0% found this document useful (0 votes)
20 views52 pages

Cybersecurity Module 1

Uploaded by

reshma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as KEY, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views52 pages

Cybersecurity Module 1

Uploaded by

reshma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as KEY, PDF, TXT or read online on Scribd
You are on page 1/ 52

INTRODUCTION TO CYBER

SECURITY21CS653Module
I

Reshma.G.P
Dept. of CSE, CMRIT
BI Definition
Introduction
Cybercrime: Definition and Origins of the Word
BI isCybercrime
neither a system nor a product
and Information Security

BI isWho are Cybercriminals?


an architecture or a collection of
Operational DB of Cybercrimes
Classifications
Operational Apps
Cybercrime:
Decision The
Support DBLegal Perspectives
Decision SupportAn
Cybercrimes: Apps
Indian Perspective
Cybercrime
BI provides the and the Indian
business ITA 2000
community with easy
access to “business data”
INTRODUC
TION
Cyber security is the protection of internet-
connected systems, including hardware, software
and data, from cyber attacks”.
“Cybersecurity” means protecting information,
equipment, devices, computer, computer
resource, communication device and information
stored therein from unauthorized access, use,
disclosure, disruption, modification or destruction.
Cybercrime Definition
Definition:“A crime conducted in which a computer was directly and
significantly instrumental is called as a Cybercrime.”
Alternative definitions of Cybercrime are as follows:
Cybercrime or computer crime is any illegal behaviour directed by means of
electronic operations that target to security of computer system and the data
processed by them.
Crimes completed either on or with a computer.
Any illegal activity done through the internet on the computer.
All criminal activities done using the medium of computers, the Internet,
cyberspace and WWW.
Any financial dishonesty that takes place in computer environment.
Important Definitions related to
Activities involved in Evaluating Non Technical
Cyber Security:
Cyberspace: cyberspaceInfrastructure
is the nebulous place where humans
interact over computer networks, most definitely a place where you
chat, explore, research and play.

Cybersquatting: Its the act of registering popular internet address


usually company name with the intent of selling it to its rightful
owner.
Cybersquatting means registering, selling or using a domain name
with the intent of profiting from the goodwill of someone else’s
trademark. In this nature, it can be considered to be a type of
cybercrime.

Cybersquatting is the practice of buying “domain names” that have


existing businesses names.
Important Definitions related to Cyber
Security:

Cyberpunk: The term cyberpunk


could mean something like "
anarchy via machines", or
"machines/computer Rebel
moment"
The two basic aspects of cyberpunk
are technology and individualism.
An opportunistic computer hacker.
Important Definitions related to Cyber
Security:

Cyber warfare:
Cyberpunk:
It is the use Thetoterm
of computer network disruptcyberpunk
the activities of acould
state or
mean
organization, something
especially like
the deliberate
strategic or military purpose.
" anarchy
attacking via
of information system for

machines",
Cyber warfare or "machines/computer
for many people, means information Warriors unleashing
vicious attacks against an unsuspecting opponent computer networks
Rebel moment"
and paralyzing nations information infrastructure.
Example :AIIMS Delhi came under cyber attack on nov 23 2022 which
corruptedTheall its two
serverbasic aspects
and resulted in loss ofof
its cyberpunk
data.
are technology and individualism.
It is a genre of science fiction set in a
lawless subculture of oppressive
society dominated by computer
technology.
Cyberterrorism
Use of information technology to conduct terrorism.
Cyberterrorism is defined as “any person, group or
organization who, with terrorist intent, utilizes
accesses or aids in accessing a computer or computer
network or electronic system or electronic device by
any available means, and thereby knowingly engages
in or attempts to engage in a terrorist act commits the
offence of cyberterrorism.
OR
The premeditated use of disruptive activities, or the
threat against computers and/or networks, with the
intention to cause harm or further social, ideological,
religious, political or similar objectives or to
intimidate/terrify any person in furtherance of such
CYBERNETICS
Cybernetics is the interdisciplinary study of the
structure of regulatory systems.

Cybernetics deals with information and its use.

