0% found this document useful (0 votes)
23 views33 pages

Cyber Notes Batch 2023

The document provides a comprehensive overview of cybercrime, including its definition, origins, types, and the relationship with information security. It discusses the legal perspectives on cybercrime, particularly focusing on the Indian IT Act of 2000, and highlights various classifications of cybercriminals and cybercrimes. Additionally, it addresses the challenges in combating cybercrime and the importance of legal frameworks and cybersecurity measures globally and in India.

Uploaded by

Magam Vijitha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views33 pages

Cyber Notes Batch 2023

The document provides a comprehensive overview of cybercrime, including its definition, origins, types, and the relationship with information security. It discusses the legal perspectives on cybercrime, particularly focusing on the Indian IT Act of 2000, and highlights various classifications of cybercriminals and cybercrimes. Additionally, it addresses the challenges in combating cybercrime and the importance of legal frameworks and cybersecurity measures globally and in India.

Uploaded by

Magam Vijitha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

1

UNIT-1

Introduction to Cybercrime: Introduction, Cybercrime: Definition and origins of the


word, Cybercrime and Information Security, who are cyber criminals? classifications of
cybercrimes, cybercrime: the legal perspectives, an Indian perspective, cybercrime and
the Indian IT Act 2000, a Global perspective on Cybercrimes.

Q1) Introduction to Cybercrime

Cybercrime refers to criminal activities carried out using computers, networks, or digital
devices. It includes hacking, identity theft, online fraud, cyber stalking, and phishing. As
technology advances, cybercrimes have become more sophisticated, targeting individuals,
businesses, and governments worldwide.

Key aspects of cybercrime:

1. Definition – Crimes committed in cyberspace using digital means.


2. Origins – Emerged with the internet; initially involved hacking but expanded to
financial fraud, data breaches, and cyber terrorism.
3. Impact – Causes financial losses, privacy breaches, and national security threats.
4. Types – Cyber fraud, hacking, phishing, DoS attacks, and identity theft.
5. Prevention – Cyber laws, encryption, firewalls, and user awareness.

_______________________@@@@@______________________

Q2) Cybercrime: Definition and Origins of the Word

Definition of Cybercrime

Cybercrime refers to illegal activities conducted using computers, digital devices, or


networks. It includes hacking, identity theft, financial fraud, cyber stalking, and online scams.
These crimes exploit vulnerabilities in technology to harm individuals, businesses, or
governments.

Origins of the Word "Cybercrime"

 The term "cyber" originates from "cybernetics," which refers to the study of control
and communication in machines and living beings.
 Early cybercrimes emerged in the 1960s when hackers began infiltrating systems for
personal interest.
 1980s-1990s saw financial fraud and software piracy rise with widespread computer
use.
 The internet boom in the 2000s led to global cyber threats like phishing, ransom
ware, and online fraud.
 Today, cybercrime has evolved into a significant threat, necessitating strict cyber
security measures and international cooperation to combat digital offenses.

__________________@@@@@@@____________________

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


2

Q3) Cybercrime and Information Security

Introduction

Cybercrime and information security are closely linked concepts in the digital world.
Cybercrime refers to illegal activities conducted using computers, networks, or digital
devices, while information security focuses on protecting data from unauthorized access,
misuse, and cyber threats. As technology advances, cybercriminals exploit vulnerabilities in
systems, making cyber security essential for individuals, organizations, and governments.

Cybercrime: Definition and Impact

Cybercrime includes any criminal activity involving computers and networks. It targets
individuals, businesses, and even national security. Common types of cybercrime include:

1. Hacking – Unauthorized access to systems.


2. Identity Theft – Stealing personal data for fraud.
3. Phishing – Fraudulent attempts to obtain sensitive information.
4. Ransom ware – Malware that locks files and demands payment.
5. Denial-of-Service (DoS) Attacks – Overloading systems to make them inaccessible.
6. Cyber Espionage – Spying on governments or corporations.

Cybercrime causes financial losses, reputational damage, data breaches, and risks to personal
safety.

What is Information Security?

Information security (InfoSec) refers to protecting data from cyber threats. It ensures
confidentiality, integrity, and availability (CIA Triad) of information. Organizations
implement cyber security measures to prevent cybercrimes, including:

 Firewalls – Blocking unauthorized network access.


 Encryption – Securing data through cryptography.
 Multi-Factor Authentication (MFA) – Adding extra security layers.
 Intrusion Detection Systems (IDS) – Monitoring for malicious activity.
 Regular Security Audits – Identifying system vulnerabilities.

Relationship Between Cybercrime and Information Security

Cybercrime exploits weaknesses in information security, making strong security measures


necessary. Without proper cyber security:

 Hackers can steal sensitive data from organizations.


 Phishing attacks can trick users into revealing passwords.
 Businesses can lose millions due to ransom ware.

Governments and businesses invest in cyber laws, frameworks, and security policies to
mitigate risks. Examples include:

 Indian IT Act, 2000 – Legal framework for cybercrime in India.

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


3

 GDPR (Europe) – Regulates data privacy.


 Cyber security Standards (ISO 27001, NIST) – Guidelines for securing systems.

_________________@@@@@@@@@@__________________

Q4) Who Are Cyber Criminals? & Classifications of Cybercrimes

Cybercriminals are individuals or groups who engage in illegal activities using computers,
networks, or digital platforms. They exploit technological vulnerabilities to steal data, cause
financial harm, disrupt services, or gain unauthorized access. Cybercrime is categorized
based on the nature of attacks, motives, and the methods used by criminals.

Who Are Cyber Criminals?

Cybercriminals come from different backgrounds and have various motives. They can be
classified into the following types:

1. Hackers

Hackers are individuals who gain unauthorized access to computer systems. They are
categorized into:

 White Hat Hackers – Ethical hackers who help organizations find security
weaknesses.
 Black Hat Hackers – Criminal hackers who exploit systems for illegal purposes.
 Grey Hat Hackers – Hackers who operate in both ethical and unethical hacking.

2. Phishers

Phishers trick users into revealing sensitive information, such as passwords and credit card
details, by using fake emails, websites, or messages.

3. Cyber Terrorists

These individuals or groups use cyber-attacks to create fear, disrupt infrastructure, or promote
political and ideological goals.

4. Identity Thieves

Cybercriminals who steal personal information, such as Social Security numbers and bank
details, to commit fraud or impersonation.

5. Cyber Stalkers

Individuals who use the internet to harass, intimidate, or threaten victims, often through
social media or emails.

6. Insiders (Employees/Former Employees)

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


4

Disgruntled employees or former employees who misuse their access to steal company data
or harm an organization.

7. Script Kiddies

In experienced hackers who use pre-written hacking tools to launch cyber-attacks without
understanding how they work.

8. Financial Cybercriminals

These criminals engage in credit card fraud, online banking fraud, and financial scams to
steal money.

Classifications of Cybercrimes

Cybercrimes can be categorized based on the target, intent, and nature of the attack. The
major classifications of cybercrimes are:

1. Cybercrimes Against Individuals

These crimes target individuals to steal personal information, cause harm, or commit fraud.

Examples:

 Identity Theft – Stealing personal details (e.g., bank information, Social Security
numbers) for fraud.
 Phishing – Deceiving users into revealing sensitive information through fake
emails/websites.
 Cyberstalking – Online harassment, intimidation, or threats.
 Online Fraud – Fake job offers, lottery scams, or investment frauds.
 Credit Card Fraud – Unauthorized use of credit/debit card details for financial gain.

2. Cybercrimes against Businesses and Organizations

These crimes disrupt business operations, steal corporate data, or cause financial losses.

Examples:

 Hacking – Unauthorized access to an organization’s system.


 Ransomware Attacks – Encrypting data and demanding ransom for access.
 Denial-of-Service (DoS) Attacks – Overloading a website or network to disrupt
services.
 Intellectual Property Theft – Stealing trade secrets, patents, or copyrighted
materials.
 Insider Threats – Employees misusing access to harm the company.

3. Cybercrimes Against Governments (Cyber Terrorism)

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


5

These crimes target government institutions, aiming to disrupt operations, steal sensitive data,
or cause chaos.

Examples:

 Cyber Espionage – Spying on government agencies or military networks.


 Cyber Warfare – Attacks by nation-states on another country’s digital infrastructure.
 Propaganda & Fake News – Spreading misinformation to influence public opinion.
 Attacks on Critical Infrastructure – Targeting power grids, financial institutions, or
transportation systems.

4. Cybercrimes Against Society

These crimes affect the general public, often causing large-scale disruption.

Examples:

 Online Drug Trafficking – Selling illegal drugs through dark web marketplaces.
 Child Exploitation – Circulating illegal content related to minors.
 Cyberbullying – Harassment through social media, emails, or text messages.
 Financial Scams – Ponzi schemes, fake charities, or fraudulent crowdfunding
campaigns.

________________________@@@@@@@@_________________

Q5)Cybercrime: The Legal Perspectives & An Indian Perspective

Cybercrime has become a global concern as the internet and digital technologies continue to
expand. These crimes include hacking, identity theft, fraud, and cyber terrorism, all of which
require legal frameworks to address and prevent them. Different countries have established
laws to tackle cybercrimes, ensuring digital safety and protecting user data. India, being one
of the fastest-growing digital economies, has its own set of cyber laws to deal with these
crimes.

Cybercrime: The Legal Perspectives

The legal framework for cybercrime aims to:

1. Define Cyber Offenses – Identify crimes like hacking, phishing, and cyber fraud.
2. Establish Jurisdiction – Address cross-border cybercrimes, as criminals can operate
from different locations.
3. Protect Digital Privacy – Prevent unauthorized access to personal and corporate
data.
4. Ensure Digital Evidence Handling – Allow electronic records as legal evidence in
courts.
5. Set Up Punishments & Penalties – Impose fines and jail terms for offenders.

Key International Cybercrime Laws & Conventions

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


6

 Budapest Convention on Cybercrime (2001) – The first international treaty to


address cybercrime, including hacking, fraud, and child exploitation.
 General Data Protection Regulation (GDPR, 2018) – EU regulation to protect
personal data and privacy.
 Computer Fraud and Abuse Act (CFAA, USA) – Protects against unauthorized
access to computer systems.
 UK Cyber Laws – The Computer Misuse Act (1990) criminalizes unauthorized
access to computer material.

Most countries also have specific data protection laws to ensure privacy and security.
Governments work with international organizations like INTERPOL to combat cyber threats
globally.

An Indian Perspective on Cybercrime

India has seen a rapid rise in cybercrimes due to increasing internet usage, digital banking,
and e-commerce. The government has implemented strict laws to tackle cyber offenses and
protect citizens.

Key Cybercrime Statistics in India

 The National Crime Records Bureau (NCRB) reported a 63.5% increase in


cybercrime cases in 2019.
 Major cybercrimes include financial fraud, hacking, identity theft, and
cyberstalking.
 Cities like Mumbai, Delhi, and Bengaluru report the highest number of cyber
offenses.

___________________@@@@@@@@@_______________________

Q6)Cyber Laws in India: The Information Technology (IT) Act, 2000

The Information Technology (IT) Act, 2000 is the primary law governing cybercrime in
India. It was enacted to provide legal recognition to electronic transactions and combat cyber
offenses.

Key Provisions of the IT Act, 2000

1. Section 43 – Penalty for damage to computer systems, hacking, and unauthorized


access.
2. Section 66 – Punishment for hacking (imprisonment up to 3 years and fines).
3. Section 66A – (Repealed in 2015) Criminalized sending offensive online messages.
4. Section 66B – Punishment for identity theft (up to 3 years of imprisonment).
5. Section 67 – Punishment for publishing obscene material online.
6. Section 69 – Government power to intercept, monitor, and decrypt digital
communication.
7. Section 72 – Protects confidentiality and privacy of user data.

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


7

Other Legal Measures & Initiatives in India

1. Indian Penal Code (IPC) & Criminal Procedure Code (CrPC) – Sections of IPC
(e.g., Section 420 for fraud) are applied alongside the IT Act.
2. National Cyber Security Policy, 2013 – Aims to strengthen India’s cybersecurity
infrastructure.
3. Cyber Crime Investigation Cells – Established in major cities to handle cybercrime
cases.
4. Cyber Suraksha Kendra (Cyber Hygiene Centers) – Promotes cybersecurity
awareness.
5. CERT-In (Indian Computer Emergency Response Team) – Handles cybersecurity
incidents and threats.
6. Digital India Initiative – Promotes digital literacy and security among citizens.

Challenges in India’s Cybercrime Laws

Despite strong legal frameworks, India faces several challenges in handling cybercrimes:

 Jurisdiction Issues – Many cybercriminals operate from foreign countries, making


legal action difficult.
 Low Awareness – Many people and businesses lack knowledge about cyber laws and
security.
 Delayed Investigations – Lack of trained professionals and forensic capabilities slow
down cybercrime investigations.
 Dark Web Crimes – Tracking illegal activities on the dark web is challenging.

__________________________@@@@@@@@@_____________________

Q7) Cybercrime and the Indian IT Act 2000 & A Global Perspective on Cybercrimes

Cybercrime and the Indian IT Act, 2000

Introduction

The Information Technology (IT) Act, 2000 is India's primary legislation for cybercrimes
and digital transactions. It was enacted to provide legal recognition to electronic commerce
and address crimes committed in cyberspace. With rapid digitalization, cybercrimes such as
hacking, identity theft, financial fraud, and online harassment have increased, making the IT
Act crucial for cybersecurity and legal enforcement.

Key Features of the IT Act, 2000

1. Legal Recognition to Electronic Transactions – The IT Act recognizes electronic


documents, digital signatures, and electronic contracts as legally valid.
2. Cybercrime Provisions – The Act defines and penalizes various cyber offenses,
ensuring legal protection against cyber threats.
3. Government Powers – Authorities can monitor, intercept, and block digital
communications for security reasons.
4. Data Privacy & Protection – Protects user data from unauthorized access and
misuse.

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


8

Major Sections of the IT Act, 2000 Related to Cybercrime

Section Provision Penalty


Unauthorized access, data theft, virus
Section 43 Compensation for damages
attacks
Imprisonment up to 3 years,
Section 66 Hacking, identity theft
fine up to ₹5 lakh
Section 66A Punishment for sending offensive online
N/A
(Repealed in 2015) messages
Imprisonment up to 3 years,
Section 66B Receiving stolen computer resources
fine up to ₹1 lakh
Publishing or transmitting obscene Imprisonment up to 5 years,
Section 67
material online fine up to ₹10 lakh
Government power to monitor and Up to 7 years of
Section 69
decrypt digital communications imprisonment
Imprisonment up to 2 years,
Section 72 Breach of confidentiality and privacy
fine up to ₹1 lakh

Amendments and Updates

 The IT (Amendment) Act, 2008 strengthened penalties for cybercrime and removed
outdated sections.
 Section 66A, which criminalized offensive online messages, was struck down by the
Supreme Court in 2015 due to concerns over free speech.
 Data Protection Laws – India is working on a new Personal Data Protection Bill to
enhance data privacy regulations.

Challenges in Implementing the IT Act

 Jurisdiction Issues – Cybercrimes often involve criminals operating from different


countries, making enforcement difficult.
 Lack of Awareness – Many individuals and businesses are unaware of their legal
rights and cybersecurity practices.
 Delayed Investigations – Cybercrime cases require specialized forensic expertise,
which is still developing in India.
 Emerging Threats – The IT Act needs constant updates to address new cyber threats
like ransomware, cryptocurrency fraud, and deepfake scams.

_________________________@@@@@@@@@@@@@@__________________

Q8)A Global Perspective on Cybercrimes

Cybercrime is a global challenge, affecting governments, businesses, and individuals across


borders. Countries worldwide have enacted laws and collaborated to combat cyber threats.
However, cybercriminals often exploit legal loopholes and jurisdictional differences to evade
prosecution.

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


9

International Cybercrime Laws and Frameworks

1. Budapest Convention on Cybercrime (2001)

 First international treaty addressing cybercrime.


 Covers offenses like hacking, child pornography, and online fraud.
 Focuses on cross-border cooperation in cybercrime investigations.

2. General Data Protection Regulation (GDPR, 2018) – European Union

 Regulates the collection, storage, and processing of personal data.


 Imposes strict penalties for data breaches (up to €20 million or 4% of global revenue).

3. Computer Fraud and Abuse Act (CFAA, USA)

 Criminalizes unauthorized access to computer systems.


 Covers offenses like hacking, identity theft, and financial fraud.

4. UK Computer Misuse Act (1990)

 Makes unauthorized access to computer systems illegal.


 Criminalizes DoS attacks, malware distribution, and hacking.

5. China’s Cybersecurity Law (2017)

 Enforces strict internet regulations and data localization requirements.


 Gives the government extensive power to monitor and control digital content.

6. Digital Crimes Unit (DCU, INTERPOL)

 Helps track cybercriminal activities across different countries.


 Works with local governments and cybersecurity agencies to enforce laws.

Global Challenges in Fighting Cybercrime

1. Cross-Border Jurisdiction Issues – Different laws in different countries make


prosecution difficult.
2. Dark Web & Anonymity – Cybercriminals use encrypted networks and
cryptocurrencies to remain undetected.
3. Rapidly Evolving Cyber Threats – Ransomware, deepfake scams, and AI-driven
attacks require constant legal updates.
4. Lack of Global Cybersecurity Standards – No single framework applies
universally, leading to inconsistencies.
5. State-Sponsored Cybercrime – Some nations fund cyber-attacks for political or
economic advantages.

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


10

International Collaboration to Combat Cybercrime

 United Nations (UN) – Works on global cybersecurity policies.


 INTERPOL & Europol – Handle international cybercrime investigations.
 Global Forum on Cyber Expertise (GFCE) – Focuses on cybersecurity capacity
building.
 Public-Private Partnerships – Companies like Microsoft, Google, and IBM work
with governments to improve cybersecurity.

___________________@@@@@@@@@@@@_________________

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


11

UNIT-II

Cybercrime-Mobile and Wireless Devices: Introduction, Proliferation of Mobile and Wireless


Devices, Trends in Mobility, Credit Card Frauds in Mobile and Wireless Computing Era,
Authentication Service Security, Attacks on Mobile/Cell Phones. Mobile Devices: Security
Implications for Organizations, Organizational Measures for Handling Mobile Devices-
Related Security Issues, Organizational Security Policies and Measures in Mobile Computing
Era, Laptops.

Q1)Cybercrime – Mobile and Wireless Devices:

cybercrime has expanded beyond traditional computers to mobile devices, smartphones,


tablets, and wireless networks. As people rely more on these devices for communication,
banking, shopping, and work, cybercriminals have developed new ways to exploit
vulnerabilities in mobile security.

Why Are Mobile and Wireless Devices Vulnerable?

1. Increased Usage – More people use mobile devices for sensitive activities, making
them attractive targets.
2. Weak Security Measures – Many users do not use strong passwords, encryption, or
security software.
3. Public Wi-Fi Risks – Unsecured networks allow hackers to intercept data through
attacks like "Man-in-the-Middle."
4. Mobile Malware – Viruses, Trojans, and spyware designed specifically for mobile
operating systems like Android and iOS.
5. Phishing & Social Engineering – Attackers use fake messages, emails, and apps to
steal personal information.

Common Cybercrimes Targeting Mobile and Wireless Devices

 SIM Cloning & SIM Swapping – Attackers duplicate SIM cards to intercept calls
and messages.
 Ransomware on Mobile Devices – Locks a device and demands payment for access.
 Data Theft & Unauthorized Access – Stolen personal and financial information.
 Mobile Banking & Payment Fraud – Unauthorized transactions using hacked
mobile payment apps.
 Bluetooth & NFC Attacks – Exploiting wireless connections to steal data.

_______________________@@@@@@@@@_________________

Q2)Proliferation of Mobile and Wireless Devices

The rapid growth of mobile and wireless devices has revolutionized communication,
business, and daily life. From basic mobile phones to smartphones, tablets, and wearable
devices, wireless technology has enabled seamless global connectivity. However, this
expansion has also introduced significant cyber security challenges, as cybercriminals exploit
mobile vulnerabilities for malicious activities.

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


12

Growth and Expansion of Mobile & Wireless Devices

1. Increase in Mobile Users – Billions of people worldwide use smartphones for


internet access, banking, and communication.
2. Advancements in Wireless Technology – 3G, 4G, and 5G networks provide faster
and more efficient data transmission.
3. Rise of Smart Devices – Internet of Things (IoT) devices, including smartwatches,
home automation systems, and wireless healthcare gadgets, contribute to the digital
ecosystem.
4. Cloud-Based Services – Mobile users rely on cloud storage, online banking, and
social media, increasing dependency on wireless networks.

Security Risks Due to the Proliferation of Mobile Devices

1. Increased Cybercrime – More devices mean more opportunities for hackers to


exploit security loopholes.
2. Data Privacy Issues – Unauthorized access to personal and financial data due to
weak security settings.
3. Wireless Network Vulnerabilities – Public Wi-Fi and Bluetooth connections expose
users to hacking, eavesdropping, and data interception.
4. Mobile Malware Attacks – Cybercriminals create viruses, Trojans, and
ransomware targeting mobile operating systems like Android and iOS.

Preventive Measures for Mobile Security

1. Use Strong Passwords & Multi-Factor Authentication (MFA) – Enhances device


security.
2. Regular Software Updates – Ensures security patches are installed to fix
vulnerabilities.
3. Avoid Public Wi-Fi for Sensitive Transactions – Prevents unauthorized access to
personal data.
4. Enable Encryption & Remote Wipe Features – Protects sensitive data in case of
theft or loss.
5. Install Verified Apps Only – Reduces the risk of malware infections.

____________________________@@@@@@@@@@___________________

Q3)Trends in Mobility

Trends in Mobility

The rapid adoption of mobile devices and wireless technology has changed how people
interact, work, and conduct business. With advancements in smartphones, tablets, wearable
devices, and IoT (Internet of Things), mobility trends continue to evolve, offering both
opportunities and challenges.

Key Trends in Mobility

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


13

1. Rise of Smartphones and Tablets


o Increasing dependence on mobile devices for communication, shopping,
banking, and entertainment.
o Android and iOS dominate the smartphone market, with advanced features
like biometric authentication and AI-powered assistants.
2. 5G Technology & Faster Connectivity
o High-speed internet enhances mobile experiences, making video streaming,
gaming, and cloud computing seamless.
o However, 5G networks pose new cybersecurity risks as hackers exploit
vulnerabilities in IoT devices.
3. Cloud-Based Mobile Computing
o Mobile users rely on cloud storage for accessibility and backup.
o Security challenges include data breaches and unauthorized access due to
weak authentication measures.
4. Mobile Payment & Digital Wallets
o Services like Google Pay, Apple Pay, and Paytm are replacing traditional
banking transactions.
o Cybercriminals target mobile wallets with phishing attacks, malware, and
SIM card cloning.
5. Bring Your Own Device (BYOD) Trend
o Employees use personal devices for work, increasing productivity but also
raising security risks for organizations.
o Companies must enforce Mobile Device Management (MDM) policies to
secure corporate data.
6. IoT and Wearable Devices
o Smartwatches, fitness trackers, and home automation systems are widely used.
o Security risks include unauthorized access, data leaks, and hacking of
IoT-connected devices.
7. Growth of Mobile Apps & AI Integration
o Mobile applications powered by Artificial Intelligence (AI) and Machine
Learning (ML) enhance user experiences.
o Threats include malicious apps disguised as legitimate software to steal
data.

_____________________________@@@@@@@@__________________________

Q4)Credit Card Frauds in Mobile and Wireless Computing Era

With the rise of mobile banking and digital transactions, credit card frauds have also
increased. Cybercriminals exploit weak security measures in mobile devices to steal sensitive
financial information.

Types of Credit Card Frauds in Mobile & Wireless Computing

1. Phishing & Smishing (SMS Phishing)


o Fake emails, messages, or websites trick users into revealing credit card
details.
o Example: A user receives an SMS claiming to be from a bank, asking for
OTP verification to prevent account deactivation.
2. Card Skimming & Cloning

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


14

o Hackers install skimming devices on ATMs or POS terminals to capture card


details.
o Stolen data is used to create cloned cards for unauthorized transactions.
3. Man-in-the-Middle (MITM) Attacks
o Hackers intercept data transmission over public Wi-Fi to steal credit card
details.
o Users must avoid using public networks for transactions and enable VPNs
for secure browsing.
4. SIM Swapping & OTP Interception
o Cybercriminals duplicate a victim’s SIM card by tricking telecom providers.
o They receive OTPs and authorize fraudulent transactions.
5. Malware & Keyloggers
o Malicious apps or software infect devices, recording keystrokes to steal
passwords and card details.
o Users must only download apps from trusted sources and use antivirus
software.
6. Fake Payment Apps & QR Code Frauds
o Fraudulent payment apps mimic legitimate services to steal banking
credentials.
o Scammers use tampered QR codes to redirect payments to their accounts.
7. Dark Web Transactions & Credit Card Dumping
o Stolen card details are sold on the dark web for illegal purchases.
o Banks use AI-driven fraud detection systems to track suspicious activities.

Preventive Measures to Avoid Credit Card Frauds

✅ Enable Multi-Factor Authentication (MFA) – Adds an extra layer of security for


transactions.
✅ Avoid Public Wi-Fi for Financial Transactions – Prevents data interception by hackers.
✅ Regularly Monitor Bank Statements – Detects unauthorized charges.
✅ Use Virtual Credit Cards & Payment Wallets – Reduces the risk of card cloning.
✅ Beware of Phishing & Smishing Scams – Never share OTPs or personal details via
email/SMS.
✅ Update Mobile Security & Install Antivirus Software – Protects against malware and
keyloggers.
✅ Register for Transaction Alerts – Get real-time SMS or email notifications for every
transaction.

___________________________@@@@@@@@@@@@__________________

Q5)Authentication Service Security

Authentication service security ensures that only authorized users can access digital
systems, networks, and mobile services. It verifies the identity of users before granting access
to sensitive data or online services. With the rise of cyber threats such as phishing,
credential theft, and unauthorized access, strong authentication mechanisms have become
essential for securing mobile and wireless computing environments.

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


15

Types of Authentication Methods

1. Single-Factor Authentication (SFA)

 Uses one credential (e.g., password or PIN) to verify user identity.


 Risk: Easily hacked through brute force attacks or phishing.

2. Two-Factor Authentication (2FA) & Multi-Factor Authentication (MFA)

 2FA: Combines two security factors (e.g., password + OTP).


 MFA: Uses three or more factors (e.g., password + biometric + security token).
 Examples:
o OTP (One-Time Passwords): Sent via SMS/email.
o Authenticator Apps: Google Authenticator, Microsoft Authenticator.
o Biometric Authentication: Fingerprint, facial recognition, retina scan.

3. Biometric Authentication

 Uses unique physical traits for authentication.


 Examples:
o Fingerprint scanners on smartphones.
o Face recognition in Apple Face ID & Android devices.
o Retina and voice recognition systems.
 Risk: Can be bypassed with deepfake technology or stolen biometric data.

4. Token-Based Authentication

 Uses hardware or software tokens to generate secure access codes.


 Types:
o Hardware Tokens: Physical devices (e.g., RSA SecureID).
o Soft Tokens: Mobile apps generate temporary security codes.
 Advantage: Reduces reliance on passwords.

5. Public Key Infrastructure (PKI) & Digital Certificates

 Uses encryption and digital signatures to authenticate users.


 Example: Websites use SSL/TLS certificates to verify identity.

Security Threats to Authentication Services

1. Phishing & Social Engineering – Attackers trick users into revealing login
credentials.
2. Brute Force Attacks – Automated attempts to guess passwords.
3. Man-in-the-Middle (MITM) Attacks – Hackers intercept authentication data during
transmission.
4. SIM Swapping & OTP Hijacking – Cybercriminals gain control of a user's mobile
number to intercept OTPs.
5. Credential Stuffing – Using leaked passwords from data breaches to access multiple
accounts.

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


16

Best Practices for Authentication Security

✅ Use Strong Passwords & MFA – Combine different authentication factors.


✅ Enable Biometric Authentication – Provides an extra layer of security.
✅ Avoid Public Wi-Fi for Logins – Prevents data interception.
✅ Use Encrypted Connections (HTTPS, VPNs) – Protects authentication data in transit.
✅ Monitor & Limit Login Attempts – Prevents brute force attacks.
✅ Educate Users About Phishing & Social Engineering – Reduces risks of credential theft.

Q6)Attacks on Mobile/Cell Phones

Mobile phones have become essential for communication, banking, and online transactions.
However, their widespread use has made them a prime target for cybercriminals. Mobile
devices store sensitive data, connect to unsecured networks, and often lack strong security
measures, making them vulnerable to various attacks.

Common Types of Mobile/Cell Phone Attacks

1. Phishing Attacks (Smishing & Vishing)

 Smishing (SMS Phishing): Cybercriminals send fake SMS messages to trick users
into revealing personal or financial information.
 Vishing (Voice Phishing): Attackers call users pretending to be from banks or
government agencies to steal sensitive details.

🔹 Example: A user receives a text claiming their bank account will be blocked unless they
click a fraudulent link.

2. SIM Swapping & SIM Cloning

 SIM Swapping: Attackers trick mobile network providers into transferring a victim's
phone number to a new SIM card. This allows hackers to intercept OTPs and access
bank accounts.
 SIM Cloning: Cybercriminals create a duplicate SIM card to listen to calls and steal
data.

🔹 Example: A hacker gains access to a victim's cryptocurrency wallet by taking over their
phone number.

3. Man-in-the-Middle (MITM) Attacks

 Hackers intercept data transmitted between a mobile phone and a network, allowing
them to steal passwords, banking details, and private conversations.
 Public Wi-Fi hotspots are often used to execute these attacks.

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


17

🔹 Example: A user connects to free Wi-Fi at an airport, and hackers steal their email login
credentials.

4. Malware & Spyware Attacks

 Mobile malware (viruses, trojans, ransomware) infects phones through malicious


apps or links.
 Spyware secretly monitors user activities, tracking passwords, messages, and GPS
locations.

🔹 Example: A user installs a free app that secretly collects their personal data and sends it to
hackers.

5. Bluetooth & NFC Attacks

 Bluejacking: Sending spam messages via Bluetooth.


 Bluesnarfing: Hackers steal information from Bluetooth-enabled devices.
 NFC Exploits: Attackers steal payment credentials through contactless transactions.

🔹 Example: A hacker nearby can steal data from an unsecured Bluetooth device.

6. Ransomware on Mobile Devices

 Cybercriminals lock a user’s phone and demand a ransom to unlock it.


 Can be spread through malicious apps or links.

🔹 Example: A victim clicks on a fake email attachment, and their phone is locked until they
pay a ransom.

7. Denial-of-Service (DoS) & Overbilling Attacks

 Hackers overload a mobile device with excessive data requests, causing it to crash or
malfunction.
 Overbilling Attacks: Attackers use a victim's mobile data to download large files,
causing unexpected charges.

🔹 Example: A hacker floods a victim’s phone with SMS messages, rendering it unusable.

Preventive Measures Against Mobile Attacks

✅ Enable Multi-Factor Authentication (MFA) – Adds extra security layers.


✅ Avoid Clicking Suspicious Links – Prevents phishing and malware infections.
✅ Use Strong Passwords & Biometric Security – Enhances account protection.
✅Keep Bluetooth & NFC Disabled When Not in Use – Reduces risk of unauthorized
access.
✅ Regularly Update Software & Apps – Fixes security vulnerabilities.
✅ Avoid Public Wi-Fi or Use VPNs – Protects against MITM attacks.
✅ Install Apps Only from Official Stores – Prevents malware infections.

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


18

Q7)Mobile Devices: Security Implications for Organizations

The increasing use of mobile devices in workplaces has enhanced productivity,


communication, and flexibility. However, it also introduces security risks, as mobile devices
store confidential corporate data and connect to company networks. If not properly secured,
these devices can become entry points for cyberattacks, leading to data breaches, financial
loss, and reputational damage.

Major Security Risks of Mobile Devices in Organizations

1. Data Loss & Unauthorized Access

 Lost or stolen mobile devices can expose sensitive business data if not encrypted.
 Employees using weak passwords or failing to lock their devices increases security
risks.
 Insider threats – Disgruntled employees can misuse company data on their personal
devices.

🔹 Example: An employee’s unprotected smartphone, containing company emails and


client data, is stolen and misused.

2. Bring Your Own Device (BYOD) Risks

 Many companies allow employees to use personal devices for work, but these
devices lack centralized security controls.
 Employees may install unapproved or insecure apps that create vulnerabilities.
 Difficulty in separating personal and corporate data increases legal and
compliance risks.

🔹 Example: A personal phone infected with malware compromises company network


security when connected to office Wi-Fi.

3. Unsecured Wireless Connections (Wi-Fi, Bluetooth, NFC)

 Employees may connect to public Wi-Fi, exposing corporate data to man-in-the-


middle (MITM) attacks.
 Unsecured Bluetooth & NFC connections can allow hackers to steal sensitive data.

🔹 Example: A company executive connects to free airport Wi-Fi, allowing attackers to


steal business emails and financial documents.

4. Mobile Malware & Phishing Attacks

 Malicious apps and phishing emails trick employees into revealing login credentials.
 Mobile spyware can track keystrokes, record calls, and steal business data.

🔹 Example: An employee downloads a fake business app that steals company passwords.

5. Ransomware & Mobile Device Hijacking

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


19

 Attackers can lock mobile devices and demand a ransom to restore access.
 Organizations lose access to critical data, disrupting operations.

🔹 Example: A cybercriminal encrypts corporate files on an employee’s phone, demanding


a ransom for decryption.

Security Measures for Protecting Mobile Devices in Organizations

✅ Implement Mobile Device Management (MDM) Solutions – Allows IT teams to


control, monitor, and secure corporate mobile devices.
✅ Enforce Strong Authentication & Encryption – Use multi-factor authentication
(MFA), strong passwords, and device encryption.
✅ Restrict BYOD Access – Limit access to sensitive company resources for personal
devices.
✅ Use Secure Wi-Fi & VPN Connections – Prevent data interception over public
networks.
✅ Enable Remote Wipe & Lock Features – Allows organizations to erase data on
lost/stolen devices remotely.
✅ Regular Employee Cybersecurity Training – Educate employees on phishing,
malware, and mobile security best practices.
✅ Restrict App Downloads – Only allow approved business applications to reduce
malware risks.

Q8)Organizational Measures for Handling Mobile Devices-Related Security Issues

The increasing use of mobile devices in workplaces has improved communication and
efficiency but also introduced security risks such as data breaches, malware attacks, and
unauthorized access. To protect sensitive business information, organizations must
implement robust security measures for managing mobile devices effectively.

Key Organizational Measures for Mobile Security

1. Implement Mobile Device Management (MDM) Solutions

 MDM software helps IT teams remotely manage, monitor, and secure mobile
devices.
 It allows organizations to enforce security policies, update software, and track
lost/stolen devices.
 Examples: Microsoft Intune, VMware AirWatch, IBM MaaS360.

🔹 Benefit: Ensures centralized control over all corporate mobile devices.

2. Enforce Strong Authentication & Access Controls

 Require Multi-Factor Authentication (MFA) for accessing corporate networks and


apps.
 Enforce strong password policies and biometric authentication (e.g., fingerprint,
facial recognition).

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


20

 Implement role-based access control (RBAC) to limit data access based on job roles.

🔹 Benefit: Prevents unauthorized access to corporate data.

3. Secure Wi-Fi & VPN Usage

 Employees should use only secure, encrypted Wi-Fi networks to prevent hacking.
 Require Virtual Private Network (VPN) connections for accessing corporate
resources remotely.
 Disable automatic Wi-Fi connections to prevent accidental connections to insecure
networks.

🔹 Benefit: Reduces the risk of man-in-the-middle (MITM) attacks.

4. Restrict Use of Unapproved Applications

 Allow only approved business applications through an Enterprise App Store.


 Restrict downloads from unknown sources to prevent malware infections.
 Regularly audit installed apps to ensure compliance with security policies.

🔹 Benefit: Prevents malicious applications from compromising corporate data.

5. Implement Remote Wipe & Lock Features

 Enable remote device locking, tracking, and data wiping in case of loss or theft.
 Employees should report lost devices immediately to IT teams for deactivation.
 Use software like Find My Device (Android), Find My iPhone (Apple), or MDM
tools for remote management.

🔹 Benefit: Ensures confidential business data is not accessible if a device is stolen.

6. Regular Security Updates & Patch Management

 Ensure mobile operating systems and business apps receive regular updates to fix
vulnerabilities.
 Enable automatic security patches for corporate apps and devices.
 Conduct security audits to identify outdated software and enforce updates.

🔹 Benefit: Protects against newly discovered cyber threats.

7. Employee Training & Awareness Programs

 Educate employees on mobile security best practices, such as:


o Avoiding phishing scams and malicious links.
o Using MFA and strong passwords.
o Recognizing fake apps and social engineering threats.
 Conduct regular cybersecurity drills to test employees' awareness.

