Cyber Security
Cyber Security
Session No. I
Version 1.0
Cyber Security
Material from the published or unpublished work of others which is referred to in the Class
Notes is credited to the author in question in the text. The Class Notes prepared is of 7,203
words in length. Research ethics issues have been considered and handled appropriately
within the Globsyn Business School guidelines and procedures.
Table of Contents
1. Introduction ............................................................................. 7
1.1. Types of Cyber Attacks ................................................................................................. 8
2.1.1. Virus.........................................................................................................................14
2.1.3. Trojan.......................................................................................................................16
2.1.4. Bots..........................................................................................................................16
4. Phishing ................................................................................. 31
4.1. Spear Phishing .............................................................................................................32
References ................................................................................. 42
List of Figures
Figure 1: Skimming Machine ...................................................................................................... 7
Figure 2: Malware Attack ........................................................................................................... 9
Figure 3: Phishing .....................................................................................................................10
Figure 4: Phisher Attack on Traffic ............................................................................................10
Figure 5: Fake Message through Phisher..................................................................................11
Figure 6: Crypto jacking ............................................................................................................12
Figure 7:SQL Injection ..............................................................................................................13
Figure 8: Zero Day Vulnerability Timeline..................................................................................14
Figure 9: Virus Attack in Computers ..........................................................................................15
Figure 10: Win32-Worm ............................................................................................................15
Figure 11: Trojan Attack ............................................................................................................16
Figure 12: Bots Attack – Advanced Worm Attack ......................................................................17
Figure 13: Adware Attack in Computers ....................................................................................18
Figure 14: Spyware Attack ........................................................................................................19
Figure 15 : Ransomware Attack ................................................................................................20
Figure 16: Scareware Attack .....................................................................................................20
Figure 17:Rootkit attack ............................................................................................................21
Figure 18: Zombies Attack ........................................................................................................22
Figure 19: Influenced by Attacker ..............................................................................................23
Figure 20: Legitimate Seeming Background – Phisher Attack ...................................................24
Figure 21: False Lottery Winning Email .....................................................................................25
Figure 22: Computer Upgradation .............................................................................................27
Figure 23: Various Crypto Currencies .......................................................................................28
Figure 24: Crypto Jacking .........................................................................................................29
Figure 25: Crypto Mining Hidden Coding...................................................................................30
Figure 26: Crypto Currency Mining Tricks .................................................................................31
Figure 27: Phishing Email .........................................................................................................32
Figure 28: Spear Phishing .........................................................................................................33
Figure 29: Clone Phishing .........................................................................................................34
Figure 30: Nigerian Phishing .....................................................................................................35
Figure 31:Phone Phishing .........................................................................................................35
Figure 32: Phishing-Biometrics .................................................................................................36
1. Introduction
Have you heard the recent ATM scam held in Kolkata of India? Two skimming machines were
fitted in two ATMs. These two skimming machines stored the data of transactions set in these
ATMs. Later such skimming machines were removed from the machines by an Indian and sold
the data to a certain Romanian above the normal price. A normal price is a price which is set in
the market during the time of auction related to data transferring. The process of stealing was
later disclosed by police. A skimming machine was used by the stealer to store the information
of the users. A small device was used to such stealing known as a skimmer. It took the
information from the magnetic strip fixed over ATM cards. This scam is related to Cyber
security.
Figure 1: Skimming Machine
(Siciliano, 2019)
Nowadays it is feasible that almost every citizen has access over the internet. There are many
options for its use like mobile, Tab, laptop etc. You are also one of such a user who deals most
of your communications through mail on a daily basis. Here you receive your class notes, bank
transaction details, other important information on a regular basis. Somehow, one day if you
discover that you can’t log on your system and whenever you put your password in the
password section your system denies the password. You become helpless at that moment.
Suddenly, you have the realisation that your password has been hacked and your email ID
becomes useless. You realise that you have lost many important documents stored over there
and there is no possibility to retrieve that records anymore. Very shocking situation! Imagine if it
really happens with you what you feel at that moment when it is hacked by an intruder with a
criminal intention. Here comes the importance of cyber-security. Cyber-security is the process
and technique which is used to protect sensitive data, computer systems, networks and
software applications from cyber-attack. Cyber-attack refers to an attack that can be originated
from one or more computers called sources. This sort of attack is done either to deactivate the
functions of target computers or networks or to snatch the data from the target computers or to
gain administrative privileges on it (Siciliano, 2019).
