Cyber Security Questions & Answers
Cyber Security Questions & Answers
The Cyber Security on a whole is a very broad term but is based on three fundamental concepts
known as “The CIA Triad“.
It consists of Confidentiality, Integrity and Availability. This model is designed to guide the
organization with the policies of Cyber Security in the realm of Information security.
Confidentiality
It defines the rules that limits the access of information. Confidentiality takes on the
measures to restrict the sensitive information from being accessed by cyber attackers
and hackers.
They can change the way data is handled within an organization to ensure data
protection. Various ways to ensure confidentiality, like: two-factor authentication, Data
encryption, data classification, biometric verification, and security tokens.
Integrity
This assures that the data is consistent, accurate and trustworthy over its time period. It
means that the data within the transit should not be changed, altered, deleted or illegally
being accessed.
To cope with data loss or accidental deletion or even cyber attacks, regular backups
should be there. Cloud backups are now the most trusted solution for this.
Availability
It also involves opting for extra security equipment in case of any disaster or
bottlenecks. Utilities like firewalls, disaster recovery plans, proxy servers and a proper
backup solution should ensure to cope with DoS attacks.
Malware. Software that performs a malicious task on a target device or network, e.g.
corrupting data or taking over a system.
Phishing. An email-borne attack that involves tricking the email recipient into
disclosing confidential information or downloading malware by clicking on a hyperlink
in the message.
Spear Phishing. A more sophisticated form of phishing where the attacker learns about
the victim and impersonates someone he or she knows and trusts.
Trojans. Named after the Trojan Horse of ancient Greek history, the Trojan is a type of
malware that enters a target system looking like one thing, e.g. a standard piece of
software, but then lets out the malicious code once inside the host system.
Ransomware. An attack that involves encrypting data on the target system and
demanding a ransom in exchange for letting the user have access to the data again.
These attacks range from low-level nuisances to serious incidents like the locking down
of the entire city of Atlanta’s municipal government data in 2018.
Denial of Service attack or Distributed Denial of Service Attack (DDoS). Where an
attacker takes over many (perhaps thousands) of devices and uses them to invoke the
functions of a target system, e.g. a website, causing it to crash from an overload of
demand.
Attacks on IoT Devices. IoT devices like industrial sensors are vulnerable to multiple
types of cyber threats. These include hackers taking over the device to make it part of a
DDoS attack and unauthorized access to data being collected by the device. Given their
numbers, geographic distribution and frequently out-of-date operating systems, IoT
devices are a prime target for malicious actors.
Data Breaches. A data breach is a theft of data by a malicious actor. Motives for data
breaches include crime (i.e. identity theft), a desire to embarrass an institution (e.g.
Edward Snowden or the DNC hack) and espionage.
Malware on Mobile Apps. Mobile devices are vulnerable to malware attacks just like
other computing hardware. Attackers may embed malware in app downloads, mobile
websites or phishing emails and text messages. Once compromised, a mobile device
can give the malicious actor access to personal information, location data, financial
accounts and more.
b. cyber crime Hacking : This means gaining unauthorised access over computer
system with the intent of personal gain or misuse. It generally destroys the whole data
present in computer system. Screenshot 2 shows message that hacker can post once
your system is compromised.
c. Cracking : Cracking refers to digitally removing the copy write protection code that
prevents copied or pirated software from running on computers that haven’t been
authorised to run it by the vendor of the software. The person who carries out this task
if called as Cracker.
There is difference between Hacker and a Cracker. Hacker uses their knowledge to find
the flaws in the security of systems where as Cracker uses their knowledge to break the
law.
e. Online fraud : This refers to acts of stealing confidential details of victim such as
banking credentials using phishing sites and thereafter withdrawing money from
victims account, online lottery scams such as nigeria lottery scams. Screenshot 3 shows
online lottery scam claiming that you have won $ 5,00,000 amount!
f. Child pronography : This involves the use of electronic device and services to
create, distribute or access materials that sexually exploit minor childrens. For
eg., Recording heinous act done with child on mobile device and distributing on porn
site.
g. Spoofing : The term spoofing means imitate something while exaggerating its
characteristic features with some personal gain or profit. Spoofing of user identity can
be described as a situation in which one person or program successfully
masquerades (means pretending to be someone one is not) as another by falsifying data.
Spoofing can be done using email or SMS or WhatApp. For eg.,Constantly mailing a
person claiming from bank and requesting banking credentials.
In this category crime is committed against property of person using electronic service
as a medium. Below are some offences that comes under this category :
For eg., the first case in India registered for cyber squatting was Yahoo Inc. v/s Aakash
Arora in 1999 where the defendant launched a YahooIndia.com website nearly identical
to the plaintiff’s popular website Yahoo.com and also provided almost similar services.
However, the court ruled in favour of Yahoo Inc.
For eg., The Tribune of Pakistan had reported in November 2012 that hackers (group
named as ‘eboz’ in Pakistan) replaced Google’s Pakistan logo with a picture of two
penguins walking up a bridge at sunset.
