Cyber-Security-Notes-Unit-1
Cyber-Security-Notes-Unit-1
Cyber Security (BCC 301)
– By Vishal Sir
Fundamental Roadmap
To Becoming a Cybersecurity Expert
● Internet protocols
● Firewalls
● Virtual Private Networks (VPNs)
● Routers
● TCP/IP
● IP addressing
● SSL certificates
● HTTPS/HTTP protocols
Soft Skills:
1. Analytical Thinking: The ability to think critically and assess complex situations is crucial
for identifying vulnerabilities and creating effective security strategies.
Cybersecurity certificates are a great way to enhance your skills and showcase your expertise
in the field. Here are some popular cybersecurity certifications categorized by skill level:
Entry-Level Certifications
Intermediate-Level Certifications
Advanced-Level Certifications
7. Certified Information Systems Security Professional (CISSP)
Specialized Certifications
Cybercrime refers to illegal activities that involve the use of computers, digital
networks/devices, or the internet. These crimes can target individuals, organizations, or
governments, and may involve hacking, identity theft, fraud,
data breaches, cyberstalking, phishing, or the dissemination of
malicious software (malware). Essentially, cybercrime is any
criminal activity conducted through or facilitated by digital
technologies.
2. Emergence: The word "cybercrime" became prominent with the rise of digital
technology and the internet in the late 20th century. Early references to cybercrime
appeared as computers and networks started being exploited for illegal purposes, such
as unauthorized access to systems (hacking).
3. Historical Context:
○ In the 1970s and 1980s, the advent of personal computers and early networking
systems introduced vulnerabilities that were exploited for activities like
unauthorized access and data theft.
○ The term gained broader recognition during the 1990s as the internet became
widely accessible, leading to more complex cybercriminal activities.
Information Security (often called InfoSec) is the practice of protecting information from
unauthorized access, use, disclosure, disruption, modification, or destruction. It ensures that
data remains secure and available to only those who are authorized
to access it.
2. Integrity: Ensuring that information is accurate and has not been altered without
permission. For example, protecting financial records from being tampered with.
3. Availability: Ensuring that authorized users can access the information when needed.
For example, making sure a company’s website or services are up and running.
By following good information security practices, we can keep our data safe from threats in the
digital world.
Cybercriminals are individuals or groups who commit illegal activities using computers,
networks, or the internet. They exploit digital technologies to steal data, disrupt systems, or
harm individuals, organizations, or governments for
financial, personal, or political gain.
1. Hackers:
○ Black Hat Hackers: Black Hat Hackers are individuals who use their computer
skills to exploit systems, networks, or software for malicious purposes. Their
actions are illegal and unethical, often causing harm to individuals,
organizations, or governments. Black hat hackers typically operate to steal
information, disrupt systems, or gain financial or personal benefits.
○ White Hat Hackers: White Hat Hackers are ethical hackers who use their skills
to identify and fix security vulnerabilities in computer systems, networks, or
software. They work with permission from the system owner and aim to protect
against potential cyber threats.
○ Gray Hat Hackers: Gray Hat Hackers are individuals who fall between the
categories of ethical (white hat) hackers and malicious (black hat) hackers. They
often exploit security vulnerabilities without permission but do so without
malicious intent, typically aiming to highlight flaws or improve security.
2. Fraudsters: Use scams like phishing, fake websites, or emails to steal personal
information, credit card details, or money.
3. Cyberterrorists: Use cyberattacks to create fear or disrupt critical systems, often for
political or ideological reasons.
4. Script Kiddies: Inexperienced attackers who use pre-written tools or scripts to hack into
systems, often just for fun or to cause mischief.
Cybercriminals are a major threat in today’s digital age, but awareness and strong cybersecurity
practices can help protect against their activities.
Cybercrimes are classified based on their nature, target, and the methods used. Below are the
primary categories of cybercrimes:
These crimes directly target individuals, aiming to harm their personal lives or finances.
