Cyber Threats and Security

Total Page:16

File Type:pdf, Size:1020Kb

Cyber Threats and Security CYBER THREATS AND SECURITY PROTECTING THE INFORMATION n April 2009, the Wall Street Journal (WSJ) reported that computer hackers – thought FORTRESS to be Chinese or Russian – had breached a key computer network of U.K. defence Igiant BAE Systems in 2007 and 2008 and stolen “several terabytes of data” related by Blair Watson to the United States’ F-35 Lightning II Joint Strike Fighter (JSF). BAE has been a major industrial partner on the $382-billion aerospace program during the past eight years. Not surprisingly, U.S. officials downplayed the story. On March 11, 2012, The Sunday Times, fly-by-wire interface, sophisticated AESA The following month, the U.S. Office of a British newspaper, reported: “Details of radar, colour liquid crystal cockpit monitors the Inspector General released a report con- the [cyber] attack on BAE have been a and holographic head-up display, and other firming that Chinese hackers had gained closely guarded secret within Britain’s intel- 21st-century war-fighting innovations. control over NASA’s Jet Propulsion Labora- ligence community since it was first uncov- tory in November, which gave them the ered nearly three years ago. But they were CYBER ATTACKS AGAINST ability to delete sensitive files, add user disclosed by a senior BAE executive during DIVERSE ORGANIZATIONS accounts to mission-critical systems, upload a private dinner in London for cyber secu- Hardly a week goes by without a news hacking tools, and more. rity experts late last year.” According to the report of a prominent organization being Paul Martin, NASA’s inspector general, report, the executive confirmed that the cyber-assaulted. “Hackers attack Vatican told U.S. lawmakers: “The attackers had full Chinese had electronically penetrated website 2nd time in days” was the FOX functional control over these [computer] net- BAE’s network and stolen plans for the News headline in mid-March. Authorities works.” His report said that in 2010 and F-35’s stealthy design, electronics, and other believe the notorious Internet hacker group 2011, “NASA reported 5,408 computer secu- systems. Anonymous was behind the onslaught. Four rity incidents that resulted in the installation In late 2010, China unveiled its weeks earlier, Information Week (IW) reported of malicious software on or unauthorized Chengdu J-20 stealth fighter-attack jet. that Anonymous had taken down a U.S. access to its systems. These incidents Photographs reveal JSF-like housings for Central Intelligence Agency website via a spanned a wide continuum from individuals electro-optical sensors and all-moving tail- distributed denial of service (DDoS) blitz. testing their skill to break into NASA sys- fins. With the WSJ report and photographic “Anonymous and other hacktivists also left tems, to well-organized criminal enterprises evidence, military aviation experts think their marks on the U.S. Census Bureau, Inter- hacking for profit.” Some of the incidents the J-20 is probably equipped with Chinese pol, and Mexico, as well as law enforcement “may have been sponsored by foreign intel- versions of the American fighter jet’s electro- websites in Alabama and Texas,” wrote IW ligence services seeking to further their optical distributed aperture system, digital in February. countries’ objectives.” FrontLine Security I www.frontline-security.org I 35 The Chengdu J-20 on a test flight may try to carry out cyber attacks on the U.S., and advised government to be pre- pared. “To date, terrorists have not used the Internet to launch a full-scale cyber attack, but we cannot underestimate their intent,” he warned. “They may seek to train their own recruits or hire outsiders, with an eye F-35 Lightning II. PHOTO: BAE SYSTEMS toward pursuing cyber attacks. As our nation’s national security and criminal adversaries constantly adapt and evolve, so infiltrated Iranian computer networks and must the FBI be able to respond with new accessed control systems of the country’s or revised strategies and operations to nuclear program. Reportedly, about 1,000 counter these threats.” centrifuges used to enrich uranium were secretly ordered to spin so fast that they Industrial Spies and Organized Crime As a result of the computer destroyed themselves, setting the program Groups: These individuals and collectives breach reported in the Wall back by months. pose a medium-level threat because of their ability to conduct industrial espionage as Street Journal, and photographic The Stuxnet malware (malicious soft- ware) also fed erroneous indications to tech- well as large-scale monetary theft. They evidence, military aviation experts nicians in the control facility, making it typically have the resources to hire or think the J-20 is probably equipped appear that the centrifuges were running develop hacking expertise. Their motiva- with Chinese versions of the normally. The U.S. and Israeli governments tion is money and their methods include American fighter jets’ electro- are widely believed to have been behind the attacks on infrastructure for profit, stealing trade secrets, and acquiring potentially optical distributed aperture operation. In a September 2010 statement, computer security firm Kaspersky Labs embarrassing information that can be used system, sophisticated AESA described the worm as a “fearsome proto- to blackmail key officials. radar, digital fly-by-wire interface, type of a cyber-weapon that will lead to the Hacktivists: Nuisance hackers, like those colour liquid crystal cockpit creation of a new arms race in the world.” in Anonymous, target organizations in monitors and holographic head-up The company is convinced that the mal- furtherance of a political agenda. Their displays, and other 5th Genera- ware could only have been created with isolated-yet-damaging assaults, pose a “nation-state support.” tion war-fighting innovations. medium-level threat to organizations, says Terrorists: In early March, FBI Director the DHS. Most hacktivist groups have Robert Mueller warned a House appropria- focused on carrying out irritating attacks tions subcommittee that violent extremists rather than damaging important infrastruc- Using the code name OpPiggyBank, a hacking collective called CabinCr3w attacked the Los Angeles Police Department website in February and obtained email addresses, passwords, names, and physical addresses What types of organizations are targeted the most? of more than 1,000 officers. They also copied 15,000 police warrants; hundreds of Robert Freeman, manager of IBM’s X-Force Research thousands of court summons; more than “Although government organizations have always worried about the threat 40,000 Social Security numbers; and thou- of state sponsored computer intruders, it is apparent that both large and sands of police reports. small private enterprises also face this type of threat. A number of promi- nent publicly reported breaches in 2010 and early 2011 appear to drive THREAT SOURCES this point home. Attackers are interested in the intellectual property of busi- According to the U.S. Department of nesses of all sizes, and are even interested in businesses that may not have Homeland Security (DHS), there are five interesting intellectual property but are key business partners with those main sources of threats to computer net- that do. In the latter case, they are looking for ways to gain access to data works or other types of linked electronic by pivoting in. Attackers may also target small, seemingly irrelevant busi- control systems: governments, terrorists, nesses that can act as storage and proxy for their attacks. Organizations industrial spies and organized crime groups, of all sizes should be concerned. Usually the more elaborate enterprise hacktivists, and hackers. attacks are part of what the industry commonly refers to as ‘Advanced Persistent Threat’ or APT. These attacks rarely use high tech exploits and Governments: Various state players have malware these days. The complexity is in the operation and management of developed cyber resources that pose a sig- the attack towards stealing data and keeping a foothold in a given organi- nificant threat to systems and programs zation. Only once discovered does the complexity tend to increase. There are deemed important to national security and many steps to a successful attack that pivots and steals data. If an organi- economic stability. For example, in 2010 a zation can detect and stop any of the events during the attack, it wins.” new computer “worm” dubbed Stuxnet 36 I FrontLine Security I Volume 7, Issue 1 Criminals will borrow techniques from Black Hat SEO (search engine optimiza- Do organizations have adequate tion) to deceive current botnet defences resources to deal with cyber threats? like dynamic reputation systems that compute “reputation” scores of domain Kurt Baumgartner, senior security researcher at Kaspersky Labs names. “Unfortunately, it’s uncommon to see all of an organization’s resources fully secured. Potentially less than 50% of them have adequate planning, imple- WHAT CAN BE DONE? mentations, and maintenance in regards to securing important resources. Robert Freeman of IBM recommends the There are diverse infectors, some of which are omnipresent in cyberspace following steps to better secure a network: (e.g., Sality, Virut, Xpaj, Qbot). Usually there are established procedures – Perform regular third party external to deal with them. Mass exploitation and cyber criminals spreading Zbot, and internal security audits. FakeAV, TDSS, SpyEye and other spyware is a problem for every organi- – Control your endpoints. zation, whether the adversary is after financial data or other private – Segment sensitive systems and resources. The APT (Advanced Persistent Threat) is a different story, information. however. Depending on the group, they don’t go away for years, and inno- vate to get in. It’s rare to see organizations adequately protected with – Protect your network. technology, and human error will continue to be a critical weak point.” – Audit your web applications. – Train end users about phishing and spear phishing. ture. Achieving notoriety for their cause is Expect compound threats targeting – Search for bad passwords.
Recommended publications
  • Identifying Threats Associated with Man-In-The-Middle Attacks During Communication Between a Mobile Device and the Back End Server in Mobile Banking Applications
    IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. IX (Mar-Apr. 2014), PP 35-42 www.iosrjournals.org Identifying Threats Associated With Man-In-The-Middle Attacks during Communication between a Mobile Device and the Back End Server in Mobile Banking Applications Anthony Luvanda1,*Dr Stephen Kimani1 Dr Micheal Kimwele1 1. School of Computing and Information Technology, Jomo Kenyatta University of Agriculture and Technology, PO Box 62000-00200 Nairobi Kenya Abstract: Mobile banking, sometimes referred to as M-Banking, Mbanking or SMS Banking, is a term used for performing balance checks, account transactions, payments, credit applications and other banking transactions through a mobile device such as a mobile phone or Personal Digital Assistant (PDA). Mobile banking has until recently most often been performed via SMS or the Mobile Web. Apple's initial success with iPhone and the rapid growth of phones based on Google's Android (operating system) have led to increasing use of special client programs, called apps, downloaded to the mobile device hence increasing the number of banking applications that can be made available on mobile phones . This in turn has increased the popularity of mobile device use in regards to personal banking activities. Due to the characteristics of wireless medium, limited protection of the nodes, nature of connectivity and lack of centralized managing point, wireless networks tend to be highly vulnerable and more often than not they become subjects of attack. This paper proposes to identify potential threats associated with communication between a mobile device and the back end server in mobile banking applications.
    [Show full text]
  • Recent Developments in Cybersecurity Melanie J
    American University Business Law Review Volume 2 | Issue 2 Article 1 2013 Fiddling on the Roof: Recent Developments in Cybersecurity Melanie J. Teplinsky Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the Law Commons Recommended Citation Teplinsky, Melanie J. "Fiddling on the Roof: Recent Developments in Cybersecurity." American University Business Law Review 2, no. 2 (2013): 225-322. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. ARTICLES FIDDLING ON THE ROOF: RECENT DEVELOPMENTS IN CYBERSECURITY MELANIE J. TEPLINSKY* TABLE OF CONTENTS Introduction .......................................... ..... 227 I. The Promise and Peril of Cyberspace .............. ........ 227 II. Self-Regulation and the Challenge of Critical Infrastructure ......... 232 III. The Changing Face of Cybersecurity: Technology Trends ............ 233 A. Mobile Technology ......................... 233 B. Cloud Computing ........................... ...... 237 C. Social Networking ................................. 241 IV. The Changing Face of Cybersecurity: Cyberthreat Trends ............ 244 A. Cybercrime ................................. ..... 249 1. Costs of Cybercrime
    [Show full text]
  • Mobile Financial Fraud April 2013
    White Paper: Mobile Financial Fraud April 2013 Mobile Threats and the Underground Marketplace Principal Investigator and Corresponding Author Jart Armin Contributing Researchers Andrey Komarov, Mila Parkour, Raoul Chiesa, Bryn Thompson, Will Rogofsky Panel & Review Dr. Ray Genoe (UCD), Robert McArdle (Trend Micro), Dave Piscitello (ICANN), Foy Shiver (APWG), Edgardo Montes de Oca (Montimage), Peter Cassidy (APWG) APWG Mobile Fraud web site http://ecrimeresearch.org/wirelessdevice/Fraud/ Table of Contents Abstract ..................................................................................................................................... 2 Introduction and Starting Position ........................................................................................ 2 A Global Overview .................................................................................................................. 3 Vulnerabilities Overview ....................................................................................................... 3 The Underground Mobile Market ....................................................................................... 13 Mobile DNS & Traffic ........................................................................................................... 15 iBots & the Pocket Botnet ..................................................................................................... 18 Mobile Intrusion ...................................................................................................................
    [Show full text]
  • Kaspersky Security Bulletin 2020. Statistics Kaspersky Security Bulletin 2020
    Kaspersky Security Bulletin 2020. Statistics Kaspersky Security Bulletin 2020. Statistics Contents Figures of the year 3 Financial threats 4 Number of users attacked by banking malware 4 Attack geography 5 Top 10 financial malware families 6 Ransomware programs 7 Number of users attacked by ransomware Trojans 7 Attack geography 8 Miners 10 Number of users attacked by miners 10 Attack geography 11 Vulnerable applications used by cybercriminals during cyber attacks 12 Attacks on macOS 14 Threat geography 15 IoT attacks 17 IoT threat statistics 17 Threats loaded into traps 19 Attacks via web resources 20 Countries that are sources of web-based attacks: 20 Countries where users faced the greatest risk of online infection 21 Top 20 malicious programs most actively used in online attacks 22 Local threats 24 Top 20 malicious objects detected on user computers 24 Countries where users faced the highest risk of local infection 25 2 Kaspersky Security Bulletin 2020. Statistics Figures of the year • During the year, 10.18% of Internet user computers worldwide experienced at least one Malware-class attack. • Kaspersky solutions blocked 666,809,967 attacks launched from online resources in various countries across the world. • 173,335,902 unique URLs were recognized as malicious by Web Anti-Virus. • Our Web Anti-Virus blocked 33,412,568 unique malicious objects. • Ransomware attacks were defeated on the computers of 549,301 unique users. • During the reporting period, miners attacked 1,523,148 unique users. • Attempted infections by malware designed to steal money via online access to bank accounts were logged on the devices of 668,619 users.
    [Show full text]
  • Detecting Botnets Using File System Indicators
    Detecting botnets using file system indicators Master's thesis University of Twente Author: Committee members: Peter Wagenaar Prof. Dr. Pieter H. Hartel Dr. Damiano Bolzoni Frank Bernaards LLM (NHTCU) December 12, 2012 Abstract Botnets, large groups of networked zombie computers under centralised control, are recognised as one of the major threats on the internet. There is a lot of research towards ways of detecting botnets, in particular towards detecting Command and Control servers. Most of the research is focused on trying to detect the commands that these servers send to the bots over the network. For this research, we have looked at botnets from a botmaster's perspective. First, we characterise several botnet enhancing techniques using three aspects: resilience, stealth and churn. We see that these enhancements are usually employed in the network communications between the C&C and the bots. This leads us to our second contribution: we propose a new botnet detection method based on the way C&C's are present on the file system. We define a set of file system based indicators and use them to search for C&C's in images of hard disks. We investigate how the aspects resilience, stealth and churn apply to each of the indicators and discuss countermeasures botmasters could take to evade detection. We validate our method by applying it to a test dataset of 94 disk images, 16 of which contain C&C installations, and show that low false positive and false negative ratio's can be achieved. Approaching the botnet detection problem from this angle is novel, which provides a basis for further research.
    [Show full text]
  • European Cyber Security Perspectives 2015 | 3 Preface
    European Cyber Security Perspectives 2015 | 3 Preface Dear reader, Following the success of last year’s publication, we are proud to present the second edition of our European Cyber Security Perspectives report. Through this collection of articles, we aim to share our different perspectives and insights, the latest developments and achievements in the field of cyber security, cybercrime investigations and cyber resilience. By uniting the expertise of four parties with diverse roles in the cyber security domain, we hope to offer some fresh perspectives on issues and developments that we believe to be relevant for society. Rather than presenting you with bare facts and figures, we describe real-life cases and experiences from our professional practice. Topics include the trends to watch in 2015, responses to high-profile vulnerabilities and advances in the detection and investigation of targeted cyber attacks. Each article in the report can be read independently, allowing you to focus on the topics that interest you most. A central theme in this year’s report is cooperation in cyber security. We strongly believe in the value of uniting cyber security capabilities across public and private organisations and even national borders. In fact, you will see that many of the articles in this publication have been co-authored by specialists from different parties. This reflects the growth in our collaborative projects when addressing the latest cyber security challenges. We aim to foster more of those partnerships in the coming year. We encourage you to build on our work and experiences and hope that this report will inspire further enhancements in cyber security, cybercrime investigations and cyber resilience, both in the Netherlands and abroad.
    [Show full text]
  • The Dridex Swiss Army Knife: Big Data Dissolves the APT & Crime Grey Area
    #RSAC SESSION ID: HT-W10 The Dridex Swiss Army knife: big data dissolves the APT & crime grey area Eward Driehuis Director of product Fox-IT @brakendelama #RSAC Understanding criminal evolution Global visibility Collaboration Investigations Feeds #RSAC May 2014 #RSAC Rewind 9 years… 2006 Slavik launches ZeuS 2009 SpyEye & Carberp compete for market share 2010 Slavik creates ZeuS2 Hands over ZeuS support to the SpyEye guy 2011 ZeuS2 code leaks 2012 Gribodemon & Carberp members arrested In 2009 Slavik had joined JabberZeuS And Evolved to GameOver / P2PZeuS #RSAC The Businessclub Legacy Businesslike Financial guy perfected money laundry Targeted commercial banking Perfected the Hybrid attack / Tokengrabber Perfected ransomware / Cryptolocker Did some “light espionage” #RSAC Business club after Slavik Dyre Businessclub (GameOver ZeuS gang until May 2014) EvilCorp (Dridex crew) #RSAC Dridex: EvilCorp’s Swiss Army knife #RSAC EvilCorp network expands Core businessclub members in EvilCorp & Dridex operators Leveraging existing money laundry networks Branching out: Dridex operators do ransomware, RATs, Credit Cards, high value targets Ties with Anunak / Carbanak #RSAC Dridex Malware Based on Bugat/Cridex/Feodo, since 2014 Speading: scattergun (spam / attachments) Modular architecture P2P, with 3 operating modes: Token Grabber, data mining, inter node comm Using businessclub technology Loader dropping many different malwares #RSAC #RSAC EvilCorp: Dridex Targets 2015 -2017 #RSAC EvilCorp: ”Gucci” accounts Harvesting data from victims Big data techniques
    [Show full text]
  • An Analysis of the Nature of Groups Engaged in Cyber Crime
    International Journal of Cyber Criminology Vol 8 Issue 1 January - June 2014 Copyright © 2014 International Journal of Cyber Criminology (IJCC) ISSN: 0974 – 2891 January – June 2014, Vol 8 (1): 1–20. This is an Open Access paper distributed under the terms of the Creative Commons Attribution-Non- Commercial-Share Alike License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited. This license does not permit commercial exploitation or the creation of derivative works without specific permission. Organizations and Cyber crime: An Analysis of the Nature of Groups engaged in Cyber Crime Roderic Broadhurst,1 Peter Grabosky,2 Mamoun Alazab3 & Steve Chon4 ANU Cybercrime Observatory, Australian National University, Australia Abstract This paper explores the nature of groups engaged in cyber crime. It briefly outlines the definition and scope of cyber crime, theoretical and empirical challenges in addressing what is known about cyber offenders, and the likely role of organized crime groups. The paper gives examples of known cases that illustrate individual and group behaviour, and motivations of typical offenders, including state actors. Different types of cyber crime and different forms of criminal organization are described drawing on the typology suggested by McGuire (2012). It is apparent that a wide variety of organizational structures are involved in cyber crime. Enterprise or profit-oriented activities, and especially cyber crime committed by state actors, appear to require leadership, structure, and specialisation. By contrast, protest activity tends to be less organized, with weak (if any) chain of command. Keywords: Cybercrime, Organized Crime, Crime Groups; Internet Crime; Cyber Offenders; Online Offenders, State Crime.
    [Show full text]
  • VULNERABLE by DESIGN: MITIGATING DESIGN FLAWS in HARDWARE and SOFTWARE Konoth, R.K
    VU Research Portal VULNERABLE BY DESIGN: MITIGATING DESIGN FLAWS IN HARDWARE AND SOFTWARE Konoth, R.K. 2020 document version Publisher's PDF, also known as Version of record Link to publication in VU Research Portal citation for published version (APA) Konoth, R. K. (2020). VULNERABLE BY DESIGN: MITIGATING DESIGN FLAWS IN HARDWARE AND SOFTWARE. General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal ? Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. E-mail address: [email protected] Download date: 07. Oct. 2021 VULNERABLE BY DESIGN: MITIGATING DESIGN FLAWS IN HARDWARE AND SOFTWARE PH.D. THESIS RADHESH KRISHNAN KONOTH VRIJE UNIVERSITEIT AMSTERDAM, 2020 Faculty of Science The research reported in this dissertation was conducted at the Faculty of Science — at the Department of Computer Science — of the Vrije Universiteit Amsterdam This work was supported by the MALPAY consortium, consisting of the Dutch national police, ING, ABN AMRO, Rabobank, Fox-IT, and TNO.
    [Show full text]
  • City Research Online
    City Research Online City, University of London Institutional Repository Citation: Acarali, D., Rajarajan, M., Komninos, N. and Herwono, I. (2016). Survey of Approaches and Features for the Identification of HTTP-Based Botnet Traffic. Journal of Network and Computer Applications, doi: 10.1016/j.jnca.2016.10.007 This is the accepted version of the paper. This version of the publication may differ from the final published version. Permanent repository link: https://openaccess.city.ac.uk/id/eprint/15580/ Link to published version: http://dx.doi.org/10.1016/j.jnca.2016.10.007 Copyright: City Research Online aims to make research outputs of City, University of London available to a wider audience. Copyright and Moral Rights remain with the author(s) and/or copyright holders. URLs from City Research Online may be freely distributed and linked to. Reuse: Copies of full items can be used for personal research or study, educational, or not-for-profit purposes without prior permission or charge. Provided that the authors, title and full bibliographic details are credited, a hyperlink and/or URL is given for the original metadata page and the content is not changed in any way. City Research Online: http://openaccess.city.ac.uk/ [email protected] Journal Logo 00 (2016) 1{19 Survey of Approaches and Features for the Identification of HTTP-Based Botnet Traffic Dilara Acaralia, Muttukrishnan Rajarajana, Nikos Komninosa, Ian Herwonob aSchool of Engineering and Mathematical Science, City University London, London, United Kingdom. bSecurity Futures Practice, Research & Innovation, British Telecom, Ipswich IP5 3RE, United Kingdom. Abstract Botnet use is on the rise, with a growing number of botmasters now switching to the HTTP-based C&C infrastructure.
    [Show full text]
  • Banking Trojans: from Stone Age to Space Era
    Europol Public Information Europol Public Information Banking Trojans: From Stone Age to Space Era A Joint Report by Check Point and Europol The Hague, 21/03/2017 Europol Public Information 1 / 16 Europol Public Information Contents 1 Introduction .............................................................................................................. 3 2 The Founding Fathers ................................................................................................ 3 3 The Current Top Tier ................................................................................................. 5 4 The Latest .................................................................................................................. 9 5 Mobile Threat .......................................................................................................... 10 6 Evolutionary Timeline ............................................................................................. 11 7 Impressions/Current Trends ................................................................................... 11 8 Banking Trojans: The Law Enforcement View ......................................................... 12 9 How are Banking Trojans used by Criminals? ......................................................... 13 10 How are the Criminals Structured? ......................................................................... 14 11 Building on Public-Private-Partnerships - The Law Enforcement Response ........... 15 12 How to Protect Yourself .........................................................................................
    [Show full text]
  • Advanced Cyber Security Techniques (PGDCS-08)
    Post-Graduate Diploma in Cyber Security Advanced Cyber Security Techniques (PGDCS-08) Title Advanced Cyber Security Techniques Advisors Mr. R. Thyagarajan, Head, Admn. & Finance and Acting Director, CEMCA Dr. Manas Ranjan Panigrahi, Program Officer (Education), CEMCA Prof. Durgesh Pant, Director-SCS&IT, UOU Editor Mr. Manish Koranga, Senior Consultant, Wipro Technologies, Bangalore Authors Block I> Unit I, Unit II, Unit III & Unit Mr. Ashutosh Bahuguna, Scientist- Indian IV Computer Emergency Response Team (CERT-In), Department of Electronics & IT, Ministry of Communication & IT, Government of India Block II> Unit I, Unit II, Unit III & Unit Mr. Sani Abhilash, Scientist- Indian IV Computer Emergency Response Team Block III> Unit I, Unit II, Unit III & Unit (CERT-In), Department of Electronics & IT, IV Ministry of Communication & IT, Government of India ISBN: 978-93-84813-95-6 Acknowledgement The University acknowledges with thanks the expertise and financial support provided by Commonwealth Educational Media Centre for Asia (CEMCA), New Delhi, for the preparation of this study material. Uttarakhand Open University, 2016 © Uttarakhand Open University, 2016. Advanced Cyber Security Techniques is made available under a Creative Commons Attribution Share-Alike 4.0 Licence (international): http://creativecommons.org/licenses/by-sa/4.0/ It is attributed to the sources marked in the References, Article Sources and Contributors section. Published by: Uttarakhand Open University, Haldwani Expert Panel S. No. Name 1 Dr. Jeetendra Pande, School of Computer Science & IT, Uttarakhand Open University, Haldwani 2 Prof. Ashok Panjwani, Professor, MDI, Gurgoan 3 Group Captain Ashok Katariya, Ministry of Defense, New Delhi 4 Mr. Ashutosh Bahuguna, Scientist-CERT-In, Department of Electronics & Information Technology, Government of India 5 Mr.
    [Show full text]