<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>B&#039;Cognizance &#124; Business Magazine &#187; iSecure</title>
	<atom:link href="https://bcognizance.iiita.ac.in/archive/apr-oct15/?cat=7&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>https://bcognizance.iiita.ac.in/archive/apr-oct15</link>
	<description>B&#039;Cognizance &#124; Business Magazine</description>
	<lastBuildDate>Thu, 20 Aug 2015 16:33:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Deeper dive to Methods of Hacking</title>
		<link>https://bcognizance.iiita.ac.in/archive/apr-oct15/?p=88</link>
		<comments>https://bcognizance.iiita.ac.in/archive/apr-oct15/?p=88#comments</comments>
		<pubDate>Sun, 26 Apr 2015 08:31:30 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[iSecure]]></category>
		<category><![CDATA[Uncategorized]]></category>

		<guid isPermaLink="false">http://localhost/bcognizance/?p=88</guid>
		<description><![CDATA[In the previous article, we have discussed about the basics of ethical hacking. In the current one, we will dive little deeper into different methods used for the purpose of hacking. Recalling once again, I should state that hackers are the persons who have deeper knowledge of programming languages, operating system, and networking concepts. Not]]></description>
				<content:encoded><![CDATA[<p>In the previous article, we have discussed about the basics of ethical hacking. In the current one,<br />
we will dive little deeper into different methods used for the purpose of hacking. Recalling once<br />
again, I should state that hackers are the persons who have deeper knowledge of programming<br />
languages, operating system, and networking concepts. Not only knowledge of above mentioned<br />
topics, they have keen interest in exploring different kind of things into learning anything to a<br />
much deeper level.<br />
There are various methods that are used for the purpose of hacking. Some of them are:<br />
1.   <strong>Digital Footprinting:</strong> Digital footprints, also called digital shadow are the track of all<br />
the data that user leaves when he was online. Digital footprints can be Passive or Active.<br />
a.   Passive footprints are created when data are collected without letting user know.<br />
When you come online then you might have noticed on different webpages that<br />
they are showing ads of your choice. In fact they come to know about your choice<br />
based on your browsing history, search history and cookies. Advertisers read data<br />
from your browser and show you the relevant ad. None of the advertiser asks you<br />
for the permission for showing their ad, it clearly means they do all these things<br />
without letting you get noticed.<br />
b.   Active Footprints are created when user willingly release their data by  sharing<br />
their details on social sites or any other webpage.<br />
<strong>2.   Social  Engineering:</strong>  It’s  a  non-technical  method  used  by  hackers  to  intrude  into<br />
someone’s  account.  It  relies  heavily  on  the  human  interaction  to  break  the  normal<br />
security  procedure.  It  includes  the  process  of  guessing,  and  hence  is  performed  on<br />
someone about whom  you know well. If  you know anyone closely then you can guess<br />
answer of security questions and recover his account.<br />
<strong>3.   Denial of Service:</strong> In DoS attack, some of the specific service is made unavailable from<br />
target user. These attacks can have three types of targets:<br />
a.   Network connection that provides access to the service<br />
b.  Operating system that hosts the service<br />
c.   Application program that provides the service<br />
<strong>4.   Keyloggers:</strong> Keyloggers are the programs / device that keeps log of each keystroke in a<br />
file. A keylogger can be software based or hardware based.<br />
a.   Software Based Keylogger: It is the software program that needs to be installed<br />
on  victim’s  system.  Attacker  use  to  configure  his  email  address  on  the  victim<br />
machine so as all these log files are sent to his email address. Not only the textual<br />
log, but screenshot of the victim machine is also sent at particular time interval<br />
that is being configured in the setting of keylogger.</p>
<p><a href="http://bcognizance.iiita.ac.in/wp-content/uploads/2015/04/7.jpg"><img class="alignnone size-medium wp-image-90" src="http://bcognizance.iiita.ac.in/wp-content/uploads/2015/04/7-300x169.jpg" alt="7" width="300" height="169" /></a></p>
<p><strong>5.   SQL Injection:</strong> It’s a code injection technique that inserts some malicious SQL statement<br />
into  the  entry  field  and  executes  them.  In  simple  words,  we  can  say  SQL  injection  as<br />
running my SQL statement on the target site. This technique is applied on the web-apps<br />
and  web-pages.  It  can  reveal  all  data  from  the  database  of  the  website  to  the  attacker,<br />
even your username and password.<br />
<strong>6.   XSS (Cross Site Scripting)</strong>: XSS vulnerabilities can also found in the web applications.<br />
Hackers  use  this  to  intrude  some  script  to  the  webpage,  and  security  risk  varies<br />
significantly depending on the nature of script. Various threats may be:<br />
a.   Cookie  stealing:  Cookie  stores  user  data  in  the  browser.  Stealing  cookie  will<br />
definitely led to data theft.<br />
b.  Session hijacking<br />
c.   DoS attack<br />
<strong>7.   Spoofing: </strong> Spoofing  is  the  process  of  falsifying  data  and  gaining  benefits  of  the  same.<br />
Various techniques that are covered under spoofing are:<br />
a.   Email spoofing: It includes sending mail from anonymous email.<br />
b.  Call spoofing: It includes making fake phone calls. One can use this trick to call<br />
you with your own number too.<br />
c.   IP address spoofing: It involves changing the IP address of your computer.<br />
d.  GPS  spoofing:  It  attempts  to  deceive  a  GPS  receiver  so  as  to  deliver  wrong<br />
location.<br />
e.   DNS spoofing: It’s a trick where data is intruded to the DNS resolver’s cache that<br />
cause  the  name  server  to  return  an  incorrect  IP  address  which  further  leads  to<br />
divert all traffic to the attacker’s computer or any other computer.</p>
<p><strong>8.   Steganography: </strong> It’s the process of masking  a file into other. File may be text, image,<br />
audio or video. They are treated as normal file by the victims, but hackers unmask them<br />
to reveal hidden data from it. Main advantage of the steganography is to transfer secret<br />
messages. Again, steganography can be of different type:<br />
a.   Text steganography: Hiding messages inside the texts, it is not to be confused<br />
with cryptography.<br />
b.  Email steganography: Similar to the text steganography, it is also used to deliver<br />
short  messages.  Original  message  is  masked  and  a  fake  message  is  displayed<br />
which can later be unmasked.<br />
c.   Audio / Video steganography: Hiding data in the audio and video files<br />
d.  Image steganography: Hiding data behind the image files<br />
<strong>9.   Man in the Middle:</strong> When we open any webpage then the corresponding request is made<br />
to the server, in the form of packet. MITM attack is used to capture these packets while it<br />
travels  through  the  network.  Once  the  hacker  intrudes  into  the  packet,  he  can  easily<br />
extract data from it.<br />
<strong>10. Trojans  and  bombs: </strong> These  are  the  malicious  programs  that  when  executed  performs<br />
some action depending on the type of Trojan, which led to system harm and data theft. To<br />
access victim’s system remotely, hackers may use trojans as backdoor, and after gaining<br />
access hacker can perform any action including:<br />
a.   Formatting hard disk<br />
b.   Crashing computer<br />
c.   Corrupting data<br />
d.   Data theft<br />
e.   Keylogging<br />
f.   e-Money theft<br />
g.   Controlling system remotely<br />
h.   And many others…</p>
<blockquote><p><em>Kamal Nayan</em></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/apr-oct15/?feed=rss2&#038;p=88</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Shadow IT</title>
		<link>https://bcognizance.iiita.ac.in/archive/apr-oct15/?p=86</link>
		<comments>https://bcognizance.iiita.ac.in/archive/apr-oct15/?p=86#comments</comments>
		<pubDate>Sun, 26 Apr 2015 08:23:30 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[iSecure]]></category>

		<guid isPermaLink="false">http://localhost/bcognizance/?p=86</guid>
		<description><![CDATA[Shadow IT, once confined to unapproved macros in MS Excel has now grown exponentially over the years becoming a major part of IT firms and introducing new security risks arising from unsupported hardware or software. What is Shadow IT? It is any hardware or software inside the organisation which hasn’t yet been approved by the]]></description>
				<content:encoded><![CDATA[<p>Shadow IT, once confined to unapproved macros in MS Excel has now grown exponentially over the<br />
years becoming a major part of IT firms and introducing new security risks arising from unsupported<br />
hardware or software.</p>
<p>What is Shadow IT?<br />
It is any hardware or software inside the organisation which hasn’t yet been approved by the IT<br />
department of that organization, thus, information technology projects managed without the<br />
knowledge of the IT department.<br />
The rise in Shadow IT and its increased usage was due to desire of the employees to get direct and<br />
instant access to any software or technology without the need to go through any corporate<br />
channels. Recently, this has spread to the need to use their own personal technology at work (such<br />
as BYOD).<br />
A McAfee sponsored study brings out 6 key points on Shadow IT and its true nature.<br />
1.   More than 80% of the surveyed respondents admitted using it.<br />
2.   The biggest users are not the general users, but they are in fact the&#8230; IT employees!<br />
3.   There is no clear communication or rules regarding SaaS policies.<br />
4.   Employees do not want to put their organisation at any risk, they just want to get their work<br />
done comfortably.<br />
5.   Web based analytical tools, word processing/spreadsheet tools and even web conferencing<br />
platforms are the most common types.<br />
6.   Around a half of the surveyed individuals recognize the risks of Shadow IT but even this<br />
sense of risk is not stopping these employees from deterring from its usage.</p>
<p>By 2020, 40% of the IT budget will be spent outside the IT department according to estimates. With<br />
this widespread use to Shadow IT, the risks it brings along has become quite obvious. It can easily<br />
become a barrier to an enterprise’s IT compliance, such as when a user is using Google Drive for<br />
storing company data in place of the company provided cloud storage service(s). It can also impact<br />
the experience of other employees in the organisation. Free flow of data across the organisation<br />
may be hampered and monitoring of such data flow can become a concern.<br />
But, even with the severity of the risks involved, it is necessary to understand that the world will not<br />
recognize a ban of Shadow IT, if ever there is going to be one. It is here to stay, that’s for sure.<br />
Employees will not stop bringing or using their own personal cloud services or their mobile phones<br />
or tablets at work. The best IT organisations can hope for is to embrace Shadow IT and create<br />
restrictions at proper junctions. After all, Shadow IT is making employees more innovative at their<br />
work and making their jobs a little more likeable, thereby, increasing the overall productivity.</p>
<p>&nbsp;</p>
<blockquote><p><em>Arshad Ahmed </em><br />
<em>IIIT Allahabad, </em><br />
<em>MBA-IT/Semester: 04, IMB2013023</em></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/apr-oct15/?feed=rss2&#038;p=86</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
