2 Cyberattacks Cybersecurity and Cyber Law
2 Cyberattacks Cybersecurity and Cyber Law
2 Cyberattacks Cybersecurity and Cyber Law
Threat Landscape
The threat landscape refers to the overall scope and variety of potential cybersecurity threats
that organizations, individuals, and systems face in the digital environment. This landscape
is dynamic and constantly evolving as technology advances and cybercriminals develop new
techniques.
Computer Incidents
8. Social Engineering Attacks: Manipulative tactics that exploit human psychology to gain
access to sensitive information or perform unauthorized actions. This can include
impersonation, pretexting, or baiting.
10.Physical Security Incidents: Events that compromise the physical security of computer
systems or data centers, such as theft, vandalism, or natural disasters.
• Bring Your Own Device (BYOD) policies, which allow employees to use personal
devices for work, have become more common. While BYOD policies offer
flexibility and convenience, they also introduce security challenges. Personal
devices may lack the same level of security controls as corporate devices, and
their use in work environments can lead to increased exposure to threats,
especially if not properly managed and secured.
Cybercriminals and threat actors continually evolve their tactics, techniques, and procedures.
Their increasing sophistication, often fueled by financial motives or geopolitical interests,
allows them to develop advanced and targeted attacks. This includes the creation of
sophisticated malware, use of zero-day exploits, and social engineering techniques that can
trick even well-informed individuals. The arms race between cybersecurity defenses and
malicious actors contributes to the widespread nature of computer incidents.
Introduction to Exploit
Categories of Exploits
Exploits can be classified into several broad categories based on the nature of the
vulnerabilities they target and the methods they use. Here are some common categories:
• Physical exploits: These exploits involve physical access to systems or devices such as
hardware keyloggers, USB-based attacks, tampering with hardware or firmware, etc.
Known exploits: Known exploits refer to vulnerabilities or attack methods that have already
been discovered, documented, and made public, either by security researchers, software
vendors, or malicious actors. They are typically associated with specific software, operating
systems, or network configurations. Once a vulnerability becomes known, security
researchers, hackers, and software vendors work to address and patch the vulnerability to
prevent further exploitation. Here are some examples of known exploits:
Both known and unknown exploits pose significant risks to IT systems and networks, such as
unauthorized access, data loss or theft, service disruption, malware distribution, privacy
breaches, financial fraud, etc. Organizations and individuals should maintain strong security
practices, including regular updates, employing intrusion detection systems, network
monitoring, and practicing safe browsing habits to minimize the impact of known and
unknown exploits.
The CIA security triad, also known as the CIA triad, is a fundamental framework in
information security that represents three core principles essential for safeguarding
data and systems. The three components of the CIA triad are:
1. Confidentiality:
• Confidentiality ensures that information is protected from unauthorized access
and disclosure. It involves controlling access to sensitive data, ensuring that only
authorized individuals or systems can view or access it. Encryption, access
controls, and secure communication channels are common measures used to
maintain confidentiality.
2. Integrity:
3. Availability:
• Availability ensures that information and systems are accessible and usable by
authorized users when needed. This involves preventing disruptions or outages
due to various factors, such as hardware failures, software glitches, or malicious
attacks. Redundancy, disaster recovery planning, and robust infrastructure
design are strategies to enhance availability.
2. Integrity
o Ensure employees are knowledgeable about compliance and regulatory
requirements to minimize human error.
o Use backup and recovery software and services. o Use version control, access
control, security control, data logs and checksums.
3. Availability
o Use preventive measures, such as redundancy, failover and RAID. o Ensure
systems and applications stay updated. o Use network or server monitoring
systems. o Have a data recovery and business continuity plan in place in case
of data loss.
Implementing CIA security triad at organizational level
Implementing the CIA security triad at an organizational level involves developing and
enforcing comprehensive security policies, procedures, and technical controls.
Here are key steps and considerations for implementing the CIA triad:
1. Risk Assessment:
• Develop clear and comprehensive security policies and procedures that align
with the principles of confidentiality, integrity, and availability. These
documents should cover aspects such as data handling, access controls,
encryption, incident response, and acceptable use.
3. Access Controls:
4. Encryption:
Implement encryption mechanisms to protect data both in transit and at rest. This
is crucial for maintaining the confidentiality and integrity of sensitive
information. Encryption protocols such as SSL/TLS for communication and disk
encryption for stored data are common practices.
Establish regular and reliable backup procedures to ensure the availability of data
in the event of system failures, disasters, or ransomware attacks. Develop and
test disaster recovery plans to minimize downtime and data loss.
Implement incident response procedures to detect, respond to, and recover from
security incidents. Establish monitoring systems for realtime detection of
anomalies or suspicious activities that could impact the confidentiality, integrity,
or availability of data.
9. Patch Management:
11.Continuous Improvement:
Implementing the CIA security triad at the network level involves applying specific technical
measures to safeguard the confidentiality, integrity, and availability of data and systems
within the organization's network. Here are key considerations and measures for
implementing the CIA triad at the network level:
1. Firewalls:
• Deploy firewalls at network entry points to control and monitor incoming and
outgoing traffic. Configure firewall rules to enforce security policies and restrict
unauthorized access.
4. Network Segmentation:
• Divide the network into segments or zones based on different levels of trust and
sensitivity. This helps contain and isolate potential security incidents, preventing
lateral movement of threats.
5. Access Controls:
• Enforce access controls at the network level to restrict unauthorized users from
accessing sensitive resources. Utilize technologies such as VLANs (Virtual Local
Area Networks) and implement role-based access control (RBAC) policies.
6. In-Transit Encryption:
• Deploy DoS protection mechanisms to mitigate the impact of DoS attacks. This
can include rate limiting, traffic filtering, and the use of specialized appliances or
services.
Intrusion Detection Systems (IDS) are security tools designed to detect and respond to
unauthorized or malicious activities within a computer network. There are two main types
of intrusion detection systems: Network-based Intrusion Detection Systems (NIDS) and Host-
based Intrusion Detection Systems (HIDS). Additionally, some systems incorporate elements
of both and are known as Hybrid Intrusion Detection Systems (HIDS/NIDS). Here's an
overview of each:
• Advantages:
• Challenges:
• Deployment: Installed directly on the host systems they protect, allowing them
to monitor local events and detect deviations from normal behavior.
• Advantages:
• Can detect local threats that may not be visible at the network level.
Challenges:
• Advantages:
• Pros:
• Cons:
• Pros:
• Cons:
• Pros:
• Cons:
• May generate false positives.
Authentication Methods
1. Authentication Methods:
Authentication is a crucial component of the CIA security triad, particularly in ensuring the
confidentiality and integrity of information at the application level. Authentication methods
involve the verification of the identity of users and entities accessing the application.
Common authentication methods include username/password combinations, multifactor
authentication (MFA), biometric authentication (such as fingerprint or facial recognition),
and token-based authentication. These methods help prevent unauthorized access to
sensitive data and functionality within the application. By implementing robust
authentication measures, organizations can enhance the confidentiality of user credentials
and ensure that only authorized individuals have access to specific resources or actions.
Additionally, secure authentication mechanisms contribute to maintaining the integrity of
user accounts and the overall application environment.
Assigning specific roles and privileges to users is a key aspect of implementing the CIA
security triad at the application level. User roles and accounts play a critical role in
maintaining both confidentiality and integrity within the application. By defining different
roles based on job responsibilities or organizational hierarchy, access controls can be
enforced to limit users' permissions to only what is necessary for their roles. This ensures
that users have the appropriate level of access to perform their tasks without unnecessary
exposure to sensitive information. Additionally, user account management practices, such as
regular reviews, account provisioning, and de-provisioning, contribute to maintaining the
integrity of user account information. Properly configured user roles and accounts contribute
to a secure and wellcontrolled environment, reducing the risk of unauthorized access and
potential data breaches.
3. Data Encryption:
Data encryption is a fundamental measure for safeguarding the confidentiality and integrity
of sensitive information within an application. Encryption involves converting plaintext data
into ciphertext using cryptographic algorithms, making it unreadable without the
appropriate decryption key. At the application level, encryption is applied to various aspects,
including data in transit and data at rest. For data in transit, implementing secure
communication protocols such as TLS/SSL ensures that information exchanged between the
application and users remains confidential during transmission. Data at rest, stored within
databases or file systems, can be protected using encryption to prevent unauthorized access
or tampering. Strong encryption practices contribute significantly to preserving the
confidentiality of sensitive data, preventing unauthorized interception or access.
Furthermore, the use of encryption helps maintain the integrity of data by ensuring that it
remains unchanged and secure from tampering or unauthorized modifications.
Authentication Factors
Authentication factors are the elements or pieces of information used to verify the identity
of an individual or entity attempting to access a system, application, or resource. Multi-factor
authentication (MFA) typically involves the use of two or more of these factors to enhance
the security of the authentication process. The five main categories of authentication factors
are:
1. Knowledge Factors:
• Examples:
2. Possession Factors:
• Examples:
• Smart Cards: Physical cards embedded with integrated circuits, often
requiring a card reader for authentication.
• Examples:
4. Location Factor:
• Implementation:
• Use Case:
• If a user typically accesses an application from a specific geographic region
and suddenly attempts to log in from a different, unexpected location, the
system may flag this as a suspicious activity.
5. Time Factor:
• Definition: The time factor involves considering the specific time at which
an authentication attempt occurs.
• Implementation:
• Use Case:
Implementing the CIA security triad at the end-user level involves several key considerations:
3. Device Security:
Users should be kept informed about the latest security threats through regular
updates and training sessions. Ongoing education ensures users understand
how to recognize and mitigate threats, reinforcing the principles of
confidentiality, integrity, and availability.
Response to Cyberattack
An organization should be prepared for the worst—a successful attack that defeats all or
some of a system's defenses and damages data and information systems.
A response plan should be developed well in advance of any incident and be approved by
both the organization's legal department and senior management.
A well-developed response plan helps keep an incident under technical and emotional
control. In a security incident, the primary goal must be to regain control and limit damage,
not to attempt to monitor or catch an intruder. Sometimes system administrators take the
discovery of an intruder as a personal challenge and lose valuable time that should be used
to restore data and information systems to normal.
