Unit-5 BIS
Unit-5 BIS
Cyber security is the practice of protecting systems, networks, and programs from digital
attacks.
These cyber-attacks are usually aimed at accessing, changing, or destroying sensitive
information.
The three main goals of cyber security:
Confidentiality, Integrity, and Availability
They work in harmony to protect data from threats, ensure its accuracy, and make it
accessible to those who need it.
1. Network Security –
It focuses on securing computer networks from unauthorized access, data
breaches, and other networkbased threats.
It involves technologies such as Firewalls, Intrusion detection systems (IDS),
Virtual private networks (VPNs).
2. Application Security:
It is concerned with securing software applications and preventing
vulnerabilities. It involves secure coding practices, regular software updates
and patches, and application-level firewalls.
3. Information or Data Security:
It focuses on protecting sensitive information from unauthorized access,
disclosure, alteration. It includes Encryption, Access controls, Data
classification, and Data loss prevention (DLP) measures.
4. Cloud Security:
It involves securing data, applications, and infrastructure hosted on cloud
platforms.It uses various cloud service providers such as AWS, Azure, Google
Cloud, etc., to ensure security against multiple threats.
5. Mobile Security:
It involves securing the organizational and personal data stored on mobile
devices such as cell phones, tablets, and other similar devices against various
malicious threats. These threats are Unauthorized access, Device loss or Theft,
Malware, etc.
Regularly backing up mobile device data is important to prevent data loss in
case of theft, damage, or device failure.
Mobile devices often connect to various networks, including public Wi-Fi,
which can pose security risks. It is important to use secure networks whenever
possible, such as encrypted Wi-Fi networks or cellular data connections.
6. Endpoint Security:
It refers to securing individual devices such as computers, laptops,
smartphones, and IoT devices.
It includes antivirus software, intrusion prevention systems (IPS), device
encryption, and regular software updates.
Antivirus and Anti-malware software that scans and detects malicious software,
such as Viruses, Worms, Trojans, and Ransomware. Firewalls are essential
components of endpoint security.
6. Internet of Things (IoT) Security:
IoT security is the practice of protecting Internet of Things (IoT) devices from
attack.
It is based on a cybersecurity strategy to protect IoT devices and the vulnerable
networks they connect to from cyber attacks.
1. Malware
2. Denial-of-Service (DoS) Attacks
3. Phishing
4. Spoofing
5. Identity-Based Attacks
6. Code Injection Attacks
7. Supply Chain Attacks
8. Insider Threats
9. DNS Tunneling
10. IoT-Based Attacks
1. Malware:
Malware — or malicious software — is any program or code that is created with the intent
to do harm to a computer, network or server.
Most common type of cyber attack.
Type Description
Ransomware In a ransomware attack, an adversary encrypts a victim’s data and offers
to provide a decryption key in exchange for a payment. Ransomware
attacks are usually launched through malicious links delivered via
phishing emails, but unpatched vulnerabilities and policy
misconfigurations are used as well.
Fileless Malware Fileless malware is a type of malicious activity that uses native, legitimate tools
built into a system to execute a cyber attack. Unlike traditional malware, fileless
malware does not require an attacker to install any code on a target’s system,
making it hard to detect.
Adware Adware is a type of spyware that watches a user’s online activity in order to
determine which ads to show them. While adware is not inherently malicious,
it has an impact on the performance of a user’s device and degrades the user
experience.
Worms A worm is a self-contained program that replicates itself and spreads its copies
to other computers. A worm may infect its target through a software
vulnerability or it may be delivered via phishing or smishing. Embedded worms
can modify and delete files, inject more malicious software, or replicate in place
until the targeted system runs out of resources
Backdoors Backdoors are hidden entry points into a computer system. It bypass normal
authentication mechanisms. Attackers use backdoors to gain unauthorized
access to systems. A Backdoor can be installed on your system by hackers in the
form of some malware application or using your device’s software
vulnerabilities.
Keylogger Keyloggers are tools that record what a person types on a device. While there
are legitimate and legal uses for keyloggers, many uses are malicious. In a
keylogger attack, the keylogger software records every keystroke on the victim’s
device and sends it to the attacker
Botnet Botnet is a network of computers infected with malware that are controlled by
a bot herder. The bot herder is the person who operates the botnet
infrastructure and uses the compromised computers to launch attacks designed
to crash a target’s network, inject malware, harvest credentials or execute CPU-
intensive tasks.
HTTP flood DDoS- the attacker uses HTTP requests that appear legitimate to overwhelm an
application or web server.
UDP flood DDoS- a remote host is flooded with User Datagram Protocol (UDP) packets sent to
random ports.
ICMP flood - a barrage of ICMP Echo Request packets overwhelms the target, consuming both
inbound and outgoing bandwidth.
3. PhishingAttacks:
Phishing is a type of cyberattack that uses email, SMS, phone, social media, and social
engineering techniques to entice a victim to share sensitive information — such as
passwords or account numbers — or to download a malicious file that will install viruses
on their computer or phone.
