BCA 6002_UNIT 2
BCA 6002_UNIT 2
Internet security refers to the protection of systems, networks, and data from
cyber threats. It encompasses various technologies, processes, and practices
designed to safeguard sensitive information and prevent unauthorized access,
attacks, and damage to digital infrastructure.
Threats are actions carried out primarily by hackers or attackers with malicious
intent, to steal data, cause damage, or interfere with computer systems. A
threat can be anything that can take advantage of a vulnerability to breach
security and negatively alter, erase, or harm objects. A threat is any potential
danger that can harm your systems, data, or operations. In cybersecurity,
threats include activities like hacking, malware attacks, or data breaches that
aim to exploit vulnerabilities.
Types of Threats:
A security threat is a threat that has the potential to harm computer systems
and organizations. The cause could be physical, such as a computer
containing sensitive information being stolen. It’s also possible that the cause
isn’t physical, such as a viral attack.
1. Physical Threats: A physical danger to computer systems is a potential
cause of an occurrence/event that could result in data loss or physical damage.
It can be classified as:
Internal: Short circuit, fire, non-stable supply of power, hardware failure
due to excess humidity, etc. cause it.
External: Disasters such as floods, earthquakes, landscapes, etc. cause it.
Human: Destroying of infrastructure and/or hardware, thefts, disruption,
and unintentional/intentional errors are among the threats.
2. Non-physical threats: A non-physical threat is a potential source of an
incident that could result in:
Hampering of the business operations that depend on computer systems.
Sensitive – data or information loss
Keeping track of other’s computer system activities illegally.
Hacking id & passwords of the users, etc.
The non-physical threads can be commonly caused by:
(i) Malware: Malware (“malicious software”) is a type of computer program
that infiltrates and damages systems without the users’ knowledge. Malware
tries to go unnoticed by either hiding or not letting the user know about its
presence on the system. You may notice that your system is processing at a
slower rate than usual.
(ii) Virus: It is a program that replicates itself and infects your computer’s
files and programs, rendering them inoperable. It is a type of malware that
spreads by inserting a copy of itself into and becoming part of another
program. It spreads with the help of software or documents. They are
embedded with software and documents and then transferred from one
computer to another using the network, a disk, file sharing, or infected e-mail.
They usually appear as an executable file.
(iii) Spyware: Spyware is a type of computer program that tracks, records,
and reports a user’s activity (offline and online) without their permission for
the purpose of profit or data theft. Spyware can be acquired from a variety of
sources, including websites, instant chats, and emails. A user may also
unwittingly obtain spyware by adopting a software program’s End User
License Agreement.
Adware is a sort of spyware that is primarily utilized by advertising. When
you go online, it keeps track of your web browsing patterns in order to
compile data on the types of websites you visit.
(iv) Worms: Computer worms are similar to viruses in that they replicate
themselves and can inflict similar damage. Unlike viruses, which spread by
infecting a host file, worms are freestanding programs that do not require a
host program or human assistance to proliferate. Worms don’t change
programs; instead, they replicate themselves over and over. They just eat
resources to make the system down.
(v) Trojan: A Trojan horse is malicious software that is disguised as a useful
host program. When the host program is run, the Trojan performs a
harmful/unwanted action. A Trojan horse, often known as a Trojan, is
malicious malware or software that appears to be legal yet has the ability to
take control of your computer. A Trojan is a computer program that is
designed to disrupt, steal, or otherwise harm your data or network.
(vi) Denial Of Service Attacks: A Denial of Service attack is one in which
an attacker tries to prohibit legitimate users from obtaining information or
services. An attacker tries to make a system or network resource unavailable
to its intended users in this attack. The web servers of large organizations
such as banking, commerce, trading organizations, etc. are the victims.
(vii) Phishing: Phishing is a type of attack that is frequently used to obtain
sensitive information from users, such as login credentials and credit card
details. They deceive users into giving critical information, such as bank and
credit card information, or access to personal accounts, by sending spam,
malicious Web sites, email messages, and instant chats.
(viii) Key-Loggers: Keyloggers can monitor a user’s computer activity in
real-time. Keylogger is a program that runs in the background and records
every keystroke made by a user, then sends the data to a hacker with the intent
of stealing passwords and financial information.
1. Hacking
Types of Cracking
(a) Password Cracking
(b) Software cracking
(c) Network cracking
(d) Application cracking
(e) Wireless cracking
Password Cracking
Password cracking refers for Finding password from stored data.This is the
most typical techniques for password cracking.
