






















Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Assignment 1 of Cyber Security law
Typology: Assignments
1 / 30
This page cannot be seen from the preview
Don't miss anything!
Omkar Ajit Kadam BEIT 2 Roll No. 90 CSL Assignment 1
d)Impersonation Scenario: Internal Employee/Client/Vendor Attacker dressed in business attire or appropriate uniform enters into target building claiming to be a contractor, client, or service personnel. He/she may then look for passwords stuck on terminals, search information or documents on desks or eavesdrop confidential conversations. e) Impersonation Scenario: Repairman: Attacker may pretend to be telephone repairman or computer technician and enters into target organization. He/she may then plant a snooping device or gain hidden passwords during activities associated with their duties.
Least privilege Controlled access Logging and auditing Legal policies Archive critical data Common Social Engineering Targets and Defense Strategies Social Engineering Targets Attack Techniques Defense Strategies Front office and help desk Eavesdropping, shoulder surfing, impersonation, persuasion, and intimidation Train employees/help desk to never reveal passwords or other information by phone Perimeter security Impersonation, fake IDs, piggy backing, etc. Implement strict badge, token or biometric authentication, employee training, and security guards Office Shoulder surfing, eavesdropping, Ingratiation, etc. Employee training, best practices and checklists for using passwords Escort all guests Phone (help desk) Impersonation, Intimidation, and persuasion on help desk calls Employee training, enforce policies for the help desk Mail room Theft, damage or forging of mails Lock and monitor mail room, employee training Machine room/Phone closet Attempting to gain access, remove equipment, and/or attach a protocol analyzer to grab the confidential data Keep phone closets, server rooms, etc. locked at all times and keep updated inventory on equipment
has a few drawbacks such as it can be located easily and has only one control point. In this model, if the server is destroyed, the botnet perishes. 2) Peer-to-peer: To overcome the drawback of relying on one centralized server, botnets have evolved. New botnets are interconnected in the form of peer-to-peer structure. In the P2P botnet model, each connected device works independently as a client and a server, coordinating among each other to update and transmit information between them. The P2P botnet structure is stronger because of the absence of a single centralized control.
One of the biggest DDoS botnet attacks of the year was IoT-related and used the Mirai botnet virus. The virus targeted and controlled tens of thousands of less protected internet devices and turned them into bots to launch a DDoS attack. Mirai spawned many derivatives and continued to expand, making the attack more complex. It changed the threat landscape forever in terms of the techniques used. 2)Spamming and Traffic Monitoring: A bot can be used as a sniffer to identify the presence of sensitive data in the infected machines or zombies. It can also locate competitor botnets if installed in the same machine and can be hijacked by the commander. Some bots may offer to open a SOCKS v4/v5 proxy (generic proxy protocol for TCP /IP based network). When the SOCKS proxy is enabled on a compromised machine, it can be used for various purposes like spamming. Bots use a packet sniffer to watch for the information or data been passed by the compromised machine. The sniffer can retrieve sensitive information such as a username and password.
Grum is the type of spam which is hard to detect as it infects files used by Autorun registries. This botnet has attracted the researches as it is relatively small with only 600,000 members but accounts for 40 billion spam-emails per day which is approximately 25% of the total spam emails. 3)Keylogging: With the help of keylogger, it becomes easy for a botmaster to retrieve sensitive information and steal data. Using a keylogger program, an attacker can gather only the keys typed that come in the sequence of interesting words like PayPal, Yahoo, etc. A kind of spyware identified as OSX/XSLCmd ported from Windows to OS X includes keylogging and screen capture capabilities.
3. Loss of control over end user actions When companies are in the dark about workers using cloud services, those employees can be doing just about anything and no one would know—until it’s too late. For instance, a salesperson who is about to resign from the company could download a report of all customer contacts, upload the data to a personal cloud storage service, and then access that information once she is employed by a competitor. The preceding example is actually one of the more common insider threats today. 4. Malware infections that unleash a targeted attack Cloud services can be used as a vector of data exfiltration. Skyhigh uncovered a novel data exfiltration technique whereby attackers encoded sensitive data into video files and uploaded them to YouTube. We’ve also detected malware that exfiltrates sensitive data via a private Twitter account 140 characters at a time. In the case of the Dyre malware variant, cyber criminals used file sharing services to deliver the malware to targets using phishing attacks. 5. Contractual breaches with customers or business partners Contracts among business parties often restrict how data is used and who is authorized to access it. When employees move restricted data into the cloud without authorization, the business contracts may be violated and legal action could ensue. Consider the example of a cloud service that maintains the right to share all data uploaded to the service with third parties in its terms and conditions, thereby breaching a confidentiality agreement the company made with a business partner. 6. Diminished customer trust Data breaches inevitably result in diminished trust by customers. In one of the larges breaches of payment card data ever, cyber criminals stole over 40 million customer credit and debit card numbers from Target. The breach led customers to stay away from Target stores, and led to a loss of business for the company, which ultimately impacted the company’s revenue. See number 9 below. 7. Data breach requiring disclosure and notification to victims If sensitive or regulated data is put in the cloud and a breach occurs, the company may be required to disclose the breach and send notifications to potential victims. Certain regulations such as HIPAA and HITECH in the healthcare industry and the EU Data Protection Directive require these disclosures. Following legally-mandated breach disclosures, regulators can levy fines against a company and it’s not uncommon for consumers whose data was compromised to file lawsuits. 8. Increased customer churn If customers even suspect that their data is not fully protected by enterprise-grade security controls, they may take their business elsewhere to a company they can trust. A growing chorus of critics are instructing consumers to avoid cloud companies who do not protect customer privacy.
9. Revenue losses News of the Target data breach made headlines and many consumers stayed away from Target stores over the busy holiday season, leading to a 46% drop in the company’s quarterly profit. The company estimated the breach ultimate cost $148 million. As a result, the CIO and CEO resigned and many are now calling for increased oversight by the board of directors over cyber security programs. According to the Ponemon BYOC study, a majority (64 percent) of respondents say their companies can’t confirm if their employees are using their own cloud in the workplace. Trust us—they are. In order to reduce the risks of unmanaged cloud usage, companies first need visibility into the cloud services in use by their employees. They need to understand what data is being uploaded to which cloud services and by whom. With this information, IT teams can begin to enforce corporate data security, compliance, and governance policies to protect corporate data in the cloud. The cloud is here to stay, and companies must balance the risks of cloud services with the clear benefits they bring. 5.Define cybercrime and give its global perspective. Ans: Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device. Most, but not all, cybercrime is committed by cybercriminals or hackers who want to make money. Cybercrime is carried out by individuals or organizations. Some cybercriminals are organized, use advanced techniques and are highly technically skilled. Others are novice hackers. Rarely, cybercrime aims to damage computers for reasons other than profit. These could be political or personal. Types of cybercrime: Here are some specific examples of the different types of cybercrime: Email and internet fraud. Identity fraud (where personal information is stolen and used). Theft of financial or card payment data. Theft and sale of corporate data. Cyberextortion (demanding money to prevent a threatened attack). Ransomware attacks (a type of cyberextortion). Cryptojacking (where hackers mine cryptocurrency using resources they do not own). Cyberespionage (where hackers access government or company data). Most cybercrime falls under two main categories: Criminal activity that targets Criminal activity that uses computers to commit other crimes.
businesses and the international community must, therefore, proactively help users' access information on how to protect themselves. Given the promises and challenges in the extended enterprise scenario, organizations in the international community have a special role in sharing information on good practices, and creating open and accessible enterprise information flow channels for exchanging of ideas in a collaborative manner. International cooperation at the levels of government, industry, consumer, business and technical groups to allow a global and coordinated approach to achieving global cyber security is the key. 6.How will you classify cybercrime? Ans: Cyber-crimes are classified based on the subject of the crime, the person or organization against whom the crime is committed, and the temporal nature of the crimes committed online.Based on the subject of the crime, cybercrimes are classified into three broad groups:
Possessing unauthorized information Cyber terrorism against a government organization Distributing pirated software
6)Section 44 – Failure to furnish information, returns, etc. This section applies to a person who Fails to furnish any document, return or report to the Controller or the Certifying Authority Fails to file returns or furnish any information as per the regulations or fails to furnish them in time Does not maintain the books of account or records Penalty – The following penalties apply: A monetary fine of up to one lakh and fifty thousand rupees for each such failure A fine of up to five thousand rupees for every day if the failure continues A fine of up to ten thousand rupees for every day if the failure continues 7)Section 45 – Residuary Penalty: This section applies to a person who contravenes any rules under the IT Act, 2000, especially those for which there are no special provisions. Penalty – A compensation of up to twenty-five thousand rupees to the affected person. 8)Section 71 – Misrepresentation: This section applies to a person who makes any misrepresentation to or even suppresses any material fact from the Controller or Certifying Authority to obtain the license or a digital signature certificate. Penalty – Imprisonment of up to two years or a fine of up to one lakh rupees, also both in some cases. 9)Section 72 – Breach of confidentiality and privacy: This section applies to a person with secured access to any electronic record, information, or any other material, discloses it to another person without consent. Penalty – Imprisonment of up to two years or a fine of up to one lakh rupees, also both in some cases. 10)Section 73 – Publishing a Digital Certificate with incorrect details: This section applies to a person who publishes a digital certificate with the knowledge that –
The Certifying Authority listed in the certificate has not issued it The subscriber listed in the certificate has not accepted it It is a revoked or suspended certificate Penalty – Imprisonment of up to two years or a fine of up to one lakh rupees, also both in some cases. 11)Section 74 – Publication with a fraudulent purpose: This section applies to a person who knowingly creates, publishes or makes available a digital signature for fraudulent purposes. Penalty – Imprisonment of up to two years or a fine of up to one lakh rupees, also both in some cases. 12)Section 85 – Company Offences: (1) This section applies to a company who commits a contravention to the provisions of the Act. In such cases, all the people who were in charge and responsible for the company’s conduct of business as well as the company are guilty of the contravention. Further, those responsible are liable for punishment. However, if a person is not aware of any such contravention, then he is not liable. (2) Notwithstanding anything contained in the sub-section (1), if it is proved that the contravention was with the consent of, or due to the negligence of any director, manager or any other officer, then such people are also held liable. For the purposes of this section, “company” means any body corporate and also includes a firm or other association of individuals. 7.What are modern techniques of credit card fraud? Ans: 1)Traditional Techniques: The traditional and the first type of credit card fraud is paper-based-application fraud, wherein a criminal use stolen or fake documents such as utility bills and bank statements that can build up useful personally Identifiable Information (PII) to open an account in someone else's name. Application fraud can be divided into
1. ID theft: Where an individual pretends to be someone else.