CS Module2QB
CS Module2QB
CYBER SECURITY
-------------------------------------------------------------------------------------------------------------
MODULE-2
SECTION A
a) Define cyber-crime.
A cyber-crime is a criminal act in which someone targets a computer or a network of
devices in order to gain illegal rights, steal data from them, frauds etc.
Cybercrime is commonly called a computer-oriented criminal activity that either uses or
targets a network, computer system, or network device
c) What is a Malware?
Malicious software, or "malware," is any program designed to harm computer systems or
their users—like ransomware, Trojan horses, and spyware.
Malware, short for malicious software, refers to any intrusive software developed by
cybercriminals (often called hackers) to steal data and damage or destroy computers and
computer systems. Examples of common malware include viruses, worms, Trojan viruses,
spyware, adware, and ransomware
i) Which Organizations are dealing with Cybercrime and Cyber security in India?
Indian Cyber Crime Coordination Centre (I4C)
Phishing: A phishing attack involves attackers sending several spam mails having malicious
attachments or links. Once a receiver clicks on a link, he/she may be redirected to a
malicious site asking the receiver to respond with confidential details, such as login
credentials, billing information, etc. This type of attack may also take place through text
messages, websites, or even social media platforms.
Hacking: Hacking is a type of cybercrime act where an intruder gets access to a few or
complete functions within a system without your permission. Hackers (people who perform
hacking) are tending to be computer programmers and they have an advanced
understanding of computers. However, they misuse this knowledge for performing illegal
activities, such as accessing corporate and government accounts, and stealing their financial
data or other important information.
Computer Viruses: Mostly, computer viruses are attached to infected software that spreads
across other installed software. Viruses can come to your system through removable
devices and the internet. Without proper scanning and removing them from your system,
the next time you start your system, the viruses will run all over again.
Ransomware: Ransomware is one of the most popular types of malware-based attacks. It
enters through a computer network on a local machine and encrypts files using public-key
encryption. That means you cannot access encrypted files and the information stored in
them. The cybercriminal will then ask for ransom (money) to unlock the files and give your
data back.
DDoS Attacks: The DDoS (Distributed Denial of Service) attack is a blatant attempt by
cybercriminals to take down a system or network temporarily or completely. This
overwhelms a system with multiple connections requests that it cannot handle.
Additionally, there may be spam traffic coming from various sources. This eventually leads
to server overload. DDoS attacks are used as a distraction technique to allow cybercriminals
to hack into the system meanwhile.
Botnets: Botnets are networks from comprised computers that are controlled externally by
remote attackers, known as ‘Bot Herders'. The attackers target other computers and send
spams or malware by using these botnets. This type of cybercrime is usually performed
against businesses and governments because botnets mainly target the entire IT
infrastructure.
Cyber stalking: This type of cybercrime involves a person being followed by the
cybercriminal online. The stalker will follow the target person virtually, including all the
activities. Then, the stalker might harass the victim by using social media platforms, mails,
or websites, etc. Cyber stalkers first try to know their victims as much as possible and then
make them feel afraid or concerned regarding their
Identity Theft: Identity theft is a specific type of cybercrime in which attackers gain access
to the victim's personal information, including passwords, financial accounts, credit cards,
and other confidential information. In most cases, cybercriminals use these details to steal
money from your accounts, without your knowledge. Additionally, cybercriminals may use
your details to commit a crime or claim government benefits, making others think it was
you.
PUPs: PUPs is an acronym for 'Potentially Unwanted Programs'. These are not considered
much threatening as compared to other types of cybercrime. These are nothing but a type
of malware program that uninstalls important software from your computer system
automatically. In addition, PUPs can also remove or change your default search engines
within the browsers. They can involve adware and spyware; therefore, it’s a good practice
to make use of an antivirus program to prevent any malicious download.
Social Engineering: This type of cybercrime involves criminals making direct contact with
the victim through phone, emails, or even in person. Cybercriminals first try to earn trust
and then they steal confidential information like passwords, financial accounts data, etc. In
most cases, cybercriminals act like a customer service agent of any legitimate company and
ask for the important information. Once they get the desired information, they might sell
your information or try to steal money from your accounts.
Online Scams/Frauds: These are crimes that involve spam advertisements or emails
offering large rewards or high amounts of money. These offers are presented in such a way
that they look very real. Once users click on these malicious advertisements or links, the
malware reaches their system and compromises the information.
Prohibited/Illegal Content: This is a specific type of cybercrime that includes the sharing of
offensive and inappropriate content over virtual platforms. Cybercriminals distribute
offensive materials to make people feel hatred against other people, religions, or countries,
etc. Offensive content can include but is not limited to, videos of criminal activities, sexual
activities between adults, videos with intense violence, etc. Additionally, it can also contain
illegal contents like terrorism supported materials or child exploitation materials.
Spamming: This cybercrime involves criminals using electronic messaging systems to send
messages to users. These messages usually consist of malware, fake links of websites, and
other malicious software. Email spamming is one of the common spamming methods in
which bulk messages are sent to large numbers of users. These messages include deals, and
promos from trusted companies to attract users to click on the attachments or the fake
links.
Malvertising: Malvertising involves criminals filling websites with several advertisements
containing malicious codes or links. Once users click on these advertisements, they will be
redirected to fake websites that look like trusted ones. Users will submit the personal
details, thinking they are legitimate. This information will further reach to the attackers.
Furthermore, the websites can automatically start downloading files containing viruses and
other malware.
Cyber Terrorism: Generally grander acts of destruction online by using the Internet or
computer technology to carry out acts of terror, such as causing infrastructure damage and
catastrophic malfunctions, stealing confidential information, or spreading propaganda with
political or cultural implications. Cases of cyber terrorism are becoming increasingly
sophisticated, placing higher demands on cyber security and protection.
Online Harassment: Involves cyber bullying, cyber stalking, and repeated acts intended to
scare, harm, anger, or shame a particular individual. Today, online harassment is most
prevalent on social media sites, dating apps, and forums/message boards. Examples of
online harassment include sending inappropriate and unsolicited messages, making clear
and intentional threats, or distributing sensitive photos or videos of a victim.
4) Discuss the Challenges associated with cybercrimes against women and children and
remedial measures taken.
o A cyber-crime is a criminal act in which someone targets a computer or a network of
devices in order to gain illegal rights, steal data from them, frauds etc.
CYBERCRIMES AGAINST WOMEN & CHILDREN
CYBER STALKING- It included contacting or attempting to engage with the victim via social
networking sites or phone conversations despite her evident indifference, writing messages
(often threatening) on the victim’s page, and persistently pestering the victims with e –
mails messages/phone calls, among other things.
SEXTORTION- This is the most frequently committed cybercrime involving women. The
criminals began extorting or sexual favours from their victims by blackmailing them into
disclosing their private photographs or modified images. By intimidating women,
perpetrators sought sexual videoconferencing or letters from them in response to the
pandemic frustration. Additionally, their lack of income emboldened them to extract money
from victims by threatening them with their modified photographs.
CYBER HACKING- The women became victims of cyber hacking after clicking on malware
URLs that downloaded all their personal information on their phones, activated the
microphone and camera, and captured their intimate photos and videos. Offenders then
utilize these pieces of data and images to commit sextortion and other crimes.
CYBER-BULLYING- This would include posting false and misleading and abusive statements
about the victims on social networking sites and demanding payment to have them
removed, leaving hurtful comments on the victim’s posts, exchanging morphed/private
pictures of the victims without her consent, and sending rape and death threats to the
victim, among other things. A sort of harassment and bullying is committed through digital
or communicative devices such as a computer, mobile phone, or laptop.
