Module 1 Introduction to cryptography...

22ss02it069 43 views 109 slides Aug 21, 2024
Slide 1
Slide 1 of 109
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92
Slide 93
93
Slide 94
94
Slide 95
95
Slide 96
96
Slide 97
97
Slide 98
98
Slide 99
99
Slide 100
100
Slide 101
101
Slide 102
102
Slide 103
103
Slide 104
104
Slide 105
105
Slide 106
106
Slide 107
107
Slide 108
108
Slide 109
109

About This Presentation

Introduction to cryptography


Slide Content

Cryptography & Network Security
(SSCS2061)
Module 1 Introduction to Cyber Security

Books

Module 1 Introduction to Cyber Security

Outline
•Overview of Cyber Security
•Internet Governance –Challenges and Constraints
•Cyber Threats
•Cyber Warfare
•Cyber Crime
•Cyber Terrorism
•Cyber Espionage
•Need for a Comprehensive Cyber Security Policy
•Need for a Nodal Authority
•Need for an International convention on Cyberspace

Cyber Space
•Cyberspaceisavirtualspacewithnomass,gravityor
boundaries.Itistheinterconnectedspacebetweennetworksof
computersystems.BitsandBytes-Zeroesandonesareusedto
defineCyberspace.
•Itisadynamicenvironmentwherethesevalueschange
continuously.

•Theelectronicworldcreatedbyinter-connected
networksofinformationtechnologyandthe
informationonthosenetworks.
•Itisaglobalcommonswherepeoplearelinked
togethertoexchangeideasandservices.
4

•Cyberisofrelatingto,orinvolvingcomputersor
networks (Such asinternet)
•Itisrelatingtoorcharacteristicofthecultureof
computers, informationtechnology,andvirtualreality.
•Cyberasacombinationof,
Technology,
Human Beings
Organization

•Networks
•ApplicationServers
•Laptops
•Smart Phones
•Sensors
•Database,etc.

•PolicyMakers
•Technologists
•Criminals
•SocialActivists
•IntelligenceOperatives
•Hobbyists,etc.

•Corporations
•Organizations(PrivateandPublicSectors)
•Rail Companies
•Nuclear Power plants,etc.

•Securityisfreedomfromfear,dangerorthreat.
•SecurityisabouttosecureIndividual,corporationand
NationStatesbyusingdifferenttools,technologyand
architecture.

•Cybercrimeiscriminalactivitycarriedoutbymeansof
computers ortheinternet.
Examples:
•Hacking
•Unauthorizednetworkaccess
•Internetfraud
•Theftofpasswords
•Websitedefacing, etc.

•CyberSecurityistheorganizationandcollectionof
resources,processesandstructuresusedtoprotect
cyberspaceandcyberspace-enabledsystems.
•ItreferstoProtectionofeverything
thatisdigitalbyunderstandingof
networksandartofhidingand
encryptinginformation.
11

•Internethasmadeourlifeveryeasierwithitsinvention.
•Cybersecurityisconstantlyevolutionaryindustrywith
requirementofdailylife.
•Cybercrimeiscommonandratesofcybercrimeare
increasing.
•Itisimportantmeasureforanyorganizationtobuildtrust.

Importance of CyberSecurity
•The Internet allows an attacker to work from anywhere on the
planet.
•Risks caused by poor security knowledge and practice:
•Identity Theft
•Monetary Theft
•Legal Ramifications (for yourself and your organization)
•Sanctions or termination if policies are not followed
•According to the SANS Institute, the top vectors for vulnerabilities
available to a cyber criminal are:
•Web Browser
•IM Clients
•Web Applications
•Excessive UserRights

CyberSecurity
•Cybersecurityreferstothebodyoftechnologies,processes,and
practicesdesignedtoprotectnetworks,devices,programs,anddata
fromattack,damage,orunauthorizedaccess.

CyberSecurity

CyberSecurityisSafety
•Security:Wemustprotectourcomputersanddata
inthesamewaythatwesecurethedoorstoour
homes.
•Safety:Wemustbehaveinwaysthatprotectus
againstrisksandthreatsthatcomewith
technology.

Cyber Crime
•Cybercrimecanbedefinedas“Theillegalusageofanycommunicationdevice
tocommitorfacilitateincommittinganyillegalact”.
•Acybercrimeisexplainedasatypeofcrimethattargetsorusesacomputeror
agroupofcomputersunderonenetworkforthepurposeofharm.
•Cybercrimesarecommittedusingcomputersandcomputernetworks.They
canbetargetingindividuals,businessgroups,orevengovernments.
•Investigatorstendtousevariouswaystoinvestigatedevicessuspectedtobe
usedortobeatargetofacybercrime.