Examples:
These involve attacks on digital property or assets, such as systems, networks, or digital
information.
Examples:
● Hacking: Unauthorized access to computer systems or networks.
● Ransomware Attacks: Encrypting a victim’s data and demanding payment to unlock it.
● Online Piracy: Illegal downloading or sharing of copyrighted materials like movies,
music, or software.
● Defacement: Altering the content of websites without authorization.
● Intellectual Property Theft: Stealing digital content like trade secrets, designs, or
software codes.
These crimes target businesses, institutions, or governments to disrupt their operations or steal
sensitive data.
Examples:
These cybercrimes often have large-scale implications, targeting national security, critical
infrastructure, or public safety.
Examples:
Examples:
Examples:
7. Financial Cybercrimes
Examples:
8. Cyber-Enabled Crimes
Examples:
● Drug Trafficking on the Dark Web: Using online platforms to buy or sell illegal
substances.
● Human Trafficking: Exploiting the internet to carry out illegal trade of individuals.
Cybercrimes evolve constantly as technology advances, but understanding these classifications
helps to identify, prevent, and respond to them effectively.
● Dark Web: The dark web facilitates global criminal activities, such as selling stolen data,
illegal goods, and hacking tools.
● Developing Nations: These countries may lack the resources or expertise to defend
against cyberattacks, making them vulnerable targets.
4. Economic Impact
● Cybercrimes cost the global economy billions of dollars annually through financial
losses, legal fees, and system downtimes.
● A 2022 estimate by cybersecurity experts projected that cybercrime would cost the
world $10.5 trillion annually by 2025.
5. Cybersecurity Challenges
● Lack of Uniform Laws: Different countries have varying laws and enforcement
capabilities, making international cooperation complex.
● United Nations (UN): Promotes policies to protect global cybersecurity and encourages
member states to collaborate.
● Public-Private Partnerships: Companies and governments work together to improve
security measures and share threat intelligence.
● Strong Cyber Laws: Nations need comprehensive and consistent laws to prosecute
cybercriminals effectively.
Cybercrime is a universal issue requiring a united global response. While technology continues
to evolve, so do cyber threats, making collaboration among nations, organizations, and
individuals critical to ensuring a secure digital environment. By investing in cybersecurity and
fostering international cooperation, we can collectively mitigate the risks posed by
cybercriminals.
In today’s digital age, where the internet connects billions of people and businesses, cybercrime
has become a major threat. As technology continues to evolve, so do the methods of
cybercriminals, making it increasingly important for everyone — from casual internet users to
large organizations — to take steps to protect themselves online. Here’s a survival mantra for
netizens (internet users) to stay safe in the era of cybercrime:
1. Be Vigilant and Aware
The first step in protecting yourself online is awareness. Cybercriminals often rely on human
error or ignorance to succeed. Be cautious of:
● Suspicious Emails and Links: Always verify the sender’s email before clicking any
links or opening attachments. Cybercriminals use phishing techniques to trick you into
revealing personal information.
● Fake Websites: Before entering sensitive information, ensure the website is legitimate
by checking its URL (look for "https" and a padlock symbol).
● Pop-Up Ads and Offers: Avoid clicking on unsolicited pop-up ads or offers that seem
too good to be true.
Weak or repeated passwords are easy targets for cybercriminals. Create passwords that are
hard to guess by:
● Using a mix of uppercase and lowercase letters, numbers, and special characters.
● Making passwords longer (at least 12 characters).
● Avoiding obvious passwords like “123456” or “password”.
● Never reusing passwords across different accounts.
Consider using a password manager to store and generate strong passwords.
Two-factor authentication adds an extra layer of security to your online accounts. Even if your
password is compromised, an attacker would still need the second authentication (like a
one-time code sent to your phone) to gain access. Enable 2FA on all accounts that support it,
especially for critical services like banking, email, and social media.
These updates often include security patches that fix known vulnerabilities and help protect you
from attacks.
Invest in reputable antivirus software that can detect and protect against malware, ransomware,
and other malicious software. Regularly run scans on your device to detect any potential
threats.
While public Wi-Fi networks are convenient, they are also a prime target for hackers who can
intercept your data. Avoid accessing sensitive information, like online banking, when using
public Wi-Fi. If necessary, use a Virtual Private Network (VPN) to encrypt your internet
connection and protect your data.
Ensure all your devices — computers, smartphones, and tablets — are secure:
Stay informed about the latest cybercrime trends and educate yourself about potential threats.
Share this knowledge with friends and family, especially those who may not be tech-savvy. The
more you know about online dangers, the better prepared you’ll be to protect yourself.
● Set up alerts with your bank and credit card providers to monitor for unauthorized
transactions.
● Review your social media accounts for any changes or strange activities.
● Check your credit reports to ensure there are no fraudulent accounts opened in your
name.
Cybercriminals may use ransomware to lock you out of your files or delete important data. To
avoid losing valuable information, regularly back up your data to external drives or cloud
storage. This ensures you can recover important files in case of an attack.
When storing sensitive data or communicating with others, use encryption tools to protect your
information. Encryption ensures that even if someone intercepts your data, it will be unreadable
without the correct decryption key.
The rise of cybercrime doesn’t mean we must live in constant fear, but it does require us to be
vigilant, informed, and proactive. By following this survival mantra, netizens can greatly reduce
their risk of falling victim to cybercrimes. Security is not a one-time effort but a continuous
process, so make it part of your daily routine to stay safe online.
The first step in a cyber attack is gathering information about the target. Cybercriminals
spend time researching and identifying potential vulnerabilities in the system they plan to
exploit.
Example: A hacker might look up an organization's public website, social media profiles, or
employee details to find weaknesses such as outdated software or poorly configured systems.
Once the cybercriminal has gathered enough information, they begin scanning the target for
vulnerabilities. This involves mapping the network and identifying any weaknesses that can be
exploited.
● Port Scanning: Identifying open ports on a server or network device that may be
susceptible to attack.
● Vulnerability Scanning: Using automated tools to check for known vulnerabilities in the
software or hardware used by the target.
● Social Engineering: Attackers may also use deception to gather information from
employees, like phishing or pretexting, to gain access to internal systems.
Example: A hacker might discover that an organization is using outdated software with known
security flaws and plan to exploit those vulnerabilities.
In this phase, the attacker gains unauthorized access to the system. This is where they
exploit the vulnerabilities identified earlier, using a variety of methods to bypass security
measures.
Once access is gained, the hacker will try to maintain control of the compromised system,
ensuring they can come back later even if the breach is discovered.
● Backdoors: Attackers often create a hidden "backdoor" into the system to maintain
access, even if the original vulnerability is patched.
● Rootkits: Malicious software that allows attackers to maintain administrative control
over a system without detection.
● Password Theft: Hackers may steal passwords and other credentials to make it easier
to access the system again in the future.
Example: After gaining access to a company’s server, a hacker might install a backdoor that
allows them to return without having to bypass security measures again.
5. Escalating Privileges
In this phase, attackers attempt to escalate their privileges to gain higher levels of access and
control. This allows them to exploit the system even more deeply and carry out their attack
without restrictions.
Example: An attacker who initially gains access as a regular user may exploit a flaw to gain
administrator privileges, allowing them to bypass security restrictions and access more
sensitive data.
Now that the attacker has full control, they proceed with the main goal of the attack, which could
include data theft, sabotage, or disruption.
● Data Exfiltration: Stealing sensitive information like customer records, financial data, or
intellectual property.
● Ransomware: Encrypting data and demanding payment for decryption keys.
● Denial of Service (DoS): Overloading systems to crash them or make services
unavailable.
● Wiping Data: Deleting critical data or damaging the target’s infrastructure.
Example: In a ransomware attack, the cybercriminal encrypts the victim's files and demands
payment in exchange for the decryption key.
● Deleting Logs: Attackers may delete or alter system logs to erase evidence of their
actions.
● Using Encryption: Encrypting communication to avoid detection by network monitoring
tools.
● Removing Malware: If their malware has been detected, hackers may try to remove
traces of it to avoid detection by antivirus or monitoring systems.
Example: After stealing sensitive financial data, a hacker might erase all logs of the attack to
make it harder for investigators to trace the origin.
The final goal for most cybercriminals is to profit from their actions. How they monetize the
attack depends on their motive, but common methods include:
● Selling Stolen Data: Data such as personal information, credit card numbers, or login
credentials can be sold on the dark web.
● Ransom Payments: Demanding money from victims in exchange for decrypting data or
restoring access.
● Selling Access: Selling access to compromised systems or networks for other criminal
activities.
Example: A hacker might sell stolen credit card information on the dark web, or sell access to a
compromised corporate network to other attackers.
Understanding how cybercriminals plan their attacks can help organizations and individuals
take the necessary steps to protect themselves. Key defenses include:
By staying proactive and adopting security best practices, you can reduce the risk of falling
victim to a cyberattack.
Social engineering
Social engineering refers to the psychological manipulation of people into performing actions or
divulging confidential information. It's often used in cybersecurity contexts, where attackers
exploit human behavior rather than technical vulnerabilities to gain access to systems or data.
3. Baiting: Offering something enticing (e.g., free software or media) to lure victims into
downloading malicious software or sharing private information.
5. Vishing: A form of phishing conducted via voice calls or voicemail messages, often
pretending to be from trusted institutions.
Social engineering relies on trust, urgency, or fear to convince the target to make decisions
without fully considering the consequences. This makes it a potent tool for cybercriminals.
Cyberstalking
Cyberstalking can be emotionally and mentally harmful, and in some cases, it can lead to
real-world danger. If you or someone you know is experiencing cyberstalking, it's important to
document the harassment, report it to the platform or service being used, and potentially involve
law enforcement.
Cybercafe
A cybercafe is a public space where people can access the internet and use computers for a
fee. These establishments typically provide computers with internet connections, and often offer
additional services like printing, scanning, gaming, and sometimes even refreshments like
snacks or drinks.
Cybercafes became widely popular in the late 1990s and early 2000s, especially in areas where
home internet access was limited or expensive. They were often used by travelers, students,
and people who didn't have personal computers or reliable internet connections at home.
1. Internet Access: The primary service is providing internet access via desktop
computers, though some may also have laptops or private rooms.
2. Printing & Scanning: Many cybercafes offer printing and scanning services for a fee,
which can be useful for business or personal needs.
4. Software: Cybercafes may offer access to various software, such as word processors,
graphic design tools, or even specialized software for specific tasks like video editing.
6. Public Workstations: The computers are often arranged in rows or in open spaces, so
they are available to multiple users simultaneously. Some cafes may offer private booths
or rooms for more privacy.
● Students: Students who don’t have access to personal computers or who need to use
specialized software may visit cyber cafes for academic purposes.
● Gamers: Some cybercafes are specifically designed for online gaming, providing
high-performance systems and internet connections for competitive gaming or casual
play.
● Security Concerns: Using public computers can expose personal information if the
user forgets to log out of accounts or leaves sensitive information on the computer.
● Privacy Issues: Since cybercafes often don’t offer private booths, users might feel their
activities are exposed to others, especially if the space is crowded.
● Malware and Viruses: Public computers can sometimes be infected with malware,
which can compromise personal data or disrupt usage.
In response to these concerns, many cybercafes implement security measures like antivirus
software, session timers, and password protection, and may monitor activity to prevent misuse.
