INTERNSHIP Harish
INTERNSHIP Harish
SEMINAR REPORT
Submitted in partial fulfillment of the requirements for the award of the degree of
BACHELOR OF ENGINEERING
IN
ELECTRONICS AND COMMUNICATION ENGINEERING
Submitted by
Vishwanath G Desaigoudar 2KE17EC026
Under the guidance of
Mr. Prasant Hanasi
K.L.E Society’s
K. L. E. INSTITUTE OF TECHNOLOGY
HUBBALLI – 580030
2021-2022
i
K.L.E Society’s
K.L.E. INSTITUTE OF TECHNOLOGY
HUBBALLI-580030
CERTIFICATE
This is to certify that the “Seminar Report” submitted by Vishwanath G Desaigoudar with USN:
2KE16EC113 of VIII Semester B.E., Department of Electronics and Communication Engineering
is work done by him/her and submitted during 2020 – 2021 academic year, in partial fulfillment of the
requirements for the award of the degree of of Bachelor of Engineering in Electronics and
Communication Engineering of Visvesvaraya Technological University, Belgaum during academic
year 2020-2021.
1.
2.
ii
DECLARATION
Vishwanath G D 2KE16EC113
Date:--2022 DDesaigouda
Place: Hubballi
iii
ACKNOWLEDGEMENT
The sense of contentment and elation that accompanies the successful completion of my
internship and its report would be incomplete without mentioning the names of the people
who helped me in accomplishing this. For this I acknowledge and express my profound
gratitude and thank to my guides Mr. Prasant H for initiating the importance of study of
this concept. I acknowledge that I have learnt the importance of technical research and
good presentation skills.
I feel deeply indebted to our H.O.D. Dr. Manu T. M. for the constant support and
encouragement in all my endeavors. The academic ambience has helped us to excel in my
academics.
I take this opportunity offer our sincere thanks with to our beloved Principal Dr. B. S.
Anami who is always keen on enhancing the quality of teaching-learning and always a
source of inspiration to us. I would like to thank our Dean Academics Dr. S. G. Joshi
for his constant encouragement for our academic progress.
I take this opportunity to express my sincere thanks to coordinators Prof. Santosh H, for
dedicating time to arrange for critical evaluations that helped for proper flow of seminar
work.
Last but not the least, I would like to thank my parents and friends for their well wishes
for my success.
iv
ABSTRACT
“Cyber” refers to imaginary space, which is created when the electronic devices
communicate, like network of computers. Cyber-crime refers to anything done in
the cyber space with a criminal intent. These could be either the criminal activities
in the conventional sense or could be activities, newly evolved with the growth of
the new medium. Cyber-crime includes acts such as hacking, uploading obscene
content on the Internet, sending obscene e-mails and hacking into a person's e-
banking account to withdraw money. Computer crime, or cybercrime, refers to any
crime that involves a computer and a network, where the computers played an
instrumental part in the commission of a crime. Cyber Crime has nowhere been
defined in any statute /Act passed or enacted by the Indian Parliament. The
concept of cyber-crime is not radically different from the concept of conventional
crime. Both include conduct whether act or omission, which cause breach of rules
of law and counterbalanced by the sanction of the state. particularly those
surrounding hacking, copyright infringement through warez, child pornography
and child grooming.
v
CONTENT
Certificate ii
Declaration iii
Acknowledgement iv
Abstract v
Table of Content vii
List of Figures ix
Chapter Name Page No.
No.
1. Introduction 1
2. Reason for cyber crime 3
3.Cyber Criminals
4 Mode and Manner for committing cyber crime 3
.