•Thetermcybercrimeisusedtodescribeaunlawfulactivityinwhich
computerorcomputingdevicessuchassmartphones,tablets,Personal
DigitalAssistants(PDAs),etc.whicharestandaloneorapartofa
networkareusedasatoolor/andtargetofcriminalactivity.
•Itisoftencommittedbythepeopleofdestructiveandcriminalmindset
eitherforrevenge,greedoradventure.
Cyber Crime

Classification of Cyber Crimes
•The cyber criminal could be internal or external to the organization
facing the cyber attack.
1.Insider Attack
2.Outsider Attack

Insider Attack
•Anattacktothenetworkorthecomputersystembysomepersonwith
authorizedsystemaccessisknownasinsiderattack.
•Itisgenerallyperformedbydissatisfiedorunhappyinsideemployeesor
contractors.Themotiveoftheinsiderattackcouldberevengeorgreed.
•Itiscomparativelyeasyforaninsidertoperformacyberattackasheiswell
awareofthepolicies,processes,ITarchitectureandweaknessofthesecurity
system.

Outsider (External) Attack
•Whentheattackeriseitherhiredbyaninsideroranexternalentitytothe
organization,itisknownasexternalattack.
•Theorganizationwhichisavictimofcyberattacknotonlyfacesfinancialloss
butalsothelossofreputation.
•Sincetheattackerisexternaltotheorganization,sotheseattackersusuallyscan
andgatheringinformation.

Reasons for Commission of Cyber Crimes
1.Money:Peoplearemotivatedtowardscommittingcybercrimeistomakequick
andeasymoney.
2.Revenge:Somepeopletrytotakerevengewithother
person/organization/society/casteorreligionbydefamingitsreputationor
bringingeconomicalorphysicalloss.Thiscomesunderthecategoryofcyber
terrorism.
3.Fun:Theamateurdocybercrimeforfun.Theyjustwanttotestthelatesttool
theyhaveencountered.
4.Recognition:Itisconsideredtobeprideifsomeonehackthehighlysecured
networkslikedefensesitesornetworks.

5.Anonymity-Manytimetheanonymitythatacyberspaceprovidemotivatesthe
persontocommitcybercrimeasitismucheasytocommitacybercrimeover
thecyberspaceandremainanonymousascomparedtorealworld.Itismuch
easiertogetawaywithcriminalactivityinacyberworldthanintherealworld.
Thereisastrongsenseofanonymitythancandrawotherwiserespectable
citizenstoabandontheirethicsinpursuitpersonalgain.
6.CyberEspionage:Attimesthegovernmentitselfisinvolvedincyber
trespassingtokeepeyeonotherperson/network/country.Thereasoncould
bepolitically,economicallysociallymotivated.
Reasons for Commission of Cyber Crimes

Types of Cyber Crimes
1.crimesagainstpeople(cyberharassment,distributionofchild
pornography,creditcardfraud)
2.crimesagainstproperty(hacking,virustransmission,copyright)
3.crimesagainstthegovernment(accessingconfidentialinformation,
cyberwarfare,piratedsoftware).

Example of Cyber Crime
Agangofcriminalsisactiveoverthecyberspace,whichsteelsthecreditcarddataofthe
cardholdersfromthePOSatshoppingmalls,petrolpumps,resturents,hotels,etc.anduse
thesecardstobookairticketsonline.Accordingtothereports,over15000creditcards
werefraudulentlyusedbythesecriminalstobookonlineticketswhichaccountfor
approximatlyRs.17crorerevenueloss.Thesecriminalsusepublicinfrastructurelike
cybercafe,etc.tobooktheseticketssothatitisdifficulttotracethem.Thefraudcameto
thenoticewhenthecustomerswhowerechargedforbookinganairticketandthese
customersreportedatthecardissuingbanksclamingthattheseticketswerenever
bookedbythem.

•TheInternetisavastnetworkof
independently-managednetworks.
•WhodecidesontheStrategicguidelinesand
developmentsoftheinternet?
•Nosingleindividual,company,organization
orstatedecidesalone.
•Theinternetreliesonmulti-stakeholder
cooperationknown as “Internet
Governance”.
•Agroupofactorsthatworktogetherat
nationallevelandinternationallevelintheir
respectiverole.
16

17

18

•TheInternetGovernanceForum(IGF)networkisamultistakeholder
policyplatform,initiatedbytheUnitedNationswiththeaimof
exchanginginformationandsharinggoodpoliciesandpractices
relatingtotheInternetandtechnologies.
•Itbringstogetherrepresentativesofvariousstakeholdersandsocial
groupsononlinegovernance,inparticulargovernments,theprivate
sectorandcivilsociety,includingthetechnicalandacademic
community,andpromotesdialogueandpolicy-making
internationally.
38

69

•Itistheartortechniqueoffindingandexploiting
security loopholesinasystem.
Hacking
EthicalHacking UnethicalHacking
40

•EthicalHacking:
Whenahackerhelpsorganizationsorindividualswith
findingsecurityloopholesandfixingthemwiththeir
permission,itisreferredtoasethicalhacking.
•UnethicalHacking:
Whenahackeruseshisknowledgetostealfromor
causedamagetootherpeople,itisknownas
unethicalhacking
41

Hackers
BlackHatHackers WhiteHatHackers
GreyHatHackers
•Ahackerisapersonwhobreaksintoacomputer
system

•Acriminalwhousesandmanipulatestechnology
withviciousandoftenillegalintentandfortheir
personalprofit.
•Theyaresometimescalledcrackers.
Whydotheydoit?
•Makemoneybyillegalmeans.
•Sellsensitivedata
•Noterietyandfameamoungstotherhackers
43

•Theyarealsocalledpenetrationtester.
•Theypurposelyattempttohackclient
systemstofindweaknesseswhichthey
thenreporttotheircompany.
•Theyarehiredbybusinessestohandle
cybersecurity.
44

•Ahackerthatisnotnecessarily
maliciousbutblursthelinebetween
blackandhathacker.
•Theyusetheirtalentsinthesameas
whitehathackersbutwithoutthe
permissionoftheircompany.
•Once they discover weaknesses they
willoffertosellthembacktothe
hacked party..
45

Hacker Cracker
Peoplewhogainunauthorized
accesstocomputersystemfor
knowledgeortodiscover
Someone who breaks into
computers , often does harmful
thingssuchasstealcredentials.
Doesnotworkagainstlawand
does not damage data
intentionally
Workagainstthelawand
damagesdataintentionally
ReferredasWhiteHats ReferredasBlackHats
Havegoodethics,improveand
makesystemadvance.
Havepoorethics,shutdownor
Harmsystems 46

What cause vulnerabilities
•Vulnerabilitiescanarisefromawidevarietyofsources.
•Misconfigurations,bugs,orunauthorizedusearemorelikelyincomplexsystems.
•Consistency−Attackersmaybeabletopredictandexploitflawsinwidelyused
code,operatingsystems,hardware,andsoftware.
•Connectivitymakesgadgetsmoresusceptibletosecurityflaws.
•Weakorrepeatedpasswordsincreasetheriskofmultipledatabreaches.
•OperatingSystemFlaws−Operatingsystemsarenotimmunetohavingproblems.
Operatingsystemsthataren'tproperlyprotectedbydesignare
vulnerabletovirusesandmalwaresincetheyprovideusers
unrestrictedaccess.

•Spywareandadware-thatmaybeautomaticallyplacedoncomputerscanbefound
allovertheinternet.
•BugsinSoftwareDevelopment-Itisnotuncommonforprogrammersto
inadvertentlyintroduceasecurityflaw.
•Uncheckeduserinput−Ifapieceofsoftwareorawebsitetreatsalluserinputas
trustworthy,itmayexecuteanaccidentalSQLinjection.
•Mostcompaniesfacetheirgreatestsecurityriskfromtheiremployees,making
socialengineeringatopconcern.Thissuggeststhatpeoplecanbeamajor
sourceofdanger.
What cause vulnerabilities

Vulnerability
•Vulnerabilitiesareweaknessesinasystemthatgivesthreatstheopportunityto
compromiseassets.Allsystemshavevulnerabilities.Eventhoughthetechnologiesare
improvingbutthenumberofvulnerabilitiesareincreasingsuchastensofmillionsoflines
ofcode,manydevelopers,humanweaknesses,etc.
•TypesofVulnerabilities
1.HardwareVulnerability
2.Software Vulnerability
3.Network Vulnerability
4.Procedural Vulnerability

Hardware Vulnerability
•A hardware vulnerability is a weakness which can used to attack the system
hardware through physically or remotely.
•Forexamples:
1.Oldversionofsystemsordevices
2.Unprotectedstorage
3.Unencrypteddevices,etc.

Software Vulnerability
•A software error happen in development or configuration such as the execution
of it can violate the security policy.
•For examples:
1.Lack of input validation
2.Unverified uploads
3.Cross-site scripting
4.Unencrypted data, etc.

Network Vulnerability
•A weakness happen in network which can be hardware or software.
•For examples:
1.Unprotected communication
2.Malware or malicious software (e.g.: Viruses, Keyloggers, Worms,
etc)
3.Social engineering attacks
4.Misconfigured firewalls

Procedural Vulnerability
•A weakness happen in an organization operational methods.
•For examples:
1.Password procedure –Password should follow the standard password
policy.
2.Trainingprocedure–Employeesmustknowwhichactionsshouldbetaken
andwhattodotohandlethesecurity.Employeesmustneverbeaskedfor
usercredentialsonline.Maketheemployeesknowsocialengineeringand
phishingthreats.

•Acyberorcybersecuritythreatisa
maliciousactthatseekstodamagedata,
stealdata,ordisruptdigitallifeingeneral.
•Thepossibilityofamaliciousattemptto
damageordisruptacomputernetworkor
system.
63

64

•Malwarestandsfor“MaliciousSoftware”andit
isdesignedtogainaccessorinstalledintothe
computerwithouttheconsent(permission)of
theuser.
•Malwareisdefinedascodewithmaliciousintent
thattypicallysteals,encryptordestroy
sensitivedata,attackingorhijackingcore
computingfunctionsandmonitoringusers’
computeractivity.
•Theyperformunwantedtasksinthehost
computerforthebenefitofathirdparty.
65

•Thereisafullrangeofmalwareswhichcanseriouslydegrade
theperformanceofthehostmachinebydeletingor
corruptingfiles.
•Firstmalware(MorissWarm)willbecomeonpictureonNov
2,1988.Nowthatisinstalledonfloppydiskandkeptina
museum.
66

•Virus
•Worms
•Trojanhorse
•Spyware
•Adware
•Scareware
•BrowserHijackingsoftware
67

•Virusdesignedtomakeself-replicate.
•Avirusisamaliciouscodewrittento
damage/harmthehostcomputerbydeletingor
appendingafile,occupymemoryspaceofthe
computerbyreplicatingitsowncopyofthecode,
slowdowntheperformanceofthecomputer,
formatthehostmachine,etc.
•Byreplication,RAMorDiskspacewillbefull
andsystemperformancedecreased.
25

•Warmscanreplicatethemselveslike
Virus.
•Theydoesnotrequirehumaninterventionto
traveloverthenetworkandspreadfromthe
infectedmachinetothewholenetwork.
•Wormscanspreadeitherthroughnetwork,
usingtheloopholesoftheOperatingSystem
orviaemail.Thereplicationandspreadingof
thewormoverthenetworkconsumesthe
networkresourceslikespaceandbandwidth
andforcethenetworktochoke.
69

•Trojanhorseisamaliciouscodethatisinstalledin
thehostmachinebypretendingtobeuseful
software.
•Theuserclicksonthelinkordownloadthefile
whichpretendstobeausefulfileorsoftwarefrom
legitimatesource.
•Itnotonlydamagesthehostcomputerby
manipulatingthedatabutalsoitcreatesa
backdoorinthehostcomputersothatitcouldbe
controlledbyaremotecomputer.
•Trojensneitherinfecttheothercomputersin
thenetworknordotheyreplicate.
70

•Itisaspecialtypeofwhichisinstalledinthetarget
computerwithorwithouttheuserpermission
andisdesignedtostealsensitiveinformationfrom
thetargetmachine.
•Mostlyitgathersthebrowsinghabitsoftheuserand
thesendittotheremoteserverwithoutthe
knowledgeoftheownerofthecomputer.
71

•Itisaspecialtypeofmalwarewhichisusedfor
forcedadvertising.Theyeitherredirectthepage
tosomeadvertisingpageorpop-upanadditional
pagewhichpromotessomeproductorevent.
•Theseadwarearefinanciallysupportedbythe
organizationswhoseproductsareadvertised.
72

•Itismalicioussoftwarewhichinstallonsystem
withoutuserpermissionandencryptorlockthe
data.
•Ithasevenchangedthewayhowthecriminal
targetthepeopleforransom.
•Themaliciouscodecanneitherbeuninstallednor
canthecomputerbeusedtilltheransomispaid.
73

•Itismalicioussoftwarewhichusuallycomeswith
thebrowseraddonoverextension.
•Ithijacksthesettingofallbrowserslike
Homepage,Newtabanddefaultsearch
engine.
74

•Bymailattachments(SpamMail).
•Bydownloadingcrackedversion.
•Byvisitinguntrustedwebsites.
•Byclickingadds.
75

•AvoidclickingonuntrustedLinks.
•Avoiddownloadingattachmentsfromunknownsenders.
•Installupdatesregularlytomakeyoursystemuptodate
andtosolvesecuritypatches.
•Useantivirussoftware.
•Useupdatedfirewall.
76

•Phishingisanonlinescam where
criminalssendfraudulentemailstothe
organization,user,andmoretocollect
sensitiveinformation.
•Mostly,thishappensthroughalinksent
byanunknown emaildomain.
Clickingthelinkscontainedinsuch
emailscanputallyourdataisatrisk.
•Theseemailscanalsoleadtomonetary
losses.Theintentionscanvaryfromone
phishingmailtoanother,butonething
isguaranteedi.eloss.
77

•Neverentersensitiveinformation(likebankdetails,
emailIdorPassword)toawebpagethatyoudon’ttrust.
•AlwaysbecarefullookattheURL.
78