1.1.1. Malware
Malware is known as malicious software. It is a sort of harmful program which damages the
computer system. It affects the files or folders in a system. There are different types of malware
found in the system which keep on malfunctioning and affect the system badly. These are
viruses, worms, Trojan horses and spyware. These harmful programs affect the computer badly
by performing the following functions – stealing; encrypting; deleting sensitive data; alerting or
hijacking core computing functions and controlling user’s computer activity without their
permission. The malicious software can be spread in the following process like when a USB
drive is plugged on a computer malware may be spread to the system if such USB drive is
affected by such malware (Malware Fox, 2019).
(Norton, 2019)
1.1.2. Phishing
Sometimes cybercriminals craft emails for the target users for doing some harmful incidents.
When any user gets attracted to these emails and starts to download the sent documents the
malware starts its functions and spread over the system and take valuable information from the
user. The form of such decisive emails may contain fake links and when a user clicks on the link
a fake website appears on the screen demanding valuable information from the user like bank
ATM password etc. When such sensitive information is passed the worst moment starts to
happen with the user as he gets fooled and victimised by passing the valuable information to the
criminal (Imperva, 2019).
Figure 3: Phishing
(Imperva, 2019)
(Imperva, 2019)
(Portswigger, 2019)
(Singh, 2019)
2.1.1. Virus
It is a dangerous malware that enter the program like songs, videos of the host computer and
has the ability to imitate the programs and interrupt the normal functions of such programs.
They are able to wander all over the internet. File virus, Macro virus, boot sector virus are the
viruses which hook into the program and break its normal function (The Economic Times, 2019).
2.1.2. Worms
When the speed of the computer gets slowing down it represents the presence of another type
of malware into the computer system known as worms. The nature of such malware is self-
replicating however, like a virus it does not hook on the program of the host. The worm merely
moves one computer to another when a network is available. The purpose of such movement is
to rest on the part of the machine and occupy hard disk space. The entrance of the worm in the
hard disk decrease the speed of the computer (Search Security, 2019).
2.1.3. Trojan
In one word Trojan is a stealer. In Greek mythology, a story of Trojan horses is very popular.
The narration of the story is – when the Greeks wanted to capture the city of Troy they applied
one stealing technique known as Trojan horse. This technique iterates that the Trojans were
very fond of horses. Greek soldiers were hidden in a big wooden horse and later such horse
was gifted to the Trojans. The Trojans accepted the gift blindly and the soldiers inside the Horse
emerged and attacked the city. Likewise, Trojan stays inside the software. This affected
software looks normal but when such software is executed Trojan, which is concealed, starts its
operations by stealing all the information from the system or any particular information
commanded to the Trojan for stealing (Kaspersky, 2019). Trojans often provide a back door
gateway for malicious programs for the purpose of entering into the system and take the
valuable data secretly. There are various types of Trojans found in the software. These are –
FTP Trojans, Proxy Trojans, Remote access Trojans etc.
(Kaspersky, 2019)
2.1.4. Bots
Bots are regarded as the advanced form of a worm. For injecting the malware inside the
program human interaction is not necessary. This is because the installation of such advanced
worms inside the program is an automated process. These worms can be good or bad.
Malicious bot affects one host and connects backs to the central server. This central server
transmits the command to all infected hosts connected with the network called Botnet. Botnets
were initially framed to carry out a specific task within a group. Some of the botnet attacks
include:
Distributed denial of service.
Generally, the large scale business is affected by this malware. It is so because this malware
has the ability to deal with ample numbers of data which is found in the operational process of
the large scale organisation. This malware enables the cybercriminals to get hold a large
number of devices and control it by providing instructions that cannot be deviated until such
malware is removed from the system (Panda, 2019).
(Panda, 2019)
2.2.1. Adware
It is a kind of malware whose malicious effect destroys the privacy of the users. When a user
surfs the net generally adware enters into the system. For example, when people download
important information from the internet such downloaded data may bear adware. When such an
affected program is loaded some advertisements start to appear on a particular section on the
screen. Afterward such program files start tracking cookies, key loggers in order to spread the
adware therein. Such programs are also used to perform intrusive hard disk scans. The scary
thing is that if such affected things are not scrutinised, all the important and essential
information may pass on to the unscrupulous persons who seek the secret information of the
user. However, it is noticed that adware can be entered into the computer with the consent from
the user. It is always seen on the internet that some sites display advertisements into a specific
portion of the webpage. The provider of such an advertisement aims to earn revenues through
this advertisement. However, some advertisement bears dangerous adware which starts
malfunctioning whenever such an advertisement is clicked by the user (eSeT, 2019).
(eSeT, 2019)
2.2.2. Spyware
It is a sort of malicious operation which monitors the activities of the user when he is connected
with computers. The collected information afterward sends to the interested parties. The Trojan
malware and Worms are the carriers of spyware. When this malware is entered into the system
the system gets affected by spyware which starts installing itself. Once it is installed it starts to
monitors the system. The example of spyware is Key logger (Anandsafi, 2019). The basic job of
a key logger is to store user keystrokes with a time stamp. The spyware is liable to take up
some important information like username, password, credit card, and debit card details etc.
(Anandsafi, 2019)
2.2.3. Ransomware
When the information that we see on a computer is converted into code it creates lots of
difficulties for the user. The user cannot understand these codes and unable to find out the
meaning of these codes. Such conversion of the content that a user eager to go through is
called encrypted content. The malware which is responsible for making such conversion and
bringing plenty of problem to the user is called Ransomware. The mechanism behind the
development of such malware is a creation of a unique robust encryption algorithm the
application of which converts the text into code and makes it encrypted. To crack the encrypted
file, the programmer sends the decryption code to the affected area and rewinds the system to
the previous state. Unless and until the system gets back the state prior to encryption the
function of the system gets affected. It remains inaccessible either partially or entirely. Money
seeking is a common symptom found in the affected computer as the attackers seek money to
remove the malfunctioning from the machine (Webopedia, 2019).
(Webopedia, 2019)
2.2.4. Scareware
It is a pretention instrument which is fixed in a system and affects the software when the
software is run by the user. It has the capability to damage the system entirely. Until the
software is not in action no harm will happen. Once it starts operating the execution of this
malware gets started. The software frightens the user by displaying a message on the computer
seeking money regarding the removal of this malware (Malware Fox, 2019).
2.2.5. Rootkits
It is a type of malware that attacks the root of the system. This malware is designed in such a
way so that it gets the root access and possesses the administrative privileges in the user
system. When the attacker gets the root access it enables them to steal private data from the
affected system (Comodo, 2019).
(Comodo, 2019)
2.2.5. Zombies
Sometimes the botnets are leased by cybercriminals to other attackers to send spam, scams,
phishing to legitimate websites or networks. Sometimes the hackers wait for doing some
harmful attack until it gets the signal through command to steal the information from the
legitimate computers (Webroot, 2019).
(Webroot, 2019)
online. It is required to gauge whom to trust and reject others whatever tricks they want to apply
over users. The same is true in the case of online transactions. Blindly never falls in prey of any
lucrative advertisement which can destroy the user entirely in terms of money or relationship or
related to any other sensitive issues. Some links are dangerous for the machine and some
downloading materials are also very harmful. Once a user is hacked it is pertinent to know what
can happen with the victim in the post hacking stage. Once the system is hacked for example
suppose the email id password is hacked in such a case the attackers have the mobility to get
access to other important websites of the user (Bisson, 2019). It is because the user generally
uses a common password on all such websites. Once the criminal starts to control the email
account it leads to giving him access over several other websites. This controlling ability gives
them the direction to send an enormous number of emails or messages to the acquaintances of
this user. Few such recipients might be influenced by such mail or message and fulfil the
requirement of the message.
