20IT84-Cyber Security �& �Digital Forensics
B.Tech. (OPEN ELECTIVE)
By
M. Vijay Kumar
Cyber Security & Digital Forensics
Pre-requisite: Understanding of digital logic, operating system concepts, Computer hardware knowledge.
Cyber Security & Digital Forensics
Course Educational Objective: The objective of the course is to provide the basic concepts of Cybersecurity and Digital Forensics which help to protect ourselves from various kinds of cyber-attacks. Digital forensics is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. It enables students to gain experience to do independent study and research.
Cyber Security & Digital Forensics
Course Outcomes: At the end of this course, the student will be able to
CO1: Understand the implications of cybercrime. (Understand- L2)
CO2: Identify key Tools and Methods used in Cybercrime. (Remember- L1)
CO3: Understand the concepts of Cyber Forensics. (Understand- L2)
CO4: Apply Cyber Forensics in collection of digital evidence and sources of evidence. (Apply – L3)
CO5: Analyze the cyber forensics tools for present and future. (Analyze – L4)
TEXTBOOKS
1. Dejey, Dr.Murugan, “Cyber Forensics”, Oxford University Press, India, 2018.
2. Sunit Belapure Nina Godbole “Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives”, WILEY, 2011.
UNIT - I Syllabus
Introduction to Cyber Security
In the "cyber world," Large data groups like Google, Facebook, and LinkedIn hold significant power and influence in the digital world due to their massive data collection and utilization. This data, which can be in any format (numbers, pictures, video, audio, etc.). This power allows them to operate independently within cyberspace and potentially even create their own cybersecurity domains.
Key Points:
�Impact of new technologies on cybersecurity�
Geospatial Information Systems: Connecting Location to Data�
A geospatial information system (GIS), sometimes referred to as a geographic information system, is a powerful tool for capturing, storing, analyzing, and visualizing geographic data. It essentially connects location information (where things are) with descriptive information (what things are like there). This allows for a comprehensive understanding of the relationships between various elements on Earth's surface.
Applications of GIS:
Definition of Cyber Security
Cybersecurity is the practice of protecting computer systems, networks, data, and devices from unauthorized access, use, disclosure, disruption, modification, or destruction.
It encompasses a wide range of activities, including:
Importance of Cyber Security
Cybersecurity is vital in today's digital world for several reasons:
�Cybersecurity Challenges�
The threat landscape is constantly evolving, with cybercriminals developing new techniques and tools to exploit vulnerabilities. Cybersecurity professionals face several challenges, including:
Emerging threats: New cyber threats are constantly emerging, requiring constant vigilance and adaptation of security practices.
Complexity of systems: Modern IT systems are complex and interconnected, making them vulnerable to attack.
Shortage of skilled professionals: There is a global shortage of cybersecurity professionals, making it difficult for organizations to find and retain skilled personnel.
Introduction to Cyber Crime�
Cyber Crime is defined as any criminal activity which takes place
- On or over the medium of computers or
- On internet or
Cybercrime can be defined as “The illegal usage of any communication device to commit or facilitate in committing any illegal act”.
Introduction to Cyber Crime
The oxford Dictionary defined the term cybercrime as “Criminal activities carried out by means of Computers or the Internet”.
However, in general term cybercrime means any illegal activity which is carried over or with the help of internet or computers.
Not only the criminals are causing enormous losses to the society and the government but are also able to mostly conceal their identity.
History of Cybercrime
The first recorded cybercrime occurred in the 1970s when a group of teenagers in Pennsylvania used a simple program to make long-distance phone calls for free. This was known as "phreaking," and it was one of the earliest forms of hacking.
��Darkweb: A Hidden Corner of the Internet��
The darkweb is a hidden part of the internet that is not indexed by conventional search engines like Google or Bing. It requires specific software and configurations to access, making it a haven for anonymity and privacy. This shroud of secrecy can be both beneficial and harmful, depending on how it's used.
Accessing the Darkweb:
Accessing the darkweb requires a special browser called Tor. This browser encrypts your internet traffic and routes it through a series of servers worldwide, making it difficult to track your online activity.
What can you find on the darkweb?
�Is using the darkweb safe?�
Deepfakes
Deepfakes are synthetic media, typically videos or audio recordings, that have been manipulated using artificial intelligence (AI) to make it appear as if someone said or did something they never did. They can look and sound incredibly realistic and have the potential to be used for malicious purposes such as spreading misinformation, damaging reputations, and even interfering with elections.
How Deepfakes are Created:
Advanced Persistent Threats (APTs)
Advanced Persistent Threats (APTs) are sophisticated and highly organized cyberattacks targeting specific organizations or individuals for extended periods. Unlike traditional cyberattacks that focus on a single exploit or immediate financial gain, APTs are designed for long-term infiltration and data exfiltration. They employ a vast arsenal of techniques and tools, making them difficult to detect and neutralize.
��Cybercriminals��
Exploit vulnerabilities: Cybercriminals actively seek and exploit weaknesses in systems for malicious purposes.
Diverse tactics: Their toolkit includes hacking, phishing, malware, and identity theft, among other techniques.
Significant threats: Individuals, businesses, and organizations are vulnerable to data breaches, financial losses, and reputational damage due to cybercrime.
Targeting weaknesses: Cybercriminals prioritize targets with weaker security defences, highlighting the need for robust protection.
Cybercriminals
Law enforcement response: Agencies collaborate with cybersecurity experts to investigate and prosecute cybercriminals, safeguarding the digital space.
Constant evolution: Cybercriminals constantly adapt their methods, requiring continuous monitoring and implementation of updated security measures.
Motivations: Financial gain, personal motives, political agendas, or sheer desire for disruption can drive cybercriminals.
Multifaceted approach: Combating cybercrime requires a collaboration of technology, law, public awareness, and international cooperation.
Cyber Crime Landscape Today
Cyber Crime Landscape Today�
Cyber criminals have evolved from teenagers and hobbyists to individuals and groups motivated by personal or financial gain. They target any valuable data, from credit cards to product designs.
Types of Cyber Criminals
Organized Cyber Criminals�
Consists of cyber criminals, hacktivists, terrorists, and state-sponsored hackers.
Cybercrime and information security
Cybercrime and information security are closely intertwined and have a complex relationship. Here are some key aspects of their relationship:
Cybercrime as a Threat to Information Security: Cybercrime poses a significant threat to the security of information. Criminals exploit vulnerabilities in computer systems, networks, and individuals to gain unauthorized access, steal sensitive data, disrupt services, or cause harm. Information security measures are crucial in preventing and mitigating cybercrime by implementing protective measures to safeguard data, systems, and networks from unauthorized access, manipulation, or destruction.
Cybercrime and information security
Information Security as a Défense Against Cybercrime: Information security practices, policies, and technologies are essential in protecting against cybercrime. Robust security measures, such as firewalls, encryption, access controls, and intrusion detection systems, help prevent unauthorized access, defend against malware, and detect and respond to cyber threats. By implementing effective information security measures, organizations and individuals can reduce the risk of falling victim to cybercrime.
Cybercrime and information security
Cybersecurity as a Subset of Information Security: Cybersecurity is a specific domain within information security that focuses on protecting computer systems, networks, and digital infrastructure from cyber threats and attacks. It encompasses measures like network security, application security, endpoint protection, incident response, and vulnerability management. Cybersecurity plays a critical role in maintaining the confidentiality, integrity, and availability of information and defending against cybercriminal activities.
Cybercrime and information security
Collaboration and Synergy: Cybercrime and information security professionals often collaborate to address and mitigate cyber threats. Information security practitioners design and implement security measures to protect against potential cybercrime, while cybercrime investigators and law enforcement agencies work to identify, apprehend, and prosecute cybercriminals. Sharing information, collaborating on threat intelligence, and staying updated on emerging cyber threats help strengthen information security practices and combat cybercrime effectively.
In summary, cybercrime and information security have a complex relationship. Information security measures are crucial in preventing and mitigating cybercrime, while cybersecurity practices focus specifically on defending against cyber threats.
Cybercrime Classifications
Cybercrimes can be classified into various categories based on the target and the nature of the crime. The classifications of cybercrime include the following:
Cybercrime Classifications
Cybercrimes can be classified into various categories based on the target and the nature of the crime. The classifications of cybercrime include the following:
1. Against Individuals
Cybercrime Classifications
2. Against Property
�
Cybercrime Classifications
3. Against Organizations
Cybercrime Classifications
4. Against Society
These classifications provide a broad overview of the types of cybercrimes, but the landscape is constantly evolving as cybercriminals develop new techniques and tactics. It is essential to stay informed about emerging threats and implement robust cybersecurity measures to protect against them.
Some real-world examples of cybercrimes
Leak of Passwords: In a significant breach, 32 million accounts were affected by the leak of passwords, making it the largest breach since the 2009 incident on the RockYou website.
Ransomware Attacks: In 2017, a major ransomware attack impacted around 200,000 PCs in over 150 nations, resulting in a global repair bill of approximately $6 billion.
DDoS Attacks: These attacks are effective in making online services unavailable or taking entire networks down by overwhelming the target's network or site with traffic from multiple sources.
Phishing: Phishing involves hackers sending emails that contain malicious attachments or URLs, with an estimated 3.4 billion spam emails sent out each day.
Identity Theft: This involves the illegal possession of an individual's bank or credit card details, and it is one of the most profitable and common types of cybercrime.
The future of cybercrime
The future of cybercrime is being shaped by several key trends and developments. These include:
The future of cybercrime
Statistics on Cybercrime
Different Forms of Cybercrime
Frightening Cyber Security Facts and Stats�
Frightening Cyber Security Facts and Stats�
Frightening Cyber Security Facts and Stats
Cyberstalking
Cyberstalking is a form of harassment that occurs online, where an individual or group uses electronic communication platforms to repeatedly and persistently target, monitor, intimidate, or harass another person. It involves unwanted and intrusive behaviour that causes fear, distress, or emotional harm to the victim.
Cyberstalking
Here are some key aspects of cyberstalking:
Cyberstalking
Cyberstalking is a serious offense that can have significant emotional and psychological consequences for victims. It is essential to report incidents of cyberstalking to the appropriate authorities and seek support from local law enforcement, online platforms, or organizations specializing in cybercrime or victim assistance.
Signs You Are Being Cyberstalked:�
How to Protect Yourself from Cyberstalking:�
Cybercafes and Cybercrime
Cybercafés, also known as internet cafés, offer public access to computers and the internet for a fee. While they provide valuable services to many people, they can also be used for criminal activities, known as cybercrime.
How can cybercafes be misused for cybercrime?�
Examples of cybercrimes that can be committed in cybercafes:
What can be done to prevent cybercrime in cybercafes?
Botnet
A botnet is a network of computers or devices that have been infected with malicious software, also known as malware. These infected devices, often referred to as "bots" or "zombies," are controlled remotely by a central command-and-control (C&C) server operated by a cybercriminal or a group of individuals.
Botnets are typically created by spreading malware through various means, such as email attachments, malicious downloads, or exploiting vulnerabilities in software or operating systems. Once a device is infected, it becomes part of the botnet and can be used to perform various malicious activities without the owner's knowledge or consent.
Botnet
Botnet
Botnet
The cybercriminals behind botnets can use them for a wide range of nefarious purposes, including:
Botnet
Botnets can be very difficult to detect and remove, as they are often spread across a large number of computers in different locations.
How to protect yourself from botnets:
Security Challenges Posed by Mobile Devices�
Mobile devices have become an essential part of our lives, offering a constant connection to information, communication, and entertainment. However, their ubiquity and ever-expanding functionality also pose significant security challenges. Here are some of the key concerns:
1. Malicious Applications:
Security Challenges Posed by Mobile Devices�
2. Unsecured Wi-Fi Networks:
3. Physical Loss or Theft:
Security Challenges Posed by Mobile Devices
4. Unpatched Operating Systems and Applications:
5. Social Engineering Attacks:
Security Challenges Posed by Mobile Devices
6. Shadow IT:
7. BYOD (Bring Your Own Device):
Security Challenges Posed by Mobile Devices
8. Lack of User Awareness:
Attacks on Mobile/Cell Phones: A Growing Threat�
Mobile phones, with their ever-expanding functionality and constant connectivity, have become an essential part of our lives. Unfortunately, this ubiquitousness also makes them a prime target for cybercriminals. Here are some of the common attacks targeting mobile/cell phones:
1. Mobile Malware:
Attacks on Mobile/Cell Phones: A Growing Threat
2. Phishing Attacks:
Phishing Attacks
Attacks on Mobile/Cell Phones: A Growing Threat
3. SIM Swapping:
SIM Swapping
Attacks on Mobile/Cell Phones: A Growing Threat
4. Man-in-the-Middle (MitM) Attacks:
Man-in-the-Middle (MitM) Attacks
Attacks on Mobile/Cell Phones: A Growing Threat
5. Public Wi-Fi Network Threats:
Public Wi-Fi Network Threats
Image Concert: Norton Antivirus
Attacks on Mobile/Cell Phones: A Growing Threat
Additional Mobile Phone Security Threats:
Mitigating the Risks:�
Installing security software and keeping it updated: This can help to protect devices from malware, phishing attacks, and other threats.
Using strong passwords and enabling biometric authentication: This can help to prevent unauthorized access to devices and data.
Being cautious about the apps you install: Only install apps from trusted sources and read reviews before installing them.
Being careful about the Wi-Fi networks you connect to: Avoid using public Wi-Fi networks for sensitive activities and use a VPN if you must connect.
Backing up your data regularly: This will help you to recover your data if your device is lost or stolen.
Being aware of the latest security threats: Stay informed about the latest cyber threats and learn how to protect yourself from them.
Be cautious about the links you click on and the attachments you open.
Network and Computer Attacks�
Network and computer attacks are attempts to gain unauthorized access to computer networks or individual devices with the intention of stealing data, disrupting operations, or performing other malicious activities.
There are two main types of network attacks: passive and active.
Passive network attacks involve gaining unauthorized access to networks, monitoring, and stealing private data without making any alterations.
Active network attacks involve modifying, encrypting, or damaging data.
Network and Computer Attacks
1. Denial-of-Service (DoS) Attacks:
2. Distributed Denial-of-Service (DDoS) Attacks
Network and Computer Attacks
2. Distributed Denial-of-Service (DDoS) Attacks:
Network and Computer Attacks
3. Zero-Day Attacks:
Network and Computer Attacks
4. SQL Injection Attacks:
Network and Computer Attacks
5. Password Attacks:
Network and Computer Attacks
By being proactive, staying informed about emerging threats, and implementing network security measures such as firewalls, intrusion detection, prevention systems, and security information can significantly reduce the risk of falling victim to network and computer attacks.
Network and Computer Attacks
To protect against network and computer attacks, it's crucial to implement strong security measures:
Keep systems and software up to date with the latest security patches.
Use reputable antivirus and anti-malware software, keeping it regularly updated.
Implement strong and unique passwords and consider using multi-factor authentication.
Network and Computer Attacks
Be cautious of unsolicited emails, messages, or downloads. Avoid clicking on suspicious links or opening attachments from unknown sources.
Regularly backup important data and store it securely.
Use firewalls and intrusion detection systems to monitor and control network traffic.
Educate users about common attack techniques and best practices for cybersecurity.