Cyber Security
Cyber Security
Importance:
Types of Cybersecurity
1. Network Security
Protects computer networks from unauthorized access, data
breaches, and network-based threats. Key components include:
Why It Matters:
Prevention Tips:
2. Application Security
Safeguards applications by addressing vulnerabilities during and
after development. Involves:
Secure Development Practices: Writing code resilient to
attacks like SQL injection and XSS.
Importance:
Install apps only from verified stores like Google Play or the
Apple App Store.
Key Components:
Significance:
5. Mobile Security
Secures data on mobile devices against threats like malware,
phishing, and unauthorized access. Techniques include:
Emerging Trends:
Preventive Measures:
6. Endpoint Security
Protects individual devices like computers, laptops, and IoT devices
using:
Antivirus/Anti-Malware Software: Detects and removes
malicious files.
Firewalls: Monitors and blocks unauthorized network traffic.
Device Encryption: Protects data stored on devices.
Patch Management: Keeps software up to date to address
known vulnerabilities.
Power Grids
Financial Systems
Telecommunications
Transportation
Government Operations
Importance:
Real-World Examples:
Cyber Threats
Cyberwarfare
Cyber Terrorism
1. Emergency Communications:
Ensuring secure and reliable communication systems during
emergencies.
2. Cybersecurity Coordination:
Provides threat intelligence, analysis, and technical support to
public and private sectors.
Maintains a 24/7 cybersecurity operations center to
monitor threats in real-time.
3. Critical Infrastructure Protection:
Oversees 16 critical infrastructure sectors, including
healthcare, financial systems, energy, and water systems.
Develops tools, frameworks, and strategies to address
vulnerabilities in these sectors.
4. Incident Response Assistance:
Assists organizations in responding to and recovering from
cyber incidents.
Offers resources like the Cyber Incident Reporting System
for organizations to report and get help during cyber attacks.
5. Collaboration with Stakeholders:
Partners with state, local, tribal, and territorial (SLTT)
governments, as well as private sector entities, to strengthen
national cybersecurity.
6. Training and Guidance:
Provides training and resources to improve cybersecurity
literacy and infrastructure security for businesses, individuals,
and public institutions.
1. Energy
2. Financial Services
3. Healthcare and Public Health
4. Communications
5. Transportation Systems
6. Food and Agriculture
7. Water and Wastewater Systems
8. Government Facilities
9. Emergency Services
10. Critical Manufacturing
11. Chemical
12. Dams
13. Defense Industrial Base
14. Information Technology
15. Nuclear Reactors, Materials, and Waste
16. Commercial Facilities
1. Operational Disruptions
Cyberattacks, such as ransomware or distributed denial-of-service
(DDoS) attacks,
2. Financial Losses
3. Reputation Damage
long-term consequences.
Organizations must comply with data protection laws, such as the GDPR,
CCPA, or
Types of Hackers
1. System Misconfigurations
6. Zero-Day Vulnerabilities
Some XSS attacks rely on social engineering to trick users into executing
payloads. Proper input sanitization and secure coding practices can
significantly reduce the risk of XSS attacks.
Vulnerability Management
1. Vulnerability Detection
Vulnerability Scanning
Penetration Testing
Google Hacking
2. Vulnerability Assessment
Once vulnerabilities are detected, they are assessed to evaluate their risk
levels and potential impact. A thorough vulnerability assessment allows
organizations to prioritize remediation efforts and address high-risk issues
promptly. It also aids compliance by resolving vulnerabilities before
exploitation.
3. Addressing Vulnerabilities
Remediation
This approach involves fully fixing or patching a vulnerability to
eliminate the risk. It is the most comprehensive method of
addressing vulnerabilities.
Mitigation
Mitigation reduces the likelihood of exploitation by taking temporary
measures, often used while awaiting a permanent fix or patch.
Acceptance
In cases where the risk posed by a vulnerability is deemed minimal
or the cost of fixing it exceeds the potential impact, organizations
may choose to accept the risk. This decision must be well-
documented and justified.
Cyber-Attacks
Passive Attacks
Active Attacks
Designed to alter or disrupt the target system.
Google Earth
Internet Archive
Professional Community
People Search
Nslookup
Whois
Dnsstuff
Traceroute
Visualroute Trace
Email TrackerPro
HTTrack
Website Watcher
Purpose: This tool monitors web pages for changes. Attackers can
use it to track updates on a target’s website, allowing them to
identify new vulnerabilities, updates, or sensitive information shared
publicly.
Competitive Intelligence
Differences
Sr.
Key Active Attack Passive Attack
No.
Information remains
1 Modification Information is modified.
unchanged.
Sr.
Key Active Attack Passive Attack
No.
Impact on
4 System is damaged. No impact on the system.
System
Port Scanning
Port scanning in itself is not illegal unless the hacker engages in an illegal
act using the information obtained.
Importance of Scanning
Cyber-Stalking
Kinds of Cyber-stalking
Conclusion
While provisions like the Information Technology Act, 2000 and Criminal
Law (Amendment) Act, 2013 provide legal recourse for cyberstalking,
there is currently no specific law dedicated solely to the issue. The
government needs to consider enacting a dedicated law for effective
prevention and punishment of cyberstalking. Meanwhile, individuals must
remain cautious about their online activities and sharing personal
information, ensuring they take steps to protect their privacy.
txtUserId = getRequestString("UserId");
txtSQL = "SELECT * FROM Users WHERE UserId = " + txtUserId;
The condition 1=1 is always TRUE. As a result, the query will return all
rows from the Users table, regardless of the intended condition to match a
specific UserId.
SELECT UserId, Name, Password FROM Users WHERE UserId = 1000 OR 1=1;
Here, the condition ""="" always evaluates to TRUE, allowing the query to
return all rows from the Users table, including sensitive information like
usernames and passwords.
Input:
Code:
txtUserId = getRequestString("UserId");
txtSQL = "SELECT * FROM Users WHERE UserId = " + txtUserId;
Resulting Query:
The first part of the query fetches user data, while the second part
executes a destructive command (DROP TABLE Suppliers), leading to data
loss.
These tools significantly reduce the time and effort required for manual
SQL Injection attacks while maintaining high precision and adaptability.
However, ethical use and authorization are critical when employing these
tools.
1. Sanitizing UserInput
Always validate and sanitize user inputs before using them in
dynamic SQL queries. Reject any input that does not meet
predefined criteria.
2. Stored Procedures
Use stored procedures to encapsulate SQL logic. This approach
ensures inputs are treated as parameters, reducing injection risks.
3. Prepared Statements
Employ prepared statements to separate SQL logic from data. User
inputs are treated as parameters, preventing them from altering the
SQL query's structure.
4. Regular Expressions
Implement regular expressions to identify and filter out potentially
harmful input before executing SQL queries.
txtUserId = getRequestString("UserId");
txtSQL = "SELECT * FROM Users WHERE UserId = @0";
db.Execute(txtSQL, txtUserId);
In this method:
Malicious inputs like "" or ""="" are treated as invalid and cannot
alter the query logic.
This parameterized approach ensures inputs cannot affect the structure of
the SQL query, effectively mitigating injection risks.
Zero-Day Exploit
A zero-day exploit is a cyberattack that targets a previously unknown or
unaddressed security vulnerability in software, hardware, or firmware. The
term "zero day" highlights that the vendor has zero days to respond
because attackers are already exploiting the flaw before it is publicly
known or fixed.
5. Patch Development: The vendor creates and tests a fix for the
vulnerability.
1. Physical Threats
These threats can lead to accidental or deliberate damage to
computer hardware and infrastructure. They can be caused by both
internal and external factors, as well as human errors. For instance,
power outages or environmental conditions could damage physical
components.
2. Internal Threats
Internal factors such as unstable power supply, hardware
malfunctions, or internal humidity can cause physical damage to
systems. These threats often arise from within an organization and
can lead to operational failures or system downtimes.
3. External Threats
These threats are caused by external environmental factors such as
lightning, floods, earthquakes, or other natural disasters. They can
cause significant damage to hardware, and sometimes even disrupt
entire IT infrastructures.
4. Human Threats
Human threats can be both intentional and accidental. These
include theft, vandalism, and other forms of infrastructure or
hardware damage caused by human actions. Intentional threats
might be from malicious insiders or attackers, while accidental
threats arise from mistakes or negligence.
5. Non-Physical Threats
These threats are contactless and typically relate to cybersecurity
breaches. They include threats like data corruption, unauthorized
access, information loss, and other breaches that disrupt normal
operations or compromise data integrity.
Attacks on the IT system
An attack on an IT system can lead to data or financial loss, and there are
various types of attacks that can compromise the software and hardware
of a system. These include:
1. Virus
A virus is a harmful program that, when executed, replicates itself
and modifies the host system by inserting its code. It spreads from
one system to another, often to cause damage.
2. Spyware
Spyware is a collection of malicious programs designed to extract
information from computer systems without the user’s consent. It
secretly records activities carried out on the computer.
3. Phishing
Phishing is a common form of cyber attack that aims to deceive
individuals into revealing sensitive information by sending
fraudulent communications that appear to come from reputable
sources. This is typically done through email, text messages, phone
calls, and other forms of communication..
5. Spam
Spam refers to irrelevant or unsolicited messages sent, typically via
email, for the purpose of advertising, malware insertion, or phishing.
It can also be distributed through phone calls, text messages, or
social media.
6. Botnets
A botnet is a network of compromised devices, known as zombies,
controlled remotely by an attacker to carry out malicious tasks
without the user’s knowledge. The 2 words ‘robot’ and ‘network’
jointly form the word Botnet. They are programmed to grow,
automate and assist the hijacker in carrying out bigger cyberattacks
and can operate with minimal cost.
7. DoS Attacks
Denial of Service (DoS) attacks aim to crash a system, making it
inaccessible to users. These attacks target web servers, particularly
in industries like banking, commerce, and government.
8. Ransomware
Ransomware involves encrypting a victim’s data and demanding a
ransom for the decryption key. It uses asymmetric encryption and is
often accompanied by a demand for payment.
9. Mobile Malware
Mobile malware targets the operating systems of mobile devices like
smartphones, tablets, and smartwatches. It aims to steal
confidential data and can cause the operating system to crash.
11. Breaches
A breach refers to the intentional or unintentional release of
sensitive, private, or confidential data into an unprotected
environment. This can be a security breach, where someone gains
unauthorized access, or a data breach, where the stolen information
is exposed.
Types of Malware
Sniffing Attacks
Sniffing attacks are generally categorized into two types: passive and
active.
1. Passive Sniffing
2. Active Sniffing
Penetration Testing
While the terms ethical hacking and penetration testing are often
used interchangeably, there is a subtle difference. Ethical hacking is a
broader field within cybersecurity that encompasses all practices involving
the use of hacking techniques to improve security, whereas penetration
testing refers specifically to the method of simulating attacks to identify
and address vulnerabilities.
1. Reconnaissance
The first phase of penetration testing involves gathering information about
the target system. This phase can be broken down into active and
passive reconnaissance. During this step, penetration testers use various
methods depending on the target system. For example, if the target is an
application, testers may review the source code to look for weaknesses. If
the target is a network, they may use packet analyzers to inspect network
traffic. Pen testers also gather open-source intelligence (OSINT) by
reviewing publicly available information, such as social media profiles,
news articles, and open repositories like GitHub, to find valuable insights
about the target system and its weaknesses.