(Bisson, 2019)
The following stories are sent by the attackers to the users once the machine is hacked and the
hacker completely controls the email. These are:
(Imperva, 2019)
(Kaspersky, 2019)
In order to avoid these hazardous attack, the following things should be maintained by the user.
These are:
winning amount will be released by the authority and the user will get the entire lottery amount
(Business Insider, 2019).
(Heimdal, 2019)
years. Therefore, they are now in the process of collecting these currencies as much as
possible so that when the value will increase in the future to a great degree they will encash that
situation. The popularity of this currency is increasing because there exist some believers who
think that the controlling power of central bank over money supply will decrease as this bank is
responsible to lessen the value of money by controlling the money supply in the market. Since
this kind of control creates inflation in the market so the believers think that cryptocurrency is an
alternative way that not only keep up the money supply in the market consistently but also
removes inflation in the market. There are some other believers in the market who believe that
cryptocurrency will overpower traditional currencies as the decentralised technology like block
chain is used behind cryptocurrency transactions (Blockgeeks, 2019).
(Blockgeeks, 2019)
its operation secretly (Hackernoon, 2019). It acts like an unsuspecting element however, a user
may perceive that something is going wrong with the system as the computer starts to run
slowly and lags in execution. Crypto jacking can be done in several processes.
(Hackernoon, 2019)
(C net, 2019)
consumes CPU processing resources and as a result, this type of stealing lessens the life span
of the machine (CISA, 2019).
(CISA, 2019)
4. Phishing
The simplest kind of ill-functioning cyber-attack is known as Phishing. The user is deceived by
sharing sensitive information like passwords and credit numbers when the most dangerous and
effective malware is applied. The most common type of phisher is malspam. In this process, a
user receives a certain text message. This text message either imitates a person or organisation
user trust. This imitated message is called spoofs. The classic version of this scam is a certain
process when a user receives a mail tailored to look like a message from a major bank. This
type of message is circulated to numerous email accounts. The object of this circulation is to
capture a certain number of users who definitely belong to the account holder of the bank. It is
so because people become interested to have an account of a reputed bank. Owing to such a
possibility the hackers send the spoofs to the large volume of email id. Whenever such spoofs
are activated the message demands the victim to fill up the requirements of the legitimate
websites. Although such a site is not original. The users are asked to put their user id and
password. After complying the instructions when the users press the ok button all the
information loaded on the website is transmitted to the hacker’s server. This process enables
the hackers to receive all the important credentials of the users like identities, bank accounts,
personal information etc. Phishing is regarded as the simplest way of spreading malware in the
system (Webroot, 2019). Nowadays most of the equipment like a laptop, tab, mobile, and other
digital gadgets are comprehensively reeled in with fine-tuning security systems. Attackers are
clever and they are aware of this security system. They formulate the easiest way to gullible the
user. The trick is - sending the fake but interesting and essential type of email to numerous
email id as many recipients do not justify their trust before clicking the mails where such mail
comes from. There are different types of a phishing attacks. These are laid down below:
(Webroot, 2019)
audiences. To make it believable the attackers input some relevant and valuable information in
the content like name of the company, employee name, professional relationship between the
company and its peers etc. Another example of spear phishing is – when an employee of a
particular department is served a believable fake mail that demands a major payment that is
required to be made within a short period of time otherwise, the company will be a defaulter.
Such type of mail frightens the staff member. If he does not scrutinise the authenticity of this
mail and executes the instruction, he will be in great trouble (Trend Micro, 2019).
different parts of the globe. However, this convenient medium also brings various types of
threats to the user (Jungle works, 2019). For this reason, security is an important aspect of any
user. As it is already stated that the system gets attacked by different means like malware,
viruses, spyware, adware, worms, Trojan horses etc. Therefore, protecting a system is a must.
These infectious items entirely spoil the system and bring great concern to the user. There are
many ways that can be used to protect the system. Few of these ways are narrated below:
it is required to check that all such important operating system is upgraded. The new version is
generally developed by fixing security vulnerabilities. Using this latest version enables the user
keeping at bay from the threats. In this connection, it should be kept in mind that instead of
using manual software updates a user should adopt automatic software updates (Comodo
Antivirus, 2019).
Install a firewall
Ensure proper access controls
Use IDS/IPS to track potential packet floods
Use a virtual private network
Conduct proper maintenance
(Barnatt, 2019)
5.6.1. Confidentiality
In securing the information stored in the computer it is required to draw restrictions in its use.
Confidentiality take on the measures to restrict sensitive information. This restriction helps to
protect the computers from the attack of hackers. Most of the organisations maintain hierarchy
in all departments. The lower tier is not allowed to access the information beyond the allowable
limit. In the matter of sharing information and securing the account necessary training is given to
all levels. The training includes a guideline about preparing a strong password and other
important things related to a security issues. There exists various process which can ensure the
security of the computer system. These are two-factor authentication, Data encryption, data
classification, biometric verification, and security tokens (Force Point, 2019).
5.6.2. Integrity
It refers to unchanged data during the course of transit whenever such data is accessed in the
system. Data should not be changed in any form nor such data would be deleted, altered
whenever it is accessed. Data safeguard is a process where two measurements are taken into
consideration. One such controlling tool is file permissions and another is user access control.
These two measures are used to control the data breach. The integrity of data can be verified
by using several instruments. These are the checksum checking system or cryptographic
checksum. Backup is a system where all the data is stored which helps the user to produce the
information if such information is deleted or lost in any manner in the organisation (Force Point,
2019).
5.6.3. Availability
The smooth functioning of data can be possible when all the components like hardware,
software, networks etc are maintained properly. When upgraded components are used it
reduces the possibility of any disruption in terms of performance of the machine. The term
availability also involves opting for extra security equipment in case of any disaster or
bottlenecks. The Dos attack can be prevented by employing several useful defensive
mechanisms like firewalls, disaster recovery plans, proxy servers, and a proper backup solution
(Force Point, 2019).
References
Anandsafi, 2019. How Spyware infects your computer.. [Online]
Available at: https://anandsafi.wordpress.com/viruseshacksecurity/how-spyware-infects-your-
computer/
[Accessed 12 12 2019].
Barnatt, C., 2019. Computing Security. [Online]
Available at: https://www.explainingcomputers.com/security.html
[Accessed 13 12 2019].
Bisson, D., 2019. 5 Social Engineering Attacks to Watch Out For. [Online]
Available at: https://www.tripwire.com/state-of-security/security-awareness/5-social-engineering-
attacks-to-watch-out-for/
[Accessed 12 12 2019].
Blockgeeks, 2019. What is Cryptocurrency? [Everything You Need To Know!]. [Online]
Available at: https://blockgeeks.com/guides/what-is-cryptocurrency/
[Accessed 13 12 2019].
Business Insider, 2019. How To Automatically Delete Unwanted Email From Gmail. [Online]
Available at: https://www.businessinsider.in/thelife/how-to-automatically-delete-unwanted-email-
from-gmail/articleshow/28687178.cms
[Accessed 13 12 2019].
C net, 2019. Are your favorite websites mining Bitcoin? Here's how to find out. [Online]
Available at: https://www.cnet.com/how-to/find-out-if-websites-are-mining-bitcoin-
cryptocurrency/
[Accessed 13 12 2019].
CISA, 2019. Illicit Cryptocurrency Mining Activity. [Online]
Available at: https://www.us-cert.gov/ncas/tips/ST18-002
[Accessed 13 12 2019].
Comodo Antivirus, 2019. Easy 5 Steps to Protect Your PC from Hackers- 2019. [Online]
Available at: https://antivirus.comodo.com/blog/computer-safety/5-simple-steps-protect-pc/
[Accessed 13 12 2019].
Comodo, 2019. Rootkit Definition. [Online]
Available at: https://enterprise.comodo.com/rootkit-definition/
[Accessed 12 12 2019].
CSO India, 2019. What is cryptojacking? How to prevent, detect, and recover from it. [Online]
Available at: https://www.csoonline.com/article/3253572/what-is-cryptojacking-how-to-prevent-
detect-and-recover-from-it.html
[Accessed 12 12 2019].
eSeT, 2019. Adware. [Online]
Available at: https://www.eset.com/uk/types-of-cyber-threats/adware/
[Accessed 12 12 2019].