Cyber Seurity 1
Cyber Seurity 1
Study Material
Paper Name : CYBER SECURITY
Paper Code : 23PCAE07
Batch : 2023 – 2025
Semester : II
QUESTION PAPER PATTERN
Course Objectives:
Unit – I
Unit – II
Tips for buying online: Clearing cache for browsers – wireless LAN-major issues with
WLAN-safe browsing guidelines for social networking sites – email security tips –
introduction-smartphone security guidelines – purses, wallets, smart phones –
platforms, setup and installation-communicating securely with a smartphone.
Unit – III
Unit – IV
Unit – V
Text books:
Reference Books:
Introduction to cybercrime:
The internet was born around 1960‟s where its access was limited to few
scientists, researchers and the defense only. Initially the computer crime was only
confined to making a physical damage to the computer and related infrastructure.
Around 1980‟s the trend changed from causing the physical damaging to
computers to making a computer malfunction using a malicious code called virus.
The focus of the computer crime shifted from merely damaging the computer or
destroying or manipulating data for personal benefit to financial crime. These
computer attacks are increasing at a rapid phase. Every second around 25
computers became victim to cyber attack and around 800 million individuals are
affected by it till 2013.
There are around 22 million broadband connections in India till date operated by
around 134 major Internet Service Providers (ISPs).
The term cyber crime is used to describe a unlawful activity in which computer or
computing devices such as smart phones, tablets, Personal Digital
Assistants(PDAs), etc. which are stand alone or a part of a network are used as a
tool or/and target of criminal activity.
Crimes that aim at computer networks or devices. These types of crimes involve
different threats (like virus, bugs etc.) and denial-of-service (DoS) attacks.
Crimes that use computer networks to commit other criminal activities. These
types of crimes include cyber stalking, financial fraud or identity theft.
Insider Attack:An attack to the network or the computer system by some person with
authorized system access is known as insider attack.
It is generally performed by dissatisfied or unhappy inside employees or
contractors. The motive of the insider attack could be revenge
The insider attack could be prevented by planning and installing internal intrusion
detection systems (IDS) in the organization.
Malware is short for malicious software and refers to any software that is
designed to cause harm to computer systems, networks, or users. Malware can
take many forms.
There are various types of malwares present in the Internet. Some of the
popular ones are:
Adware: Itis a special type of malware which is used for forced advertising.
o They either redirect the page to some advertising page or pop-up an
additional page which promotes some product or event.
Spyware: It is a special type of which is installed in the target computer with or
without the user permission and is designed to steal sensitive information from
the target machine. Mostly it gathers the browsing habits of the user and the
send it to the remote server without the knowledge of the owner of the computer.
Browser hijacking software: There is some malicious software which are
downloaded along with the free software offered over the internet
o installed in the host computer without the knowledge of the user. This
software modifies the browsers setting and redirect links to other
unintentional sites.
Virus: A virus is a malicious code written to damage/harm the host computer by
deleting or appending a file,
o occupy memory space of the computer by replicating the copy of the code,
o slow down the performance of the computer, format the host machine, etc.
o It can be spread via email attachment, pen drives, digital images, e-
greeting, audio or video clips, etc.
o A virus may be present in a computer but it cannot activate itself without
the human intervention.
o Until and unless the executable file(.exe) is execute, a virus cannot be
activated in the host machine.
Worms: They are a class of virus which can replicate themselves.
o They are different from the virus by the fact that they does not require
human intervention to travel over the network and spread from the
infected machine to the whole network.
Trojan horse: Trojan horse is a malicious code that is installed in the host
machine by pretending to be useful software.
o The user clicks on the link or download the file which pretends to be a
useful file or software from legitimate source.
o It not only damages the host computer by manipulating the data but also it
creates a backdoor in the host computer
o Trojens neither infect the other computers in the network nor do they
replicate.
o The computers of this network which are infected by malicious code are
known as zombies.
o
A typical botnet
Scare ware: Internet has changed how we talk, shop, play etc. It has even changed the
way how the criminal target the people for ransom.
As the user proceeds to download, a malicious code, known as scare ware is
downloaded into the host computer.
Logic Bombs: A logic bomb is a malicious program that uses a trigger to activate the
malicious code. The logic bomb remains non-functioning until that trigger event
happens.
Rootkits: A rootkit modifies the OS to make a backdoor. Attackers then use the
backdoor to access the computer distantly.
Backdoors: A backdoor bypasses the usual authentication used to access a system.
The purpose of the backdoor is to grant cyber criminals future access.
Keyloggers: Keylogger records everything the user types on his/her computer system to
obtain passwords and other sensitive information and send them to the source of the
keylogging program.
How to Know If Our Devices Are Infected With Malware?
The following are the most typical indications that malware has compromised your
computer:
Performing poorly on the computer by execution.
When your web browser directs you to a website you didn’t intend to visit, this is
known as a browser redirect.
Warnings about infections are frequently accompanied by offers to buy a product
to treat them.
Having trouble starting or shutting down your computer.
Persistent pop-up ads.
How to Protect From Malware?
1. Update your operating system and software. Install updates as soon as they
become available
2. Never click on a popup’s link. Simply click the “X”
3. Don’t install too many apps on your devices.
4. be cautious when using the internet.
5. Do not click on unidentified links. Advantages of Detecting and Removing
Malware
6. Choose the websites you visit wisely.
7. Emails requesting personal information should be avoided. Do not click a link
in an email
How to Remove Malware?
An antimalware tool that handles malware detection and removal is
Malwarebytes. Malware can be eliminated from Windows, macOS, Android, and
iOS operating systems.
A user’s registry files, currently running programs, hard drives, and individual files
can all be scanned by Malwarebytes. Malware can then be quarantined and
removed if it is found. Users cannot, however, set automatic scanning schedules
like they can with some other tools.
