Unit 2,3 Cyber Security
Unit 2,3 Cyber Security
Mobile and wireless devices are like digital companions that don't need a
physical connection to work. They include smartphones, tablets, and other
gadgets that communicate wirelessly, allowing users to stay connected and
access information on the go.
Features:
1. Portability: These devices are small and easy to carry, allowing users to
stay connected wherever they go.
2. Wireless Connectivity: They use technologies like Wi-Fi, Bluetooth, and
mobile networks to connect to the internet and other devices.
3. M ultifunctionality : Beyond calls and messages, they se rve as c a m e ras,
G P S devices, entertainment hubs, and more.
I m p o r t a n c e o f Mobile and Wireless Devices
Key Factors:
1. Technological Advancements: Continuous improvements in technology make
devices m o re a ff ordable and accessible.
2. Increased Connectivity: The rise of high-speed internet and wireless networks
enables seamless communication.
3. Versatility: Mobile devices o ff e r a variety of functions, f ro m communication to
entertainment and productivity.
4. Co n s u mer Demand: People increasingly rely on mobile and wireless devices fo r
convenience and on-the-go access.
T re n d s in Mobility
1.5G Revolution: The 5G Revolution is like the superhero of internet speed. It's
the fifth generation of mobile networks, bringing faster speeds and more
reliable connections to mobile and wireless devices.
Impact:
● High-Speed Connectivity: Faster internet speeds for quicker downloads
and smoother streaming.
● IoT Advancements: Enables better connections for the Internet of Things
(IoT) devices.
T re n d s in Mobility
6.Remote Work and Collaboration: Remote Work and Collaboration are like the
new-age workspaces. With the advancement of mobile technology, working
from anywhere and collaborating seamlessly has become a trend.
Impact:
● Fle ibility: Allows professionals to work from di ff erent locations.
● Virtual Meetings: Increased reliance on mobile
devices for virtual collaboration.
T re n d s in Mobility
Impact:
● Green Technologies: Focus on eco-friendly materials and energy-
e ffi cient designs.
● Reduced E-Waste: E ff orts to extend the lifespan of devices and
promote recycling.
C re d i t C a r d Fra u d s in Mobile
Credit C a rd Frauds in Mobile are like digital heists targeting your financial
information on mobile devices. It involves unauthorized access to credit card
details, leading to financial losses and potential identity theft.
Common Techniques:
1. Phishing: Fraudsters use fake messages o r emails to trick users into
revealing credit card information.
2. Mobile Malware: Malicious software on mobile devices can capture credit
card details.
3. Fake Apps: Fraudulent mobile applications mimic legitimate ones to steal
credit card information.
4. Unsecured Wi-Fi: Conducting transactions on unsecured Wi-Fi networks
makes it easier for hackers to intercept data.
C re d i t C a r d Fra u d s in Mobile
Preventive Measures:
1. Use Trusted Apps: Only download apps from o ffi cial app stores to avoid fake
applications.
2. Secure Wi-Fi: Avoid sensitive transactions on public Wi-Fi networks; use
secure connections.
3. Two-Factor Authentication: Enable additional layers of security for mobile
transactions.
4. Regular Monitoring: Keep a close eye on credit card statements for any
unauthorized transactions.
Example: Imagine receiving a message that looks like it's from your bank, asking
for your credit card details to resolve an issue. If you provide this information,
you've fallen victim to Credit Card Frauds in Mobile. It's crucial to stay vigilant,
verify messages, and adopt secure practices to protect your financial
information on mobile devices.
Wireless C o m p u t i n g E r a
Key Elements:
1. Wireless Networks: Use of technologies like Wi-Fi,
Bluetooth, and cellular networks for device connectivity.
2. Mobile Devices: Proliferation of smartphones, tablets, and
wearables, untethered from physical connections.
3. Cloud Computing: Storing and accessing data and
Wireless C o m p u t i n g E r a
Characteristics:
1. Mobility: Computing devices can be used and moved without the constraints
of physical cables.
