SCT Unit 1
SCT Unit 1
Assign IPs: They can assign IP addresses. In the example of 192.168.1 Street, if a
new house is built on the street, it would get whatever the next highest house number
available. In the case of routers, they assign IP addresses using DHCP—Dynamic
Host Configuration Protocol.
Firewall and Protect: They can filter messages or keep users out of private networks.
Most routers have a Firewall built in. This is a software function that keeps unwanted
messages from reaching the computers on the inside, or private part, of the network.
Network Components
Switches: Switches work as a controller which connects computers, printers, and other
hardware devices to a network in a campus or a building.
It allows devices on your network to communicate with each other, as well as with
other networks. It helps you to share resources and reduce the costing of any organization.
Routers: Routers help you to connect with multiple networks. It enables you to share a single
internet connection with multiple devices. This networking component acts as a dispatcher,
which allows you to analyze data sent across a network. It automatically selects the best route
for data to travel and send it on its way.
Servers: Servers are computers that hold shared programs, files, and the network operating
system. Servers allow access to network resources to all the users of the network.
Clients: Clients are computer devices which access and uses the network as well as shares
network resources. They are also users of the network, as they can send and receive requests
from the server.
Transmission Media: Transmission media is a carrier used to interconnect computers in a
network, such as coaxial cable, twisted-pair wire, and optical fibre cable. It is also known as
links, channels, or lines.
Access points: Access points allow devices to connect to the wireless network without
cables. A wireless network allows you to bring new devices and provides flexible support to
mobile users.
Hub: Hub is a device that splits network connection into multiple computers. It acts a
distribution centre so whenever a computer requests any information from a computer or
from the network it sends the request to the hub through a cable. The hub will receive the
request and transmit it to the entire network.
Network Types
LAN (local area network): A LAN connects computers over a relatively short distance,
allowing them to share data, files, and resources. For example, a LAN may connect all the
computers in an office building, school, or hospital. Typically, LANs are privately owned and
managed
WLAN (wireless local area network): A WLAN is just like a LAN but connections
between devices on the network are made wirelessly.
WAN (wide area network): As the name implies, a WAN connects computers over a wide
area, such as from region to region. The internet is the largest WAN, connecting billions of
computers worldwide.
MAN (metropolitan area network): MANs are typically larger than LANs but smaller than
WANs. Cities and government entities typically own and manage MANs
PAN (personal area network): A PAN serves one person. For example, if you have an
iPhone and a Mac, it’s very likely you’ve set up a PAN that shares and syncs content—text
messages, emails, photos, and more—across both devices
SAN (storage area network): A SAN is a specialized network that provides access to block-
level storage—shared network or cloud storage that, to the user, looks and works like a
storage drive that’s physically attached to a computer.
CAN (campus area network): A CAN is also known as a corporate area network. A CAN is
larger than a LAN but smaller than a WAN. CANs serve sites such as colleges, universities,
and business campuses
VPN (virtual private network): A VPN is a secure, point-to-point connection between two
network end points (see ‘nodes’ below). A VPN establishes an encrypted channel that keeps a
user’s identity and access credentials, as well as any data transferred, inaccessible to hackers
Network Communication Types
The pattern of contacts among the members of the organisation and flow of
information among them is communication network. The network depends upon the
magnitude of the organisation, nature of communication channels in the organisation and the
number of persons involved in the process. There can be many patterns of communication
network.
The most frequently followed networks are the following:
1. Vertical Network:
The vertical network is usually between the superior and subordinate and vice versa.
It is two-way communication. The immediate feedback is possible in this type of
communication network. It is formal network.
2. Circuit Network
In this type of network, two people or nodes will communicate with each other. One of
the nodes will produce messages and the other a feedback to the messages. The communication is
thus two people communicating with each other, sending messages and feedbacks and thus
forming a loop or a circuit.