Despite the rise of personal devices and home internet access, cybercafes still play an
important role in providing internet services to people without reliable access or those who need
specialized resources.
Botnet
A botnet is a network of computers or devices that have been infected with malicious software
(malware) and are under the control of a cybercriminal, often without the owners' knowledge.
These compromised devices (called zombies) are used to carry out various types of
cybercrime, with the botnet operator controlling them remotely. Botnets play a significant role in
facilitating cybercrime, often acting as a tool to launch attacks, distribute malware, and execute
other malicious activities.
1. Infection: The botnet begins when a cybercriminal infects multiple devices with
malware, often through methods like phishing emails, malicious websites, or software
vulnerabilities.
2. Communication: Once infected, the devices become part of the botnet and are
connected to a command-and-control (C&C) server controlled by the attacker. The
botnet operator sends commands to the infected devices to perform various tasks.
Botnets are a powerful tool for cybercriminals and are used in a variety of ways to fuel
cybercrime activities. Some of the common cyber crimes associated with botnets include:
○ A botnet is often used to carry out DDoS attacks, where the attacker floods a
target server or website with a huge volume of traffic. This overwhelms the
target’s infrastructure, causing it to crash or become temporarily unavailable.
○ Phishing emails attempt to deceive users into revealing sensitive information like
passwords, bank account details, or credit card numbers.
3. Data Theft:
○ Once a device is infected, botnets can be used to exfiltrate sensitive data from
the compromised systems. This could include login credentials, financial
information, or personal documents.
○ Botnets can facilitate large-scale data breaches, as the attacker uses the
infected devices to access and steal valuable data from numerous sources.
4. Cryptojacking:
○ Botnets can be used for cryptojacking, where the compromised devices are
used to mine cryptocurrency for the attacker. This process utilizes the computing
power of the infected devices, which often slows down the device and consumes
excessive amounts of energy without the knowledge or consent of the device
owner.
5. Click Fraud:
○ Botnets can be deployed to commit click fraud, where the botnet clicks on
online ads or promotional links to generate fraudulent ad revenue. The attacker
can profit from this scam by creating fake clicks that appear to come from real
users.
6. Credential Stuffing:
○ Botnets are often used in credential stuffing attacks, where the attacker uses
stolen username and password combinations (often obtained from data
breaches) to try and access accounts across multiple websites and services.
The sheer volume of login attempts made by a botnet can bypass some basic
security measures.
Botnets spread and execute their attacks using various attack vectors, including:
1. Malware:
○ Botnets typically spread through malware, which can be delivered via email
attachments, infected websites, or malicious downloads. Once the malware is
installed on a device, it connects the device to the botnet.
2. Exploiting Vulnerabilities:
3. Social Engineering:
1. Update Software Regularly: Ensure that all devices, including IoT devices, are running
the latest security patches and updates.
2. Use Strong, Unique Passwords: Avoid using default passwords and employ strong,
complex passwords across devices and online accounts.
3. Install Antivirus and Anti-malware Software: Security software can help detect and
remove malicious programs that might be used to infect devices.
4. Network Security: Employ firewalls, intrusion detection systems, and other network
security measures to detect and block suspicious activity associated with botnets.
5. Educate Users: Awareness of phishing attempts, malicious websites, and other social
engineering tactics can help prevent users from inadvertently downloading malware.
6. Monitor for Unusual Behavior: Both individuals and organizations should monitor their
devices and networks for signs of unusual activity, such as slower performance or
unexpected network traffic, which could indicate botnet involvement.
Botnets are a powerful tool for cybercriminals, enabling them to conduct large-scale attacks,
distribute malware, steal data, and exploit vulnerabilities in systems. The attack vectors used by
botnets are diverse and constantly evolving, which makes them a persistent threat in the
cybercrime landscape. Taking proactive security measures can help reduce the risk of
becoming part of a botnet and mitigate the impact of botnet-driven cybercrimes.
Unit 1: Completed