You are on page 1of 8

Cyber Security is a very broad term but is based on three fundamental concepts known as “The CIA

Triad“.
It consists of Confidentiality, Integrity, and Availability. This model is designed to guide the
organization with the policies of Cyber Security in the realm of Information security.

Confidentiality
It defines the rules that limit access to information. Confidentiality takes on the measures to restrict
sensitive information from being accessed by cyber attackers and hackers.
In an organization, people are allowed or denied access to information according to its category by
authorizing the right persons in a department. They are also given proper training about the sharing
of information and securing their accounts with strong passwords.

They can change the way data is handled within an organization to ensure data protection. There are
various ways to ensure confidentiality, like two-factor authentication, data encryption, data
classification, biometric verification, and security tokens.

Integrity
This assures that the data is consistent, accurate, and trustworthy over its time period. It means that
the data within the transit should not be changed, altered, deleted, or illegally being accessed.
Proper measures should be taken in an organization to ensure its safety. File permissions and user
access control are the measures controlling the data breach. Also, tools and technologies should be
implemented to detect any change or a breach in the data. Various organizations use a checksum and
even cryptographic checksum to verify the integrity of data.
To cope with data loss or accidental deletion, or even cyber attacks, regular backups should be there.
Cloud backups are now the most trusted solution for this.

Availability
Availability in terms of all necessary components like hardware, software, networks, devices, and
security equipment should be maintained and upgraded. This will ensure the smooth functioning and
access of Data without any disruption. Also, providing constant communication between the
components through providing enough bandwidth.

It also involves opting for extra security equipment in case of any disaster or bottlenecks. Utilities
like firewalls, disaster recovery plans, proxy servers, and a proper backup solution should ensure to
cope with DoS attacks.
For a successful approach, it should go through multiple layers of security to ensure protection to
every constituent of Cyber Security. Particularly involving computers, hardware systems, networks,
software programs, and the shared data.

Page | 1
Authentication

The process of authentication in the context of computer systems means assurance and confirmation
of a user's identity. Before a user attempts to access information stored on a network, he or she must
prove their identity and permission to access the data. When logging onto a network , a user must
provide unique log-in information including a user name and password, a practice which was
designed to protect a network from infiltration by hackers. Authentication has further expanded in
recent years to require more personal information of the user, for example, biometrics, to ensure the
security of the account and network from those with the technical skills to take advantage of
vulnerabilities.

Authorization

Authorization is a security mechanism to determine access levels or user/client privileges related to


system resources including files, services, computer programs, data and application features. This is
the process of granting or denying access to a network resource which allows the user access to
various resources based on the user's identity.

Authentication Authorization

Authentication verifies who the user is. Authorization determines what resources a user can
access.

Authentication works through passwords, one-time pins, Authorization works through settings that are
biometric information, and other information provided or implemented and maintained by the organization.
entered by the user.

Authentication is the first step of a good identity and access Authorization always takes place after authentication.
management process.

Authentication is visible to and partially changeable by the Authorization isn’t visible to or changeable by the user.
user.

Example: By verifying their identity, employees can gain Example: Once their level of access is authorized,
access to an HR application that includes their personal pay employees and HR managers can access different levels
information, vacation time, and 401K data. of data based on the permissions set by the organization.

Cyber crime

Cybercrime is any criminal activity that involves a computer, networked device or a network.

Page | 2
While most cybercrimes are carried out in order to generate profit for the cybercriminals, some
cybercrimes are carried out against computers or devices directly to damage or disable them. Others
use computers or networks to spread malware, illegal information, images or other materials. Some
cybercrimes do both -- i.e., target computers to infect them with a computer virus, which is then
spread to other machines and, sometimes, entire networks.

A primary effect of cybercrime is financial. Cybercrime can include many different types of profit-
driven criminal activity, including ransom ware attacks, email and internet fraud, and identity fraud,
as well as attempts to steal financial account, credit card or other payment card information.

Types of Cyber Criminals

Cyber criminals, also known as hackers, often use computer systems to gain access to business trade
secrets and personal information for malicious and exploitive purposes. Hackers are extremely
difficult to identify on both an individual and group level due to their various security measures, such
as proxies and anonymity networks, which distort and protect their identity. Cybersecurity experts
assert that cyber criminals are using more ruthless methods to achieve their objectives and the
proficiency of attacks is expected to advance as they continue to develop new methods for cyber
attacks. The growth of the global cyber criminal network, which is largely credited to the increased
opportunity for financial incentives, has created a number of different types of cyber criminals, many
of which pose a major threat to governments and corporations.