4.1 Unauthorized access to computer system/Hacking 5
4.2 Theft of information contained in electronic form 6
4.3 Email Bombing 7
4.4 Data diddling 8
4.5 Salami Attacks 9
4.6 Denial Of service Attacks 10
4.7 Virus /Worms Attack 12
4.8 Logic Bomb 12
4.9 Trojan Attacks
4.10 Internet time Theft
4.11 Web jacking
5. Classification 13
5.1 Against Individuals 13
5.2 Against Organizations 14
5.3 Against Society at Large 15
6. Some Case Studies 16
7. Prevention 16
8. Conclusion 17
9. Bibliography 19
vi
19
21
List Of Tables
6. Snapshot of Important Cyberlaw Provisions in India 18
6. Computer Related Crimes Covered under Indian Penal Code and Special
Laws 18
List Of Figures
5. The subject of cyber-crime may be broadly classification. 10
6. Statistical data on Cyber Crime. 17
vii
Electronics and communication
CHAPTER 1
1. Introduction:
The term ‘cyber crime’ is a misnomer. This term has nowhere been defined in any
statute /Act passed or enacted by the Indian Parliament. The concept of cyber
crime is not radically different from the concept of conventional crime. Both
include conduct whether act or omission, which cause breach of rules of law and
counterbalanced by the sanction of the state.
Before evaluating the concept of cyber crime it is obvious that the concept of
conventional crime be discussed and the points of similarity and deviance between
both these forms may be discussed.
CONVENTIONAL CRIME-
CYBER CRIME-
Cyber crime is the latest and perhaps the most complicated problem in the cyber
world. “Cyber crime may be said to be those species, of which, genus is the
conventional crime, and where either the computer is an object or subject of the
conduct constituting crime”. “Any criminal activity that uses a computer either as
an instrumentality, target or a means for perpetuating further crimes comes within
the ambit of cyber crime”.
CHAPTER 2
The computer has unique characteristic of storing data in a very small space. This
affords to remove or derive information either through physical or virtual medium
makes it much more easier.
b) Easy to access-
c) Complex-
The computers work on operating systems and these operating systems in turn are
composed of millions of codes. Human mind is fallible and it is not possible that
there might not be a lapse at any stage. The cyber criminals take advantage of
these lacunas and penetrate into the computer system.
d) Negligence-
e) Loss of evidence-
Loss of evidence is a very common & obvious problem as all the data are
routinely destroyed. Further collection of data outside the territorial extent
also paralyses this system of crime investigation.
CHAPTER 3
3. CYBER CRIMINALS:
The cyber criminals constitute of various groups/ category. This division may be
justified on the basis of the object that they have in their mind. The following are
the category of cyber criminals-
The simple reason for this type of delinquent behaviour pattern in children is seen
mostly due to the inquisitiveness to know and explore the things. Other cognate
reason may be to prove themselves to be outstanding amongst other children in
their group. Further the reasons may be psychological even. E.g. the Bal
Bharati (Delhi) case was the outcome of harassment of the delinquent by his
friends.
b) Organised hackers-
These kinds of hackers are mostly organised together to fulfil certain objective.
The reason may be to fulfil their political bias, fundamentalism, etc. The
Pakistanis are said to be one of the best quality hackers in the world. They mainly
target the Indian government sites with the purpose to fulfil their political
objectives. Further the NASA as well as the Microsoft sites is always under attack
by the hackers.
Their work is motivated by the colour of money. These kinds of hackers are
mostly employed to hack the site of the rivals and get credible, reliable and
valuable information. Further they are ven employed to crack the system of the
employer basically as a measure to make it safer by detecting the loophole.
d) Discontented employees-
This group include those people who have been either sacked by their employer or
are dissatisfied with their employer. To avenge they normally hack the system of
their employee.
CHAPTER 4
This kind of activity refers to sending large numbers of mail to the victim, which
may be an individual or a company or even mail servers there by ultimately
resulting into crashing.
This kind of an attack involves altering raw data just before a computer processes
it and then changing it back after the processing is completed. The electricity
board faced similar problem of data diddling while the department was being
computerised.
This kind of crime is normally prevalent in the financial institutions or for the
purpose of committing financial crimes. An important feature of this type of
offence is that the alteration is so small that it would normally go unnoticed. E.g.
the Ziegler case wherein a logic bomb was introduced in the bank’s system, which
deducted 10 cents from every account and deposited it in a particular account.