Type Description
SMiShing Smishing is the act of sending fraudulent text messages designed to trick
individuals into sharing sensitive data such as passwords, usernames and
credit card numbers. A smishing attack may involve cybercriminals
pretending to be your bank or a shipping service you use.
Vishing Vishing, a voice phishing attack, is the fraudulent use of phone calls and
voice messages pretending to be from a reputable organization to convince
individuals to reveal private information such as bank details and
passwords.
4. Spoofing
Spoofing is a technique through which a cybercriminal disguises themselves as a known
or trusted source.
In so doing, the adversary is able to engage with the target and access their systems or
devices with the ultimate goal of stealing information, extorting money or installing
malware or other harmful software on the device.
Type Description
5. Identity-Based Attacks:
Identity-driven attacks are extremely hard to detect. When a valid user’s credentials
have been compromised and an adversary is masquerading as that user, it is often very
difficult to differentiate between the user’s typical behavior and that of the hacker using
traditional security measures and tools.
6. Code Injection Attacks:
Code injection attacks consist of an attacker injecting malicious code into a vulnerable
computer or network to change its course of action.
Eg. SQL injection, cross site scripting(XSS), Data poisioning
7. Supply Chain Attacks:
A supply chain attack is a type of cyberattack that targets a trusted third-party vendor
who offers services or software vital to the supply chain. Software supply chain attacks
inject malicious code into an application in order to infect all users of an app, while
hardware supply chain attacks compromise physical components for the same purpose.
Software supply chains are particularly vulnerable because modern software is not
written from scratch: rather, it involves many off-the-shelf components, such as third-
party APIs, open source code and proprietary code from software vendors.
8. DNS Tunneling:
DNS Tunneling is a type of cyberattack that leverages/take benefit of domain name
system (DNS) queries and responses to bypass traditional security measures and
transmit data and code within the network.
Once infected, the hacker can freely engage in command-and-control activities. This
tunnel gives the hacker a route to unleash malware and/or to extract data, IP or other
sensitive information by encoding it bit by bit in a series of DNS responses.
DNS tunneling attacks have increased in recent years, in part because they are relatively
simple to deploy. Tunneling toolkits and guides are even readily accessible online
through mainstream sites like YouTube.
9. IoT-Based Attacks:
An IoT attack is any cyberattack that targets an Internet of Things (IoT) device or
network. Once compromised, the hacker can assume control of the device, steal data,
or join a group of infected devices to create a botnet to launch DoS or DDoS attacks.
Vulnerabilities
Cyber Crimes
Cybercrime is any criminal activity that involves a computer, network or networked device. Types
of Cybercrimes: Identity Theft:
Taking and using someone’s personal information without permission. It’s usually for doing
fraud.
For eg. Stealing someone’s social security number to open bank account or get credit cards.
Hacking:
Criminal hacking is the act of gaining unauthorized access to data in a computer or network.
Hackers steal data ranging from personal information and corporate secrets to government
intelligence. Hackers also break into networks to disrupt operations of companies and
governments.
Ransomware:
Ransomware attacks are a very common type of cybercrime.
It is a type of malware that has the capability to prevent users from accessing all of their
personal data on the system by encrypting them and then asking for a ransom to give access
to the encrypted data. (It is a Malicious software locks valuable digital files and demanding a
ransom for their release.)
Ransomware typically affect via email, attract a user to click on an attachment or visit a
website that infects their computer with malicious code.
Hacking:
Hacking is the act of gaining unauthorized access to data in a system or computer. Hacking
refers to activities that seek to compromise digital devices, such as computers, smartphones,
tablets, and even entire networks. Types of Hacking/hackers: Positive hacking/Ethical
hacking:
It is also known as White Hat Hackers.
White hat hackers are the one who is authorized or the certified hackers who work for the
government and organizations by performing penetration testing and identifying loopholes in
their cybersecurity.
They also ensure the protection from the malicious cyber crimes.
They work under the rules and regulations provided by the government, that’s why they are
called Ethical hackers or Cybersecurity experts.
Black Hat Hackers(Malicious hacking):
They are often called Crackers.
Black Hat Hackers can gain the unauthorized access of your system and destroy your vital
data. The method of attacking they use common hacking practices they have learned earlier.
They are considered to be as criminals and can be easily identified because of their malicious
actions.
Script Kiddies:
They are the most dangerous people in terms of hackers.
A Script kiddie is an unskilled person who uses scripts or downloads tools available for
hacking provided by other hackers.
They attempt to attack computer systems and networks and deface websites. Their main
purpose is to impress their friends and society. Generally, Script Kiddies are juveniles who
are unskilled about hacking.
Hacktivist/Hactivism:
These are also called the online versions of the activists.
Hacktivist is a hacker or a group of anonymous hackers who gain unauthorized access to
government’s computer files and networks for further social or political ends.