Unit 5
Unit 5
Cybercrime that targets computers often involves viruses and other types of malware.
Cybercriminals may infect computers with viruses and malware to damage devices or stop them working. They may
also use malware to delete or steal data.
Cybercrime that stops users using a machine or network, or prevents a business providing a software service
to its customers, is called a Denial-of-Service (DoS) attack.
Cybercrime that uses computers to commit other crimes may involve using computers or networks to spread malware,
illegal information or illegal images.
Sometimes cybercriminals conduct both categories of cybercrime at once. They may target computers with viruses first.
Then, use them to spread malware to other machines or throughout a network.
Cybercriminals may also carry out what is known as a Distributed-Denial-of-Service (DDos) attack. This is similar to a
DoS attack but cybercriminals use numerous compromised computers to carry it out.
Cybercrimes against property - The second category of Cyber-crimes is that of Cybercrimes against all forms of
property. These crimes include computer vandalism (destruction of others' property), transmission of harmful
programmes.
Cybercrimes against government - The third category of Cyber-crimes relate to Cybercrimes against Government.
Cyber terrorism is one distinct kind of crime in this category. The growth of internet has shown that the medium of
Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the
citizens of a country. This crime manifests itself into terrorism when an individual "cracks" into a government or military
maintained website.
Types of cybercrime
Here are some specific examples of the different types of cybercrime:
Email and internet fraud - Email fraud (or email scam) is intentional deception for either personal gain or to
damage another individual by means of email. Internet fraud is the use of Internet services or software with
Internet access to defraud victims or to otherwise take advantage of them.
Identity fraud (where personal information is stolen and used) - is the use by one person of another person's
personal information, without authorization, to commit a crime or to deceive or defraud that other person or a
third person.
Theft of financial or card payment data - The purpose may be to obtain goods or services, or to make
payment to another account which is controlled by a criminal.
Theft and sale of corporate data - Data theft is the act of stealing information stored on corporate databases,
devices, and servers. This form of corporate theft is a significant risk for businesses of all sizes and can originate
both inside and outside an organization.
Cyberextortion (demanding money to prevent a threatened attack) - Cyberextortion is a crime
involving an attack or threat of an attack coupled with a demand for money or some other response in return for
stopping or remediating the attack.
Cyberextortion attacks start with a hacker gaining access to an organization's systems and seeking points of
weakness or targets of value. While ransomware attacks can be automated through malware spread by email,
infected websites or ad networks, these attacks tend to spread indiscriminately, and they may result in only a
small percentage of victims paying the extortionists. More targeted attacks can produce less collateral damage
while providing more lucrative targets for the extortion attempt.
Ransomware attacks (a type of cyberextortion) - Ransomware is a type of malicious software
(malware) that threatens to publish or blocks access to data or a computer system, usually by encrypting it, until
the victim pays a ransom fee to the attacker. In many cases, the ransom demand comes with a deadline. If the
victim doesn’t pay in time, the data is gone forever.
Cryptojacking (where hackers mine cryptocurrency using resources they do not own) - Cryptojacking
is the unauthorized use of someone else’s computer to mine cryptocurrency. Hackers do this by either getting
the victim to click on a malicious link in an email that loads cryptomining code on the computer, or by infecting
a website or online ad with JavaScript code that auto-executes once loaded in the victim’s browser.
Cyberespionage (where hackers access government or company data) - Cyber espionage is a form of cyber
attack that steals classified, sensitive data or intellectual property to gain an advantage over a competitive company
or government entity.
Drug Trafficking
Drug traffickers generally use encrypted messaging tools to build communications with drug mules. There have been
several instances of dark web site, such as the site ‘Silk Road’ was a notorious online marketplace
for drugs, before it was shut down by law enforcement. It got reopened again under new management, but got shut down
again later on. Another site emerged later on with the same name just to use the brand value.
A big example of drug trafficking by way of cyber crime would be cyber attack on the port Antwerp of Belgium
by 2011 - 2013. It was reported that hackers were hired by drug traffickers with the objective of breaching the IT systems
which used to control the movements and location of the containers. Even in a police raid earlier, large amount of drugs,
cash, along with several equipments for computer hacking were seized. Several persons were charged as well. It was
reported by the prosecutors that a Netherlands based trafficking group had hid drugs like cocaine and other in several
legitimate cargo containers. At the same time the hackers group was in function at the computer networks of Antwerp
port. They could access the secure data with regard to the location and security details of the containers, and by a few
methods stole their marked cargo before the legitimate owner arrived. The suspicion first arose when the containers
were found to be disappearing from the port without any reasonable explanation. It was found that hackers had used
malicious softwares to e-mail the staffs and access data remotely. Even after the initial breach was discovered and a firewall
was created to prevent any attacks, the attackers were reported to have entered the premises and installed key-loggers into
the computers.
To take any measure to prevent illegal drug trafficking is not that easy, and when at the same time it happens by way of
cyber crimes, it becomes more difficult, as cyberspace has no limits. Drug trade is international in nature, and law
enforcement agencies are not always effective because of the wide and complex nature of cyber attackers. However,
since the profit of drug trafficking and cyber crimes are equally big, mere one or two arrests here and there won’t bode
any measure. International laws and partnerships across nations will have to be strong. One nation should help another
in case of investigation or extradition of a criminal to the other. Overall, to neutralise drug trafficking by cyber crimes
one nation’s law is never sufficient. These are the places where United Nations, or INTERPOL can come up with some
measures.
Cyber Terrorism
Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, loss of life or significant
bodily harm, in order to achieve political or ideological gains through threat or intimidation.
It is also sometimes considered an act of Internet terrorism where terrorist activities, including acts of deliberate,
large-scale disruption of computer networks, especially of personal computers attached to the Internet by means
of tools such as computer viruses, computer worms, phishing, and other malicious software and hardware
methods and programming scripts.
Cyberterrorism is a controversial term. Some authors opt for a very narrow definition, relating to deployment
by known terrorist organizations of disruption attacks against information systems for the primary purpose of
creating alarm, panic, or physical disruption. Other authors prefer a broader definition, which includes
cybercrime. Participating in a cyberattack affects the terror threat perception, even if it isn't done with a
violent approach. By some definitions, it might be difficult to distinguish which instances of online activities are
cyberterrorism or cybercrime.
