Introduction To Cyber Crimes Cyber Security
Introduction To Cyber Crimes Cyber Security
1. Learning Outcomes:
After reading this chapter, you would be able to
Understand the meaning of cyber crime,
Differentiate between cyber crime and conventional crime,
Know various categories and kinds of cyber crimes,
Understand the meaning of computer and cyber security,
Source: http://www.digit.in/technology-guides/fasttrack-to-cyber-crime/what-is-
cyber-crime.html
Meaning of Cyber Crime
Computer crime or cybercrime refers to any crime committed with the use of computers or especially
through the internet. Computer crime, cybercrime, electronic crime or hi-tech crime normally refers to a
criminal activity where computer or network is used as a tool or target of a crime.
Computer as a tool
When individual is the main target of the crime committed by the offenders then the computer can be
described as a tool and not the target (e.g., cyber stalking, cyber theft etc.).
Computer as a target
These crimes are committed by a selected group of people with technical knowledge by committing a series
of acts in the planned manner (e.g., web defacement, cyber
Unathorised
Access &
Hacking
Cyber Virus,Worms &
Stalking Trojan Attack
Web
Defacement E-mail related crimes
Kinds of
Cyber
Crimes Internet Relay
Intellectual Chat relating
Property Crimes crimes
Sale of
Phishing Illegal
Articles
Online
Gambling
Computer Worm
Source: https://www.sophos.com/zh-cn/press-office/pressreleases/2003/09/va_ tonyblair.aspx
Trojan attack: A Trojan, a friendly looking enemy, is an unauthorized program which functions from inside
what looks like authorized program, thereby concealing what it is actually doing.
Warning message for a Trojan Horse
4. E-mail related crimes. Some of these crimes have been explained below :
i. E-mail spoofing:
It refers to e-mail that appears to have been originated from one source where as it was actually sent from
some different source. Thus, it is a fraudulent email activity with intent to cheat the other party.
E-mail Spoofing
Gujarat Ambuja Cement executive case is the best example of email spoofing in India
where the former executive of the said company posed as a woman and generated a fake
email ID through which he contacted Abu Dhabi based NRI businessman and deceived
him for crores by blackmailing tactics.
E-mail Bombing
There is a famous case relating to email bombing in which a foreigner was a resident of
Shimla (India) for almost 30 years. The Shimla Housing Board launched a scheme to
sell land at lower rates. The foreigner had applied under this scheme but his application
was not accepted on the ground that the scheme was available for citizens of India. He
decided to take revenge. Subsequently he sent thousands of emails to Shimla Housing
Board and frequently kept sending huge volumes of email till their servers crashed.
7. Phishing:
It refers to acquiring sensitive information such as username, password, credit card details, account data etc. by
disguising as a trustworthy entity. For example, your bank may send you email (which appears genuine to you)
asking you to update your personal information by clicking at a specified link. As it appears genuine, you may
be asked to visit a fraudulent site where all your sensitive information is acquired and subsequently used for
used for cybercrimes and frauds. Phishing is punishable under Sections 66, 66A & 66D of the IT Act, 2000.
8. Intellectual property crimes:
These include distribution of pirated software, copyright infringement, trademarks violations etc. Alternatively,
this is also known as Cyber Squatting. Satyam Infoway Ltd. vs. Sifynet Solutions (2004) is the most widely
known case pertaining to Cyber Squatting.
9. Web defacement:
It refers to substitution of the original homepage of a website with another page by a hacker or cracker. The
substituted page contains normally pornographic or defamatory material. Sections 43, 66, 66F, 67 and 70 of the
IT Act are applicable in some cases of web defacement.
Cyber Crime
A and B are into live-in-relationship for the last 5 years. One day they found that an
unauthorized person posted their photographs on the social networking site.
What do you think is this act of the persons involved a cyber crime?
If yes, name the type of cyber crime involved and discuss with your peers whether it is
punishable or not?
5. Cyber Security:
Cyber security refers to the technologies and processes designed to protect computers, networks and data
from unauthorized access and attacks delivered via the internet by cyber criminals. Cyber security is
necessary since it helps in securing data from threats such as data theft or misuse, hacking etc. It also
safeguards the
Malware Warning