Unit2 ch1ch2
Unit2 ch1ch2
– Mrs. Joshi received almost 40 calls in 3 days mostly at odd hours from
as far away as Kuwait, Cochin, Bombay, and Ahmadabad.
– The said calls created havoc in the personal life destroying mental
peace of Mrs. Joshi who decided to register a complaint with Delhi
Police.
– A person was using her ID to chat over the Internet at the website
www.mirc.com, mostly in the Delhi channel for four consecutive days.
– This person was chatting on the Internet, using her name and giving her
address, talking in obscene language.
– The same person was also deliberately giving her telephone number to
other chatters encouraging them to call Mrs. Joshi at odd hours.
– This was the first time when a case of cyberstalking was registered.
– Cyberstalking does not have a standard definition but it can be defined
to mean threatening, unwarranted behavior, or advances directed by
one person toward another person using Internet and other forms of
Cyberbullying
Cyberbullying as “when the Internet, cell phones
or other devices are used to send or post text or
images intended to hurt or embarrass another
person.”
Cybercafe and Cybercrimes
• It is extremely important to understand the IT security and governance practiced
in the cybercafes.
• In the past several years, many instances have been reported in India, where
cybercafes are known to be used for either real or false terrorist communication.
• Cybercrimes such as stealing of bank passwords and subsequent fraudulent
withdrawal of money have also happened through cybercafes.
• Cybercafes have also been used regularly for sending obscene mails to harass
people.
• Public computers, usually referred to the systems, available in cybercafes, hold
two types of risks.
• First, we do not know what programs are installed on the computer – that is, risk
of malicious programs such as keyloggers or Spyware, which maybe running at
the background that can capture the keystrokes to know the passwords and
other confidential information and/or monitor the browsing behavior.
• Second, over-the-shoulder surfing can enable others to find out your passwords.
Therefore, one has to be extremely careful about protecting his/her privacy on
such systems, as one does not know who will use the computer after him/her.
• Cybercriminals prefer cybercafes to carry out
their activities.
• The criminals tend to identify one particular
personal computer (PC) to prepare it for their
use.
• Cybercriminals can either install malicious
programs such as keyloggers and/or Spyware or
launch an attack on the target.
• Cybercriminals will visit these cafes at a
particular time and on the prescribed frequency,
maybe alternate day or twice a week.
A recent survey conducted in one of the metropolitan cities in India reveals
the following facts:
• Pirated software(s) such as OS, browser, office automation software(s)
(e.g., Microsoft Office) are installed in all the computers.
• Antivirus software is found to be not updated to the latest patch and/or
antivirus signature.
• Annual maintenance contract (AMC) found to be not in a place for
servicing the computers; hence, hard disks for all the computers are not
formatted unless the computer is down. Not having the AMC is a risk
from cybercrime perspective because a cybercriminal can install a
Malicious Code on a computer and conduct criminal activities without any
interruption.
• Pornographic websites and other similar websites with indecent contents
are not blocked.
• Cybercafe owners have very less awareness about IT Security and IT
Governance.
• Cybercafe association or State Police (cyber cell wing) do not seem to
conduct periodic visits to cybercafes
Here are a few tips for safety and security while
using the computer in a cybercafe:
1. Always logout:
2. Stay with the computer:
3. Clear history and temporary files:
4. Be alert:
5. Avoid online financial transactions:
6. Change passwords:
Botnets: The Fuel for Cybercrime
• A Bot is simply an automated computer program One
can gain the control of computer by infecting them with
a virus or other Malicious Code that gives the access.
• Computer system maybe a part of a Botnet even though
it appears to be operating normally.
• Botnets are often used to conduct a range of activities,
from distributing Spam and viruses to conducting
denial-of-service (DoS) attacks.
• A Botnet (also called as zombie network) is a network of
computers infected with a malicious program that
allows cybercriminals to control the infected machines
remotely without the users’ knowledge.
• Zombie networks” have become a source of
income for entire groups of cybercriminals.
The invariably low cost of maintaining a
Botnet and the ever diminishing degree of
knowledge required to manage.
• If someone wants to start a “business” and
has no programming skills, there are plenty of
“Bot for sale” offers on forums.
• ‘encryption of these programs’ code can also
be ordered in the same way to protect them
from detection by antivirus tools
One can ensure following to secure the system:
1. Use antivirus and anti-Spyware software and keep it up-to-
date.
2. Set the OS to download and install security patches
automatically
3.Use a firewall to protect the system from hacking attacks
while it is connected on the Internet: A firewall is a software
and/or hardware that is designed to block unauthorized
access while permitting authorized communications.
4. Disconnect from the Internet when you are away from your
computer.
5. Downloading the freeware only from websites that are
known and trustworthy.
6. Check regularly the folders in the mail box – “sent items” or
“outgoing” – for those messages you did not send.
7. Take an immediate action if your system is infected.
Malware: It is malicious software, designed to
damage a computer system without the owner’s
informed consent. Viruses and worms are the
examples of malware.
Adware: It is advertising-supported software,
which automatically plays, displays, or
downloads advertisements to a computer after
the software is installed on it or while the
application is being used. Few Spywares are
classified as Adware
Spam: It means unsolicited or undesired E-Mail
messages
Spamdexing: It is also known as search Spam or search
engine Spam. It involves a number of methods, such as
repeating unrelated phrases, to manipulate the
relevancy or prominence of resources indexed by a
search engine in a manner inconsistent with the
purpose of the indexing system.
DDoS: Distributed denial-of-service attack (DDoS)
occurs when multiple systems flood the bandwidth or
resources of a targeted system, usually one or more
web servers. These systems are compromised by
attackers using a variety of methods.
Attack Vector
• An “attack vector” is a path, which an attacker can gain
access to a computer or to a network server to deliver a
payload or malicious outcome.
• Attack vectors enable attackers to exploit system
vulnerabilities, including the human element.
• Attack vectors include viruses, E-Mail attachments,
webpages, pop-up windows, instant messages, chat rooms,
and deception. All of these methods involve programming,
except deception, in which a human operator is fooled into
removing or weakening system defenses.
• To some extent, firewalls and antivirus software can block
attack vectors.
• However, no protection method is totally attack-proof.
• A defense method that is effective today may
not remain so for long because attackers are
constantly updating attack vectors, and
seeking new ones, in their quest to gain
unauthorized access to computers and
servers.
• The most common malicious payloads are
viruses (which can function as their own
attack vectors), Trojan Horses, worms, and
Spyware.
The attack vectors described here are how most of them
are launched.
• Attack by E-Mail: The content is either embedded in
the message or linked to by the message.
• Attachments (and other files): Malicious attachments
install malicious computer code. The code could be a
virus, Trojan Horse, Spyware, or any other kind of
malware.
• Attack by deception: Deception is aimed at the
user/operator as a vulnerable entry point. It is not just
malicious computer code that one needs to monitor.
Social engineering are other forms of deception that
are often an attack vector too.
• Hackers: Hackers/crackers are a formidable attack
vector because, unlike ordinary Malicious Code,
people are flexible and they can improvise.
Hackers/crackers use variety of hacking tools.
• Heedless guests (attack by webpage): Counterfeit
websites are used to extract personal information.
Such websites look very much like the genuine
websites they imitate.
• Attack of the worms: Many worms are delivered as E-
Mail attachments, but network worms use holes in
network protocols directly. Any remote access service,
like file sharing, is likely to be vulnerable to this sort of
worm.
• Malicious macros: Microsoft Word and
Microsoft Excel are some of the examples that
allow macros. A macro does something like
automating a spreadsheet, for example.
Macros can also be used for malicious
purposes.
• Foistware (sneakware): Foistware is the
software that adds hidden components to the
system with cunning nature.
• Viruses: These are malicious computer codes
that hitch a ride and make the payload.
Zero-Day Attack
• A zero-day (or zero-hour) attack is a computer
threat which attempts to exploit computer
application vulnerabilities that are unknown to
anybody in the world and/or for which no patch
(i.e., security fix) is available.
• Zero-day exploits are used or shared by attackers
before the software vendor knows about the
vulnerability
Zero-day emergency response team (ZERT):
This is a group of software engineers who work to
release non-vendor patches for zero-day exploits.