been around for quite some time and since then
has become a common method of cyber disruption. To launch an email spam
attack, a cyber-criminal will use spambots, computer systems that conduct
repetitive tasks designed to assist in spamming activities, to gather emails
available on the internet and send out a large amount malicious emails. Spam
emails use a “spray and pray” tactic which involves sending spam emails in
masses with hopes that a few individuals will mistakenly interact with the spam
content.
check the sender of any unsolicited email to make sure that it is coming from a
legitimate source.
Subject line
Spam emails will have vague subject lines or ones that attempt to alarm or call
for urgent action. This might come in the form of an alert or a fraudulent
notification that your “account” is closing.
Requesting information
Spam emails are always trying to divulge sensitive information from their
victims. Never share your personal account information unless you are 100%
certain of the senders identity.
For organizations
Identifying spam emails can be a time consuming task given that they come in
large quantities and from a variety of senders. Automated filtering can maximize
productivity of employees and declutter their inboxes while reducing the the
workload of the security team. Below is an example of a non-productive email
identified in Darktrace/Email's UI. Darktrace/Email can identify and tag emails
that are suspicious of spam and other security risks like phishing scams, giving
detailed explanation of the potential threat.
Most popular email services have automatic spam identification that will use an
algorithm to identify spam content and send it to your spam folder. However, if
you find that you are still receiving a high degree of spam emails you can mark
these emails as spam instead of deleting them right away. This will identify that
particularly sender as spam email, and it will not appear in your inbox.
Organizations want to ensure that their employees are able to communicate and
conduct business activity without disruption. However, email spam can stand in
the way of employees who want to quickly communicate via email. Having an
inbox that is cluttered with emails will cause employees to get distracted and
have to parse through hundreds of emails just to identity which are legitimate,
and which are malicious.
There are several systems in place that protect email inboxes from spam mail.
However, some organizations might want to take extensive action in order to
protect their employees’ inboxes to ensure business continuity and productivity
remain optimal. Email security options include:
Secure email gateways
A secure email gateway (SEG) or a secure email server (SEC) is a type of email
security software that sits between inbound and outbound email communication.
Every email that is sent to and from an organization passes through this gateway
to ensure that its contents are not malicious or a sign of a data leak. It prevents
unwanted emails in user inboxes like spam, phishing emails, emails containing
malware, etc… In many ways email gateways are the first line of defense for
email security.
AI Email solutions
DOS Attack
The subject came to public awareness only after a massive attack on public
sites on February 2000. During a period of three days the sites of Yahoo.com,
amazon.com, buy.com, cnn.com & eBay.com were under attack. Analysts
estimated that Yahoo! Lost $500,000 in e-commerce and advertising revenue
when it was knocked offline for three hours
Third parties
1. Bandwidth attacks:
Loading any website takes certain time. Loading means complete
webpage ( i.e., With entire content of the webpage – text along
with images) appearing on the screen and system is awaiting user’s input.
This loading consumes some amount of memory. Every site is given with a
particular amount of bandwidth for its hosting. Say for example, 50 GB. Now
if more visitor consume all 50 GB bandwidth then the hosting of the site can
ban this site.
2. Logic attacks :
This kind of attack can exploit vulnerabilities in network software
such as web server or TCP/IP attack
3. Protocol attack:
• Protocol here are rules that are to be followed to send data over
network. These kind of attacks exploit a specific feature of
implementations bug .of some protocol installed at the victim’s system to
consume excess amounts of its resources.
• Implements router filter. This will lessen your exposure to certain dos
attacks.
• If such filters are available for your system, installed patches to guard
against TCP SYN flooding.
• Routinely examine your physical security with regard to your currents
needs
• Establish and maintain regular backup schedule and policies ,particularly
for important configuration information.
• Disable any unused network service. This can limit the ability of an
attacker to take advantage of these service to execute a Dos attack
Types of dos attacks
1.flood attack:-
This is the earliest from of DOS attacks and is also known as ping
flood. It is based on attacker simply sending the victim overwhelming number
of ping packets, usually by using the “ping” command, which result into more
traffic than the victim can handle.
3. SYN Attack:-
It is also termed as TCP SYN flooding. In the transmission control
protocol handshaking of network connection is done by with SYN and ACK
messages.
An attacker initiates a TCP connection to the server with an SYN. The server
replies with an SYN ACK.The client does not send back an ACK ,causing the
server allocate memory for the pending connection and wait.
4.Smurf attack:-
DDOS Attack
This is the complicated but powerful version of DOS attack in which
many attacking systems are involved.
In DDOS attacks, many computers start performing DOS attacks on the same
target server. As the DOS attack is distributed over large group of
computers, it is known as a distributed denial of service attack.
For creating the zombie network, hackers generally use a Trojan. The
more members in the zombie network, more powerful the attack it .The wave
of DDoS attacks that targeted major Websites such as Yahoo and Amazon in
2000 was estimated cumulatively to have cost over $1.2 billion in damages.
1. Implements router filters. This will lesson your exposure to certain DoS
attacks.
2. Disable any unused or inessential network service. This can limit the
ability of an attacker to take advantage of these service to execute a dos
attack.
3. Enable quota system on your OS if they are available.
4. Routinely examine your physical security with regard to your current
needs.
5. Establish and maintain regular backup schedules and policies, particularly
for important configuration information.
6. Establish and maintain appropriate password policies, especially access to
highly privileged accounts such as Unix root or Microsoft windows NT
administrator.
1.Zombie Zapper:
It is a free, open source tool that can tell a zombie system flooding packets
to stop flooding. It works against Trinoo, TFN and Stacheldraht.
2.Remote Intrusion Detector (RID):
The creator/inventor gets exclusive rights against any misuse or use of work
without his/her prior information. However, the rights are granted for a limited
period of time to maintain equilibrium.
The following list of activities which are covered by the intellectual property
rights are laid down by the World Intellectual Property Organization (WIPO) −
Industrial designs
Scientific discoveries
1.Copyright
2.Patent
3.Trade Marks
4.Source code
5.Software Piercy
6.Plagiarism
Copyright
Patents
Trade marks
A registered trade mark is a property right whereby the owner is granted
exclusive rights in relation the use of the trade mark. If someone uses an
identical or similar trade mark for identical or similar goods or services to a
trade mark already in use without the owner's consent, that person infringes the
trade mark. Remedies are available to the owner to prevent an ongoing
infringement, including damages for past infringements.
Software piracy
Software piracy is a term used to describe the act of illegally using, copying or
distributing software without ownership or legal rights. The majority of software
today is purchased as a single-user license, meaning that only one computer
may have that software installed on it at one time. Copying that software to
multiple computers or sharing it with your friend without multiple licenses is
considered software piracy, which is illegal. Additionally, downloading pirated
software from the Internet could be a security risk to your computer; it can be
difficult to know what else may be getting installed.
Typo-squatting
Typosquatting is often referred to as ‘URL hijacking,’ ‘a sting site,’ and a
‘fake URL.’ Typosquatters rely on common mistakes made by Internet users
when typing a web address into a web browser. Such mistakes include
misspelling (e.g., www.intrenet.com), different phrasing of a domain name (e.g.,
www.internets.com),
To trick Internet users, typosquatters may also create a fake website that
resembles the source by using a similar layout, color schemes, logos, and
content. Typosquatters use such fake websites to (1) compel legitimate website
owners to buy the cybersquatted domain names, (2) generate more web traffic,
and (3) spread malware.
Identity theft
Name jacking
Name jacking refers to the registration of a domain name associated with the
name of an individual, usually celebrities and well-known public figures. Name
jackers benefit from web traffic related to the targeted individuals.
Reverse-cybersquatting
• gather more information about the victim to steal their identity or perpetrate
other real-world crimes, like theft or harassment.
Cyberstalkers often start small. In the beginning, they may send a few strange
or somewhat unpleasant messages to their intended victim. Then, later, they
may brush off these messages as funny, annoying or mildly weird and ignore
them without taking any action.
Over time, the messages may become systematic, sustained and repetitive
and take on an increasingly intimidating or frightening tone.
• strengthen all devices with strong passwords or, better, use multifactor
authentication;
. These include:
Credit Card Theft: the taking of a credit card, or credit card number, from
another person, without the cardholder’s consent, with the intent of using or
selling it.
Credit Card Forgery: the purchasing of something of value using a credit card,
by someone other than the cardholder, or an authorized user, with the intent of
defrauding the card’s issuer.
Credit Card Fraud: the taking of a credit card, or credit card number, from
another person, with the intent to use, sell, or transfer it to another person, or
using the credit card or card number to purchase something of value, with the
intent to defraud.
There are two kinds of card fraud: card-present fraud (not so common
nowadays) and card-not-present fraud (more common). The compromise can
occur in a number of ways and can usually occur without the knowledge of the
cardholder. The internet has made database security lapses particularly costly,
in some cases, millions of accounts have been compromised.[5]
some countries are equipped with an EMV chip which requires a 4 to 6 digit PIN
to be entered into the merchant's terminal before payment will be authorized.
However, a PIN is not required for online transactions. In some European
countries, buyers using a card without a chip may be asked for photo ID at
the point of sale.
In some countries, a credit card holder can make a contactless payment for
goods or services by tapping their card against a RFID or NFC reader without
the need for a PIN or signature if the cost falls under a pre-determined limit.
Application fraud[
Application fraud takes place when a person uses stolen or fake documents to
open an account in another person's name. Criminals may steal or fake
documents such as utility bills and bank statements to build up a personal
profile. When an account is opened using fake or stolen documents, the fraudster
could then withdraw cash or obtain credit in the victim's name.[10]
Application fraud can also occur using a synthetic identity which is similar to the
fake documents mentioned above. A synthetic identity is personal information
gathered from many different identities to create one fake identity.[11] Once the
identity and the account is established, the fraudster has a few different options
to take advantage of the bank. They can maximize their credit card spending by
spending as much money as possible on their new credit card. Many fraudsters
will use the new credit card to purchase items that have a high resale value so
they can turn it into cash.
Account takeover
A fraudster uses parts of the victim's identity such as an email address to gain
access to financial accounts. This individual then intercepts communication
about the account to keep the victim blind to any threats. Victims are often the
first to detect account takeover when they discover charges on monthly
statements they did not authorize or multiple questionable
withdrawals.[13] There has been an increase in the number of account
takeovers since the adoption of EMV technology, which makes it more difficult
for fraudsters to clone physical credit cards.[14]
Among some of the most common methods by which a fraudster will commit an
account, takeover includes proxy-based "checker" one-click apps, brute-force
botnet attacks, phishing,[15] and malware. Other methods include dumpster
diving to find personal information in discarded mail, and outright buying lists of
'Fullz', a slang term for full packages of identifying information sold on the black
market.[16]
Once logged in, fraudsters have access to the account and can make purchases
and withdraw money from bank accounts.[17] They have access to any
information that is tied to the account, they can steal credit card numbers along
with social security numbers. They can change the passwords to prevent the
victim from accessing their account. Cybercriminals have the opportunity to
open other accounts, utilize rewards and benefits from the account, and sell this
information to other hackers.
Social engineering fraud can occur when a criminal poses as someone else
which results in a voluntary transfer of money or information to the fraudster.
Fraudsters are turning to more sophisticated methods of scamming people and
businesses out of money. A common tactic is sending spoof emails
impersonating a senior member of staff and trying to deceive employees into
transferring money to a fraudulent bank account.[18]
Businesses can protect themselves with a dual authorization process for the
transfer of funds that requires authorization from at least two persons, and a
call-back procedure to a previously established contact number, rather than any
contact information included with the payment request. The bank must refund
any unauthorized payment; however, they can refuse a refund if they can prove
the customer authorized the transaction, or it can prove the customer is at fault
because they acted deliberately, or failed to protect details that allowed the
transaction.[19]
Skimming
"Skimmer (device)" redirects here. For other uses, see Skimmer
(disambiguation).
Green plastic unit on an ATM slot, intended to stop thieves from installing a
skimmer device on the machine
Chapter 4
4.1.1 Types of Threats
Cyber Security Threats
Most Common Cyber attacks
In recent years, there have been several high-profile cyberattacks that have had a devastating
impact on businesses and individuals. These are theft of social security numbers, bank account
details, credit card information, and sensitive data leaks. The main reason is that most
individuals store their data on cloud storage services such as Dropbox or Google Drive. These
attacks have highlighted the importance of having strong cybersecurity measures in
place. Some of the most common cyberattacks include:
1. Phishing Attacks
Phishing is a type of cyberattack that involves tricking users into clicking on malicious links or
attachments. It can lead to the theft of sensitive information, such as login credentials or
financial data.
2. Malware Attacks
Malware is a type of malicious software that can infect computers and devices. It can steal
information, hijack devices, or launch attacks on other systems.
3. Denial-of-service Attacks
A denial-of-service attack is a type of attack that prevents users from accessing a system or
service. This can be done by flooding the system with traffic or requests or damaging it so it
can no longer function properly.
