Thursday, August 17, 2017

Cookies and privacy

What are cookies ?


Cookies are little content records that are put on your PC or cell phone by sites you visit or certain messages you open. Generally a cookies tells a site when you return. Think about a cookies as a remarkable and individual recognizable proof card. There are distinctive sorts of cookies ; some are discretionary while others are entirely fundamental for a site to work legitimately.

Their principle reason for existing is to make sites work, or work more effective, and also to give critical business and advertising data about you to the site. As a result, they allow websites to personalize the content you see based on your browsing preferences and habits, such as language and geographical region.

A following cookies is a particular sort of treat that is appropriated, shared, and perused crosswise over at least two disconnected sites with the end goal of gathering data or to offer you an altered ordeal. Not all cookies are tracking cookies .


How cookies work ?


you visit a site that hosts internet advertising from an outsider merchant. Therefore, as a sponsor on the site,that third party vendor  can put a treat on your PC. On the off chance that they choose to put a cookie on your PC and you visit another site that additionally has promotion from a similar third party vendor, at that point that seller will know you have gone to the two sites. Obviously nothing malicious has happened, however now the seller can by implication decide every one of the destinations you visit on the off chance that they have treats display on those locales. This is just one example; cookies can collect a variety of other information.


How to protect your privacy 

  • Be specific about which sites you went by .
  • Keep in mind you can simply quit or choose the level of data you wish to share, so check your program's protection settings .
  • Most browsers have settings, which allow you to establish your preferences for cookies, allowing you to delete or block them from your computer


Monday, August 14, 2017

What is Social Engineering?

Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software–that will give them access to your passwords and bank information as well as giving them control over your computer.
Criminals use social engineering tactics because it is usually easier to exploit your natural inclination to trust than it is to discover ways to hack your software.  For example, it is much easier to fool someone into giving you their password than it is for you to try hacking their password (unless the password is really weak).

 Common social engineering attacks

Email from a friend. If a criminal manages to hack or socially engineer one person’s email password they have access to that person’s contact list–and because most people use one password everywhere, they probably have access to that person’s social networking contacts as well.
Once the criminal has that email account under their control, they send emails to all the person’s contacts or leave messages on all their friend’s social pages, and possibly on the pages of the person’s friend’s friends.
These messages may use your trust and curiosity:
  • Contain a link that you just have to check out–and because the link comes from a friend and you’re curious, you’ll trust the link and click–and be infected with malware so the criminal can take over your machine and collect your contacts info and deceive them just like you were deceived.
  • Contain a download–pictures, music, movie, document, etc., that has malicious software embedded. If you download–which you are likely to do since you think it is from your friend–you become infected. Now, the criminal has access to your machine, email account, social network accounts and contacts, and the attack spreads to everyone you know. And on, and on.
These messages may create a compelling story or pretext:
  • Urgently ask for your help–your ’friend’ is stuck in country X, has been robbed, beaten, and is in the hospital. They need you to send money so they can get home and they tell you how to send the money to the criminal.
  • Asks you to donate to their charitable fundraiser, or some other cause – with instructions on how to send the money to the criminal. 
  • Urgently ask for your help–your ’friend’ is stuck in country X, has been robbed, beaten, and is in the hospital. They need you to send money so they can get home and they tell you how to send the money to the criminal.
  • Asks you to donate to their charitable fundraiser, or some other cause – with instructions on how to send the money to the criminal.
Phishing attempts. Typically, a phisher sends an e-mail, IM, comment, or text message that appears to come from a legitimate, popular company, bank, school, or institution.
These messages usually have a scenario or story:
  • The message may explain there is a problem that requires you to "verify" of information by clicking on the displayed link and providing information in their form. The link location may look very legitimate with all the right logos, and content (in fact, the criminals may have copied the exact format and content of the legitimate site). Because everything looks legitimate, you trust the email and the phony site and provide whatever information the crook is asking for. These types of phishing scams often include a warning of what will happen if you fail to act soon, because criminals know that if they can get you to act before you think, you’re more likely to fall for their phish.
  • The message may notify you that you’re a ’winner’. Maybe the email claims to be from a lottery, or a dead relative, or the millionth person to click on their site, etc. In order to give you your ’winnings’ you have to provide information about your bank routing so they know how to send it to you, or give your address and phone number so they can send the prize, and you may also be asked to prove who you are often including your Social Security Number. These are the ’greed phishes’ where even if the story pretext is thin, people want what is offered and fall for it by giving away their information, then having their bank account emptied, and identity stolen.


  • The message may ask for help.  Preying on kindness and generosity, these phishes ask for aid or support for whatever disaster, political campaign, or charity is hot at the moment.

    • How do you avoid being a victim?
      •       Be suspicious of unsolicited phone calls, visits, or email messages from individuals asking about employees or other internal information. If an unknown individual claims to be from a legitimate organization, try to verify his or her identity directly with the company.
      •    Do not provide personal information or information about your organization, including its structure or networks, unless you are certain of a person's authority to have the information.
      •      Do not reveal personal or financial information in email, and do not respond to email solicitations for this information. This includes following links sent in email.
      •        Don't send sensitive information over the Internet before checking a website's security. 
      •        Pay attention to the URL of a website. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com vs. .net).
      •       If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly. Do not use contact information provided on a website connected to the request; instead, check previous statements for contact information. Information about known phishing attacks is also available online from groups such as the Anti-Phishing Working Group.
      •         Install and maintain anti-virus software, firewalls, and email filters to reduce some of this traffic. 
      •      Take advantage of any anti-phishing features offered by your email client and web browser.




      Tuesday, August 8, 2017

      Cyber-stalking



      What is 

      Cyber-stalking  ?


      Cyber-stalking includes utilizing electronic means, including the Web, to stalk or harass a man or group of people. Cyber-stalking can include numerous things including dangers, requesting for sex, false allegations, criticism, defame, slander, wholesale fraud, and vandalism. Cyber-stalking is frequently utilized as a part of conjunction with offline stalking stalking, as both are a statement of a longing to control, threaten, or control a casualty. A Cyber-stalker might be somebody the casualty knows about, or a total outsider, and is a criminal offense. 





      What are the forms of Cyber stalking ?

      • Embarrassing and humiliating the victim
      • Frightening the victim by using scare tactics and threats
      • Isolating the victim by harassing his family, friends, and employer
      • Harassing the victim

      Now lets identify how to identify Cyber stalking


      False allegations. A cyberstalker regularly tries to harm the notoriety of his casualty by posting false data via web-based networking media sites or web journals. A culprit may even make imaginary sites or different records with the end goal of spreading false bits of gossip and affirmations about the casualty. 

      Checking victims exercises. A cyberstalker may endeavor to follow his casualty's IP address, or hack into the casualty's web-based social networking records and messages to find out about his online exercises. 

      Urging others to irritate the victim. The wrongdoer may empower the inclusion of outsiders to pester the casualty. 

      False victimization. It is normal for a cyberstalker to assert the casualty is annoying him, taking the position of casualty as far as he could tell.



      Monday, August 7, 2017

      Information Security Policies

      Policies can be used as a primary and cost effective way of assuring security in terms of information security. Hear the degree of the protection provided will depend on the policy that is being generated and on the attitude of the management on the matter.

      As a policy maker ,the prime responsibility would be to set the information resource security policy for the organizations objective. It should be aligned to reducing risks, compliance with the law and regulations and assurance of operations. It should also maintain information integrity and confidentiality.

      The basic rules to follow when shaping a policy

      1. Never conflict with law
      2. Stand up in court
      3. Properly sported and administered
      4. Contribute to the success if the organization
      5. Involve end user of information systems

      Characteristics of an effective policy 

      For a policy to be effective as expected, they must achieve the below.

      1. Properly disseminated.
      2. Well read.
      3. Understood.
      4. Agreed to it.
      Now lets get to know about a brief understanding about the types of effective policies.
      These are the 3 types if information security policies that have been defined.


      1. Enterprise inforsec program policy
      2. Issue specific inforsec policies
      3. System-epsecific inforsec policies.


      Saturday, August 5, 2017

      Introduction to Cryptography

      Overview of the field of the Cryptology


      Cryptology can be basically introduced as a study of codes and as an art of learning to write and solve them. Basically it can be divided in to two parts, and they are Cryptography and Cryptoanalysis.

      The filed of cryptography is the art of writing codes. It converts plain texts in to cypher texts.
      The other is Crypto analysis.  In this area you learn to break the code to convert the cypher text to plain text.


      Few basic facts about Cryptography

      Ancient cryptography : The earliest signs of cryptography could be seen in the Egyptian time where letter based encryption schemes were used.

      Symmetric ciphers : All the encryption schemes from ancient times until 1976 were symmetric   ciphers.

      Asymmetricciphers:In1976public-key(orasymmetric)cryptographywasopenly proposedbyDiffie,HellmanandMerkle.

      Test Images

      Below images  are being used for the   Hashtag Generator and Content Authenticator research .