Booklet On An Introduction To Cyber Crime
Booklet On An Introduction To Cyber Crime
Booklet on
An Introduction to Cyber Crime
CAMTECH/S/PROJ/2022-23/SP26A
CAMTECH/S/PROJ/
2022-23/SP26A
Table of Contents
Table of Contents ....................................................................................................................... ii
Disclaimer ...................................................................................................................................v
1 Introduction ....................................................................................................................... 2
2 What is Cyber Security ...................................................................................................... 2
3 Why Cyber Security is critical ........................................................................................... 3
4 Different types of Cyber Crimes ........................................................................................ 3
4.1 Spamming ............................................................................................................................. 3
4.2 Phishing ................................................................................................................................. 3
4.3 Cyber bullying ..................................................................................................................... 4
4.4 Cyber Stalking ..................................................................................................................... 4
4.5 Cyber Warfare ..................................................................................................................... 4
4.6 Cyber-squatting ................................................................................................................... 4
4.7 Espionage .............................................................................................................................. 4
4.8 Child pornography .............................................................................................................. 4
4.9 Cyber grooming ................................................................................................................... 5
4.10 Vishing .................................................................................................................................. 5
4.11 SMS Phishing ....................................................................................................................... 5
4.12 Impersonation and Identity theft ..................................................................................... 5
4.13 Ransom ware ........................................................................................................................ 5
References ................................................................................................................................ 20
CAMTECH Publications......................................................................................................... 21
Our Objective ........................................................................................................................... 22
Disclaimer
It is clarified that the information given in this booklet does not
supersede any existing provisions laid down in the IR Telecom
Engineering Manual, Railway Board and RDSO publications. This
document is not statuary and instructions given are for the purpose
of learning only. The diagrams and figures given in the booklet are
indicative only. If at any point contradiction is observed, then Signal
Engineering Manual, Telecom Engineering Manual, Railway
Board/RDSO guidelines may be referred or prevalent Zonal Railways
instructions may be followed.
1 Introduction
Cybercrime may be defined as “Any attack on the information systems or any unlawful act
where computer or communication device or computer network is used to commit or facilitate
the commission of crime”.
The attack can be on the confidentiality of information, on the integrity of information, or it can
be a denial-of-service attack or a repudiation attack. The attack can be on an individual, an
enterprise or on a government.
Here are some examples of cyber-crime: Intentionally sending a virus is a crime. Stealing the
credit card information during an e-commerce transaction, impersonating a student in an e-
learning portal, an employee sending the confidential information of an organization to an
outsider through email etc., are cyber-crimes. However, the definition of what a crime is differs
from country to country. In some countries, it is not a crime to visit adult sites, but in some
countries, it is a crime, the punishment can be imprisonment. In some countries, it is OK to visit
the adult sites, but the downloaded content cannot be sent to another person.
In many countries, there are no cyber-laws. Some countries do have cyber-laws, but the
interpretations vary and it is difficult for the general public to know what is right and what is
wrong. Many cyber-crimes go undetected as it is difficult to track and trace the criminal.
Consider this case: a person created a mail account with a free mail service provider and then
he sent a threatening mail to a person. Again, the person received another threatening mail, but
now from a different mail address, but with the same email service provider. Perhaps this
criminal was creating mail accounts and was using it only once. The email service provider is
based in the US and the person is in India. Think of it, how do you catch the criminal?
In India, Cyber Crimes are mainly relative to what the Information Technology Act-2000/ 2008
has defined.
Under the generic description of crimes mentioned above, we can specify the following specific
cybercrimes.
4.1 Spamming
Spamming is the use of messaging systems to send multiple unsolicited messages (spam) to
large numbers of recipients for the purpose of commercial advertising, for any prohibited
purpose (especially the fraudulent purpose of phishing), or simply repeatedly sending the same
message to the same user. While the most widely recognized form of spam is email spam, the
term is applied to similar abuses in other media: instant messaging spam, Web search engine
spam, spam in blogs, online classified ads spam, mobile phone messaging spam, Internet forum
spam, junk fax transmissions, social spam, spam mobile apps and file sharing spam.