Advantages of Detecting and Removing Malware:
1. Improved Security
2. Prevent Data Loss
3. Protect Reputation
4. Increased Productivity:
White Hat: white hat hackers are the persons who hack the system to find
the security vulnerabilities of a system and notify to the organizations so
that a preventive action can be taken to protect the system from outside
hackers.
o White hat hackers may be paid employee of an organization who is
employed to find the security loop-holes .
Black Hat: in contrast to the white hat, the black hat hack the system with
ill intentions.
o They may hack the system for social, political or economically
motivated intentions. They find the security loopholes the system
Grey Hat: Grey hat hackers find out the security vulnerabilities and report
to the site administrators and offer the fix of the security bug for a
consultancy fee.
Data Diddling:
It is a practice of changing the data before its entry into the computer
system. Often, the original data is retained after the execution on the data
is done.
For example, DA or the basic salary of the person is changed in the payroll
data of an individual for pay calculation.
Email Spoofing :
It is a process of changing the header information of an e-mail so that its
original source is not identified and it appears to an individual at the
receiving end that the email has been originated from source other than
the original source.
AUTHENTICATION
Authentication is the process of verifying a user or device before allowing
access to a system or resources. In other words, authentication means
confirming that a user is who they say they are. This ensures only those
with authorized credentials gain access to secure systems.
Authentication is the process of verifying who someone is, whereas
authorization is the process of verifying what specific applications, files,
and data a user has access to.
The list below reviews some common authentication methods used to secure
modern systems.
1. Password-based authentication: Passwords are the most common methods
of authentication.
2. Multi-factor authentication.
3. Certificate-based authentication.
4. Biometric authentication.
5. Token-based authentication.
Factors:
Factors include:
(i) Something you know (e.g. password/personal identification number (PIN)).
(ii) Something you have (e.g., cryptographic identification device, token).
(iii) Something you are (e.g., biometric).
DIGITAL SIGNATURES
1. The digital signature is created by encrypting the data with the private key of
the sender. The encrypted data is attached along with the original message
and sent over the internet to the destination.
2. The receiver can decrypt the signature with the public key of the sender. Now
the decrypted message is compared with the original message.
3. If both are same, it signifies that the data is not tempered and also the
authenticity of the sender is verified as someone with the private key(which is
known to the owner only) can encrypt the data which was then decrypted by
his public key.
4. If the data is tempered while transmission, it is easily detected by the receiver
as the data will not be verified. Moreover, the massage cannot be re-
encrypted after tempering as the private key, which is posses only by the
original sender, is required for this purpose.
5. As more and more documents are transmitted over internet, digital signatures
are essential part of the legal as well as the financial transition.
6. Its not only provides the authentication of a person and the validation of the
document, it also prevents the denial or agreement at a later stage.
1. To prevent these unpleasant situations, the digital signatures are used.
[Digital signature]
ANTIVIRUS
Antivirus software (antivirus program) is a security program designed to prevent,
detect, search and remove viruses and other types of malware from computers,
networks and other devices.
Most Antivirus programs will employ these four types of detection techniques:
Signature detection is a method by which an antivirus keenly scans files that
are brought into a system to analyze more likely hazardous files.
Specific detection, which looks for known parts or types of malware or patterns
that are linked by a common codebase
A generic the detection is a type of detection that looks for known parts or
types of malware or patterns that are related to a common codebase.
Heuristic detection is a type of virus detection that looks for unknown
infections by spotting suspicious file structures.
Examples of Antivirus Software
The antivirus software is available in 2 types:
(i) Free: Free anti-virus software provides basic virus protection
(ii) Paid: commercial anti-virus software provides more extensive protection.
There are verities of malicious programs like virus, worms, trojan horse, etc that
are spread over internet to compromise the security of a computer either to
destroy data stored into the computer or gain financial benefits by sniffing
passwords etc.
To prevent these malicious codes to enter to your system, a special program
called an anti-virus is used which is designed to protect the system against virus.
It not only prevents the malicious code to enter the system but also detects and
destroys the malicious code that is already installed into the system.
There are lots of new viruses coming every day. The antivirus program regularly
updates its database and provides immunity to the system against these new
viruses, worms, etc.
Benefits of Antivirus Software:
1. Spam and advertisements are blocked
2.Virus protection and transmission prevention
3. Hackers and data thieves are thwarted
4. Protected against devices that can be detached
5. To improve security from the to web, restrict website access
6. Password Protection
Disadvantages of Antivirus programs:
Slows down system’s speed
Popping up of Advertisements:
Security Holes
No customer care service
FIREWALL
A firewall is a network security device that monitors incoming and outgoing
network traffic and decides whether to allow or block specific traffic based on a
defined set of security rules. Firewalls have been a first line of defense in
network security for over 25 years.
Firewall can be defined as a special type of network security device or a software
program that monitors and filters incoming and outgoing network traffic based
on a defined set of security rules
Firewalls are primarily used to prevent malware and network-based attacks.
Firewalls have become so powerful, and include a variety of functions and
capabilities with built-in features:
1. Network Threat Prevention
2. Application and Identity-Based Control
3. Hybrid Cloud Support
4. Scalable Performance
5. Network Traffic Management and Control
6. Access Validation
7. Record and Report on Events
.
[Firewall]
There are two type of traffic in an organization. Inbound traffic and outbound
traffic.
Using firewall, it is possible to configure and monitor the traffic of the ports. Only
the packets from trusted source address can enter the organizations network
and the sources which are blacklisted and unauthorized address are denied
access to the network.
It is important to have firewalls to prevent the network from unauthorized access,
but firewall does not guarantee this until and unless it is configured correctly. A
firewall can be implemented using hardware as well as software or the
combination of both.
Packet Filtering- based on the rules defined in the policies each packet is filtered
by their type, port information, and source & destination information. The
example of such characteristics is IP address, Domain names, port numbers,
protocols etc. Basic packet filtering can be performed by routers.
Stateful Inspection: rather than going through all the field of a packet, key
features are defined. The outgoing/incoming packets are judged based on those
defined characteristics only.