4. Ransomware Attacks
Ransomware is malware that encrypts files or systems and demands a ransom to decrypt them.
It can lead to the loss of essential data or the complete shutdown of a system.
6. SQL Injection
A SQL injection attack is a type of cyber-attack that exploit vulnerabilities in web applications
to inject malicious SQL code into the database. This code can view, delete, or modify data in
the database. SQL injection attacks can also take control of the server or carry out other
malicious activities.
1.Protects Personal Information: In this age of a digitally-driven world, one of the most valuable
commodities is personal information. If a virus is able to collect personal information about your
employees or customers, it is quite likely that it will be sold or used to steal their money.
2.Protects and Enhances Productivity: Viruses infecting your systems and network will result in
functioning resulting in the almost impossibility of further working. In effect, this will cause
downtime in work for your staff and wastage additionally bringing the entire company to a halt.
3. Prevents crashing of websites: If you're a small business, you're probably hosting your own
website. If your system is infected, there's a good risk your website will be forced to go down.
This means that not only will you incur losses due to missed transactions, but you will also run
the risk of losing trust from your clients, and some viruses may cause long-term damages to your
systems.
Support Your IT Professional: Typically, a good security system equips your organization and
employees with the best tools, techniques, and assistance in combating cyber attacks and
criminals.
• The information and files as recommendations and suggestions are essential for the
productivity of the business
• Internet security processes all the incoming & outgoing data on our computer.
- It helps to reduce computer chilling & crashes.
- Gives us privacy.
An IP address is a unique address that identifies a device on the internet or a local network.
IP stands for "Internet Protocol," which is the set of rules governing the format of data sent via
the internet or local network.
In essence, IP addresses are the identifier that allows information to be sent between devices on
a network: they contain location information and make devices accessible for communication.
The internet needs a way to differentiate between different computers, routers, and websites.
IP addresses provide a way of doing so and form an essential part of how the internet works.
What is an IP Address?
IP addresses are not random. They are mathematically produced and allocated by the Internet
Assigned Numbers Authority (IANA), a division of the Internet Corporation for Assigned
Names and Numbers (ICANN). ICANN is a non-profit organization that was established in the
United States in 1998 to help maintain the security of the internet and allow it to be usable by
all. Each time anyone registers a domain on the internet, they go through a domain name
registrar, who pays a small fee to ICANN to register the domain.
Watch this video to learn what IP address is, why IP address is important and how to protect it
from hackers:
Types of IP addresses
There are different categories of IP addresses, and within each category, different types.
Consumer IP addresses
Every individual or business with an internet service plan will have two types of IP addresses:
their private IP addresses and their public IP address. The terms public and private relate to
the network location — that is, a private IP address is used inside a network, while a public
one is used outside a network.
Private IP addresses
Every device that connects to your internet network has a private IP address. This includes
computers, smartphones, and tablets but also any Bluetooth-enabled devices like speakers,
printers, or smart TVs. With the growing internet of things, the number of private IP addresses
you have at home is probably growing. Your router needs a way to identify these items
separately, and many items need a way to recognize each other. Therefore, your router
generates private IP addresses that are unique identifiers for each device that differentiate
them on the network.
Public IP addresses
A public IP address is the primary address associated with your whole network. While each
connected device has its own IP address, they are also included within the main IP address for
your network. As described above, your public IP address is provided to your router by your
ISP. Typically, ISPs have a large pool of IP addresses that they distribute to their customers.
Your public IP address is the address that all the devices outside your internet network will
use to recognize your network.
Public IP addresses
Dynamic IP addresses
Dynamic IP addresses change automatically and regularly. ISPs buy a large pool of IP
addresses and assign them automatically to their customers. Periodically, they re-assign them
and put the older IP addresses back into the pool to be used for other customers. The rationale
for this approach is to generate cost savings for the ISP. Automating the regular movement of
IP addresses means they don’t have to carry out specific actions to re-establish a customer's IP
address if they move home, for example. There are security benefits, too, because a changing IP
address makes it harder for criminals to hack into your network interface.
Static IP addresses
In contrast to dynamic IP addresses, static addresses remain consistent. Once the network
assigns an IP address, it remains the same. Most individuals and businesses do not need a
static IP address, but for businesses that plan to host their own server, it is crucial to have one.
This is because a static IP address ensures that websites and email addresses tied to it will have
a consistent IP address — vital if you want other devices to be able to find them consistently on
the web.
2. MAC address
A MAC address (media access control address) is a 12-digit hexadecimal number assigned to
each device connected to the network. Primarily specified as a unique identifier during device
manufacturing, the MAC address is often found on a device's network interface card (NIC). A
MAC address is required when trying to locate a device or when performing diagnostics on a
network device.
The MAC address belongs to the data link layer of the Open Systems Interconnection (OSI)
model, which encapsulates the MAC address of the source and destination in the header of
each data frame to ensure node-to-node communication.
Each network interface in a device is assigned a unique MAC address, so it's possible for a
device to have more than one MAC address. For example, if a laptop has both
an Ethernet cable port and built-in Wi-Fi, there will be two MAC addresses shown in the
system configuration.
1. Unicast MAC address. A unicast address is attached to a specific NIC on the local
network. Therefore, this address is only used when a frame is sent from a single
transmitting device to a single destination device.
2. Multicast MAC address. A source device can transmit a data frame to multiple
devices by using a multicast A multicast group IP address is assigned to devices
belonging to the multicast group.
3. Broadcast MAC address. This address represents every device on a given network.
The purpose of a broadcast domain is to enable a source device to send data to every
device on the network by using the broadcast address as the destination's MAC
address.
What is DNS?
The Domain Name System (DNS) is the phonebook of the Internet. Humans access information
online through domain names, like nytimes.com or espn.com. Web browsers interact
through Internet Protocol (IP) addresses. DNS translates domain names to IP addresses so
browsers can load Internet resources.
Each device connected to the Internet has a unique IP address which other machines use to
find the device. DNS servers eliminate the need for humans to memorize IP addresses such as
192.168.1.1 (in IPv4), or more complex newer alphanumeric IP addresses such as
2400:cb00:2048:1::c629:d7a2 (in IPv6)
In order to understand the process behind the DNS resolution, it’s important to learn about the
different hardware components a DNS query must pass between. For the web browser, the
DNS lookup occurs "behind the scenes" and requires no interaction from the user’s computer
apart from the initial request.
• DNS recursor - The recursor can be thought of as a librarian who is asked to go find a
particular book somewhere in a library. The DNS recursor is a server designed to
receive queries from client machines through applications such as web browsers.
