Cyber Security
Cyber Security
threats, such as hacking, data breaches, malware, and other malicious attacks.
Cyber crime
A cybercrime is any criminal activity that involves a computer, network, or digital device as
either the target or the means for committing the offense.
Essentially, it refers to crimes that are facilitated or carried out using technology.
These crimes can affect individuals, businesses, governments, or society at large, and they
often involve the unauthorized access, theft, or damage of digital information or systems.
Illegal Actions: It typically involves illegal actions such as theft, fraud, identity theft,
data breaches, or even harassment.
Impact on Data or Systems: The crime may disrupt, damage, or steal information,
disrupt services, or cause harm to a network or device.
3. Ransomware: Malicious software that locks users out of their data or system and
demands a ransom to restore access.
7. Online Fraud: Activities like fake online shopping sites, investment scams, or
deceptive services that cheat victims out of money.
9. Child Exploitation: Using the internet to exploit, harm, or abuse children, including
the production or distribution of child pornography.
Examples of Cybercrime:
A scammer sending fake emails to trick people into giving away credit card details.
Malware is software that gets into the system without user consent to steal the user’s
private and confidential data, including bank details and passwords. They also generate
annoying pop-up ads and change system settings.
Malware includes computer viruses, worms, Trojan horses, ransomware, spyware, and
other malicious programs.
Individuals and organizations need to be aware of the different types of malware and take
steps to protect their systems, such as using antivirus software, keeping software and
systems up-to-date, and being cautious when opening email attachments or downloading
software from the internet.
Why Do Cybercriminals Use Malware?
Cybercriminals use malware, including all forms of malicious software including
viruses, for various purposes.
Using deception to induce a victim to provide personal information for identity theft
Theft of customer credit card information or other financial information
Taking over several computers and using them to launch denial-of-service attacks
against other networks
Here are five ways through which adware negatively affects systems:
1. Bundled Apps: Some adwares are hidden in other genuine app installers.
2. Phishing Links: These are emails or ads that contain links to other sites with hidden
adware modules.
3. Trojanized Mobile Apps: Free games or utilities with embedded ad-serving libraries
4. Browser Hijacker: These are extensions or plug-ins that silently modify various
configuration files.
5. Infected USB Drives: These include installing adware executables when inserted into
unprotected computers.
Spyware
Spyware is a breach of cyber security as it usually gets into the laptop/ computer
system when a user unintentionally clicks on a random unknown link or opens an
unknown attachment, which downloads the spyware alongside the attachment.
Spyware enters the laptop/computer system through the below-listed ways:
Phishing: It is a form of a security breach where spyware enters the system when a
suspicious link is clicked or an unknown dangerous attachment is downloaded.
Spoofing: It goes alongside phishing and makes the unauthorized emails appear to
come from legitimate users or business units.
Free SoftwareSoftware or Shared Software: It gets into the system when a user installs
software that is free of cost but has additional spyware added to it.
Misleading software: This is advertised as very beneficial for the system and boosts
the speed of the system, but it leads to the theft of confidential information from the
system.
Types of spyware
Here are some common types:
Keyloggers: These record keystrokes typed in by the user, and they can record
passwords and other sensitive messages.
Adware: Though not necessarily badware, adware provides advertisements that are not
wanted and tracks your Internet activity to provide relevant advertisements.
Trojans: These are rogue programs that disguise themselves as genuine applications,
but in reality, they contain spyware that spies on or steals information.
Tracking Cookies: These are small data files that are created on your browser by the
sites that you visit to keep track of your browsing history and preferences. They can be
useful for advertising purposes since the users of these gateways would prefer only this
kind of content.
System Monitors: These capture user activity relative to the online mode and use of the
system for other ill intentions.
Data Harvesters: These are intended for the capture and transfer of messages or data,
which may be in the form of personal identity, log-in data, or even a credit card
number, among others.
Browser hijackers: These make changes to your browser, like the home page or search
page, and can forward you to sites that contain malware.
Remote Access Trojans (RATs): These grant the attackers full control of your device
from a distance that they cannot be noticed, and they have access to all files, among
other things.
Computer Virus
A computer virus is a type of malicious software program ("malware") that,
when executed, replicates itself by modifying other computer
programs and inserting its code.
When this replication succeeds, the affected areas are then said to be "infected".