3. Chain Network: This network of communication follows the organisational hierarchy and
chain of command. All subordinates receive commands or instructions from their superior. B,
C, D and E, F, G are the subordinates to A in the organisational hierarchy and receive
commands from ‘A’
4. Wheel Network: Here all subordinates receive commands from one superior. This is
highly centralized type of communication network where each subordinate receives
commands or instructions from a single authority or superior ‘A’ and wants the immediate
feedback.
5. Star Network: Star communication network all members of the group communicate with
each other and exchange information. This network is a must for group communication or
where teamwork is involved. This network channel of communication is open to all members
of the group. The members communicate with each other without hesitation.
Introduction to Networking Models
The networking model describes the architecture, components, and design used to
establish communication between the source and destination systems.There are 2
predominant models available.
1. Open Systems Interconnection (OSI) Model
2. Transmission Control Protocol/Internet Protocol (TCP/IP) Model
OSI Model
OSI stands for Open System Interconnect. It is an open standard for establishing
communication between systems.
Application Layer: The entire process begins at the end user’s device. This can be a phone,
laptop, server, etc. The application layer provides the interface for data exchange between the
program and the user. For example, Facebook’s web application/mobile application is the
interface through which we like, share, comment, and perform various other activities.
Presentation Layer: The presentation layer ensures the translation of characters from the
original format in the host system to the format of the receiving system. It also adds
encryption and decryption features. Data compression is handled at this layer.
Session Layer: The inclusion of this layer enables maintaining sessions during browsing.
This helps with implementing authentication, authorization, synchronization, and dialog
control.
Transport Layer: The Transport layer is responsible for the reliable transfer of data between
systems. It manages the communication session including flow control, ordering of
information, error detection, and recovery of data.
The Network layer: The Network layer owns the responsibility of delivering data between
different systems in different interconnected networks (internets).
The Data Link layer: The Data Link layer provides rules for sending and receiving data
between two connected nodes over a particular physical medium.
The Physical layer: The Physical layer defines the required hardware, such as cables and
interfaces, for a given medium of communication, such as electrical, radio frequency, and
light-based. In this way, methods for transmitting and receiving bit-streams of information
are defined.
It provides a five-layer representation of the TCP/IP Model. The lower four layers are
numbered identically to the lower four layers of the OSI-RM model.
Application Layer: In the TCP/IP Model, the Application layer encompasses the first three
layers in the OSI model, that is, Application layer, Presentation layer, and the Session Layer.
Transport Layer: This layer is the same as the one mentioned in the OSI model.
Transmission Control Protocol (TCP) is used in this model. TCP ensures reliability and helps
avoids congestion in networks.
Internet Layer
This layer parallels the functions of OSI’s Network layer. It defines the protocols which
are responsible for the logical transmission of data over the entire network. The main
protocols residing at this layer are as follows:
IP: IP stands for Internet Protocol and it is responsible for delivering packets from
the source host to the destination host by looking at the IP addresses in the packet
headers.
ICMP: ICMP stands for Internet Control Message Protocol. It is encapsulated
within IP datagrams and is responsible for providing hosts with information about
network problems.
ARP: ARP stands for Address Resolution Protocol. Its job is to find the hardware
address of a host from a known IP address. ARP has several types: Reverse ARP,
Proxy ARP, Gratuitous ARP, and Inverse ARP.
The Application Layer
These applications are responsible for understanding the data format as well as
interpreting the data. Example applications include the Domain Name Service (DNS), the
Dynamic Host Configuration Protocol (DHCP), the Network File System (NFS), Samba,
electronic mail (e-mail), the file transfer protocol (FTP), and the telnet utility.
It is used to refer to a system that is capable of converting from one network protocol
stack to another, such as a system that is interconnected into both a TCP/IP network and a
Netware network. Gateway is often used to refer to a system that interconnects an internal
internetwork and an external network such as the Internet.
Information security
Technology has covered almost all sides of today’s world, from dusk to dawn, we are
engaged digitally. We are using Smartphone at home to meet all our daily needs, to making a
fund transfer, to ordering a refill of grocery, everything is just a click away.