The firewalls are an essential component of the organizations‟ network. They not
only protect the organization against the virus and other malicious code but also
prevent the hackers to use your network infrastructure to launch DOS attacks.
STEGANOGRAPHY
Steganography is the practice of concealing information within another
message or physical object to avoid detection. Steganography can be used to
hide virtually any type of digital content, including text, image, video, or audio
content. That hidden data is then extracted at its destination.
Steganography is the technique of hiding data within an ordinary, nonsecret
file or message to avoid detection; the hidden data is then extracted at its
destination. Steganography use can be combined with encryption as an extra
step for hiding or protecting data.
5 Types of Steganography:
Text steganography. Text steganography conceals a secret message inside a
piece of text.
Image steganography. In image steganography, secret information is encoded
within a digital image.
Video steganography.
Audio steganography.
Network steganography.
There are various free softwares available for Steganography. Some of the
popular ones are: QuickStego, Xiao, Tucows, OpenStego, etc.
COMPUTER FORENSICS
While carrying out the digital forensic investigation, rules and procedure must be
applied. Specially while capturing the evidence It should be ensured that the actions
that are taken for capturing the data do not change the evidence.
The integrity of the data should be maintained. It must be ensured that the devices
used for capturing the backup are free from contamination
Applications:
Intellectual Property theft
Industrial espionage
Employment disputes
Fraud investigations
Misuse of the Internet and email in the workplace
Forgeries related matters
Bankruptcy investigations
Issues concerned the regulatory compliance
Advantages of Computer Forensics :
To produce evidence in the court, this can lead to the punishment of the culprit.
It helps the companies gather important information on their computer systems or
networks potentially being compromised.
Efficiently tracks down cyber criminals from anywhere in the world.
Helps to protect the organization’s money and valuable time.
Allows extracting, process, and interpreting the factual evidence, so it proves the
cybercriminal action’s in the court.
Disadvantages of Computer Forensics:
Before the digital evidence is accepted into court it must be proved that it is
not tampered with.
Producing and keeping electronic records safe is expensive.
Legal practitioners must have extensive computer knowledge.
Need to produce authentic and convincing evidence.
If the tool used for digital forensics is not according to specified standards,
then in a court of law, the evidence can be disapproved by justice.
A lack of technical knowledge by the investigating officer might not offer the
desired result.
Things to avoid :
Don't just add a single digit or symbol before or after a word. e.g. "apple1"
Don't double up a single word. e.g. "appleapple"
Don't simply reverse a word. e.g. "elppa"
Don't just remove the vowels. e.g. "ppl"
Key sequences that can easily be repeated.e.g. "qwerty","asdf" etc.
Don't just garble letters, e.g. converting e to 3, L or ito 1, o to 0. as in "z3r0-10v3"
Tips:
Choose a password that you can remember so that you don't need to keep
looking it up, this reduces the chance of somebody discovering where you have
written it down.
Choose a password that you can type quickly, this reduces the chance of
somebody discovering your password by looking over your shoulder.
Bad Passwords:
Don't use passwords based on personal information such as: name, nickname,
birthdate, wife's name, pet's name, friends name, home town, phone number,
social security number, car registration number, address etc. This includes using
just part of your name, or part of your birthdate.
Don't use passwords based on things located near you. Passwords such as
"computer", "monitor", "keyboard", "telephone", "printer", etc. are useless.
Don't ever be tempted to use one of those oh so common passwords that are easy
to remember but offer no security at all. e.g. "password", "letmein".
Never use a password based on your username, account name, computer name or
email address.
Choosing a password:
Use good password generator software.
Use the first letter of each word from a line of a song or poem.
Alternate between one consonant and one or two vowels to produce nonsense
words.eg. "taupouti".
Choose two short words and concatenate them together with a punctuation or
symbol character between the words. eg. "seat%tree"
Changing your password :
You should change your password regularly, I suggest once a month is
reasonable for most purposes.
You should also change your password whenever you suspect that somebody
knows it, or even that they may guess it, perhaps they stood behind you while you
typed it in.
Remember, don't re-use a password.
Bad Examples :
"fred8" - Based on the users name, also too short.
Portable media access: Its portability makes it easy to use since there‟s no need
to install it on every computer.
Auto fill:There‟s no need to type in the login credentials; the application does it
whenever the Web page is loaded. This keeps it secure from key loggers.
Two factor authentication: It enables the user to either unlock the database by a
master password or by a key from a removable drive.
Security: The password database is encrypted with either the AES encryption or
the Twofish algorithm, which uses 256-bit key encryption.
Expiration date: The entries can be expired, based on a user defined date.
Features
Direct login: Automatically logs in to any website without typing login credentials,
with just one click.
Offline data: With one click, an encrypted local copy of the data can be created
as a HTML page.
Security: The database is encrypted using JavaScript code on the browser and
then sent to the website. It requires a passphrase to decrypt the database
without which data cannot be accessed.
Support: Works on any operating system with a major browser that has
JavaScript enabled.
3. Password Gorilla: Password Gorilla is an open source, cross-platform, simple
password manager and personal vault that can store login information and notes.
Features
Portable: Designed to run on a compatible computer without being installed.
Import of database: Can import the password database saved in the CSV format.
Locks the database when idle:It automatically locks the database when the
computer is idle for a specific period of time.
5. Password Safe: Password Safe is a simple and free open source application initiated
by Bruce Schneier and released in 2002. Now Password Safe is hosted on Source Forge
and developed by a group of volunteers.
Features
Ease of use: The GUI is very simple, enabling even a beginner to use it.
Under "How to receive codes," click on the "Show backup codes" link. Print this
page.
Step 6: Click "Done" on your web browser once you have successfully entered the
application-specific password.
Step 7: Know how to revoke an app's access to your Gmail account. If you don't
want to use an app anymore, or you lost your phone and want to stop anyone
who has it from accessing your Gmail, simply click on the "Revoke" button in your
application-specific password settings page.
Step 8: Create new application-specific passwords for each application that you
connect your Google Account to!
One Mark
1. In which of the following, a person is constantly followed/chased by another person
or group of several peoples?
2._______ is a type of software designed to help the user's computer detect viruses and
avoid them.
a. Malware b. Adware c. Antivirus d. Both B and C
5 & 10 Marks
1 Introduction to Cyber Crime.
2 Narrate the Classification of Cyber Crime.
3 Write the Malware & its Type.
4 Explain the Kind of Cyber Crime.
5 Write the Authentication.
6 Explain the Encryption.
7 Explicate the Digital Signature.
8 Write the Difference between Antivirus & Firewall.
9 Write about the Steganography.
10 Write the Computer Security initiatives in india.
11Write about Password Manager.
Step 1: Open the settings on Chrome. Click the menu icon in the upper right corner
of the browser to the right. Click settings on the bottom of the menu.
Step 2: From settings, click "Show advanced settings. It's located at the very bottom
of the settings section.
Step 3: Scroll to the privacy section and click "Clear browsing data.
Step 4: Select "Cached images and files". Uncheck all other options to avoid deleting
browser history, cookies and other things you may wish to retain. Change "Obliterate
the following items from" to "the beginning of time".
WIRELESS LAN
The Wireless LAN or WLAN is becoming a popular way to connect devices such
as computers these days.
In offices and homes, WLAN has become an alternative way of communication
compared to wired LAN.
The convenience to connect different devices is both cost effective and easily
maintainable.
The Wikipedia says: “Wireless LANs have become popular in the home due to
ease of installation, and the increasing to offer wireless access to their
customers; often for free.”
The other factors why WLANs are becoming more acceptable are:
1. No need to be connected physically with each other through any medium such
as cables. You can roam around freely in office premises, home or around.
2. WLANs are cost effective. Cabling all the way in the offices, hotels etc are not
needed. So it‟s cheap and provides same quality of service.
3. Unreachable spots where a cable is hardly accessible, WLAN signals can reach
out such as big installations like airports. Also surfing outdoors is also
convenient. Just install the device called Access Points (AP) and you are done.
4. Less interruption and easy trouble shooting in case of failures as compared to
cabled networks.
5. More secure as most of APs support best encryption methods which protect
them from
sniffing and other attacks.
2. Who controls and owns the information I put into a social networking site?
4. Will my contacts mind if I share information about them with other people?
The stolen emails were published by Wiki Leaks, and the result was a
public relations nightmare for the Clinton campaign.
Email security best practices are the crucial elements of your data privacy
strategy you should be aware of to protect your business. It doesn't matter
whether you manage a small office or an entire corporate network. Using
them avoids a potential data breach and prevents phishing attacks.
This is where professional email security services come into play. They
help you stay ahead of the game and promote superior organizational
performance by protecting every valuable resource of the corporation.
Email security enables the safeguarding of a business or a client's privacy.
It prevents unauthorized access to sensitive data like financial information
and important documents.
This is where professional email security services come into play. They
help you stay ahead of the game and promote superior organizational
performance by protecting every valuable resource of the corporation.
1. Set PINs and passwords. To prevent unauthorized access to your phone, set a
password or Personal Identification Number (PIN) on your phone’s home screen
as a first line of defense in case your phone is lost or stolen. When possible, use
a different password for each of your important log-ins (email, banking, personal
sites, etc.).
2. Do not modify your smart phone’s security settings. Do not alter security
settings for convenience.
Tampering with your phone’s factory settings, jail breaking, or rooting your
phone undermines the built-in security features offered by your wireless service
and smart phone, while making it more susceptible to an attack.
3. Backup and secure your data. You should backup all of the data stored on
your phone – such as your contacts, documents, and photos.
4. Only install apps from trusted sources. Before downloading an app, conduct
research to ensure the app is legitimate. Checking the legitimacy of an app may
include such thing as: checking reviews, confirming the legitimacy of the app
store, and comparing the app sponsor’s official website with the app store link to
confirm consistency.
Many apps from un trusted sources contain malware that once installed
can steal information, install viruses, and cause harm to your phone’s contents.
There are also apps that warn you if any security risks exist on your phone.
6. Install security apps that enable remote location and wiping. An important
security feature widely available on smart phones, either by default or as an app,
is the ability to remotely locate and erase all of the data stored on your phone,
even if the phone’s GPS is off.
In the case that you misplace your phone, some applications can activate
a loud alarm, even if your phone is on silent. These apps can also help you locate
and recover your phone when lost. Visit CTIA for a full list of anti-theft protection
apps.
7. Accept updates and patches to your smart phone’s software. We should keep
our phone’s operating system software up-to-date by enabling automatic
updates or accepting updates when prompted from your service provider,
operating system provider, device manufacturer, or application provider. By
keeping your operating system current, you reduce the risk of exposure to cyber
threats.
8. Be smart on open Wi-Fi networks. When you access a Wi-Fi network that is
open to the public, your phone can be an easy target of cybercriminals.
We should limit your use of public hotspots and instead use protected Wi-
Fi from a network operator you trust or mobile wireless connection to reduce
your risk of exposure, especially when accessing personal or sensitive
information.
9. Wipe data on your old phone before you donate, resell, or recycle it. The
smart phone contains personal data you want to keep private when you dispose
your old phone. To protect your privacy, completely erase data off of your phone
and reset the phone to its initial factory settings. Then, donate, resell, recycle, or
otherwise properly dispose of your phone.
10. Report a stolen smart phone: The major wireless service providers, in
coordination with the FCC, have established a stolen phone database.
If your phone is stolen, you should report the theft to your local law
enforcement authorities and then register the stolen phone with your wireless
provider.
This will provide notice to all the major wireless service providers that the
phone has been stolen and will allow for remote “bricking” of the phone so that it
cannot be activated on any wireless network without your permission.