1. Identity Thieves

Identity thieves are cyber criminals who try to gain access to their victims’ personal information –
name, address, and phone number, place of employment, bank account, credit card information and
social security number. They use this information to make financial transactions while impersonating
their victims. Identity theft is one of the oldest cyber crimes, gaining prominence during the early
years of the Internet. Initially, these cyber criminals leveraged basic hacking techniques, such as
modifying data and leveraging basic identity fraud to uncover the desired information. Today, the
practice has progressed in scope and technique due to advances in computing, and now, many
identity thieves can hack into a government or corporate database to steal a high-volume of identities
and personal information. This expansion of strategy has resulted in major losses for companies and
consumers, with recent studies indicating that approximately $112 billion has been stolen by identity
thieves over the past six years.

2. Internet Stalkers

Internet stalkers are individuals who maliciously monitor the online activity of their victims to
terrorize and/or acquire personal information. This form of cyber crime is conducted through the use
of social networking platforms and malware, which are able to track an individual’s computer
activity with very little detection. The motives for such attacks can differ depending on the cyber
criminal, but many internet stalkers seek to acquire important information that they can use for
bribery, slander, or both. Businesses should be aware of internet stalkers, as well as the strategies that
Page | 3
they utilize, in case their employees are ever victims of this cyber attack. If left unaddressed, internet
stalkers could cause emotional distress to the team or even obtain data for blackmail.

3. Phishing Scammers

Phishers are cyber criminals who attempt to get hold of personal or sensitive information through
victims’ computers. This is often done via phishing websites that are designed to copycat small-
business, corporate or government websites. Unsuspecting computer users often fall prey to such
activities by unknowingly providing personal information including home addresses, social security
numbers, and even bank passwords. Once such information is obtained, phishes either use the
information themselves for identity fraud scams or sell it in the dark web. It’s important for
businesses to constantly be aware of phishing scams, particularly scams that may be trying to
copycat their own business site. Such sites can tarnish the company’s reputation and brand, which
could potentially lead to a decrease in earnings.

4. Cyber Terrorists

Cyber terrorism is a well-developed, politically inspired cyber attack in which the cyber criminal
attempts to steal data and/or corrupt corporate or government computer systems and networks,
resulting in harm to countries, businesses, organizations, and even individuals. The key difference
between an act of cyber terrorism and a regular cyber attack is that within an act of cyber terrorism,
hackers are politically motivated, as opposed to just seeking financial gain.

Cyber Crime Techniques

There are a number of techniques that cyber criminals leverage to access personal and private
networks. Some of the most common include:

Botnet – a strategically developed network of bots which crawl the backend of the web to spread
malware with very little detection.

Zombie Computer – a computer which is deliberately hacked by cyber criminals in order to gain
access to and/or attack a private network.

Distributed Denial of Service (DDoS) – with a DDoS attack, cyber criminals are not necessarily
seeking to access data, but rather are hoping to shut down a network via an overload of junk data. An
example of a DDoS attack occurred on Friday, October 21, 2016, when cyber criminals shut down a
number of highly utilized websites, including Twitter, Spottily, and Amazon.

Metamorphic Malware – one of the more advanced techniques, metamorphic malware, repeatedly
adjusts its code, making it extremely difficult to detect by even the most advanced anti-virus
software. Experts predict that by the end of 2017, there will be an emergence of malware that can
infiltrate networks, steal information and cover up their activities. These forms of malware will make
it difficult for government agencies and businesses to establish the extent to which data has been
tampered with, as well as prevent law enforcement from pursuing and prosecuting the offenders.
Page | 4
Types of Cyber crimes

Child Pornography OR Child sexually abusive material (CSAM)

Child sexually abusive material (CSAM) refers to a material containing sexual images in any form,
of a child who is abused or sexually exploited. Section 67 (B) of the IT Act states that “it is
punishable for publishing or transmitting of material depicting children in the sexually explicit act,
etc. in electronic form.

2. Cyber Bullying

A form of harassment or bullying inflicted through the use of electronic or communication devices
such as computers, mobile phones, laptops, etc.

