Cyber Securty Module-2 BCA
Cyber Securty Module-2 BCA
SECURITY
MODULE – 2
Cybercrime and Cyber law: Classification of cybercrimes, Common cybercrimes -
cybercrime targeting computers and mobiles, cybercrime against women and children,
financial frauds, social engineering attacks, malware and ransomware attacks, zero day
and zero click attacks, Cyber criminals modus-operandi, Reporting of cybercrimes,
Remedial and mitigation measures, Legal perspective of cybercrime, IT Act 2000 and its
amendments, Cybercrime and offences, Organisations dealing with Cybercrime and
Cyber security in India, Case studies.
Cyber Crime
Any criminal activity carried out over the internet is referred to as cybercrime. Cybercrimes are crimes
that involve criminal activities done through cyberspace by devices connected to the internet. At times,
cybercrimes are also called
„computer crimes.‟ Most cybercriminals commit cybercrimes with mainly three motives- monetary,
personal, or political.
The first incident of cybercrime was documented in 1973. A computer was used by a teller at a New
York bank to pilfer over two million dollars. The first email spam was sent in 1978.
Though cybercrimes do not physically affect anyone, they tend to seriously harm the reputation,
finances, and privacy of the targeted persons. Further, another crucial characteristic of cybercrimes is the
determination of jurisdiction. Since the identity of the cybercriminal can be completely erased and
mostly stays concealed in cyberspace, it is very difficult to identify him/ her.
As far as India is concerned, the term cybercrime is not defined under any legal provision. However,
different types of cybercrimes are illustrated under the Information Technology Act, 2000. Further,
certain provisions of the Indian Penal Code, 1860 (hereinafter referred to as „the IPC‟) are applicable
to various cybercrimes also. These cybercrimes- related legal provisions under the IT Act and IPC
apply to different types of cybercrimes, though their specific names are not mentioned therewith.
Meaning of Cyber Crime:
Cybercrime refers to criminal conduct committed with the aid of a computer or other electronic
equipment connected to the internet. Individuals or small groups of people with little technical
knowledge and highly organized worldwide criminal groups with relatively talented developers and
specialists can engage in cybercrime.
Cybercriminals or hackers who want to generate money, commit a majority of cybercrimes.
Individuals and organizations are both involved in cybercrime. Aside from that, cybercriminals might
utilize computers or networks tosend viruses, malware, pornographic material, and other unlawful data.
To make money, cybercriminals engage in a range of profit-driven criminal acts, including stealing
and reselling identities, gaining access to financial accounts, and fraudulently utilizing credit cards to
obtain funds.
Classification of cyber crimes
Cybercrimes can be classified under three heads, depending on the groups they are targeted.They are:
Generally, ordinary individuals are the most vulnerable targets of cybercriminals. This is due to
various reasons like lack of information, guidance, and cyber-security. The following are some of the
main cybercrimes committed targeting individuals.
1. Cyberbullying
Cyberbullying refers to bullying someone by threatening, harassing or embarrassing the victim
using technology digital device. Generally, cyberbullying includes the following activities on the
internet:
• Humiliating/embarrassing content posted online about the victim of online bullying,
2. Cyberstalking
Browsing anyone’s internet history or online activity, and sending obscene content online with the
help of any social media, software, application, etc. to know about that particular person is called
cyberstalking. Cyberstalkers take advantage of the inconspicuousness provided by the internet. They
are generally not detectable by the victim, as it is very easy for cyberstalkers to open spam accounts
just to stalk any person; once the stalker deletes the account, his/ her identity completely vanishes.
3. Cyber defamation
Cyber defamation means injuring the other person‟s reputation via the internet through social media,
Emails etc. There are two types of Cyber defamation: libel and slander.
• Libel: It refers to any defamatory statement which is in written form. For instance, writing
defamatory comments on posts, forwarding defamatory messages on social media groups, etc. are a part
of cyber defamation in the form of libel.
• Slander: It refers to any defamatory statement published in oral form. For instance, uploading
videos defaming someone on YouTube is a part of cyber defamation in the form of slander.
4. Phishing
Phishing refers to the fraudulent practice of sending emails under the pretext of reputable companies to
induce individuals to reveal personal information, such as passwords, credit card numbers, etc., online.
Phishing refers to the impersonation of a legitimate person and fraudulently stealing someone‟s data.
Through phishing attacks, cybercriminals not only exploit innocent individuals but also spoil the
reputation of well-known companies.
5. Cyber fraud
As the name suggests, cyber fraud refers to any act of fraud committed with the use of a computer.
Any person who dishonestly uses the internet to illegal deceive people and gets personal data,
communication, etc. with a motive to make money is called a cyber fraud. Examples of cyber fraud
include sending emails containing fake invoices, sending fake emails from email addresses similar to
the official ones, etc.
