W7 Cybersecurity

Download as pdf or txt
Download as pdf or txt
You are on page 1of 23

Cybersecurity

Digital Technology for Business


BUS 2401
Ajarn Haha
Learning Objectives

01 02 03
Define Understand the Enumerate
cybersecurity. major activities of specific examples
a cybercrime. of the major
activities of a
cybercrime.
Cybersecurity

• mechanisms of protecting private data


and addressing criminal activity by using
networked technologies (cybercrime)
• “technology-as-instrument”
Cybercrime
activities
1. Cyber-enabled crimes
2. Cyber-dependent
crimes
3. National security
offences
Cyber-Enabled crimes

• crimes that can be committed with or without


the use of technology, but which are increased in
their scale or reach by the use of computers,
computer networks, and other technology.
Cyber-enabled crimes
Electronic Theft, Fraud, and Phishing
• Identity theft is provided as “obtaining or
possessing another person’s identity information
with the intent to use it to commit an indictable
offence.”
• Identity fraud involves fraudulently impersonating
someone “with the intent of gaining an advantage,
obtaining property, causing disadvantage to another,
or to avoid arrest or prosecution.
• using that other person’s identity, personal
information, signature, legal name, user name,
password, and etc.
Cyber-enabled crimes

Electronic Theft, Fraud, and Phishing

• Phishing refers to a target (or targets) of an identity theft or fraud are


contacted by email, telephone, or text message by someone posing as a
legitimate institution to lure those individuals into providing private data.

Intimate Images and Sexual Cybercrimes

• distribution of intimate images and other visual recordings; non-consensual


pornography or revenge porn; cyberbullying and online harassment
creation, distribution, or other interaction with child pornography.
Cyber-enabled
crimes
• Cyberbullying and Online
Harassment
• use of technology (like the
internet, social media, text
messaging, etc.) to harass,
threaten, intimidate,
embarrass or otherwise
harmfully target another
person, specific group, or
other identifiable entity.
Cyber-dependent
crimes
• can only be committed using
a computer, a computer
network, or other
information technology.
• seek to compromise the
confidentiality, integrity, and
availability of network
systems and data.
• “technology-as-target”
Reconnaissance
• Harvesting email addresses, conference information, etc.

Weaponization
• Coupling exploit with backdoor into deliverable payload.

Delivery
• Delivering the weaponized bundle to the victim via email, web, USB, etc.

Exploitation
• Exploiting a vulnerability to execute code on a victim’s system.

Installation

Martin’s 7 • Installing malware on the asset.

Command and Control (C2)


steps of • Command channel for remote manipulation of the victim.

cyberattack Actions of Objectives


• With full access and control, intruders accomplish their objectives.
Cyber-dependent crimes

1. Hacking
• someone exploiting a computer system or private network through a
computer to gain access to digital files or systems without permission
Hacking Activity Categories
• Unauthorized access - person gaining logical or physical access or entry to a
network, application, data, website, program, server, service, or other system,
without obtaining the proper permission or credentials to do so.
• Modification of data - act of changing, inserting, removing, and/or otherwise
altering data without authorization to do so.
Cyber-dependent crimes

1. Hacking
Hacking Activity Categories
• Impairment of data - transmission or communication of data is
disrupted.
• Data attenuation impairment – degradation of signal strength over a
transmission link because of distance.
• Delay distortion impairment - receiver clock deviates from an incoming
transmission signal at random making significant delays and early
transmission.
• Noise impairment - unwanted signal is inserted between transmission and
reception.
Cyber-dependent crimes

1. Hacking
Hacking Activity Categories
• Interception of data - data is intercepted during transmission,
allowing a hacker to gain access to data being transmitted
between machines.
• allow unauthorized users to access applications, network systems, and
environments.
• i.e. applications that examines data packets in the network and send
data to hackers, malware installation to execute cyberattack
Cyber-dependent crimes
2. Attacking (Cyber)
• any attempt—using one or more computers
against a single or multiple computers or
networks—to expose, alter, disable, destroy, steal
or gain information through unauthorized access
to or make unauthorized use of an asset, often in
the form of protected computers or networks.
• disable computers, steal data and information,
use breach computer as a launch point for
attacks.
Cyber-dependent crimes

2. Attacking (Cyber)
• Active attack - attempts to alter system
resources or affect their operation.
• Passive attack - attempts to learn or
make use of information from the
system but does not affect system
resources i.e. wiretapping, installation of
keystroke software
Cyber-dependent crimes
3. Malware (malicious software)
• types of software-based hacking and attacking
tools including adware, ransomware, spyware,
trojans, viruses, worms, and other types of harmful
software.
• Viruses - designed to spread outwardly from one
program to another and it has the ability to self-replicate.
• Worm - uses a computer network to spread itself, relying
on security failures on the target computer to access it.
Cyber-dependent crimes

3. Malware (malicious software)


• Logic bomb - piece of code,
intentionally inserted into a software
system, that is intended to set off a
malicious function when certain
specified conditions are met.
• logic bomb “explodes” when it
becomes triggered by a specific event
(time and event based)
Cyber-dependent crimes
3. Malware (malicious software)
• Mobile code - external code that is
transmitted and executed on a remote
machine and encompasses programs
that can be executed on multiple host
machines separate from the machine
on which they originated.
• can be transferred over a network
through storage media, or embedded
in emails, documents, or websites.
Cyber-dependent crimes

3. Malware (malicious software)


• Trojan – malware disguising as a legitimate program.
• Backdoors and trapdoors – hidden entrance to a computer system by
exploiting software vulnerabilities.
• Rootkit - remote administrative access to, and control over, a computer while
also disguising the presence of the tools on the target computer.
• Ransomware - used to lock, or disable user access to, a computer or network
system.
• Bot - application, software, or process that has been created expressly for the
purpose of automating repetitive tasks.
Cyber-dependent crimes
3. Malware (malicious software)
• Botnets - groups of connected computers or devices that perform a number of
repetitive tasks.
• Spammer - used to send massive amounts of unsolicited commercial electronic
messages to different addresses.
• Spyware - designed to steal information about online activities, frequently visited
sites, downloads by the user, usernames and passwords, security questions and
answers, banking and payment information, and emails—both sent and received—
via the targeted computer.
• Adware - advertising-supported software, generates revenue for its developers by
automatically generating advertisements on your screen, typically within a web
browser. Harmful ones can trigger harmful software downloads.
National cybersecurity
crimes
• referred to as “cyberterrorism,” are
umbrella terms for the commission of an
indictable offence for the benefit of, at the
direction of, or in association with, an
organization that commits a terrorist
activity or otherwise engages in terrorism,
either domestic or international.
• convergence of terrorism and cyberspace
Categories of Incursion

Cyberterrorism • unauthorized access and invasion attacks


targeting computer information systems,
infrastructures, computer networks, or
personal electronic devices.

Destruction

• process of destroying digital data to the point


where it becomes completely unreadable,
unaccessible, or able to be used for
unauthorized purposes.

Disinformation

• intentional dissemination of false information,


with an end goal of misleading, confusing, or
manipulating an audience.
Categories of Distributed Denial of Service
Cyberterrorism
• malicious actor seeks to shut down a
machine or network, making it
inaccessible or unavailable to its
intended users by temporarily or
indefinitely disrupting the services of
a host connected to the Internet.

Defacement of Websites

• malicious parties penetrate a website


and replace the site content with
their own messages.

You might also like