Cybernetics is the science that explains the


behaviour of systems that operate in cyberspace.
Cybercrimes occupy an important space in information
security domain because of their impact.
CYBERCRIME AND INFORMATION SECURITY
Lack of information security gives rise to cybercrimes

Who are Cybercriminals?
Cybercriminals are those who conduct act such as :
credit card fraud,
cyber stalking,
defame another online;
gaining unauthorised access to a computer system;
ignoring copyright, software licensing and Trademark protection;
overriding encryption to make illegal copies;
software piracy and stealing another's identity to perform criminal
acts.

They can be categorised into three groups that reflect their


motivation.
We have three types of Cybercriminals
Type I: Cybercriminals hungry for recognition
Type II: Cybercriminals not interested in recognition
Type III: Cybercriminals the insiders

Type I: Cybercriminals-Hungry for
recognition

Type I: Cybercriminals-Hungry for recognition


Hobby hackers
IT professionals: ethical hacker
Politically motivated hackers
Terrorist organizations
Type II: Cybercriminals-not interested in
recognition

Psychological perverts
Financially motivated hackers (corporate espionage
make money from cyberattacks
State sponsored hacking (National espionage or
sabotage): Extremely professional groups working for
governments.
Organised criminals
Type III: Cybercriminals-the insiders
Dissatisfied or former employees seeking
revenge
Competing companies using employees
to gain economic advantage through the
damage for theft
CLASSIFICATIONS OF CYBERCRIMES

Cyber crimes are


classified as follows:
Cybercrime against
individual
Cybercrime against
property
Cybercrime against
organization
Cybercrime against
society
1. Cybercrime against
individual
E-Mail Spoofing:
Online Frauds
Phishing, Spear Phishing and its various other
forms such as Vishing and Smishin
Spamming:
Cyber defamation
Cyberstalking and harassment
Computer Sabotage
Pornographic Offenses
Password sniffing
2. Cybercrime against
property
1. Credit Card Frauds:
2. Intellectual Property (IP) Crimes
3. Internet time theft:
3. Cybercrime against Organization
Unauthorized accessing of Computer
Password Sniffing
Denial-of-service Attacks (DoS Attacks)
Virus attacks/dissemination ofViruses
E-Mail bombing/Mail bombs
Salami Attack/Salami technique
Logic Bomb
Trojan Horse
Data Diddling
Newsgroup Spam/Crimes emanating from Usenet newsgroup
Industrial spying/Industrial espionage
Computer network intrusions
Software piracy

s
s
Software piracy

13. Software piracy:


4. Cybercrime against society
Forgery
Cyberterrorism
Web jacking
5.Crimes emanating from usenet
newsgroup
Usenet groups:groups may carry offensive
harmful, inaccurate, inappropriate material
So we need to be caution and judgemental
while using these groups.
Cybercrime against Individual
E-Mail Spoofing
A spoofed E-Mail is one that appears to originate
from one source but actually has been sent from
another source.

Example: email address of Roopa -->roopa@cmrit.ac.in


someone else say x person spoof her email and sends vulgar messages to
all her contacts.
Cybercrime against Individual
Spamming

People who create electronic Spam are called


spammers
Spam is the abuse of electronic messaging systems
to send unrequested bulk messages
indiscriminately.
The most widely recognised form of Spam is E-Mail
Spam,
Other ex: web search engine Spam, Spam in blogs,
wiki Spam etc
Cybercrime against Individual
Cyberdefamation