Cyberterrorism can be also defined as the intentional use of computers, networks, and public internet to cause
destruction and harm for personal objectives.
Experienced cyberterrorists, who are very skilled in terms of hacking can cause massive damage to government
systems, hospital records, and national security programs, which might leave a country, community or organization
in turmoil and in fear of further attacks. The objectives of such terrorists may be political or ideological since this
can be considered a form of terror.
There is much concern from government and media sources about potential damage that could be caused by
cyberterrorism, and this has prompted efforts by government agencies such as the Federal Bureau of Investigations
(FBI) and the Central Intelligence Agency (CIA) to put an end to cyber- attacks and cyberterrorism.
Conceptually, its use for this purpose falls into three categories: (i)
weapon of mass destruction;
(ii) weapon of mass distraction; and
(iii) weapon of mass disruption
Need of Information Security
Information system means to consider available countermeasures or controls stimulated through uncovered
vulnerabilities and identify an area where more work is needed. The purpose of data security management is to make
sure business continuity and scale back business injury by preventing and minimising the impact of security incidents. The
basic principle of Information Security is:
Confidentially
Authentication
Non-Repudiation
Integrity
Threat can be anything that can take advantage of a vulnerability to breach security and negatively alter, erase, harm
object or objects of interest.
Software attacks means attack by Viruses, Worms, Trojan Horses etc. Many users believe that malware, virus,
worms, bots are all same things. But they are not same, only similarity is that they all are malicious software that behave
differently.
Malware is a combination of 2 terms- Malicious and Software. So Malware basically means malicious software
that can be an intrusive program code or a anything that is designed to perform malicious operations on system. Malware
can be divided in 2 categories:
1. Infection Methods
2. Malware Actions
Information States:
1. Transmission – It defines time wherein data is between processing steps.
Example: In transit over networks when user sends email to reader, including memory and storage
encountered during delivery.
2. Storage –It defines time during which data is saved on medium such as hard drive.
Example: Saving document on file server’s disk by user.
3. Processing – It defines time during which data is in processing state.
Example: Data is processed in random access memory (RAM) of workstation.
Security Services:
1. Confidentiality – It assures that information of system is not disclosed to unauthorized access and is read and
interpreted only by persons authorized to do so. Protection of confidentiality prevents malicious access and
accidental disclosure of information. Information that is considered to be confidential is called as sensitive
information. To ensure confidentiality data is categorized into different categories according to damage
severity and then accordingly strict measures are taken.
Example: Protecting email content to read by only desired set of users. This can be insured by data encryption.
Two-factor authentication, strong passwords, security tokens, and biometric verification are some popular norms
for authentication users to access sensitive data.
2. Integrity – It ensures that sensitive data is accurate and trustworthy and can not be created, changed, or deleted
without proper authorization. Maintaining integrity involves modification or destruction of information by
unauthorized access.
To ensure integrity backups should be planned and implemented in order to restore any affected data
in case of security breach. Besides this cryptographic checksum can also be used for verification of data.
Example: Implementation of measures to verify that e-mail content was not modified in transit. This can be
achieved by using cryptography which will ensure that intended user receives correct and accurate information.
3. Availability – It guarantees reliable and constant access to sensitive data only by authorized users. It involves
measures to sustain access to data in spite of system failures and sources of interference.
To ensure availability of corrupted data must be eliminated, recovery time must be sped up and physical
infrastructure must be improved.
Example: Accessing and throughput of e-mail service.
4. Authentication – It is security service that is designed to establish validity of transmission of message by
verification of individual’s identity to receive specific category of information.
To ensure availability of various single factors and multi-factor authentication methods are used. A single factor
authentication method uses single parameter to verify users’ identity whereas two-factor authentication uses
multiple factors to verify user’s identity.
Example: Entering username and password when we log in to website is example of authentication. Entering
correct login information lets website verify our identity and ensures that only we access sensitive information.
5. Non-Repudiation – It is
mechanism to ensure sender or receiver cannot deny fact that they are part of data transmission. When sender
sends data to receiver, it receives delivery confirmation. When receiver receives message, it has all
information attached within message regarding sender.
Example: A common example is sending SMS from one mobile phone to another. After message is received
confirmation message is displayed that receiver has received message. In return, message received by receiver
contains all information about sender.
Security Countermeasures:
1. People – People are heart of information system. Administrators and users of information systems must follow
policies and practice for designing good system. They must be informed regularly regarding information
system and ready to act appropriately to safeguard system.
2. Policy & Practice – Every organization has some set of rules defined in form of policies that must be
followed by every individual working in organization. These policies must be practiced in order to properly handle
sensitive information whenever system gets compromised.
3. Technology – Appropriate technology such as firewalls, routers, and intrusion detection must be used
in order to defend system from vulnerabilities, threats. The technology used must facilitate quick response
whenever information security gets compromised.
Cyber Security
Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from
malicious attacks. It's also known as information technology security or electronic information security. The term applies
in a variety of contexts, from business to mobile computing, and can be divided into a few common categories.
Network security is the practice of securing a computer network from intruders, whether targeted attackers
or opportunistic malware.
Application security focuses on keeping software and devices free of threats. A compromised application
could provide access to the data its designed to protect. Successful security begins in the design stage, well before
a program or device is deployed.
Information security protects the integrity and privacy of data, both in storage and in transit.
Operational security includes the processes and decisions for handling and protecting data assets.
The permissions users have when accessing a network and the procedures that determine how and where
data may be stored or shared all fall under this umbrella.
Disaster recovery and business continuity define how an organization responds to a cyber-security incident or
any other event that causes the loss of operations or data. Disaster recovery policies dictate how the organization
restores its operations and information to return to the same operating capacity as before the event. Business
continuity is the plan the organization falls back on while trying to operate without certain resources.
End-user education addresses the most unpredictable cyber-security factor: people. Anyone can accidentally
introduce a virus to an otherwise secure system by failing to follow good security
practices. Teaching users to delete suspicious email attachments, not plug-in unidentified USB drives,
and various other important lessons is vital for the security of any organization.
Unauthorized computer access, popularly referred to as hacking, describes a criminal action whereby someone uses a
computer to knowingly gain access to data in a system without permission to access that data.
Computer Intrusion
Computer intrusions occur when someone tries to gain access to any part of your computer system. Computer intruders or
hackers typically use automated computer programs when they try to compromise a computer’s security. There are several
ways an intruder can try to gain access to your computer. They can:
1. Access your computer to view, change, or delete information on your computer.
2. Crash or slow down your computer.
3. Access your private data by examining the files on your system.
4. Use your computer to access other computers on the Internet.
Ways a virus can affect your computer system. The ways are mentioned below −
By downloading files from the Internet.
During the removable of media or drives.
Through pen drive.
Through e-mail attachments.
Through unpatched software & services.
Through unprotected or poor administrator passwords.
Impact of Virus
Let us now see the impact of virus on your computer system −
Disrupts the normal functionality of respective computer system.
Disrupts system network use.
Modifies configuration setting of the system.
Destructs data.
Disrupts computer network resources.
Destructs of confidential data.
Malicious Code - is the kind of harmful computer code or web script designed to create system vulnerabilities leading to
back doors, security breaches, information and data theft, and other potential damages to files and computing systems. It's
a type of threat that may not be blocked by antivirus software on its own. Malware specifically refers to malicious software,
but malicious code includes website scripts that can exploit vulnerabilities in order to upload malware.
It is an auto-executable application that can activate itself and take on various forms, including Java Applets, ActiveX
controls, pushed content, plug-ins, scripting languages or other programming languages that are designed to enhance Web
pages and email.
The code gives a cybercriminal unauthorized remote access to the attacked system — called an application back door
— which then exposes sensitive company data. By unleashing it, cybercriminals can even wipe out a computer's data or
install spyware.
Internet Hacking and Cracking
Hacking is the activity of identifying weaknesses in a computer system or a network to exploit the security to gain access
to personal data or business data. An example of computer hacking can be: using a password cracking algorithm to gain
access to a computer system.
Computers have become mandatory to run a successful business. It is not enough to have isolated computers systems; they
need to be networked to facilitate communication with external businesses. This exposes them to the outside world and
hacking. System hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing
corporate/personal data, etc. Cybercrimes cost many organizations millions of dollars every year. Businesses need to
protect themselves against such attacks.
A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access.
Hackers are usually skilled computer programmers with knowledge of computer security.
Hackers are classified according to the intent of their actions. The following list classifies types of hackers according to
their intent:
Ethical Hacker (White hat): A security hacker who gains access to systems with a view to fix the identified
weaknesses. They may also perform penetration Testing and vulnerability assessments.
Cracker (Black hat): A hacker who gains unauthorized access to computer systems for personal gain.
The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.
Grey hat: A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems
without authority with a view to identify weaknesses and reveal them to the system owner.
Script kiddies: A non-skilled person who gains access to computer systems using already made tools.
Hacktivist: A hacker who use hacking to send social, religious, and political, etc. messages. This is usually
done by hijacking websites and leaving the message on the hijacked website.
Phreaker: A hacker who identifies and exploits weaknesses in telephones instead of computers.
Cracking
Cracking is a technique used to breach computer software or an entire computer security system, and with
malicious intent.
Cracking is when someone performs a security hack for criminal or malicious reasons, and the person is
called a “cracker.” Just like a bank robber cracks a safe by skilfully manipulating its lock, a cracker breaks into a
computer system, program, or account with the aid of their technical wizardry.
it’s always with the aim of doing something naughty when you’re there: stealing data, impersonating someone,
or even just using paid software for free.
Software Piracy
Software piracy is the act of stealing software that is legally protected. This stealing includes copying, distributing,
modifying or selling the software.
Copyright laws were originally put into place so that the people who develop software (programmers, writers, graphic
artists, etc.) would get the proper credit and compensation for their work. When software piracy occurs, compensation
is stolen from these copyright holders.
Mail Bombs
An email bomb is an attack against an email inbox or server designed to overwhelm an inbox or inhibit the server’s normal
function, rendering it unresponsive, preventing email communications, degrading network performance, or causing
downtime. The intensity of an email bomb can range from an inconvenience to a complete denial of service. Typically,
these attacks persist for hours or until the targeted inbox or server implements a mitigation tactic to filter or block the
attacking traffic. Such attacks can be carried out intentionally or unintentionally by a single actor, group of actors, or
a botnet.
Password Cracking
Password cracking techniques are used to recover passwords from the data that have stored in or
transmitted by computer systems.
Attackers use password-cracking techniques to gain unauthorized access to the vulnerable system.
Most of the password cracking techniques are successful due to weak or easily guessable passwords.
Password cracking may use to recover the forgot password of any user to help him/her to recover the password.
Steganography
Steganography is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid
detection; the secret data is then extracted at its destination.
Use of Steganography
There are many ways to conceal information using Steganography. The most common method is by embedding
information into digital images. We all know that digital images say, a JPEG image, contains several megabytes of
data in the form of pixels. This allows some room for someone to embed steganographic information within the digital
file. With the use of steganographic applications, a hacker alters the least significant bits of the data file and embeds
a malicious code into the image. Once the targeted user downloads and opens the image file in their computer, the malware
is activated. Depending on its programming, the malware can now open a leeway for the attacker to gain control over the
user’s device or network. The danger of Steganography is that the difference between the original image and the
steganographic image is subtle and the two cannot be distinguished by the naked eye.
These are just but a few methods by which black hat hackers frustrate ethical hackers using Steganography. Steganography
allows attackers to operate in stealth mode while conducting a serious attack. Most of these attacks are zero-day exploits
which give threat hunters sleepless nights. Some preventive measures against Steganography include the deployment of
security patches, updating software, and educating end-users.
Types of Keyloggers
Keylogger tools are mostly constructed for the same purpose. But they’ve got important distinctions in terms of the
methods they use and their form factor.
Here are the two forms of keyloggers
1. Software keyloggers
2. Hardware keyloggers
Software Keyloggers - Software keyloggers are computer programs that install onto your device’s hard drive. Common
keylogger software types may include:
API-based keyloggers directly eavesdrop between the signals sent from each keypress to the program you’re
typing into. Application programming interfaces (APIs) allow software developers and hardware
manufacturers to speak the same “language” and integrate with each other. API keyloggers quietly intercept
keyboard APIs, logging each keystroke in a system file.
“Form grabbing”-based keyloggers eavesdrop all text entered into website forms once you send it to the
server. Data is recorded locally before it is transmitted online to the web server.
Kernel-based keyloggers work their way into the system’s core for admin-level permissions. These loggers can
bypass and get unrestricted access to everything entered in your system.
Hardware Keyloggers - Hardware keyloggers are physical components built-in or connected to your device. Some
hardware methods may be able to track keystrokes without even being connected to your device. For brevity, we’ll include
the keyloggers you are most likely to fend against:
Keyboard hardware keyloggers can be placed in line with your keyboard’s connection cable or built into the
keyboard itself. This is the most direct form of interception of your typing signals.
Hidden camera keyloggers may be placed in public spaces like libraries to visually track keystrokes.
USB disk-loaded keyloggers can be a physical Trojan horse that delivers the keystroke logger malware
once connected to your device.
Spyware
Spyware is a broad category of malware designed to secretly observe activity on a device and send those
observations to a snooper. That data can be used to track your activity online and that information can be sold to
marketers.
Spyware can also be used to steal personal information, such as account passwords and credit card numbers,
which can result in identity theft and fraud.
Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive
information.
Spyware is classified as a type of malware — malicious software designed to gain access to or damage your
computer, often without your knowledge. Spyware gathers your personal information and relays it to advertisers,
data firms, or external users.
Types of spyware
Spyware can take a number of forms. They include:
Adware: It eyes your online activity and displays ads it thinks you'll be interested in based on that information.
Although benign compared to some other forms of spyware, adware can have an impact on the performance of
a device, as well as just being annoying.
Tracking cookies: They're similar to adware, although they tend to be less intrusive.
Trojans: After landing on a device, they look for sensitive information, such as bank account information,
and send it to a seedy third-party who will use it to steal money, compromise accounts or make fraudulent
purchases. They can also be used to gain control of a computer through the installation of a backdoor or a remote
access Trojan (RAT).
Keyloggers: They allow a miscreant to capture every keystroke from your keyboard, including the
keystrokes you use when you log into your online accounts.
Stalkerware: It's typically installed on a mobile phone so the owner of the phone can be tracked by a third party.
For example, during the trial of Joaquín “El Chapo” Guzmán, it was revealed the drug kingpin installed spyware
on the phones of his wife, associates and female friends so he could read their text messages, listen to their
conversations and follow their movements.
Stealware: It's crafted to take advantage of online shopping sites awarding credits to websites that send traffic
to their product pages. When a user goes to one of those sites, stealware intercepts the request and takes credit for
sending the user there.
System monitors: They record everything that's happening on a device—from keystrokes, emails and
chat room dialogs to websites visited, programs launched, and phone calls made—and send it to a snoop or
cyber-criminal. They can also monitor a system's processes and identify any vulnerabilities on it.
Spyware can be harmful, but it can be removed and prevented by being cautious and using an antivirus tool. If you’ve
been infected with spyware, take steps to remove it. Be proactive by changing your passwords and notifying your bank
to watch for fraudulent activity.
A lot of things you should do come with a corresponding thing not to do — like, do be careful with email
attachments and don’t click on suspicious email attachments. Here are some more don’ts.
Don’t visit unsafe websites. Some internet security software will alert you that you’re about to visit an unsafe site,
such as Norton Safe Web.
Don’t open a link in an email unless you’re confident it comes from a legitimate source. In general, avoid
opening unsolicited emails from senders you don’t know.
Don’t download or install programs if you don’t have complete trust in the publisher.
Don’t click on pop-up windows that promise free programs that perform useful tasks.
Don’t ever open a link in an email unless you know exactly what it is.
Phishing
Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone
posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable
information, banking and credit card details, and passwords.
The information is then used to access important accounts and can result in identity theft and financial loss.
Phishing is an example of social engineering techniques used to deceive users. Users are lured by
communications purporting to be from trusted parties such as social networking websites, auction sites, banks,
mails/messages from friends or colleagues/executives, online payment systems or IT administrators.
Types of phishing
Spear phishing - Phishing attempts directed at specific individuals or companies
Catphishing and catfishing - is a type of online deception that involves getting to know someone closely in
order to gain access to information or resources, usually in the control of the mark, or to otherwise get control over
the conduct of the target.
Clone phishing - is a type of phishing attack whereby a legitimate, and previously delivered, email containing
an attachment or link has had its content and recipient address(es) taken and used to create an almost identical or
cloned email.
Voice phishing - uses fake caller-ID data to give the appearance that calls come from a trusted organization.
SMS phishing - or smishing uses cell phone text messages to deliver the bait to induce people to divulge
their personal information.
DOS Attack
A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible
to its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that
triggers a crash. In both instances, the DoS attack deprives legitimate users (i.e., employees, members, or account
holders) of the service or resource they expected.
Victims of DoS attacks often target web servers of high-profile organizations such as banking, commerce,
and media companies, or government and trade organizations. Though DoS attacks do not typically result in the
theft or loss of significant information or other assets, they can cost the victim a great deal of time and money to
handle.
A denial-of-service (DoS) attack is a type of cyber attack in which a malicious actor aims to render a computer
or other device unavailable to its intended users by interrupting the device's normal functioning.
DoS attacks typically function by overwhelming or flooding a targeted machine with requests until normal
traffic is unable to be processed, resulting in denial-of-service to addition users.
A DoS attack is characterized by using a single computer to launch the attack.
There are two general methods of DoS attacks: flooding services or crashing services.
Flood attacks occur when the system receives too much traffic for the server to buffer, causing them to slow down and
eventually stop.
Popular flood attacks include:
Buffer overflow attacks – the most common DoS attack. The concept is to send more traffic to a network
address than the programmers have built the system to handle. It includes the attacks listed
below, in addition to others that are designed to exploit bugs specific to certain applications or networks
ICMP flood – leverages misconfigured network devices by sending spoofed packets that ping every computer
on the targeted network, instead of just one specific machine. The network is then triggered to amplify the traffic.
This attack is also known as the smurf attack or ping of death.
SYN flood – sends a request to connect to a server, but never completes the handshake. Continues until all
open ports are saturated with requests and none are available for legitimate users to connect to.
Other DoS attacks simply exploit vulnerabilities that cause the target system or service to crash. In these attacks,
input is sent that takes advantage of bugs in the target that subsequently crash or severely destabilize the system, so that
it can’t be accessed or used.
DDOS Attack
A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted
server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet
traffic.
DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack
traffic. Exploited machines can include computers and other networked resources such as IoT devices.
From a high level, a DDoS attack is like an unexpected traffic jam clogging up the highway, preventing regular
traffic from arriving at its destination.
Working
DDoS attacks are carried out with networks of Internet-connected machines.
These networks consist of computers and other devices (such as IoT devices)which have been infected with
malware, allowing them to be controlled remotely by an attacker. These individual devices are referred to as bots
(or zombies), and a group of bots is called a botnet.
Once a botnet has been established, the attacker is able to direct an attack by sending remote instructions
to each bot.
When a victim’s server or network is targeted by the botnet, each bot sends requests to the target’s IP address,
potentially causing the server or network to become overwhelmed, resulting in a denial-of- service to normal
traffic.
Because each bot is a legitimate Internet device, separating the attack traffic from normal traffic can be difficult.
SQL Injection
SQL injection, also known as SQLI, is a common attack vector that uses malicious SQL code for backend
database manipulation to access information that was not intended to be displayed. This information may
include any number of items, including sensitive company data, user lists or private customer details.
The impact SQL injection can have on a business is far-reaching.
A successful attack may result in the unauthorized viewing of user lists, the deletion of entire tables and, in
certain cases, the attacker gaining administrative rights to a database, all of which are highly detrimental to a
business.
When calculating the potential cost of an SQLi, it’s important to consider the loss of customer trust should
personal information such as phone numbers, addresses, and credit card details be stolen.
While this vector can be used to attack any SQL database, websites are the most frequent targets.
In-band SQLi - The attacker uses the same channel of communication to launch their attacks and to gather their results.
In-band SQLi’s simplicity and efficiency make it one of the most common types of SQLi attack. There are two sub-
variations of this method:
Error-based SQLi—the attacker performs actions that cause the database to produce error messages.
The attacker can potentially use the data provided by these error messages to gather information about the structure
of the database.
Union-based SQLi—this technique takes advantage of the UNION SQL operator, which fuses
multiple select statements generated by the database to get a single HTTP response. This response may contain
data that can be leveraged by the attacker.
Inferential (Blind) SQLi - The attacker sends data payloads to the server and observes the response and behavior of
the server to learn more about its structure. This method is called blind SQLi because the data is not transferred from the
website database to the attacker, thus the attacker cannot see information about the attack in-band.
Blind SQL injections rely on the response and behavioral patterns of the server so they are typically slower to execute but
may be just as harmful. Blind SQL injections can be classified as follows:
Boolean—that attacker sends a SQL query to the database prompting the application to return a result.
The result will vary depending on whether the query is true or false. Based on the result, the information
within the HTTP response will modify or stay unchanged. The attacker can then work out if the message generated
a true or false result.
Time-based—attacker sends a SQL query to the database, which makes the database wait (for a period in seconds)
before it can react. The attacker can see from the time the database takes to respond, whether a query is true
or false. Based on the result, an HTTP response will be generated instantly or after a waiting period. The attacker
can thus work out if the message they used returned true or false, without relying on data from the database.
Out-of-band SQLi - The attacker can only carry out this form of attack when certain features are enabled on the database
server used by the web application. This form of attack is primarily used as an alternative to the in-band and inferential
SQLi techniques.
Out-of-band SQLi is performed when the attacker can’t use the same channel to launch the attack and gather information,
or when a server is too slow or unstable for these actions to be performed. These techniques count on the capacity of the
server to create DNS or HTTP requests to transfer data to an attacker.
CLOUD SECURITY
Security and risk management experts find it difficult to gain visibility over a complex mix of devices, networks and
clouds. These network security mosaics, fraught with hidden vulnerabilities, are an invitation for attackers to attempt
breaches. Many cloud service providers do not provide detailed information about their internal environment, and many
common internal security controls cannot be directly converted to a public cloud.
For all these reasons, organizations need to think about cloud security as a new challenge, and build a cloud security
architecture that will help them adequately secure this complex environment.
The right pattern can help you implement security across your organization. For example, it can help you protect the CIA
(confidentiality, integrity, and availability) of your cloud data assets, as well as respond to security threats. You can
implement security controls directly, or use security controls as a service offered by your cloud provider or third-party
vendors. The cloud security architecture model is usually expressed in terms of:
• Security controls—which can include technologies and processes. Controls should take into account the location of each
service—company, cloud provider, or third party.
• Trust boundaries—between the different services and components deployed on the Cloud • Standard interfaces and
security protocols—such as SSL, IPSEC, SFTP, LDAPS, SSH, SCP,SAML, OAuth, etc.)
• Encryption methods including algorithms like 128-bit AES, Triple DES, RSA, Blowfish.
• Security event logging—ensuring all relevant security events are captured, prioritized, and delivered to security
teams.Each security control should be clearly defined using the following attributes:
Logical location—public cloud service, third party service, or on-premises. Location affects performance, availability,
firewall policies, and service management.
• Protocol—what protocol is used to access the service? For example, REST, HTTPS, SSH.
• Input/Output – what does the service receive and what is it expected to deliver? For example, input is a JSON feed and
output is the same feed with encrypted payload data.
• Control mechanisms—what types of control does the service achieve? For example, data at rest protection, user
authentication, application authentication.
• Users and operators—who operates or benefits from the service? For example, endpoint devices, end users, business
managers, security analysts.
The cloud security architecture model differs depending on the type of cloud service: IaaS (Infrastructure as a Service),
PaaS (Platform as a Service), or SaaS (Software as a Service). Below we explain different security considerations for each
model.
IaaS provides storage and network resources in the cloud. It relies heavily on APIs to help manage and operate the cloud.
However, cloud APIs are often not secure, because they are open and easily accessible from the web.
The cloud service provider (CSP) is responsible for securing the infrastructure
and abstraction layer used to access the resources. Your organization's security obligations cover the rest of the layers,
mainly containing the business applications. To better visualize cloud network security issues, deploy a Network Packet
Broker (NPB) in an IaaS environment. The NPB sends traffic and data to a Network Performance Management (NPM)
system, and to the relevant security tools. In addition, establish logging of events occurring on network endpoints.
• Network segmentation
• Intrusion Detection System and Intrusion Prevention System (IDS/IPS)
• Virtual firewalls placed in front of web applications to protect against malicious code, and at the edge of the cloud
network
• Virtual routers
SaaS services provide access to software applications and data through a browser. The specific terms of security
responsibility may vary between services, and are sometimes up for negotiation with the service provider. Cloud Access
Security Brokers (CASB) offers logging, auditing, access control and encryption capabilities that can be critical when
investigating security issues in a SaaS product. In addition, make sure your SaaS environment has:
• Logging and alerting
• IP whitelists and/or blacklists
• API gateways, in case the service is accessed via API
PaaS platforms enable organizations to build applications without the overhead and complexity associated with managing
hardware and back-end software. In a PaaS model, the CSP protects most of the environment. However, the company is
still responsible for the security of the applications it is developing. Therefore, a PaaS security architecture is similar to a
SaaS model. Ensure you have CASP, logging and alerting, IP restrictions and an API gateway to ensure secure internal
and external access to your application’s APIs.
A cloud security architecture (also sometimes called a “cloud computing security architecture”) is defined by the security
layers, design, and structure of the platform, tools, software, infrastructure, and best practices that exist within a cloud
security solution. A cloud security architecture provides the written and visual model to define how to configure and secure
activities and operations within the cloud, including such things as identity and access management; methods and controls
to protect applications and data; approaches to gain and maintain visibility into compliance, threat posture, and overall
security; processes for instilling security principles into cloud services development and operations; policies and
governance to meet compliance standards; and physical infrastructure security components.
Cloud security, in general, refers to the protection of information, applications, data, platforms, and infrastructure that
operate or exist within the cloud. Cloud security is applicable to all types of cloud computing infrastructures, including
public clouds, private clouds, and hybrid clouds. Cloud security is a type of cybersecurity.
Key Elements of a Cloud Security Architecture
When developing a cloud security architecture several critical elements should be included:
• Security at Each Layer: Ensure that each layer of the cloud’s security stack is “self-defending.” There may be multiple
components in each layer, so having defense-indepth is critical. This goes into having things like automatic updates on
operating
systems, secure coding and monitoring logs.
• Centralized Management of Components: This is taking the concept of multiple components in each layer and
managing each — especially security — from one place, making sure to incorporate efficiency opportunities.
• Redundant & Resilient Design: Building out disaster recovery plans and having backups on hand to re-establish
operations. Another aspect of this is making sure you have resiliency built into all components, or at least the ones that
continuously need to be online.
• Elasticity & Scalability: When it comes to elasticity, we have to keep in mind specific design options. When scaling,
should it be a horizontal or vertical scale? In other words, can you make the server bigger or add more servers/services?
• Appropriate Storage for Deployments: When choosing storage, it comes down to your organization’s use cases and
needs. Take time to look at the options available as they are not created equal. Each has its security controls and different
performance specifications.
• Alerts & Notifications: While designing how the components will talk to each other and how users interact with those
components, you need to ensure that you are being alerted and notified. This keeps you in the loop on what is happening
in your cloud infrastructure.
• Centralization, Standardization, & Automation: Centralization is using services and tools that can be integrated into
a single dashboard for viewing. Standardization is creating consistent architectural security models across the vast amount
of services offered in the cloud, reducing the burden of implementation of those new services.Finally, Automation, the
more you can automate your infrastructure, the quicker you can scale and respond to incidents and issues.
Cloud security management is the practice of securing your data and operations in the cloud from theft or damage. As
demand for cloud computing expands, cloud security services are expected to grow as organizations become more aware
of the importance of securing their presence in the cloud. This article tackles what cloud security management means and
why it is important, how to evaluate cloud security management service providers, and the pros and challenges of cloud
security management.
Among several strategies you can adopt to keep your cloud secure are:
• Perform security audits. Analyze your cloud-based products and services for potential security loopholes on a regular
basis.
• Set appropriate levels of protection. Task your IT security team with complete control of the security settings for your
cloud-based applications, setting them to the highest level possible.
• Use data encryption and network security monitoring tools. Add another level of protection to your data by encrypting
them, and only allow legitimate traffic into your network.
• Manage end-user devices. Make sure that only authorized devices are given access toyour network and data.
• Manager users. Set appropriate user-level controls to limit data access to authorized users only. Ensure that your users
only have access to the data they need in their line of work.
• Monitor user activity. Make use of reports to view user activity in your cloud, and gain better understanding of security
risks surrounding your operations.
Access restriction management. Ensuring access restrictions in your on-premises infrastructure are carried over to your
cloud environment. When applicable, your IT team must ensure that you have BYOD policies for your end -users, and that
only authorized devices and locations are allowed access to your cloud services.
• Meeting compliance requirements. Ensure that your cloud services pass compliance requirements. You may assume
that the vendor will take care of compliance. This is a mistake that can lead to heavy fines from regulators. Since
compliance is always your responsibility, you should have a team ready to handle this for your organization.
• Asset misconfiguration potential. A misconfiguration can leave your network open to attack. To prevent this from
happening, assign a team to review configuration settings and changes. Have a team ready to plug potential holes when
needed.
Cloud Services are not immune to outages (failure/interruption) and the severity and the scope of impact on the customer
can vary based on the situation. As it will depend on the criticality of the cloud application and its relationship to internal
business processes.
1. Impact on business: In the case of business-critical applications where businesses rely on the continuous availability
of service, even a few minutes of service failure can have a serious impact on the organization’s productivity, revenue,
customer satisfaction, and service-level compliance.
2. Impact on customers: During a cloud service disruption, affected customers will not be able to access the cloud service
and in some cases may suffer degraded performance or user experience. For Example:- when a storage service is disrupted,
it will affect the availability and performance of a computing service that depends on the storage service.
The cloud service’s ability to recover from an outage situation and availability depends on a few factors, including the
cloud service provider’s data center architecture, application architecture, hosting location redundancy, diversity of
Internet service providers (ISPs), and data storage architecture.
• PaaS platform service levels: Customers should read and understand the terms and conditions of the Cloud Service
Provider’s Service Level Agreements.
• Third-party web services provider service levels: When your Platform as a Services application depends on a third-
party service it is critical to understand the Service Level Agreements of that service. Network connectivity parameters
with thirdparty service providers. Example: Bandwidth and latency factors.
• Infrastructure as a Service Health Monitoring: The following options are available to Infrastructure as a Service
customer for managing the health of their service:
• Service health dashboard published by the Cloud Service Providers.
• Cloud Service Providers customer mailing list that notifies customers of occurring and recently occurred outages.
• Third-party-based service monitoring tools that periodically check the health of your Infrastructure as a Service virtual
server.
ACCESS CONTROL :
Access requirements must be aware to the client users and system administrators (privileged users) who access network,
system, and application resources. The functionalities of access control management include defining who should have
access to what resources (Assignment of entitlements to users, and also to audit and report to verify entitlement
assignments), why should the users have access to the resource they hold (Assignment of entitlements based on the user’s
job functions and responsibilities), how can the user access the resources which will state the authentication methods and
strength check before granting access to the resources. In a cloud computing model, network based access control plays a
diminishing role. User access control should be strongly emphasized in the cloud, since it can strongly bind a user’s identity
to the resources in the cloud and will help with fine granular access control, user accounting, support for compliance, and
data protection. User access management controls, including strong authentication, single sign-on (SSO), privilege
management, and logging and monitoring of cloud resources, play a significant role in protecting the confidentiality and
integrity of your information in the cloud.
In the SaaS delivery model, the CSP is responsible for managing all aspects of the network, server, and application
infrastructure. In that model, since the application is delivered as a service to end users, usually via a web browser, network-
based controls are becoming less relevant and are augmented or superseded by user access controls, e.g., authentication
using a one-time password. Hence, customers should focus on user access controls (authentication, federation, privilege
management, deprovisioning, etc.) to protect the information hosted by SaaS. Some SaaS services, such as Salesforce.com,
augment network access control (e.g., source IP address/network-based control) to user access control in which case
customers have the option to enforce access based on network and user policy parameters.
In an IaaS delivery model, access control management falls into one of the following two categories:
Access control management to your virtual server (virtual machines or VMs), virtual storage, virtual networks, and
applications hosted on virtual servers.
In summary, from an enterprise customer perspective, access management is an essential security process to protect the
confidentiality, integrity, and availability (CIA) of information hosted in the cloud. A robust access management program
should include procedures for provisioning, timely deprovisioning, flexible authentication, privilege management,
accounting, auditing, and support for compliance management. Cloud customers should understand the CSP-specific
access control features for networks, systems, and applications, and appropriately manage access.
The ability for malware (or a cracker) to remotely exploit vulnerabilities of infrastructure components, network services,
and applications remains a major threat to cloud services. It is an even greater risk for a public PaaS and IaaS delivery
model where vulnerability, patch, and configuration management responsibilities remain with the customer. Customers
should remember that in cloud computing environments, the lowest or highest common denominator of security is shared
by all tenants in a multitenant virtual environment. Hence, the onus is with the customers to understand the scope of their
security management responsibilities. Customers should demand that CSPs become more transparent about their cloud
security operations to help customers understand and plan complementary security management functions.
By and large, CSPs are responsible for the vulnerability, patch, and configuration (VPC)
management of the infrastructure (networks, hosts, applications, and storage) that is CSP managed and operated, as well
as third-party services that they may rely on. However, customers are not spared from their VPC duties and should
understand the VPC aspects for which they are responsible. A VPC management scope should address end-to-end security
and should include customer-managed systems and applications that interface with cloud services. As a standard practice,
CSPs may have instituted these programs within their security management domain, but typically the process is internal
to the CSP and is not apparent to customers. CSPs should assure their customers of their technical vulnerability
management program using ISO/IEC 27002 type control and assurance frameworks.
Similar to vulnerability management, security patch management is a vital threat management element in protecting hosts,
network devices, and applications from unauthorized users exploiting a known vulnerability.
Patch management processes follow a change management framework and feeds directly from the actions directed by your
vulnerability management program. Security patch management mitigates risk to your organization by way of insider and
outsider threats. Hence, SaaS providers should be routinely assessing new vulnerabilities and patching the firmware and
software on all systems that are involved in delivering the *aaS service to customers.
The scope of patch management responsibility for customers will have a low-to high relevance in the order of SaaS, PaaS,
and IaaS services—that is, customers are relieved from patch management duties in a SaaS environment, whereas they are
responsible for managing patches for the whole stack of software (operating system, applications, and database) installed
and operated on the IaaS platform. Customers are also responsible for patching their applications deployed on the PaaS
platform.
Security configuration management is another significant threat management practice to protect hosts and network devices
from unauthorized users exploiting any configuration weakness. Security configuration management is closely related to
the vulnerability management program and is a subset of overall IT configuration management. Protecting the
configuration of the network, host, and application entails monitoring and access control to critical system and database
configuration files, including OS configuration, firewall policies, network zone configuration, locally and remotely
attached storage, and an access control management database.
In the SPI service delivery model, configuration management from a customer responsibility perspective has a low-to-high
relevance in the order of SaaS, PaaS, and IaaS services—that is, SaaS and PaaS service providers are responsible for
configuration management of their platform, whereas IaaS customers are responsible for configuration management of the
operating system, application, and database hosted on the IaaS platform. Customers are also responsible for configuration
management of their applications deployed on the PaaS platform.
SaaS VPC management focuses on managing vulnerabilities, security patching, and system configuration in the CSP-
managed infrastructure, as well as the customer infrastructure interfacing with the SaaS service. Since the SaaS delivery
model is anchored on the premise that the application service is delivered over the Internet to a web browser running on
any computing device (personal computer, virtual desktop, or mobile device), it is important to secure the endpoints from
which the cloud is accessed. Hence, a VPC management program should include endpoint VPC management requirements
and should be tailored to the corporate environment. It is standard practice for most companies to institute a standard OS
image for personal computers that include security tools such as antivirus, anti-malware, firewall, and automatic patch
management from a central management station.