Typically the recursor is then responsible for making additional requests in order to
satisfy the client’s DNS query.
• Root nameserver - The root server is the first step in translating (resolving) human
readable host names into IP addresses. It can be thought of like an index in a library
that points to different racks of books - typically it serves as a reference to other more
specific locations.
• TLD nameserver - The top level domain server (TLD) can be thought of as a specific
rack of books in a library. This nameserver is the next step in the search for a specific
IP address, and it hosts the last portion of a hostname (In example.com, the TLD
server is “com”).
4. DHCP
Dynamic Host Configuration Protocol (DHCP) is a network protocol that is used to
configure network devices to communicate on an IP network. A DHCP client uses the
DHCP protocol to acquire configuration information, such as an IP address, a default
route, and one or more DNS server addresses from a DHCP server.
Domain Name System (DNS) is an Internet service that translates domain names (e.g.,
its.umich.edu) into IP addresses. Dynamic Host Configuration Protocol (DHCP) is a
protocol for automatically assigning IP addresses and other configurations to devices
when they connect to a network
Here are the features a DHCP server can offer. Allows the administrator to set lease times,
even on manually allocated IP addresses. Allows the definition of the pool or pools of IP
addresses that can be allocated dynamically. A user might have a server that forces the pool to
be a whole subnet or network.
There are three main kinds of DNS Servers — primary servers, secondary servers, and caching
servers.11-Jun-2021
5. Router
A router is a device that connects two or more packet-switched networks or subnetworks. It serves
two primary functions: managing traffic between these networks by forwarding data packets to
their intended IP addresses, and allowing multiple devices to use the same Internet connection.
There are several types of routers, but most routers pass data between LANs (local area
networks) and WANs (wide area networks). A LAN is a group of connected devices restricted to a
specific geographic area. A LAN usually requires a single router.
A WAN, by contrast, is a large network spread out over a vast geographic area. Large
organizations and companies that operate in multiple locations across the country, for instance,
will need separate LANs for each location, which then connect to the other LANs to form a WAN.
Because a WAN is distributed over a large area, it often necessitates multiple routers and
switches*.
*A network switch forwards data packets between groups of devices in the same network, whereas a
router forwards data between different networks.
In order to direct packets effectively, a router uses an internal routing table — a list of paths to
various network destinations. The router reads a packet's header to determine where it is going,
then consults the routing table to figure out the most efficient path to that destination. It then
forwards the packet to the next network in the path.
To learn more about IP routing and the protocols that are used during this process, read What is
routing?
• Wireless router: A wireless router uses an Ethernet cable to connect to a modem. It distributes
data by converting packets from binary code into radio signals, then wirelessly broadcasts them
using antennae. Wireless routers do not establish LANs; instead, they create WLANs (wireless
local area networks), which connect multiple devices using wireless communication.
• Wired router: Like a wireless router, a wired router also uses an Ethernet cable to connect to a
modem. It then uses separate cables to connect to one or more devices within the network,
create a LAN, and link the devices within that network to the Internet.
In addition to wireless and wired routers for small LANs, there are many specialized types of
routers that serve specific functions:
• Core router: Unlike the routers used within a home or small business LAN, a core router is used
by large corporations and businesses that transmit a high volume of data packets within their
network. Core routers operate at the "core" of a network and do not communicate with external
networks.
• Edge router: While a core router exclusively manages data traffic within a large-scale network, an
edge router communicates with both core routers and external networks. Edge routers live at
the "edge" of a network and use the BGP (Border Gateway Protocol) to send and receive data
from other LANs and WANs.
• Virtual router: A virtual router is a software application that performs the same function as a
standard hardware router. It may use the Virtual Router Redundancy Protocol (VRRP) to
establish primary and backup virtual routers, should one fail.
DDoS attacks: Small and large organizations often are the targets of distributed denial-of-service
(DDoS) attacks directed at their network infrastructure. Unmitigated network layer DDoS
attacks can overwhelm routers or cause them to crash, resulting in network downtime. Cloudflare
Magic Transit is one solution for protecting routers and networks from these kinds of DDoS
attacks.
Administrative credentials: All routers come with a set of admin credentials for performing
administrative functions. These credentials are set to default values, such as "admin" as the
username and "admin" as the password. The username and password should be reset to
something more secure as soon as possible: attackers are aware of the common default values for
these credentials and can use them to gain control of the router remotely if they are not reset.
6. Bots
What is a bot?
A bot -- short for robot and also called an internet bot -- is a computer program that operates as
an agent for a user or other program or to simulate a human activity. Bots are normally used to
automate certain tasks, meaning they can run without specific instructions from humans.
An organization or individual can use a bot to replace a repetitive task that a human would
otherwise have to perform. Bots are also much faster at these tasks than humans. Although bots
can carry out useful functions, they can also be malicious and come in the form of malware.
Bots are made from sets of algorithms that aid them in their designated tasks. These tasks
include conversing with a human -- which attempts to mimic human behaviours -- or gathering
content from other websites. There are several different types of bots designed to accomplish a
wide variety of tasks.
For example, a chatbot uses one of several methods to operate. A rule-based chatbot interacts
with a person by giving predefined prompts for that individual to select. An intellectually
independent chatbot uses machine learning to learn from human inputs and scan for valuable
keywords that can trigger an interaction. Artificial intelligence chatbots are a combination of
rule-based and intellectually independent chatbots. Chatbots may also use pattern matching,
natural language processing (NLP) and natural language generation tools.
Organizations or individuals who use bots can also use bot management software, which helps
manage bots and protect against malicious bots. Bot managers may also be included as part of a
web app security platform. A bot manager can allow the use of some bots and block the use of
others that might cause harm to a system. To do this, a bot manager classifies any incoming
requests by humans and good bots, as well as known malicious and unknown bots. Any suspect
bot traffic is then directed away from a site by the bot manager. Some basic bot management
feature sets include IP rate limiting and CAPTCHAs. IP rate limiting restricts the number of
same address requests, while CAPTCHAs provide challenges that help differentiate bots from
humans.
Types of bots
There are numerous types of bots, all with unique goals and tasks. Some common bots include
the following:
• Chatbots. These programs can simulate conversations with a human being. One of
the first and most famous chatbots prior to the web was Eliza, an NLP program
developed in 1966 as a Massachusetts Institute of Technology research project. This
chatbot pretended to be a psychotherapist and answered questions with other
questions. More recent examples of chatbots include virtual assistants, such as
Amazon's Alexa, Apple's Siri and Google Assistant.
• Social bots. These bots, often considered opinion bots, influence discussions with
users on social media platforms.
• Shopbots. Many of these programs shop around the web and locate the best price
for a product a user is interested in buying. Other shopbots like the Shopify chatbot
enable Shopify store owners to automate marketing and customer support.
• Spiders or crawlers. Also known as web crawlers, these bots access websites and
gather content for indexes in search engines, such as Google and Bing.
• Monitoring bots. These can be used to monitor the health of a website or system.
• Transactional bots. These bots are designed to simplify tasks that would otherwise
be performed by a human over the phone, such as blocking a stolen credit card or
confirming a bank's hours of operation.
4.3 Common Types of Attacks:
4.3.1 Distributed Denial of Service
Already discuss
If an attacker puts himself between a client and a webpage, a Man-in-the-Middle (MITM) attack
occurs. This form of assault comes in many different ways.
For example, In order to intercept financial login credentials, a fraudulent banking website can be
used. Between the user and the real bank webpage, the fake site lies "in the middle."
The feature that almost every attack has, in general, is that the attacker pretends to be somebody
you trust (or a webpage).
Real life Instances of MITM attack
In the above diagram, you can see that the intruder positioned himself in between the client and
server to intercept the confidential data or manipulate the incorrect information of them.
As shown in the above picture, to obtain access to banking, the attacker is trying to imitate both
sides of the discussion. This instance is accurate for the client and the server discussions and also
person-to-person discussions. Shown in this instance, the attacker retrieves a public key and can
modulate his own passwords to manipulate the audience to accept that they are safely
communicating with each other at either end.
Password attack is a common attack vector used to bypass or exploit authentication of user
accounts. As one of the most common application security threats, password attacks accounted
for more than 81% of data breaches in 2020. This article teaches what a password attack is,
different types of such attacks, and best practices to prevent them in modern applications.
Password attacks involve exploiting a broken authorization vulnerability in the system combined
with automatic password attack tools that speed up the guessing and cracking passwords. The
attacker uses various techniques to access and expose the credentials of a legitimate user,
assuming their identity and privileges. The username-password combination is one of the oldest
known account authentication techniques, so adversaries have had time to craft multiple
methods of obtaining guessable passwords. Additionally, applications that use passwords as the
sole authentication factor are vulnerable to password attacks since the vulnerabilities are well
understood.
Password attacks have far-reaching consequences since malicious users only require
unauthorized access to a single privileged account or a few users accounts to compromise the
web application. Depending on the data hosted by the application, compromised passwords can
pave the way for the exposure of sensitive information, distributed denial-of-service, financial fraud,
and other sophisticated attacks.
1. DNS cache poisoning – Attackers leverage vulnerabilities in the application’s DNS server to
redirect user requests to a malicious site with a similar-looking domain name.
3. Tabnabbing – The attacker rewrites unattended browser tabs with malicious sites that look like
legitimate web pages.
4. UI redressing/iFrame overlay – Using transparent layers, the attacker places a link to the
malicious page over a legitimate, clickable button.
5. Clone phishing – In this attack, the attacker sends a copy of a legitimate email where the links
within the original email are replaced with URLs to malicious sites.
1. Simple brute force attacks – A hacker uses logic and data about a user to guess the most likely
password. This technique is used for simple passwords, such as those containing a combination
of pet name-year and birth.
2. Credential stuffing – This involves using previously exposed login combinations that were
maliciously obtained across vulnerable websites. In such attacks, hackers typically take
advantage of the fact that entities tend to re-use their username-password combinations across
multiple services.
3. Hybrid brute force attacks – An attacker combines simple weak password-guessing with
automated software that performs credential stuffing to uncover complex passwords. In most
production systems, entities use slight variations of passwords across different websites.
Attackers also rely on user data patterns across services to improve the accuracy of credential
stuffing tools.
4. Reverse brute force attacks – In this attack, a hacker starts with a known password and then
searches for usernames that match it. As threat actors often have access to multiple databases
of leaked credentials, it is easy to identify common passwords within a particular group of users.
Keylogging
While orchestrating a Keylogging attack, a hacker installs monitoring tools in the user’s computer
to record the keys struck by the user covertly. A keylogger records all information that users type
into input forms and then sends it to the malicious third party. While keyloggers often have
essential uses in enterprise settings (UX improvement, employee monitoring, etc.), attackers
often use them to extract information such as login credentials for unauthorized access
maliciously.
The attacker crafts phishing emails to the users, informing them that their account has been
compromised and that their credit card and login details are needed to retain the account. The
email includes a link like: http://darw1n.com/confirm-details, pointing to the hacker’s malicious
website. The victim clicks on this link and is redirected to the fake confirmation page, where they
supply their legitimate login credentials. The hacker then collects these credentials and uses
them to access the victim’s legitimate account.
Security administrators must enforce policies that ensure users follow set criteria to prevent
malicious actors from cracking their passwords. For example, the password should be a
minimum of 8 characters long and include special characters to avoid brute force attempts. Also,
passwords should not contain personally identifying information, as this may foster dictionary
attacks. Users should also use unique passwords for each service and rotate the passwords
frequently to prevent attackers from using exposed credential databases for password attacks.
It is vital to ensure every user understands the criticality of a strong password policy and follows
the organization-wide awareness of password security. Additionally, every application user should
be aware of social engineering attacks that trick them into submitting their credentials to
malicious third parties.
The primary function of a password manager is to help web administrators store and manage
user credentials. Password management solutions also generate passwords for users following
strong policies and best practices. In addition, these tools store user credentials in strongly
encrypted databases, making them robustly secured from exposure in a data breach.
4.4 Hackers:
4.4.1 Various Vulnerabilities:
A SQL injection (SQLi) is a technique that attackers use to gain unauthorized access to a web
application database by adding a string of malicious code to a database query.
A SQL injection manipulates Structured Query Language code to provide access to protected
resources, such as sensitive data, or execute malicious SQL statements. When executed
correctly, a SQL injection can expose intellectual property, customer data or the administrative
credentials of a private business.
SQL injection attacks can be used to target any application that uses a SQL database, with
websites being the most common prey. Common SQL databases
include MySQL, Oracle and Microsoft SQL Server.
The first step of a SQL injection attack is to study how the targeted database functions. This is
done by submitting a variety of random values into the query to observe how the server
responds.
Attackers then use what they've learned about the database to craft a query the server interprets
and then executes as a SQL command. For example, a database may store information about
customers who have made a purchase with customer ID numbers. Instead of searching for a
specific customer ID, an attacker may insert "CustomerID = 1000 OR 1=1" into the input field.
Since the statement "1=1" is always true, the SQL query would return all available customer
IDs and any corresponding data. This enables the attacker to circumvent authentication and gain
administrator-level access.
In addition to returning unauthorized information, SQL attacks can be written to delete an entire
database, bypass the need for credentials, remove records or add unwanted data.
In-band SQLi
Also known as classic SQLi, in-band SQLi is when hackers use the same channel -- or band --
to launch database errors and to collect the results from an attack. In-band SQLi is most
commonly achieved through two methods:
1. Error-based injection techniques force the database to produce error messages that reveal
information about the structure of the database.
2. Union-based attacks use prepared statements that exploit the SQL union function, which
combines the results of multiple queries into one result.
Inferential SQLi
Also known as blind SQLi, inferential SQLi is when hackers send data payloads to a database
server to observe its response and behavior without being able to see what is occurring within
the database. The server's response provides attackers with clues that they can use to adjust their
attack strategy.
Inferential SQLi can be either Boolean-based or time-based. Boolean SQLi uses true or false
statements to solicit a response, while time-based SQLi sets a designated response period.
Out-of-band SQLi
Out-of-band SQLi is when hackers take advantage of domain name system or Hypertext
Transfer Protocol requests to retrieve data. Out-of-band SQLi is usually only performed when a
web server is too slow or when in-band SQLi is not possible to execute.
Web application firewalls (WAFs) are the most common tool used to filter out SQLi attacks.
WAFs are based on a library of updated attack signatures and can be configured to flag
malicious SQL queries in web applications.
To prevent a SQL injection attack from occurring, businesses can follow these practices:
• Train employees on prevention methods. It's important that IT teams -- including DevOps,
system administrators and software development -- receive proper security training to
understand how SQLi attacks happen and how they can be prevented in web applications.
• Don't trust user input. Any user input provided in a SQL query increases the likelihood for
a successful SQL injection. The best way to mitigate this type of risk is to put security
measures around user input.
• Use an allowlist instead of a blocklist. Validating and filtering user input via an allowlist, as
opposed to a blocklist, is recommended because cybercriminals can usually bypass a
blocklist. This is because a blocklist includes a list of all the applications or executables that
might pose a threat to the network. Therefore, everything on the network can operate
besides the items on the blocklist. Unfortunately, thousands of new malware and virus
samples are created every day, and it's impossible for administrators to keep the blocklists
updated with newer attack variants and zero-day vulnerabilities, so a security breach is
entirely possible before the list is updated.
• Perform routing updates, and use the newest version of applications. One of the most
common SQL injection vulnerabilities is outdated software. Not only is older technology
unlikely to have built-in SQLi protection, but unpatched software is also often easier to
manipulate. This includes programming languages, too. Older languages and syntax are
more vulnerable. For example, use PHP Data Objects as a substitute for older MySQL.
• Use validated prevention methods. Query strings written from scratch offer insufficient
protection against SQLi. The best way to protect web applications is through input
validation, prepared statements and parameterized queries.
• Perform regular security scans. Regularly scanning web applications catches and remedies
potential vulnerabilities before they do serious damage.
Some database administrators believe that a stored procedure statement can often aid in the
prevention of SQL injection attacks by restricting the types of statements that can be supplied to
its parameters. However, this doesn't prevent all exploits, as there are numerous workarounds
and intriguing statements that can still be provided to stored procedures.
Hackers seek out personally identifiable information and other data in order to
steal money, compromise identities, or sell over the dark web. Data can be
targeted to be stolen, modified, or destroyed.
Data exposure is when data is left exposed in a database or server for anyone to
see. Sensitive data can be exposed when configuration details for systems and
applications are left unsecured online.
If websites don’t use SSL and don’t have HTTPS security on web pages that
store information, data may be at risk of being exposed.
Other ways data can be exposed include by storing it in a database that may be
compromised by SQL injection or other types of attacks, using weak
cryptographic algorithms or keys, not implementing hashed and salted password
practices (which is a form of cryptography similar to encryption), and other
unsecure data storage. SQL injection is a code injection technique that allows an
attacker to interfere with the queries that an application makes to its database. It
can be used to steal information from a database via the backend.
Passwords can be exposed when hashed passwords are stored without salt,
meaning it was not fully protected via cryptography, making the password easily
unencrypted. Hashed and salted passwords refer to the storage of the password
on the server, in which the password (salted or not) is converted into a type of
word puzzle that the server knows how to read. If a website’s hashing isn’t
strong, then passwords can easily be read during a data exposure.
Here are the most common network authentication methods that your company can integrate to
prevent future breaches:
1. Password-based authentication
Passwords are the most common network authentication method. And for obvious reasons, they
are the easiest to implement. Passwords can be any combination of letters, numbers, and special
characters, and work best when they are complex and tricky to guess. However, passwords are
also very easy targets for cybercriminals and are often compromised as a result of phishing
attacks and bad password hygiene.
2. Two-factor authentication
Two-factor authentication (2FA) provides an additional layer of security on top of password
protection. It requires an additional login credential, on top of a username and password. For
example, when logging into a banking portal, users may have to provide a password and follow by
entering a 6-digit code that’s been sent to their phone. This makes it more difficult for hackers to
successfully access the account.
3. Multi-factor authentication
Multi-Factor Authentication (MFA) is a network authentication method that is similar to a 2FA but
requires two or more ways to identify a user. This can be anything from text messages that send
security codes to your mobile device, facial recognition, fingerprints, or even voice biometrics.
MFA authentication significantly improves security and user confidence by adding additional
layers of security.
4. CAPTCHAs
The term is an acronym for “completely automated public Turing test to tell computers and
humans apart”, and is used to identify if a user is a human or a malicious bot. CAPTCHAs are
designed to prevent sophisticated automated programs from breaking into secure systems by
displaying a distorted image of numbers and letters and asking users to type out the message
they see. Computers have a hard time understanding these distortions, and without the ability to
successfully decipher images will be unable to access the network.
5. Biometrics authentication
Biometrics is a computer authentication method that relies on the individual biological
characteristics of a single person. It is often used by consumers, governments, and private
corporations (airports, national borders, etc.) for security and identification purposes. Since no two
users have the same physical features (unless you are identical twins, perhaps), biometric
authentication is extremely secure and is becoming increasingly popular as it archives a high level
of security without infringing on the user. Here are the most common biometric authentication
methods:
FACIAL RECOGNITION
If you have one of the latest iPhones, then you are familiar with this biometric feature. Facial
recognition matches different facial features of a user attempting to gain access to an approved
facial record stored within the database. For example, if your friend is not within the facial
recognition database of your iPhone, they will not be able to unlock your phone. While facial
recognition is a progressive authentication method, it can be inconsistent when comparing faces
at different angles or comparing the faces of close relatives, which may confuse the
authentication algorithm.
FINGERPRINT SCANNERS
Fingerprint scanners match the specific patterns of an individual’s fingerprint to approve and grant
user access. Fingerprint scanners are the oldest and most popular type of biometric
authentication.
SPEAKER RECOGNITION
Speaker recognition, or voice biometrics, examines the speech patterns of a speaker to determine
the formation of shapes and sound qualities. A device protected by voice recognition relies on
standardized words to identify a user.
6. Certificate-based authentication
Certificate-based authentication identifies users, devices, or machines by using digital certificates
— based on the ideas of a passport or a driver’s license. Each certificate contains the digital
identity of a user with a public key and digital signature. When a user is being authenticated, this
digital certificate is deployed the same way as a username and password.
3 Common authentication
protocols
Authentication protocols are set rules for verification and interaction that systems
or endpoints (phones, servers, laptops, etc.) use to communicate. Every application accessed has
its own set of protocols and standards that must be followed. Having an authentication protocol
for your business ensures that compatibility and secure operations are continuously maintained.
Here are some of the most common authentication protocols:
Ethical hackers improve the security posture of an organization. Ethical hackers use the same
tools, tricks, and techniques that malicious hackers used, but with the permission of the
authorized person. The purpose of ethical hacking is to improve the security and to defend the
systems from attacks by malicious users.
Advantages of Hacking
There are various advantages of hacking:
1. It is used to recover the lost of information, especially when you lost your password.
2. It is used to perform penetration testing to increase the security of the computer and network.
3. It is used to test how good security is on your network.
Here is a list of essential skills for an ethical hacker that can enable you to perform your duties
effectively:
1. Communication
While this job requires a list of hard skills, communication is a critical soft skill for individuals
aspiring for this position. Your job entails technicalities that may seem advanced for non-IT
professionals. Discussing strategies and brainstorming ideas becomes a crucial part of your daily
collaboration as you work with different teams. Communication skills are important, as it is
necessary to ensure that other non-IT professionals or concerned superiors understand your
message and respond accordingly. Transcribing your ideas or observations clearly and adding
graphical representations, especially when making a report, is quite useful.
2. Networking
Being skilled at using various operating systems is essential for a white hat hacker. Besides some
of the most common operating systems, including Windows and Mac, a hacker can utilise various
high-level operating systems. Hackers usually prefer to work from untraceable networks, including
the use of unique operating systems. Besides the standard operating systems, knowing how to
run more advanced operating systems like Linux, Ubuntu and Red Hat is beneficial to detecting
and averting security breaches.
4. Troubleshooting
Apart from providing preventative or proactive measures to prevent security breaches, white hat
hackers also provide reactive measures in the event of such an occurrence. While you develop
preventive measures, it is also essential to have contingencies if preventative plans fail and
hackers breach the cybersecurity protocol. Exhibiting problem-solving skills involves how well you
react to setbacks and devise a protective counter-strategy in adverse situations.
One of the major skills for an ethical hacker is requiring a comprehensive understanding of
computer hardware. Understanding how various hardware devices work, including the CPU,
graphics card, data storage and the motherboard. This is essential, as hackers target multiple
system parts to gain access. When accessing a compromised machine or computer, knowing
how the machine works is one step toward troubleshooting it.
This knowledge allows you to examine the critical parts of the machine, test them and identify the
extent of the damage. Depending on your assessment, you can determine if you can salvage the
device and information. As a hacker, accessing the device may involve hacking the system and
bypassing its protection framework.
An ethical hacker works mainly on a computer and performs simple or complex data computing
and more technical hacking tasks, depending on the job responsibilities. Their less technical
duties involve documenting their activities, including observations and plans for a secure
database. They perform many of these duties by applying basic computing skills. While you are
performing advanced IT tasks, employers and managers expect you to be proficient in basic
computer activities.
They also want you to complete basic computing activities, including documenting and editing
information, creating spreadsheets, making presentations and drafting emails. Other skills
employers can expect are social media proficiency, communication skills and the ability to
execute data management tasks.
7. Advanced search engines knowledge
Internet is the premier hub for answers to almost any and every query. Search engines play a
significant role in accessing information online, as they display result pages in front of users to
help them find answers to their queries. A considerable perk of utilising search engines is their
ease of use.
When you understand how search engines work, you can get almost any information by simply
filling the search engine with keywords and can also gain quickly intelligence on hacking activities.
It helps you collect essential data from multiple sources on hacking and even some of the latest
hacking methods. Report on hacking can be tricky to find and it takes a skilled search engine
expert to locate the relevant information source on hacking.
You may require working with various databases, computers, machines and software programs
with unique coding in this profession. A job as an ethical hacker also necessitates writing codes
regularly, making an understanding of different programming languages essential. Writing codes
is how you give specific instructions to a computer or detect criminal activities on a machine or
software. You can learn many programming languages and some of the most relevant ones
include C++, Python, Java and PHP.
It is essential that you master at least one high-level programming language, some of which
include Ruby, Kotlin and Perl. Being an expert programmer lets you become more versatile and
increases your chances of securing a job and being successful at it.
Related: What Is A Computer Programmer? Definition And Career Advice
The database is perhaps the most treasured asset of any company. It is where they store
company, staff and client information. Unauthorised access to a company's database can cause
financial loss and affect the company's reputation. Keeping the database secure, as a result, is
one of the top priorities of any establishment, and ethical hackers are instrumental to this. To
accomplish this, having a comprehensive knowledge of databases and database management is
crucial. Knowing the framework of databases and database engines can help you implement
measures to ensure the security of the company's database.
Unethical hackers or spammers can intercept the data and messages you send, especially when
they are in the vicinity. After intercepting these messages, they interpret and use them for various
disreputable activities. Computer experts then developed a way to send information that hackers
cannot easily interpret to prevent the unlawful decoding of private information. This method of
sharing secret information is cryptography.
Cryptography is a technique that enables you to send and receive information from various
sources without being overly cautious of onlookers. Before sending it, this method converts a
message you intend to send from a human-readable format to a cryptic setup. This makes it
difficult for malicious hackers to intercept and translate information easily.
penetration Testing
Penetration Testing or Pen Testing is a type of Security Testing used to
cover vulnerabilities, threats and risks that an attacker could exploit in
software applications, networks or web applications. The purpose of
penetration testing is to identify and test all possible security vulnerabilities
that are present in the software application. Penetration testing is also called
Pen Test.
