Cyber Security-Unit-II

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 29

Cyber Security

Mr.V.Yuvaraj
Assistant Professor – Department of Computer Applications
Dr. N.G.P. ARTS AND SCIENCE COLLEGE
Dr. N.G.P.-KALAPATTI ROAD
COIMBATORE-641 048
Tamil Nadu, India
Mobile: +917502919891,
E-mail: [email protected]

Dr. NGPASC
COIMBATORE | INDIA
UNIT-II

Cyber offenses: How Criminals Plan them?


Categories of Cybercrime – How Criminals Plan
the Attack?: Reconnaissance, Passive Attacks,
Active Attacks, Scanning and Scrutinizing
Gathered Information, Attack( Gaining and
Maintaining the System Access) – Social
Engineering: Classification of Social Engineering
– Cyberstalking: Types of Stalkers, How Stalking
works? - Cybercafe and Cybercrime.
Dr. NGPASC
COIMBATORE | INDIA
Categories of Cybercrime
Introduction

In today’s world of Internet and computer networks, a criminal


activity can be carried out across national borders with “false sense
of anonymity”.
An attacker would look to exploit the vulnerabilities in the networks
such as:
1. Inadequate border protection (border as in the sense of
network periphery);
2. remote access servers (RASs) with weak access controls;
3. application servers with well-known exploits;
4. misconfigured systems and systems with default
configurations.
Dr. NGPASC
COIMBATORE | INDIA
Categories of Cybercrime
Categories of Cybercrime
Cybercrime can be categorized based on the following:
1. The target of the crime and
2. whether the crime occurs as a single event or as a series of
events.

The target of the crime


1. Crimes targeted at individuals
2. Crimes targeted at property
3. Crimes targeted at organizations
4. Single event of cybercrime
5. Series of events
Dr. NGPASC
COIMBATORE | INDIA
Categories of Cybercrime

Dr. NGPASC
COIMBATORE | INDIA
How Criminals Plan the Attacks
How Criminals Plan the Attacks

1. Reconnaissance (information gathering) is the first phase and is


treated as passive attacks.
2. Scanning and scrutinizing the gathered information for the
validity of the information as well as to identify the existing
vulnerabilities.
3. Launching an attack (gaining and maintaining the system
access).

Dr. NGPASC
COIMBATORE | INDIA Cyber Security by Nina Godbole/Sunit Belapure
Copyright  2011 Wiley India Pvt. Ltd. All rights reserved.
How Criminals Plan the Attacks

Reconnaissance
“Reconnaissance” is an act of reconnoitering – explore, often with the goal of
finding something or somebody (especially to gain information about an
enemy or potential enemy).

Reconnaissance begins with “Foot printing” – this is the preparation toward


pre-attack phase
 involves accumulating data about the target’s environment and computer
architecture to find ways to intrude into that environment.

Passive Attacks
 A passive attack involves gathering information about a target without
his/her (individual’s or company’s) knowledge.
 It is usually done using Internet searches or by Googling an individual or
company to gain information.
Dr. NGPASC
COIMBATORE | INDIA
How Criminals Plan the Attacks

Active Attacks
 An active attack involves probing the network to discover individual hosts to
confirm the information gathered in the passive attack phase.
 It involves the risk of detection and is also called “Rattling the doorknobs”or
“Active reconnaissance.”
 Active reconnaissance can provide confirmation to an attacker about security
measures in place.

Scanning and Scrutinizing Gathered Information


The objectives of scanning are:
1. Port scanning: Identify open/close ports and services.
2. Network scanning: Understand IP Addresses and related information about
the computer network systems.
3. Vulnerability scanning: Understand the existing weaknesses in the system.

Dr. NGPASC
COIMBATORE | INDIA
How Criminals Plan the Attacks

Attack (Gaining and Maintaining the System Access)


After the scanning and enumeration, the attack is launched
using the following steps:
1. Crack the password;
2. exploit the privileges;
3. execute the malicious commands/applications;
4. hide the files (if required);
5. cover the tracks – delete the access logs, so that there is no
trail illicit activity.

Dr. NGPASC
COIMBATORE | INDIA
Social Engineering
Social Engineering

 It is the “technique to influence” and “persuasion to deceive”


people to obtain the information or perform some action.
 Social engineers exploit the natural tendency of a person to
trust social engineers’ word, rather than exploiting computer
security holes.
 Social engineering involves gaining sensitive information or
unauthorized access privileges by building inappropriate trust
relationships with insiders.
 The sign of truly successful social engineers is that they receive
information without any suspicion.
Dr. NGPASC
COIMBATORE | INDIA
Social Engineering

Classification of Social Engineering


1. Human-Based Social Engineering
Human-based social engineering refers to person-to-
person interaction to get the required/desired
information.
2. Computer-Based Social Engineering
Computer-based social engineering refers to an attempt
made to get the required/desired information by using
computer software/Internet.