•Itisanattempttoobtainordecrypta
user’spasswordforillegaluse.
•Hackerscanusecrackingprograms,
dictionaryattacksandpasswordsniffersin
passwordattacks.
•Example:AccessBankdetails
79

•BruteForceAttacks:Inthisattack,hackerloggedinwith
possiblepasswordcombinations.
•DictionaryAttack:Inthisattack,hackerloggedinby
cyclingthroughthecombinationofcommonwords.Theywill
trythosepossibilitieswhicharemostlikelytosucceed.
•KeyloggerAttacks:Ahacker,capturesthekeystrokestyped
onkeyboardandsavesthesekeystrokesinafile,includingthe
detailsliketheusernamesandpasswordsyouentered,credit
carddetails,websitesyouhavevisited,theapplicationsyou
opened,andsoon.
80

•Updatepassword
•Updatepasswordsinregularintervals.
•Passwordshouldnotbethesameforeverything.
•Enforcestrongpasswordpolicies
•Whensettingpassword,bestpracticesshouldbefollowedwithagenerous
useofalphanumeric.
•Enable MultifactorAuthentication
•Itinvolvesuseofpasswordwithextrasecuritychecks.E.g.,One-Time
Password(OTP),biometricauthentication,softwaretokens,andbehavioral
analysis.
•UseNoDictionary
•It’salwaysagreatideatouseapasswordthatmakesnosenseforpasswords.
81

•John theripper
•Hydratool:
•Hashcat
•Mesusa
•CeWLtool:
•Cain&Abel
•Ophcrack
•ncrack etc
39

•Botnetsareworkhorsesofthe
internet.
83
•Abotnetisanumberofinternet-
connecteddevices,eachofwhich
runsoneormorebots.
•Abotnetisnothingmorethana
connectedcomputerscoordinated
togethertoperformatask.

•DDosstandsfordistributeddenialofserviceattack.
•Itisacyberattackonaspecificserveror network.
84

•AnintendedpurposeofDDoSistodisruptingnormal
operation.
•Itfloodingthetargetwithaconstantfloodoftrafficto
degradetheperformance.
•Itdownsthewebanddeniesorslowdowntheserviceof
ournetwork.
85

•DOS:Itisadenialofserviceattack,in
thisattackacomputersendsamassive
amountoftraffictoavictim’scomputer
andshutsitdown.
•Dosattackisanonlineattackthatis
usedtomakethewebsiteunavailable
foritsuserswhendoneonawebsite.
•DDoS:DDoSmeansdistributeddenial
ofserviceinthisattackdosattacksare
donefrommanydifferentlocations
(distributed)usingmanysystems.

•Ahackercreateabotnetofdevicesbyinstallingmalwareson
compromisedmachinesandcreatebotnetfarmtodoDDoS
attackuponhackersinstruction.
•Atparticulartime,thesebotsorzombiefloodthetarget
machinewithcontinue(overwhelmed)requeststhatput
serversystemtocrash.
•Zombiepc:Itisacomputerthatcarriesoutactionsunder
remotecontrol(byhacker),withouttheactualuserintending
thistohappen. 87

•Competitiveadvantageagainstrivalbusiness.
•Ransomdemandsforreleasingdata.
•ForstressTestonnetwork.
88

•Volumeattack
•Involumeattack,attackersoverflowthewebsitewithmalicious
traffic.
•ThisattackisinitiatedbyforwardingahugenumberofUDP,ICMP
and HTTP(GETandPOST)floodpackets.
•Inthisattackcontinuouslyrequestscanbeensendcalledpings.
•Volumeattacksconsumetousethebandwidthoftargetand
internetnetworks.
89

•Protocolattack
•Protocolornetwork-layerDDoSattackssendlargenumbersof
packetstotargetednetworkinfrastructuresandinfrastructure
managementtools.
•Protocolattacksmainlyutilizelayers3and4oftheprotocol
stacktomakethetargetnotbeenaccessed.Theseattacks
consumethestatecapacityofwebservers,firewallsandload
balanceretc.
•Protocolassaults,alsoknownasstate-exhaustionattacks,disrupt
servicebyconsumingtoomanyserversandnetwork
equipmentresources.
90

•Applicationlayerattack:
•Thisattackislowandslow.
•ApplicationattacksSomeofthemoresophisticatedDDoSattacks,
theseexploitweaknessesintheapplicationlayerbyopening
connectionsandinitiatingprocessandtransactionrequeststhat
consumefiniteresources.
•DDoSattacksontheapplicationlayerdonottargetnetwork
bandwidth.Rather,theseattacksfocusontheapplicationlayer7of
theOSImodelhostingtheservicethatend-usersarebrowsing.
•Theslow-ratecyberattacksareaimedatthelayerthatproduces
webpagesonthedomaincontrolleranddeliverstheminresponseto
HTTP.
48

•TrafficAnalysistodetectanyunusualtrafficonnetwork.
•Trafficcontrolbyemployloadbalancers(reroutetraffictoother
serversandpreventanyoneservertofailure)and firewalls(blocks
unwantedtraffic).
•Detectanattackearly(byfilteringthetraffic)andmitigatethe
damagebeyondthat.
•SwitchtocloudserviceproviderslikeAWSandAzure.
•Allocatemorebandwidthtopreventcloggingofdata.
49

•GoldenEye
•Slowloris
•LOIC(LowOrbitIonCannon)
•HOIC(HighOrbitIonCannon)
•THC-SSL-DoS
•HULK(httpUnbearableLoadKing)
•Pyloris
•TOR'sHammer
•XOIC
•RUDY(RUDeadYet?)
•DAVOSET
•OWASPHTTPPOST
50

•Aman-in-the-middleattack(MITMattack)isacyberattackwhere
anattackerrelaysandpossiblyalterscommunication
betweentwopartieswhobelievetheyarecommunicating
directly.Thisallowstheattackertorelaycommunication,listenin,
andevenmodifywhateachpartyissaying.
•Man-in-the-middleattacksenableeavesdroppingbetween
people,clientsandservers.
•ThiscanincludeHTTPSconnectionstowebsites,
otherSSL/TLSconnections,Wi-Finetworksconnectionsandmore
OWASPHTTPPOST
94

95

•Publicnetworks
Publicwificonnectionwithnoaccessrestrictionismostrisky.
•Onyourcomputer
Malwareonyoursystemcanmonitorsandmodifiestheinternet
connection.
•Router
Routerssuppliedbyinternetserviceprovidermayhavedefault
security(logincredential)settingsorhaveoutdatedfirmware.
•WebServer
Attackergainsaccesstothegenuinewebserveryouintendedto
communicatewith.
96

•UseaVirtualPrivateNetwork
VPN connection can mask IP address by bouncing it through a private
server.Andencryptwebdata.
•Forceencryption
Accessonly HTTPSwebsites
•Usestrongroutercredentials
Tochangedefaultsecurity credentialofrouters.
97

•Makesure yourcompanyhasasoftwareupdatepolicy
Togettheupdatedsecuritypatch.
•Adoptazero-trustsecuritymodel
Itisrequiringyourcolleaguestoauthenticatethemselveseachtime
theyconnecttoyournetwork.
•Preventcookiestealing
Donotsavecreditcarddetails toanyshoppingsitetoprotectyourself.
98

•Malvertising,or
99
maliciousadvertising,isthetermfor
advertisementswithincriminallycontrolled
connectedprograms,usuallywebbrowsers,
Internet
which
intentionallyharmpeopleandbusinesseswithallmannerof
malware,potentiallyunwantedprograms(PUPs),andassorted
scams.
•Itisagrowingproblem,asisevidencedbyarecentUS
Senate report,andtheestablishmentofbodieslikeTrustin
Ads.

100

101

•ByusingAd-blocker
•Byusingregularsoftwareupdates
•Commonsensetoavoidanyscam
102

•Adrive-bydownloadattackreferstotheunintentional
downloadofmaliciouscodetoyourcomputerormobiledevice
thatleavesyouopentoacyberattack.
•Youdon'thavetoclickonanything,pressdownload,oropena
maliciousemailattachmenttobecomeinfected.
103

61

•Hijackdevice.
Tobuildabotnet,infectotherdevices,orbreachyoursfurther.
•Spyonactivity.
Tostealyouronlinecredentials,financialinfo,oridentity.
•DamageyourData
Tosimplycausetrouble
•Disabledevice
Topersonallyharmyou. 62

•Donotclickonuntrustedlinks orvisituntrustedwebsite.
•Keepyoursystem updatedwithrecentpatches.
•Configureaproperfirewallonyoursystem.
•Useanti-malwareprogramsfromtrustedsourcesandupdate
themregularly.
•Carefullyreadandexaminesecuritypopupsontheweb
before clicking.
•Bewaryofkeepingtoomanyunnecessaryprogramsandapps.
•Useanad-blocker.
106

•Rogue(dishonest)softwareisintroducedinadevicewithan
intention tocauseharm.
•Roguesecuritysoftwareisaformofmaliciousorunwanted
softwareandinternetfraudthatmisleadsusersintobelievingthere
isavirusontheircomputerandaimstoconvincethemtopayfora
fakemalwareremovaltoolthatactuallyinstallsmalwareontheir
computer.
•Itisaformofscarewarethatmanipulatesusersthroughfear,anda
formofransomware.
•Itmisleads usersintobelievingthatthereisavirusontheir
computer andmanipulatesthemintopayingmoneyforafake
removal tool.
107