For eg., The popular case of trademark of Bikanervala v/s New Bikanerwala filed in
2005. The plaintiff (here Bikanervala) had filed IPR case with defendant (here New
Bikanerwala) since they were running new outlet in Delhi by using trademark
registered with plaintiff. The court had allowed plaintiff’s application and the defendant
was restrained by means of an ad interim injunction.
For eg., National Security Agency (NSA) of US spying on large scale on many
countries. This spying was blown up by former NSA agent Edward Snowden.
b. Cyber Terrorism : Cyber Terrorism is politically motivated use of computers and
information technology to cause severe disruption or widespread fear amongst people.
For eg., the recent example of 2015 dimapur mob lynching rape accused is due to
outspread of message on chatting app called Whatsapp amount locals of Dimapur
district in Nagaland.
An unlawful activities done with the intention of causing harm to the cyberspace that can
affect entire society or large number of persons. Below are offences that comes under this
category:
a. Online Gambling : The term gambling means involving in activities that allows
chance for money. Online gambling is one of the most lucrative businesses that is
growing today in the list of cyber crimes in India. It is also known as Internet
gambling or iGambling. The cyber crime incident such as online lottery
scam (particularly those of Nigeria lottery scam), online jobs i.e. work from remote
location etc.
Today, incredible advances are being made for mobile devices. The trend is for smaller
devices and more processing power. A few years ago, the choice was between a wireless
phone and a simple PDA. Now the buyers have a choice between high-end PDAs with
integrated wireless modems and small phones with wireless Web-browsing capabilities.
A long list of options is available to the mobile users. A simple hand-held mobile device
provides enough computing power to run small applications, play games and music, and
make voice calls. A key driver for the growth of mobile technology is the rapid growth of
business solutions into hand-held devices.
As the term "mobile device" includes many products. We first provide a clear distinction
among the key terms: mobile computing, wireless computing and hand-held devices.
Many types of mobile computers have been introduced since 1990s. They are as follows:
1. Portable computer: It is a general-purpose computer that can be easily moved from
one place to another, but cannot be used while in transit, usually because it requires some
"setting-up" and an AC power source.
2. Tablet PC: It lacks a keyboard, is shaped like a slate or a paper notebook and has
features of a touchscreen with a stylus and handwriting recognition software. Tablets may
not be best suited for applications requiring a physical keyboard for typing, but are
otherwise capable of carrying out most tasks that an ordinary laptop would be able to
perform.
3. Internet tablet: It is the Internet appliance in tablet form. Unlike a Tablet PC, the
Internet tablet does not have much computing power and its applications suite is limited.
Also it cannot replace a general-purpose computer. The Internet tablets typically feature
an MP3 and video player, a Web browser, a chat application and a picture viewer.
8. Fly Fusion Pentop computer: It is a computing device with the size and shape of a
pen. It functions as a writing utensil, MP3 player, language translator, digital storage
device and calculator.
Traditional Techniques
The traditional and the first type of credit card fraud is paper-based-application fraud,
wherein a criminal uses stolen or fake documents such as utility bills and bank statements
that can build up useful personally Identifiable Information (PII) to open an account in
someone else's name.
Sophisticated techniques, enable criminals to produce fake and doctored cards. Then
there are also those who use skimming to commit fraud. Skimming is where the
information held on either the magnetic strip on the back of the credit card or the data
stored on the smart chip are copied from one card to another. Site cloning and false
merchant sites on the Internet are becoming a popular method of fraud and to direct the
users to such bogus/fake sites is called Phishing. Such sites are designed to get people to
hand over their credit card details without realizing that they have been directed to a fake
weblink/website (i.e., they have been scammed).
1. Triangulation: It is another method of credit card fraud and works in the fashion as explained
further.
The criminal offers the goods with heavy discounted rates through a website designed
and hosted
The customer registers on this website with his/her name, address, shipping address and
valid credit card details.
The criminal orders the goods from a legitimate website with the help of stolen credit
card details and supply shipping address that have been provided by the customer while
registering on the criminal's website.
The goods are shipped to the customer and the transaction gets completed.
The criminal keeps on purchasing other goods using fraudulent credit card details of
different customers till the criminal closes existing website and starts a new one.
Customers till the criminal closes existing website and starts a new one.
Such websites are usually available for few weeks/months, till the authorities track the
websites through which the criminal has enticed the individuals to reveal their personal
details, which enabled the criminal to commit the transactions by using the credit card
details of these customers. The entire investigation process for tracking and reaching
these criminals is time-consuming, and the criminals may close such fake website in
between the process that may cause further difficulty to trace the criminal. The criminals
aim to create a great deal of confusion for the authorities so that they can operate long
enough to accumulate a vast amount of goods purchased through such fraudulent
transactions.