Dr. NGPASC
COIMBATORE | INDIA
Social Engineering

Dr. NGPASC
COIMBATORE | INDIA
Social Engineering

Dr. NGPASC
COIMBATORE | INDIA
Social Engineering

Dr. NGPASC
COIMBATORE | INDIA
Social Engineering

Dr. NGPASC
COIMBATORE | INDIA
Social Engineering

Dr. NGPASC
COIMBATORE | INDIA
Social Engineering

https://emkei.cz/

Dr. NGPASC
COIMBATORE | INDIA
Cyberstalking
Cyberstalking
 It is defined as the use of information and communications
technology, particularly the Internet, by an individual or group
of individuals to harass another individual, group of
individuals, or organization.
 Cyberstalking refers to the use of Internet and/or other
electronic communications devices to stalk another person.
 It involves harassing or threatening behavior that an individual
will conduct repeatedly.
 As the Internet has become an integral part of our personal
and professional lives, cyberstalkers take advantage of ease of
communication and an increased access to personal
information
Dr. NGPASC
available with a few mouse clicks or keystrokes.
COIMBATORE | INDIA
Cyberstalking

Types of Stalkers
There are primarily two types of stalkers as listed below:
1. Online stalkers: They aim to start the interaction with the
victim directly with the help of the Internet.
2. Offline stalkers: The stalker may begin the attack using
traditional methods such as following the victim, watching the
daily routine of the victim, etc.

Dr. NGPASC
COIMBATORE | INDIA
Cyberstalking

How Stalking Works?


1. Personal information gathering about the victim
2. Establish a contact with victim through telephone/cell
phone. Once the contact is established, the stalker
may make calls to the victim to threaten/harass.
3. Stalkers will almost always establish a contact with the
victims through E-Mail. The stalker may use multiple
names while contacting the victim.
4. Some stalkers keep on sending repeated E-Mails
asking for various kinds of favors or threaten the
victim.
Dr. NGPASC
COIMBATORE | INDIA
Cyberstalking

5. The stalker may post the victim’s personal information on any


website related to illicit services such as sex-workers’ services or
dating services, posing as if the victim has posted the information
and invite the people to call the victim on the given contact details
The stalker will use bad and/or offensive/attractive language to
invite the interested persons.
7. Whosoever comes across the information, start calling the victim
on the given contact details asking for sexual services or
relationships.
8. Some stalkers subscribe/register the E-Mail account of the victim
to innumerable pornographic and sex sites, because of which
victim will start receiving such kind of unsolicited E-Mails.
Dr. NGPASC
COIMBATORE | INDIA
Cyberstalking

Dr. NGPASC
COIMBATORE | INDIA
Cybercafe and Cybercrimes

Cybercafe and Cybercrimes


 Cybercrimes such as stealing of bank passwords and
subsequent fraudulent withdrawal of money have also
happened through cybercafes.
 Cybercafes have also been used regularly for sending obscene
mails to harass people.
 Indian Information Technology Act (ITA) 2000 interprets
cybercafes as “network service providers” referred to under the
erstwhile Section 79, which imposed on them a responsibility
for “due diligence” failing which they would be liable for the
offenses committed in their network.

Dr. NGPASC
COIMBATORE | INDIA
Cybercafe and Cybercrimes

Dr. NGPASC
COIMBATORE | INDIA
Cybercafe and Cybercrimes
Cybercriminals can either install malicious programs such as
keyloggers and/or Spyware or launch an attack on the target.
Here are a few tips for safety and security while using the
computer in a cybercafe:
1. Always logout
2. Stay with the computer
3. Clear history and temporary files
4. Be alert
5. Avoid online financial transactions
6. Change passwords
7. Virtual keyboard
8. Security warnings
Dr. NGPASC
COIMBATORE | INDIA
Dr. NGPASC
COIMBATORE | INDIA
Dr. NGPASC
COIMBATORE | INDIA Cyber Security by Nina Godbole/Sunit Belapure
Copyright  2011 Wiley India Pvt. Ltd. All rights reserved.
Dr. NGPASC
COIMBATORE | INDIA
Dr. NGPASC
COIMBATORE | INDIA 29

You might also like