It is recommended that web application developers are aware of the Top 10 web
application mistakes suggested by OWASP (Open Web Application Security Project).
Cyber Security Objectives and Services
Each of these attacks violates a specific desired property of security. These properties
are termed as security objectives.
1. Confidentiality: Makes sure that data remains private and confidential. It should not be
viewed by unauthorized people through any means
2. Integrity: Assures that data is protected from accidental or any deliberate modification
3. Availability: Ensures timely and reliable access to information and its use.
These three principles are together called as the CIA (Confidentiality, Integrity and
Availability) a group. An alternate way of referring CIA is through DAD (Disclosure,
Alteration and Denial) a group.
Here are three more important concepts in information security to support these pillars
known as AAA (Authentication, Authorization and Accounting) services. These services are
used to support the CIA principles.
Accounting refers to reviewing the log file to check for violations and hold users answerable
to their actions. It includes non-repudiation
Other Terms of Cyber Security
Authentication: The process of identifying a user’s identity, making sure that they can have
access to the system and/or files. This can be accomplished either by a password, retina scan,
or fingerprint scan, sometimes even a combination of the above.
Firewall: Any technology, be it software or hardware, used to keep intruders out.
Antivirus Software: Antivirus software is designed to detect, prevent, and remove
malware infections on computers and other devices. By scanning files and
detecting suspicious activity, these programs help protect against cyber attacks
that could result in data breaches or stolen information.
Uber’s CEO, DaraKhosrowshahi, stated that hackers stole personal data of nearly 57
million Uber users. This personal data included names, phone numbers, email addresses,
debit/credit card numbers of customers and also, license numbers of the drivers serving the
company.
platform). GitHub is a site that many engineers and companies use to store code of IT
projects.
From Uber’sGitHub account, they found the username and password that gave access
to Ubers' data stored in a third party cloud server.Developers accidentally left the login
credentials in code which was uploaded to GitHub and hence, the hackers successfully got
access to the Uber’s server.
Uber faced lawsuits filed by many users as their personal data was leaked.
Uber allegedly paid $100,000 ransom to hackers to get the data deleted
Five transactions were initiated by the hackers, totally worth $101 million.
Later, it was identified that they used a malware named Dridex to execute the attack.
This malware specializes in stealing bank credentials from Microsoft Word.Out of thirty five
transaction requests, five transactions were traced in which hackers had successfully managed
to transfer $20 million to Sri Lanka and $81 million to Philippines
Later, at the request of Bangladesh Bank, The Federal Reserve Bank of New York
blocked the remaining thirty transactions, amounting to $850 million
Indian debit card breach (broken rule) took place in October 2016.It was estimated 3.2
million debit cards were compromised. Major Indian banks including SBI, HDFC, ICICI,
YES Bank and Axis Bank were among the worst hit.
Thebreach was not the result of direct attack on the banks instead it was due to a
malware injected in ATMs and Point-of-Sale (POS) terminals. The malware was injected into
the payment gateway network of Hitachi Payment Systems which facilitates a transaction
either from an ATM or an online payment gateway.
Subsequently, resulted in one of the biggest card replacement drive in India's banking history
SBI announced the blocking and replacement of almost 600,000 debit cards
Microsoft had discovered this vulnerability (quality) and had released security updates
in April 2017 for all the windows versions (except Windows XP and Windows Server 2003)
to fix the exploit. The organizations that had not installed Microsoft's security update or were
using older Windows systems (Windows XP and Windows Server 2003) were affected by the
attack.
The attack was estimated to have affected more than 200,000 computers across 150
countries, with total damages ranging from hundreds of millions to billions of dollars.
One of the largest agencies affected by this attack was the National Health Service.
These examples show that the cyber-attacks are not limited to IT sector. Every
organization reliant on IT for pursuing their mission – education, government, military,
healthcare, retail etc needs to protect itself from such attacks.
Cyber-attacks have increased to such a large extent that even a minute flaw (mistake)
in the system can cost a lot as we have seen in some of the discussed attacks.