A person who creates spam is called a spammer.
4.2 Phishing
Phishing is a type of fraud / attack where an attacker sends a fraudulent (e.g., spoofed, fake, or
otherwise deceptive) message or email designed to trick the recipient into revealing sensitive
information to the attacker or downloading malware by clicking on a hyperlink in the message
that appear to be from a legitimate source. Phishing attacks have become increasingly
sophisticated and often transparently mirror the site being targeted, allowing the attacker to
observe everything while the victim is navigating the site, and transverse any additional security
boundaries with the victim. As of 2020, phishing is by far the most common attack performed
by cybercriminals.
4.6 Cyber-squatting
Cyber-Squatting is an act of registering, trafficking in, or using a domain name with intent to
profit from the goodwill of a trademark belonging to someone else.
4.7 Espionage
Espionage is the act or practice of obtaining data and information without the permission and
knowledge of the owner.
4.10 Vishing
Vishing is an attempt where fraudsters try to seek personal information like Customer ID, Net
Banking password, ATM PIN, OTP, Card expiry date, CVV etc. through a phone call.
Anonymity: Many time the anonymity that a cyber space provide motivates the person to
commit cybercrime as it is much easy to commit a cybercrime over the cyber space and remain
anonymous as compared to real world. It is much easier to get away with criminal activity in a
cyber-world than in the real world. There is a strong sense of anonymity than can draw
otherwise respectable citizens to abandon their ethics in pursuit personal gain.
Cyber Espionage: At times, the government itself is involved in cyber trespassing to keep eye
on other person/network/country. The reason could be politically, economically or socially
motivated.
6 Types of attackers
6.1 Hacker
Hacker is a general term that has historically been used to describe a computer-programming
expert. More recently, this term is commonly used in a negative way to describe an individual
who attempts to gain unauthorized access to network resources with malicious intent.
6.2 Cracker
Cracker is the term that is generally regarded as the more accurate word that is used to describe
an individual who attempts to gain unauthorized access to network resources with malicious
intent.
6.3 Phreaker
A phreaker is an individual who manipulates the phone network to cause it to perform a function
that is normally not allowed. A common goal of phreaking is breaking into the phone network,
usually through a payphone, to make free long-distance calls.
6.4 Spammer
A spammer is an individual who sends large numbers of unsolicited e-mail messages.
Spammers often use viruses to take control of home computers and use those computers to send
out their bulk messages.
6.5 Phisher
A phisher uses e-mail or other means in an attempt to trick others into providing sensitive
information, such as credit card numbers or passwords. The phisher masquerades as a trusted
party that would have a legitimate need for the sensitive information.
7.1 Reconnaissance
Reconnaissance is the unauthorized discovery and mapping of systems, services, or
vulnerabilities. It is also known as information gathering and, in most cases, it precedes an
actual access or denial-of-service attack. Reconnaissance is somewhat analogous to a thief
casing a neighborhood for vulnerable homes to break into, such as an unoccupied residence,
easy-to-open doors, or open windows. Reconnaissance attacks can consist of the following:
Packet sniffers
Portscans
Pingsweeps
Internet information queries
A malicious intruder typically sweeps the target network to determine which IP addresses are
alive. Using, for example, the IP scanner, Nslookup and Whois software utilities, an attacker
can easily determine the IP address space assigned to a given corporation or entity. The ping
command tells the attacker what IP addresses are alive. And port scanner like Nmap to
determine what network services or ports are active on the live IP addresses. From this
information, the intruder queries the ports to determine the type and version of applications and
operating systems running on the target host. Based on this information, the intruder can
determine whether a possible vulnerability exists that can be exploited.
Network snooping and packet sniffing are common terms for eavesdropping. Eavesdropping is
listening in to a conversation, spying, prying, or snooping by using tools like Network or
protocol analyzers and packet capturing utilities on networked computers. The information
gathered by eavesdropping can be used to pose other attacks to the network. Strong encryption
methods provide protection for data susceptible to eavesdropping attacks, password crackers,
or manipulation.
7.2 Access
System access is the ability for an unauthorized intruder to gain access to a device for which
the intruder does not have an account or a password. Access attacks exploit known
vulnerabilities in authentication services, ftp services, and web services to gain entry to web
accounts, confidential databases, and other sensitive information. Access attacks can consist of
the following:
Password attacks
Trust exploitation
Port redirection
Man-in-the-middle attacks
When an attacker gains access to a resource, he has the same access rights as the user whose
account has been compromised. If this account has sufficient privileges, the attacker can create
a back door for future access, without concern for any status and password changes to the
compromised user account.
the inside of a firewall. If that trusted outside system is compromised, it can take advantage of
that trust relationship to attack the inside network.
Trust exploitation-based attacks can be mitigated through tight constraints on trust levels within
a network. Systems on the outside of a firewall should never be absolutely trusted by systems
on the inside of a firewall. Such trust should be limited to specific protocols and should be
authenticated by something other than an IP address where possible.
7.4.1 Viruses
Computer Virus is a program written to enter to your computer and damage/ alter your files/
data and replicate themselves and spread from one computer to another by attaching itself to
another computer file.
7.4.2 Worms
Worms are self-replicating and do not require a program to attach themselves to. Worms
continually look for vulnerabilities and report to the worm author when weaknesses are
discovered.
7.4.4 Spyware
By opening attachments, clicking links or downloading infected software, from infected e-mails
spyware is installed on your computer. Spyware can enter your computer systems and can
secretly monitor what employee type and record account numbers and passwords without your
knowledge.
7.4.5 Adware
Adware installs itself in a similar manner to spyware, though it typically just displays extra
advertisements when you are online. Adware can slow down your computer and it can be
frustrating to try to close all the extra pop-up windows, but it will not destroy your data.
7.4.6 Spamware
SPAM is “flooding the Internet with many copies of the same message. SPAM may not be the
biggest risk but screening and deleting junk e-mail wastes our time and if a junk e- mail
attachment is opened, it may release a virus. SPAM filters are an effective way to stop SPAM;
these filters come with most of the e-mail providers online. Also, you can buy a variety of
SPAM filters that work effectively.
7.4.7 Botnet
A Compromised device in a computer network is known as a bot. (short of ‘robot’ also known
as a zombie). A botnet is a collection of internet-connected computers whose security defenses
have been breached and control ceded to a malicious party and have been set up to forward
transmissions (including spam or viruses) to other computers on the internet without knowing
their owners (acting as a hub that forwards malicious files etc. to other computers). Criminals
use botnets to send out spam email messages, spread viruses, attack computers and servers, and
commit other kinds of crime and fraud. If your computer becomes part of a botnet, your
computer might slow down and you might inadvertently be helping criminals.
8.2.1 Section 43: Penalty and Compensation for damage to computer, computer
system, etc.
If any person without permission of the owner or any other person who is in charge of a
computer, computer system or computer network shall be liable to pay damages by way of
compensation not exceeding one crore rupees to the person so affected.
8.2.5 Section 66A: Sending offensive messages through communication service, etc.
Any person who sends offensive messages, by means of a computer resource or a
communication device shall be liable for imprisonment up to three years, or with fine, which
may extend up to two lakh rupees, or with both.
life of the community or adversely affect the critical information infrastructure specified under
section70, shall be punished with imprisonment, which may extend to imprisonment for life.
Any person who intentionally or knowingly fails to comply with any order under this section
shall be guilty of an offence and shall be liable on conviction to imprisonment for a term not
exceeding two years or to a fine not exceeding one lakh rupees or to both.
8.2.15 Section 69A: Power to issue directions for blocking for public access of any
information through any computer resource
Where the Central Government or any of its officer specially authorized by it in this behalf is
satisfied that it is necessary or expedient so to do in the interest of sovereignty and integrity of
India, defense of India, security of the State, friendly relations with foreign states or public order
or for preventing incitement to the commission of any cognizable offence relating to above, it
may subject to the provisions of sub-sections (2) for reasons to be recorded in writing, by order
direct any agency of the Government or intermediary to block access by the public or cause to
be blocked for access by public any information generated, transmitted, received, stored or
hosted in any computer resource.
The intermediary who fails to comply with the direction issued under sub-section (1) shall be
punished with an imprisonment for a term which may extend to seven years and also be liable
to fine.
The appropriate Government may, by notification in the Official Gazette, declare any computer
resource, which directly or indirectly affects the facility of Critical Information Infrastructure,
to be a protected system.
Explanation: For the purposes of this section, “Critical Information Infrastructure” means the
computer resource, the incapacitationor destruction of which, shall have debilitating impact on
national security, economy, public health or safety.
Any service provider, intermediaries, data centers, body corporate or person who fails to
provide the information called for or comply with the direction under this section shall be
punishable with imprisonment for a term, which may extend to one year or with fine, which
may extend to one lakh rupees or with both.
case may be, shall be punished with imprisonment for a term which may extend to two years,
or with fine which may extend to one lakh rupees, or with both.
8.2.18 Section 73: Penalty for publishing electronic Signature Certificate false in certain
particulars
No person shall publish an Electronic Signature Certificate or otherwise make it available to
any other person with the knowledge that:
The Certifying Authority listed in the certificate has not issued it; or the subscriber listed in the
certificate has not accepted it; or the certificate has been revoked or suspended unless such
publication is for the purpose of verifying a digital signature created prior to such suspension
or revocation shall be punished with imprisonment for a term which may extend to three years,
or with a fine which may extend to five lakh rupees, or with both.
CERT-In issues security guidelines, monitors security incidents at the national level and also
interacts with vendors at large to investigate and provide solutions for incidents security
breaches such as virus and denial of service attacks.
CERT-IN is notified as the “National Agency for Incident Response” for performing the
following functions.
a) collection, analysis and dissemination of information on cyber incidents
b) forecast and alerts of cyber security incidents
c) emergency measures for handling cyber security incidents
d) Coordination of cyber incidents response activities
e) issue guidelines, advisories, vulnerability notes and white papers relating to information
security practices, procedures, prevention, response and reporting of cyber incidents
f) such other functions relating to cyber security as may be prescribed
In order to discharge these functions, CERT-IN has been bestowed with quasi-judicial powers.
Accordingly, it is empowered to call for information and give direction to the service providers,
intermediaries, data centers, body corporate and any other persons.
Additionally, CERT-IN is designated under Section 70A as the “National Nodal Agency” for
protection of what is termed “Critical Information Infrastructure”. The term Critical
Infrastructure refers to any computer resource, the incapacitation or destruction of which may
have a debilitating impact on national security or economy or public health or safety. In other
words, Critical Information Infrastructure may refer to Government IT resources, Bank
resources. It can also be a privately owned network such as the electricity systems or any other
facility which satisfies the required conditions of importance.
Under Section 70 of the Act, Government has the power to designate any Critical Infrastructure
System as a “Protected System”. This also means that all designated “Protected Systems” are
also “Critical Information Infrastructure”.
Thus CERT-IN has been provided the responsibilities for securing both the Government
infrastructure assets that fall in the category of Critical Information Infrastructure as well as the
Private IT infrastructure irrespective of whether it is critical or not.
vi) In order to protect system, network etc. from virus, malicious codes, spam etc.,
antivirus software along with firewall, IDS (Intrusion Detection System) must be
installed in every system. If possible, a central antivirus server may be installed and
each system should be scanned centrally. All latest definitions should be pushed
through central server.
vii) In order to implement IT Security policy, Zonal Railways/Production Units are
advised to procure and install only licensed software. You are also advised to procure
and install antivirus software, patch management software etc. The financial
implication of procurement and the renewal of software license may be revenue.
viii) All running application and network should be security audited by third party
vendors.
ix) The list of vendors is available at CERT-In website i.e. http://cert-in.org.in/
x) Any other issues relevant to the subject in accordance with the IT Security policy.
According to the IT Act, a cyber crime comes under the purview of global jurisdiction which
means that a cyber crime complaint can be registered with any of the cyber cells in India,
irrespective of the place where it was originally committed or the place where the victim is
currently residing/ staying.
If you do not have access to any of the cyber cells in India, you can file a First Information
Report (FIR) at the local police station. In case your complaint is not accepted there, you can
approach the Commissioner or the city’s Judicial Magistrate.
Certain cyber crime offenses come under the IPC. You can register a cyber crime FIR at the
nearest local police station to report them. It is mandatory under Section 154 of CrPC (Code of
Criminal procedure), for every police officer to record the information/complaint of an offense,
irrespective of the jurisdiction in which the crime was committed.
---
References
1. IRISET TA4 – Cyber Security
2. https://cybercrime.gov.in/Accept.aspx
3. https://cert-in.org.in/
4. https://cert-rail.railnet.gov.in/index.asp
5. https://www.infosecawareness.in/railway
6. https://indianrailways.gov.in/railwayboard/view_section.jsp?lang=0&id=0,1,304,
366,548,669
7. Information available online
CAMTECH Publications
CAMTECH is continuing its efforts in the documentation and up-gradation of information on
maintenance practices of Signalling & Telecom assets. Over the years a large number of
publications on Signalling & Telecom subjects have been prepared in the form of handbooks,
pocket books, pamphlets and video films. These publications have been uploaded on the Internet
as well as Railnet.
For viewing/downloading these publications
On Internet:
Visit www.indianrailways.gov.in
Go to About Indian Railways → Railway Board Directorates →Efficiency &
Research→CAMTECH, Gwalior → Publications for download →S&T Engineering (Yearwise/
Subjectwise).
On Railnet:
Visit Railway Board website at 10.1.2.21
Go to Railway Board Directorates → →Efficiency & Research→CAMTECH, Gwalior →
Publications for download →S&T Engineering (Yearwise/ Subjectwise).
https://indianrailways.gov.in/railwayboard/view_section.jsp?lang=0&id=0,1,304,366,538,2713
,2718,2722,2731
A limited number of publications in hard copy are also available in CAMTECH library which
can be issued by deputing staff with official letter from controlling officer. The letter should be
addressed to Director (S&T), CAMTECH, Gwalior.
For any further information regarding publications please contact:
Director (S&T) – 0751-2470185 (O)(BSNL)
SSE/Tele - 9755549287 (CUG) Or
Email at dirsntcamtech@gmail.com Or FAX to 0751-2470841 (BSNL) Or
Write at
Director (S&T)
Indian Railways Centre for Advanced Maintenance Technology,
In front of Hotel Adityaz, Airport Road, Maharajpur,
Gwalior (M.P.) 474005
Our Objective
If you have any suggestion & any specific comments, please write to us:
Contact person : Director (Signal & Telecommunication)
Postal Address : Centre for Advanced Maintenance Technology, Opposite
Hotel Adityaz, Near DD Nagar, Maharajpur,
Gwalior (M.P.) Pin Code – 474 005
Phone : 0751 - 2470185
Email : dirsntcamtech@gmail.com
INDIAN RAILWAYS
Centre for Advanced Maintenance Technology
Maharajpur, Gwalior (M.P.) – 474 005