Posts

Social Engineering- Cyber Security

Social Engineering Social engineering is a technique to influence or deceive people to obtain information or perform some action. People are the weak link in security and this principle makes social engineering possible. A social engineer generally uses a mobile or Internet to make people do something that is illegal. Social engineering is the art of exploiting the trust of people. There are two main categories of social engineering:  Human-based social engineering  Computer-based social engineering Human-Based Social Engineering Refers to person-to-person interaction to get the desired information. Examples include:  Impersonating an employee or valid-user  Posing as an important user  Using a third person  Calling as technical support Shoulder surfing  Dumpster diving Computer-based Social Engineering Refers to an attempt to get the desired information using a computer or software. Examples include:  Fake e-mails (phishing)  E-mail attach...

Popular Cyber Crimes - Cyber Security

These are some popular Cybercrimes performed by the Cyber Criminals Password Sniffing Credit Card frauds Intellectual Property Crimes Password sniffing The act of using (Sniffer Tools) to monitor the network for Collecting Credentials like usernames and passwords is known as Password Sniffing, The Passwords gained Through Password Sniffing used to logging as Authorized user and Steal Sensitive and Confidential Information. Credit Card Frauds Nowadays this credit frauds are widely increasing, the Attacker will get the details of Credit cards such as Card number, CVV, Expiry Date and Name on Card and using these details and looting money, Retail websites and other online services are frequent targets for attackers to compromise a huge list of credit cards of users. Intellectual Property Crimes Intellectual property refers to an idea, method, mechanism, or product that belongs to or is invented by a person, a group, or by an organization. Intellectual Property (IP) crime refers to someon...

Cyber Criminals in Cyber Security

Cybercriminals are people who commit cybercrimes. Based on the motivation for committing cybercrimes, cybercriminals can be divided into three categories or types as given below: Cybercriminals who are hungry for recognition Cybercriminals who are not interested in recognition Cybercriminals who are insiders

Security Attributes in Cyber Security

The well-known security properties or attributes are: Confidentiality Availability Integrity Authentication Authorization Non-repudiation The three properties confidentiality, integrity, and availability are generally known as CIA triad or as AIC triad.  Confidentiality refers to the fact that the assets should be accessible to only authorized users. Confidentiality can be thought of as a part of privacy. Confidentiality can be implemented using encryption and decryption. Integrity refers to the fact that the data or information either at transit or in the storage is complete and consistent i.e., it is not modified by any third party. Integrity can be implemented through the hash techniques. Availability guarantees that the application or system or assets are available for use by the authorized users. What's the point if the assets are not available to use even if the user is genuine. Availability is implemented through backups, disaster and recovery mechanisms.  Authen...

Cyberspace

Cyberspace is "a network of computer networks or devices that uses the TCP/IP for communication to facilitate transmission and exchange of data." The term cyberspace was coined by " William Gibson" , a science fiction writer, in his Sci-fi novel, " Neuomancer ".

Cyber Crime Activities in India

In India and the rest of the world, cyberterrorists generally use the computer as a tool, target, or both for their criminal activities to gain unauthorized access to sensitive information which may lead to heavy loss or damage to the owner of that information. Cybercriminals use methods like phishing, spoofing, pharming, etc for gaining access to sensitive information.

Cybernatics

The term cyber had its origin with the word cybernatics which deals with information and its use. Cybernatics is the science that overlaps the fields of neurophysiology, information theory, computing machinery and automation