3. Cyber Stalking

Cyber stalking is the use of electronic communication by a person to follow a person, or attempts to
contact a person to foster personal interaction repeatedly despite a clear indication of disinterest by
such person; or monitors the internet, email or any other form of electronic communication commits
the offence of stalking.

4. Cyber Grooming

Cyber Grooming is when a person builds an online relationship with a young person and tricks or
pressures him/ her into doing a sexual act.

5. Online Job Fraud

Online Job Fraud is an attempt to defraud people who are in need of employment by giving them
false hope/ promise of better employment with higher wages.

6. Online Sextortion

Online Sextortion occurs when someone threatens to distribute private and sensitive material using
an electronic medium if he/ she don’t provide images of a sexual nature, sexual favours, or money.

7. Phishing

Phishing is a type of fraud that involves stealing personal information such as Customer ID, IPIN,
Credit/Debit Card number, Card expiry date, CVV number, etc. through emails that appear to be
from a legitimate source.

8. Vishing

Page | 5
Vishing is an attempt where fraudsters try to seek personal information like Customer ID, Net
Banking password, ATM PIN, OTP, Card expiry date, CVV etc. through a phone call.

9. Smishing

Smishing is a type of fraud that uses mobile phone text messages to lure victims into calling back on
a fraudulent phone number, visiting fraudulent websites or downloading malicious content via phone
or web.

10. Sexting

Sexting is an act of sending sexually explicit digital images, videos, text messages, or emails, usually
by cell phone.

11. SIM Swap Scam

SIM Swap Scam occurs when fraudsters manage to get a new SIM card issued against a registered
mobile number fraudulently through the mobile service provider. With the help of this new SIM
card, they get One Time Password (OTP) and alerts, required for making financial transactions
through the victim’s bank account. Getting a new SIM card against a registered mobile number
fraudulently is known as SIM Swap.

12. Credit Card Fraud or Debit Card Fraud

Credit card (or debit card) fraud involves the unauthorized use of another’s credit or debit card
information for the purpose of purchases or withdrawing funds from it.

13. Impersonation and identity theft

Impersonation and identity theft is an act of fraudulently or dishonestly making use of the electronic
signature, password or any other unique identification feature of any other person.

14. Spamming

Spamming occurs when someone receives an unsolicited commercial message sent via email, SMS,
MMS and any other similar electronic messaging media. They may try to persuade the recipient to
buy a product or service, or visit a website where he can make purchases, or they may attempt to
trick him/ her into divulging bank account or credit card details.

15. Ransom ware

Ransom ware is a type of computer malware that encrypts the files, storage media on communication
devices like desktops, Laptops, Mobile phones etc., holding data/information as a hostage. The
victim is asked to pay the demanded ransom to get his device decrypts

16. Viruses, Worms, and Trojans

Page | 6
A computer virus is a program written to enter your computer and damage/alter your files/data and
replicate itself.

Worms are malicious programs that make copies of themselves again and again on the local drive,
network shares, etc.

A Trojan horse is not a virus. It is a destructive program that looks like a genuine application. Unlike
viruses, Trojan horses do not replicate themselves but they can be just as destructive. Trojans open a
backdoor entry to your computer which gives malicious users/programs access to your system,
allowing confidential and personal information to be theft.

17. Data Breach

A data breach is an incident in which information is accessed without authorization.

18. Denial of Services (DoS) attack

A denial of Services (DoS) attack is an attack intended for denying access to computer resources
without the permission of the owner or any other person who is in charge of a computer, computer
system or computer network.

A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable
by overwhelming it with traffic from multiple sources.

19. Website Defacement

Website Defacement is an attack intended to change the visual appearance of a website and/ or make
it dysfunctional. The attacker may post indecent, hostile and obscene images, messages, videos, etc.

20. Cyber-Squatting

Cyber-Squatting is an act of registering, trafficking in or using a domain name with an intent to profit
from the goodwill of a trademark belonging to someone else.

21. Pharming

Pharming is a cyber-attack aiming to redirect a website’s traffic to another, bogus website.

22. Crypto jacking

Crypto jacking is the unauthorized use of computing resources to mine crypto currencies.

23. Online Drug Trafficking

Online Drug Trafficking is a crime of selling, transporting, or illegally importing unlawful controlled
substances, such as heroin, cocaine, marijuana, or other illegal drugs using electronic means.

24. Espionage
Page | 7
Espionage is the act or practice of obtaining data and information without the permission and
knowledge of the owner.

Page | 8

You might also like