It is a cognizable(evident) offence.
Cyberdefamation occurs when defamation takes
place with the help of a computer and/or
internet.
For example: someone publishing defamatory
matter about someone on a website or send
emails contain defamatory information to all
friends of that person.
Cybercrime against Property
Internet Time Theft
Such a theft occurs when an
unauthorized person uses the Internet
hours paid for by another person.
Basically, Internet time theft comes
under hacking because the person who
gets access to someone else’s ISP user
ID and password, either by hacking or by
gaining access to it by illegal means,
uses it to access the Internet without the
other person’s knowledge .
Cybercrime against Organization
Salami Attack/Salami Technique
1. These attacks are used for committing financial
crimes
2. The idea here is to make the alteration so
insignificant that in a single case it would go
completely unnoticed;
3. For example a bank employee inserts a program,
into the bank’s servers, that deducts a small
amount of money (say Rs. 2/- or a few cents in a
month) from the account of every customer. No
account holder will probably notice this
unauthorized debit, but the bank employee will
make a sizable amount every month.
Cybercrime against Organization
Data Diddling
1. A data diddling (data cheating) attack involves
altering raw data just before it is processed by a
computer and then changing it back after the
processing is completed.
2. Example :employee manipulate financial records
to divert funds to their own account once funds
sent changes record to original form.
3. Example:Electricity Boards in India have been
victims to data diddling programs inserted when
private parties computerise their systems.
Cybercrime against Society
Forgery
Fake currency notes, postage and revenue
stamps, marksheets, etc. can be forged using
sophisticated computers, printers and scanners.
Cybercrime against Society
Web jacking
Occurs when someone forcefully takes control of a
website (by cracking the password and later
changing it).
Thus, the first stage of this crime involves
“password sniffing”(password finding).
The actual owner of the website does not have any
more control over what appears on that web.
Crimes emanating from Usenet
newsgroup:
Usenet newsgroup:Usenet is a discussion
groups(ex:google groups)which is popular means of
sharing and distributing information on the Web
with respect to specific topic or subjects.
By its very nature, Usenet groups may carry very
offensive, harmful, inaccurate or otherwise carry
inappropriate material, or in some cases, postings
that have been mislabeled.
Industrial spying is the illegal and
unethical theft of business trade
secrets for use by a competitor to
achieve a competitive advantage.
It may include the theft of intellectual
property, such as manufacturing
processes, chemical formulas,
recipes, techniques, or ideas.
Hacking
Purpose of hacking:
Greed;
power;
Publicity;revenge
Desire to access forbidden info
Destructive mindset
Cybercrime against Individual
Online frauds
Online Scams. There are a few major types of crimes under the category of hacking
* Spoofing website and E-Mail security alert, :
* False mails about virus threats,
*Lottery frauds
*spoofing:
● In Spoofing websites and E-Mail Security-threats, fraudsters create authentic looking websites
that are actually nothing but a spoof.
● The purpose of these websites is to make the user enter personal information which is then
used to access business and bank accounts.
● This kind of online fraud is common in the banking and financial sector.

Mails which usually contain link to a spoof website and mislead users to enter user ids
and passwords. on the pretense that security details can be updated or passwords
changed. It is wise he is alert and careful about E-Mails containing an embedded link,
with a request for you to enter secret details. It is strongly recommended not to input any
sensitive information that might help criminals to gain access to sensitive information,
such as bank account details, even if the page appears legitimate.
● In virus E-Mails, the warnings may be genuine, so there is always a dilemma whether to
take them lightly or seriously.
● A wise action is to first confirm by visiting an antivirus site such as McAfee, Sophos or
Symantec before taking any action, such as forwarding them to friends and colleagues.
Cybercrime against Individual
Online frauds
* False mails about virus threats,:In virus E-
Mails, the warnings may be genuine, so there
is always a dilemma whether to take them
lightly or seriously.
A wise action is to first confirm by visiting an
antivirus site such as McAfee.
*Lottery frauds:False emails that inform
recipient that he/she won a prize in lottery to
get amount bank details will be asked emails
also ask for processing fee.
*spoofing: Posing as genuine user
Pornographic Offenses
(Cybercrime against Individual)
Child pornography means any visual depiction,
including but not limited to the following:
1. Any photograph that can be considered
unsuitable for the age of child viewer;
2.film, video, picture unsuitable for the age of
child viewer;
3. computer-generated image or picture of
sexually explicit conduct where the production of
such visual depiction involves the use of a minor
engaging in sexually explicit conduct.
Child Pornography is considered an offense.
Pornographic Offenses
Pedophiles are the people who physically or psychologically pressurise minors
to engage in sexual activities, which the minors would not consciously consent
too. Here is how pedophiles operate:
Step 1: Pedophiles use a false identity to trap the children/teenagers.
Step 2: They seek children/teens in the kids’ areas on the services, such as the
Games BB or chat areas where the children gather.
Step 3: They befriend children/teens.
Step 4: They extract personal information from the child/teen by winning
his/her confidence.
Step 5: Pedophiles get E-Mail address of the child/teen and start making
contacts on the victim’s E-Mail address as well. Sometimes, these E-Mails
contain sexually explicit language.
Step 6: They start sending pornographic images/text to the victim including
child pornographic images in order to help child/teen shed his/her inhibitions
so that a feeling is created in the mind of the victim that what is being fed to
him is normal and that everybody does it.
Step 7: At the end of it, the pedophiles set up a meeting with the child/teen out
of the house and then drag him/her into the net to further sexually assault
him/her or to use him/her as a sex object.
Software Piracy
(Cybercrime against Organisation)

