0% found this document useful (0 votes)
16 views20 pages

Somenath - Mandal

The document provides an overview of cybercrime, categorizing it into crimes against individuals, property, organizations, and society, along with various types of cyber offenses such as hacking, phishing, and ransomware. It also discusses the roles of cybercriminals, including hacktivists and organized crime groups, and differentiates between passive and active attacks. Additionally, the document touches on cloud computing as a technology that facilitates remote access to data and applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views20 pages

Somenath - Mandal

The document provides an overview of cybercrime, categorizing it into crimes against individuals, property, organizations, and society, along with various types of cyber offenses such as hacking, phishing, and ransomware. It also discusses the roles of cybercriminals, including hacktivists and organized crime groups, and differentiates between passive and active attacks. Additionally, the document touches on cloud computing as a technology that facilitates remote access to data and applications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

BIRBHUM INSTITUTE OF

ENGINEERING AND TECHNOLOGY


NAME – SOMENATH MANDAL
ROLL NO-11801322017
REG NO - 221180120133
SEMESTER-7th
YEAR-4th
SESSION-2024-25
Department-Civil Engineering
Cyber Law and Ethics
Subject Code:
CE(OE)701C
Different types of Cybercrime

Different types of Cyberoffenses

Discuss about Cybercrime , Cybercriminals, Passive Attacks


TOPIC
Active Attacks, Cyberstalking, Attack Vector, Cloud Computing
INTRODUCTION

Cyber Crime is an activity


done using computers and
internet. We can say that
it is an unlawful acts
wherein the computer either
a tool or target or both.
1 Crime against individual

2 Crime against property

CYBER CRIME
3 Crimes against organization

4 Crimes against society


Crimes against

01
individual

These include e-mail spoofing,


spamming, cyber defamation,
cyber harassments and cyber
stalking.
Crimes against

02
property

These include credit card


frauds, internet time theft and
intellectual property crimes
Crimes against

03
organization
These include unauthorized
accessing of computer, denial Of
service, computer contamination /
virus attack, e-mail bombing, salami
attack, logic bomb, trojan horse and
data diddling.
Crimes against

04
society

These include Forgery, CYber


Terrorism, Web Jacking.
CYBER OFFENCE
Cyber offense" refers to actions taken in the digital
realm that involve illegal or unethical activities aimed
at compromising the security, integrity, or
confidentiality of information systems, networks, or
data. These actions can be perpetrated by
individuals, groups, or even nation-states, and they
often exploit vulnerabilities in technology to achieve
their objectives.
Different types of cyber Offences
1. Hacking: Unauthorized access to computer systems or networks, often with the
intent to steal data, disrupt operations, or cause damage.

2. Phishing: A technique used to trick individuals into revealing sensitive


information (like passwords or credit card numbers) by posing as a trustworthy
entity through emails or websites.

3. Malware Distribution: The creation and distribution of malicious software


(malware), such as viruses, worms, Trojans, ransomware, and spyware, designed to
damage or gain unauthorized access to systems.
Different types of cyber Offences

4. Ransomware Attacks: A type of malware that encrypts a victim's data and


demands payment (ransom) for the decryption key.

5. Denial of Service (DoS) Attacks: Attempts to make a service unavailable by


overwhelming it with traffic, causing legitimate users to be unable to access it.
Distributed Denial of Service (DDoS) attacks use multiple compromised systems to
launch the attack.

6. Identity Theft: Stealing personal information to impersonate someone else for


fraudulent purposes, such as opening bank accounts or applying for credit cards.

7. Data Breaches: Unauthorized access and retrieval of sensitive information from a


system or database, often leading to exposure of personal data
CYBER CRIME

Cybercrime refers to illegal activities conducted through the


internet or involving computer systems. These crimes can target
individuals, businesses, and governments, and they can lead to
significant financial losses, data breaches, and reputational
damage. Cybercrime encompasses a wide array of offenses,
including hacking, identity theft, fraud, and the distribution of
malware.
CYBERCRIMENALS
Cybercriminals are individuals or groups who engage in cybercrime. They
can vary widely in terms of motivation, skill level, and organization. Some
common categories include:

- Hacktivists: Individuals or groups that use hacking to promote political


agendas or social change.
- Organized Crime Groups: Criminal organizations that conduct sophisticated
cybercrime for profit.
- Script Kiddies: Inexperienced hackers who use pre-written scripts or tools to
exploit vulnerabilities without fully understanding the underlying technology.
- Insider Threats: Employees or contractors who misuse their acess To systems
for malicious Purpose
CLASSIFICATION OF
CYBERCRIME

1. Computer as a Target: Crimes where the computer itself is the


target, such as hacking or malware attacks.
2. Computer as a Tool: Crimes where the computer is used as a
tool to commit other crimes, such as fraud or identity theft.
3. Content-Related Crimes: Crimes that involve illegal content,
such as child exploitation material or copyright infringement.
4. Cyberterrorism: Acts that threaten national security or cause
significant harm through cyber means
PASSIVE ATTACK

A passive attack is a type of security breach where an unauthorized party monitors or


intercepts data without altering or interfering with the communication. The goal of a
passive attack is typically to gather information, rather than to disrupt or manipulate the
systems involved.

ACTIVE ATTACK
An active attack is a type of security breach where an unauthorized party attempts to
alter, disrupt, or manipulate data or communications in a network. Unlike passive
attacks, which focus on eavesdropping and information gathering without interference,
active attacks involve direct interaction with the system or network to achieve
malicious objectives.
Classification of attack vector
Based on Origin

External Attack vector, Internal Attack Vectors

Based on attack on target


Network Based attack vector, Application-
based Attack Vectors, Endpoint Attack Vectors
Attack vector
Based on techniques
Malware, Phishing, Social Engineering, Denial
of Service (DoS),Exploitation of Vulnerabilities

Based on intent
DataText
Text here Text here Text hereText here Text here Theft, Disruption, Espionage, Sabotage
here
CLOUD COMPUTING

Cloud computing is a technology that allows individuals and organizations to access and
store data and applications on remote servers rather than on local computers or on-
premises infrastructure. This model offers a range of services over the internet, providing
flexibility, scalability, and efficiency. Here’s an overview of cloud computing, including its
types, benefits, challenges, and key service models.
Thanks for
Watching

Reporter

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy