Unit 3 Cys Set-1
Unit 3 Cys Set-1
Wireless Devices, Trends in Mobility, Credit card Frauds in Mobile and Wireless
Computing Era, Security Challenges Posed by Mobile Devices, Registry Settings for
not “Free downloads” or simply use it for his/her own purposes. In either case,
the legitimate user is charged for the activity which the user did not conduct.
Spoofed policy development process (PDP): These types of a acks exploit
the vulnerabilities in the GTP [General Packet Radio Service (GPRS)
4.
Tunneling Protocol].
Signalling-level a acks: The Session Initiation Protocol (SIP) is a signaling
protocol used in IP multimedia subsystem (IMS) networks to provide Voice
5.
Over Internet Protocol (VoIP) services. There are several vulnerabilities with
SIP-based VoIP systems.
3.4 Credit Card Frauds in Mobile and Wireless Computing Era
► These are new trends in cybercrime that are coming up with mobile
computing – mobile commerce (M- Commerce) and mobile banking (M-
Banking).
🕐 Wireless credit card processing is a very desirable system, because it allows
businesses to process transactions from mobile locations quickly, e ciently
and professionally.
► Credit card companies, normally, do a good job of helping consumers resolve
identity (ID) theft problems once they occur. But they could reduce ID fraud
even more if they give consumers be er tools to monitor their accounts and
limit high-risk transactions
1. Merchant sends a transaction to bank;
2. The bank transmits the request to the authorized cardholder
3. The cardholder approves or rejects (password protected);
4. The bank/merchant is noti ed;
5. Credit card transaction is complete
(Box 3.2). Tips to Prevent Credit Card Frauds
∙ The current topic is about credit card frauds in mobile and wireless computing era,
however, we would like to include these tips to prevent credit card frauds caused due to
individual ignorance about a few known facts.
Do’s
1. Put your signature on the card immediately upon its receipt.
2.remember
Make the photocopy of both the sides of your card and preserve it at a safe place to
the card number, expiration date in case of loss of card.
3.doing
Change the default
any transaction. personal identi cation number (PIN) received from the bank before
4. Always carry the details about contact numbers of your bank in case of loss of your card.
5. Carry your cards in a separate pouch/card holder than your wallet.
6. Keep an eye on your card during the transaction, and ensure to get it back immediately.
7. Preserve all the receipts to compare with credit card invoice.
8. Reconcile your monthly invoice/statement with your receipts.
9. Report immediately any discrepancy observed in the monthly invoice/statement.
10. Destroy all the receipts after reconciling it with the monthly invoice/statement.
11. Inform your bank in advance, about any change in your contact details such as home address, cell phone number
and E-Mail address.
12. Ensure the legitimacy of the website before providing any of your card details.
13. Report the loss of the card immediately in your bank and at the police station, if necessary.
Dont’s
► 1. Store your card number and PINs in your cell.
► 2. Lend your cards to anyone.
► 3. Leave cards or transaction receipts lying around.
► 4. Sign a blank receipt (if the transaction details are not legible, ask for another
receipt to ensure the amount instead of trusting the seller).
► 5. Write your card number/PIN on a postcard or the outside of an envelope.
► 6. Give out immediately your account number over the phone (unless you are
calling to a company/ to your bank).
► 7. Destroy credit card receipts by simply dropping into garbage box/dustbin.
4.1 Types and Techniques of Credit Card Frauds
► Traditional Techniques
🕐 The traditional and the rst type of credit card fraud is paper-based fraud –
application fraud, wherein a criminal uses stolen or fake documents such as
utility bills and bank statements that can build up useful personally
Identi able Information (PII) to open an account in someone else’s name.
🕐 Application fraud can be divided into
1. ID theft: Where an individual pretends to be someone else
2. Financial fraud: Where an individual gives false information about his or her
nancial status to acquire credit.
3. Illegal use of lost and stolen cards is another form of traditional technique.
4. Stealing a credit card is either by pickpocket or from postal service before it
reaches its nal destination.
Modern Techniques
🕐 Skimming is where the information held on either the magnetic strip on the
back of the credit card or the data stored on the smart chip are copied from
one card to another.
🕐 Site cloning and false merchant sites on the Internet are becoming a popular
method of fraud and to direct the users to such bogus/fake sites is called
Phishing.
🕐 Such sites are designed to get people to hand over their credit card details
without realizing that they have been directed to a fake weblink /website (i.e.,
they have been scammed).
1.Triangulation
• The criminal o ers the goods with heavy discounted rates through a website
designed and hosted by him, which appears to be legitimate merchandise
website.
• The customer registers on this website with his/her name, address, shipping
address and valid credit card details.
• The criminal orders the goods from a legitimate website with the help of
stolen credit card details and supply shipping address that have been
provided by the customer while registering on the criminal’s website.
• The goods are shipped to the customer and the transaction gets completed.
• The criminal keeps on purchasing other goods using fraudulent credit card
details of di erent customers till the criminal closes existing website and
2. Credit card generators: It is another modern technique – computer emulation
software – that creates valid credit card numbers and expiry dates. The criminals
highly rely on these generators to create valid credit cards. These are available
for free download on the Internet
3.5 Security Challenges Posed by Mobile Devices
► https://www.youtube.com/watch?v=OOQHxAs2tiE
❖ As the number of mobile device users increases, two challenges are
presented:
2. BlueSniff: This is a GUI-based utility for fi nding discoverable and hidden Bluetooth enabled devices.
3. BlueBugger: The buggers exploit the vulnerability of the device and access the images, phonebook,
messages and other personal information.
4.Bluesnarfer: If a Bluetooth of a device is switched ON, then Bluesnarfing makes it possible to connect to the
phone without alerting the owner and to gain access to restricted portions of the stored data.
5. BlueDiving: Bluediving is testing Bluetooth penetration. It implements attacks like Bluebug and BlueSnarf.
3.9 Mobile Devices: Security Implications for Organizations
3.9.1 Managing Diversity and Proliferation of Hand-Held Devices
🕐 Most organizations fail to see the long-term signi cance of keeping track of
who owns what kind of mobile devices.
🕐 Mobile devices of employees should be registered to the organization.
🕐 When an employee leaves, it is important to remove logical and physical
access to organization networks.
🕐 Thus, mobile devices that belong to the company should be returned to the
IT department and, at the very least, should be deactivated and cleansed.
3.9.2 Unconventional/Stealth Storage Devices
► Compact disks (CDs) and Universal Serial Bus (USB) drives (also called zip
drive, memory sticks) used by employees are the key factors for cyber
a acks.
🕐 It is advisable to prohibit the employees in using these devices.
► Not only can viruses, worms and Trojans get into the organization network,
but can also destroy valuable data in the organization network
► Using “DeviceLock” software solution, one can have control over
unauthorized access to plug and play devices
3.9.3Threats through Lost and Stolen Devices
🕐 Often mobile hand-held devices are lost while people are on the move.
► Lost mobile devices are becoming even a larger security risk to corporations
🕐 The cybersecurity threat under this scenario is scary; owing to a general lack
of security
► in mobile devices, it is often not the value of the hand-held device that is
important but rather the content that, if lost or stolen, can put a company at
a serious risk of sabotage, exploitation or damage to its professional
integrity, as most of the times the mobile hand-held devices are provided by
the organization.
3.9.4 Organizational Measures for Handling Mobile
1. Encrypting Organizational Databases
❑ Critical and sensitive data reside on databases and with the advances in
technology, access to these data is possible through mobiles.
❑ Through encryption we can protect organization data.
❑ Two algorithms that are typically used to implement strong encryption of
database les: Rijndael (pronounced rain-dahl or Rhine-doll), a block
encryption algorithm, chosen as the new Advanced Encryption Standard
(AES) for block ciphers by the National Institute of Standards and Technology
(NIST).
❑ The other algorithm used to implement strong encryption of database les is
the Multi- Dimensional Space Rotation (MDSR) algorithm developed by Casio
2. Including Mobile Devices in Security Strategy
🕐 Encryption of corporate databases is not the end of everything.
🕐 For example, there are ways to make devices lock or destroy the lost data by
sending the machine a special message.
