Page 135 - DCAP516_COMPUTER_SECURITY
P. 135

Unit 11: Threats in Network




          11.1 Types of Network Threats                                                         Notes

          For any individual or organisation that uses computer technology, security threats are evolving
          and becoming increasingly dangerous. Computer users are involved in an arms race with
          hackers and virus writers. This makes it imperative to understand the types of computer threats
          that may affect a computer system or a network of computers. Let us discuss in detail the
          potential threats to a computer system in network.
          1.   Hacking: Section 66 of the Information Technology Act, 2000 defines the offence of hacking.
               The Act has taken a unique approach to defining the term ‘hacking’. Hacking is usually
               understood to be unauthorized access of computer systems and networks. Indian law has,
               however, given a different connotation to the term hacking, so we cannot use the term
               “unauthorized access” interchangeably with the term “hacking”. However, as per Indian
               law, unauthorized access does occur, if hacking has taken place. Indian law has chosen to
               define hacking in relation to information. Section 66(1) of the Information Technology Act
               states, “Whoever with the intent to cause or knowing that he is likely to cause wrongful
               loss or damage to the public or any person destroys or deletes or alters any information
               residing in a computer resource or diminishes its value or utility or affects it injuriously
               by any means, commits hacking”. And Section 66(2) states, “Whoever commits hacking
               shall be punished with imprisonment up to three years, or with fine which may extend up
               to two lakh rupees, or with both”.

               Firstly, there must be either an intention to cause wrongful loss or damage to any person,
               or knowledge that wrongful loss or damage will be caused to any person. Wrongful loss/
               damage is the loss/damage caused by unlawful means. Secondly, information residing in
               a computer resource must be destroyed. Destroying information also includes acts that
               render the information useless for the purpose for which it had been created.
               Section 66(2) of the IT Act provides for imprisonment up to 3 years and/or fine up to ` 2
               lakh as a punishment for hacking. The definition of hacking is so wide that numerous
               cyber crimes can be included under the ambit of hacking. Some of these are virus attacks
               leading to loss of information, data diddling, salami attacks, Internet time theft, etc.
          2.   Unauthorized Access: “Access” is defined in Section 2(1)(a) of the Information Technology
               Act as “gaining entry into, instructing or communicating with the logical, arithmetical, or
               memory function resources of a computer, computer system or computer network”.
               Therefore, unauthorized access means any kind of access without the permission of either
               the rightful owner or the person in charge of a computer, computer system or computer
               network. Thus, not only accessing a server by cracking its password authentication system
               is unauthorized access, switching on a computer system without the permission of the
               person in charge is also unauthorized access. Packet sniffing, tempest attack, password
               cracking and buffer overflow are common techniques used for unauthorized access.

          3.   Packet Sniffing: Packet Sniffing is a technology used by hackers to intercept and decrypt
               the data packets flowing on a computer network. We know that data travels in the form of
               packets on networks. These packets, also referred to as data-grams, are of various sizes
               depending on the network bandwidth as well as amount of data being carried in the
               packet in the measure of bytes. Each packet has an identification label also called a ‘header’.
               The header carries information of the source, destination, protocol, size of packet, total
               number of packets in sequence and the unique number of the packet.
               The data carried by the packet is in an encrypted format for the sake of convenience in
               transmitting the data. This cipher text (encrypted form) is also known as the hex of the






                                           LOVELY PROFESSIONAL UNIVERSITY                                   129
   130   131   132   133   134   135   136   137   138   139   140