Network Snoofing
Network Snoofing
Network Snoofing
In the age of technical modernization, array of new opportunity and potential sources of
efficiency for organisations of all sizes emerge but these new technologies have also
brought unparalleled threats to economy and populace all over the world. Security
measures must be taken to ensure safety and reliability of organizations. Hacking of
data and information has become almost a practice in organizations. Therefore it is
necessary to understand the features of cyber security. Cyber security is described as
the protection of systems, networks and data in cyberspace. It is a critical concern for all
businesses. Cyber technology is documented as modern ways for investors and
common people to effortlessly, economically and efficiently access ample of source and
opportunities to accomplish their task. In parallel, it also attracts fraudsters to apply fake
schemes. Internet media is a major resource for developing serious crime. As Internet is
growing rapidly, online criminals try to present fraudulent plans in many ways. Cyber-
attacks are current method of creating fear in a technology driven world.
Cyber security is basically related to the internet. Since last many years, specialists and
policy makers have shown more concerns about protection of information and
communication technology systems from cyber attacks that are purposeful attempts by
unauthorized persons to access ICT systems in order to achieve the target of theft,
disturbance, damage, or other illegal actions. Cyber security is the detection, analysis
and mitigation of vulnerabilities and diminished trust in "virtual" computer-based entities
and services occurring because of globalisation of supply chains, exponentially
increasing intricacy of devices and computer code, increasingly open, global networks
and devices and accidental and purposeful exploitations and barriers by human and
institutional actors. Many professionals anticipate the number and severity of cyber
attacks to increase over the next several years.
Cybercrime:-
Cybercrime is crime committed on the Internet, on local networks, or even against
isolated computers. It can affect any of your digital devices (including PCs, notebooks,
smart TVs, tablets, smartphones, home electronic systems, etc). Cybercrime also refers
to any activity where crime is committed using any computer system.
Cyber criminals are publicly known as hackers, although the term is technically
inaccurate, the correct term is “cracker”.
Cybercrime Classification:-
Before defining the different types of cybercrime we should get familiar with the four
major cybercrime classifications. Categories of cyber crime are based on who’s affected
by the digital crime.
This is one of the most common types of cyber crime today. When a company’s online
presence or any of its products are hacked, it becomes a serious problem that can
result in a big number of consequences for the company, as well as their employees,
associates and customers. Examples include data breaches, cyber extortion and warez
distribution, etc.
This one affects society as a whole, for example: financial crimes against public
organizations, selling illegal products, trafficking, online gambling, forgery, etc.
This is one of the worst world’s worst types of cyber crime and can result in prosecution
by federal cybersecurity and law enforcement agencies. It’s also known as cyber
terrorism, and includes such activities as breaking into government systems and
networks, defacing and shutting down military websites, and spreading propaganda.
Now that you know the top classifications of cybercrime, let’s examine an important list
of computer crimes.
Here are some of the most common ways systems and networks get attacked every
day.
Identity theft
Also known as identity fraud, this is one of the worst scenarios that can befall a victim of
cybercrime. It starts with someone stealing your identity, allowing digital criminals to use
identifiable data including your name, driver’s license, social security information and
more — to commit fraud, steal property, misappropriate goods or use services in your
name.
Botnets
The word “botnet” comes from the roots “bot” and “network,” and it’s used to refer to a
large number of controlled computers (bots) linked over a network (Internet). These
botnets are used to spread malicious files and software, infect other systems, launch
DDoS attacks, steal data, send spam campaigns and more.
Cyberstalking
Social engineering
Social engineering is one of the most classic types of cyber attack that can be launched
against individuals or organizations. It involves manipulating people to get valuable
information that can later be used to illegally log into private protected systems or
networks. The primary motivation behind social engineering is often to steal money,
financial data (such as bank account or credit card information), and other sensitive
information from a company or customer.
