Unit 3 | Cyber Security Notes | AKTU Notes


TOOLS AND METHODS USED IN CYBERCRIME

Unit 3 | Cyber Security Notes | AKTU Notes


    Proxy Servers

    - A proxy server acts like a middleman between your computer and the internet. 
    - When you visit a website, your request first goes to the proxy server, and then the proxy sends the request to the website. 
    - It helps in:
      - Hiding your identity: The website sees the proxy's details, not yours. 
      - Blocking or filtering content: Schools or offices may use it to block certain websites. 
      - Improving speed: It can save copies of websites, so they load faster. 


    Anonymizers

    - Anonymizers are tools that help you stay anonymous on the internet. 
    - They hide your real identity (like your IP address) and make it hard for websites or hackers to know who or where you are. 
    - Example: When you use an anonymizer, it's like wearing a mask online—it protects your privacy and prevents tracking. 

    Both of these tools are often used to increase privacy and security online.

    Phishing

    - Phishing is a trick used by online criminals to steal personal information like usernames, passwords, or bank details. 
    - They pretend to be someone trustworthy, like your bank or a famous company, and send fake emails, messages, or links. 
    - Example: You might get an email that looks like it’s from your bank, asking you to click a link and enter your account details. But the email is fake, and your information goes to the criminal. 


    Password Cracking

    - Password cracking is the process of breaking into someone’s account by figuring out or guessing their password. 
    - Hackers use special tools or programs to try thousands or millions of passwords until they find the right one. 
    - Weak passwords (like "123456" or "password") are easy to crack, so it's important to use strong passwords with a mix of letters, numbers, and symbols. 

    Keyloggers

    - A keylogger is a type of software or device used to secretly record everything you type on your keyboard. 
    - Purpose:
      - Hackers use keyloggers to steal sensitive information like passwords, credit card numbers, or personal messages. 
    - Types of Keyloggers:
      - Software-based keyloggers: These are programs installed on your computer without your knowledge. 
      - Hardware-based keyloggers: These are physical devices connected to your keyboard to record what you type. 
    - Example: If a keylogger is installed on your computer, it can record your bank login details when you type them and send this information to the hacker. 
    - Prevention:
      - Use updated antivirus software. 
      - Be careful about what you download or click online. 


    Spywares

    - Spyware is a type of malicious software (malware) designed to secretly gather information about you and your activities without your permission. 
    - What Spyware Does:  
      - Tracks your online activities (e.g., which websites you visit). 
      - Steals personal information like login details, financial data, or browsing history. 
      - Sometimes even controls your device’s camera or microphone. 
    - Types of Spyware:  
      - Adware: Shows unwanted ads and collects data about your online behavior. 
      - Tracking cookies: Tracks your browsing habits. 
      - Trojans: Pretends to be harmless but spies on you once installed. 
    - Example: A spyware program may collect your search history and sell it to advertisers or steal your bank account information. 
    - Prevention:  
      - Avoid downloading apps or software from untrusted sources. 
      - Keep your devices updated and use good security software. 


    Virus

    - A virus is a type of malicious program designed to harm or damage a computer. 
    - How it works:  
      - It attaches itself to another program or file (like a document, software, or email). 
      - When the infected file is opened, the virus spreads to other files or programs on the same computer. 
      - It can also spread to other computers when infected files are shared. 
    - Effects of a Virus:  
      - Slows down your computer. 
      - Deletes or corrupts files. 
      - Steals or destroys data. 
      - Crashes the system. 
    - Example: A virus could infect a USB drive. When the USB is plugged into another computer, it spreads to that computer. 
    - Prevention:
      - Install antivirus software. 
      - Avoid opening unknown email attachments or downloading files from untrusted websites. 
      - Keep your system and software updated. 


    Worms

    - A worm is also a type of malicious program, but it is different from a virus in how it spreads. 
    - How it works:
      - A worm doesn’t need to attach itself to a file or program to spread. 
      - It replicates itself automatically and spreads through networks, emails, or the internet. 
    - Effects of a Worm:
      - Overloads computer networks by creating copies of itself, causing slow internet speeds. 
      - Consumes storage and processing power, making computers slow or unresponsive. 
      - Sometimes carries harmful code to steal or damage data. 
    - Example: A worm could send itself as an email attachment to all your contacts. When someone opens the attachment, it spreads to their computer and continues the cycle. 
    - Prevention:
      - Use a firewall to block unauthorized network access. 
      - Avoid clicking on suspicious email links or attachments. 
      - Use antivirus software with network protection features. 
     

    Difference between Virus and Worm

    Feature Virus Worm
    Spreading Needs a host file or program. Spreads on its own without a host.
    How it spreads Through file sharing or opening infected files. Through networks and emails automatically.
    Damage Can damage files and programs directly. Mainly affects network performance but may carry harmful payloads.


