Cyber Crime
Cyber Crime
Cyber Crime
Types of Viruses
Computer viruses can be categorized based onattacks onvarious elements ofthe
systemand
can putthe system and personal data on the system indanger.
1. Boot sector viruses: It infects the storage media on which OS is stored (e.g.,
floppydiskettes and
hard drives) and which is used to start the computer system. The entire
data/programs are stored
on the floppy disks and hard drives in smaller sections called sectors..
2. Program viruses: These virusesbecome active when the program file (usually with
extensions.bin,
.com, .exe, .ovl, .drv) is executed (i.e., opened – program is started). Once these
program files get
infected, the virus makes copies of itself and infects the other programs on the
computer system.
3. Multipartite viruses: It is a hybrid of a boot sector and program viruses. It
infects program
files along with the boot record when the infected program is active.
IV- II SEM CSE, Cyber Security Unit - II
Prepared by A N SREEDHAR Asst. Professor, Dept. of CSE, Page 11 of 18
4. Stealth viruses: It camouflages and/or masks itself and so detecting this type
of virus is very
difficult. It can disguise itself such a way that antivirus software also cannot
detect it thereby
preventing spreading into the computersystem.
5. Polymorphicviruses: It acts likea “chameleon” that changesitsvirus signature
(i.e., binarypattern)
everytime it spreadsthrough the system(i.e., multiplies and infects a new file).
6. Macro viruses:Manyapplications,suchasMicrosoft
WordandMicrosoftExcel,supportMACROs
(i.e., macro languages). These macros are programmed as a macro embedded in
adocument.
7. Active Xand Java Control: Allthe web browsers have settings about Active X and
JavaControls.
Little awareness is needed about managing and controlling these settings of a web
browser.
A typical definition of computer virus/worms might have various aspects such as:
1. A virus attacks specific file types (or files).
2. A virus manipulates a program to execute tasks unintentionally.
3. An infected program produces more viruses.
4. An infected program may run without error for a long time.
5. Viruses can modify themselves and may possibly escape detection this way.
Trojan Horses and Backdoors
Trojan Horse is a program in which malicious or harmful code is contained inside
apparently
harmless programming or data in such a way that it can get control and cause harm,
for example, ruining
the file allocationtable onthe hard disk. ATrojanHorse mayget widelyredistributed
as part ofa computer
virus. The term TrojanHorse comes from Greek mythology about the Trojan War.
Some typical examples of threats by Trojans are as follows
1. They erase, overwrite or corrupt data on a computer.
2. They help to spread other malware such as viruses (by a dropperTrojan).
3. They deactivate or interfere with antivirus and firewall programs.
4. They allow remote access to your computer (by a remote accessTrojan).
5. They upload and download files without your knowledge.
6. They gather E-Mail addresses and use them for Spam.
7. They log keystrokes to steal information such as passwords and credit card
numbers.
8. They copy fake links to false websites, display porno sites, play sounds/videos
and display
images.
9. They slow down, restart or shutdown the system.
10. They reinstall themselves after being disabled.
11. They disable the taskmanager.
12. Theydisablethecontrol panel.
IV- II SEM CSE, Cyber Security Unit - II
Prepared by A N SREEDHAR Asst. Professor, Dept. of CSE, Page 12 of 18
Backdoor
A backdoor is a means of access to a computer programthat bypasses security
mechanisms.
A programmer may sometimes install a backdoor so that the program can be accessed
for
troubleshooting or other purposes.
Following are a few examples of backdoor Trojans:
1. Back Orifice: It is a well-known example of backdoor Trojan designed for remote
system
administration. It enables a user to control a computer running the Microsoft
Windows OS froma
remote location. The name is a word play on Microsoft BackOffice Server software.
Readers may
visit http://www.cultdeadcow.com/tools/bo.html to know more about backdoor.
2. Bifrost: It is another backdoor Trojan that can infect Windows 95 through Vista.
It uses the typical
server, server builder and client backdoor program configuration to allow a remote
attacker, who
uses client, to execute arbitrary code on the compromised machine.
3. SAP backdoors: SAP is an Enterprise Resource Planning (ERP) system and nowadays
ERP is the
heart of the business technological platform. These systems handle the key business
processes of
the organization, such as procurement, invoicing, human resources management,
billing, stock
management and financial planning.
4. Onapsis Bizploit: It is the open-source ERP penetration testing framework
developed by the
Onapsis Research Labs. Bizploit assists security professionals in the discovery,
exploration,
vulnerability assessment and exploitation phases of specialized ERP penetration
tests. Readers
may visit http://www.onapsis.com/research.html to know more about this tool.
How to Protect from Trojan Horses and Backdoors
Follow the following steps to protect your systems from Trojan Horses and
backdoors:
1. Stay away from suspect websites/weblinks: Avoid downloading free/pirated
software’s
that often get infected by Trojans, worms, viruses and other things.
2. Surf on the Web cautiously: Avoid connecting with and/or downloading any
information
from peer-to-peer (P2P) networks, which are most dangerous networks to spread
Trojan
Horses and other threats.
3. It may be experienced that, after downloading the file, it never works and here
is a threat
that although the file has not worked, something must have happened to the system
the
malicious software deploys its gizmos and the system is at serious health risk.
4. Install antivirus/Trojan remover software: Nowadays antivirus software(s) have
built-in
feature for protecting the system not only from viruses and worms but also from
malware
such as Trojan Horses.
IV- II SEM CSE, Cyber Security Unit - II
Prepared by A N SREEDHAR Asst. Professor, Dept. of CSE, Page 13 of 18
Peer-to-Peer (P2P) Networks
Peer-to-peer, commonly abbreviated as P2P, is any distributed network architecture
composed of participants that make a portion of their resources.
1. Hybrid P2P: There is a central server that keeps information about the network.
The peers
are responsible for storing the information.
2. Pure P2P: There is absolutely no central server or router. Each peer acts as
both client and
server at the same time. This is also sometimes referred to as “serverless” P2P.
2. Mixed P2P: It is between “hybrid” and “pure” P2P networks. An example of such a
network
is Gnutella that has no central server but clusters its nodes around so-called
“supernodes.”***/
/***Attacks on Wireless Networks
Even when people travel, they still need to work. Thus, work seems to be moving out
of
the traditional offices into homes, hotels, airport lounges and taxis.
The following are diff erent types of “mobile workers”:
1. Tethered/remote worker: This is considered to be an employee who generally
remains at a
single point of work, but is remote to the central company systems.
2. Roaming user: This is either an employee who works in an environment (e.g.,
warehousing, shop
floor, etc.) or in multiple areas (e.g., meeting rooms).
3. Nomad: This category covers employees requiring solutions in hotel rooms and
other semitethered environments where modem use is still prevalent, along with the
increasing use of
multiple wireless technologies and devices.
4. Road warrior: This is the ultimate mobile user and spends little time in the
office; however,
he/she requires regular access to data and collaborative functionality while on the
move, in transit
or in hotels.
Fig: Wireless Networks
IV- II SEM CSE, Cyber Security Unit - II
Prepared by A N SREEDHAR Asst. Professor, Dept. of CSE, Page 18 of 18
Wireless technology is no more buzzword in today’s world. Let us understand
important
components of wireless network, apart from components such as modems, routers, hubs
and
firewall, which are integral part of any wired network as well as wireless network.
1. 802.11 networking standards:
Institute of Electrical and Electronics Engineers (IEEE)-802.11 is a family of
standards for
wireless local area network (WLAN), stating the specifications and/or requirements
for computer
communication in the 2.4, 3.6 and 5 GHz frequency bands.
2. Access points: It is also termed as AP. It is a hardware device and/or a
software that acts as a
central transmitter and receiver of WLAN radio signals.
3. Access points: It is also termed as AP. It is a hardware device and/or a
software that acts as a
central transmitter and receiver of WLAN radio signals.
1. Free Wi-Fihotspots.
2. Commercial hotspots.
4. Service Set Identifier (SSID)
5. Wired Equivalence Privacy (WEP):
6. Wi-Fi Protected Access (WPA AND WPA2)
7. Media Access Control (MAC)
Traditional Techniques of Attacks on Wireless Networks
1. Sniffing: It is eavesdropping on the network and is the simplest of all attacks.
Sniffing is the
simple process of intercepting wireless data that is being broadcasted on an
unsecured network.
2. Spoofing: The primary objective of this attack is to successfully masquerade the
identity by
falsifying data and thereby gaining an illegitimate advantage.
1. MAC address Spoofing
2. IP Spoofing
3. FrameSpoofing
/****Rootkits
The term rootkit is used to describe the mechanisms and techniques whereby malware
including viruses, Spyware and Trojans attempt to hide their presence from Spyware
blockers,
antivirus and system management utilities.