• Web apps. Testers examine the effectiveness of security controls and look for
hidden vulnerabilities, attack patterns, and any other potential security gaps that
can lead to a compromise of a web app.
• Mobile apps. Using both automated and extended manual testing, testers look
for vulnerabilities in application binaries running on the mobile device and the
corresponding server-side functionality. Server-side vulnerabilities include
session management, cryptographic issues, authentication and authorization
issues, and other common web service vulnerabilities.
• Networks. This testing identifies common to critical security vulnerabilities in an
external network and systems. Experts employ a checklist that includes test
cases for encrypted transport protocols, SSL certificate scoping issues, use of
administrative services, and more.
• Cloud. A cloud environment is significantly different than traditional on-premises
environments. Typically, security responsibilities are shared between the
organization using the environment and the cloud services provider. Because of
this, cloud pen testing requires a set of specialized skills and experience to
scrutinize the various aspects of the cloud, such as configurations, APIs, various
databases, encryption, storage, and security controls.
• Containers. Containers obtained from Docker often have vulnerabilities that can
be exploited at scale. Misconfiguration is also a common risk associated with
containers and their environment. Both of these risks can be uncovered with
expert pen testing.
• Embedded devices (IoT). Embedded / Internet of Things (IoT) devices such as
medical devices, automobiles, in-home appliances, oil rig equipment, and
watches have unique software testing requirements due to their longer life
cycles, remote locations, power constraints, regulatory requirements, and more.
Experts perform a thorough communication analysis along with a client/server
analysis to identify defects that matter most to the relevant use case.
• Mobile devices. Pen testers use both automated and manual analysis to find
vulnerabilities in application binaries running on the mobile device and the
corresponding server-side functionality. Vulnerabilities in application binaries
can include authentication and authorization issues, client-side trust issues,
misconfigured security controls, and cross-platform development framework
issues. Server-side vulnerabilities can include session management,
cryptographic issues, authentication and authorization issues, and other
common web service vulnerabilities.
• APIs. Both automated and manual testing techniques are used to cover the
OWASP API Security Top 10 list. Some of the security risks and vulnerabilities
testers look for include broken object level authorization, user authentication,
excessive data exposure, lack of resources / rate limiting, and more.
• CI/CD pipeline. Modern DevSecOps practices integrate automated and
intelligent code scanning tools into the CI/CD pipeline. In addition to static tools
that find known vulnerabilities, automated pen testing tools can be integrated
into the CI/CD pipeline to mimic what a hacker can do to compromise the
security of an application. Automated CI/CD pen testing can discover hidden
vulnerabilities and attack patterns that go undetected with static code scanning.
SQL Injection is a code-based vulnerability that allows an attacker to read and access sensitive
data from the database. Attackers can bypass security measures of applications and use SQL
queries to modify, add, update, or delete records in a database. A successful SQL injection attack
can badly affect websites or web applications using relational databases such as MySQL, Oracle,
or SQL Server. In recent years, there have been many security breaches that resulted from SQL
injection attacks.
With this basic understanding of ‘what is SQL Injection’, you will now look at the different types of
SQL Injection.
the two common types of in-band SQL injections are Error-based SQL injection and Union-based
SQL injection.
1. Error-based SQL injection - Here, the attacker performs certain actions that cause the database
to generate error messages. Using the error message, you can identify what database it
utilizes, the version of the server where the handlers are located, etc.
2. Union-based SQL injection - Here, the UNION SQL operator is used in combining the results of
two or more select statements generated by the database, to get a single HTTP response. You
can craft your queries within the URL or combine multiple statements within the input fields
and try to generate a response.
Blind SQLi - Here, it does not transfer the data via the web application. The attacker can not see
the result of an attack in-band.
1. Boolean-based SQL Injection - Here, the attacker will send an SQL query to the database asking
the application to return a different result depending on whether the query returns True or
False.
2. Time-based SQL Injection - In this attack, the attacker sends an SQL query to the database,
which makes the database wait for a particular amount of time before sharing the result. The
response time helps the attacker to decide whether a query is True or False.
Out-of-bound SQL Injection - Out-of-bound is not so popular, as it depends on the features that are
enabled on the database server being used by the web applications. It can be like a
misconfiguration error by the database administrator.
Now, it’s time to understand another important topic in this article titled ‘What is SQL Injection’,
5.4 Firewall:
5.4.1 Concepts of Firewall
5.4.2 Types of Firewall
5.4.3 Working, Advantages and Importance of Firewall
Firewall is a network security device that observes and filters incoming and outgoing network
traffic, adhering to the security policies defined by an organization. Essentially, it acts as a
protective wall between a private internal network and the public Internet.
Fencing your property protects your house and keeps trespassers at bay; similarly, firewalls are
used to secure a computer network. Firewalls are network security systems that prevent
unauthorized access to a network. It can be a hardware or software unit that filters the incoming
and outgoing traffic within a private network, according to a set of rules to spot and
prevent cyberattacks.
Firewalls are used in enterprise and personal settings. They are a vital component of network
security. Most operating systems have a basic built-in firewall. However, using a third-party
firewall application provides better protection.
Now that we have understood what is firewall, moving forward we will see the history of firewalls.
ypes of Firewalls
A firewall can either be software or hardware. Software firewalls are programs installed on each
computer, and they regulate network traffic through applications and port numbers. Meanwhile,
hardware firewalls are the equipment established between the gateway and your network.
Additionally, you call a firewall delivered by a cloud solution as a cloud firewall.
There are multiple types of firewalls based on their traffic filtering methods, structure, and
functionality. A few of the types of firewalls are:
• Packet Filtering
A packet filtering firewall controls data flow to and from a network. It allows or blocks the data
transfer based on the packet's source address, the destination address of the packet, the
application protocols to transfer the data, and so on.
This type of firewall protects the network by filtering messages at the application layer. For a
specific application, a proxy firewall serves as the gateway from one network to another.
• Stateful Inspection
Such a firewall permits or blocks network traffic based on state, port, and protocol. Here, it
decides filtering based on administrator-defined rules and context.
• Next-Generation Firewall
Email Defamation
What is defamation?
Defamation is false and unprivileged spoken words or written publication, which exposes any living
person to hatred, contempt, ridicule, or which causes him/her to be shunned or avoided, or which has a
tendency to injure him/her in his/her trade or occupation
.
For example, if a person or the news media says or writes something about you that is understood to lower
your reputation, or that keeps people from associating with you, defamation has occurred. However, if
someone says something false about someone who has died, as reprehensible as that may be, in most
states it is not considered defamatory. No legal action can be taken on behalf of a dead person. Only a
living person can be defamed.