Sei sulla pagina 1di 12

CYBER CRIME AND CYBER SECURITY Abstract

The term computer security is used frequently, but the content of a computer is vulnerable to few risks unless the computer is connected to other computers on a network. As the use of computer networks, especially the Internet, has become pervasive, the concept of computer security has expanded to denote issues pertaining to the networked use of computers and their resources. The major technical areas of computer security are usually represented by the initials CIA: confidentiality, integrity, and authentication or availability. Confidentiality means that information cannot be access by unauthorized parties. Confidentiality is also known as secrecy or privacy; breaches of confidentiality range from the embarrassing to the disastrous. Integrity means that information is protected against unauthorized changes that are not detectable to authorized users; many incidents of hacking compromise the integrity of databases and other resources. Authentication means that users are who they claim to be.

While computers and the Internet have made our lives easier in many ways, it is unfortunate that people also use these technologies to take advantage of others. When the individual is the main target of Cybercrime, the computer can be considered as the tool rather than the target. Human weaknesses are generally exploited. The damage dealt is largely psychological and intangible, making legal action against the variants more difficult. These are the crimes which have existed for centuries in the offline. These crimes are committed by a selected group of criminals These crimes are relatively new, having been in existence for only as long as computers have - which explains how unprepared society and the world in general is towards combating these crimes. This is where the role of Computer Security comes in. Computer security is a branch of technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. While Network security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the networkaccessible resources from unauthorized access, and consistent and continuous monitoring and measurement of its effectiveness (or lack) combined together.

INTRODUCTION

Cybercrime is defined as crimes committed on the internet using the computer as either a tool or a targeted victim. Cybercrime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet.

HISTORY OF CYBER CRIME


Cybercrime has had a short but highly eventful history. Apart from being an interesting study by itself, observing the history of cybercrime would also give the individual and society the opportunity to avoid the mistakes made in the past. Here are the highlights to how this cyber termite has engulfed our cyber world. 1971 y John Draper discovers the give-away whistle in Cap'n Crunch cereal boxes reproduces a 2600Hz tone. Draper builds a blue box that, when used with the whistle and sounded into a phone receiver, allows phreaks to make free calls. Esquire publishes "Secrets of the Little Blue Box" with instructions for making one. Wire fraud in the US escalates. A rogue program called the Creeper spreads through early Bulletin Board networks

After many break-ins into govt. and corporate computers, Congress passes the Computer Fraud and Abuse Act,

1988 y Kevin Mitnick secretly monitors the e-mail of MCI and DEC security officials. He is convicted and sentenced to a year in jail. Kevin Poulsen is indicted on phonetampering charges. He goes on the run and avoids capture for 17 months. First National Bank of Chicago is the victim of $70-million computer theft. Robert T. Morris, Jr., graduate student at Cornell University and son of a chief scientist at the NSA, launches a selfreplicating worm (the Morris Worm) on the government's Arpanet (precursor to the Internet). The worm gets out of hand and spreads to over 6000 networked computers, clogging government and university systems. Morris is dismissed from Cornell, sentenced to three years' probation, and fined $10K.

y y

1972 y The Internetworking Working Group is founded to govern the standards of the Internet. Vinton Cerf is the chairman and is known as a "Father of the Internet.

1991 y Kevin Poulsen is captured and indicted for selling military secrets.

1992 y Dark Avenger releases 1st polymorphic virus.

1982 y y Elk Cloner, an AppleII boot virus, is written.

1993 Hacker magazine 2600 begins publication (still in print; see Captain Crunch for the derivation of the name). y During radio station call-in contests, hackerfugitive Kevin Poulsen and friends rig the stations' phone systems to let only their calls through. They win two Porsches, vacation trips and $20,000. First DefCon hacker conference held in Vegas.

1985 y Online hacking established. magazine Phrack y

1986 y Pakistani Brain, the oldest virus created under unauthorized circumstances, infects IBM computers.

2007 y Retailer TJMaxx (Winners, Homesense) notifies consumers that server breaches between July 2005 and January 2007 had exposed personal data (45M+ debit and credit cards, $180M direct cost so far) (Jan).

y y

y y

y y

Payment services firm MoneyGram notifies consumers that server breaches exposed personal data (80K) (Jan). Nokia Canada Web Site defaced using an XSS attack (Jan). A priority code used to get a free platinum pass to MacWorld was validated on the client, enabling anyone get free passes (Jan) (A similar hack works in 2008). Online payment services firm E-Gold charged with money-laundering (Apr) (convicted in 2008) AGs from several US States demand that NewsCorps social networking site MySpace provide list of sex offenders who have registered at the site (May). The Chinese government and military are accused of hacking other nations networks, including US pentagon networks, and German and UK government computers. DoS attacks are launched against various government websites in Estonia, including the countrys police, Min. of Finance and parliament (May). Oracle files lawsuit against SAP, charging that the company's TomorrowNow subsidiary had inappropriately downloaded software patches and documents from Oracle's online support service (Mar). Monster.com and other job sites are hacked and resume information stolen (Aug). Hackers post sensitive information on 1.2K e-Bay users to forum for preventing fraud on the auction site (Sep) TD Ameritrade announces that a compromised company computer had leaked the e-mail addresses of all its 6.3M customers from July 2006 (used for pump and dump spam). E*Trade suffers from similar attack (Sep). US Secret Service arrest security consultant Max Ray Butler (Max Vision) for managing an identity theft ring on the online credit-counterfeiting forum, CardersMarket (Sep) A known vulnerability in the helpdesk software used by hosting provider Layered Technologies results in information leakage, including names, addresses, phone numbers and email addresses of up to 6,000 of the company's clients (Sep). A hacker exploits a leftover admin function on eBay to block users and close sales (Oct). The Storm Worm (a bot program first spotted in Jan), continues to spread spam,

promote pump&dump schemes; hides bot computers with DNS fluxing, launches DoS attacks against machines probing its bots. Russian Business Network (RBN) offers bulletproof hosting, allowing sites which host illegal content to stay online despite legal takedown attempts. Septs attack on Bank of India, various MPack attacks use RBN services. (Oct) A flaw in Passport Canada's website allows access to the personal information - social insurance numbers, dates of birth and driver's licence numbers of other people applying for new passports (Nov). Infamous Russian malware gang RBN use SQL injection to penetrate US government sites (Nov). A vulnerability in Word Press allows spammers to penetrate Al Gores web site, modify pages, and post spam comments (Nov) John Schiefer (LA) admits to using botnets to illegally install software on at least 250K machines and steal the online banking identities of Windows users. (Dec)

2008 y FTC settles with Life is Good (www.lifeisgood.com), which exposed credit card information due to SQL Injection flaw (Jan) Login page of Italian bank (Banca Fideuram) replaced using XSS (Jan) RIAA website DoSed, then defaced, using SQL Injection&XSS (Jan) CSRF used to hack a Korean e-commerce site (Auction.co.kr) and steal information on 18M users (Feb) MySpace and FaceBook private pictures exposed on-line using URL manipulation (Jan & Mar) Hackers steal 4.2M card numbers of Hannaford shoppers, resulting in over 2000 fraud cases (Mar) SQL and iFrame Injection are used to add JavaScript code to websites which then download viruses and other malware from hacker sites when browsed. Search Engine Optimization (SEO) techniques result in infected pages being placed high on Googles search results. Affected sites number in excess of 200K. (Mar)

y y y

y y y

Just before the Pennsylvania Democratic Primary, XSS is used to redirect users of Barack Obamas website to Hillary Clintons (Apr) US Federal prosecutors charge parent who allegedly badgered a girl to suicide on MySpace with three counts of computer crime (conspiracy and hacking) (May) Radio Free Europe hit by DoS attack (May) Online payment service E-Gold pleads guilty to money laundering (Jul) Canadian Teachers Federation proposes adding Cyber-Bullying to Canadian Criminal Code (Jul) Canadian porn site Slick Cash pays $500K to Facebook after it tried to gain unauthorized access to Facebooks friendfinder functionality back in June 2007 (Jul) Terry Childs, San Francisco City network admin, refuses to give out passwords, locking other admins out of network (Jul).

1. White Hat: - A white hat hacker breaks security for non-malicious reasons, for instance testing their own security system. This type of hacker enjoys learning and working with computer systems 2. Grey Hat: - A grey hat hacker is a hacker of ambiguous ethics and/or borderline legality, often frankly admitted. 3.Black Hat:- A black hat hacker is someone who breaks computer security without authorization or uses technology (usually a computer, phone system or network) for vandalism, credit card fraud, identity theft, piracy, or other types of illegal activity. Still there are some other types of crackers as well they include following categories 4. Script kiddies: - A script kiddie is a non-expert who uses tools written by others, usually with little understanding. 5. Hacktivist: - A hacktivist is a hacker whouses technology to announce social or religious matter. These are also known as cyber terrorists. In modern era both of these people have major role in internet security.

HACKERS VS CRACKERS

NEED OF INDIA
From many years there has been a misconception about hackers. The very basic definition of hacker is someone involved in Computer security. Hackers mainly have good knowledge about the programming as well as security in servers. Hackers penetrate the security of servers by using programming skills as well as different hacking tools, but all this security penetration is legal and authenticated as they have legal permission from admnis and they are especially appointed to find loop holes in the system.Crack3rs are actually having same knowledge as that of hackers but they do not care about any ethics or rule and have their own manifesto. In other sense Hackers are good people and crackers are computer criminals or terrorists. Hackers are categorized on the basis of their hat types and those types are

SECURITY

IN

China's intensified cyber warfare against India is becoming a serious threat to national security. The desire to possess 'electronic dominance' over India has compelled Chinese hackers to attack many crucial Indian websites and over the past one and a half years, they have mounted almost daily attacks on Indian computer networks - both government and private.

In October 2007, for example, Chinese hackers defaced over 143 Indian websites. In April 2008,

Indian intelligence agencies detected Chinese hackers breaking into the computer network of the Ministry of External Affairs forcing the government to think about devising a new strategy to fortify the system. Though the intelligence agencies failed to get the identity of the hackers, the IP addresses left behind suggested Chinese hands. While hacking is a normal practice around the world, the cyber warfare threat from China has serious implications. At the core of the assault is the fact that the Chinese are constantly scanning and mapping India's official networks. According to India's CERTIn, in the year 2006, a total of 5,211 Indian websites were defaced, on an average of about 14 websites per day. Of the total number of sites that were hacked and defaced, an overwhelming majority were in the .com domain (90 cases) followed by 26 in the .in domain. As many as 11 defacement incidents were also recorded in the .org domain.

June 2007 and regularly penetrated computers in at least ten of the UK's Whitehall departments, accessing also military files. German Chancellor, Angela Merkel, too has complained to Chinese Premier, Wen Jiabao, over suspected hacks of its government systems. Although Beijing vehemently denies all allegations of state-controlled cyber snooping and hacking, the Chinese government as well as its society hails the practice of hacking for the national cause. The formation of Honker Union in China in 1999, in retaliation to the US bombing of the Chinese embassy in Belgrade, was aimed at widespread hacking under the guise of patriotism and nationalism, mostly of government-related websites around the world. Unless India takes adequate steps to protect itself from external cyber threats, the world famous IT giant could be facing a grim situation. Cyber attacks are dangerous for India because of the growing reliance on networks and technology to control critical systems that run power plants and transportation systems. Cyber attacks on banks, stock markets and other financial institutions could likewise have a devastating effect on a nation's economy.

Of all hacking incidents in October, about 61 per cent related to phishing, 27 per cent to unauthorized scanning and 8 per cent to viruses/worms under the malicious code category. India, like the western countries, has been witnessing a massive rise in phishing attacks with incidents in 2006 180 per cent higher than in 2005, and the trend carrying through into 2007.Though the maximum defacements have been recorded during August, in 2007, February and March recorded the highest such cases with 858 and 738 websites defaced respectively. August, by contrast, saw only 345 websites defaced. While other countries treat Chinese cyber attacks as security breaches, India considers these intrusions as the equivalent of Internet-based terrorist attacks. An Indian Army commanders' conference held in New Delhi on 26 April, voiced concern over mounting attacks on the country's networks. In the US, in June 2007, the Pentagon's computers were shut down for a week as a result of hacking.

As a countermeasure, the Indian armed forces are trying to enhance their C4ISR capabilities, so that the country can launch its own cyber offensive if the need arises. Given Chinese cyber attacks, there is need for the army to fight digital battles as well. According to Indian Army Chief, General Deepak Kapoor, the army has already ramped up the security of its information networks right down to the division level, while the Army Cyber Security Establishment has started conducting periodic cyber-security audits as well. However, the question remains: is this enough to stop Chinese cyber attacks?