Flood attacks
Flood attacks include DoS and DDoS attacks. They’re usually launched by botnets that
can target your domain names and IP addresses, in an effort to flood them with
malicious requests that overload the servers, leading to service failure and connectivity
interruption for valid, legitimate system users.
Potentially unwanted programs, also known as PUP, refers to software you never
officially requested, but has been installed nevertheless. This type of software usually
arrives bundled in other software that you actually have agreed to download. Most
victims of this type of attack can blame cracked/pirated software. Common examples of
this type of cybercrime are adware, spyware, dialers and malware.
Exploit kits
Exploit kits use a software toolkit to target vulnerabilities found in remote software. A
common example is the act of silently exploiting Flash or Java vulnerabilities in order to
hack a website, then redirecting traffic to malicious pages.
Phishing attacks
Phishing attacks are a form of social engineering used to trick users into providing their
login, password, and other sensitive/personal information.
Most phishing campaigns are performed by sending massive spam emails with links to
maliciously-hacked websites that look like real ones (such as financial institutions,
banks, online wallets, etc). Once users log into these fake websites, your login details
are stored in the attackers’ remote database. They can then use your credit card, bank
account or email services.
Illegal content
The Internet is full of illegal content: this includes all content prohibited by international
laws from around the world. Examples of illegal content include child and animal-related
sexual material, online prostitution services, selling drugs online and copyrighted
materials (such as videos, music, books, software, etc).
Online scams
Cyber scams, or online scams, involve fraudulent business offering fake services,
goods or rewards to unwitting victims. Examples of online scams are charity fraud,
gambling fraud, ponzi schemes, online ticket frauds, fake gift cards, automotive fraud
and more.
Cybersecurity:-
Cybersecurity refers to preventative methods used to protect information from being
stolen, compromised or attacked. It requires an understanding of potential information
threats, such as viruses and other malicious code. Cybersecurity strategies include
identity management, risk management and incident management.
Challenges of cyber security: There are some new risks to cyberspace such as smart
Phones pretence Security Challenges Development like smart phones and cloud
computing mean people are considering a whole new set of problem link to inter-
connectivity that required new regulation and new thinking. The cyber security issue is
quite similar in countries in world that use information and communication technology
because they deploy similar hardware and software. Some of the commonalities are
that all countries use TCP/IP as the protocols for communication, and all are dependent
on the same operating Systems (Windows, UNIX, Linux, and others), software
applications (Firefox, Skype, Microsoft Office and many others) and the large router
manufactures (Cisco and Juniper). Since the technology is analogous then the
problems created by the technology are also of same kind. The cyber security issue in
urbanized nations has been well recognized and it is a huge problem. Some problems
are associated to critical information infrastructure (CIIP), SCADA (supervisory control
and data acquisition) systems and government networks, while others are related to the
Internet infrastructure and host devices like desktop computers, smart phones, and
Internet enabled devices.
The massive information produced and stored by the vast numbers of machines that will
be connected to the Internet, will necessitate the development of security technologies
that remain efficient at this scale and that can detect potential risks among an ever-
expanding constellation of unstructured and highly heterogeneous datasets. This is a
major challenge in cyber security management. More connections also pose challenge
to cyber security. Each new object connected to the Internet will represent an additional
entry point to the digital ecosystem that will have to be secured. This will prove
particularly difficult for autonomous machines such as robots and smart meters that
operate in public spaces and can be easily tampered with, or for devices that are
produced in such large quantities that security features need to remain elementary to
reduce price (Roman et al., 2011).
Threats to Cyber Security: Threats to cyber security can be generally divided into two
general categories that include actions aimed at to damage or destroy cyber systems
that is cyber attacks and actions that try to exploit the cyber infrastructure for illegal or
damaging purposes without destructive or compromising that infrastructure that is cyber
exploitation. While some intrusions may not result in an instant impact on the operation
of a cyber-systems, such as when a Trojan Horse penetrates and establishes itself in a
computer, such intrusions are considered cyber-attacks when they can subsequently
permit actions that obliterate or corrupt the computer's capacities. Cyber exploitation
includes using the Internet and other cyber systems to commit fraud, to steal, to recruit
and train terrorists, to breach copyright and other rules limiting distribution of
information, to convey controversial messages that comprises of political and hate
speech and to put up for sale child pornography or other banned materials.
The matter of cyber security is prominent at global scale. Miscreants attack on
cyberspace in several ways. Many hackers are just copycats but not inventive. They try
to access any of a number of hacker websites to download malicious code (malware)
developed by other, even if the majority of the world's systems are previously
immunized against that particular attack. Another way that hackers gain illegal access to
a system is through social engineering. Social engineering denotes to deception against
other humans. A hacker may formulate a plan to trick another person into providing a
username and password. This is often accomplished by preying on the unsuspecting
individual's readiness to help or by taking advantage of a trusting relationship. Scanner
is one of the effectual tools that hackers use to obtain valuable information about
weaknesses in networks and systems. Other powerful way to attack on cyber security is
cracking password. Password cracking involves creating plain text passwords from their
cryptographic hashes. Once the plain text password is garnered, access can be had.
Password cracking can be done through a "dictionary" approach entails checking the
unencrypted result against a dictionary of words. A "hybrid" algorithm extends the
dictionary approach by adding numbers and special characters to the mix. Some
hackers use rule-based method when the executor knows information about the
organization's password policy, perhaps learned through social engineering.
IP spoofing is also used by hackers to disrupt the system which is a technique to gain
hidden, unauthorized access to a target resource. They do this by impersonating a
trusted resource. Particularly, a DoS attack may change address information in the IP
header of a message to make the target resource think the message is coming from a
recognized, friendly port. When this practice is deployed in at mass level, the attack can
effectively dominate the target machine's resources and make the machine lethargic or
stop processing altogether. Trojan Horses is well known hacking virus that corrupt the
computer system and it is very dangerous for cyberspace. "Trojan horse" to connote a
malicious, security breaking program that is disguised as something benign. Malicious
attacks follow a common process of events from origin to mission success: a target has
to be researched; the malware devised, delivered, installed and activated; the control
channel has to be established; and the mission itself must be completed. Such a
process goes by several names, most of which are a variant of "kill chain" because of
the many points or links in the chain.
Lifecycle of a cyber attack, often called a kill-chain
Antivirus is an effective cyber security management policy that checks the vulnerabilities
exist for an organization's resources before formalizing processes and procedures. This
is especially factual for exposures to the outside Internet, community. Once
weaknesses are acknowledged, the policy will specify both commercial and internally
developed solutions to avoid the introduction of malicious code on the company's
perimeter defence systems, servers and desktops, how deployment is to unfold, and
who is responsible for deployment. Incident handling also prevent cyber-attacks. Policy
must be devised to cover practical steps that an organization needs to take when a
cyber-security incident occurs. Recognized incident handling tasks are aimed first at
securing information assets, minimizing damage as speedily as possible. Backup and
Recovery also protect cyber threat. Policy needs to highlight the primary importance of
backup and recovery processes for desktops, file servers and mainframes.
Responsibilities should be clearly acknowledged. Batch processing and storage
capacity plans needs to be vital parts of the operational planning process. A plan for
disaster recovery from offsite backups should be considered.
This is a critical requirement for any computer system and application. Always keep
your OS system, services and applications updated to have the latest bugs and
vulnerabilities patched.
This advice applies to smart phones, tablets, local desktop computers, notebooks,
online servers and all applications they run internally.
Most operating systems include a full pre-configured firewall to protect against malicious
packets from both the inside and the outside. A system firewall will act as the first digital
barrier whenever someone tries to send a bad packet to any of your open ports.
Use different/strong passwords
Never use the same password on more than one website, and always make sure it
combines letters, special characters and numbers.
The best way to sort this out is to use a password manager like 1Password, LastPass or
Keepass, which will help you generate strong passwords for each website, and at the
same time store them in an encrypted database.
This is an excellent measure for both desktop and corporate users. Keeping antivirus
and anti-malware software up to date and running scans over local storage data is
always recommended. While free antivirus/antimalware solutions can be helpful they
are often merely trial software, and don’t offer full protection against most common
virus/malware and other network threats.
There are numerous options for Windows, and one of the best is the Windows Malware
Removal Tool. Linux and Unix systems also offer excellent choices such as the all-
mighty ClamAV, LMD, Chkrootkit, Rootkit Hunter, and others.
A lot of computer hacking takes place whenever you open an unsolicited email
containing suspicious links or attachments. First things first: enable the anti-spam
feature of your email client; and second (and most important): never open links or
attachments from unsolicited recipients. This will keep you safe from phishing attacks
and unwanted infections.
Nowadays most online-based services and products offer two-factor authentication (with
Authy, Google Authenticator, etc). These security mechanisms let you add a second
layer of authentication, so even if an attacker should steal your username and
password, he’ll be prevented from logging into your online accounts because he doesn’t
have the 2FA code sent to, generated by or created in your computer.
Digital crime doesn’t only occur on the Internet — suppose someone breaks into your
house and steals your notebook. That’s why the best way to protect your data will
always be to encrypt your hard drive, so in case criminals want to take a look at your
drive content, they won’t be able to. You’ll be the only one with the correct key to unlock
it.
We’ve seen that not all SSL-based websites are actually secure. To prevent you from
being a victim of man-in-the-middle attacks and crimes against your credit cards or
online wallets, first make sure that the site you’re shopping on is encrypted with HTTPS.
Also make sure you’re shopping on a well-known site, such as Amazon, Ebay, Walmart,
etc.
To protect your registered domain names, the best thing is to enable WHOIS protection
for all of them. This lets you remain hidden, without revealing your name, address, city,
country telephone number and email address.
While using a private WHOIS service will not help you fully prevent domain hijacking, it
can definitely help you protect your personal and private details.
DNS hijacking is becoming a common threat these days. That’s why using a private
and secure DNS can be one of the best things around for preventing unwanted third
party attacks, at the same time preventing the government and ISPs from browsing your
host communication historical records.
Use a VPN
VPN services are becoming more popular every year, and it’s completely natural to use
one if you plan on keeping third party companies (especially your ISP) from spying on
your online activities. Another reason to use a VPN may be to log into your secure
network from a remote place, including when you use untrustworthy internet
connections on the road while travelling, or when you are merely away from home.
By using a PGP key you can ensure your email will only be read by its intended
recipient. PGP helps you sign, encrypt and decrypt texts, emails, files and much more,
so you can increase the security of your email communications.
Sometimes local network breaches don’t come from your computer, but from your
children’s tablets, phones or notebooks. Educate your children to prevent them from
falling victim to cyber criminals, by using the same tips we’ve shared with you. While
we’re pretty sure most teenagers and children will not use PGP encryption, the rest of
the tips can be easily applied to any of your kids.
Also, remember to browse their online historical activities in the browser, social
networks and emails, just to keep them safe from anyone with bad intentions. It’s never
a bad idea to use parental control software to protect them from any threat.
Conclusion
As long as there’s cyberspace, there will always be cybercrime. It’s a cruel reality, but
part of human nature.
There are lots of ways one can become a victim of cybercrime. Fortunately, we’ve
shared some interesting tips that will likely reduce your chances of getting attacked by
malicious users.
We’re happy we could help with some basic information about cybersecurity. Now, do
you really want to prevent cyber crime in your organization? Try our free Security API
service — start exploring your attack surface today, and learn how much data you’re
exposing to the Internet by auditing your DNS, IP addresses, domain names, SSL
certificates and open ports.