🔹 Benefit: Reduces human errors that lead to security breaches.

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


21

8. Enforce BYOD (Bring Your Own Device) Security Policies

 Implement a clear BYOD policy that defines:


o Security requirements for personal devices used at work.
o Restricted access to sensitive company data.
o Mandatory antivirus and encryption software for personal devices.
 Require separation of work and personal data using containerization solutions
(e.g., Samsung Knox, BlackBerry Dynamics).

🔹 Benefit: Ensures that employee-owned devices do not compromise corporate security.

9. Encrypt Sensitive Corporate Data

 Use end-to-end encryption for emails, messages, and stored data.


 Implement device-level encryption to protect stored files and business documents.
 Secure cloud storage with encrypted backup solutions.

🔹 Benefit: Protects corporate information even if a device is compromised.

10. Monitor & Respond to Security Incidents

 Deploy Intrusion Detection Systems (IDS) and Intrusion Prevention Systems


(IPS) for real-time monitoring.
 Set up automatic alerts for suspicious mobile activity (e.g., multiple failed login
attempts).
 Maintain an incident response plan to handle data breaches effectively.

🔹 Benefit: Ensures quick response to security threats, minimizing damage.

Q9)Organizational Security Policies and Measures in the Mobile Computing Era


(Laptops)

In the modern workplace, laptops and mobile devices are essential for remote work,
business operations, and data access. However, their portability and internet connectivity
expose them to security threats such as data breaches, malware attacks, device theft, and
unauthorized access. Organizations must implement strict security policies and measures
to protect corporate information and ensure compliance with cyber security regulations.

Key Organizational Security Policies for Laptops in Mobile Computing

1. Laptop Usage & Access Control Policy

 Employees must use company-issued laptops for work purposes.


 Implement Role-Based Access Control (RBAC) to restrict access to sensitive data.
 Require Multi-Factor Authentication (MFA) (e.g., passwords + biometric login) for
system access.

🔹 Benefit: Prevents unauthorized access to corporate resources.

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


22

2. Data Encryption & Remote Wipe Policy

 Full-Disk Encryption (BitLocker, FileVault) must be enabled on all company


laptops.
 Organizations must enforce automatic encryption for stored and transmitted data.
 Remote wipe capabilities should be activated to delete sensitive data on lost or stolen
laptops.

🔹 Benefit: Protects confidential business data from cyber threats.

3. Endpoint Security & Antivirus Protection

 Deploy endpoint security solutions like Symantec, McAfee, or Microsoft Defender.


 Ensure automatic antivirus scans and real-time threat detection on all laptops.
 Restrict USB access and external device connections to prevent malware infections.

🔹 Benefit: Prevents malware attacks and unauthorized data transfer.

4. Network & Wi-Fi Security Policy

 Employees must use VPN (Virtual Private Network) when accessing company
resources remotely.
 Disable auto-connect to public Wi-Fi to prevent Man-in-the-Middle (MITM)
attacks.
 Enforce firewalls & intrusion detection systems (IDS/IPS) to monitor laptop
traffic.

🔹 Benefit: Ensures secure communication and prevents cyber espionage.

5. Software & Patch Management Policy

 Regular software updates & security patches must be installed automatically.


 Outdated or unauthorized applications should be blocked or uninstalled.
 Organizations must use centralized patch management tools (e.g., WSUS, SCCM).

🔹 Benefit: Reduces vulnerabilities from outdated software.

6. Laptop Physical Security Policy

 Employees must lock laptops when unattended and store them in secure locations.
 Laptop locks, Kensington security cables, and biometric logins should be
mandatory.
 Implement device tracking solutions (Find My Device, Absolute Computrace).

🔹 Benefit: Minimizes risk of theft and unauthorized access.

7. Bring Your Own Device (BYOD) Security Policy

 Personal laptops used for work must be registered with IT and comply with
security policies.

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


23

 Data separation between work and personal files must be enforced using virtual
machines or sandboxing.
 IT must have remote access to wipe corporate data if needed.

🔹 Benefit: Protects corporate data while allowing device flexibility.

8. Employee Training & Awareness Programs

 Conduct regular cybersecurity training on phishing, password security, and laptop


protection.
 Employees must report suspicious activities, stolen devices, or unauthorized access
immediately.
 Simulated cyber-attack drills should be conducted to test employee preparedness.

🔹 Benefit: Reduces human errors that can lead to security breaches.

Key Security Measures for Laptops in Organizations

✅ Authentication & Access Controls

✔ Enforce Multi-Factor Authentication (MFA) for all laptop logins.


✔ Use role-based access control (RBAC) for data access.
✔ Implement automatic session timeouts to log out inactive users.

✅ Device & Data Protection

✔ Enable full-disk encryption (FDE) to protect stored data.


✔ Restrict USB ports and external storage devices to prevent unauthorized data transfer.
✔ Backup important files to secure cloud storage or external drives.

✅ Network Security

✔ Use VPN for remote work to encrypt internet traffic.


✔ Disable public Wi-Fi auto-connect to prevent MITM attacks.
✔ Monitor network activity with intrusion detection systems (IDS/IPS).

✅ Endpoint Security & Threat Prevention

✔ Install and update antivirus & anti-malware software.


✔ Block unauthorized apps and enforce security patch updates.
✔ Restrict admin privileges to prevent malware execution.

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


24

UNIT-III:

Tools and Methods Used in Cybercrime: Password Cracking, key loggers and Spywares,
virus and worms, Trojan Horses and Backdoors, Steganography, attacks on wireless
networks, Phishing and Identity Theft: Introduction, Phishing, Identity Theft (ID Theft).

Q1)Tools and Methods Used in Cybercrime

Cybercriminals use advanced tools and sophisticated techniques to exploit system


vulnerabilities, steal sensitive information, and disrupt operations. These tools range from
malware and hacking software to social engineering and encryption-breaking methods.
Understanding these tools and methods helps organizations strengthen their cybersecurity
defenses.

1. Malware (Malicious Software)

Malware is software designed to harm, exploit, or disable computer systems.


Cybercriminals use different types of malware for espionage, financial theft, and system
disruption.

Types of Malware:

 Viruses – Attach to files and spread when executed.


 Worms – Self-replicating malware that spreads across networks.
 Trojans – Disguised as legitimate software but contain malicious code.
 Ransomware – Encrypts files and demands payment to unlock them.
 Spyware & Keyloggers – Secretly record user activities, including passwords.
 Rootkits – Hide deep in system files, allowing attackers to control the system.

🔹 Example: The WannaCry ransomware attack (2017) infected thousands of computers


worldwide, demanding Bitcoin payments for data recovery.

2. Phishing & Social Engineering Attacks

Cybercriminals trick users into revealing sensitive information using deceptive emails,
messages, or websites.

Common Techniques:

 Email Phishing – Fake emails pretending to be from trusted sources.


 Spear Phishing – Targeted attacks on specific individuals or companies.
 Smishing – Fraudulent SMS messages to steal user credentials.
 Vishing – Voice-based phishing calls impersonating officials.

🔹 Example: An attacker sends a fake bank email, asking users to verify their login
credentials, leading to account theft.

3. Hacking & Exploit Kits

Hacking tools are used to breach systems, steal data, and disrupt services.

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


25

Common Hacking Methods:

 Brute Force Attacks – Automated password-guessing techniques.


 SQL Injection – Injecting malicious SQL code to access databases.
 Zero-Day Exploits – Targeting software vulnerabilities before a patch is available.
 Denial-of-Service (DoS) & Distributed Denial-of-Service (DDoS) Attacks –
Overloading systems to make them inaccessible.
 Botnets – Networks of compromised computers used for cyberattacks.

🔹 Example: The Mirai botnet attack (2016) used thousands of IoT devices to launch a
massive DDoS attack, disrupting major websites.

4. Wireless & Mobile Device Attacks

Cybercriminals exploit mobile networks and wireless connections to intercept or


manipulate data.

Common Techniques:

 Man-in-the-Middle (MITM) Attacks – Hackers intercept communication between


two parties.
 SIM Swapping – Hijacking a phone number to gain access to online accounts.
 Bluesnarfing – Unauthorized access to data via Bluetooth.
 Fake Wi-Fi Hotspots – Attackers create free Wi-Fi networks to steal user data.

🔹 Example: A hacker sets up a fake airport Wi-Fi, capturing login credentials of


unsuspecting users.

5. Dark Web & Cybercrime Marketplaces

The dark web is a hidden part of the internet where cybercriminals buy and sell stolen data,
hacking tools, and illegal services.

Dark Web Activities:

 Selling stolen credit card details & personal data.


 Hiring hackers for cyber espionage & data breaches.
 Distributing ransomware-as-a-service (RaaS).

🔹 Example: Silk Road, an illegal dark web marketplace, was used for selling drugs, stolen
data, and hacking services before being shut down.

6. Cryptojacking & Financial Fraud

Cybercriminals use victims’ computing power to mine cryptocurrencies or commit financial


fraud.

Common Techniques:

 Cryptojacking – Infecting devices with mining malware to generate cryptocurrency.

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


26

 Card Skimming & Online Payment Fraud – Stealing credit card details through
malware or fake payment gateways.

🔹 Example: Attackers inject malicious scripts into e-commerce sites to steal credit card
details during checkout (Magecart attacks).

7. Deepfake & AI-Powered Cybercrime

Cybercriminals use artificial intelligence (AI) and deepfake technology to manipulate


videos, voices, and text for fraud or misinformation.

Threats:

 Deepfake Videos – Fake videos used for blackmail or political manipulation.


 AI-Powered Phishing – AI generates convincing phishing emails.
 Voice Cloning – Used in CEO fraud and fake ransom demands.

🔹 Example: In 2019, cybercriminals used deepfake voice AI to impersonate a CEO,


tricking an employee into wiring $243,000 to a fraudulent account.

Defensive Measures Against Cybercrime

✅ Use Strong Passwords & Multi-Factor Authentication (MFA).


✅ Avoid Clicking Suspicious Links or Attachments.
✅ Regularly Update Software & Install Security Patches.
✅ Use Firewalls, Antivirus, and Intrusion Detection Systems (IDS).
✅ Encrypt Data & Backup Files to Prevent Ransomware Damage.
✅ Educate Employees on Phishing & Social Engineering Risks.
✅ Avoid Public Wi-Fi or Use a VPN for Secure Browsin

____________________@@@@@@@@@@__________________________

Q2)Password Cracking, Keyloggers, and Spyware

1. Password Cracking

Password cracking is the process of retrieving passwords from stored or transmitted data
using various hacking techniques. Cybercriminals use this method to gain unauthorized
access to accounts, steal sensitive information, or deploy further cyberattacks.

Common Password Cracking Techniques

1. Brute Force Attack – Trying every possible password combination until the correct
one is found.
2. Dictionary Attack – Using a predefined list of common passwords and words to
guess the correct password.
3. Rainbow Table Attack – Using precomputed hash values to crack hashed passwords.

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


27

4. Credential Stuffing – Using leaked username-password combinations from previous


data breaches.
5. Phishing – Trick users into revealing their passwords via fake emails or websites.
6. Man-in-the-Middle (MITM) Attack – Intercepting password transmissions over
unsecured networks.

Prevention Measures

✅ Use strong, unique passwords with a mix of uppercase, lowercase, numbers, and special
characters.
✅ Enable Multi-Factor Authentication (MFA) for added security.
✅ Use password managers to generate and store secure passwords.
✅ Avoid reusing passwords across multiple accounts.

2. Keyloggers

Keyloggers are malicious programs or hardware devices designed to secretly record


keystrokes on a computer or mobile device. Cybercriminals use keyloggers to steal
passwords, credit card details, and other sensitive information.

Types of Keyloggers

1. Software Keyloggers – Installed as malware on a system, capturing keystrokes and


sending data to hackers.
2. Hardware Keyloggers – Physical devices connected between the keyboard and
computer to record keystrokes.
3. Kernel-Level Keyloggers – Operate at the system level, making them harder to
detect.
4. Remote Keyloggers – Work via Trojan horses or phishing links, sending captured
data to attackers remotely.

Prevention Measures

✅ Install antivirus and anti-malware software to detect keyloggers.


✅ Avoid clicking suspicious links or downloading unknown attachments.
✅ Use on-screen keyboards or password managers to bypass keystroke logging.
✅ Keep your operating system and software updated to fix security vulnerabilities.

3. Spyware

Spyware is malicious software that secretly monitors user activities and collects personal
information. It is often used for identity theft, corporate espionage, and data theft.

Types of Spyware

1. Adware – Displays intrusive ads and tracks user browsing habits.

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


28

2. Trojan Spyware – Disguised as legitimate software but secretly collects sensitive


data.
3. Monitoring Spyware – Used by attackers or employers to track user activity.
4. System Monitors – Records keystrokes, internet activity, and application usage.

Prevention Measures

✅ Avoid installing unknown software or apps from untrusted sources.


✅ Regularly scan for spyware using updated antivirus software.
✅ Disable unnecessary permissions for mobile apps.
✅ Use firewalls and secure browsers to prevent spyware infections.

Q3)Virus and Worms, Trojan Horses, and Backdoors

1. Virus and Worms

Viruses and worms are types of malicious software (malware) that spread across computer
systems, causing harm by corrupting files, stealing data, or disrupting operations. While both
are self-replicating, they differ in how they spread.

1.1 Computer Virus

 A virus is a malicious code that attaches itself to legitimate files and spreads when
the infected file is executed.
 It requires human action, such as opening an infected email attachment or
downloading a malicious program, to activate.

Types of Viruses

1. File Infector Virus – Attaches to executable files (.exe, .dll) and spreads when
opened.
2. Boot Sector Virus – Infects the boot sector of a storage device, launching at startup.
3. Macro Virus – Targets macros in documents (e.g., Microsoft Word, Excel).
4. Polymorphic Virus – Changes its code to evade detection by antivirus software.

🔹 Example: The ILOVEYOU virus (2000) spread via email, deleting files and damaging
millions of computers.

1.2 Computer Worm

 A worm is a self-replicating malware that spreads without user interaction by


exploiting system vulnerabilities.
 Unlike viruses, worms do not need to attach to files and can spread through
networks, emails, or removable drives.

Effects of Worms

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


29

✔ Consumes network bandwidth, slowing down systems.


✔ Creates backdoors for further cyberattacks.
✔ Spreads ransomware or spyware in corporate environments.

🔹 Example: The WannaCry worm (2017) used a Windows vulnerability to spread


ransomware globally.

Prevention Measures for Viruses & Worms

✅ Install and update antivirus and anti-malware software.


✅ Avoid downloading attachments or clicking suspicious links.
✅ Regularly update operating systems and applications to fix security vulnerabilities.
✅ Enable firewalls to block unauthorized network access.

