CS Unit-1
CS Unit-1
IV Year BE(IT)
Cyber Security .
Cyber Security
UNIT-I
•Introduction to Cyber Security: Basic Cyber Security Concepts, Motive
of
Attackers, Active Attacks, Passive Attacks, Cyber Crime
and Information Security, Computer Criminals,
•Defamation,
Classification Internet
of CyberTime Threat,E-mail
Crimes: Salami Attack, Data Diddling,
Spoofing,
Web Jacking, Newsgroup Spam, Industrial Espionage, Hacking, Online
Forgery,
Spamming,
Frauds, Software CyberPiracy, Computer Sabotage, Email Bombing,
Newsgroup as The Source Of Cybercrimes, Computer Network Intrusions,
Usenet
Password Sniffing, Identity Theft,
•Cyber Threats-cyber Warfare, Cia
Traid
UNIT Introduction to Cyber Security
🠶-I
Basic Cyber Security Concepts
🠶 Cybercrime: Definition and Origins of the Word
🠶 The definitions of computer crime:
🠶 1. Any illegal act where a special knowledge of computer technology
is essential for its
perpetration, investigation or prosecution.
🠶 2. Any traditional crime that has acquired a new dimension or order of magnitude through the aid of a
computer, and abuses that have come into being because of computers.
🠶 3. Any financial dishonesty that takes place in a computer environment.
🠶 4. Any threats to the computer itself, such as theft of hardware or software, sabotage and demands for
ransom.
🠶 The term “cybercrime” relates to a number of other terms such as:
•Computer-related crime
•Computer crime
•Internet crime
•E-crime
•High-tech crime
UNIT Introduction to Cyber Security
🠶-I
Motive of Attackers
🠶 Two types of attack are prevalent in cybercrimes:
🠶 1. Techno-crime: A premeditated act against a system or systems, with the intent to copy, steal, prevent
access, corrupt or otherwise deface or damage parts of or the complete computer system.
🠶 2. Techno-vandalism: These acts of “brainless” defacement of websites and/or other activities, such as
copying files and publicizing their contents publicly, are usually opportunistic in nature.
(authentication)
– TCP session hijacking /IP spoofing
Examples: Interruption, Modification ( also called Release of message Traffic analysis
active wiretapping), Fabrication contents
Cybercrime can be committed against an individual or a group; it can also be committed against
government and private organizations.
It may be intended to harm someone’s reputation, physical harm, or even mental harm.
🠶 Cybercrime can cause direct harm or indirect harm to whoever the victim is.
🠶 However, the largest threat of cybercrime is on the financial security of an individual as well as the
government.
🠶 Cybercrime causes loss of billions of USD every year.
UNIT Introduction to Cyber Security
🠶-ICyber Crime and Information Security
🠶 Types of Cybercrime
🠶 Hacking
It is an illegal practice by which a hacker breaches the computer’s security system of someone for personal
interest.
🠶 Unwarranted mass-surveillance
Mass surveillance means surveillance of a substantial fraction of a group of people by the authority
especially for the security purpose, but if someone does it for personal interest, it is considered as
cybercrime.
🠶 Child pornography
It is one of the most heinous crimes that is brazenly practiced across the world. Children are sexually
abused and videos are being made and uploaded on the Internet.
🠶 Child grooming
It is the practice of establishing an emotional connection with a child especially for the
purpose of child-trafficking and child prostitution.
UNIT Introduction to Cyber Security
🠶-ICyber Crime and Information Security
🠶 Types of Cybercrime
🠶 Copyright infringement
If someone infringes someone’s protected copyright without permission and publishes that with his own
name, is known as copyright infringement.
🠶 Money laundering
Illegal possession of money by an individual or an organization is known as money laundering. It typically
involves transfers of money through foreign banks and/or legitimate business. In other words, it is the
practice of transforming illegitimately earned money into the legitimate financial system.
🠶 Cyber-extortion
When a hacker hacks someone’s email server, or computer system and demands money to
reinstate the system, it is known as cyber-extortion.
🠶 Cyber-terrorism
Normally, when someone hacks government’s security system or intimidates government or such a big
organization to advance his political or social objectives by invading the security system through computer
networks, it is known as cyber-terrorism.
UNIT Introduction to Cyber Security
🠶-ICyber Crime and Information Security
🠶 Cyber security is a potential activity by which information and other communication systems are
protected from and/or defended against the unauthorized use or modification or exploitation or even theft.
🠶 Likewise, cyber security is a well-designed technique to protect computers, networks, different
programs, personal data, etc., from unauthorized access.
Lack of information security gives rise to cybercrime
Cybersecurity: means protecting information, equipment, devices, computer, computer resource,
communication device and information stored therein from unauthorized access, use, disclosure, disruption,
modification or destruction.
UNIT Introduction to Cyber Security
-I
🠶 Computer criminals
Are those who conduct acts such as:
Credit card fraud
Cyber stalking
Defaming others online
Gaining unauthorized access to computer systems
Ignoring copyrights
Software licensing and trademark protection
Overriding encryption to make illegal copies
Software piracy
Stealing other’s identity to perform criminal acts
UNIT Introduction to Cyber Security
🠶-I
Computer Criminals
🠶 Cybercriminals are those who conduct activities such as
Child Pornography;
Credit Card Fraud;
Cyberstalking;
Defaming another online;
Gaining unauthorized access to computer systems;
Ignoring copyright,
Software licensing and trademark protection;
Overriding encryption to make illegal copies;
Software piracy and stealing another’s identity to perform criminal acts.
UNIT Introduction to Cyber Security
🠶-I
Computer Criminals
🠶 1. Type I: Cybercriminals – hungry for recognition
🠶 2. Type II: Cybercriminals – not interested in recognition
🠶 3. Type III: Cybercriminals – the insiders
Classifications of Cybercrimes
UNIT Classification Of Cyber Crimes
-I
🠶 Classification of Cyber Crimes
🠶 Cybercrimes are classified as follows:
Forgery
Cyber terrorism
Web jacking
UNIT Introduction to Cyber Security
🠶-I
Basic Cyber Security Concepts
🠶 Cybercrimes: Classification
Crimes emanating from Social Media
This may include performing regular audits, using software with built-in features to combat
such problems, and supervising employees.
UNIT Classification Of Cyber Crimes
-I
🠶 Forgery
The act of forging something, especially the unlawful act of counterfeiting a
document or object for the purposes of fraud or deception.
Something that has been forged, especially a document that has been copied or remade
to look like the original.
Counterfeit currency notes, postage, revenue stamps, marks
sheets,etc., can be forged using sophisticated computers, printers and scanners.
UNIT Classification Of Cyber Crimes
-I Jacking
🠶 Web
Confidentiality
Secure
Integrity Availability
UNIT Introduction to Cyber Security
-I Traid
🠶 CIA
🠶 CIA Security Model Confidentiality, Integrity & Availability
🠶 CIA Model
🠶 A simple but widely-applicable security model is the CIA triad standing for:
🠶Confidentiality
🠶Integrity
🠶Availability
🠶 These are the three key principles which should be guaranteed in any kind of secure
system.
🠶 This principle is applicable across the whole subject of Security Analysis, from access
to a user's internet history to security of encrypted data across the internet.
🠶 If any one of the three can be breached it can have serious consequences for the parties
concerned.
UNIT Introduction to Cyber Security
🠶-I
CIA Traid
🠶 Confidentiality
🠶 Confidentiality is the ability to hide information from those people unauthorised to view it.
🠶 It is perhaps the most obvious aspect of the CIA triad when it comes to security; but correspondingly, it is also the one which is
attacked most often.
🠶 Cryptography and Encryption methods are an example of an attempt to
ensure confidentiality of data
transferred from one computer to another.
🠶 Integrity
🠶 The ability to ensure that data is an accurate and unchanged representation of the original secure information.
🠶 One type of security attack is to intercept some important data and make changes to it before sending it on to the intended receiver.
🠶 Availability
🠶 It is important to ensure that the information concerned is readily accessible to the authorised viewer at all times.
🠶 Some types of security attack attempt to deny access to the appropriate user,
either for the sake of
inconveniencing them, or because there is some secondary effect.
🠶 For example, by breaking the web site for a particular search engine, a rival may become more popular.
UNIT Introduction to Cyber Security
🠶-IComprehensive Cyber Security Policy
At country level:
🠶 Policy directives on data security and privacy protection - Compliance,
liabilities and enforcement (ex. Information Technology Act 2000)
🠶 Standards and guidelines for compliance (ex: ISO 27001, ISO
20001 & CERT-In
guidelines)
🠶 Conformity assessment infrastructure (enabling and endorsement actions concerning security product –
ISO 15408, security process – ISO 27001 and security manpower – CISA, CISSP, ISMS-LA, DISA etc.)
🠶 Securityincident - early warningand response (National cyber alert
system and crisis
management)
•Information sharing and cooperation (MoUs with vendors and overseas CERTs and
security forums).
•Pro-active actions to deal with and contain malicious activities on the net by way of net
traffic monitoring, routing and gateway controls
•Lawful interceptions and Law enforcement.
•Nation wide security awareness campaign.
•Security research and development focusing on tools, technology, products and services.
UNIT Introduction to Cyber Security
🠶-IComprehensive Cyber Security Policy
🠶 Actions at network level
🠶 Compliance to security best practices (ex. ISO27001), service quality (ISO 20001) and
service level agreements (SLAs) and demonstration.
🠶 Pro-active actions to deal with and contain malicious activities, ensuring quality of services and protecting
average end users by way of net traffic monitoring, routing and gateway controls
🠶 Keeping pace with changes in security technology and processes to remain current
(configuration, patch and vulnerability management)
🠶 Conform to legal obligations and cooperate with law
enforcement activities including prompt actions on alert/advisories issued by CERT-In.
🠶 Use of secure product and services and skilled manpower.
🠶 Crisis management and emergency response.
UNIT Introduction to Cyber Security
🠶-IComprehensive Cyber Security Policy
🠶 Actions at corporate level:
🠶 Compliance to security best practices (ex. ISO27001), and demonstration.
🠶 Pro-active actions to deal with and contain malicious activities, and protecting average end
users by way of net traffic monitoring, routing and gateway controls
🠶 Keeping pace with changes in security technology and processes to remain
current (configuration, patch and vulnerability management)
🠶 Conform to legal obligations and cooperate with law
enforcement activities including
prompt actions on advisories issued by CERT-In.
🠶 Use of secure product and services and skilled manpower.
🠶 Crisis management and emergency response.
🠶 Periodictraining and up gradation of skills for personnel engagedin
security related
activities
🠶 Promote acceptable users’ behavior in the interest of safe
computing both within and outside.
UNIT Introduction to Cyber Security
🠶-IComprehensive Cyber Security Policy
🠶 Actions at small user level:
🠶 Maintain a level of awareness necessary for self-protection.
🠶 Use legal software and update at regular intervals.
🠶 Beware of security pitfalls while on the net and adhere to security advisories as necessary.
🠶 Maintain reasonable and trust-worthy access control to prevent abuse
of computer resources