Cyber Security 1
Cyber Security 1
Cyber Security 1
Proxy Server:
1. Keep the systems behind the curtain mainly for security reasons.
2. Speed up access to a resource. It is used to cache the webpages from a web
server.
3. Specialised proxy servers are used to filter unwanted content such as
advertisements.
4. Proxy server can be used as IP address multiplexer to enable to connect
number of computers on the Internet, whenever one has only one IP
Address.
One of the advantages of a proxy server is that its cache memory can serve
all users.
If one or more websites are requested frequently, may be by different users,
it is likely to be in the proxy’s cache memory, which will improve user
response time.
In fact there are special servers available known as cache servers.
Anonymizers:
1.Flood attack: This is the earliest form of DoS attack and is also known as ping
flood. It is based on the attacker simply sending the victim overwhelming number
of ping packets usually by using the “ping” command which results into more
traffic the victim can handle. This requires the attacker to have a faster network
connection than the victim. It is very simple to launch but to prevent it completely
is the most difficult.
2.Ping of death attack: This attack sends oversized Internet Control Message
Protocol (ICMP) packets. It is generally used by networked computers OS’s to
send error messages to the victims. Some systems upon receiving the oversized
packet will crash, freeze or reboot resulting in DoS
3.SYN attack: It is also termed as TCP SYN Flooding. In the transmission
Control Protocol (TCP) handshaking of network connections is done with SYN
and ACK messages. An attacker initiates a TCP connection to the server with an
SYN. The server replies with an SYN - ACK. The client then does not send back
an ACK causing the server to allocate memory for the pending connection and
wait. This fills up the buffer space for SYN
messages on the target system, preventing other systems on the network from
communicating with the target system
4.Tear drop attack: This is an attack where fragmented packets are forged to
overlap each other when the receiving host tries to reessemble them. IP’ s packet
fragmentation algorithm is used to send corrupted packets to confuse the victim
and may hang the system. This attack can crash various OS due to a bug in their
TCP/IP fragmentation reassembly code. Windows and Linux OS are vulnerable to
this attack.
5.Smurf attack: This type of DoS attack that floods a target via spoofed
broadcast ping messages. This attack consist of a host sending an Internet Control
Message Protocol (ICMP) echo request to a network broadcast address. Every
host on the network receives the ICMP echo request ans sends back an ICMP echo
response. On a multi access broadcast network, hundreds of machines might reply
to each packet. This creates a magnified DoS attack of ping replies.
Human-based methods:
Theft of a purse or wallet: wallet often contains bank credit cards, debit
cards, driving license, medical insurance identity card and what not.
Pickpockets work on the street as well as in public transport and exercise
rooms to steal the wallets and in turn sell the personal information
Mail theft and rerouting: it is easy to steal the postal mails from mailboxes,
which has poor security mechanism and all the documents available to the
fraudster are free of charge, for eg. Bank mail, administrative forms or
partially completed credit offers.
Shoulder surfing: people who loiter around in the public facilities such as in
the cybercafes, near ATMs and telephone booths can keep an eye to grab
the personal details.
Pharming: the attackers setup typo or matching domain names of the target
and install websites with similar look and feel. Hence, even if the user
types-incorrect URL, the user gets the website with the same look and feel.
Redirectors: these are malicious programs that redirects user’s network
traffic to locations they did not intend to visit. For eg. Port redirection
program is loaded by compromising the server and all HTTP port 80
requests may be redirected to attacker.
Phishing is the use of social engineering tactics to trick users into revealing
confidential information
Methods of phishing
1.Dragnet
2.Road-and-reel
3. Lobsterpot
4.Gillnet
This method involves the use of spammed emails, bearing falsified
corporate identification (e.g. Corporate names, logos and trademarks),
which are addressed to a large group of people to websites or pop-up
windows with similarly falsifies identification.
Dragnet phishers do not identify specific prospective victims in advance.
Instead they rely on false information included in an email to trigger an
immediate response by victims.
2.Road-and-reel:
3.Lobsterpot:
4.Gillnet :
2.Filter Evasion
3.Website forgery
4.Flash Phishing
5.Social Phishing
6.Phone Phishing
URLs are the weblinks that direct the users to a specific website.
In phishing attacks, these URLs are misspelled, for example, instead of
www.abcbank.com, URL is provided as www.abcbank1.com.
Phishers use lobsterpot method of Phishing and make the difference of one
or two letters in the URLs, which is ignored by netizens.
2. Filter Evasion:
This technique use graphics (images) instead of text to obviate from netting
such E-Mails by anti-Phishing filters.
Internet explorer version 7 has inbuilt “Microsoft phishing filter”.
One can enable it during the installation or it can be enabled post
installation.
Firefox 2.0 and above has inbuilt “Google Phishing filter”, duly licensed
from Google.
It is enabled by default.
The Opera Phishing filter is dubbed Opera fraud protection and is included
in version 9.5+.
3.Website forgery:
In this technique the phishers directs the netizens to the website designed
and developed by him.
As the netizens logs into the fake/bogus website, phishers get the
confidential information very easily.
4. Flash Phishing:
Anti- Phishing toolbars are installed to help checking the webpage content
for signs of Phishing, but they do not analyse flash object at all.
5.Social Phishing:
Phishers entice the netizens to reveal sensitive data by other means and it
works in a systematic manner.
Phisher sends a mail as if it is sent by a bank asking to call them back
because there was a security breach.
The victim calls the bank on the phone numbers displayed in the mail.
The phone numbers provided in the mail is a false number and the victim
gets redirected to the phisher.
6.Phone Phishing:
Phishers can use a fake caller ID data to make it appear that the call is
received from a trusted organization to entice the user to reveal their
personal information such as account numbers and passwords.
It includes bank fraud, credit card fraud, tax refund fraud, mail fraud and
several more.
It occurs when a fraudster makes a use of someone else’s identifying details
such as name, SSN and bank account details, to commit fraud that is
detrimental to a victim’s finances.
In some cases the fraudster will completely take over a victim’s identity,
receive a home mortgage or even find employment in the victim’s name.
The process of recovering from the crime is often expensive, time
consuming an psychologically painful.
Many a times, before a crime is detected, the fraudster is capable of running
up hundreds to thousands of dollars worth of debt in the victim’s name.
This type of fraud often destroys a victim’s credit and it may take weeks,
months, or even years to repair.
This type of fraud occurs when a fraudster uses the victim’s name upon
an arrest or during a criminal investigation.
There have been several instances where victims of criminal ID theft do
not learn of an impersonation until being denied for employment or
terminated from a job.
The victims of this crime are left with the burden to clear their own
name in the eyes of the criminal justice system.
3.Identity Cloning:
4.Business ID theft:
Identity theft in the business context occurs most often when someone
knocks off the victim’s product and masquerades their shoddy gods as
victim’s.
It is a kind of intellectual property.
Parents might sometimes steal their children’s identity to open credit card
accounts, utility accounts, bank accounts and even take out loans or secure
leases because their own credit history is insufficient or too damaged to
open such accounts.