PHISHING- criminals send bogus email messages with a link to a specific webpage in order
to trick the victim into entering personal information such as bank payment information,
contact information, and passcodes or with the intention of infecting the victim’s device
with harmful viruses as soon as the link is opened. These emails and texts look to be real.
The perpetrators then utilize the victim’s bank account and other private details to conduct
suspicious transactions from the victim’s account to their own.
PORNOGRAPHY- Throughout the epidemic, perpetrators engaged in online sexual assault of
women, morphing the victim’s image and utilizing it for pornographic purposes.
CYBERSEX TRAFFICKING- In contrast to sex trafficking, the victims has no direct interaction
with the abuser. Cybersex trafficking occurs when a dealer broadcasts, records, or
photographs the victim doing sexual/intimate actions from a central place and then sells the
material on the internet to sexual abusers and purchasers. The offenders have sexually
abused women by coercing, manipulating, and blackmailing them into becoming involved in
cybersex trafficking.
Harassment through e-mails: Harassment via email, includes black mailing, threatening and
constant sending of love letters in anonymous names or regular sending of embarrassing
mails.
Child pornography: Child sexually abusive material (CSAM) refers to material containing
sexual image in any form, of a child who is abused or sexually exploited. Section 67 (B) of IT
Act states that “it is punishable for publishing or transmitting of material depicting children
in sexually explicit act, etc. in electronic form.
Cyber grooming: Cyber Grooming is when a person builds an online relationship with a
young person and tricks or pressures him/ her into doing sexual act.
Prostitution: Many escorts will advertise their services in online classifieds, social media
forums, or their own personal websites, making it easy and discreet for people to find them.
But since prostitution is illegal in the vast majority of the United States, both the escort and
the client are committing a crime.
REMEDIAL MEASURES TAKEN
Cyber Crime Prevention against Women & Children (CCPWC) scheme: Ministry of Home
Affairs has provided financial assistance to all the States & UTs to strengthen the
mechanism to deal with cyber-crimes under Cyber Crime Prevention against Women &
Children (CCPWC) scheme. The scheme is an effort to support the states in setting up cyber
forensic-cum-training laboratories, training, and hiring junior cyber consultants. Under the
initiative, cyber forensic-cum-training laboratories have been established in 28 States.
Spreading awareness about cyber-crimes: The Central Government has taken action to
increase public awareness of cybercrimes, including the issue of alerts and advisories,
capacity building and training for law enforcement, prosecutors, and judicial officials, as
well as the development of cyber forensic technologies. Programs are run by the Ministry of
Electronics and Information Technology (MeitY) to raise people’s understanding of
information security. Information security-specific books, movies, and online resources are
created for kids, parents, and general users.
Indian Cyber Crime Coordination Centre (I4C): To offer a framework and ecosystem for
LEAs to deal with cybercrimes in a thorough and coordinated manner, the government
established the Indian Cyber Crime Coordination Centre (I4C). In order to address the issue
of jurisdictional complexity, based on hotspots/areas for cybercrime, the I4C has
established “Joint Cyber Coordination Teams” in Mewat, Jamtara, Ahmedabad, Hyderabad,
Chandigarh, Vishakhapatnam, and Guwahati. These teams are responsible for providing a
strong coordination framework to the LEAs.
National Cyber Crime Reporting Portal: To enable the public to report occurrences
pertaining to all sorts of cybercrimes, with a focus on cybercrimes against women and
children, the government has developed the National Cyber Crime Reporting Portal
(www.cybercrime.gov.in). A module of the Citizen Financial Cyber Fraud Reporting and
Management System has also been introduced to allow for the immediate reporting of
financial frauds and to prevent money from being siphoned off by fraudsters.
Keep an eye out for irrelevant / fraudulent phone/email messages.
Don't respond to email messages that ask for personal information.
Be aware of fraudulent Websites used to steal personal information.
Pay attention to privacy policies on Websites and in software .
Guard your email address.
Use Strong Passwords.