    Trojan Horses

    - A Trojan horse, or simply Trojan, is a type of malicious program that tricks users by pretending to be something useful or harmless. 
    - How it works:
      - A Trojan might look like a game, an email attachment, or free software. 
      - When you run or install it, the Trojan performs harmful actions like stealing your data, damaging your system, or spying on you. 
    - Example: You download a "free antivirus" program, but instead, it secretly steals your personal files. 
    - Difference from a Virus: Unlike a virus, a Trojan does not spread by itself. It relies on users to download and install it. 
    - Prevention:
      - Avoid downloading files or software from untrusted sources. 
      - Use updated antivirus software to scan files. 


    Backdoors

    - A backdoor is a hidden way to access a computer system or network without going through normal security checks. 
    - How it works:
      - Hackers install backdoors on a system to control it remotely without the owner knowing. 
      - They often use backdoors to steal data, install other malware, or spy on users. 
    - How Backdoors Are Created:
      - Hackers can install backdoors using Trojans, worms, or other malware. 
      - Sometimes, software developers create backdoors on purpose for testing but forget to remove them, which hackers exploit. 
    - Example: A hacker could use a backdoor to access your computer and take your private files without needing your password. 
    - Prevention:
      - Use firewalls and regularly scan your system with security tools. 
      - Keep your operating system and software up to date. 


    Steganography

    - Steganography is the practice of hiding secret information inside regular files, like images, videos, or text. 
    - How it works:
      - Instead of encrypting the message (like in cryptography), the message is hidden so no one knows it exists. 
      - For example, a hacker might hide a secret message or malicious code inside an image. The image looks normal to everyone else. 
    - Uses of Steganography:  
      - Positive uses: Protecting sensitive information or sending confidential messages. 
      - Negative uses: Hiding harmful code or illegal activities. 
    - Example: A seemingly normal photo shared online could secretly contain instructions for hackers. 
    - Prevention:
      - Use tools to detect hidden information in suspicious files. 
      - Avoid downloading files from untrusted sources. 

    DoS (Denial of Service) Attack

    - A DoS (Denial of Service) attack is a type of cyberattack where hackers overload a website, server, or network with too many requests. 
    - How it works:
      - The server gets so many fake requests that it can’t handle them all. 
      - As a result, it becomes too slow or crashes, making it unavailable to real users. 
    - Purpose:
      - To disrupt the normal functioning of a website or online service. 
      - Often used to harm businesses or individuals by taking their website offline. 
    - Example: Imagine if thousands of people tried to enter a small shop at the same time. The shop would get overcrowded, and no one would be able to buy anything. That’s similar to how a DoS attack works. 
    - Prevention:  
      - Use firewalls and intrusion detection systems to block excessive requests. 
      - Ensure the server can handle a large amount of traffic. 


    DDoS (Distributed Denial of Service) Attack

    - A DDoS (Distributed Denial of Service) attack is a more powerful version of a DoS attack. 
    - How it works:
      - Instead of one computer sending fake requests, a hacker uses many computers (called a botnet) to attack a server or network. 
      - These computers are often infected without their owners knowing and controlled by the hacker. 
      - The combined force of multiple systems overwhelms the target, making it even harder to stop. 
    - Purpose:
      - To shut down a service or website for a long time. 
      - To cause financial or reputational damage. 
    - Example: Imagine 1,000 people trying to enter the shop at the same time from different locations. The shop would shut down entirely. That’s how a DDoS attack works. 
    - Prevention:
      - Use specialized tools like anti-DDoS protection services to detect and block unusual traffic. 
      - Regularly update systems to reduce vulnerabilities. 

    Key Points to Remember:
    - Both DoS and DDoS attacks aim to disrupt a system and make it unavailable to users. 
    - DDoS attacks are more dangerous because they involve many systems, making them harder to block. 
    - Good cybersecurity practices, such as using firewalls and traffic monitoring, can help prevent these attacks. 

    By learning these terms, students can understand the importance of cybersecurity and how to protect online systems.


    Difference between DoS and DDoS Attack

    Feature DoS Attack DDoS Attack
    Number of Attackers Done using a single system. Done using multiple systems (botnet).
    Power of the Attack Less powerful, easier to stop. Very powerful and harder to stop.
    Speed of Impact Slower impact. Rapid and overwhelming.
    Example Overloading a website from one computer. Using thousands of computers to flood a website.



