CF Unit-1
CF Unit-1
By
M Vinod
Associate Professor, CSE,
BRECW, Hyderabad
UNIT-I
Introduction of Cybercrime:
Types, The Internet spawns crime, Worms versus viruses Computers’
roles in crimes, Introduction to digital forensics.
Introduction to Incident Response:
Incident response Methodology-Steps-Activities in Initial Response,
Phase after detection of an incident
What is Cybercrime?
Cybercrime is defined as a crime where a computer is the object of the
crime or is used as a tool to commit an offense.
A cybercriminal may use a device to access a user’s personal
information, confidential business information, government information,
or disable a device. It is also a cybercrime to sell or elicit the above
information online.
Vishing refers to phishing scams that take place over the phone. It has
the most human interaction of all the phishing attacks but follows the
same pattern of deception. The fraudsters will often create a sense of
urgency to convince a victim to divulge sensitive information.
The call will often be made through a spoofed ID, so it looks like it's
coming from a trustworthy source.
Whaling this category of phishing from others is the high-level choice of
target. A whaling attack is an attempt to steal sensitive information and
is often targeted at senior management.
2. Ransomware
Most cases infects a victim’s computer via phishing attacks or an exploit
kit campaign. Upon successful infection, the ransomware commonly
encrypts the victim’s data. It then demands a ransom payment in
exchange for the return of their data.
3. Malware comes in many different forms. Some specifically target
users’ financial information by installing keyloggers onto victims’
computers. Malware samples can also reach users via a number of
delivery methods, including phishing attacks and malicious software
packages that exploit unpatched software vulnerabilities. Once installed,
attackers can use the malware to spy on online activities, steal personal
and financial information or hack into other systems. Malware has
become one of the biggest online threats and it’s been used in some of
the world’s largest cyber-attacks including WannaCry, NotPetya and
Cryptolocker.
4. Identity Theft
Attackers can do all kinds of things with a person’s identity. They can
seize control of victims’ banking credentials, apply for new banking
accounts, steal users’ hard-earned savings, and more. All they need are
some key bits of information about you to convince a bank or a
customer service representative that they’re you.
5. Scams don’t come in one size. But many of them have something in
common: they convey an enticing offer that in many cases attempts to
trick users into sending over money. Of course, those offers are baseless,
and victims end up losing money in the process.