At the frequency and aggressiveness of cyber attacks President Bush, without referring directly to Beijing, had said last year that "a lot of our systems are vulnerable to attack." The Chinese military hacked into the US Defence Secretary's computer system in

TYPES OF ATTACKS
As hackers as well as crackers have tendency of breaking into the computers they use many types of attacks on their target to find loop holes in it or to break the security. These types of attacks are either developed by hacker itself or they can be some standard one. We are going to explain few of those famous attacks by crackers or hackers on systems. 1) Ip spoofing:-This is very basic type of attack. In IP spoofing, the attacker gains an unauthorized access to the computers and makes it appear that the connection message has come from the trusted computer and the true identity of the attacker is hidden. Spoofing is the most common way to break into the network.IP spoofing is the most common forms of on line camouflage. IP spoofing was first talked about in the early 1980s. It wasnt used in practically unless Robert Morris discovered a weakness in the TCP protocol known as sequence prediction. It was again brought to the light when, Kevin Metnick employed the technique of sequence prediction and IP spoofing and made a program called Christmas Day which cracked Tsutomu Shimomuras machine which was very famous for the wrong reasons. Though we hear the usage of IP spoofing to be used for the wrong purposes but still we can use IP spoofing for the security reasons as well. And it is needed to be addressed by security administrators as well. To know exactly how the spoofing works, we need to take a look upon the TCP/IP protocol and IP headers. IP is a protocol which resides at the third layer of OSI model. Now as we know the basic protocol to send data over the network is the IP protocol. Now the important thing to notice from the view of attacker is this protocol is a connectionless protocol, which means that there is no record of the information of the packets in the transition state which is used to route the packets. And on the top of that, there is no provision to check whether the packet has been properly delivered to the destination or not. The basic thing we can notice about the IP header is source address and destination address. The attacker in this case usually depends upon the source address. This is because the attacker wants to send the spoofed packets to the destination in such a way that the source address would be fake or forged. Therefore the attacker can make it appear to the destination that the packets have come from the machine which it knows.

Now we can clearly see the 4th and 5th layer. In these layers we can clearly see the source and the destination addresses. And we also know that the attacker is normally interested in the source address. As we already know that IP is a stateless protocol, each data gram is sent independent of the others. The attacker can attack these. Addresses using some tools. 2) Port scanning:-port scanning can be done by scanning each and every port on your network system and then actually finding the open ports. Mostly ports are of these types 1) Well known ports (0-1023) 2) Registered Ports (1024- 49151) 3) Private Ports (49152-65135) Hackers can use any of one of the above open port and pinging there server to any other personal computers. 2) DOS-denial of service Denial of Service: Denial of service attack is the most common and currently the most difficult to defend against attack in the present. This attack is usually used by crackers. Crackers dont really worry about the handshakes whether they have been properly done or not. For them the only important thing is consuming bandwidth and the resources in order to crash the systems. We can say that Denial of Service is an attack which sends maximum amount of the packets in the minimum amount of time to the victims and flood it up with them. In a result it ends up crashing of the system and it is difficult to block this attack. But how spoofing comes to play in this attack? Crackers even though they really dont want to make certain connection with the specific source address, they spoof the source address and when there is more than one attacker involved in one attack

with the spoofed IPs, it is very difficult to trace them and block them to end an attack and save the system from crashing. Now we can say that motivation of this attack is not to crash the system but the denial of service is an attack which motivates to make system lame as it cannot communicate with the other services as these are simply denied. DOS makes the system a) Crash the systems b) Make the system down

3) Trojan horse- Its most widely tools used in the world for cracking. Trojans are executable programs, which mean that when you open the file, it will perform some action(s). In Windows, executable programs have file extensions like "exe", "vbs", "com", "bat", etc. Some actual Trojan filenames include: "dmsetup.exe" and "LOVE-LETTER-FORYOU.TXT.vbs" (when there are multiple extensions, only the last one count, be sure to unhide your extensions so that you see it). More information on risky file extensions may be found at this Microsoft document. AS we can see above all red lines are spoof packets on the personal computers causing it to be hacked or it may cause system corruption. Trojans can be spread in the guise of literally ANYTHING people find desirable, such as a free game, movie, song, etc. Victims typically downloaded the Trojan from a WWW or FTP archive, got it via peer-to-peer file exchange using IRC/instant messaging/Kazaa etc., or just carelessly opened some email attachment. Trojans usually do their damage silently. The first sign of trouble is often when others tell you that you are attacking them or trying to infect them! It simply creats the system back door causing theft of information from it. 4) Virus and worms:-virus and worms are both used by crackers to crack the security. Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk. Viruses are often spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it. Viruses can be disguised as attachments of funny images, greeting

Distributed DOS: This is a combined effort of many attackers which combining try to make a victim down. Normally there is a master attacker which launches the attack first and then zombies soon attack. The figure below shows the Distributed DOS attack:

cards, or audio and video files. Viruses also spread through download on the Internet. They can be hidden in illicit software or other files or programs you might download. Worms are programs that replicate themselves from system to system without the use of a host file. This is in contrast to viruses, which requires the spreading of an infected host file. Although worms generally exist inside of other files, often Word or Excel documents, there is a difference between how worms and viruses use the host file. Usually the worm will release a document that already has the "worm" macro inside the document. The entire document will travel from computer to computer, so the entire document should be considered the worm W32.Mydoom.AX@mm is an example of a worm.

for type constraints. This could take place when a numeric field is to be used in a SQL statement, but the programmer makes no checks to validate that the user supplied input is numeric. For example: statement := "SELECT * FROM data WHERE id = " + a_variable + ";" It is clear from this statement that the author intended a_variable to be a number correlating to the "id" field. However, if it is in fact a string then the end user may manipulate the statement as they choose, thereby bypassing the need for escape characters. For example, setting a_variable to 1; DROP TABLE users Will drop (delete) the "users" table from the database, since the SQL would be rendered as follows: SELECT * FROM DATA WHERE id=1; DROP TABLE users; Another form of SQL injection is BLIND SQL INJECTION- Blind SQL Injection is used when a web application is vulnerable to SQL injection but the results of the injection are not visible to the attacker. The page with the vulnerability may not be one that displays data but will display differently depending on the results of a logical statement injected into the legitimate SQL statement called for that page. This type of attack can become timeintensive because a new statement must be crafted for each bit recovered. There are several tools that can automate these attacks once the location of the vulnerability and the target information has been established.[3] [edit]Conditional responses One type of blind SQL injection forces the database to evaluate a logical statement on an ordinary application screen. SELECT booktitle FROM booklist WHERE bookId = 'OOk14cd' AND 1=1; will result in a normal page while SELECT booktitle FROM booklist WHERE bookId = 'OOk14cd' AND 1=2; 6) BRUTE FORCING-Its one of the oldest method of cracking. Brute forcing softwares actually find random combination of passwords and username and compare them to get desired results. The time for password guess depends upon the length of password .If password is strong then it will even take few days

5) SQL injection- SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed and thereby unexpectedly executed. It is an instance of a more general class of vulnerabilities that can occur whenever one programming or scripting language is embedded inside another.

Incorrectly filtered escape characters The following line of code illustrates vulnerability:

this

statement = "SELECT * FROM users WHERE name = '" + userName + "';"

This SQL code is designed to pull up the records of the specified username from its table of users. However, if the "userName" variable is crafted in a specific way by a malicious user, the SQL statement may do more than the code author intended. For example, setting the "userName" variable as

a' or 't'='t Incorrect type handling This form of SQL injection occurs when a user supplied field is not strongly typed or is not checked

to get the password, but now days sites hacking anti brute forcing filters so this methods are not sufficient .

See this is the fake site of ICICI bank from URL https://infinity.icicibank.co.in/BANKAWA Y?Action. And

The above figure shows the diagram of one of brute forcing software as we can clearly see it is guessing the password

This one is the real ICICI bank site from URL https://infinity.icicibank.co.in/BANKAWA Y? Some other important cyber crimes are:Software piracy: The illegal distribution of softwares, i.e without permission of author or illegal distribution of media violating the rights is called as piracy Cyber Pornography: This would include pornographic websites; pornographic magazines produced using computer and the Internet (to down load and transmit pornographic pictures, photos, writings etc.) Sale of illegal articles: This would include sale of narcotics, weapons and wildlife etc., by posting information on websites, bulletin boards or simply by using e-mail communications. Online gambling: There are millions of websites; all hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering. Intellectual Property Crimes: These include software piracy, copyright infringement, trademarks violations etc. E-Mail spoofing: A spoofed email is one that appears to originate from one source but actually has been sent from another source. This can also be termed as E-Mail forging.

7)phishing attack- In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. It includes copying of source code of web site to be hacked and then crackers create the fake log in pages for it. These WebPages are accessed by target when he clicks on anonymous links and there he finds the login prompt of the site which is actually made by the crackers to get victims password and username. Victim gets caught and crackers penetrate the security.

Forgery: Counterfeit currency notes, postage and revenue stamps, mark sheets etc., can be forged using sophisticated computers, printers and scanners. Cyber Defamation: This occurs when defamation takes place with the help of computers and or the Internet e.g. someone published defamatory matter about someone on a websites or sends e-mail containing defamatory information to all of that persons friends. Cyber Stalking: Cyber stalking involves following a persons movements across the Internet by posting messages on the bulletin boards frequented by the victim, entering the chat-rooms frequented by the victim. E-Mail bombing: Email bombing refers to sending a large amount of e-mails to the victim resulting in the victims e-mail account or mail servers. Data diddling: This kind of an attack involves altering the raw data just before it is processed by a computer and then changing it back after the processing is completed. Salami attacks: Those attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed e.g. A bank employee inserts a program into banks servers, that deducts a small amount from the account of every customer. Logic bombs: These are dependent programs. This implies that these programs are created to do something only when a certain event occurs, e.g. some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date. Internet Time Theft: This connotes the usage by unauthorized persons of the Internet hours paid for by another person. Spyware: It is a type of malware that is installed on computers and that collects information about users without their knowledge. The presence of spyware is typically hidden from the user. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.

Adware: - advertising-supported software is any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used. Some types of adware are also spyware and can be classified as privacyinvasive software. Botnet: - is a jargon term for a collection of software robots, or bots, that run autonomously and automatically. The term is often associated with malicious software but it can also refer to the network of computers using distributed computing software. While botnets are often named after their malicious software name, there are typically multiple botnets in operation using the same malicious software families, but operated by different criminal entities.

PREVENTION
PREVENTIVE STEPS FOR INDIVIDUALS CHILDREN: Children should not give out identifying information such as Name, Home address, School Name or Telephone Number in a chat room. They should not give photographs to anyone on the Net without first checking or informing parents guardians. They should not respond to messages, which are suggestive, obscene, belligerent or threatening, and not to arrange a face-to face meeting without telling parents or guardians. They should remember that people online might not be who they seem. PARENTS: Parent should use content filtering software on PC to protect children from pornography, gambling, hate speech, drugs and alcohol. There is also software to establish time controls for use of limpets (for example blocking usage after a particulars time) and allowing parents to see which site item children have visited. Use this software to keep track of the type of activities of children. PREVENTIVE STEPS FOR ORGANISATIONS AND GOVERNMENT PHYSICAL SECURITY: Physical security is most sensitive component, as prevention from cyber crime Computer network should be protected from the access of unauthorized persons.

ACCESS CONTROL: Access Control system is generally implemented using firewalls, which provide a centralized point from which to permit or allow access. Firewalls allow only authorized communications between the internal and external network. PASSWORD: Proof of identity is an essential component to identify intruder. The use of passwords in the most common security for network system including servers, routers and firewalls. Mostly all the systems are programmed to ask for username and password for access to computer system. This provides the verification of user. Password should be charged with regular interval of time and it should be alpha numeric and should be difficult to judge. FINDING THE HOLES IN NETWORK: System managers should track down the holes before the intruders do. Many networking product manufactures are not particularly aware with the information about security holes in their products. So organization should work hard to discover security holes, bugs and weaknesses and report their findings as they are confirmed. USING NETWORK SCANNING PROGRAMS: There is a security administrations tool called UNIX, which is freely available on Internet. This utility scans and gathers information about any host on a network, regardless of which operating system or services the hosts were running. It checks the known vulnerabilities include bugs, security weakness, inadequate password protection and so on. There is another product available called COPS (Computer Oracle and Password System). It scans for poor passwords, dangerous file permissions, and dates of key files compared to dates of CERT security advisories. USING INTRUSION ALERT PROGRAMS: As it is important to identify and close existing security holes, you also need to put some watchdogs into service. There are some intrusion programs, which identify suspicious activity and report so that necessary action is taken. They need to be operating constantly so that all unusual behavior on network is caught immediately.

USING ENCRYPTION: - Encryption is able to transform data into a form that makes it almost impossible to read it without the right key. This key is used to allow controlled access to the information to selected people. The information can be passed on to any one but only the people with the right key are able to see the information. Encryption allows sending confidential documents by E-mail or save confidential information on laptop computers without having to fear that if someone steals it the data will become public. With the right encryption/decryption software installed, it will hook up to mail program and encrypt/decrypt messages automatically without user interaction. FIREWALL: It is a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic between different security domains based upon a set of rules and other criteria. Firewalls can be implemented in either hardware or software, or a combination of both. ANTI-VIRUS :- It is a software used to prevent, detect, and remove malware, including computer viruses, worms, and Trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware.

ETHICAL HACKERS:-Some companies employ ethical hackers. A white hat is the hero or good guy, especially in computing slang, where it refers to an ethical hacker or penetration tester who focuses on securing and protecting IT systems by testing for loop holes in the system and patching them.

Potrebbero piacerti anche