    SQL Injection

    - What is it?
      SQL Injection is a type of cyberattack where hackers insert harmful code into a website's input fields to trick the database into revealing sensitive information or allowing unauthorized actions. 
    - How it works:  
      - Websites often use databases to store user information, like usernames, passwords, or customer details. 
      - If a website doesn't properly check the input from users, hackers can insert malicious SQL (Structured Query Language) commands into login forms, search bars, or other input fields. 
      - These commands can force the database to do things it shouldn’t, like giving the hacker access to private data. 
    - Example:
      - On a login page, instead of typing a username and password, a hacker enters: 
        SQL:
       
        ' OR '1'='1
       
      - This trick can make the system think the login is valid and give access without a correct password. 
    - Effects:  
      - Hackers can steal personal data, modify information, or even delete the database. 
    - Prevention:
      - Validate and sanitize user input (make sure it only contains expected data). 
      - Use parameterized queries to stop harmful SQL commands. 
      - Regularly update and secure the database system. 


    Buffer Overflow

    - What is it?
      A Buffer Overflow is a type of error or attack where a program is given more data than it can handle, causing it to crash or behave unexpectedly. 
    - How it works:  
      - Computers store data in small chunks of memory called "buffers." 
      - If a program tries to store more data than the buffer can hold, the extra data "overflows" into nearby memory areas. 
      - Hackers exploit this by carefully crafting extra data to overwrite important parts of the program's memory, allowing them to control or crash the program. 
    - Example:  
      - Imagine you have a glass (buffer) that can hold 1 liter of water. If you pour 2 liters, the excess spills out (overflow), potentially causing problems. 
      - In computing, this "spill" can overwrite critical instructions in the program. 
    - Effects:  
      - Programs can crash. 
      - Hackers can execute malicious code to take control of the system. 
    - Prevention:
      - Use programming languages with built-in protections (like Java or Python). 
      - Perform regular code reviews to fix vulnerabilities. 
      - Use tools to detect and prevent buffer overflow issues during development. 
     

    SQL Injection and Buffer Overflow Difference

    Feature SQL Injection Buffer Overflow
    Target A website’s database. A program’s memory.
    How it works Inserts harmful SQL commands into input fields. Overloads a program's memory with excess data.
    Goal Steal or manipulate data in the database. Crash the program or take control of it.
    Prevention Validate input and use parameterized queries. Write secure code and use memory-safe languages.


    Attacks on Wireless Networks

    Wireless networks are widely used today in homes, businesses, and public spaces, but they can be vulnerable to various types of cyberattacks. These attacks exploit weaknesses in the security of wireless communication systems. Here’s a details:

    1. Eavesdropping

    - What is it?

      Eavesdropping is when a hacker secretly listens to the communication happening over a wireless network, without the knowledge of the users.  

    - How it works:

      - Wireless networks use radio waves to transmit data, and since radio waves are not limited to a specific area, they can be intercepted by anyone with the right equipment.  

      - Hackers can use software and tools to listen to these radio signals and capture sensitive data like passwords, emails, or credit card numbers.

    - Example:

      - If you’re using public Wi-Fi in a cafe, a hacker nearby could capture the data you’re sending over the network.  

    - Prevention:  

      - Use encrypted connections (like HTTPS) to make the data unreadable to hackers.  

      - Avoid using public Wi-Fi for sensitive activities like banking or shopping.

    2. Man-in-the-Middle (MitM) Attack

    - What is it?

      In a Man-in-the-Middle attack, the hacker secretly intercepts and possibly alters the communication between two parties (like a user and a website) without them knowing.  

    - How it works

      - When two devices are communicating over a wireless network, a hacker places themselves between the two devices and becomes a “middleman.”  

      - The hacker can capture the data being sent, modify it, or even impersonate one of the parties to gain access to sensitive information.

    - Example:

      - A hacker intercepts your communication with a bank’s website and redirects you to a fake website that looks exactly the same, tricking you into entering your bank details.  

    - Prevention:

      - Always ensure that websites use SSL/TLS encryption (indicated by HTTPS) to protect the communication.  

      - Avoid clicking on suspicious links or entering sensitive information on untrusted websites.

    3. Denial of Service (DoS) Attack

    - What is it?

      A Denial of Service (DoS) attack aims to make a wireless network or service unavailable to users by overwhelming it with too much traffic.  

    - How it works:

      - The attacker floods the wireless network with a huge volume of requests or malicious packets, making it slow or even causing it to crash.

      - The network or server becomes too busy to handle legitimate users’ requests.

    - Example:  

      - A hacker sends thousands of fake requests to a router or wireless access point, causing it to slow down or crash, thus preventing users from connecting to the internet.  

    - Prevention

      - Use strong security measures like firewalls to block unwanted traffic.  

      - Limit the number of requests or use intrusion detection systems to identify and block DoS attacks.

    4. Unauthorized Access

    - What is it?

      Unauthorized Access occurs when a hacker gains access to a wireless network without permission. This can allow the attacker to steal data, send malicious content, or monitor network activities.  

    - How it works:  

      - Hackers can use weak passwords, or try to guess or crack the password protecting the wireless network.

      - Once they gain access, they can listen to communications, launch other attacks, or use the network for malicious activities.

    - Example:

      - A hacker finds the default password on a poorly-secured home router and connects to the Wi-Fi network without the owner's permission.  

    - Prevention:

      - Use strong passwords with a mix of letters, numbers, and symbols.  

      - Change the default password on your wireless router and use WPA2 or WPA3 encryption for your Wi-Fi.

    5. Evil Twin Attack

    - What is it?

      An Evil Twin Attack is when a hacker sets up a fake Wi-Fi hotspot that looks like a legitimate network to trick users into connecting to it.  

    - How it works

      - The hacker creates a Wi-Fi network with a name similar to a trusted public Wi-Fi network (e.g., "Free Airport Wi-Fi").  

      - Once a user connects to the "Evil Twin," the hacker can monitor the user’s data, steal login credentials, or launch other attacks.

    - Example:

      - A hacker sets up a fake Wi-Fi network in a public place, and users unknowingly connect to it, thinking it’s the official one.  

    - Prevention

      - Always confirm the correct name of a Wi-Fi network before connecting.  

      - Use a VPN (Virtual Private Network) to encrypt your data when connected to public Wi-Fi.

    6. Jamming

    - What is it?

      Jamming is a type of attack where the attacker intentionally interferes with or blocks wireless signals, preventing devices from communicating.  

    - How it works:

      - The attacker uses a device that emits signals on the same frequency as the wireless network, causing interference.  

      - The network becomes slow or completely unresponsive as a result of the jamming.

    - Example:

      - A hacker uses a jamming device to block the signals from a router, making it impossible for people to access the internet.  

    - Prevention:

      - Use advanced wireless technologies that can automatically change frequencies or use more secure, less congested frequencies.

    Conclusion

    Wireless networks are susceptible to a variety of attacks that can compromise security and cause data loss. To protect yourself and your network, always use strong encryption, verify networks before connecting, and stay aware of potential vulnerabilities.


    Phishing and Identity Theft: Introduction to Phishing

    Phishing  

    - What is it?

      Phishing is a type of online scam where attackers try to trick you into revealing sensitive information like passwords, credit card numbers, or personal details by pretending to be someone you trust, such as a bank, an online store, or a friend.  

    - How it works:  

      - The attacker often sends fake emails, text messages, or phone calls that look like they come from legitimate sources (such as your bank or a popular website).  

      - These messages might ask you to click on a link or open an attachment that looks genuine, but it takes you to a fake website designed to steal your information.  

      - The phishing website usually asks you to enter sensitive information, and once you do, the attacker gains access to your accounts or steals your money.

    - Example:

      - You receive an email that looks like it’s from your bank, asking you to click on a link to confirm your account details. When you do, you are taken to a fake website that looks like your bank’s official site, and you unknowingly enter your login details, which the attacker now has access to.  

    - Prevention:

      - Always check the sender’s email address carefully.  

      - Do not click on suspicious links or open attachments in unsolicited emails.  

      - Never share your sensitive information through email or text messages.  

      - Ensure that the website URL starts with “https” and look for the padlock symbol to know it's secure.

    Identity Theft (ID Theft)

    - What is it? 

      Identity theft occurs when someone steals your personal information, such as your name, social security number, credit card details, or other identifying information, and uses it to commit fraud or other crimes in your name.  

    - How it works:  

      - Criminals often obtain your personal information through phishing scams, data breaches, or by physically stealing documents like your ID card or credit cards.  

      - Once they have your information, they can open credit accounts, make purchases, or even file false tax returns in your name.  

      - This can cause financial loss and damage to your credit score.

    - Example:  

      - Someone steals your credit card information from a phishing website and starts using it to make online purchases.  

      - They could also apply for loans or credit cards in your name, leaving you with debt that isn’t yours.

    - Prevention:

      - Protect personal documents, credit cards, and information.  

      - Be cautious when sharing personal details online, especially on social media.  

      - Regularly check your bank and credit card statements for any unusual activity.  

      - Use strong, unique passwords for your online accounts, and enable two-factor authentication where possible.

    Conclusion:

    Both phishing and identity theft involve stealing your personal information, but phishing is the method used to trick you into giving that information, while identity theft is the actual act of using that information for fraudulent activities. Being cautious online and protecting your personal data are essential steps in avoiding these risks.

    No comments:

    Post a Comment