Here are 7 important tips to keep in mind for enhancing your digital wallet security:
1. Enable Passwords On Your Devices:
Enable passwords on your phones, tablets, and other devices before they can be
used. Use the benefits of additional layers of security provided by these devices. You
can use password managers to create strong and unique passwords. Adding two-factor
authentication to your device and app security will give another major boost to your
already secure device.
Always be aware of the kind of networks you are connected to. It's important to
be connected only to those networks which you can trust. Avoid the use of public Wi-Fi
networks. More secure Wi-Fi connections require passwords and are easily identified as
“WPA or WPA2.” Highly-insecure Wi-Fi is wide-open for anyone to connect to and may
be labeled as a “WEP” connection.
Apps are not always what they appear to be. In fact, you could be getting more
than you bargained for. A free game might not be just a game, but an app designed to
illicitly collect personal data from you. Reading the user ratings and reviews can provide
some clues about the integrity of the app.
Never share sensitive data with those you don’t trust. This includes when you
respond to email requests, phone inquiries or allow control to anyone you would not
normally hand over a physical wallet to. Financial service providers and support staff
will never ask for private information such as passwords or payment account numbers.
Avoid writing down information used to access the digital wallets in plain view or
storing in an unprotected file. Easy access to them might result in the misuse of your
data and credentials. It is essential to store passwords in a way that prevents them
from being stolen by an attacker even if the source application, device or database is
compromised.
Now, there are several frameworks and apps also which provide built-in
functionality to help store passwords safely.
Avoid using the same password you use for email or social networking sites.
This increases the risk of unauthorized access. Instead, use an easily- remembered, yet
hard-to-guess password unique to your digital wallet. This will enhance your digital
wallet security.
Ensure that you understand the quickest way to resolve any issues that arise and
who is responsible for any fraudulent activity on your account.
Mobile phones were once simple devices capable of performing only basic
phone functions.
With the release of newer smart phone OSs, mobile phones began to include
advanced desktop-like features, which has caused users (and forced app
developers) to think differently about these devices.
Typical computer activities such as installing and updating software are present.
iOS :
Apple’s iOS (originally called the iPhone OS) is based on the Mac OS.
The iPhone, iPod Touch, and iPad all run it, letting developers easily write apps
that run on all those devices.
iOS apps are written in Objective-C and can communicate with hardware through
a set of published APIs.
iOS offers several abstraction layers to easily create onscreen interactive menus,
2D and 3D graphics, location services, and core OS functionality such as threads
and network sockets.
Android:
The Open Handset Alliance’s Android platform (mainly backed by Google) is open
source Linux-based middleware that runs on top of a Linux kernel.
Android powers a variety of smart phones, tablets, and net books from many
manufacturers.
Since Android’s announcement and first release in October 2008, the code base
has seen rapid development, with three major releases in 2009 alone.
Android apps are written in Java and run in Dalvik, a custom virtual machine
(VM).
BlackBerry:
Administrators can push policies to BlackBerry devices, letting them restrict the
functionality available to users.
For example, policy administrators might decide that apps downloaded from
third-party websites aren’t allowed but that those installed through App.
Symbian:
It has existed since the early 1990s and is now deployed on hundreds of smart
phone models.
Symbian was a proprietary platform until February 2010, when Nokia open-
sourced it under the Symbian^3 branding.
Nokia designed the OS with integrity, security, and low resources in mind, in
contrast to the gigahertz chips on newer smart phones.
Although malware has targeted Symbian in the past, few attacks exploited
software flaws. Rather, they relied on social engineering or direct user
manipulation.
For example, the Caber worm repeatedly prompts users to click “yes” to allow a
malicious program to run.
This model gives the smart phone vendor full control over third-party software
installation on users’ devices.
Users can install only software that has been approved and made available
through a vendor’s app marketplace or clearinghouse.
The vendor can remove apps from the clearinghouse and can remotely uninstall
or disable them on users’ devices using a kill switch.
This model leaves most of the security decisions and testing up to the vendor,
giving even nontechnical users a (perhaps unfounded) worry-free smart phone
experience.
The OS vendor (in which case, the guardian model becomes more similar to the
walled-garden model), the mobile phone carrier,
Here, the user is responsible for all software installation and software security
decisions.
Third-party apps are distributed to users with minimal involvement from the
phone vendor or carrier, reducing overhead costs.
Users can install software from any source (website, memory card, or app
marketplace), understanding the risk that, because there’s no app vetting, any or
all apps could be malicious.
Being able to chat on social media channels anytime from wherever you
are, means our smart phones are now our primary connection point for
work play.
Some of the top ways to secure your mobile phone communication are as follows:
1. Use End-To-End Encryption:
The first way you can secure your mobile phone communication is by using end-
to-end encryption.
It's like having a secret code that you and your contact both know, but no one
else does. There are several ways end-to-end encryption can be applied to
prevent SMS hijacking in Man-in-the-Middle attacks.
You could also use end-to-end encryption by encrypting all the data sent over Wi-
Fi on your mobile phone, even when connected to public networks such as coffee
shops, airports, and hotels.
This is made possible by using Virtual Private Networks (VPNs) or secure proxy
connections.
Then, extract sensitive data using micro SD card extraction or USB OTG.
The best way to do this is by setting a solid alphanumeric password that isn't any
shorter than ten characters, but for added security, you can use both numbers
and letters or change up your pattern frequently.
When creating this password, always ensure that it isn't based on information
about yourself, such as birthdays, anniversaries, and street names.
These are the first things attackers try when trying to crack passwords.
Instead, it would help mix up different characters such as numbers, capital and
lowercase letters, and symbols such as punctuation marks.
You can also back up all of your data, so if something happens to the phone, you
still have all of your data which can be restored later or stored securely in the
cloud for added protection.
To do this wirelessly, you will need to download an app called Double Backup
Contact Photos & Videos.
The app automatically backs up all of your contacts and their photos, videos, and
other information while saving it locally on the device itself so that you aren't just
uploading everything online.
This method works because attackers can't access local data unless they have
physical access to the device.
One is called Touch ID & Pass code Lock, whose name pretty much explains how
it works as it allows users to protect their device by using either a fingerprint or
pass code.
All of the apps on your device are protected, so personal photos, videos, call logs,
and text messages can't be accessed by anyone who tries to access them
without knowing your password.
In addition to this, you should also have an anti-theft service installed, which
notifies you if someone tries turning off Report Location or Erase All Data within
the app.
It prevents your data from being deleted remotely, along with a detailed message
that's sent directly to law enforcement.
You can use either a pass code or pattern lock to prevent access. Every time
someone tries accessing any of your apps or sensitive content, the pass code is
required to enter the incorrect password within the last four hours of
successfully using the app.
To set this up, you will need to go into Settings, tap General and then scroll down
before tapping Pass code & Fingerprint, where you should see the option for
"Fingerprints" underneath "Pass code."
Here you can choose which fingers are allowed to be recognized or tap "Add a
fingerprint" followed by placing your finger eight times on different sections of
the home button.
1 MARK QUESTIONS
1. Which of the following data is not appropriate here, if you delete cache,
cookies, and browser history?
a) Address bar predictions b) Saved passwords c) Browser plug-ins
d) Shopping cart content
2. Browser ___________ are impermanent internet files which helps the browsers
download web images, data & documents for rapid performance & viewing in the
future.
a) plug-ins b) cache c) ad-on d) history
4. Write about the safe browsing guidelines for social networking sites
UNIT III
CYBER INVESTIGATION ROLES:
INTRODUCTION
Following diagram Shows Disk that allows you to conduct live forensics, as
well as investigations
Figure (b) Another View of Hacker Defender in Psychical Memory Using Wetstone’s LiveWire
NETWORK ANALYSIS
Data obtained from firewall laws, routers, intrusion detection systems, and so
on are equally important to an examiner in obtaining the big picture.
In the Hacker Defender case presented earlier, a defense attorney may argue
that his client’s machine was compromised and could not have committed
the crime.
A review of the firewall logs may show that the Hacker Defender activity from
this computer was blocked, making this argument about the rootkit a moot
point.
As a live investigator, you should try to gain as much information about the
network activity as possible.
Install a packet sniffer—with the appropriate permission, of course—and
conduct
a packet analysis of the traffic.
Using this technique, you could determine if someone is connected to the box
before conducting an analysis on the target machine.
Look for evidence beyond the target computer.
Understanding the network where the system resides can help when conducting
a live investigation.
LEGAL ISSUES OF INTERCEPTING WI-FI TRANSMISSION
WiFi Technology
WiFi is a colloquial term referring to a wireless communication
technology described in the IEEE’s 802.11 body of standards.
WiFi covers both infrared and RF as mediums for communication—
but most WiFi devices operate in the 2.4GHz or 5GHz RF bands.
WiFi access points use an open system architecture as their default
settings—therefore additional measures such as encryption must be
configured to control network access, authentication, and privacy.
Privacy:
In a wired LAN, privacy is controlled by the routing of information.
Routers and switches on a LAN control the flow of information so that devices on
a LAN get only data sent through their cable that is specifically addressed to
them or is broadcast data addressed to all devices.
UNDERSTANDING WIFI RF
802.11 WiFi networks use an unlicensed band of the RF spectrum
set aside for industrial, scientific and medical (ISM) use.
The ISM band generally is considered open to the general public.
The FCC regulates the ownership of the RF spectrum. If the FCC issues a
license to a particular person or organization, the FCC must closely regulate
the output wattage of the licensee and the licensee’s neighbors to ensure that
there is no interference on either licensee’s area of coverage.
What makes the 802.11 so available and so ubiquitous is its use of an
unlicensed portion of the radio frequency spectrum set aside for industrial,
scientific, and medical (ISM) use.
Users of the unlicensed ISM band do not need to purchase rights or
ownership of a particular frequency.
Cordless phones, remote car starters, baby monitors all use this small section
of unlicensed spectrum.
Most importantly, there is no license holder that can prohibit others from
trespassing on their spectrum holdings.
In summary, it is generally accepted that the ISM bands are open to the
general public.
SCANNING RF
Scanning is a well-documented practice of listening to RF
transmissions.
A specific piece of legislation made the manufacture and sale of
equipment to monitor cellular communications illegal.
There is no legislation that criminalizes the manufacture, sale, or
possession of equipment to monitor or intercept WiFi—in fact
thesame equipment used to connect to a WiFi network is used to
monitor traffic on a WiFi network.
The airwaves are full of signals in a variety of frequencies; television
broadcasts, emergency services radio dispatches, FM radios, pagers, and
cellular telephones are just a few of these signals.
Technically always receiving these signals whenever the energy hits our
bodies, but in order to make sense of the signals, need special equipment to
decode or interpret the signal.
Generally speaking, a device designed to be tunable to a wide variety of
frequencies for the intent of listening in on any communications is called a
scanner.
There are scanners that focus on voice communications—a fire/police
scanner for example would enable someone to listen in on the
communications of their local emergency services.
There are scanners that focus on video feeds—for example there is a
specialized scanner that attempts to listen in on security cameras that send
their images to the main security panel via a radio link.
Some of these types of communication use more complicated protocols, or
specific codified languages, that enable two or more electronic devices to
communicate with one another.
Digital protocols are demonstrative of this in that the analog signal (a sine
wave) is modulated to form approximately-square peaks and valleys that
represent 1’s and 0’s of a digital message.
In 1992, it was legal to purchase scanning equipment capable of listening in
on cellular phone conversations. In 1992, Public Law 102–556,
The Telephone Disclosure and Dispute Resolution Act, was passed,
amending the Communications Act of 1934.
The act, which is codified at 47 U.S.C. § 302a (d), prohibits the authorization,
manufacture.
Import of scanning equipment capable of:
(A) Receiving transmissions in the frequencies allocated to the
domestic
Cellular radio telecommunications service,
(B) Readily being altered by the user to receive transmissions in such
frequencies, or
(C) Being equipped with decoders that convert digital cellular
transmissions
to analog voice audio.