SaaS customers are responsible for VPC management of their systems that interface with the SaaS service. The
responsibilities include:
• Personal computers of a SaaS user.
• Applications or services that interface with the SaaS service.
• Security testing of the SaaS service. Although SaaS providers are responsible for vulnerability management of the
software delivered as a service, some enterprise customers can choose to independently assess the state of application
security. Note: The scope of the VPC management program should include browser security, systems, and applications
(on both trusted and untrusted zones) located at a customer’s premises interfacing with SaaS services.
PaaS VPC management focuses on VPC management in the CSP-managed infrastructure, as well as the customer
infrastructure interfacing with the PaaS service. Since applications deployed on a PaaS platform are accessed from a web
browser running on an endpoint device (personal computer, virtual desktop, or mobile device), the program should include
endpoint VPC management scope.
PaaS customers are responsible for VPC management of the applications implemented and deployed on the PaaS platform.
Vulnerabilities or the configuration weakness of applications deployed on a PaaS platform should be treated similarly to a
standard application operating in your data center (e.g., private cloud). Software vulnerabilities are introduced by design
flaws or coding errors. Configuration weakness can be introduced by improper configuration of an application in the area
of authentication and privilege management. In addition, PaaS applications that rely on third-party web services may
simply become weak and vulnerable by way of vulnerabilities in the third-party service, and that is out of your control.
PaaS customers should follow standard practices embedded in the Software Development Life Cycle (SDLC), which helps
to reduce software application vulnerabilities. Following are some of the standard practices:
• Application white-box testing
• Application black-box testing
• Application penetration testing
• Vulnerability alerts
PaaS customers are also responsible for VPC management of their systems that interface with the PaaS service. These
systems include:
• Personal computers of a PaaS user
• Browsers used for accessing the PaaS service
• Applications located at the customer’s premises that interface with the PaaS service
Wireless Network provides various comfort to end users but actually they are very complex in their working. There are
many protocols and technologies working behind to provide a stable connection to users. Data packets traveling through
wire provide a sense of security to users as data traveling through wire probably not heard by eavesdroppers.
WEP key can be used as an authentication method or encryption tool. A client can associate with AP only if it has the
correct WEP key. AP tests the knowledge of the WEP key by using a challenge phrase. The client encrypts the phrase with
his own key and send back to AP. AP compares the received encrypted frame with his own encrypted phrase. If both
matches, access to the association is granted.
Supplicant –
Device requesting access.
Authenticator –
Device that provides access to network usually a Wlan controller (WLC).
Authentication Server –
Device that takes client credentials and deny or grant access.
EAP is further of four types with some amendments over each other –
LEAP
EAP-FAST
PEAP
EAP-TLS
Web security
Web security is also known as “Cybersecurity”. It basically means protecting a website or web
application by detecting, preventing and responding to cyber threats.
Websites and web applications are just as prone to security breaches as physical homes, stores, and
government locations. Unfortunately, cybercrime happens every day, and great web security
measures are needed to protect websites and web applications from becoming compromised.
That’s exactly what web security does – it is a system of protection measures and protocols that
can protect your website or web application from being hacked or entered by unauthorized
personnel. This integral division of Information Security is vital to the protection of websites, web
applications, and web services. Anything that is applied over the Internet should have some form
of web security to protect it.
There are a variety of security standards that must be followed at all times, and these standards are
implemented and highlighted by the OWASP. Most experienced web developers from top
cybersecurity companies will follow the standards of the OWASP as well as keep a close eye on
the Web Hacking Incident Database to see when, how, and why different people are hacking
different websites and services.
Essential steps in protecting web apps from attacks include applying up-to-date encryption, setting
proper authentication, continuously patching discovered vulnerabilities, avoiding data theft by
having secure software development practices. The reality is that clever attackers may be competent
enough to find flaws even in a fairly robust secured environment, and so a holistic security strategy
is advised.
Available Technology
There are different types of technologies available for maintaining the best security standards. Some
popular technical solutions for testing, building, and preventing threats include:
Likelihood of Threat
Your website or web application’s security depends on the level of protection tools that have been
equipped and tested on it. There are a few major threats to security which are the most common
ways in which a website or web application becomes hacked. Some of the top vulnerabilities for
all web-based services include:
SQL injection
Password breach
Cross-site scripting
Data breach
Remote file inclusion
Code injection
Preventing these common threats is the key to making sure that your web-based service is practicing
the best methods of security.
Resource assignment – By assigning all necessary resources to causes that are dedicated to alerting
the developer about new web security issues and threats, the developer can receive a constant and
updated alert system that will help them detect and eradicate any threats before security is officially
breached.
Web scanning – There are several web scanning solutions already in existence that are available
for purchase or download. These solutions, however, are only good for known vulnerability threats
– seeking unknown threats can be much more complicated. This method can protect against many
breaches, however, and is proven to keep websites safe in the long run.
Web Security also protects the visitors from the below-mentioned points -
Stolen Data: Cyber-criminals frequently hacks visitor’s data that is stored on a website like email
addresses, payment information, and a few other details.
Phishing schemes: This is not just related to email, but through phishing, hackers design a layout
that looks exactly like the website to trick the user by compelling them to give their sensitive details.
Session hijacking: Certain cyber attackers can take over a user’s session and compel them to take
undesired actions on a site.
Malicious redirects. Sometimes the attacks can redirect visitors from the site they visited to a
malicious website.
SEO Spam. Unusual links, pages, and comments can be displayed on a site by the hackers to distract
your visitors and drive traffic to malicious websites.
Thus, web security is easy to install and it also helps the business people to make their website safe
and secure. A web application firewall prevents automated attacks that usually target small or
lesser-known websites. These attacks are born out by malicious bots or malware that automatically
scan for vulnerabilities they can misuse, or cause DDoS attacks that slow down or crash your
website.
Thus, Web security is extremely important, especially for websites or web applications that deal
with confidential, private, or protected information. Security methods are evolving to match the
different types of vulnerabilities that come into existence.