Viruses can spread to other computers and files when the software or documents
they are attached to are transferred from one computer to another using
a network, a disk, file-sharing methods, or through infected email attachments.
A virus can harm or destroy data, slow down system resources, and log
keystrokes, among other things.
A virus can have unexpected or harmful outcomes during this procedure, such
as destroying system software by corrupting data.
Some viruses are made to mess things up by deleting files, messing up
programs, or even wiping out your hard drive completely.
Even if they're not super harmful, viruses can still slow down your computer a
lot, using up memory and making it crash often.
How to Prevent Your Computer From Viruses?
Install Antivirus Software
Update Regularly
Be Cautious with Emails and Downloads
Use Strong Passwords
Backup Your Data
Computer Worm
A computer worm is a type of harmful software that copy itself and spread from
one computer to another without requiring any user intervention.
It's like a sickness that can move through a network of computers, searching for
weaknesses to infect.
Worms often spread through email attachments that may seem safe, but they
can actually cause a lot of trouble.
Once a computer is infected, the worm can send itself to the person's contacts,
using their email account. This way, it keeps spreading to more and more
computers.
How To Prevent Computer Worm Infections ?
1. Keep your software updated and use strong passwords
2. Enable and properly configure firewalls on your computer and network devices.
3. Be cautious with email when dealing with email attachments and links.
4. Practice safe web browsing by avoiding clicking on suspicious advertisements or pop-
up windows.
5. Install and keep updated a reliable antivirus or anti-malware software .
Types of Computer Worms
Email Worms: Email worms spread through email attachments or links
Network Worms: Network worms move through computer networks by exploiting
security weaknesses in network services or protocols
File-Sharing Worms: File Sharing worms target shared folders or peer-to-peer file-
sharing networks.
Instant Messaging (IM) Worms: IM worms spread through instant messaging
platforms. They send infected links or files to a person's contacts. By tricking users
into clicking on these links, they can infect more systems.
Internet Worms: Internet worms target vulnerabilities in websites, web servers, or
web applications. They can infect computers when people visit
compromised websites or interact with infected web content.
Trojan Horse
It is a code that is malicious and has the capacity to take control of the computer. It
is designed to steal, damage, or do some harmful actions on the computer. It tries to
deceive the user to load and execute the files on the device. After it executes, this
allows attackers to perform actions on the user's computer like deleting data from
files, modifying data from files, and more. Now like many viruses or worms, Trojan
Horse does not have the ability to replicate itself.
Features of a Trojan Horse
Steals Information: Trojan horses are often designed to steal sensitive information
such as passwords, banking details, and other personal data stored on the victim's
computer.
Remote Access: A Trojan horse can grant remote access to an attacker, allowing them
to control the infected system and perform actions without the user's knowledge or
consent.
Data Deletion: Some Trojan horses are capable of deleting or corrupting data on the
user's computer, causing data loss or system instability.
Cyber Law is the area of law that deals with the legal issues related to the use of the internet,
digital communications, and information technology. It is also known as Internet Law or
IT Law.
Cyber law refers to the set of rules and regulations that govern online behavior, the internet,
and digital interactions, including the protection of data, privacy, intellectual property, and
prevention of cybercrimes.
Data Privacy: These regulations ensure that organizations handle personal data responsibly,
E-commerce Regulation: It defines rules for online transactions, contracts, and consumer
protection, thereby fostering a fair and secure online marketplace.
Intellectual Property Protection: prevent the unauthorized use and distribution of digital
content,
In India, penalties for cybercrimes are outlined under various sections of the
Information Technology Act of 2000. The Act specifies fines,
imprisonment, or both, depending on the severity and nature of the
cybercrime committed
Intermediary Rules 2021 Governs digital content, social media & OTT
In the section above, we identified the various types of malware along with the method by
which they spread. The ways that malware can infiltrate and spread through networks
continues to expand along with the threat vectors in the digital landscape, including the
following:
Unsecure devices that access the network such as personal mobile devices, PCs, and
IoT devices open an attack vector for malware.
Unsecure networks that are part of a supply chain or unsecure third-party partners’
networks, can infect the networks of other suppliers or give malware access to the
enterprise network.
Older devices on the network with software that is not routinely updated can become
compromised and spread malware.
Email attachments containing malicious code can be opened and forwarded to other
users, spreading the malware across the enterprise.
Phishing or spear phishing emails trick the recipient into sharing passwords that give
access to the corporate network where malware can spread.
Smishing texts, similar to phishing emails but on mobile phones, trick distracted users into
clicking on malware links and entering personal or business credentials that enable
malware to spread on the network.
File servers, such as those based on the common internet file system or network file
system can spread malware as users download infected files.
File-sharing software can allow malware to replicate itself onto removable media such as
thumb drives and then on to computer systems and networks.
Peer to peer (P2P) file sharing can introduce malware by sharing infected files as
seemingly harmless as video, music, or images,
Remotely exploitable network vulnerabilities can enable a hacker to access systems
regardless of geographic location
Social Engineering attacks
Social engineering refers to a wide range of attacks that leverage human interaction and
emotions to manipulate the target. During the attack, the victim is fooled into giving away
sensitive information or compromising security.
A social engineering attack typically takes multiple steps. The attacker will research the
potential victim, gathering information about them and how they can use them to bypass
security protocols or get information. Then the attacker does something to gain the target’s
trust before finally manipulating them into divulging sensitive information or violating
security policies.
Traits of a Social Engineering Attack
Heightened emotions: An attacker threatens the loss of an account to trick
users into providing their credentials, or the attacker might pretend to be an
executive demanding money from a targeted user to instill a sense of urgency in
an employee fearful of losing their job.
Spoofed sender address: Most users are unaware that a sender email
address can be spoofed, but proper email security will stop spoofed senders
from accessing a targeted user’s inbox. Instead, an attacker will register a
domain similar to an official one and hope that a targeted user does not notice
the misspelling.
Strange friend requests: It’s not uncommon for an attacker to compromise an
email account and spam malicious messages to the victim’s contact list.
Messages are usually short and don’t have the personalized element from
friends, so be hesitant to click links from friends if the message does not sound
like personalized communication.
Unprofessional website links: Phishing links are sometimes used with social
engineering to trick users into divulging sensitive information. Never enter
credentials into a website directly from an email link, even if it looks like an official
site (e.g., PayPal).
Too good to be true: Scammers often promise money in exchange for
monetary compensation. For example, a targeted user could get a free iPhone in
exchange for shipping payments. If the offer is too good to be true, then it is
probably a scam.
Suspicious attachments: Instead of tricking targeted users into divulging
private information, a sophisticated attack might work towards installing malware
on a corporate machine using email attachments. Never run macros or
executables on a machine from a seemingly harmless email message.
Questionable sender: Many social engineering techniques are designed to
mimic a familiar source, such as a friend, boss, or co-worker. In the event you
receive a suspicious email message, always check in and ask yourself “did my
boss/friend/co-worker actually send this to me?” Before responding to the email
in question, contact the actual person via phone call, text, or social media
message to validate whether or not their being impersonated.
Refusal to respond to questions: If a message seems suspicious, reply to the
message and ask the sender to identify themselves. An attacker will avoid
identifying themselves and might just ignore the request.
Unidentifiable sender: If the sender is unable or unwilling to verify their identity
with the organization, do not provide any additional information or access that
they're requesting. While email messages are the most common, this applies to
other social engineering tactics as well, such as text messages, phone calls, etc.
A web application is a software program that runs on a web server and is accessed through a
browser. Examples include:
Web application attacks are a major threat in today's digital world. Securing web applications
through best practices and continuous monitoring is essential to protect data and maintain trust.
A web application attack is any exploit that takes advantage of weaknesses in a website or
web-based software to compromise its security.
Web application attacks in cyber security are malicious attempts to exploit vulnerabilities in
web applications to gain unauthorized access, disrupt operations, or steal sensitive data.
SQL Injection occurs when an attacker inputs malicious SQL statements into an input
field (like login or search boxes) to manipulate the application’s database.
Instead of the input being treated as plain text, it gets executed as SQL code. This can
expose or even modify the entire database.
Example Scenario:
A login form asks for a username and password.
The attacker enters:
Consequences:
o Unauthorized access to user data
o Data loss or corruption
o Full control over the database
What It Is:
XSS occurs when attackers inject malicious JavaScript or code into a trusted web page.
When another user loads the page, the code executes in their browser.
What Happens:
The script runs as if it came from the site itself, often stealing session cookies or
redirecting users.
