CYBER Security - 1 Assignment

Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

" Uhatis Cyber

Cyhen Cim is Cam.

Ihat.
ite
either tayetr Oruses acivit Cormp
C
Computer netwoxk
neteuoyked devic. for ex
Comniting
child aud. trofficking in
pronography ond intelectua
prapekhy Sheing identitie. Or viol
Cling Cybe
pnyacy
Cime
Oieated Coinne that
Ok Hhe Compue ando netw
he o o my ben useA
use Cyber cime is the
oF
Computer as
ForCoromintHing Cmms Sucha Ceapon
CommiHing faud ldenhiky heft
ponic
Cybe Cime enclaseg c
wide range of cctivities bw
these Con qeneraliy be divided
intotwo colegone
i. Comnes that aim at Computer
networks x devices. the e
Cime lnvolvee diffement
hreots Clike virus. buqs ec) nd
denia- ot: Seaice (Dor) ttackr
use Campule
netwoks to Commit othen Cimin
al uctiities. hse ypes of Conime
Slncludecybe SBalkin9. Eincncical Fr
LJhl is cybe adtacken ?
ny malicio
atempt to gain nauthonzed cce
Complulee, Computing Sysle
Or Computer net work with the
intent to Cause dmage
Cyber altacks -Cum todisob
disnupt, destoy 0x Contl Camput
e Sysltmi oxto altei block
delete manipute. o stecd the
dasa held cithin thle Systerns.
hey use Venous techaiqu
Such cs phishing maleQne deni
l ot - Sevic attacks, cndsocid
engineuing
elives. Cyber
achiee theix ohj
autachens enploy
Nanious techiiquei Such
Compromise systems, Sealdate
Or dis rupt Opeoions
A cyben attacker Soo
whointentionclly
it wealnes in
Seeks to epo
Compulen Syslemi
netaoxks, Ox Sofware cpplic
Cakions.
thei primayobecties Can
Lncludei
A, Dotca thert: stealing Sensilive
inforcnadion Such os. persona
daa. financic reord, 0Y propen
2.finan sialqauni Cornniting frraud,
extortion, O tehet ofFinantial qsseg
3, Diptioa Some
disrupt oper aianr
Commcncations Oxganiz adians
govenments. Oelen foe palilical ide
olagiccd Ox Compe tilive easons.
4.Espionage: state- Sponsaed. cttack
Conduct espionage hy in
Pilkeo ting Syst ernsto ouhe intelli
monitor activitie.

S. SaboageiAtfackens ain ta
damage Ox
data Causing
de stroy Systems
Operaiona diruptie
ham

9.3ha is Cyber
Ciminals.
Cyber Ciminals Individuals
garoup who engage in ileqal ac
ivitie onlin Such as
hacking dal
breachea,phishing
ding 'nalwaie
Scams and spea
heyexploi!
in Computer Syskems
vad nerabililie
cnd netwo.
rks Rinancial
Cause disruphioa. che
Cyber Cime posessigaificanl
challegens tocybea nd
Continlious to mi
Ligale preen Such Hhore
Rainbou'
PAGE:
|DATE:/

Q.4) Explain'classificahian of Cybe Cim


in delail.
classfiCohions of Cyber Crim
1 . financial Cnmes

Online fraud:
include phishing
identity theft.
cnd otherseheme Cimed nd
investmentSchemes.

Ahis invalves the


ats exposing SensiHive infornaion
diupling
SOm is
syslems unless a
paid.

this inuolves thr


Of expOSung Sensitive infoxm
ation Qx diirupling systems nless
rand om ispcud
money laundmng
Cimnals use
Online platforms to Conced the
Originols obtained
manet
2.Cybr Altacks

maWaei
softwot desined to
disruptdamageO qoun unathoi
2ed Ccceir to Computea Systems.
Examples includu uie ufes
YnSocare Cund Spywane
Denicd- of-Seraice Cnas
Ovenloadin
excssie
Serea Seaic avoilabil
Araffic diszupl
Cinauhozd CCeer to
Compaer Systems
explok vwlaeabilile fo malicious
prpasei