The computer of the victim is flooded with more requests than it can handle which
cause it to crash. Distributed Denial of Service (DDoS) attack is also a type of
denial of service attack, in which the offenders are wide in number and
widespread. E.g. Amazon, Yahoo.
Viruses are programs that attach themselves to a computer or a file and then
circulate themselves to other files and to other computers on a network. They
usually affect the data on a computer, either by altering or deleting it. Worms,
unlike viruses do not need the host to attach themselves to. They merely make
functional copies of themselves and do this repeatedly till they eat up all the
available space on a computer's memory. E.g. love bug virus, which affected at
least 5 % of the computers of the globe. The losses were accounted to be $ 10
million. The world's most famous worm was the Internet worm let loose on the
Internet by Robert Morris sometime in 1988. Almost brought development of
Internet to a complete halt.
These are event dependent programs. This implies that these programs are created
to do something only when a certain event (known as a trigger event) occurs.
E.g. even some viruses may be termed logic bombs because they lie dormant all
through the year and become active only on a particular date (like the Chernobyl
virus).
4.9 Trojan attacks-
This term has its origin in the word ‘Trojan horse’. In software field this means an
Normally in these kinds of thefts the Internet surfing hours of the victim are used
up by another person. This is done by gaining access to the login ID and the
password. E.g. Colonel Bajwa’s case- the Internet hours were used up by any
other person. This was perhaps one of the first reported cases related to cyber-
crime in India. However, this case made the police infamous as to their lack of
understanding of the nature of cybercrime.
This term is derived from the term hi jacking. In these kinds of offences the hacker
gains access and control over the web site of another. He may even mutilate or
change the information on the site. This may be done for fulfilling political
objectives or for money. E.g. recently the site of MIT (Ministry of Information
Technology) was hacked by the Pakistani hackers and some obscene matter was
placed therein. Further the site of Bombay crime branch was also web jacked.
Another case of web jacking is that of the ‘gold fish’ case. In this case the site was
hacked and the information pertaining to gold fish was changed. Further a ransom
of US $ 1 million was demanded as ransom. Thus web jacking is a process where
by control over the site of another is made backed by some consideration for it.
CHAPTER 5
CLASSIFICATION:
The subject of cyber-crime may be broadly classified under the following three
groups. They are-
Classification
Against society
Against organization
Against At
Or
Individuals Large
Company
5.1 Against Individuals: –
i. Computer vandalism.
ii. Transmitting virus.
iii. Unauthorized control/access over computer system.
iv. Intellectual Property crimes
v. Internet time thefts
b) Cyber-stalking-
Pornography on the net may take various forms. It may include the hosting of web
site containing these prohibited materials. Use of computers for producing these
obscene materials. Downloading through the Internet, obscene materials. These
obscene matters may cause harm to the mind of the adolescent and tend to deprave
or corrupt their mind. Two known cases of pornography are the Delhi Bal Bharati
case and the Bombay case wherein two Swiss couple used to force the slum
children for obscene photographs. The Mumbai police later arrested them.
d) Defamation-
It is an act of imputing any person with intent to lower the person in the estimation
of the right-thinking members of society generally or to cause him to be shunned
or avoided or to expose him to hatred, contempt or ridicule. Cyber defamation is
not different from conventional defamation except the involvement of a virtual
medium. E.g., the mail account of Rohit was hacked and some mails were sent
from his account to some of his batch mates regarding his affair with a girl with
intent to defame him.
This activity is commonly referred to as hacking. The Indian law has however
given a different connotation to the term hacking, so we will not use the term
"unauthorized access" interchangeably with the term "hacking" to prevent
confusion as the term used in the Act of 2000 is much wider than hacking.
A spoofed e-mail may be said to be one, which misrepresents its origin. It shows
its origin to be different from which actually it originates. Recently spoofed mails
were sent on the name of Mr. Na. Vijaya Shankar (naavi.org), which contained
virus.
g) Computer vandalism-
Intellectual property consists of a bundle of rights. Any unlawful act by which the
owner is deprived completely or partially of his rights is an offence. The common
form of IPR violation may be said to be software piracy, copyright infringement,
trademark and service mark violation, theft of computer source code, etc.