•Roguesoftwarehasbeenaserioussecuritythreatindesktop
computingsince2008.
FeaturesofRogueSoftware:
•MimicsAnti-malware(Itmimicsscan,alertofthreatslikeantivirus)
•ConstantFalseAlerts(Floodingtheirdesktopwithendlessmessages)
•RequiresExtraPayments(Asksforpaymentbygivingreportsofinfections)
•ModifiesActualSecuritySoftware(Putchokeholdonotheranti-virus
applications)
•FreezesEntireComputer(Createpop-upstogetoverwhelmedsystem)
108

109

•Bydownloadingtheprogramthroughavarietyoftechniques,
•Adsofferingfreeortrailversionsofsecurityprograms.
•PutsinfectedwebsiteasthetophitsbymanipulatingSEO
ranking.
110

•UpdatedFirewall
•Useefficientandwell-knownAntivirus
•GeneralDistrust
•Smart Clicking
111

•Cyberwarfareistheuseoftechnologytoattackanation,
causingcomparableharmtoactualwarfare,disruptionofvital
computersystemsandlossoflife.
112

Military
•Itisinthemilitary’sbestintereststogaincontrolofkey
elementsofanenemy nation’scyberspace.An
effectivecyberattackcouldbringanenemycountry’smilitaryto
itskneesandsecurewhatwouldhavebeenanotherwisecostly
victory.
Civil
•Attackingthecivilinfrastructureofanationdirectlyimpactsthe
peoplelivingandworkinginthecountry.Thiscouldbeused
toinspirefearorcausethemtorevoltagainstthegovernmentin
protest,weakeningtheopponentfromapoliticalstandpoint.113

Hacktavism
•Hacktivisminvolveshackersusingcyberattackstopromoteanideology.
Hacktivistscanengageincyberwarfarebyspreadingpropagandaor
goingaftersecretsandthenexposingthemtotherestoftheworld.Inthese
ways,hacktivistscanweakenanopponent’sstandingontheworld
stage,precludingsupportfromothercountries.
IncomeGeneration
•Cyberwarfare“soldiers”canengageinthesekindsofattacksfortheir
ownfinancialbenefit.Iftheyareemployedbythegovernment,theycan
earnafeefortheirservices.Further,theycouldbreakthedefensesofa
financialinstitutionandstealmoneyforthemselves.
79

NonprofitResearch
•Nonprofitresearchoftenrevealsveryvaluableinformation
thatacountrycanusetosolveacriticalproblem.
•Forexample,ifacountryistryingtodevelopavaccineand
anotheronealreadyhasit,cyberwarfarecouldbeusedto
stealinformationpertainingtotheirsolution.
115

•Itiscrimesofterrorismwhichoccurelectrically.
•CyberTerrorismisbasicallytheprocessofcausingharmtothecommunity
bymakinguseofInternetnetworkstoconductviolentincidentslikelossof
lifeordata,toachievesomepoliticaladvantagebygivingthreats.
•Acyberterrorismattackismuchmoreharmfulthananormalcybercrime
becausetointentionalharmtothevictimsanditmaynotcausefinancial
damagetocausefearinsociety.
•Inmostcases,thecriminalstargetthebankingindustry,militarypower,
nuclearpowerplants,airtrafficcontrol,andwatercontrolsectorsfor
makingacyberterrorismattackforcreatingfear,criticalinfrastructure
failure,orforpoliticaladvantage.
116

Cyber Espionage
•Cyber espionage (cyberespionage) is a type of cyber attack that malicious hackers carry
out against a business or government entity.
•The goal of cyber espionage, also referred to as cyber spying, is to provide attackers
with information that gives them advantages over rival companies or governments.
•Cyberspiestry to gain access to the following resources:
1.Data and activities related to research and development
2.IP related to academic research, such as product specifications or designs
3.Salaries, compensation structures, and other sensitive financial and operational data of
the organization
4.Lists of clients or customers and payment methods
5.Corporate objectives, strategic plans, and marketing strategies
6.Strategies, allegiances, and communications in politics
7.Military information

Difference between Cyberwarand
Cyberespionage
•The terms cyber espionage and cyberwarfareare similar, but they are not the same.
•The biggest difference is that the primary goal of a cyberwarfareattack is to disrupt the
activities of a nation-state, while the primary goal of a cyber espionage attack is for the
attacker to remain hidden for as long as possible in order to gather maximum
intelligence.
•Even though cyber espionage and cyberwarfareare two distinct concepts, they are often
used together.
•For example, cyber espionage can be used to build intelligence that will help a nation-
state prepare for a physical or cyberwar.

