Cybersecurity-Module 2
Cybersecurity-Module 2
COURSE CODE –
BETCK105I
Module 2
Module 2:
Cyber Offenses: How Criminals Plan Them:
Introduction,
How criminals plan the attacks
Social Engineering,
Cyber Stalking,
Cybercafe & cybercrimes
Botnets:
The fuel for cybercrime, Attack Vector
Hackers, Crackers and Phreakers
Google Search Engine
Search (Contd…)
Search KeyWords
Tools for Passive Attack
Active Attack and Tools
Attack (Gaining and Maintaining the
System access)
• After scanning and enumeration, the attack is launched using the
following steps:
• Crack the password
• Exploit the privileges
• Execute the malicious commands/applications
• Hide the files (if required)
• Cover the tracks – delete the access logs, so that there is no trail of illicit
activity.
Social Engineering
• Social engineering is the “technique to influence” and “persuasion to
deceive” people to trust social engineers word rather than exploiting
computer security holes.
• Social engineering involves gaining sensitive information or
unauthorized access privileges by building inappropriate trust
relationships with insiders.
Classification of Social Engeering
• Impersonating an employee or valid user
• Posing as an important user
• Using a third person
• Calling technical support
• Shoulder surfing:
• Dumpster diving
Computer Social Engineering
• Fake Emails
• Email attachments (install keylogger to capture passwords)
• Pop-up Window to unintentionally install malicious code
Security and Safety tips
• Always logout
• Stay with the computer
• Clear history and temporary files
• Be alert
• Avoid online financial transactions
• Change passwords
• Virtual Keyboard
• Security Warning
Secure the System
• Use Antivirus and anti-spyware software and keep it up-to-date
• Set the OS to download and install security patches automatically
• Use a firewall to protect the system from hacking attacks while it is
connected on the Internet.
• Disconnect from the internet when you are away from your computer.
• Downloading the freeware only from websites that are known and
trustworthy.
• Check regularly the folders in mail box (Sent items or outgoing)
• Take an immediate action if your system is infected.
Attack Vectors
• Attack by Email
• Attachments
• Attack by deception
• Hackers
• Heedless guests (attack by webpage)
• Attack of the worms
• Malicious macros
• Foistware
• Viruses