Brute force cracking: Until it finds a match the cracking algorithm outputs
random sequences of characters.
Dictionary cracking: This is similar to brute-force cracking tictionary
tracking restrict itself to words rather than utilising random letters.
Rainbow table cracking : It is used to determine the encryption used to
hash a password, a rainbow table leverages previously computed hashed
values.
Software Cracking
Software cracking is the process of modifying software to completely or
partially eliminate one or more of its functions. At least one of the
following tools or methods is used in the majority of software cracking.
Network Cracking
Network cracking is when a LAN, or “local area network,” is breached by an
outsider. A wireless network can be cracked considerably more easily than
a cable one since the cracker only has to be in close proximity to the
wireless signal. The Wi-fi system in your house is a typical illustration of a
wireless LAN. Cracking a wired network requires a direct connection, but
cracking a wireless network is much more convenient, because the cracker
just needs to be close to the wireless signal.
Application Cracking
Application cracking refers to the process of modifying software to remove
or disable its copy protection or licensing mechanisms. Application
cracking can also be used as a method of bypassing authentication
mechanisms and gaining access to otherwise secure systems.This involves
exploiting vulnerabilities in software applications to bypass authentication
mechanisms, access sensitive data or execute arbitrary code. Application
cracking poses several risks.
Wireless Cracking
Wireless cracking is a form of cyber attack that involves gaining
unauthorized access to a wireless network by exploiting vulnerabilities in
its security protocols. This type of attack is particularly relevant in the
context of Wi-Fi networks, which are widely used in homes, businesses,
and public places. Wireless cracking can be used for a variety of purposes,
including stealing sensitive information, intercepting communications, and
launching other types of attacks on the network or its users.
3. Sneaking
4. Viruses
Common Viruses
1. File Infector Virus – Attaches to executable files and spreads when they run.
2. Boot Sector Virus – Infects the system’s boot sector, making it hard to remove.
3. Macro Virus – Spreads through documents (like Word or Excel) using macros.
4. Polymorphic Virus – Changes its code to avoid detection by antivirus software.
5. Resident Virus – Hides in a computer’s memory and infects files over time.
Advanced Viruses
6. Worms – Self-replicating malware that spreads across networks without a host file.
7. Trojan Horse – Disguised as legitimate software but contains malicious code.
8. Ransomware – Encrypts files and demands payment for decryption.
9. Spyware – Secretly collects user data, including passwords and browsing history.
10. Rootkit Virus – Gives hackers hidden control over a system.
5. Trojan Horses
Types of Trojans:
1. Backdoor Trojan
Opens a "backdoor" for hackers to remotely control the system.
Used for spying, stealing data, or launching further attacks.
2. Banking Trojan
Steals banking credentials and financial data from users.
Targets online banking transactions.
3. Downloader Trojan
Installs additional malware onto the infected device.
Often used as an entry point for ransomware or spyware.
4. Rootkit Trojan
Hides deep in the system, making it difficult to detect.
Allows attackers long-term access and control over a device.
8. Logic Bombs
Script Kiddies are inexperienced hackers who use pre-written scripts, tools,
and exploits developed by skilled hackers. They lack in-depth technical
knowledge and often carry out cyberattacks for fun or notoriety rather than
personal gain.
A Script Kiddie (or Skiddie) is an unskilled cyber attacker who uses pre-made
hacking tools, scripts, and exploits developed by professional hackers. These
individuals have little to no technical expertise and rely on automated programs
to launch cyberattacks.
Types of Vulnerabilities
1. Software Vulnerabilities
Unpatched Software – Old versions of software with security flaws.
Zero-Day Vulnerability – A newly discovered flaw with no fix
available.
2. Network Vulnerabilities
Unsecured Wi-Fi – Open or weakly protected networks can be hacked.
Man-in-the-Middle Attack – Hackers intercept communication between
devices.
3. Hardware Vulnerabilities
Outdated Devices – Old hardware may lack security updates.
USB Attacks – Malicious USB drives can inject malware.
4. Human-Related Vulnerabilities
Weak Passwords – Easy-to-guess passwords make accounts vulnerable.
Phishing Attacks – Tricking users into revealing sensitive information.
5. Web & Application Vulnerabilities
SQL Injection – Hackers inject malicious code into databases.
Cross-Site Scripting (XSS) – Injects harmful scripts into websites.
6. Cloud Security Vulnerabilities
Misconfigured Cloud Settings – Leads to data leaks.
Weak API Security – Can allow unauthorized access to cloud data.