Further, the cellular carriers themselves enhanced cell phone users’
expectation of privacy by phasing-in protocols that cause cellular phones to
hop around a group of frequencies, thus making scanning of any one
particular cellular phone or phone call very difficult.
Therefore, any electronic monitoring of cellular telephone conversations
without appropriate legal authorization would constitute an unconstitutional
search in violation of the Fourth amendment.
EAVESDROPPING on WiFi
A legal framework exists around the legality of both wiretaps and
unlawfully accessing computer systems—including then
Telecommunications Act,
The Computer Fraud and Abuse Act, and the Electronic Communications
Privacy Act.
Applicable federal statutes do not appear to govern eavesdropping on
private WiFi communications.
Skill required to eavesdrop on WiFi transmissions is not prohibitive, and the
technology, both hardware and software.
A number of software products are available that both find and listen in on
WiFi transmissions.
For the most part, these software packages are completely legitimate
network analyzers used by network administrators to debug networks and to
find access points that have been installed illegitimately on the network.
Every communication over the WAN that is not encrypted can be grabbed
from the airwaves and viewed.
MAC authentication applies only to devices that wish to connect to the
network—limiting who connects to a network does keep the overall network
safer.
Particularly the information on other devices on the network, but does nothing
to prevent people from intercepting unencrypted transmissions.
Legal Framework:
The legality of WiFi eavesdropping must look at how existing laws relate to WiFi
technology.
As we shall see, federal statutes relating to the interception of various types of
electronic communications do not appear to govern the interception of WiFi
transmissions.
The Electronic Communications Privacy Act (ECPA):
WiFi transmissions fall within the meaning of electronic communications as
defined in the ECPA,
Unless the signals transmitted by WiFi devices are encrypted, they are
accessible to the general public.
Therefore, ECPA does not govern the interception of non-encrypted WiFi
signals that are not sent by a common carrier.
WiFi transmissions would fall within the meaning of “electronic
communications” under the ECPA.
The ECPA prohibits the interception of any electronic communications,
regardless of the physical media of transport.
The ECPA defines electronic communication as “any transfer of signs, signals,
writing, images, sounds, data, or intelligence of any nature transmitted in
whole or in part by a wire, radio, electromagnetic, photo electronic or photo-
optical system that affects interstate or foreign commerce.
Therefore the use of WLANs to transmit data, particularly if connected to the
Internet, would be considered “electronic communications” within the
meaning of the ECPA.
WiFi transmissions are not scrambled or encrypted. The default setting for
802.11 standard is open system authentication with no encryption.
Telecommunications Act:
The Telecommunications Act also does not appear to govern WiFi
interceptions because WiFi communications can be available to the general
public.
Computer Fraud and Abuse Act:
The Computer Fraud and Abuse Act (CFAA) does not appear to apply to the
intercept of WiFi signals as the Act is focused primarily on accessing
computer systems.
The first six major statutory violations are centered on unauthorized access
to a computer system, and the seventh concerns making threats of damage
against a protected system.
1. Intentional access to a computer with sensitive government information.
2. Intentional access to a computer, without authorization or exceeds
authorized access and obtains financial information from a financial
institution or card issuer, any U.S. government files, or information from
protected computer related to interstate or foreign commerce.
3. Intentionally, without authorization, accesses any nonpublic computer
of a department or agency of the United States.
4. Knowingly and with intent to defraud, accesses a protected computer
without authorization, or exceeds authorized access, in order to commit or
further a fraud.
5. Accesses to a protected computer and knowingly disseminates
malicious code or causes damage, reckless or otherwise, or attempted
access that would have caused loss of $5000 or more, physical harm,
modification of medical treatment, a threat to public safety, or damage to
a government system.
6. Knowingly, and with intent to defraud, traffics in any password or similar
information through which a computer may be accessed without
authorization, if—
(A) Such trafficking affects interstate or foreign commerce; or
(B) Such computer is used by or for the Government of the United
States.
7. with intent to extort any money or other thing of value, any person who
transmits any communication containing any threat to cause damage to a
protected computer.
Computers and digital devices are employed by the majority of people in the U.S. for
myriad business and personal uses.
Because of the wide acceptance of computers in our daily lives, it is reasonable to
conclude that people will use a computer to assist them in the commission of crimes,
record aspects of crimes on a computer, and use computers to store the fruits of their
crimes or contraband.
The current model of digital evidence seizure is focused on physical hardware, which is
appropriate in most situations.
The legal framework, the established workflows of existing computer forensic best
practices, and the fear of the unknown will all play a part in determining how quickly the
digital evidence seizure methodologies are adjusted to accept other options besides
wholesale hardware seizure.
As the author and a member of the www.syngress.com Seizure of Digital Information •
Chapter 7 135 greater crime-with-a-cyber-component-community, I hope this work
serves to create discussion between the disparate communities on the appropriateness
of both the familiar and innovative methods to seize digital evidence.
Finally, we will discuss a number of options available for seizure of information,
including the on-scene preview of information, the seizure of data held in the computer’s
RAM, on-scene imaging of entire hard drives, and the on-scene imaging of specific data
objects.
Over time, it became accepted to use the seizure methods focused on the
seizure of the physical hardware for the seizure of digital information.
If found, these data objects are usually included in a forensic findings
report and are printed out or copied to other media and then provided to
the investigator and prosecutors.
Figure 7.1 outlines the steps of the traditional method for seizing
computer hardware.
Pic1
SEIZURE METHODOLOGY IN DEPTH
The fact is that the world is a messy place. Our responders need to
understand that they need to have a methodology in place that
allows them to work through more complicated scenes, such as
finding dozens of computers or dozens of pieces of removable
media or hundreds of CDs
The steps presented in Figure 7.2 are representative of current
seizure methodology, but the steps have been crafted to provide a
higher level guidance about approaching nonstandard seizure
scenes. Specifically, the “Seize All Hardware and Media”.
It is also assumed that the responder has a properly drafted
warrant that identifies the information to be seized and outlines
that an offsite examination of the media may be required if the
situation makes the onscene seizure infeasible
What exactly happens when the full 1.5 TB RAID and 200
DVDs are seized and brought back to the forensic laboratory
for analysis. Do you actually have the hardware and software
to acquire and process that much data? If the laboratory is
not a regional or state lab, but a small laboratory set up at the
local agency, the answer might be yes—but processing the
case might use the entire budget set aside for target drives
for the entire year for that one case.
Disk Encryption
A number of encryption programs exist now that
provide whole disk encryption, a common one being PGP
from pgp.com.These types of encryption programs encrypt
all the data on the hard drive and are generally transparent
to the user; meaning that one password in the startup
sequence “unlocks” the contents for viewing and editing.
It’s unclear how the criminal and civil courts would view a
challenge from an impacted third party regarding the seizure of a
common computer. However, if that third party maintained a blog
or Web site, their information may be protected from seizure
under the Privacy Protection Act (PPA) (42 U.S.C. § 2000aa).
The PPA may not protect the person that possesses the
information if that person is suspected of committing the
criminal offenses to which the materials are related. Simply put, if
you committed a crime and you have publishable information
related to that crime on your computer, that information most
likely will not be protected under the PPA.
Delays Related to Laboratory Analysis
If investigators of crimes involving a computer rely completely and
absolutely on their computer forensic laboratory for the processing of their
seized hardwww.syngress.com Seizure of Digital Information Chapter 7
153 425_Cyber_07.qxd 2/22/07 2:39 PM Page 153 ware in search of
evidence, they are at the mercy of the timing dictated by the laboratory.
To make matters worse, the increase in the size of storage media has far
outpaced the increases in processor power.
The same $500 that could afford a 100MB drive in 1991 can now put a
750GB drive in your pocket.
The question remains, are there other options besides the seizure
of physical devices that are available to responders? If yes, are these
methods of seizure within the reach of anyone but the most technical
of responders? For a long time, up to and including today, many in the
forensics community place little faith in the ability of responders on-
scene to deal appropriately with the computers they may encounter.
The direction was simply “Don’t touch the keyboard. Pull the plug
and send everything to the lab.” In many cases, the forensics side of
the house is correct to protect against the possible corruption or
destruction of data by taking this hard-line approach—particularly
based on the technology of yesterday—but at what cost? Although the
computer forensics community might have intended to do the most
good by promulgating the pull-the-plug mantra, we need to examine
how disempowering the on-scene responders may affect the overall
forensic process, from seizure through analysis to investigation and
ultimately prosecution.
The media
■ On-scene seizure of information through the imaging of a specific
data object
In the next section, we take a look at the preceding options and discuss how each
fits into the larger picture of responding to and investigating crimes with digital
evidence.
UNIT V
Later the forensic applications and suites evolved and automated some of the
processes or streamlined them.
The forensic practitioner would undelete files, search for temporary files, recover
e-mail, and perform other functions to try and find the evidence contained on the
media.
The forensic practitioner would undelete files, search for temporary files, recover
e-mail, and perform other functions to try and find the evidence contained on the
media. Today there are more user-friendly programs that present data in a GUI,
and automate much of the extremely technical work that used to require indepth
knowledge and expertise with a hex editor.
There is also a wealth of hardware to make the practice even more conducive,
but the reality is the processes thus far have not changed that much.
From the time of those first primordial seizures to today, a set of Best Practices
has emerged; the attempt is to provide a foundation for the work performed
under the heading Digital Forensics:
■ Collection
■ Examination
■ Analysis
■ Reporting
This includes work such as document and e-mail extraction, searching for
suspicious binaries, and data carving. Analysis is the process of using the
evidence recovered to work to solving the crime.
The analysis is the pulling together of all the bits and pieces and deciphering
them into a story of what happened. Report is the phase where all the other
phases are documented and explained.
The report should contain the documentation of the hardware, the tools used, the
techniques used, and the findings. All the individual phases have theirown issues
and challenges.
COLLECTION
Traditional digital forensics best practices are to make a full bit stream copy of
the physical volume. This normally entails physically removing the hard drives
from the suspect system, and attaching the drive to another system for forensics
duplication.
A forensic image is a bit-by-bit copy of the original media. It copies all the data on
a storage device, including unused portions, the deleted files, and anything else
that may have been on the device.
Admissible It must conform to certain legal rules before it can be put before a
court.
■ Authentic The data must be proven to relate to the incident. This is where
additional documentation is important.
■ Complete It must be impartial and tell the entire account.
■ Reliable There can be nothing relative to the collection and handling of the
evidence that could create any doubt. Chain of Custody procedures become
crucial.
■ Believable The reports and documentation must present everything so it is
believable and understandable by a judge or jury. Any digital evidence collected
must meet these requirements.
The next option is to move the data off via the network connection. How large
is the network link to move the data off? If the data cannot be worked onsite, do
you have the storage to transport it? Do you have the storage to work with it
later? Do you have systems powerful enough to comb and query through all the
data? Are all the systems in the same data center, or do you have to travel or
have multiple teams working simultaneously? There are a multitude of
questions, and some preplanning can be essential
EXAMINATION
A final consideration is that data may need to be preserved in order of volatility.
The most volatile data needs to be preserved first. This applies to running
systems for the most part, but the way in which we approach live systems will
become more important in the near future; but more on that later. An example
of an order of recovery of system data according to volatility looks like this:
■ Live system information This includes memory, the routing table, ARP
cache, and a process list. The concern with live system information is that it is
difficult or impossible to image the system memory or other live data with
altering the original data.
■ Virtual memory Swap space or paging files
■ Physical disks The physical hard disks of a system
■ Backups Offline back-up media such as magnetic tape or other media:
It is extremely possibly the data you are looking for may not be on the system
today, but it was there yesterday and is on last night’s backup.