2. Trojan Horses and Backdoors

2.1 Trojan Horse

 A Trojan horse is a type of malware that disguises itself as legitimate software but
contains malicious code.
 Unlike viruses and worms, Trojans do not self-replicate but can deliver
ransomware, spyware, or rootkits.

Types of Trojans

1. Backdoor Trojan – Creates a hidden entry point for hackers.


2. Banking Trojan – Steals financial credentials.
3. Remote Access Trojan (RAT) – Allows attackers to take full control of an infected
device.
4. Downloader Trojan – Installs additional malware on the infected system.

🔹 Example: The Zeus Trojan stole banking credentials from millions of users worldwide.

2.2 Backdoors

 A backdoor is a hidden access point in a system, allowing hackers to bypass


security controls.
 It can be installed intentionally (by software developers for maintenance) or
maliciously (by cybercriminals via Trojans, worms, or exploits).

Effects of Backdoors

✔ Allows remote access to the infected system.


✔ Can be used to deploy additional malware or steal sensitive data.
✔ Enables botnet attacks by controlling multiple infected devices.

🔹 Example: The SolarWinds cyberattack (2020) used a backdoor in software updates to


infiltrate government networks.

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


30

Prevention Measures for Trojans & Backdoors

✅ Only download software from trusted sources.


✅ Use firewalls and intrusion detection systems (IDS) to monitor unauthorized access.
✅ Keep operating systems and security software updated.
✅ Regularly scan for malware and suspicious network activity.

Q4)Steganography and Attacks on Wireless Networks

1. Steganography

Steganography is the technique of hiding secret data within other non-secret data (such as
images, audio, video, or text) to avoid detection. Unlike encryption, which scrambles data
into unreadable code, steganography conceals data in plain sight. Cybercriminals use it for
covert communication, data exfiltration, and malware distribution.

Types of Steganography

1. Image Steganography – Hiding messages within image pixels (Least Significant Bit
(LSB) modification).
2. Audio Steganography – Embedding hidden data in audio files.
3. Video Steganography – Concealing data within video frames.
4. Text Steganography – Altering text formatting or embedding invisible characters.
5. Network Steganography – Hiding data within network traffic (e.g., covert channels
in TCP/IP headers).

🔹 Example: Malware like Duqu and Zeus used image steganography to hide malicious
code in images and evade detection.

Steganography in Cybercrime

✔ Used by hackers for data theft and espionage.


✔ Hides malware in multimedia files to bypass security scans.
✔ Enables secret communication in terrorist activities.

Detection & Prevention

✅ Use steganalysis tools (e.g., StegExpose, StegDetect) to analyze files.


✅ Monitor unusual network traffic and file sizes.
✅ Implement Data Loss Prevention (DLP) solutions to detect hidden data transfers.
✅ Educate users about risks of downloading unknown media files.

2. Attacks on Wireless Networks

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


31

Wireless networks (Wi-Fi, Bluetooth, NFC) are vulnerable to cyber-attacks due to their
open nature. Hackers exploit weaknesses in encryption, authentication, and access controls to
steal data, intercept communications, and take control of devices.

Common Wireless Network Attacks

1. Eavesdropping (Packet Sniffing & MITM Attacks)

 Attackers intercept wireless data transmission using tools like Wireshark or


Aircrack-ng.
 Man-in-the-Middle (MITM) Attacks allow hackers to alter communication between
two parties.

🔹 Example: Hackers intercept unencrypted data on public Wi-Fi to steal login credentials.

2. Rogue Access Points (Evil Twin Attacks)

 Attackers set up fake Wi-Fi networks that appear legitimate.


 When users connect, hackers can steal sensitive information or inject malware.

🔹 Example: A fake “Airport Wi-Fi” login page is used to steal banking credentials.

3. Denial-of-Service (DoS) & Deauthentication Attacks

 Attackers flood the Wi-Fi network with excessive traffic, causing connectivity
failures.
 Deauthentication attacks disconnect users by exploiting vulnerabilities in WPA
security protocols.

🔹 Example: Hackers send fake deauthentication frames to force users off a Wi-Fi network.

4. War Driving & Network Intrusions

 Cybercriminals drive around with hacking tools to find and exploit weak Wi-Fi
networks.
 Weak WEP or WPA encryption allows attackers to break into networks and access
devices.

🔹 Example: Hackers use Aircrack-ng to crack a weak Wi-Fi password in minutes.

5. Bluetooth & NFC Attacks

 Bluesnarfing: Stealing data from Bluetooth-enabled devices.


 Bluejacking: Sending unsolicited messages via Bluetooth.
 Relay Attacks: Exploiting NFC to intercept contactless payments.

🔹 Example: Attackers use Bluetooth scanning in public areas to hack mobile devices.

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


32

Prevention & Security Measures

✅ Use strong WPA3 encryption for Wi-Fi security.


✅ Avoid public Wi-Fi or use VPNs for secure browsing.
✅ Disable automatic Wi-Fi, Bluetooth, and NFC connections.
✅ Monitor network activity for unauthorized access points.
✅ Enable MAC address filtering and hide SSID to prevent unauthorized devices from
connecting.

Q5)Phishing and Identity Theft

Cybercriminals use phishing and identity theft to steal sensitive information such as
passwords, banking details, and personal identification data. These attacks often lead to
financial fraud, unauthorized access, and reputational damage. With the rise of online
banking, e-commerce, and social media, phishing and identity theft have become major
cyber security threats.

What is Phishing?

Phishing is a fraudulent attempt to obtain sensitive information by disguising as a


trustworthy entity. Attackers trick victims into clicking malicious links, downloading
malware, or revealing personal details.

Types of Phishing Attacks

1. Email Phishing – Fake emails pretending to be from banks, social media, or


government agencies.
2. Spear Phishing – Targeted phishing attacks on specific individuals or organizations.
3. Smishing (SMS Phishing) – Fake messages sent via SMS to trick users.
4. Vishing (Voice Phishing) – Attackers impersonate officials over phone calls.
5. Pharming – Redirecting users to fraudulent websites to steal credentials.

🔹 Example: A fake PayPal email asks users to "verify their account," leading them to a
fraudulent login page where credentials are stolen.

How to Prevent Phishing?

✅ Avoid clicking on suspicious links in emails and messages.


✅ Verify sender email addresses and website URLs.
✅ Use Multi-Factor Authentication (MFA) for account security.
✅ Install anti-phishing browser extensions to detect fake sites.
✅ Report phishing attempts to cybersecurity authorities.

2. Identity Theft (ID Theft)

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE


33

What is Identity Theft?

Identity theft occurs when cybercriminals steal personal information (e.g., name, Social
Security number, credit card details) to commit fraud or financial crimes. Stolen identities
are used for unauthorized purchases, loan fraud, and criminal activities.

Types of Identity Theft

1. Financial Identity Theft – Using stolen information for fraud, credit card
transactions, or loans.
2. Medical Identity Theft – Using someone’s identity for fake health insurance claims.
3. Criminal Identity Theft – Committing crimes under a stolen identity.
4. Synthetic Identity Theft – Creating fake identities using stolen personal details.

🔹 Example: A cybercriminal steals credit card details through a phishing attack and makes
unauthorized purchases.

How to Prevent Identity Theft?

✅ Use strong, unique passwords for online accounts.


✅ Avoid sharing personal information on untrusted websites.
✅ Regularly monitor bank statements and credit reports for fraud.
✅ Enable two-factor authentication (2FA) for online banking.
✅ Use identity theft protection services (e.g., LifeLock, Experian).

M.VIJITHA CYBERSECURITY MATERIAL DEPT.OF COMPUTER SCIENCE

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy