Cyber Crimes & Its Examples
Cyber Crimes & Its Examples
Syllabus
UNIT 1: Introduction to Cybercrime
UNIT 2: Cyber offenses
UNIT 3: Cybercrime: Mobile and Wireless devices
UNIT 4: Tools and method used in Cybercrime
UNIT 5: Phishing and identity theft
UNIT 6: Cybercrimes and Cyber Security: The legal
perspectives
TEXT BOOK:
Cyber Security by Nina Godbole,Sunit Belapure, Wiley
India, 1st edition copyright 2011 reprint 2013.
REFERENCES:
Computer Forensics and Cyber Crime An Introduction by
Marjie T. Britz ,Pearson publication, 2nd edition.
definition
⚫ “Cybercrime (computer crime) is any illegal behavior,
directed by means of electronic operations, that target
the security of computer systems and the data
processed by them”.
⚫ Hence cybercrime can sometimes be called as
computer-related crime, computer crime, E-crime,
Internet crime, High-tech crime….
Cybercrime specifically
can be defined
in number of ways…
⚫ A crime committed using a computer and the internet
to steal a person’s identity(identity theft) or sell
contraband or stalk victims or disrupt operations with
malevolent programs.
⚫ Crimes completed either on or with a computer
⚫ Any illegal activity through the Internet or on the
computer.
⚫ All criminal activities done using the medium of
computers, the Internet, cyberspace and the WWW.
definitions for
cybercrime
⚫ Any illegal act where a special knowledge of computer
technology is essential for its perpetration, investigation or
prosecution
⚫ Any traditional crime that has acquired a new dimension
or order of magnitude through the aid of a computer, and
abuses that have come into being because of computers
⚫ Any financial dishonesty that takes place in a computer
environment.
⚫ Any threats to the computer itself, such as theft of
hardware or software, sabotage and demands for ransom
1.2 DEFINING CYBER CRIME
▪ Crime committed using a computer and the
internet to steal data or information.
▪ Illegal imports.
▪ Malicious programs.
Cybercrime
⚫ Cybercrime is not a new phenomena
⚫ The first recorded cybercrime took place in the year 1820.
⚫ In 1820, JosephMarie Jacquard, a textile manufacturer in
France, produced the loom. This device allowed the
repetition of a series of steps in the weaving of special
fabrics. This resulted in a fear amongst Jacquard's
employees that their traditional employment and livelihood
were being threatened. They committed acts of sabotage to
discourage Jacquard from further use of the new echnology.
This is the first recorded cyber crime!
further
⚫ Cybercrime refers to the act of performing a criminal act using cyberspace
as communication vehicle.
⚫ Two types of attacks are common:
⚫ Techno- crime : Active attack
⚫ Techno Crime is the term used by law enforcement agencies to denote criminal activity
which uses (computer) technology, not as a tool to commit the crime, but as the
subject of the crime itself. Techno Crime is usually pre-meditated and results in the
deletion, corruption, alteration, theft or copying of data on an organization's systems.
⚫ Techno Criminals will usually probe their prey system for weaknesses and will almost
always leave an electronic 'calling card' to ensure that their pseudonym identity is
known.
⚫ Techno – vandalism: Passive attack
⚫ Techno Vandalism is a term used to describe a hacker or cracker who breaks into a
computer system with the sole intent of defacing and or destroying its contents.
⚫ Techno Vandals can deploy 'sniffers' on the Internet to locate soft (insecure) targets
and then execute a range of commands using a variety of protocols towards a range of
ports. If this sounds complex - it is! The best weapon against such attacks is a firewall
which will hide and disguise your organization's presence on the Internet.
1.3 Cybercrime and information
security
⚫ Lack of information security give rise to cybercrime
⚫ Cybersecurity: means protecting information,
equipment, devices, computer, computer resource,
communication device and information stored therein
from unauthorized access, use, disclosure, disruption,
modification or destruction.
Challenges for securing data in
business perspective
⚫ Cybercrime occupy an important space in information
security due to their impact.
⚫ Most organizations do not incorporate the cost of the
vast majority of computer security incidents into their
accounting
⚫ The difficulty in attaching a quantifiable monetary
value to the corporate data and yet corporate data get
stolen/lost
⚫ Financial loses may not be detected by the victimized
organization in case of Insider attacks : such as leaking
customer data
1.4 Who are Cybercriminals?
⚫ Are those who conduct acts such as:
⚫ Child pornography
⚫ Credit card fraud
⚫ Cyberstalking
⚫ Defaming another online
⚫ Gaining unauthorized access to computer systems
⚫ Ignoring copyrights
⚫ Software licensing and trademark protection
⚫ Overriding encryption to make illegal copies
⚫ Software piracy
⚫ Stealing another’s identity to perform criminal acts
Categorization of Cybercriminals
⚫ Type 1: Cybercriminals- hungry for recognition
⚫ Hobby hackers
⚫ A person who enjoys exploring the limits of what is
possible, in a spirit of playful cleverness. May modify
hardware/ software
⚫ IT professional(social engineering):
⚫ Ethical hacker