This is a big challenge area indeed. Cybercrime


investigation cell of India defines “software piracy”
as theft of software through the illegal copying of
genuine programs or the counterfeiting and
distribution of products intended to pass for the
original.

https://youtu.be/n1tgoA7bp3g?si=dUzVMWh11L8jU2St
Software Piracy
(Cybercrime against Organisation)
1. end-user copying: friends loaning disks to each
other, or organisations under-reporting the
number of software installations they have
made, or organisations not tracking their
software licenses;
2. hard disk loading with illicit means: hard disk
vendors load pirated software;
3. counterfeiting: large-scale duplication and
distribution of illegally copied software;
4. Illegal downloads from the Internet:
Software Piracy
Beware that those who buy pirated software have a lot to lose:
1.

Getting untested software that may have been copied


thousands times over,
The software, if pirated, may potentially contain hard-
drive-infecting viruses
There is no technical support in the case of software
failure, that is, lack of technical product support
available to properly licensed users,
There is no warranty protection,
There is no legal right to use the product, etc.
Computer Sabotage(crime against
individual)

The use of the Internet to stop the normal functioning of a


computer system through the introduction of worms,
viruses or logic bombs, is referred to as computer sabotage.

Logic bombs:
Are event-dependent programs created to do something
only when a certain event (known as a trigger event)
occurs.
Some viruses may be termed as logic bombs because they
lie dormant all through the year and become active only on
a particular date.
E-Mail Bombing(crime against organisation)
1. E-Mail bombing refers to sending a large number of E-Mails
to the victim to crash victim’s E-Mail account (in the case of
an individual) or to make victim’s mail servers crash (in the
case of a company or an E-Mail service provider).
2. Computer program can be written to instruct a computer to
do such tasks on a repeated basis. In recent times,
terrorism has hit the Internet in the form of mail bombings.
3. By instructing a computer to repeatedly send E-Mail to a
specified person’s E-Mail address, the cybercriminal can
overwhelm the recipient’s personal account and potentially
shut down entire systems.
4. This may or may not be illegal, but it is certainly disruptive.
5. 
Usenet newsgroup as the Source of
Cybercrimes
Usenet newsgroup:Usenet is a discussion
groups(ex:google groups)which is popular means of
sharing and distributing information on the Web
with respect to specific topic or subjects.
Usenet groups used for following criminal activities
—>Distribution of pornographic material.
—->Distribution of pirated packages, hacking
software
—->Sale of stolen credit card number,sale of
stolen data
Computer Network Intrusions
(crime against organisation)
A network intrusion is any unauthorized activity on a computer
network.

Hackers can break into computer systems from anywhere in the world
and steal data, plant viruses, create backdoors, insert Trojan
Horses or change user names and passwords.

Network intrusions are illegal,


but detection and enforcement are difficult.
Current laws are limited and many intrusions go undetected.
The cracker can bypass existing password protection by creating a
program to capture logon IDs and passwords.

The practice of “strong password” is therefore important.


Password
Sniffing

*Is a hacking technique that uses a special software


application that allows a hacker to steal usernames and
passwords simply by observing and passively recording
network traffic.
Password sniffer programs are used for monitor and
record user name and password.
*This often happens on public WiFi networks where it is
relatively easy to spy on weak or unencrypted traffic.
* IT programmers uses these Password sniffer programs
to identify weak application .
Packet Sniffing Tool/network analyser tool : Wireshark,
NetworkMiner(Used to analyse the network traffic).
Credit card frauds
1.

