• re-action
1 2
Terms used:
• Information security is securing information
Computer Security from unauthorized access, modification &
deletion
Computer security is the protection of computer systems
• Computer Security means securing a standalone
and information from harm, theft, and unauthorized use.
It is the process of preventing and detecting unauthorized machine by keeping it updated and patched
use of your computer system. • Cybersecurity is defined as protecting computer
systems, which communicate over the
computer networks
3 4
1
Components of computer The CIA Triad
system
• Hardware, the physical part of the computer,
like the system memory and disk drive
• Firmware, permanent software that is etched
into a hardware device’s nonvolatile memory
and is mostly invisible to the user
• Software, the programming that offers services,
like operating system, word processor, internet
browser to the user
5 6
7 8
2
Basic Network Attacks
Integrity
• Malware – It is the malicious software which is
• Integrity is the unauthorised writing or specifically designed to disrupt, damage, or gain
modification of information. authorized access to a computer system. Much of
• Integrity means that there is an external the malware out there today is self-replicating:
consistency in the system - everything is as once it infects one host, from that host it seeks
it is expected to be. entry into other hosts over the Internet, and from
• Data integrity means that the data stored on the newly infected hosts, it seeks entry into yet
a computer is the same as the source more hosts. In this manner, self-replicating
documents. malware can spread exponentially fast.
9 10
3
Keylogger: Also known as a keystroke logger, DoS (Denial of Service) – A DoS attack renders a
keyloggers can track the real-time activity of a user network, host, or other pieces of infrastructure unusable
on his computer. It keeps a record of all the by legitimate users. Most Internet DoS attacks fall into
keystrokes made by user keyboard. Keylogger is also one of three categories :
a very powerful threat to steal people’s login • Vulnerability attack: This involves sending a few well-
credential such as username and password. crafted messages to a vulnerable application or operating
system running on a targeted host. If the right sequence of
packets is sent to a vulnerable application or operating
system, the service can stop or, worse, the host can crash.
• Bandwidth flooding: The attacker sends a deluge of
packets to the targeted host—so many packets that the
target’s access link becomes clogged, preventing
legitimate packets from reaching the server.
13
4
Packet sniffer – A passive receiver that records • IP Spoofing – IP spoofing refers to
a copy of every packet that flies by is called a connection hijacking through a fake Internet
packet sniffer. By placing a passive receiver in Protocol (IP) address. IP spoofing is the
the vicinity of the wireless transmitter, that action of masking a computer IP address so
receiver can obtain a copy of every packet that that it looks like it is authentic. During this
is transmitted! These packets can contain all masking process, the fake IP address sends
kinds of sensitive information, including the message coupled with an IP address that
passwords, social security numbers, trade appears to be authentic and trusted
secrets, and private personal messages. some of
the best defenses against packet sniffing
involve cryptography.
18
5
• Phishing – Phishing is a form of fraud in Computer Security Practices
which an attacker act as a genuine entity or
Some preventive steps you can take include:
person in email or other communication
channels. The attacker uses phishing emails • Secure your computer physically by:
to distribute malicious links or attachments – Installing reliable, reputable security and anti-virus
that can perform a variety of functions, software
including the access of login credentials, – Activating your firewall, because a firewall acts as
a security guard between the internet and your
account information, credit card information
local area network
from victims.
• Stay up-to-date on the latest software and news
surrounding your devices and perform
software updates as soon as they become
21
available 22
• Avoid clicking on email attachments unless you 6 Indian Websites That Have Recently
know the source Been Taken Down By Hackers
• Change passwords regularly, using a unique Telecom Regulatory Authority of India
combination of numbers, letters and case types (TRAI): Indian Telecom regulator TRAI's
• Use the internet with caution and ignore pop-ups, website was hacked soon after it released
drive-by downloads while surfing millions of email IDs which were used to send
the response to a consultation paper. Famous
• Perform daily full system scans and create a
hacker group Anonymus' India wing was
periodic system backup schedule to ensure your
behind this and they claimed the responsibility
data is retrievable should something happen to
on twitter as well.
your computer.
23 24
6
Indian Army: In April 2015, the army's Indian Space Research Organisation
Principal Comptroller of Defence Accounts (ISRO): Indian Space Research
Officers (PCDAO) website was reportedly Organization's marketing arm Antrix saw its
hacked in April 2015. It has personal and website hacked in July 2015. Users were
financial information of army personnel. redirected to a buying portal while trying to
Many officers were unable to access their access the website. Later on, there was a 404
salary information. error on the web page.
University website hacks: JNU's library • Kerala Government website: Pakistani
website was compromised to warn the 'anti- hackers took down the Kerala government
nationals' and 'Traitors'. The official website website and replaced its page with "Pakistan
of Orissa University of Agriculture and Zindabad" and "Security is just an illusion".
Technology (OUAT) was also hacked Hackers also displayed their names and
25
said, "We are an army of Pakistani hackers".
7
It’s a Business Marketplace for Stolen Data
• Several companies specialize in finding and • Single credit card number: $4-15
selling exploits • Single card with magnetic track data: $12-30
– ReVuln, Vupen, Netragard, Exodus Intelligence • “Fullz”: $25-40
– The average flaw sells for $35-160K
– Full name, address, phone, email addresses (with
– $100K+ annual subscription fees passwords), date of birth, SSN, bank account
• Nation-state buyers and routing numbers, online banking credentials,
– “Israel, Britain, Russia, India and Brazil are some credit cards with magnetic track data and PINs
of the biggest spenders. North Korea is in the • Online credentials for a bank account with
market, as are some Middle Eastern intelligence $70-150K balance: under $300
services. Countries in the Asian Pacific, including
Malaysia and Singapore, are buying, too” slide 29 slide 30