Unit 1.pdf cybers laws and security auditing

sarthakchauhan2277 30 views 48 slides Aug 30, 2024
Slide 1
Slide 1 of 48
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48

About This Presentation

Introduction to
Cybercrime


Slide Content

CSE459
CYBER LAW AND SECURITY
AUDITING
Unit 1

Introduction to
Cybercrime

Cybercrime
Cybercrime refers to illegal actions using computers or the internet. Some
examples of cybercrime include:
•Stealing and selling corporate data
•Demanding payment to prevent an attack
•Installing viruses on a targeted computer
•Hacking into government or corporate computers

Cybercrime
•Any offenses committed against individuals or groups of individuals to harm
the reputation or cause physical or mental trauma through electronic means
can be defined as Cybercrime.
•Electronic means can include but are not limited to, the use of modern
telecommunication networks such as the Internet (networks including chat
rooms, emails, notice boards and groups) and mobile phones
(Bluetooth/SMS/MMS).

In which type of cybercrime does an
attacker gain unauthorized access to
personal or corporate networks to
steal sensitive information?
A) Identity Theft
B) Hacking
C) Phishing
D) Cyberstalking

Origins of Cybercrime
The telegraph system
•In 1834, two thieves infiltrated the French telegraph system, gained access to financial
markets, and stole data. Many experts consider this event the first cybercrime,
followed by other cybercrimes, each focusing on newly invented technologies.
The telephone system
•The 19th and 20th centuries saw attacks focused on the telephone system. In 1876,
Alexander Graham Bell patented the phone, which allowed transmitting speech using
telegraphy. Two years after the commercialization of this invention, teenage boys
broke into Bell’s telephone company and misdirected calls. In later years (1960s-
1980s), phone hacking (phreaking) became popular.

Origins of Cybercrime
Ethical hacking
In 1940, Rene Carmille, a French computer expert, hacked into the Nazi data registry.
Carmille, a punch card computer expert, used his expertise to reprogram Nazi punch card
machines to prevent them from registering information correctly. His work blocked the Nazis’
attempts to register and track Jewish people.
Phishing scams and malware
In the 1980s, emails became a popular communication form, and by the 1990s, web browsers
and computer viruses rose in popularity. In these years, hackers started using email attachments
to deliver malware and phishing scams and web browsers to spread computer viruses.

Origins of
Cybercrime
1962
The modern history of cybercrime began when Allen
Scherr launched a cyber attack against the MIT
computer networks, stealing passwords from their
database via punch card.
1971
The first computer virus was created for research
purposes by Bob Thomas at BBN technologies.
Referred to as the Creeper Virus, the self-replicating
program was detected on the ARPANET in 1971 and
foretold the potential of future viruses to cause
significant damage to computer systems.

Origins of
Cybercrime
1988
The first major cyber attack on the internet came courtesy of
Cornell grad student Robert Morris. The “Morris Worm” struck in
the year before the World Wide Web debuted, back when the
internet was primarily the domain of academic researchers. It
infected computer systems at Stanford, Princeton, Johns Hopkins,
NASA, Lawrence Livermore Labs, and UC Berkeley, among
other institutions.
1989
Ransomware made its first appearance. This first strain of
ransomware —the AIDS Trojan —was easy to remove,
rendering it ineffective. Unlike the ransomware of today, this one
appeared on floppy disks, with the cybercriminal handing out
20,000 infected disks to attendees of the World Health
Organization’s AIDS conference.

Origins of
Cybercrime
1994
DatastreamCowboy and Kuji—a 16-year-old
British schoolboy and his accomplice —used a
“password sniffer” program to launch a series of
attacks that crippled the Air Force’s Rome
Laboratory, while stealing research data used as
attack instructions for warplanes in battle.
1995
Vladimir Levin was the first known hacker to
attempt to rob a bank. He hacked into Citibank’s
network and conducted many fraudulent
transactions.

•https://konbriefing.com/en-
topics/cyber-
attacks.html#month2024-07

Which of the following represents a
type of cybercrime where criminals
use malicious software to demand
payment from victims?
A) Phishing
B) Ransomware
C) Identity Theft
D) Denial of Service (DoS)

Cybercriminals
•Cybercriminals are hackers and
other malicious users that use the
Internet to commit crimes such as
identity theft, spamming, phishing
and other types of fraud.
Cybercriminals often work together
forming cyber gangs.

