Cyber Security & Cybercrime

 


Cyber Security  & Cybercrime

What is cybercrime?

Cybercrime is Criminal activity that either targets of users a computer, a computer network or computer devices.

For example:

·       Identify Theft

·       Online predators

·       BFC (Business Email Compromise)

·       Stealing of sensitive intellectual property

Cybercrime has been increasing regularly every year. Why is Cyber crime on the rise? The reason are given below:

·       Cyber crime is easy to accomplish

·       Attackers can target thousand of victims

·       Money laundering is easier with Cryptocurrencies

Cyber Security Dark web

·       The Dark web (also called The Dark Net) is a network within the internet which only accessible using certain software and protocols.

·       Anyone can access to the Dark web by Simply downloading Software for it. A popular and very much used browser is the Tor project Tor Browser.

·       Any traffic sent through Tor Browser is automatically anonymized and encrypted via many different hosts.

Layer 1- Physical Layer

·       CAN Bus

·       Ethernet Physical layer

·       Bluetooth Physical layer

Layer 2- Link Layer

·       Ethernet

·       Wi-Fi

·       NDP (Neighbor Discovery Protocol)

Layer 3- Network Layer

·       IP (Internet protocol)

·       ICMP (Internet Control Message Protocol)

·       IPsec (Internet Protocol Security)

Layer 4- Transport

·       TCP (Transfer Control Protocol)

·       UDP (User Datagram Protocol)

·       QUIC (Quick UDP Internet Connection)

Layer 5- Session layer

·       Socks

·       NetBIOS

·       SIP (Session Initiation Protocol)

Layer 6- Presentation Layer

·       Encoding schemes

·       Encryption

·       Compression

Layer 7- Application Layer

·       HTTP (Hyper Text Transfer Protocol)

·       FTP (File Transfer protocol)

·       SNMP (Simple Network Management Protocol)

Cyber Security Network Attacks

·       Buffer Overflow

·       Vulnerability Scanners

·       Code Execution

·       Network Monitoring

·       Peer to Peer traffic

Cyber Security Web application attacks

·       IDUR (“Insecure Direct object reference”)

·       Avoiding “Magical Numbers”

·       SQL injection

·       XSS (“ Cross-site Scripting)

Comments

Popular Posts