Cyber Security
Cyber Security
Cyber Security
It is a state or process of protecting networks, devices, and programs from any type of Cyber
Attack.
UNIT-I Introduction to
Cyber Security
• Cyber security is primarily
About people, processes, and technologies
working together to encompass the full range of
threat reduction.
• Cyber security is
the protection of Internet-connected systems,
including hardware, software, and data from cyber
attacks.
…Introduction to
Cyber Security
• It is made up of two words
1. Cyber and
2. Security.
• Cyber is related to the technology which contains systems,
network and programs or data.
• security related to the protection which includes systems
security, network security and application and information
security.
Necessity of Cyber Security
1. Injection vulnerabilities
2. Buffer Overflows
3. Sensitive Data Exposure
4. Broken Authentication and Session
Management
5. Security Misconfiguration.
1.Injection vulnerabilities
They occur every time an application sends
un trusted data to an interpreter.
• Most popular injection vulnerabilities affect
SQL, LDAP, XPath, XML parsers and program
arguments.
• The injection flaws are quite easy to discover
by analyzing the code, but frequently hard to
find during testing sessions when systems are
already deployed in production
environments.
Example to the dangers for the Internet- of
things devices like smart meters, routers,
web cameras and any other device that
runs software affected by this category of
flaws.
2. Buffer Overflows
It exists when an application attempts to
put more data in a buffer than it can hold.
So…Writing outside the space assigned to
buffer allows an attacker to overwrite the
content of adjacent memory blocks causing
data corruption, crash the program, or the
execution of an arbitrary malicious code.
• They are quite common and very hard to
discover, but respect the injection attacks
they are more difficult to exploit.
How the attacker attacks in this type …
The attacker needs to know the memory
management of the targeted application, the
buffers it uses, and the way to alter their
content to run the attack.In a classic attack
scenario, the attacker sends data to an application
that store it in an undersized stack buffer, causing
the overwriting of information on the call stack,
including the function’s return pointer. In this way,
the attacker is able to run its own malicious code.
• Types of buffer overflow…
o Heap buffer overflow
o Format string attack.
Buffer overflow attacks are particularly
dangerous. They can target desktop
applications, web servers, and web
applications. An attacker can exploit a
buffer overflow to target a web
application and execute an arbitrary code.
One can corrupt the execution stack of a
web application by sending specifically
crafted data.
3. Sensitive Data Exposure
• Deliberate actions
By insiders or outsiders that are taken intentionally
and are meant to do harm.
• Inaction
Generally by insiders, such as a failure to act in a
given situation, either because of a lack of
appropriate skills, knowledge, guidance, or
availability of the correct person to take action.
• Political motivations Examples:
Destroying, disrupting, or taking control of
targets. Espionage and making political
statements, protests, or retaliatory actions.
• Masquerade
Masquerade attack takes place when one
entity pretends to be different entity.
• Modification
It means that some portion of a message
is altered or that message is delayed or
reordered to produce an unauthorised
effect.
• Repudiation
This attack is done by either sender or
• Virus
• Worm
• Trojan
• Root kit
• Hybrids
• Scanner
• Hackers
Hardware attacks
Hardware attacks pertain to the
following devices…
• Access control systems such as
authentication tokens.
• Network appliances
• Industrial control systems.
• Surveillance systems
• Components of communication
infrastructure.
Lower level attacks
• Ticking time bombs
• Cheat codes
Motivations of hardware attacks
• Hardware cloning
• Breaking services, obtaining them with piracy
• Imitating user authentication for system
access
• Information leakage
• Unlocking devices, to gain access to an
internal shell or to increase control of a
system
• Unlocking hidden features
Spectrum of Attacks
Types of spectrum
• Anxiety, stress, and dissociation. Several types of
spectrum are in use in these areas.
• Obsessions and compulsions. An obsessive–
compulsive spectrum – this can include a wide
range of disorders .
• General developmental disorders. An autistic
spectrum – in its simplest form this joins together
autism and Asperger.
• Psychosis. The schizophrenia spectrum or psychotic
spectrum – there are numerous psychotic spectrum
disorders
Taxonomy of various attacks
overview regarding cyber attacks, and
to show some pragmatic ways to
classify them and organize them via
taxonomies.
• Cyber attack
An offensive action by a malicious actor that is
intended to undermine the functions of
networked computers and their related
resources, including unauthorized access,
unapproved changes, and malicious destruction.
Cyber Attack Malware Taxonomy
IP spoofing
• IP spoofing is the creation of Internet
Protocol (IP) packets which have a
modified source address in order to
either hide the identity of the sender,
to impersonate another computer
system, or both.
• It is a technique often used by bad
actors to invoke DDoS attacks against a
target device or the surrounding
infrastructure.
• IP Spoofing is analogous to an attacker
sending a package to someone with the
wrong return address listed.
• spoofing is also used to masquerade as
another device so that responses are sent
to that targeted device instead.
• Tangential to DDoS attacks, spoofing can
also be done with the aim of
masquerading as another device in order
to sidestep authentication and gain access
to or “hijack” a user’s session.
Protect against IP spoofing –
packet filtering
• Managed
At this level, the process is quantitatively
managed according to the agreed-upon
metrics.
• Optimizing
At the final stage, the process
management process includes deliver it
action to optimize and improve it.
Mitigating Security Risks