2. Target Discovery
3. Exploitation
In this phase, penetration testers begin the actual attack. They exploit the
vulnerabilities they discovered during the previous phase by performing
various types of attacks. Common attack methods include:
4. Escalation
At the end of the test, pen testers ensure that they remove all traces of
their activities, such as backdoors, trojans, or modified configurations, to
prevent real attackers from exploiting the same weaknesses. The final
step is preparing a comprehensive report detailing the findings. This
report includes an overview of the vulnerabilities discovered, the methods
used to exploit them, how security measures were bypassed, and specific
recommendations for remediation. The in-house security team can use
this information to address vulnerabilities and bolster the system’s
defenses against potential real-world attacks.
Covering Tracks
Identity theft
Buffer Overflow
Key Concepts:
Example 1:
int main() {
int buffer[10];
buffer[20] = 10;
}
Mitigation Strategies:
Ethical Hacking
Technical Skills:
1. Operating Systems Knowledge: Expertise in Windows, Linux, and
Mac OS.
Non-Technical Skills:
Attack Vectors
Suppose a security firm is tasked with guarding a rare painting that hangs
in a museum. There are a number of ways that a thief could enter and exit
the museum — front doors, back doors, elevators, and windows. A thief
could enter the museum in some other way too, perhaps by posing as a
member of the museum staff. All of these methods represent attack
vectors, and the security firm may try to eliminate them by placing
security guards at all doors, putting locks on windows, and regularly
screening museum staff to confirm their identity.
Threat Modeling
Insider Attack
An insider attack occurs when a trusted individual within an organization
misuses their legitimate access to compromise systems, steal sensitive
data, or disrupt operations. These attacks are particularly dangerous
because they originate from authorized users, such as employees,
contractors, or third parties. Insider attacks can be either malicious
(intentional) or unintentional (caused by negligence or error).
3. Moles
Moles are external actors who gain insider access by posing as vendors,
contractors, or employees, exploiting their access to compromise
organizational systems.
Social Engineering
Prevention Techniques
1. Educate Employees: Provide regular training on recognizing social
engineering attacks.
EISA helps organizations build robust defenses against cyber threats while
maintaining operational efficiency.
Industrial espionage
Employment disputes
Fraud investigations
Forgery-related matters
Bankruptcy investigations
1. Executive Summary:
The Executive Summary provides a concise overview of the
investigation's background, key findings, and the necessity for the
forensic examination. It is primarily intended for senior management
and should include:
2. Objectives:
This section outlines the tasks to be completed during the
investigation. It may also include cases where a full investigation
was not possible. The list of tasks, methods, and their approval by
legal counsel and decision-makers should be outlined. The status of
each task is provided in the final report.
4. Relevant Findings:
This section summarizes evidence with probative value. It addresses
the significance of matches between forensic material and reference
samples, indicating potential sources of the recovered evidence. It
answers questions such as, "What related objects or items were
discovered?"
5. Supporting Details:
This section provides an in-depth analysis of the findings, explaining
how conclusions were drawn. It includes vital files with full path
names, search results, emails/URLs reviewed, the number of files
examined, and other relevant data. This section focuses on technical
depth, including charts, tables, and illustrations to aid in
understanding. It starts by providing background on the media
analyzed and communicates the volume of data reviewed.
6. Investigative Leads:
This section identifies additional actions that may uncover further
information. It suggests further investigative tasks that could be
crucial, such as retrieving older firewall logs for a clearer view of
past attacks. This section is critical for law enforcement and forensic
consultants.
7. Additional Subsections:
Subsections may be included based on client needs, such as:
Forensic Auditing
1. Conflicts of Interest:
This occurs when a fraudster uses their position to benefit
personally at the expense of the company. For example, a manager
may approve inappropriate expenses for an employee with whom
they have a personal relationship.
2. Bribery:
Bribery involves offering money or favors to influence a decision or
situation in one’s favor, often resulting in unethical business
practices.
3. Extortion:
This involves the use or threat of force or intimidation to illegally
gain money or property from an individual or organization. A
forensic audit seeks to uncover such activities and the financial
transactions that may be involved.
2. Collecting Evidence
Forensic auditors gather evidence that meets these criteria:
3. Reporting
A forensic audit requires a detailed written report that includes:
4. Court Proceedings
If the case proceeds to court, the forensic auditor must:
Simplify complex accounting issues for the court and explain them
in clear, layperson’s terms to ensure all parties understand the case.
The Information Technology Act, 2000 (IT Act) is an Indian law passed by
the Indian Parliament and notified on 17 October 2000. It is a
comprehensive legal framework in India that governs electronic
commerce, cybercrimes, and digital signatures. It provides legal
recognition to electronic records, digital signatures, and electronic
contracts, which are essential for regulating online activities and
transactions.
4. Alignment with Other Laws: The IT Act is aligned with and builds
upon various existing laws, including the IPC, Indian Evidence Act,
and others.
Important Facts:
The IT Act 2000 legalizes electronic records and digital signatures, making
e-commerce transactions secure and enforceable. It provides legal
recognition for electronic contracts (Section 10A), consumer protection
through data security (Section 43A, 72A), and supports secure online
payment methods. The Act ensures that e-commerce platforms are held
accountable for protecting personal data and maintaining secure systems
for transactions.
E-Governance
The IT Act 2000 lays the foundation for secure and efficient e-commerce
and e-governance, fostering trust and legal clarity in digital transactions
and government services.
Altering, damaging, or
destroying computer
Tampering with Imprisonment up to 3
Sectio source code or
computer source years or fine up to ₹2
n 65 documents that are
documents lakh or both
required to be kept or
maintained by law
Accessing or causing
unauthorized access to
Imprisonment up to 3
Sectio Hacking with a computer system or
years or fine up to ₹5
n 66 computer system network with malicious
lakh or both
intent, such as stealing
data or damaging it
Fraudulently using
Misrepresentation another person’s
Imprisonment up to 2
Sectio of facts by an electronic signature or
years or fine up to ₹1
n 71 electronic misrepresenting
lakh or both
signature information in a digital
communication
Disclosing confidential
information acquired
Breach of Imprisonment up to 2
Sectio through electronic
confidentiality and years or fine up to ₹1
n 72 means, such as email or
privacy lakh or both
digital communication,
without consent
Knowingly publishing or
using a false digital Imprisonment up to 3
Sectio Publishing false
signature to commit years or fine up to ₹1
n 73 digital signatures
fraud or other criminal lakh or both
activities
Creating or altering
Forging electronic electronic documents or Imprisonment up to 7
Sectio
signatures, digital signatures with years or fine up to
n 74
documents, etc. intent to deceive or ₹10 lakh or both
commit fraud
Challenges:
Cryptography
Applications of Cryptography:
1. Crypto Analysis:
2. Reverse Stereography:
Types of Cryptography:
Symmetric Cryptography:
Key Principles:
Techniques:
4. The recipient uses their private key to decrypt the ciphertext and
access the plaintext.
In this system, for example, Alice encrypts her message with Bob’s public
key and sends it over the internet. Bob then decrypts it using his private
key.
Unique Key Pairs: Each party must generate their own key pair, as
Bob and Alice cannot share a key pair for two-way communication.
RSA (Rivest–Shamir–Adleman)
Elliptic Curve Cryptography (ECC)
Diffie-Hellman
Hash Functions
Hash Function:
Hash functions map data into a fixed-length bit string called the
"hash value."
Message Digest (MD): Includes MD2, MD4, MD5, and MD6. MD5, a
128-bit hash function, was widely used but is now considered
insecure.
BLAKE2: A fast and secure hash function that improves upon SHA-
3. It has two types:
Digital Signature:
4. The receiver decrypts the digital signature using the sender's public
key to obtain the message digest.
5. The receiver computes the message digest from the message using
the same hash function.
1. Substitution Techniques:
e) Vernam Cipher: - Uses a one-time pad, where the key is random and
the same length as the plaintext. Each character of plaintext is combined
with the corresponding key character. - Example: Plaintext: "point",
Ciphertext: "chkot".