Cyber Notes Batch 2023
Cyber Notes Batch 2023
UNIT-1
Cybercrime refers to criminal activities carried out using computers, networks, or digital
devices. It includes hacking, identity theft, online fraud, cyber stalking, and phishing. As
technology advances, cybercrimes have become more sophisticated, targeting individuals,
businesses, and governments worldwide.
_______________________@@@@@______________________
Definition of Cybercrime
The term "cyber" originates from "cybernetics," which refers to the study of control
and communication in machines and living beings.
Early cybercrimes emerged in the 1960s when hackers began infiltrating systems for
personal interest.
1980s-1990s saw financial fraud and software piracy rise with widespread computer
use.
The internet boom in the 2000s led to global cyber threats like phishing, ransom
ware, and online fraud.
Today, cybercrime has evolved into a significant threat, necessitating strict cyber
security measures and international cooperation to combat digital offenses.
__________________@@@@@@@____________________
Introduction
Cybercrime and information security are closely linked concepts in the digital world.
Cybercrime refers to illegal activities conducted using computers, networks, or digital
devices, while information security focuses on protecting data from unauthorized access,
misuse, and cyber threats. As technology advances, cybercriminals exploit vulnerabilities in
systems, making cyber security essential for individuals, organizations, and governments.
Cybercrime includes any criminal activity involving computers and networks. It targets
individuals, businesses, and even national security. Common types of cybercrime include:
Cybercrime causes financial losses, reputational damage, data breaches, and risks to personal
safety.
Information security (InfoSec) refers to protecting data from cyber threats. It ensures
confidentiality, integrity, and availability (CIA Triad) of information. Organizations
implement cyber security measures to prevent cybercrimes, including:
Governments and businesses invest in cyber laws, frameworks, and security policies to
mitigate risks. Examples include:
_________________@@@@@@@@@@__________________
Cybercriminals are individuals or groups who engage in illegal activities using computers,
networks, or digital platforms. They exploit technological vulnerabilities to steal data, cause
financial harm, disrupt services, or gain unauthorized access. Cybercrime is categorized
based on the nature of attacks, motives, and the methods used by criminals.
Cybercriminals come from different backgrounds and have various motives. They can be
classified into the following types:
1. Hackers
Hackers are individuals who gain unauthorized access to computer systems. They are
categorized into:
White Hat Hackers – Ethical hackers who help organizations find security
weaknesses.
Black Hat Hackers – Criminal hackers who exploit systems for illegal purposes.
Grey Hat Hackers – Hackers who operate in both ethical and unethical hacking.
2. Phishers
Phishers trick users into revealing sensitive information, such as passwords and credit card
details, by using fake emails, websites, or messages.
3. Cyber Terrorists
These individuals or groups use cyber-attacks to create fear, disrupt infrastructure, or promote
political and ideological goals.
4. Identity Thieves
Cybercriminals who steal personal information, such as Social Security numbers and bank
details, to commit fraud or impersonation.
5. Cyber Stalkers
Individuals who use the internet to harass, intimidate, or threaten victims, often through
social media or emails.
Disgruntled employees or former employees who misuse their access to steal company data
or harm an organization.
7. Script Kiddies
In experienced hackers who use pre-written hacking tools to launch cyber-attacks without
understanding how they work.
8. Financial Cybercriminals
These criminals engage in credit card fraud, online banking fraud, and financial scams to
steal money.
Classifications of Cybercrimes
Cybercrimes can be categorized based on the target, intent, and nature of the attack. The
major classifications of cybercrimes are:
These crimes target individuals to steal personal information, cause harm, or commit fraud.
Examples:
Identity Theft – Stealing personal details (e.g., bank information, Social Security
numbers) for fraud.
Phishing – Deceiving users into revealing sensitive information through fake
emails/websites.
Cyberstalking – Online harassment, intimidation, or threats.
Online Fraud – Fake job offers, lottery scams, or investment frauds.
Credit Card Fraud – Unauthorized use of credit/debit card details for financial gain.
These crimes disrupt business operations, steal corporate data, or cause financial losses.
Examples:
These crimes target government institutions, aiming to disrupt operations, steal sensitive data,
or cause chaos.
Examples:
These crimes affect the general public, often causing large-scale disruption.