6. Cyber theft
Cyber theft is a type of cybercrime which involves the unauthorized access of personal or other
information of people by using the internet. The main motive of the cyber criminals who commit cyber
theft is to gather confidential data like passwords, images, phone numbers, etc. and use it as leverage
to demand a lumpsum amount of money. The unauthorized transmission of copyrighted materials,
trademarks, etc. over the internet is also a part of cyber theft. Cyber thefts are committed through
various means, like hacking, email/ SMS spoofing, etc. Yahoo!, Inc. v. Akash Arora (1999), which
was one of the initial cases related to cyber theft in India. In this case, the defendant was accused of
using the trademark or domain name ‘yahooindia.com,’.
7. Spyware
Spyware is a type of malware or malicious software, when it is installed, it starts accessing and
computing the other person‟s device without the end user‟s knowledge. The primary goal of this
software is to steal credit card numbers, passwords, One-Time Passwords (OTPs), etc.
B. Cybercrimes against organizations
The cyber crimes mainly targeting individuals may help cybercriminals get only a meagre amount of
ransom, depending on the financial status of the targeted individuals. On the other hand, cyber-
attacking large companies or organisations can help them get their hands on extremely confidential
data of both private and public institutions or entities. Cyber attacks on organizations are generally
launched on a large scale to get a lump sum amount of ransom. Since such attacks drastically damage
the companies‟ daily operations, most companies try to resolve them as fast as possible. The following
are the kinds of cyber crimes launched targeting organizations.
1. Attacks by virus
A computer virus is a kind of malware which connects itself to another computer program and can
replicate and expand when any person attempts to run it on their computer system. For example, the
opening of unknown attachments received from malicious emails may lead to the automatic installation
of the virus on the system in which it is opened. These viruses are extremely dangerous, as they can
steal or destroy computer data, crash computer systems, etc. The attackers program such malicious
viruses to get hold of organisations official or confidential data. The illegally retrieved data is then
used as leverage to extort ransom from the organisations.
2. Salami attack
It is one of the tactics to steal money, which means the hacker steals the money in small amounts. The
damage done is so minor that it is unnoticed. Generally, there are two types of Salami attacks- Salami
slicing and Penny shaving. In Salami slicing, the attacker uses an online database to obtain customer
information, such as bank/credit card details. Over time, the attacker deducts insignificant amounts
from each account. These sums naturally add up to large sums of money taken from the joint accounts
invisibly.
3. Web Jacking
Web Jacking refers to the illegal redirection of a user’s browser from a trusted domain’s page to a fake
domain without the user’s consent. By using the method of Web Jacking, people visiting any well-
known or reliable website can be easily redirected to bogus websites, which in turn lead to the
installation of malware, leak of personal data, etc. Web jackers intend to illegally collect confidential
information of users by enticing them to click on any link which may seem genuine at the first glance.
4. Denial of Service Attack
Denial of Service Attack or DoS, is a cyber attack on computer devices or systems, preventing the
legal users or accessors of the system from accessing them. The attackers generally attack systems in
such a manner by trafficking the targeted system until it ultimately crashes. DoS attacks cost millions
of dollars to the corporate world, as it curbs them from using their own systems and carrying out their
activities. The attack may be also used to incorporate ransomware into corporate systems.
5. Data diddling
Data diddling is a cybercrime which involves the unauthorized alteration of data entries on a computer.
It may be done either before or during the entry of such data. It is generally committed by way of
computer virus attacks. At times, to conceal the alteration, the altered data is changed to its original data
after retrieving the required information. Usually, the strategic or statistical data of large companies.
C. Cyber crimes against society at large
Apart from the cybercrimes committed targeting individuals in society, various other cyber attacks are
launched against the community at large. Such cybercrimes may be aimed either against any
particular section of society or the entire country. The following are a few types of
cybercrimes against the community at large.
1. Cyber pornography
As per Merriam-Webster Dictionary, pornography is the depiction of erotic behaviour (as in pictures
or writing) intended to cause sexual excitement. Accordingly, cyber pornography refers to using the
internet to display, distribute, import, or publish pornography or obscene materials.
The following activities are punishable;
• Uploading pornographic content on any website, social media, etc. where third parties may access it.
• Transmitting obscene photos to anyone through email, messaging, social media, etc.
2. Cyber terrorism
Cyber terrorism means using cyberspace to hurt the general public and damage the integrity and
sovereignty of any country. Cyber terrorism is generally carried out in the following ways:
• Hacking government-owned systems of the target country and getting confidential information.
• Destructing and destroying government databases and backups by incorporating viruses or malware into
the systems.
• Disrupting government networks of the target nation.
• Distracting the government authorities and preventing them from focusing on matters of priority.
3. Cyber Espionage
Cyber espionage refers to the unauthorized accessing of sensitive data or intellectual property for
economic, or political reasons. It is also called „cyber spying‟.
In most cases of cyber espionage, spies in the form of hackers are deliberately recruited to launch cyber
attacks on the government systems of enemy nations to stealthily collect confidential information. The
cross-border exposure of sensitive data related to any country can continue as long as it stays
undetected. The information gathered through cyber espionage is then used by the gathering country to
either combat or launch military or political attacks on the enemy country. Generally, the following
data are gathered through cyber espionage:
• Military data
• Intellectual property
• Update your device software regularly to ensure protection against spyware threats.
• Create unique passwords for different accounts created while using mobile devices.
• Delete the non-active apps to limit the threat to data access and privacy.
To prevent cyber crime, it is important to take measures such as using strong passwords, keeping
software up-to-date, avoiding suspicious emails and websites, and being cautious about sharing
personal information online. The Indian government has also taken steps to combat cyber crime by
setting up specialized agencies such as the Cyber Crime Investigation Cell (CCIC) and the National
Cyber Security Coordination Centre (NCSC). However, there is still a need for greater awareness and
education about cyber security among the general public, especially in rural areas where internet usage
is increasing rapidly.
• Forensic Unit
2. Identity theft: It occurs when someone steals personal information to impersonate another
individual and carry out fraudulent activities.
3. Online banking fraud: Criminals may exploit vulnerabilities in online banking systems to
gain unauthorized access, transfer funds, or conduct fraudulent transactions.
4. Investment scams: These frauds involve false promises of high returns or fictitious investment
opportunities to deceive individuals into providing money.
Prevention: To protect against cyber financial frauds, individuals should be cautious while sharing
personal information online, use strong and unique passwords, regularly monitor financial accounts,
and be vigilant of suspicious emails or websites.
D. Social Engineering Attacks
Social engineering attacks manipulate human psychology to deceive individuals into divulging
sensitive information or performing actions that benefit the attacker.
Social engineering attacks often involve impersonation, pretexting, baiting, phishing, or tailgating to
gain trust and exploit vulnerabilities.
1. Impersonation: Attackers may pretend to be someone trustworthy, like a colleague, IT support,
or a customer service representative, to trick individuals into revealing information or granting access.
2. Pretexting: This technique involves creating a fabricated scenario or pretext to manipulate victims
into providing sensitive information or performing certain actions.
3. Baiting: Attackers offer something enticing, like a free USB drive or a gift card, to trick
individuals into taking actions that compromise their security.
4. Phishing: Phishing is a social engineering technique where attackers use deceptive emails or
websites to trick individuals into revealing personal information.
5. Prevention: Individuals can protect themselves from social engineering attacks by being cautious
of requests for sensitive information, verifying the identity of individuals before sharing information,
avoiding clicking on suspicious links or downloading unknown files, and staying informed about
common scam tactics.
E. Malware Attacks and Ransomware Attacks
i. Malware Attacks:
Malware refers to malicious software designed to infiltrate and damage computer systems, steal data,
or gain unauthorized access.
Types of malware: Common types include viruses, worms, Trojans, spyware, and adware.
1. Viruses: Viruses attach themselves to legitimate programs or files and spread by replicating
themselves. They can cause damage to files, slow down systems, or even render them unusable.
2. Worms: Worms are self-replicating malware that spread over networks, exploiting
vulnerabilities in computer systems and causing disruption.
3. Trojans: Trojans appear as legitimate software but contain hidden malicious code. They can
give attackers unauthorized access to a system or steal sensitive data.
4. Spyware: Spyware secretly collects information about a user's activities, such as browsing habits or
keystrokes, and sends it to a third party without the user's consent.
5. Adware: Adware displays unwanted advertisements, often in the form of pop-ups, and can collect
user information for targeted advertising purposes.
ii.Ransomware Attacks:
Ransomware is a type of malware that encrypts a victim's files or locks them out of their systems,
demanding a ransom in exchange for restoring access.
• Encryption: Ransomware uses strong encryption algorithms to render files inaccessible, making them
useless until a decryption key is provided.
• Payment: Attackers typically demand payment in cryptocurrencies like Bitcoin to make it
difficult to trace the transactions.
• Consequences: Ransomware attacks can lead to significant financial losses, data breaches,
operational disruptions, and reputational damage for individuals and organizations.
• Prevention: Regularly updating software, using strong and unique passwords, employing robust
security solutions, and regularly backing up data are key preventive measures against ransomware
attacks.
10. Dark Web Activities: Cyber criminals utilize the anonymity of the dark web to engage in various
illicit activities, including the sale of stolen data, hacking tools, drugs, weapons, and more.