Linking: “Linking” allows a website user to visit another website on the Internet without
leaving that particular website. By clicking on a word or image in one web page, the user
can view another Web page somewhere else in the world, or on the same server as the
original page. Linking may damage the rights or interests of the owner of the page that is
linked to in two ways:
linked-to sites can lose income as their revenues are often tied to the number of viewers
who visit their home page, and;
it may create the impression in the minds of users that the two linked sites endorse each
other or are somehow linked to each other.
A domain name dispute is a conflict that arises when more than one individual believe
they have the right to register a specific domain name. A “domain name dispute” arises
when a domain name similar to a registered trademark is registered by another individual
or organization who is not the owner of registered trademark. All domain name registrars
must follow the Uniform Domain-Name Dispute-Resolution Policy (UDRP).
Yahoo! Inc v. Akash Arora & Anr (1999 IIAD Delhi 229) the defendants were using
“yahooindia.com” for providing internet services. The petitioner here was the owner of
the trademark “Yahoo!” and had registered its domain name with different countries like
“yahoo.in” for India. Hence, the domain name “yahooindia.com” could be mistaken as an
extension of “Yahoo!”. The Court treated the matter as passing off and granted an
injunction restraining the defendant from using the domain name “yahooindia.com”.
Outbound digital marketing via email is a traditional and powerful tool. The threat of
email account hijacking includes phishing and spamming. Hackers can send links to
malicious websites that download ransomware to completely encrypt the victim’s data
files.
Guard against email messaging threats through encryption and adding outbound filters.
Digital marketers should install email security software to stay ahead with cybersecurity
threats.
Threats to customers’ data privacy
Customer data is the treasure trove of digital marketers. That data is likewise a goldmine
for hackers, who steal, sell, and compromise customer passwords, credit card
information, and personal data. Data breaches have resulted in the compromise of
millions of customer accounts, bad publicity for the targeted businesses, as well as fines
and legal sanctions.
Social media is a valuable monitoring tool for tracking real-time references to a business
brand. Those mentions provide a source for exploiting outbound marketing efforts. On
the other hand, hackers can hijack a social media account and create confusion. Hacking
can change the company profile, add false and offensive statements and send spam emails
from the account to its customers.
We are always trying to reduce costs, improve productivity and make things more
efficient. This is how we evolve and with evolution comes innovation. Automating your
social media account and the posting schedule is a useful function. This allowsd you to
save time and become more productive.
Cookies are pieces of software that depends on the cookie type get downloaded onto the
user’s browser or hard drive and provide information on the user’s habits. A use case of
how cookies work is used in ecommerce stores when users place items into their
shopping cart, this allows store advertising to send retargeting ads and messages to you
because you have been cookied and the store knows your movements when on that stores
website.
• In our increasingly connected world, the amount of data – and the sources of this data –
continue to rise. Data profiling is an often-visual assessment that uses a toolbox of
business rules and analytical algorithms to discover, understand and potentially expose
inconsistencies in your data. This knowledge is then used to improve data quality as an
important part of monitoring and improving the health of these newer, bigger data sets.
• The amount of data is only one side of the equation – data quality is important, too. Data
that isn’t formatted right, standardized or correctly integrated with the rest of the database
can cause delays and problems that lead to missed opportunities, confused customers and
bad decisions.
• Data profiling helps you discover, understand and organize your data. It should be an
essential part of how your organization handles its data for several reasons.
• First, data profiling helps cover the basics with your data, verifying that the information
in your tables matches the descriptions. Then it can help you better understand your data
by revealing the relationships that span different databases, source applications or tables.
• Many of the data profiling techniques or processes used today fall into three major
categories: structure discovery, content discovery and relationship discovery.
• Structure discovery, also known as structure analysis, validates that the data that you
have is consistent and formatted correctly. There are several different processes that you
can use for this, such as pattern matching. For example, if you have a data set of phone
numbers, pattern matching helps you find the valid sets of formats within the data set.
Pattern matching also helps you understand whether a field is text- or number-based
along with other format-specific information.
• Internet is the fastest way of connecting with the world but, unfortunately, it is not the
safest one. The internet is full of scams and gambles, and you are on the verge of
security risks when you choose to be online.
• Most internet users are least bothered about their online privacy and are unaware of the
plausible risks associated with it. Not only your privacy but your safety is also
endangered, especially when you are using the internet to carry out important and
secretive tasks like online banking and sharing crucial business files.
Information Mishandling
• There are various sites on the internet that need your personal information to get access to
their services. These sites often store cookies and save your personal information and
later use it for various purposes. Most of the time this information is not encrypted and
can be accessed by anyone. This mishandling of personal information may lead to serious
consequences. The modern trend of e-banking and e-business portals have multiplied the
risks associated with online privacy. By sharing your bank details and crucial files on the
internet, you are paving ways for burglars and making yourself vulnerable to
cybercriminals.
• Data privacy fundamentals entail the proper use and handling of data with sensitive
information. This typically includes personal, health, or financial data about an individual
or organization. It should not be confused with data security, which is the process of
protecting data from being viewed, altered, or stolen by unauthorized users.
Data Confidentiality