Need for a Comprehensive Cyber Security Policy:
RationaleforaComprehensiveCyberSecurityPolicy:
Theincreasingfrequencyandsophisticationofcyberattackshighlightthecriticalneedfor
organizationstoestablishcomprehensivecybersecuritypolicies.
Acomprehensivepolicyensuresthatallaspectsofanorganization'sdigitalenvironmentare
adequatelyprotected,fromnetworksandsystemstodataandpersonnel.
Ithelpsmitigaterisks,maintainoperationalcontinuity,safeguardcustomertrust,andcomply
withregulatoryrequirements.

Elements of an Effective Cyber Security Policy:
ThreatAssessmentandRiskManagement:
Organizationsmustconductthoroughassessmentstoidentifypotentialcyberthreatsandvulnerabilities.
Riskmanagementinvolvesevaluatingtheimpactandlikelihoodofthreatsanddecidinghowtomitigate,
transfer,oracceptthoserisks.
Thiselementhelpsorganizationsallocateresourceseffectivelyandprioritizesecuritymeasures.
IncidentResponseandRecoveryPlans:
Incidentresponseplansoutlinethestepsanorganizationshouldtakeintheeventofacyberincident,such
asadatabreachorcyberattack.
Theseplansdetailrolesandresponsibilities,communicationstrategies,containmentprocedures,and
recoveryprocesses.
Havingawell-definedplanminimizesdamage,reducesdowntime,andhelpsanorganizationresume
normaloperationsswiftly.

Elements of an Effective Cyber Security Policy:
EmployeeTrainingandAwareness:
Employeesareoftenthefirstlineofdefenseagainstcyberthreats,buttheycanalsobevulnerabilitiesif
unawareofbestpractices.
Comprehensivepoliciesemphasizeongoingemployeetrainingandawarenessprogramstoeducatestaff
aboutsecurityrisks,phishing,safebrowsing,andsocialengineering.
Educatedemployeescontributetoastrongsecuritycultureandpreventunintentionalsecuritybreaches.
CollaborationwithLawEnforcement:.
Incasesofcybercrimesorseriousincidents,collaborationwithlawenforcementagenciesiscrucial.
Comprehensivepoliciesestablishprotocolsforworkingwithlawenforcementtogatherevidence,
prosecutecybercriminals,andrecoverstolenassets.
Suchcollaborationenhancesthelikelihoodofsuccessfulcybercrimeinvestigationsandconvictions.

Case Studies:
TheImpactofComprehensivePolicies:
Real-worldexamplesoforganizationsthathavesuccessfullyimplementedcomprehensivecyber
securitypoliciescanhighlightthebenefits.
Youcoulddiscussinstanceswherepoliciesledtoeffectivethreatdetection,timelyincident
response,andminimizeddamage.
Casestudiescanalsodemonstratethefinancialandreputationalrepercussionsoflackinga
comprehensivepolicy.

Need for an International Convention on Cyberspace:
TheGlobalNatureofCyberspace:
Cyberspacetranscendsgeographicalboundariesandconnectspeople,organizations,and
governmentsworldwide.
Digitalinteractionsoccuracrossjurisdictions,makingitchallengingtoaddresscyberthreats
solelythroughnationalregulations.
Theinterconnectednatureoftheinternetunderscorestheneedforinternationalcooperation
toensuresecurityandstability.
ChallengesinRegulatingCyberspaceInternationally:
Nationallawsandregulationsoftenstruggletoaddresscyberthreatsthatoriginateortraverse
multiplecountries.
Attributionofcyberattackscanbecomplexduetotheuseofanonymizingtechnologiesandtacticsthat
maskthetrueoriginsofattacks.
Disparitiesinlegalsystems,culturalnorms,andpoliticalinterestsamongnationshinderuniform
enforcementofcyberregulations.

Need for an International Convention on Cyberspace:
BenefitsofanInternationalConvention:
Aninternationalconventiononcyberspacewouldprovideastandardizedframeworkforaddressingcyber
threatsonaglobalscale.
Itwouldfacilitatecollaborationamongnations,leadingtoconsistentregulations,cooperativecybercrime
investigations,andsharedthreatintelligence.
Aconventioncouldenhancethepredictabilityofinternationalresponsestocyberincidentsandpromote
stabilityincyberspace.
EffortsandInitiativestowardsInternationalCybersecurityCooperation:
Variousinternationalorganizations,suchastheUnitedNations,haveinitiateddiscussionsoncyberspace
regulationsandnorms.
TheBudapestConventiononCybercrime,adoptedbytheCouncilofEurope,aimstoharmonizelawsand
facilitateinternationalcooperationincombatingcybercrime.
InitiativesliketheGlobalForumonCyberExpertise(GFCE)andtheParisCallforTrustandSecurityin
Cyberspacedemonstrateeffortstobuildconsensusamonggovernments,industry,andcivilsociety.