Example:
<script>document.location='http://malicious-site.com'</script>
Consequences:
o Stolen login sessions
o Defaced websites
o Misleading users into revealing data
Example Scenario:
A website allows users to comment on blog posts but does not sanitize input.
Attacker posts:
<script> alert('Your session is stolen'); </script>
What Happens:
Anyone viewing that post triggers the alert. In real attacks, this script could steal cookies
or redirect users to malicious websites.
What It Is:
CSRF tricks a user into submitting a malicious request unknowingly while logged into a
trusted site.
What Happens:
A user might click a hidden link in an email or webpage that executes an action like
transferring money or changing a password.
Example Scenario:
A user is logged into their online banking. While visiting a malicious website, an
invisible form is auto-submitted:
html
CopyEdit
<form action="https://bank.com/transfer" method="POST">
<input type="hidden" name="amount" value="1000">
<input type="hidden" name="to" value="attacker_account">
</form>
<script> document.forms[0].submit(); </script>
The bank thinks the request came from the user and processes the transfer.
Consequences:
o Unauthorized transactions
o User data or settings changed without consent
Security Misconfigurations
What It Is:
These occur when developers or system administrators leave systems in an insecure
state.
Common Misconfigurations:
o Default passwords left unchanged
o Error messages revealing sensitive information
o Unused features or services left enabled
Example Scenario:
A developer leaves the admin dashboard exposed at https://example.com/admin
using default credentials:
makefile
CopyEdit
Username: admin
Password: admin123
An attacker guesses the URL and logs in easily using default credentials, gaining full control
over the site.
Consequences:
o Easy entry points for attackers
o Data leaks through misconfigured servers
What It Is:
Failure to properly protect sensitive information such as passwords, credit card numbers,
or personal data.
Examples of Poor Practices:
o Storing passwords in plain text
o Using outdated encryption methods
o No HTTPS encryption
Consequences:
o Identity theft
o Financial fraud
o Legal and reputational consequences
Example Scenario:
A website uses HTTP instead of HTTPS during login. A user connects over public Wi-
Fi.
What Happens:
A hacker on the same network uses a packet sniffer to capture the unencrypted username
and password.
Insecure Deserialization
What It Is:
Deserialization is the process of converting data into an object in programming. If this
process is not secure, attackers can inject harmful objects or code.
What Happens:
The application might unknowingly execute malicious code or grant access to restricted
areas.
Consequences:
o Remote Code Execution
o Escalation of privileges
o Application crashes
Example Scenario:
A web app stores user settings in a serialized object and sends it to the browser as a
cookie:
user_data = {"role":"user", "name":"John"}
The attacker modifies it:
user_data = {"role":"admin", "name":"John"}
What Happens:
When deserialized on the server without validation, the attacker gains admin privileges.
What It Is:
Access control ensures users can only access resources they're authorized to. Broken
access control means users can access things they shouldn’t.
Examples:
o A user accessing admin pages without permission
o Modifying the URL to access other users’ data
Consequences:
o Data leaks
o Unauthorized actions like deleting records
Example Scenario:
A normal user visits:
https://example.com/account/view?user=1002
Then changes the URL to:
https://example.com/account/view?user=1001
What Happens:
If the application doesn’t check authorization properly, the user can see another person’s
account details.
What It Is:
Web apps often rely on third-party libraries and plugins. If these are outdated or
insecure, attackers can exploit them.
Example:
An old plugin with a known vulnerability can be used to inject malware.
Consequences:
o Supply chain attacks
o Site defacement
o Data exfiltration
Example Scenario:
A site uses an outdated version of a JavaScript plugin that has a known vulnerability.
What Happens:
An attacker uses this vulnerability to run malicious code or hijack the page.
Example: Exploiting a vulnerable version of jQuery or WordPress plugin.
API Attacks
What It Is:
APIs (Application Programming Interfaces) allow systems to communicate. If APIs are
insecure, attackers can manipulate them to access data or take control.
Example:
Changing an API call’s user ID to access someone else’s profile or data.
Consequences:
o Unauthorized data access
o Service disruption
o Misuse of business logic
Data
Equifax Breach (2017) 147 million users' data stolen due to poor security practices.
Exposure
Facebook Graph API A bug allowed attackers to harvest personal data of millions of
API Abuse
(2018) users.