Classifications
of
Cybercrimes
Crime against the Individuals: Crimes that are committed by
the cyber criminals against an individual or a person. A few
cyber crimes against individuals are:
•Harassment via electronic mails.
•Dissemination of obscene material.
•Cyber-stalking.
•Defamation.
•Indecent exposure.
•Cheating.
•Unauthorized control/access over computer system.
•Email spoofing.
•Fraud

Classifications of
Cybercrimes
Crimes against Property: These types of crimes includes vandalism
of computers, Intellectual (Copyright, patented, trademark etc)
Property Crimes, Online threatening etc. Intellectual property crime
includes:
•Computer vandalism.
•Transmitting virus.
•Net-trespass.
•Unauthorized access / control over computer system.
•Internet thefts.
•Intellectual Property crimes- Software piracy, Copyright
infringement, Trademark infringement.

Classifications
of
Cybercrimes
Crime against Organization: Crimes done to threaten the
international governments or any organization by using
internet facilities. These cyber crimes are known as
cybercrimes against Organization. These crimes are
committed to spread terror among people. Cyber terrorism is
referred as crimes against a government. Cybercrimes against
Government includes cyber attack on the government website,
military website or cyber terrorism etc.
•Unauthorized access / control over computer system.
•Cyber terrorism against the government organization.
•Possession of unauthorized information.
•Distribution of Pirate software.

Classifications of Cybercrimes
Crime against Society: Those cybercrimes which affects the society interest at large are
known as cyber crimes against society, which include:
•Child pornography.
•Indecent exposure of polluting the youth financial crimes.
•Sale of illegal articles.
•Trafficking.
•Forgery.
•Online gambling

Common Types of Cybercrimes
1.Hacking: Unauthorized access to computer systems, often to steal, alter, or destroy data.
2.Identity Theft: Stealing personal information to commit fraud, such as financial theft or accessing confidential
information.
3.Phishing: Fraudulent attempts to obtain sensitive information by disguising oneself as a trustworthy entity via
email, messages, etc.
4.Malware Distribution: Creating and spreading malicious software like viruses, worms, or ransomware to damage
or disrupt systems.
5.Cyberstalking: Using the internet to harass or stalk individuals.
6.Online Fraud: Scams and fraudulent activities conducted online, including credit card fraud and auction fraud.
7.Child Exploitation: Distribution, possession, or production of child pornography or exploitation materials.
8.Cyberterrorism: Use of the internet to conduct terrorist activities, including attacks on critical infrastructure.
9.Data Breach: Unauthorized access and disclosure of sensitive, protected, or confidential data.

Which term describes the use of
malicious software to collect
keystrokes and capture sensitive
information?
A) Malware
B) Keylogging
C) Spoofing
D) Worms

Information
Technology
Act, 2000 as
amended in
2008

Cyber Crime Brief Description
Relevant Section in IT
Act Punishments
Cyber Stalking
Stealthily following a
person, tracking their
internet chats 43, 65, 66
3 years, or with fine up to
2 lakh
Cyber Pornography
including child
pornography
Publishing obscene
material in electronic form
involving children 67, 67A, 67B
10 years and fine up to 10
lakh
Intellectual Property
Crimes
Source code tampering,
piracy, copyright
infringement, etc. 65
3 years, or with fine up to
2 lakh
Cyber Terrorism
Protection against cyber
terrorism 66F, 69
Imprisonment for a term,
may extend to life
Cyber Hacking
Destruction, deletion,
alteration, etc. in a
computer resource 66
3 years, or with fine up to
5 lakh
Phishing
Bank financial frauds in
electronic banking 43, 65, 66
3 years, or with fine up to
2 lakh

Cyber-crimes
prevention
1.Use Strong Passwords: Create complex passwords with a mix
of letters, numbers, and special characters. Avoid using easily
guessable information such as birthdays or common words.
2.Enable Two-Factor Authentication (2FA): Use 2FA for an
extra layer of security. This typically involves receiving a code
on your phone in addition to entering your password.
3.Update Software Regularly: Ensure all software, including
operating systems and antivirus programs, are updated to
protect against vulnerabilities.
4.Educate Employees and Users: Conduct regular training
sessions on recognizing and avoiding cyber threats.
5.Secure Networks: Use firewalls, encryption, and secure Wi-Fi
connections to protect data and communications.
6.Backup Data: Regularly backup important data to an offline or
cloud storage service to recover information in case of a cyber
attack.
7.Monitor Systems: Use intrusion detection systems and
regularly monitor network traffic for suspicious activities.

Phishing
•Phishing is a type of cybercrime where attackers impersonate legitimate organizations or
individuals via email, messaging, or websites to steal sensitive information such as
usernames, passwords, and credit card details.
•How to Prevent Phishing:
•Verify Emails and Links: Check the sender's email address and hover over links to
verify their legitimacy before clicking.
•Educate Users: Provide training on how to recognize phishing attempts, such as
suspicious emails or unexpected requests for personal information.
•Use Anti-Phishing Tools: Employ browser extensions and email filters that detect
and block phishing attempts.
•Report Phishing: Encourage reporting of phishing attempts to IT departments or
appropriate authorities.

Identity Theft
Identity Theft involves stealing someone's personal information to commit fraud, such as
opening bank accounts, applying for loans, or making unauthorized purchases.
How to Prevent Identity Theft:
•Secure Personal Information: Keep sensitive documents in a safe place and shred any that are no longer
needed.
•Monitor Financial Statements: Regularly check bank and credit card statements for unauthorized transactions.
•Use Secure Websites: Ensure websites are secure (look for "https" in the URL) before entering personal
information.
•Be Cautious with Sharing Information: Avoid sharing personal details on social media and over unsecured
channels.
•Use Identity Theft Protection Services: Consider using services that monitor for signs of identity theft and offer
recovery assistance.

The Colonial Pipeline Ransomware
Attack
•Incident Overview
•In May 2021, the Colonial Pipeline, a major fuel pipeline in the United States, fell
victim to a ransomware attack by the cybercriminal group known as DarkSide.
The attack led to significant disruptions in fuel supply along the East Coast of the
United States, causing widespread panic and fuel shortages.
•How the Attack Happened
1.Initial Access: The attackers gained access to the Colonial Pipeline network
through a compromised VPN account. The account's password had been leaked in
a previous data breach and was not protected by multi-factor authentication
(MFA).
2.Ransomware Deployment: Once inside the network, the attackers deployed
ransomware, which encrypted data and locked Colonial Pipeline out of its
systems.
3.Demand for Ransom: The attackers demanded a ransom payment in
cryptocurrency to provide the decryption key needed to restore access to the
affected systems.

The Colonial Pipeline
Ransomware Attack
•Consequences
•Operational Disruption: The pipeline, responsible for
transporting nearly half of the East Coast's fuel supply, was
shut down for several days, causing fuel shortages and price
increases.
•Ransom Payment: Colonial Pipeline paid the attackers
approximately $4.4 million in cryptocurrency to receive the
decryption key.
•Government Response: The attack prompted the U.S.
government to issue emergency declarations and work with
private sector partners to restore fuel supply.

The Colonial Pipeline Ransomware Attack
•Implement Multi-Factor Authentication (MFA): Ensuring all accounts, especially those with access to
critical infrastructure, are protected by MFA to add an extra layer of security.
•Regularly Update and Patch Systems: Keeping software and systems up to date with the latest security
patches to prevent exploitation of known vulnerabilities.
•Network Segmentation: Segregating critical systems from other parts of the network to limit the spread
of malware and reduce the impact of a breach.
•Employee Training and Awareness: Conducting regular training sessions to educate employees about
cybersecurity best practices and how to recognize phishing attempts and other common attack vectors.
•Incident Response Plan: Developing and regularly updating an incident response plan to ensure a swift
and coordinated response to cyber incidents.
•Backup Data: Regularly backing up critical data and ensuring backups are stored offline and tested for
integrity. This can facilitate recovery without paying ransom.
•Threat Intelligence and Monitoring: Utilizing threat intelligence services to stay informed about
emerging threats and employing continuous monitoring to detect suspicious activity early.

Cyber Offenses

How criminals plan the attacks
•Reconnaissance
•Objective: Gather information about the target.
•Passive Reconnaissance: Collect data without interacting with the target. This includes
searching public records, social media, websites, and using tools like WHOIS to find
domain registration information.
•Active Reconnaissance: Involves interacting with the target system to gather more
detailed information. This can include network scanning, port scanning, and banner
grabbing to identify open ports, services running, and potential vulnerabilities.

How criminals plan
the attacks
•Scanning and Enumeration
•Objective: Identify potential entry points.
•Network Scanning: Use tools like Nmap to identify live
hosts, open ports, and services on the target network.
•Vulnerability Scanning: Use tools like Nessus or
OpenVAS to find known vulnerabilities in the target
systems.
•Enumeration: Gather detailed information about user
accounts, network shares, and other resources that could
be exploited.

How criminals plan
the attacks
•Gaining Access
•Objective: Exploit vulnerabilities to gain unauthorized access.
•Phishing: Send emails or messages that trick users into
revealing credentials or installing malware.
•Exploitation Tools: Use exploit kits or custom exploits to take
advantage of vulnerabilities found during scanning.
•Brute Force Attacks: Attempt to gain access by systematically
trying all possible combinations of passwords or encryption
keys.

How criminals plan
the attacks
•Maintaining Access
•Objective: Ensure continued access to the compromised
system.
•Backdoors: Install backdoor programs to allow re-entry
even if the initial vulnerability is patched.
•Rootkits: Install rootkits to hide the presence of the
attacker and maintain control over the system.
•Credential Theft: Steal credentials to gain access to
other systems or escalate privileges within the network.

How criminals plan
the attacks
•Covering Tracks
•Objective: Avoid detection and protect their presence.
•Log Manipulation: Alter or delete log files to remove
evidence of the attack.
•File Manipulation: Change file timestamps and use
encryption to hide the existence of malware.
•Network Tunneling: Use encrypted tunnels (e.g., VPN,
SSH) to hide their network activity from intrusion
detection systems.

How criminals plan
the attacks
•Exfiltration
•Objective: Steal valuable data without detection.
•Data Compression and Encryption: Compress and encrypt
data to make it harder to detect and easier to transfer.
•Stealth Data Transfer: Use techniques like steganography
(hiding data within images or other files) or covert channels
(using non-standard communication methods) to exfiltrate data.
•Cloud Services: Upload data to cloud storage services to avoid
detection by traditional network security measures.

How criminals plan
the attacks
•Monetization
•Objective: Convert stolen data or access into profit.
•Ransomware: Encrypt the victim’s data and demand a
ransom for the decryption key.
•Selling Data: Sell stolen data on the dark web, including
personal information, financial data, and intellectual
property.
•Bank Fraud: Use stolen credentials to transfer funds,
make purchases, or commit other types of financial
fraud.

Social
Engineering
•Social engineering is a tactic used by
cybercriminals to manipulate individuals
into divulging confidential information or
performing actions that compromise
security. Unlike traditional hacking
methods that focus on exploiting technical
vulnerabilities, social engineering exploits
human psychology to achieve its
objectives.

Social Engineering
•Phishing
•Description: Sending deceptive emails or messages that appear to come from a trustworthy source to trick
recipients into revealing personal information, such as login credentials or financial details.
•Example: An email claiming to be from a bank, asking the recipient to verify their account by clicking a
link and entering their credentials.
•Spear Phishing
•Description: A more targeted form of phishing, where attackers customize the message for a specific
individual or organization to increase the likelihood of success.
•Example: An email addressed to a company executive, using personal details to appear legitimate and
requesting a wire transfer.

Social
Engineering
Pretexting
Description: Creating a fabricated scenario (pretext) to obtain
information or perform an action.
Example: An attacker pretends to be an IT support technician and asks
an employee to provide their login details to resolve a non-existent
issue.
Baiting
Description: Offering something enticing to lure victims into a trap that
compromises their security.
Example: Leaving infected USB drives in public places with labels like
"Confidential" or "Salary Information." When someone plugs the USB
into their computer, malware is installed.

Social
Engineering
Quid Pro Quo
Description: Offering a service or benefit in exchange for information or
access.
Example: An attacker calls employees, pretending to be from tech support,
and offers to fix their computer issues in exchange for their login credentials.
Tailgating
Description: Gaining physical access to restricted areas by following
authorized personnel.
Example: An attacker follows an employee through a secure door by
pretending to have forgotten their access card.
Vishing (Voice Phishing)
Description: Using phone calls to deceive individuals into providing
confidential information.
Example: An attacker calls a victim, posing as a bank representative, and asks
for their credit card details to resolve a fake issue.

Cyber stalking
•Cyber stalking is the repeated and malicious use of
electronic communications to harass, intimidate, or
threaten an individual. This can include:
•Sending threatening or obscene messages
•Monitoring or tracking online activities
•Posting false or damaging information
•Impersonating the victim online
•Using spyware or other malicious software

Cyber
stalking and
cybercafe
Anonymous Access: Users can access the internet
anonymously, which can make it easier for
cyberstalkers to operate without being
immediately identified.
Shared Devices: Public computers can have
multiple users, increasing the risk of malicious
activities or monitoring software being installed
without proper detection.
Data Privacy: Personal data entered during
cybercafe use (e.g., login credentials, personal
details) can be at risk if not properly protected.

WannaCry Ransomware
•WannaCry is a well-known ransomware attack that occurred in May 2017. Here are key details
about it:
•Nature of Attack:
•WannaCry encrypted files on infected computers and demanded ransom payments in Bitcoin
to decrypt the files.
•Exploitation Method:
•It exploited a vulnerability in Microsoft Windows known as EternalBlue, which was a part of a
leaked set of hacking tools attributed to the NSA (National Security Agency).
•Impact:
•The ransomware spread rapidly across the globe, affecting hundreds of thousands of
computers in over 150 countries. It disrupted various services, including healthcare,
government agencies, and businesses.

WannaCry
Ransomware
•Propagation:
•WannaCry used a worm-like capability to spread
within networks, making it particularly
dangerous for organizations with unpatched
systems.
•Response:
•A security researcher named Marcus Hutchins
discovered a kill switch in the ransomware,
which helped to slow down its spread. The kill
switch involved the ransomware checking for
the presence of a specific unregistered domain
before continuing its attack. Hutchins found that
this domain was not registered, and he quickly
bought it, stopping further infections.

Thank you
Tags