1. Credit card fraud is an inclusive term for fraud committed


using a payment card, such as a credit card or debit card.
The Payment Card Industry Data Security Standard (PCI
DSS) is the data security standard created to help
businesses process card payments securely and reduce
card fraud.
Bank,Investigator world wide created security measures
which ensure fraudster aren’t successful
The technology and security measures behind credit
cards are becoming increasingly sophisticated making it
harder for fraudsters to steal money.
IDENTITY THEFT
Stealing someone identity(name and
personal information) and using it for illegal
activity.
Ex:stealing money from victim account using
victim credit card number.
Cybercrime : The legal perspectives
Computer Crime: As per “Criminal Justice Resource Manual (1979)”,
computer-related crime was defined in the broader meaning as: “any
illegal act for which knowledge of computer technology is
essential for a successful prosecution(legal charge)”.

International legal aspects of computer crimes were studied in 1983.

In that study, computer crime was consequently defined as:


“encompasses any illegal act for which knowledge of computer
technology is essential for its commit”.

Cybercrime, in a way, is the outcome of “globalization.”

Globalised information systems accommodate an increasing number


offences.
Cybercrimes: An Indian
Perspective
Cybercrimes: Indian Statistics:
217 cases were registered under IT Act during the year 2007 as compared to 142
cases during the previous year 2006, with an increase of 52.8%. 99 cases of the total
217 cases registered under ITA 2000 were cyberpornography.
There were 76 cases of hacking with computer system which is related to
loss/damage of computer resource/utility. India is said to be “youth country” given the
population age distribution. However from cybercrime perspective, this youth aspect
does not seem good as revealed by cybercrime statistics in India.Cybercrimes:
Cases of various categories under IPC Section: A total of 339 cases were
registered under IPC sections during the year 2007 as compared to 311 such
cases during 2006, thereby reporting an increase of 9%.Majority of the crimes out
of total 339 cases registered under IPC fall under 2 categories i.e.., Forgery &
Criminal breach of Trust or Fraud.
Incidence of Cybercrimes in cities: 17 out of 35 mega cities did not report any case of
cybercrime (neither under the IT Act nor under IPC Sections) during the year 2007. A
total of 17 mega cities have reported 118 cases under IT Act and 7 mega cities
reported 180 cases under various sections of IPC.
Cybercrime and the Indian
ITA(Information Technology Act) 2000
Discuss cybercrime and the Indian ITA 2000

India has the fourth highest number of Internet users in the world There are 45
million Internet users in India, 37% of all Internet accesses happen from cybercafes and
57% of Indian Internet users are between 18 and 35 years.

The population of educated youth is high in India.

It is reported that compared to the year 2006, cybercrime under the Information
Technology (IT) Act recorded a whopping 50% increase in the year 2007.

The National Crime Record Bureau (NCRB) gives the report that, 46%, were related to
incidents of cyberpornography, followed by hacking.

In over 60% of these cases, offenders were between 18 and 30 years, according to the
"Crime in 2007".

The Indian Government is doing its best to control cybercrimes.

For example, Delhi Police have now trained 100 of its officers in handling cybercrime
and placed them in its Economic Offences Wing.

The training gave to officers about computer hardware and software, computer networks
comprising data communication networks, network protocols, wireless networks and
network security about 6 weeks.
Cybercrime and the Indian ITA(Information Technology
Act)2000

Hacking and the Indian law:


Cyber Crimes are punishable under Two categories ITA 2000 &
IPC(Indian penal code).
The ITA 2000 was framed after the United Nation General
Assembly Resolution in January 30, 1997.
ITA 2000 is the primary law in India dealing with Cyber crimes &
electronic commerce.
A total 207 cases cybercrime was registered under the IT Act in
2007 compared to 142 cases registered 2006.
Under the IPC 339 cases were recorded in 2007 compared
noteworthy to 311 cases in 2006.
https://www.youtube.com/watch?v=czDzUP1HclQ
Cybercrime and the Indian ITA(Information Technology Act)2000
ITA 2008 —->Amendment to ITA 2000
Sec 66, hacking as a term has been removed.
This section has now been expanded to include
Sections 66A (offensive messages). 66B
(receiving stolen computer). 66C (identity theft),
66D (impersonation), 66E (voyeurism) and 66F
(cyberterrorism).
Some more terminologies of Cybersecurity

Phishing :Trying to trick you into believing that the messages is form a legitimate sources
that you can click and download link.
Phishing is a form of online identity theft that aims to steal sensitive information such as
online banking passwords, credit card information from user.

Malware:Malware, or malicious software, is any program or file that is intentionally harmful to a


computer, network or server.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy