0% found this document useful (0 votes)
5 views22 pages

Cybersecurity-Module 2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views22 pages

Cybersecurity-Module 2

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

CYBER SECURITY

COURSE CODE –
BETCK105I

Module 2
Module 2:
Cyber Offenses: How Criminals Plan Them:
Introduction,
How criminals plan the attacks
Social Engineering,
Cyber Stalking,
Cybercafe & cybercrimes
Botnets:
The fuel for cybercrime, Attack Vector
Hackers, Crackers and Phreakers
Google Search Engine
Search (Contd…)
Search KeyWords
Tools for Passive Attack
Active Attack and Tools
Attack (Gaining and Maintaining the
System access)
• After scanning and enumeration, the attack is launched using the
following steps:
• Crack the password
• Exploit the privileges
• Execute the malicious commands/applications
• Hide the files (if required)
• Cover the tracks – delete the access logs, so that there is no trail of illicit
activity.
Social Engineering
• Social engineering is the “technique to influence” and “persuasion to
deceive” people to trust social engineers word rather than exploiting
computer security holes.
• Social engineering involves gaining sensitive information or
unauthorized access privileges by building inappropriate trust
relationships with insiders.
Classification of Social Engeering
• Impersonating an employee or valid user
• Posing as an important user
• Using a third person
• Calling technical support
• Shoulder surfing:
• Dumpster diving
Computer Social Engineering
• Fake Emails
• Email attachments (install keylogger to capture passwords)
• Pop-up Window to unintentionally install malicious code
Security and Safety tips
• Always logout
• Stay with the computer
• Clear history and temporary files
• Be alert
• Avoid online financial transactions
• Change passwords
• Virtual Keyboard
• Security Warning
Secure the System
• Use Antivirus and anti-spyware software and keep it up-to-date
• Set the OS to download and install security patches automatically
• Use a firewall to protect the system from hacking attacks while it is
connected on the Internet.
• Disconnect from the internet when you are away from your computer.
• Downloading the freeware only from websites that are known and
trustworthy.
• Check regularly the folders in mail box (Sent items or outgoing)
• Take an immediate action if your system is infected.
Attack Vectors
• Attack by Email
• Attachments
• Attack by deception
• Hackers
• Heedless guests (attack by webpage)
• Attack of the worms
• Malicious macros
• Foistware
• Viruses

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy