Cybersecurity Module 1
Cybersecurity Module 1
SECURITY21CS653Module
I
Reshma.G.P
Dept. of CSE, CMRIT
BI Definition
Introduction
Cybercrime: Definition and Origins of the Word
BI isCybercrime
neither a system nor a product
and Information Security
Cyber warfare:
Cyberpunk:
It is the use Thetoterm
of computer network disruptcyberpunk
the activities of acould
state or
mean
organization, something
especially like
the deliberate
strategic or military purpose.
" anarchy
attacking via
of information system for
machines",
Cyber warfare or "machines/computer
for many people, means information Warriors unleashing
vicious attacks against an unsuspecting opponent computer networks
Rebel moment"
and paralyzing nations information infrastructure.
Example :AIIMS Delhi came under cyber attack on nov 23 2022 which
corruptedTheall its two
serverbasic aspects
and resulted in loss ofof
its cyberpunk
data.
are technology and individualism.
It is a genre of science fiction set in a
lawless subculture of oppressive
society dominated by computer
technology.
Cyberterrorism
Use of information technology to conduct terrorism.
Cyberterrorism is defined as “any person, group or
organization who, with terrorist intent, utilizes
accesses or aids in accessing a computer or computer
network or electronic system or electronic device by
any available means, and thereby knowingly engages
in or attempts to engage in a terrorist act commits the
offence of cyberterrorism.
OR
The premeditated use of disruptive activities, or the
threat against computers and/or networks, with the
intention to cause harm or further social, ideological,
religious, political or similar objectives or to
intimidate/terrify any person in furtherance of such
CYBERNETICS
Cybernetics is the interdisciplinary study of the
structure of regulatory systems.
Psychological perverts
Financially motivated hackers (corporate espionage
make money from cyberattacks
State sponsored hacking (National espionage or
sabotage): Extremely professional groups working for
governments.
Organised criminals
Type III: Cybercriminals-the insiders
Dissatisfied or former employees seeking
revenge
Competing companies using employees
to gain economic advantage through the
damage for theft
CLASSIFICATIONS OF CYBERCRIMES
s
s
Software piracy
It is a cognizable(evident) offence.
Cyberdefamation occurs when defamation takes
place with the help of a computer and/or
internet.
For example: someone publishing defamatory
matter about someone on a website or send
emails contain defamatory information to all
friends of that person.
Cybercrime against Property
Internet Time Theft
Such a theft occurs when an
unauthorized person uses the Internet
hours paid for by another person.
Basically, Internet time theft comes
under hacking because the person who
gets access to someone else’s ISP user
ID and password, either by hacking or by
gaining access to it by illegal means,
uses it to access the Internet without the
other person’s knowledge .
Cybercrime against Organization
Salami Attack/Salami Technique
1. These attacks are used for committing financial
crimes
2. The idea here is to make the alteration so
insignificant that in a single case it would go
completely unnoticed;
3. For example a bank employee inserts a program,
into the bank’s servers, that deducts a small
amount of money (say Rs. 2/- or a few cents in a
month) from the account of every customer. No
account holder will probably notice this
unauthorized debit, but the bank employee will
make a sizable amount every month.
Cybercrime against Organization
Data Diddling
1. A data diddling (data cheating) attack involves
altering raw data just before it is processed by a
computer and then changing it back after the
processing is completed.
2. Example :employee manipulate financial records
to divert funds to their own account once funds
sent changes record to original form.
3. Example:Electricity Boards in India have been
victims to data diddling programs inserted when
private parties computerise their systems.
Cybercrime against Society
Forgery
Fake currency notes, postage and revenue
stamps, marksheets, etc. can be forged using
sophisticated computers, printers and scanners.
Cybercrime against Society
Web jacking
Occurs when someone forcefully takes control of a
website (by cracking the password and later
changing it).
Thus, the first stage of this crime involves
“password sniffing”(password finding).
The actual owner of the website does not have any
more control over what appears on that web.
Crimes emanating from Usenet
newsgroup:
Usenet newsgroup:Usenet is a discussion
groups(ex:google groups)which is popular means of
sharing and distributing information on the Web
with respect to specific topic or subjects.
By its very nature, Usenet groups may carry very
offensive, harmful, inaccurate or otherwise carry
inappropriate material, or in some cases, postings
that have been mislabeled.
Industrial spying is the illegal and
unethical theft of business trade
secrets for use by a competitor to
achieve a competitive advantage.
It may include the theft of intellectual
property, such as manufacturing
processes, chemical formulas,
recipes, techniques, or ideas.
Hacking
Purpose of hacking:
Greed;
power;
Publicity;revenge
Desire to access forbidden info
Destructive mindset
Cybercrime against Individual
Online frauds
Online Scams. There are a few major types of crimes under the category of hacking
* Spoofing website and E-Mail security alert, :
* False mails about virus threats,
*Lottery frauds
*spoofing:
● In Spoofing websites and E-Mail Security-threats, fraudsters create authentic looking websites
that are actually nothing but a spoof.
● The purpose of these websites is to make the user enter personal information which is then
used to access business and bank accounts.
● This kind of online fraud is common in the banking and financial sector.
Mails which usually contain link to a spoof website and mislead users to enter user ids
and passwords. on the pretense that security details can be updated or passwords
changed. It is wise he is alert and careful about E-Mails containing an embedded link,
with a request for you to enter secret details. It is strongly recommended not to input any
sensitive information that might help criminals to gain access to sensitive information,
such as bank account details, even if the page appears legitimate.
● In virus E-Mails, the warnings may be genuine, so there is always a dilemma whether to
take them lightly or seriously.
● A wise action is to first confirm by visiting an antivirus site such as McAfee, Sophos or
Symantec before taking any action, such as forwarding them to friends and colleagues.
Cybercrime against Individual
Online frauds
* False mails about virus threats,:In virus E-
Mails, the warnings may be genuine, so there
is always a dilemma whether to take them
lightly or seriously.
A wise action is to first confirm by visiting an
antivirus site such as McAfee.
*Lottery frauds:False emails that inform
recipient that he/she won a prize in lottery to
get amount bank details will be asked emails
also ask for processing fee.
*spoofing: Posing as genuine user
Pornographic Offenses
(Cybercrime against Individual)
Child pornography means any visual depiction,
including but not limited to the following:
1. Any photograph that can be considered
unsuitable for the age of child viewer;
2.film, video, picture unsuitable for the age of
child viewer;
3. computer-generated image or picture of
sexually explicit conduct where the production of
such visual depiction involves the use of a minor
engaging in sexually explicit conduct.
Child Pornography is considered an offense.
Pornographic Offenses
Pedophiles are the people who physically or psychologically pressurise minors
to engage in sexual activities, which the minors would not consciously consent
too. Here is how pedophiles operate:
Step 1: Pedophiles use a false identity to trap the children/teenagers.
Step 2: They seek children/teens in the kids’ areas on the services, such as the
Games BB or chat areas where the children gather.
Step 3: They befriend children/teens.
Step 4: They extract personal information from the child/teen by winning
his/her confidence.
Step 5: Pedophiles get E-Mail address of the child/teen and start making
contacts on the victim’s E-Mail address as well. Sometimes, these E-Mails
contain sexually explicit language.
Step 6: They start sending pornographic images/text to the victim including
child pornographic images in order to help child/teen shed his/her inhibitions
so that a feeling is created in the mind of the victim that what is being fed to
him is normal and that everybody does it.
Step 7: At the end of it, the pedophiles set up a meeting with the child/teen out
of the house and then drag him/her into the net to further sexually assault
him/her or to use him/her as a sex object.
Software Piracy
(Cybercrime against Organisation)
https://youtu.be/n1tgoA7bp3g?si=dUzVMWh11L8jU2St
Software Piracy
(Cybercrime against Organisation)
1. end-user copying: friends loaning disks to each
other, or organisations under-reporting the
number of software installations they have
made, or organisations not tracking their
software licenses;
2. hard disk loading with illicit means: hard disk
vendors load pirated software;
3. counterfeiting: large-scale duplication and
distribution of illegally copied software;
4. Illegal downloads from the Internet:
Software Piracy
Beware that those who buy pirated software have a lot to lose:
1.
Logic bombs:
Are event-dependent programs created to do something
only when a certain event (known as a trigger event)
occurs.
Some viruses may be termed as logic bombs because they
lie dormant all through the year and become active only on
a particular date.
E-Mail Bombing(crime against organisation)
1. E-Mail bombing refers to sending a large number of E-Mails
to the victim to crash victim’s E-Mail account (in the case of
an individual) or to make victim’s mail servers crash (in the
case of a company or an E-Mail service provider).
2. Computer program can be written to instruct a computer to
do such tasks on a repeated basis. In recent times,
terrorism has hit the Internet in the form of mail bombings.
3. By instructing a computer to repeatedly send E-Mail to a
specified person’s E-Mail address, the cybercriminal can
overwhelm the recipient’s personal account and potentially
shut down entire systems.
4. This may or may not be illegal, but it is certainly disruptive.
5. 
Usenet newsgroup as the Source of
Cybercrimes
Usenet newsgroup:Usenet is a discussion
groups(ex:google groups)which is popular means of
sharing and distributing information on the Web
with respect to specific topic or subjects.
Usenet groups used for following criminal activities
—>Distribution of pornographic material.
—->Distribution of pirated packages, hacking
software
—->Sale of stolen credit card number,sale of
stolen data
Computer Network Intrusions
(crime against organisation)
A network intrusion is any unauthorized activity on a computer
network.
Hackers can break into computer systems from anywhere in the world
and steal data, plant viruses, create backdoors, insert Trojan
Horses or change user names and passwords.
India has the fourth highest number of Internet users in the world There are 45
million Internet users in India, 37% of all Internet accesses happen from cybercafes and
57% of Indian Internet users are between 18 and 35 years.
It is reported that compared to the year 2006, cybercrime under the Information
Technology (IT) Act recorded a whopping 50% increase in the year 2007.
The National Crime Record Bureau (NCRB) gives the report that, 46%, were related to
incidents of cyberpornography, followed by hacking.
In over 60% of these cases, offenders were between 18 and 30 years, according to the
"Crime in 2007".
For example, Delhi Police have now trained 100 of its officers in handling cybercrime
and placed them in its Economic Offences Wing.
The training gave to officers about computer hardware and software, computer networks
comprising data communication networks, network protocols, wireless networks and
network security about 6 weeks.
Cybercrime and the Indian ITA(Information Technology
Act)2000
Phishing :Trying to trick you into believing that the messages is form a legitimate sources
that you can click and download link.
Phishing is a form of online identity theft that aims to steal sensitive information such as
online banking passwords, credit card information from user.