Financial gain is one of the main motive behind these attacks but it is not the only
motive. Attacks might just happen to cause chaos (confusion) within the organization. In
some of the cases, hackers have hacked into the system just to pacify (excitement, anger)
their intellectual quest.
Cyber-attacks are a great threat to global economy as well as to our personal data.
A good Cyber security approach plays a vital role in minimizing and controlling
damage, recovering from a Cyber-breach and its consequences.
Categories of Attacks
1. Malware
2. Denial-of-Service (DoS) Attacks
3. Phishing
4. Spoofing
5. Code Injection Attacks
6. Supply Chain Attacks
7. DNS Tunneling
1. Malware: Malware is the most common type of cyber attack mostly because this term
surrounded many subsets such as ransomware, trojans, spyware, viruses, worms,
keyloggers, bots, cryptojacking, and any other type of malware attack that borrow
software in a intended way to do harm.
Ransom ware: In a ransomware attack, an adversary encrypts a victim’s data and offers to
provide a decryption key in exchange for a payment. Ransomware attacks are usually
launched through malicious links delivered.
Trojan: A trojan is malware that appears to be legitimate software disguised as native
operating system programs or harmless files like free downloads.
Spyware: Spyware is a type of unwanted, malicious software that infects a computer or other
device and collect information about user’s web activity without their knowledge.
2. Denial-of-Service (DoS) Attacks:A Denial-of-Service (DoS) attack targeted a network
with false requests in order to disrupt business operations.
In a DoS attack, users are unable to perform routine and necessary tasks, such as
accessing email, websites, online accounts or other resources that are operated by a
compromised computer or network. While most DoS attacks do not result in lost data
and are typically resolved without paying a ransom, they cost the organization time,
money and other resources in order to restore critical business operations.
3. Phishing : Phishing is a type of cyber-attack that uses email, SMS, phone, social
media, and social engineering techniques to share sensitive information — such as
passwords or account numbers — or to download a malicious file that will install viruses
on their computer or phone.
Vishing: Vishing is a voice phishing attack, the hackers use a phone calls and voice
messages pretending to be froma reputable organization to convince individuals to reveal
private information such as bank details and passwords.
SMiShing: SMiShing is the act of sending fraudulent text messages designed to trick
individuals into sharing sensitive data such as passwords, usernames and credit card numbers.
A smishing attack may involve cybercriminals pretending to be your bank or a shipping
service you use.
4. Spoofing: It is a technique through which a cybercriminal disguises themselves as a
trusted source. The adversary is able to engage with the target and access their systems
or devices with the goal of stealing information, extorting money or installing malware
or other harmful software on the device.
Domain Spoofing: Domain spoofing is a form of phishing where an attacker impersonates a
known business or person with fake website or email domain to fool people into the trusting
them. Typically, the domain appears to be legitimate at first glance, but a closer look will
reveal subtle differences.
5. Code Injection Attacks: Code injection attacks consist of an attacker injecting
malicious code into a vulnerable computer or network to change its course of action.
SQL Injection: A SQL Injection attack use system Quality to inject malicious SQL
statements into a data-driven application, which then allows the hacker to extract information
from a database. Hackers use SQL Injection techniques to alter, steal or erase application's
database data.
Cross-Site Scripting (XSS): Cross Site Scripting (XSS) is a code injection attack in which
an adversary inserts malicious code within a legal website. The code then launches as an
infected script in the user’s web browser, enabling the attacker to steal sensitive information
of the user. Web forums, message boards, blogs and other websites that allow users to post
their own content are the most susceptible to XSS attacks.
6. Supply Chain Attacks:A supply chain attack is a type of cyberattack that targets a trusted
third-party vendor who offers services or software vital to the supply chain. Software supply
chain attacks inject malicious code into an application in order to infect all users of an app.
7. DNS Tunneling: DNS Tunneling is a type of cyberattack that leverages domain name
system (DNS) queries and responses to bypass traditional security measures and transmit data
and code within the network.