1. Incident notification
2. Protection of evidence and activity logs
3. Incident containment
4. Eradication
5. Incident follow-up
6. Using an MSSP (managed security service provider)
7. Computer Forensics
1. Incident Notification:
• Preserving digital evidence is critical for understanding the scope and nature of
the cyberattack. This involves creating backups of affected systems, capturing
network traffic, and maintaining detailed activity logs. Properly handled
evidence is crucial for both internal investigations and potential legal
proceedings.
3. Incident Containment:
• Containment aims to limit the impact of the cyberattack by preventing its
spread. This may involve isolating compromised systems, blocking malicious
network traffic, or temporarily disabling compromised user accounts. The goal
is to minimize further damage and create a controlled environment for
investigation and recovery.
4. Eradication:
• Once the incident is contained, the focus shifts to identifying and eliminating the
root cause. This involves conducting a thorough analysis of affected systems,
identifying vulnerabilities, removing malware, and applying patches to prevent
similar incidents in the future. Eradication is crucial for closing security gaps and
strengthening overall cybersecurity defenses.
5. Incident Follow-Up:
• Post-incident analysis is essential for learning from the attack and improving
cybersecurity practices. The incident response team reviews the attack's tactics,
techniques, and procedures (TTPs), identifies areas for improvement, and
updates security policies and procedures accordingly. Lessons learned during
the follow-up process contribute to a more resilient security posture.
7. Computer Forensics:
Cyber Law
Cyber law, also known as internet law or digital law, refers to the legal framework that
governs activities in the digital realm, encompassing the internet, electronic communication,
and cyberspace. It is a branch of law that addresses legal issues and challenges arising from
the use of technology, particularly in the context of computer systems, networks, and the
online environment.
Importance
Cyber laws act as a deterrent by offering legal recourse and prescribing penalties for various
cybercrimes. This proactive approach helps curb illegal online activities and provides a safer
digital environment for individuals and businesses alike.
• Data Privacy:
The legal framework provided by cyber laws is crucial for the regulation of ecommerce. It
defines rules for online transactions, contracts, and consumer protection, thereby fostering
a fair and secure online marketplace.
Cyber laws play a pivotal role in protecting intellectual property rights in the vast digital
domain. These laws prevent the unauthorized use and distribution of digital content,
encouraging innovation and creativity by safeguarding the fruits of intellectual labor.
Privacy Laws:
Privacy laws focus on protecting individuals' personal information from unauthorized access
and use. They establish guidelines for the responsible handling of personal data by
organizations, ensuring individuals' privacy rights are upheld.
• Cybercrime Laws:
Cybercrime laws define and penalize various cybercrimes, ensuring legal consequences for
offenders. These laws play a crucial role in deterring individuals from engaging in illegal
online activities and provide a legal framework for prosecuting cybercriminals.
• E-commerce Laws:
E-commerce laws regulate online business transactions, defining rules for contracts,
transactions, and consumer protection. These laws contribute to the establishment of a
secure and fair online marketplace.
Cyber defamation laws address libel and slander in the digital space. They provide legal
remedies for individuals or entities whose reputations may be tarnished by false or damaging
information circulated online.
• Cybersecurity Laws:
Cybersecurity laws establish standards for securing digital systems and data. These laws
mandate organizations to implement measures to protect against cyber threats, contributing
to the overall resilience of digital infrastructure.
Social media laws address legal issues related to social media platforms, including user rights
and content regulations. These laws aim to strike a balance between freedom of expression
and the prevention of online abuse or misinformation.
Governing the validity and enforceability of contracts formed online, cyber contracts and e-
signature laws provide legal certainty for electronic transactions. They facilitate the growth
of online commerce by ensuring the legal recognition of digital agreements.
With the increasing prevalence of cross-border cybercrimes, international cyber laws address
the need for cooperation between nations. These laws facilitate collaboration in
investigating and prosecuting cybercriminals operating across borders.
Mandating organizations to inform individuals and authorities in the event of a data breach
of data breach notification laws enhances transparency and accountability. They ensure
prompt action in response to security incidents, minimizing the potential impact on
individuals and businesses.
Property- Usage, and transmission of harmful programs, theft of information and data from
financial institutions, intruding cyberspace, computer vandalism, and unauthorized
possession of information digitally are some of the crimes under the property.
Government- The crimes that come under this are cyber terrorism, manipulation, threats,
and misuse of power against the Government and citizens. Groups or Individuals terrorizing
Government websites is when this form of cyber terrorism occurs.
This is Nepal's first cyber law. Cyber crimes were dealt with under the Country's criminal code
before this law came into force. Since the cases of Cyber crime increased, it became
necessary to enact a separate law. Chapter 9 of the Act deals with offences relating to
computers, the main highlights of which are as follows:
* Accessing any computer system without authority results in imprisonment for three
years, or a fine of two hundred thousand rupees, or both.
* Commission of a computer fraud carries imprisonment for two years, or a fine of one
hundred thousand rupees, or both,
• .