Examples:
Online Drug Trafficking – Selling illegal drugs through dark web marketplaces.
Child Exploitation – Circulating illegal content related to minors.
Cyberbullying – Harassment through social media, emails, or text messages.
Financial Scams – Ponzi schemes, fake charities, or fraudulent crowdfunding
campaigns.
________________________@@@@@@@@_________________
Cybercrime has become a global concern as the internet and digital technologies continue to
expand. These crimes include hacking, identity theft, fraud, and cyber terrorism, all of which
require legal frameworks to address and prevent them. Different countries have established
laws to tackle cybercrimes, ensuring digital safety and protecting user data. India, being one
of the fastest-growing digital economies, has its own set of cyber laws to deal with these
crimes.
1. Define Cyber Offenses – Identify crimes like hacking, phishing, and cyber fraud.
2. Establish Jurisdiction – Address cross-border cybercrimes, as criminals can operate
from different locations.
3. Protect Digital Privacy – Prevent unauthorized access to personal and corporate
data.
4. Ensure Digital Evidence Handling – Allow electronic records as legal evidence in
courts.
5. Set Up Punishments & Penalties – Impose fines and jail terms for offenders.
Most countries also have specific data protection laws to ensure privacy and security.
Governments work with international organizations like INTERPOL to combat cyber threats
globally.
India has seen a rapid rise in cybercrimes due to increasing internet usage, digital banking,
and e-commerce. The government has implemented strict laws to tackle cyber offenses and
protect citizens.
___________________@@@@@@@@@_______________________
The Information Technology (IT) Act, 2000 is the primary law governing cybercrime in
India. It was enacted to provide legal recognition to electronic transactions and combat cyber
offenses.
1. Indian Penal Code (IPC) & Criminal Procedure Code (CrPC) – Sections of IPC
(e.g., Section 420 for fraud) are applied alongside the IT Act.
2. National Cyber Security Policy, 2013 – Aims to strengthen India’s cybersecurity
infrastructure.
3. Cyber Crime Investigation Cells – Established in major cities to handle cybercrime
cases.
4. Cyber Suraksha Kendra (Cyber Hygiene Centers) – Promotes cybersecurity
awareness.
5. CERT-In (Indian Computer Emergency Response Team) – Handles cybersecurity
incidents and threats.
6. Digital India Initiative – Promotes digital literacy and security among citizens.
Despite strong legal frameworks, India faces several challenges in handling cybercrimes:
__________________________@@@@@@@@@_____________________
Q7) Cybercrime and the Indian IT Act 2000 & A Global Perspective on Cybercrimes
Introduction
The Information Technology (IT) Act, 2000 is India's primary legislation for cybercrimes
and digital transactions. It was enacted to provide legal recognition to electronic commerce
and address crimes committed in cyberspace. With rapid digitalization, cybercrimes such as
hacking, identity theft, financial fraud, and online harassment have increased, making the IT
Act crucial for cybersecurity and legal enforcement.
The IT (Amendment) Act, 2008 strengthened penalties for cybercrime and removed
outdated sections.
Section 66A, which criminalized offensive online messages, was struck down by the
Supreme Court in 2015 due to concerns over free speech.
Data Protection Laws – India is working on a new Personal Data Protection Bill to
enhance data privacy regulations.
_________________________@@@@@@@@@@@@@@__________________
___________________@@@@@@@@@@@@_________________
UNIT-II
1. Increased Usage – More people use mobile devices for sensitive activities, making
them attractive targets.
2. Weak Security Measures – Many users do not use strong passwords, encryption, or
security software.
3. Public Wi-Fi Risks – Unsecured networks allow hackers to intercept data through
attacks like "Man-in-the-Middle."
4. Mobile Malware – Viruses, Trojans, and spyware designed specifically for mobile
operating systems like Android and iOS.
5. Phishing & Social Engineering – Attackers use fake messages, emails, and apps to
steal personal information.
SIM Cloning & SIM Swapping – Attackers duplicate SIM cards to intercept calls
and messages.
Ransomware on Mobile Devices – Locks a device and demands payment for access.
Data Theft & Unauthorized Access – Stolen personal and financial information.
Mobile Banking & Payment Fraud – Unauthorized transactions using hacked
mobile payment apps.
Bluetooth & NFC Attacks – Exploiting wireless connections to steal data.
_______________________@@@@@@@@@_________________
The rapid growth of mobile and wireless devices has revolutionized communication,
business, and daily life. From basic mobile phones to smartphones, tablets, and wearable
devices, wireless technology has enabled seamless global connectivity. However, this
expansion has also introduced significant cyber security challenges, as cybercriminals exploit
mobile vulnerabilities for malicious activities.
____________________________@@@@@@@@@@___________________
Q3)Trends in Mobility
Trends in Mobility
The rapid adoption of mobile devices and wireless technology has changed how people
interact, work, and conduct business. With advancements in smartphones, tablets, wearable
devices, and IoT (Internet of Things), mobility trends continue to evolve, offering both
opportunities and challenges.
_____________________________@@@@@@@@__________________________
With the rise of mobile banking and digital transactions, credit card frauds have also
increased. Cybercriminals exploit weak security measures in mobile devices to steal sensitive
financial information.
___________________________@@@@@@@@@@@@__________________
Authentication service security ensures that only authorized users can access digital
systems, networks, and mobile services. It verifies the identity of users before granting access
to sensitive data or online services. With the rise of cyber threats such as phishing,
credential theft, and unauthorized access, strong authentication mechanisms have become
essential for securing mobile and wireless computing environments.
3. Biometric Authentication
4. Token-Based Authentication
1. Phishing & Social Engineering – Attackers trick users into revealing login
credentials.
2. Brute Force Attacks – Automated attempts to guess passwords.
3. Man-in-the-Middle (MITM) Attacks – Hackers intercept authentication data during
transmission.
4. SIM Swapping & OTP Hijacking – Cybercriminals gain control of a user's mobile
number to intercept OTPs.
5. Credential Stuffing – Using leaked passwords from data breaches to access multiple
accounts.
Mobile phones have become essential for communication, banking, and online transactions.
However, their widespread use has made them a prime target for cybercriminals. Mobile
devices store sensitive data, connect to unsecured networks, and often lack strong security
measures, making them vulnerable to various attacks.
Smishing (SMS Phishing): Cybercriminals send fake SMS messages to trick users
into revealing personal or financial information.
Vishing (Voice Phishing): Attackers call users pretending to be from banks or
government agencies to steal sensitive details.
🔹 Example: A user receives a text claiming their bank account will be blocked unless they
click a fraudulent link.
SIM Swapping: Attackers trick mobile network providers into transferring a victim's
phone number to a new SIM card. This allows hackers to intercept OTPs and access
bank accounts.
SIM Cloning: Cybercriminals create a duplicate SIM card to listen to calls and steal
data.
🔹 Example: A hacker gains access to a victim's cryptocurrency wallet by taking over their
phone number.
Hackers intercept data transmitted between a mobile phone and a network, allowing
them to steal passwords, banking details, and private conversations.
Public Wi-Fi hotspots are often used to execute these attacks.
🔹 Example: A user connects to free Wi-Fi at an airport, and hackers steal their email login
credentials.
🔹 Example: A user installs a free app that secretly collects their personal data and sends it to
hackers.
🔹 Example: A hacker nearby can steal data from an unsecured Bluetooth device.
🔹 Example: A victim clicks on a fake email attachment, and their phone is locked until they
pay a ransom.
Hackers overload a mobile device with excessive data requests, causing it to crash or
malfunction.
Overbilling Attacks: Attackers use a victim's mobile data to download large files,
causing unexpected charges.
🔹 Example: A hacker floods a victim’s phone with SMS messages, rendering it unusable.
Lost or stolen mobile devices can expose sensitive business data if not encrypted.
Employees using weak passwords or failing to lock their devices increases security
risks.
Insider threats – Disgruntled employees can misuse company data on their personal
devices.
Many companies allow employees to use personal devices for work, but these
devices lack centralized security controls.
Employees may install unapproved or insecure apps that create vulnerabilities.
Difficulty in separating personal and corporate data increases legal and
compliance risks.
Malicious apps and phishing emails trick employees into revealing login credentials.
Mobile spyware can track keystrokes, record calls, and steal business data.
🔹 Example: An employee downloads a fake business app that steals company passwords.
Attackers can lock mobile devices and demand a ransom to restore access.
Organizations lose access to critical data, disrupting operations.
The increasing use of mobile devices in workplaces has improved communication and
efficiency but also introduced security risks such as data breaches, malware attacks, and
unauthorized access. To protect sensitive business information, organizations must
implement robust security measures for managing mobile devices effectively.
MDM software helps IT teams remotely manage, monitor, and secure mobile
devices.
It allows organizations to enforce security policies, update software, and track
lost/stolen devices.
Examples: Microsoft Intune, VMware AirWatch, IBM MaaS360.
Implement role-based access control (RBAC) to limit data access based on job roles.
Employees should use only secure, encrypted Wi-Fi networks to prevent hacking.
Require Virtual Private Network (VPN) connections for accessing corporate
resources remotely.
Disable automatic Wi-Fi connections to prevent accidental connections to insecure
networks.
Enable remote device locking, tracking, and data wiping in case of loss or theft.
Employees should report lost devices immediately to IT teams for deactivation.
Use software like Find My Device (Android), Find My iPhone (Apple), or MDM
tools for remote management.
Ensure mobile operating systems and business apps receive regular updates to fix
vulnerabilities.
Enable automatic security patches for corporate apps and devices.
Conduct security audits to identify outdated software and enforce updates.
In the modern workplace, laptops and mobile devices are essential for remote work,
business operations, and data access. However, their portability and internet connectivity
expose them to security threats such as data breaches, malware attacks, device theft, and
unauthorized access. Organizations must implement strict security policies and measures
to protect corporate information and ensure compliance with cyber security regulations.
Employees must use VPN (Virtual Private Network) when accessing company
resources remotely.
Disable auto-connect to public Wi-Fi to prevent Man-in-the-Middle (MITM)
attacks.
Enforce firewalls & intrusion detection systems (IDS/IPS) to monitor laptop
traffic.
Employees must lock laptops when unattended and store them in secure locations.
Laptop locks, Kensington security cables, and biometric logins should be
mandatory.
Implement device tracking solutions (Find My Device, Absolute Computrace).
Personal laptops used for work must be registered with IT and comply with
security policies.
Data separation between work and personal files must be enforced using virtual
machines or sandboxing.
IT must have remote access to wipe corporate data if needed.
✅ Network Security
UNIT-III:
Tools and Methods Used in Cybercrime: Password Cracking, key loggers and Spywares,
virus and worms, Trojan Horses and Backdoors, Steganography, attacks on wireless
networks, Phishing and Identity Theft: Introduction, Phishing, Identity Theft (ID Theft).
Types of Malware:
Cybercriminals trick users into revealing sensitive information using deceptive emails,
messages, or websites.
Common Techniques:
🔹 Example: An attacker sends a fake bank email, asking users to verify their login
credentials, leading to account theft.
Hacking tools are used to breach systems, steal data, and disrupt services.
🔹 Example: The Mirai botnet attack (2016) used thousands of IoT devices to launch a
massive DDoS attack, disrupting major websites.
Common Techniques:
The dark web is a hidden part of the internet where cybercriminals buy and sell stolen data,
hacking tools, and illegal services.
🔹 Example: Silk Road, an illegal dark web marketplace, was used for selling drugs, stolen
data, and hacking services before being shut down.
Common Techniques:
Card Skimming & Online Payment Fraud – Stealing credit card details through
malware or fake payment gateways.
🔹 Example: Attackers inject malicious scripts into e-commerce sites to steal credit card
details during checkout (Magecart attacks).
Threats:
____________________@@@@@@@@@@__________________________
1. Password Cracking
Password cracking is the process of retrieving passwords from stored or transmitted data
using various hacking techniques. Cybercriminals use this method to gain unauthorized
access to accounts, steal sensitive information, or deploy further cyberattacks.
1. Brute Force Attack – Trying every possible password combination until the correct
one is found.
2. Dictionary Attack – Using a predefined list of common passwords and words to
guess the correct password.
3. Rainbow Table Attack – Using precomputed hash values to crack hashed passwords.
Prevention Measures
✅ Use strong, unique passwords with a mix of uppercase, lowercase, numbers, and special
characters.
✅ Enable Multi-Factor Authentication (MFA) for added security.
✅ Use password managers to generate and store secure passwords.
✅ Avoid reusing passwords across multiple accounts.
2. Keyloggers
Types of Keyloggers
Prevention Measures
3. Spyware
Spyware is malicious software that secretly monitors user activities and collects personal
information. It is often used for identity theft, corporate espionage, and data theft.
Types of Spyware
Prevention Measures
Viruses and worms are types of malicious software (malware) that spread across computer
systems, causing harm by corrupting files, stealing data, or disrupting operations. While both
are self-replicating, they differ in how they spread.
A virus is a malicious code that attaches itself to legitimate files and spreads when
the infected file is executed.
It requires human action, such as opening an infected email attachment or
downloading a malicious program, to activate.
Types of Viruses
1. File Infector Virus – Attaches to executable files (.exe, .dll) and spreads when
opened.
2. Boot Sector Virus – Infects the boot sector of a storage device, launching at startup.
3. Macro Virus – Targets macros in documents (e.g., Microsoft Word, Excel).
4. Polymorphic Virus – Changes its code to evade detection by antivirus software.
🔹 Example: The ILOVEYOU virus (2000) spread via email, deleting files and damaging
millions of computers.
Effects of Worms
A Trojan horse is a type of malware that disguises itself as legitimate software but
contains malicious code.
Unlike viruses and worms, Trojans do not self-replicate but can deliver
ransomware, spyware, or rootkits.
Types of Trojans
🔹 Example: The Zeus Trojan stole banking credentials from millions of users worldwide.
2.2 Backdoors
Effects of Backdoors
1. Steganography
Steganography is the technique of hiding secret data within other non-secret data (such as
images, audio, video, or text) to avoid detection. Unlike encryption, which scrambles data
into unreadable code, steganography conceals data in plain sight. Cybercriminals use it for
covert communication, data exfiltration, and malware distribution.
Types of Steganography
1. Image Steganography – Hiding messages within image pixels (Least Significant Bit
(LSB) modification).
2. Audio Steganography – Embedding hidden data in audio files.
3. Video Steganography – Concealing data within video frames.
4. Text Steganography – Altering text formatting or embedding invisible characters.
5. Network Steganography – Hiding data within network traffic (e.g., covert channels
in TCP/IP headers).
🔹 Example: Malware like Duqu and Zeus used image steganography to hide malicious
code in images and evade detection.
Steganography in Cybercrime
Wireless networks (Wi-Fi, Bluetooth, NFC) are vulnerable to cyber-attacks due to their
open nature. Hackers exploit weaknesses in encryption, authentication, and access controls to
steal data, intercept communications, and take control of devices.
🔹 Example: Hackers intercept unencrypted data on public Wi-Fi to steal login credentials.
🔹 Example: A fake “Airport Wi-Fi” login page is used to steal banking credentials.
Attackers flood the Wi-Fi network with excessive traffic, causing connectivity
failures.
Deauthentication attacks disconnect users by exploiting vulnerabilities in WPA
security protocols.
🔹 Example: Hackers send fake deauthentication frames to force users off a Wi-Fi network.
Cybercriminals drive around with hacking tools to find and exploit weak Wi-Fi
networks.
Weak WEP or WPA encryption allows attackers to break into networks and access
devices.
🔹 Example: Attackers use Bluetooth scanning in public areas to hack mobile devices.
Cybercriminals use phishing and identity theft to steal sensitive information such as
passwords, banking details, and personal identification data. These attacks often lead to
financial fraud, unauthorized access, and reputational damage. With the rise of online
banking, e-commerce, and social media, phishing and identity theft have become major
cyber security threats.
What is Phishing?
🔹 Example: A fake PayPal email asks users to "verify their account," leading them to a
fraudulent login page where credentials are stolen.
Identity theft occurs when cybercriminals steal personal information (e.g., name, Social
Security number, credit card details) to commit fraud or financial crimes. Stolen identities
are used for unauthorized purchases, loan fraud, and criminal activities.
1. Financial Identity Theft – Using stolen information for fraud, credit card
transactions, or loans.
2. Medical Identity Theft – Using someone’s identity for fake health insurance claims.
3. Criminal Identity Theft – Committing crimes under a stolen identity.
4. Synthetic Identity Theft – Creating fake identities using stolen personal details.
🔹 Example: A cybercriminal steals credit card details through a phishing attack and makes
unauthorized purchases.