3. cybe Espionagei
inaulhomzed accelr to clasiied
inforn ation-H
Alle'goly obtaunins
Coa Fidential oclassiÇied informnatiar
fran gou ercnents, oxpoTalians, o
individuae
"Tatelleckual prapeey
unauhoizd accels to pocopneta in F
Orrnation, frade Seets or Intelle a popet
n diutces emotional
individuar Cn tox
ic toskalk
Communicalions
using
Cyberstalking
uals.indiyid harrn Or
Limidate
eaten.
in inends
to that viaur
ho Contact
or online unwanted
esistent
-HaraSSnint
bullyingi
ybex Hasassment
and Onlin G.
cks Co0rdinate Or
ideloqies.,
re etemit menbers 'tad
platfom
sp to usingoalin
dpadicaliz
ions por0pagcnda
disiupkian use
ystems
a to aJorkSS
power
eation
d gndes,
Cs
essen
Taxgeting
ch emice s iad AHacks
on
astru infx citica oa "
teronsm cyber 4.
DATE
PAGL
Rainbotw
Whal i CsebJacking.
\debJacking typically eEes to the
unathoizeA take Qvex
cebsite by
involel goining
accessto Ser
Conten t managmntSystem
and malking changeeto the stte
Cuilhouthe Owae's peemision
Aspects of web' ackingi
CcCesi
cweb Jacking
lavolies .cceegring Cehsite backe
adaiii steatie functions cithoul
prape aha i2adión hir Çoutd be
achieed thotoughwebsies
exploting Vulnea
biliiej i the secwnhy
Such as. Cweak passwoxdt Qtdaded
nerabities.

2. Defacement
The ponna Joa
eh jacking is often to defac
the Calebsite. his mea
clteiag
ppeot ana of the sieby repla
Cing th Qnginad Cantent cilh a
me ssage Lmage Cantent Inten
dedto embass Send mes
visitos
Rinbow
DATE

3. motivalions
Web dacking
Cen be. Carrned ou PorVano u
reasons. including polilitical uctivism,
ldeological stodents. personal en
dellas, Or simply to demonstale
hacking prrotwes In Sone Cases i
may cuso involve in somdemands
extortion ctt em pts cihe hack
Crs denand monet
Ceesions forom the cuebsite Owne
In exchange foy restaonng the sike
4. Legal implicaiansi
Web Jacking
/s illega in most Juns dic hisnr
becauseit involvesunawhonzd
Compuer Systens cnd
data. depending on the Seieoh cud
irnpact O0 the inciduntprepercd
wel acking fac
Cinin al chog es to hac
king. enaulhonzed aceys date
ternpeing, Or othes Cyber rimes.
S. prevnlion:
Website Ownes Cen
lake meosuce! to Pooteet
agains Web Jacking.
lwhalis passdSniefing i
pass Wnd `iSaif£ing ausoknowO
CLs packetSaiEing ax network Sni
Efing a techaiqeeused by
LCio us cLetors to intecept
Captu nencaypted dta packels,
Qs they toaense aetock. this
method cllowr cttackers to obkcuin
Sensitie infoxnation Such cr user
Aame pasS Words coe dit caxd
numbecs cnd othe Con fi dentia dl.
toronsmitted Oee he ework
" Here's ho pasaxd Sniffiag ypie

Specialized Saftiare toals Called


packef Saiffes
}ers to moniton toePfic.
2 packel cctue'
cwhn a user
wesile cuppli cation.
Seichat ceu
Aetaok
Snile' deite in plain text Cunenc
pted the login Coedenhials Cuseaa
pass wgr)
he da packe
3 Data intercpion
he packel Sni
Riinbow

inte cep tsthese data pack ekr cs


theypass through he netwok.
Can Copui and Store he
Contenlr ofhele packetinçluding
4Sensiie afomation ike Coredniak
4. Extáclion af parwod:
ACte Cep
tuing
cker
the detcq packes the auta
Con decode
thi plaintext passwxd
Captured packek: using vanous tec
haiqu Cnd tals
potenial (mpacs:
WiEh acas
to login Credentiade autackexs
Con Impersonalelegitimate Usee
guin Cinadh0-2 ed aces
Cocnts steal Sensitie in Pocnali
othermeliciour
aehivikíes depeading On the Cre
dential obka'nd.

Explain cIA tied.


mod
fundamuntal
designd to guid Organi
Zatisn' in implementing secunty
policies! and
their Valuable assets and deta.
the CIA stand for Conidenialiby
integiity ond availabilikHeis
ainbou'

an exp lanalionof each Comporu


A Con fidentialihy
Confidntialy ens
hal dat is Accessd oay by
a whozd individuas Systens, Ox
prosses Ik 1nuolve poevtnling tun
ihomzed acCegr to Sensitie infor
maion whether i's penoncd data
financicl e Cards tade Secet.
Ointellectuapxopety
*Tmplem entaliont
techaiqtues Such
encaypHion accus Controls (eg
passcontds biomakica data mnar
kingand Se cus Commnicadion pc
hocals Ce.g.Ss LITLS) Oe used to
maintein Can fidentiality
2. Tote qnty

Tnte rity esine the!


daa enains acurati Consistanl
cind hust worthy thróughou lts
\ifcyle ik inu ales pooleCling da
from naulhoizd modificodion,
deleioa, 0r tam penng
Tmplemeataion
rchni ues Suchi
doka Va idct ion. Checkusln
gitad signatues. and a cer Contol
help meintain dala integil
thesemeasurts ensure that doe
Ls no+ cultered malicioy ov in
Preserving itr veliabili
adveL oithinesI.
3. Avauilability :
definition:
Availabilihy
thas ata cund systemi
SSible cnd csable by cuthorieud
pcing dismions. to Seic!.
$yst emso dota due to cLttacke
dis asters.
Lmplementalion!
as
Techniques
edundan ay Ceig.bcckupsfalSuch
loe system) disaster ecovert
plens Paltolerant lrchilecturg
cnd xóbusk nwor k cnd inf
rastutt deSiqns ensue high au
ai labiliky he e meesusesminimi7e
downtime ondense Coniniy
Opereionseen in he'fa ce.
0F disuptians.
" a vWn erability efs to
kness
CUoxkSoftware dware ha
Cowd be exploited by Allackes o
lompromise the Seuty of the Syser
Wuneabilitiep Can eist la Vanous
Campan entr of Campuing enviyon
bom Softw
t Cen rane
bugr nd to oisConfig uvol!
desiga Class.
Tpes of Vulaeacibiliy:
4softwart Nneabilityi
thise /ncl
Ude Coding eooxs lagic Flaws. 0
Ampropene, lmplementatians in SoClw
ápplicaion o speraking sysle
ms Exampleii Sql indecdion,Crost
Fhe sike scaphing Cxs) and inse
desenclizalon
Netwck wulnerabilitiesi

weaeese in nelwxk potoco,


Configuaions Oy denic Ce.g.
rotecl Swikeheg) hat Cotd be
exploiled to qain unathamzed aca
disnp netore k opeations.
2: Lmpacl of Vuneabliie:

Nulnerabilty Çon
leadko Cnalhoied dless to
Sensitiedai eslhing, in dala
breaches Cund exposut of Confid
entil infonulisn

se-wie dísruptions:
Explohing Vuda
etbilkies Can Cause disnuptions.
ln Seicesdenial oCsevia ctka
Systen Coashe.

Nalheabilities Ceun
be' explotted Foy inancicd ga'n.
Such as thuagh theft of funde.
froidalent itransc cions, Oy´ ren Som
demaAds.

3 Discove and niligalioni:


Nulneaabiity cssesmnti
Reeulan
àSSessmnt andScens ase Con
ductt to idintiy Vuneabilii
uithin Systems eund
petch maegmnt nceVlnea
secunty GE isk he
and face Sur`ur mize
timatta
ck
atta
ca a he e
in iu
manner
to
vne.
ing. ciddesring
Itivolues and mhizing
uning Org main Ppstut Secunty
lunerability Fox Crucl'a is
ECfectie "
eploitcdion. of isk
itigadion
he Cund
weakneees
e fiz to' Pplied pdades
atehed idantii
ed abililico

You might also like