At this juncture a necessity may be felt that what is the need to distinguish
between cyber terrorism and cyber-crime. Both are criminal acts. However, there
is a compelling need to distinguish between both these crimes. A cybercrime is
generally a domestic issue, which may have international consequences; however
cyber terrorism is a global concern, which has domestic as well as international
consequences. The common form of these terrorist attacks on the Internet is by
distributed denial of service attacks, hate websites and hate emails, attacks on
sensitive computer networks, etc. Technology savvy terrorists are using 512-bit
encryption, which is next to impossible to decrypt. The recent example may be
cited of – Osama Bin Laden, the LTTE, attack on America’s army
deployment system during Iraq war.
Another definition may be attempted to cover within its ambit every act of cyber
terrorism.
(2) Affecting adversely the harmony between different religious, racial, language
or regional groups or castes or communities; or
and a cyber terrorist is the person who uses the computer system as a means or
ends to achieve the above objectives. Every act done in pursuance thereof is an act
of cyber terrorism.
j) Trafficking
Online fraud and cheating is one of the most lucrative businesses that are growing
today in the cyber space. It may assume different forms. Some of the cases of
online fraud and cheating that have come to light are those pertaining to credit
card crimes, contractual crimes, offering jobs, etc.
CHAPTER 6
SOME CASES STUDIES:
The call center employees are checked when they go in and out so they cannot
copy down numbers and therefore they could not have noted these down. They
must have remembered these numbers, gone out immediately to a cybercafé and
accessed the Citibank accounts of the customers.
All accounts were opened in Pune and the customers complained that the money
from their accounts was transferred to Pune accounts and that’s how the
criminals were traced. Police has been able to prove the honesty of the call
center and has frozen the accounts where the money was transferred.
There is need for a strict background check of the call center executives.
However, best of background checks cannot eliminate the bad elements from
coming in and breaching security. We must still ensure such checks when a
person is hired. There is need for a national ID and a national data base where a
name can be referred to. In this case preliminary investigations do not reveal
that the criminals had any crime history. Customer education is very important
so customers do not get taken for a ride. Most banks are guilt of not doing this.
The laptop contained several evidences that confirmed of the two terrorists’
motives, namely the sticker of the Ministry of Home that they had made on the
laptop and pasted on their ambassador car to gain entry into Parliament House
and the fake ID card that one of the two terrorists was carrying with a
Government of India emblem and seal.
The emblems (of the three lions) were carefully scanned and the seal was also
craftily made along with residential address of Jammu and Kashmir. But careful
detection proved that it was all forged and made on the laptop.
The accused person submitted 6,000 vouchers to prove the legitimacy of trade and
thought his offence would go undetected but after careful scrutiny of vouchers and
contents of his computers it revealed that all of them were made after the raids
were conducted.
It later revealed that the accused was running five businesses under the guise of
one company and used fake and computerized vouchers to show sales records and
save tax.
4. Baazee.com case-
the time and the fact that they never profited from their actions, the court
warranted 18-month suspended sentences for two of the students and an additional
fine of US$5,000 for one of them.
791,790
2020 $4.2 Billion
847,376
2021 $6.9 Billion
Complaints Losses
Computer Related Crimes Covered under Indian Penal Code and Special
Laws
Offence Section
Sending threatening messages by
Sec 503 IPC
email
Sending defamatory messages by
Sec 499 IPC
email
Forgery of electronic records Sec 463 IPC
Bogus websites, cyber frauds Sec 420 IPC
Email spoofing Sec 463 IPC
Web-Jacking Sec 383 IPC
E-Mail Abuse Sec 500 IPC
Online sale of Drugs NDPS Act
Online sale of Arms Arms Act
CHAPTER 7
CHAPTER 8
CONCLUSION:
BIBLIOGRAPHY
Ndubueze, P.N., Cyber Criminology: Contexts, Concerns and Directions,
Ahmadu Bello University Press, Kaduna State, Nigeria, July 2018.