2. Instant Connectivity: Devices can connect to the internet and each other
instantly, enhancing communication.
Technological Enablers:
3. 5G Technology: High-speed, low-latency wireless networks supporting
advanced applications.
4. IoT Integration: Interconnected devices, from smart homes to industrial
sensors, communicating wirelessly.
5. Edge Computing: Processing data closer to the source, reducing reliance on
centralised servers.
Wireless C o m p u t i n g E r a
Impact on Society:
1. Digital Transformation: Changing the way businesses operate,
communicate, and deliver services.
2. Remote Work Revolution: Allowing individuals to work from anywhere,
transforming traditional workspaces.
3. Smart Living: Integration of wireless technologies in homes, making them
smart and connected.
Example: Imagine a world where you can seamlessly connect to the internet,
work, and communicate without any physical constraints. That's the essence of
the Wireless Computing Era, where the airwaves c a r r y the pulse of our digital
lives, shaping the way we live, work, and connect.
S e c u r i t y Challenges Posed by Mobile Devices
Mitigation:
● S t r o n g Pa s swo rd s o r Biometrics: P ro te c t devices with s e c u re authentication me t hod s.
● Remote Wipe: Enable fea tures to re mo te ly erase data in case o f loss.
Mitigation:
● O ffi cia l A p p Sto re s : Downloa d a p p s only f r o m t rus te d s o u rc e s like G o o g l e Play o r the Ap ple
A p p S to re .
● A p p Permissions: Review a n d limit a p p p e rmi ssi ons to the essentials.
S e c u r i t y Challenges Posed by Mobile Devices
Mitigation:
● U s e r Education: Tra i n u s e rs to i d enti fy a n d avoid p h i s h i n g attempts.
● S e c u r i t y S o f t wa r e : U s e mobile s e c u r i t y a p p s to detect a n d b l o c k p h i s h i n g threats.
Mitigation:
● Use VPNs: E m p l oy Vi rtual Private N e t wo r k s f o r s e c u re data transmission.
● Avoid Public Wi-Fi f o r Sensitive Transactions: Refrai n f r o m c o n d u c t i n g financial o r
sensitive tra nsacti ons o n u n s e c u re d n e t wo rks .
S e c u r i t y Challenges Posed by Mobile Devices
Mitigation:
● Re g u l a r Updates: Ke e p b o t h the o p e ra t i n g system a n d a p p s u p to date.
● Automatic Updates: Enable automatic updates f o r a d d e d conve nie nce .
Mitigation:
● Enable E nc ry p t io n: E n c r y p t b o t h data at re s t a n d d u r i n g transmission.
● S e c u r e Co mmu nica t ion Channels: U s e s e c u re p ro to c o l s f o r data t ra n s fe r.
S e c u r i t y Challenges Posed by Mobile Devices
Mitigation:
● U s e r Education: Tra i n u s e rs to re c o gn i z e a n d resist social e n gi n e e ri n g tactics.
● Multi-Factor Authentication: Imp le men t additional authentication layers f o r a d d e d security.
Mitigation:
● Tra ining P r o g ra m s : C o n d u c t re g u l a r s e c u r i t y awareness tra ini ng f o r users.
● Communication: Ke e p u s e rs i n fo r m e d ab out e m e r g i n g thre ats a n d best p ra c t i c e s .
Re g i s t r y Se t t i n g f o r Mobile Devices
1. Device Passcode:
● Pu r p o s e : P ro te c t s the device f r o m unauthoriz e d access.
● Co nf igu ra t io n: - S etti ngs > Face ID & Passcode (or To u c h ID & Passcode) > Tu r n Passcode O n
2. Biometric Authentication:
● Pu r p o s e : E n ha n c e s device s e c u r i t y with f i n g e r p r i n t o r face re cogniti on .
● Co nf igu ra t io n: - S etti ngs > Face ID & Passcode (or To u c h ID & Passcode)
3. Find M y iPhone:
● Pu r p o s e : Allows t ra c k i n g a n d re m o te wi p i n g o f a lost o r stolen device.
● Co nf igu ra t io n: - S etti ngs > [Your Name] > F ind M y > F ind M y iPhone
Re g i s t r y Se t t i n g f o r Mobile Devices: I S O
4.App Permissions:
● Purpose: Control which apps have access to
sensitive data.
● Configuration: - Settings > Privacy > [App Name]
5.Automatic Updates:
● Purpose: Ensures the device is running the latest
security patches.
● Configuration: - Settings > General > Software
Update
Re g i s t r y Se t t i n g f o r Mobile Devices: An dro i d
1.Screen Lock:
● Purpose: Provides an initial layer of security.
● Configuration: - Settings > Security > Screen lock
2.Biometric Authentication:
● Purpose: Enhances device security with fingerprint o r
facial recognition.
● Configuration: - Settings > Security > Biometrics
3.Find My Device:
● Purpose: Allows tracking and remote wiping of a lost o r
stolen device.
● Configuration: - Settings > Security > Find M y Device
Re g i s t r y Se t t i n g f o r Mobile Devices: An dro i d
4.App Permissions:
● Purpose: Control which apps have access to sensitive data.
● Configuration: - Settings > Apps & Notifications > [App Name] >
Permissions
6.Automatic Updates:
● Purpose: Ensures the device is running the latest security patches.
● Configuration: - Settings > System > Software Update
Authentication S e r v i c e S e c u r i t y
Implementation:
● Combine something the user knows (password) with something they have
(token, mobile device, fingerprint).
Authentication S e r v i c e S e c u r i t y
Implementation:
● Enforce password complexity (length, special characters).
● Regularly prompt users to update passwords.
● Discourage password reuse.
Authentication S e r v i c e S e c u r i t y
3.Encryption:
Purpose: Protects sensitive data transmitted between users and
authentication servers.
Implementation:
● Use strong encryption protocols (e.g., TLS/SSL) for data in
transit.
● Hash and salt passwords before storing them.
Authentication S e r v i c e S e c u r i t y
4.Session Management:
Purpose: Prevents unauthorised access during an active
session.
Implementation:
● Implement session timeout policies.
● Use secure session tokens.
● Provide users the ability to log out remotely.
Authentication S e r v i c e S e c u r i t y
Implementation:
● Implement account lockout policies after a certain
number of failed login attempts.
● Use CAPTCHA or similar mechanisms to deter automated
attacks.
Authentication S e r v i c e S e c u r i t y
Implementation:
● Hash and salt passwords using strong cryptographic
algorithms.
● Regularly audit and update credential storage
mechanisms.
Authentication S e r v i c e S e c u r i t y
Implementation:
● Keep detailed logs of authentication attempts, including
successful and failed events.
● Regularly review and analyse authentication logs.
Authentication S e r v i c e S e c u r i t y
Implementation:
● Implement real-time monitoring for unusual login patterns.
● Set up alerts for multiple failed login attempts or other
suspicious activities.
Authentication S e r v i c e S e c u r i t y
9. API S e c u r i t y :
Pu r p o s e : E n s ure s that authentication APIs a re s e c u re a n d not vulnerab le to attacks.
Implementation:
● U s e s e c u re API authentication me t h o d s (e.g., OAuth).
● Regularly test a n d update API s e c u ri t y me asure s.
10. Re g u l a r S e c u r i t y Audits:
Pu r p o s e : Identifies vulnerabilities a n d en sures o n go i n g c o mp l i a n c e with s e c u r i t y best
p ra c t i c e s .
Implementation:
● C o n d u c t re g u l a r s e c u r i t y audits a n d p e netra tion testing.
● Ad d re s s identified vulnerabilities p ro mp t ly.
Authentication S e r v i c e S e c u r i t y
11.User Education:
Purpose: Empowers users to make informed security decisions and
recognize phishing attempts.
Implementation:
● Provide regular security awareness training.
● Communicate best practices for protecting personal
information.
Attacks o n Mobile/Cell Phones
H ow to Pro te c t :
● Install re p utab le antivirus a n d an ti -malware a p p s .
● Down loa d a p p s only f r o m o ffi c i a l a p p stores.
● Ke e p the device's o p e ra t i n g system a n d a p p s up d ate d .
H ow to Pro te c t :
● Be cautious o f unsolicited emails, messages, o r calls a s k i n g f o r p e rs o n a l i n format i on .
● Ve r i f y the legitimacy o f websites b e fo re e n te ri n g credentials.
Attacks o n Mobile/Cell Phones
H ow to Pro te c t :
● U s e s e c u re Wi-Fi c o n n e c t i o n s o r VPNs.
● Be cautious wh e n c o n n e c t i n g to p ub li c Wi-Fi n e t wo rks .
H ow to Pro te c t :
● Regularly b a c ku p i m p o r t a n t data.
● Avoid c l i c k i n g o n suspicious links o r downloading u n k n o w n attachments.
Attacks o n Mobile/Cell Phones
H ow to Pro te c t :
● S e t u p a PIN o r p a s s wo rd f o r S I M c a r d c h a n ge s .
● C o n t a c t yo u r mobile c a r r i e r immediately if yo u ex p e r i e n c e u n ex p e c te d loss o f service.
H ow to Pro te c t :
● Tu r n o ff Bluetooth wh e n not in use.
● S e t devices to n o n -d i s c ove ra b l e m o d e in p ub li c places.
Attacks o n Mobile/Cell Phones
H ow to Pro te c t :
● Regularly revi ew installed a p p s a n d permissions.
● U s e s e c u r i t y s o ft wa re that sca ns f o r s pywa re .
H ow to Pro te c t :
● U s e s e c u re , e n c r y p t e d Wi-Fi connecti ons.
● Avoid t ra nsmi tting sensitive i n fo rm a t i o n o n p ub li c n e t wo rks .
Attacks o n Mobile/Cell Phones
H ow to Pro te c t :
● Be sceptical o f unsolicited c o mmu n i c a t i o n a s k i n g f o r sensitive i nformat i on .
● Ed uca te yourself a n d o t h e r s ab out c o m m o n social e n gi n e e ri n g tactics.
10.A p p Permissions Abuse: Malicious a p p s exploiting excessive p e rmi ssi on s to access a n d misuse
p e rs o n a l data.
H ow to Pro te c t :
● Review a n d limit a p p permissions.
● O n ly install a p p s f r o m re p utab le s o u rc e s .
Attacks o n Mobile/Cell Phones
H ow to Pro te c t :
● Avoid using p ub li c c h a r g i n g stations.
● U s e on ly t rus te d c h a r g i n g cables a n d ad ap ters.
H ow to Pro te c t :
● U s e s e c u re a n d up d ate d b ro w s e r s .
● Down loa d a p p s only f r o m o ffi c i a l a p p stores.
S e c u r i t y Implications f o r Organisation
4. Re g u l a r S o f t w a r e Updates: Ap p ly s o ft wa re p a tche s p ro m p t ly to a d d re s s
vulnerabilities.
6. Mobile Device Prod u ct ivit y Optimization: Orga nisa tions should a d d re s s mobile device
p ro d u c t iv i t y issues to e n s ure optimal employee p e r fo r m a n c e :
● Optimise applications f o r mobile usage
● P ro m o te mo b i l e - fri e n d ly w o r k
p ra c t i c e s
Cyber Security
unit 3
● P r o x y S e r ve r s a n d
An o nym i z e rs
● Phishing
● Password C r a c k i n g
● Keyl o gge rs a n d S py w a re s
What is P r o y Servers?
T h e re a r e several d i ff e re n t t yp e s o f p r o x y s e r ve r s , including:
● O p e n o r Fo r wa r d P r o y: A f o r w a r d p r o x y is a s e r ve r that sits b et wee n a client a n d the
i n te rn e t . Th e client sends a re q ue s t to the f o r w a r d p ro x y, wh i c h then sends the re q ue s t to the
i n te rn e t o n b eha lf o f the client .
● Reverse P r o y: A re ve r s e p r o x y is a s e r ve r that sits b etwee n the i n te rn e t a n d a s e r ve r. T h e
re ve r s e p r o x y re ceives req uests f r o m the i nte rne t a n d then f o r w a r d s those re q ue st s to the
a p p ro p r i a te s e r ve r.
● Tra n s p a re n t P r o y: A t ra n s p a re n t p r o x y is a p r o x y that does not m o d i f y the re q ue s t o r
re sp on se , b u t si mp ly passes the t r a ffi c along. Tra n s p a re n t p roxi e s a re ofte n used in c o r p o ra t e
e nv i ro n me n t s to m o n i to r a n d c o n t ro l access to the i nte rne t .
● A no ny m o u s P r o y: An a n o ny m o u s p r o x y is a p r o x y that hide the user's IP ad d ress, p rov i d i n g
a n additional laye r o f p rivacy.
What a re An o ny m i zer s ?
● Cl icking on unauthenticated links o r ads: Una uthe nticated links have b e e n deliberately
c r a f t e d that lead to a p h i s h e d website that t r i c k s the u s e r into t y p i n g confidential data.
Ty p e s o f Phishing Attacks
1.Email Phishing: Th e most c o m m o n t y p e w h e re u s e rs a re t r i c ke d into c l i c k i n g unverified s p a m
emails a n d leaking s e c re t data. H a c k e r s i mp ersona te a legitimate identity a n d sen d emails to mass
victims. G e n e ra l ly, the goal o f the a t t a c ke r is to get p e rs o n a l details like b a n k details, c re d i t c a r d
n u m b e r s , u s e r IDs, a n d p a ssword s o f a ny online s h o p p i n g website, installing m a lwa re , etc. A f t e r
getting the p e rs o n a l i n fo rma t i o n , t h ey use this i n fo rm a t i o n to steal m o n e y f r o m the user’s a c c o u n t
o r h a r m the targe t system, etc.
5.Vishing: Vi shi ng is also k n o w n as voice phishing. In this m e t h o d , the a t t a c ke r calls the vict i m usin g
m o d e r n ca lle r id sp oofing to c o nvi n c e the victim that the call is f r o m a t rus te d s o u rc e . At t a ckers also
use IVR to m a ke it d i ffi c u l t f o r legal authorities to t ra c e the attacker. It is ge n erally used to steal
c re d i t c a r d n u m b e r s o r confidential data f r o m the victim.
Pa s s wo rd C r a c k i n g
It is a c y b e r atta ck techniq ue w h e re u n a u t h o ri s e d individuals attempt to gain access to u s e r a c c o u n t s
or systems by d e c r y p t i n g o r byp a ssing p assword s. This activity is ofte n p e r f o r m e d usin g va ri ous
m e t h o d s a n d tools to exploit weaknesses in p a s s wo rd security.
Me t h o d s o f Pa s s wo rd C r a c k i n g
1.B r u te Fo rce Attacks: Th e a t t a c ke r systematically tries all possible combinations o f p a s s wo rd s until the
c o r r e c t on e is fo u n d .
● C o u n te r m e a s u re : Imp le men t a c c o u n t lockout policies a n d use s t ro n g , c o m p l e x p a ssword s.
2.D ict iona ry Attacks: Atta ckers use p re c o m p i l e d lists o f c o m m o n p a s s wo rd s (dictionaries) to attempt
login.
● C o u n te r m e a s u re : E n fo rc e s t ro n g p a s s wo rd policies, i nclud i ng the avoidance o f easily
guessable p a ssword s.
Me t h o d s o f Pa s s wo rd C r a c k i n g
3.Rainbow Table Attacks: Atta ckers use p re c o m p u t e d tables (rainbow tables) o f h a s h e d p a s s wo rd s to
q u i c k ly c r a c k p a s s wo rd hashes.
● C o u n te r m e a s u re : U s e salting a n d s t ro n g , unique h a s h i n g algori thms to p ro t e c t p a s s wo rd hashes.
H ow does a w o r m s p re a d ?
Unlike viruses, w o r m s don't re q u i re host files to sp re ad . This me ans that w o r m s d o n ot attach
themselves with executable files o r p ro g r a m s . Instead, w o r m s find a we a k sp ot in the system a n d
e n te r t h r o u g h a vulnerability in the n e t wo r k . B e fo re we detect a n d re m ove w o r m s f r o m o u r system,
t h ey replicate a n d s p re a d automatically a n d c o n s u m e all the n e t wo r k b andwid th. This c a n result in
the failure o f the entire n e t wo r k a n d web s e r ve r s . Because w o r m s c a n s p re a d automatically, t h e i r
s p re a d i n g sp e ed is comp a rative ly faster t h a n o t h e r ma lwa re .
Basis WO R M S VIRU S
Definition A Wo r m is a f o r m o f m a lwa re that repli c ates A V i r u s is a malicious executable c o d e attac hed
itself a n d c a n s p re a d to d i ff e re n t c o m p u t e r s via to a n o t h e r executable file wh i c h c a n b e
N e t wo r k . h a r m l e s s o r c a n m o d i f y o r delete data.
Harmful It is less h a r m f u l as c o m p a r e d . It is m o r e h a r m f u l .
In D o s attacks, a single system targets the victim In D D o S multiple systems at t a ck the victim's system.
system.
1.In- ba nd SQLi: Th e atta ckers use the same c o mmu n i c a t i o n cha nnel to l a u n c h t h e i r attacks a n d
collect results. Th e two c o m m o n t y p e s o f i n -b a n d S Ǫ L injections are:
● E r r o r - b a s e d S Q L injection: H e re , the a t t a c ke r p e r f o r m s c e rt a i n actions that cause the
database to ge nerate e r r o r messages. U s i n g the e r r o r message, yo u c a n i d en t i fy what database
it utilises, the ve rsi on o f the s e r ve r w h e re the h a n d l e rs a re located, etc.
● Union-based S Q L injection: H e re , the U N I O N S Ǫ L o p e ra t o r is used in c o m b i n i n g the results o f
t wo o r m o r e select statements ge nerated by the database, to get a single H T T P re sp on se . You
c a n c r a f t yo u r q uerie s within the U R L o r c o mb i n e multiple statements within the input fields
a n d t r y to ge nerate a response.
Ty p e s S Q L Injection?
2.Blind SQLi: H e re , it does not t ra n s fe r the data via the web application. Th e a t t a c ke r c a n n ot see the
result o f a n atta ck i n-b a nd .
● Boolean-based S Q L Injection: H e re , the a t t a c ke r will send a n S Ǫ L q u e r y to the database
a s k i n g the application to r e t u r n a d i ff e re n t result d e p e n d i n g o n wh e t h e r the q u e r y re t u r n s
Tr u e o r False.
● Time-based S Q L Injection: In this atta ck, the a t t a c ke r sends a n S Ǫ L q u e r y to the database,
wh i c h ma ke s the database wait f o r a p a r t i c u l a r a m o u n t o f time b e fo r e s h a r i n g the result . T h e
re s p o n s e time helps the a t t a c ke r to d e cid e wh e t h e r a q u e r y is Tr u e o r False.
Ty p e s o f B u ff e r O ve r f l ow Attacks
● S t a c k - b a s e d b u ff e r overflows a re m o r e c o m m o n , a n d leverage s t a c k m e m o r y that on ly
exists d u r i n g the executi on time o f a functi on.
● Hea p - ba sed attacks a re h a r d e r to c a r r y out a n d involve flooding the m e m o r y space allocated
f o r a p r o g r a m b eyo n d m e m o r y used f o r c u r r e n t r u n t i m e operations.
What is Identity T h e f t ?