🕐 few things that organization can use are:
1. Implement strong asset management, virus checking, loss prevention and
other controls for mobile systems that will prohibit unauthorized access .
2. Investigate alternatives that allow a secure access to the company
information through a rewall, such as mobile VPNs.
3. Develop a system of more frequent and thorough security audits for mobile
devices.
4. Incorporate security awareness into your mobile training and support
programs so that everyone understands just how important an issue security
is within a company’s overall IT strategy.
5. Notify the appropriate law-enforcement agency and change passwords. User
accounts are closely monitored for any unusual activity for a period of time.
3.11 Organizational Security Policies and Measures in Mobile Computing
Era
🕐 people are storing more types of con dential information on mobile
computing devices than their employers or they themselves know; they listen
to music using their hand-held devices
🕐 One should think about not to keep credit card and bank account numbers,
passwords, con dential E-Mails and strategic information about organization.
Operating Guidelines for Implementing Mobile Device
Security Policies
1. Determine whether the employees
mobile computing devices or not. in the organization need to use
2. Implement additional security technologies
device passwords and physical locks. like strong encryption,
3.
Standardize the mobile computing
tools being used with them. devices and the associated security
4. Develop a speci c framework for using mobile computing devices.
5. Maintain
devices. an inventory so that you know who is using what kinds of
6. Establish patching procedures for software on mobile devices.
7. Label the devices and register them with a suitable service.
8. Establish procedures to disable remote access for any mobile.
9. Remove data from computing devices that are not in use
10. Provide
devices.education and awareness training to personnel using mobile
3.12 Laptops
🕐 The thefts of laptops have always been a major issue,
cybersecurity industry and insurance company statistics. according to the
🕐 Cybercriminals are targeting
quick pro t in the black market. laptops that are expensive, to enable them to fetch a
🕐 Most laptops contain personal and corporate information that could be sensitive.
🕐 Such information can be misused if found by a malicious user.
Physical Security Countermeasures
1. Cables
safeguard andany hardwired
mobile locks:
device is The
securingmost
withcost-e
cables cient
and and
locks, ideal
speciallysolution
designedto
for laptops.
2. Laptop safes:
bulletproof Safes
windows, made
police of
riot polycarbonate
shields and –
bank the same
security material
screens – that
can is
be used
used in
to
carry and safeguard the laptops
3. Motion sensors
securing laptops. and alarms: A larms and motion sensors are very e cient in
4. Warning
identi labels
cation and
details stamps:
can be Warning
xed onto labels
the containing
laptop to tracking
deter information
aspiring thieves. and
These
labels cannot be removed easily and are a low-cost solution to a laptop theft.
Other measures for Protecting laptops are as follows:
• keeping the laptop close to oneself wherever possible;
• carrying the laptop in a di erent and unobvious bag
• creating the awareness among the employees about the sensitive information contained in
the laptop;
• making a copy of the purchase receipt of laptop
• installing encryption software to protect information stored on the laptop;
• using personal rewall software to block unwanted access and intrusion;
• updating the antivirus software regularly;
• tight o ce security using security guards and securing the laptop by locking it down in
lockers when not in use;
• never leaving the laptop una ended in public places
• disabling IR ports and wireless cards when not in use.
• Choosing a secure OS
• Registering the laptop with the laptop manufacturer to track down the laptop in case of
theft.
• Disabling unnecessary user accounts and renaming the administrator account.
• Backing up data on a regular basis.
Box 3.13 | Spy Phone Software!!!
Spy Phone software is installed on the mobile/cell phone of employees, if the employers wants to monitor phone usage.
The Spy Phone software is completely hidden from the user, once it is installed and collects all the available data such as
SMS messages, ingoing/outgoing call history, location tracking, GPRS usage and uploads the collected data to a remote
server.
The employer can simply access the designated website hosted by Spy Phone vendor, and after entering his/her account
details, he/she can have full access to all the data collected 24 hours a day, 7 days a week. The employer can access this
website through the Internet; hence, he/she can keep an eye on their employees, regardless where he/she is in the
world. The employer can read all SMS messages (both incoming and outgoing), know who they (employees) are calling or
who is calling them and where they were when the call was received.