Module 2 CS
Module 2 CS
Cybercrime or a computer-oriented crime is a crime that includes a computer and a network. The
computer may have been used in the execution of a crime or it may be the target.
Cybercrime is the use of a computer as a weapon for committing crimes such as committing fraud,
identity theft, or breaching privacy.
Cybercrime encloses a wide range of activities, generally be divided into two categories:
1. Crimes that aim at computer networks or devices. These types of crimes involve different
threats (like virus, bugs etc.) and denial-of-service (DoS) attacks.
2. Crimes that use computer networks to commit other criminal activities. These types of
crimes include cyber stalking, financial fraud or identity theft.
Against Individuals
• Email spoofing :
A spoofed email is one in which e-mail header is forged so that mail appears to originate from
one source but actually has been sent from another source
• Spamming :
Spamming means sending multiple copies of unsolicited mails or mass e-mails such as chain
letters.
• Cyber Defamation :
This occurs when defamation takes place with the help of computers and / or the Internet. E.g.
someone publishes defamatory matter about someone on a website or sends e-mails
containing defamatory information.
• Harassment & Cyber stalking :
Cyber Stalking Means following the moves of an individual‟s activity over internet. It can be
done with the help of many protocols available such at e- mail, chat rooms, user net groups.
Against Property:
1. Credit Card Fraud :
Credit card fraud occurs when an unauthorized person gains access to your
information and uses it to make purchases. .Swapping your credit card, such as at a gas
station pump,shopping mall. Calling about fake prizes .
Here criminals make purchases or obtain cash advances using a credit card account
assigned to you. This can occur through one of your existing accounts, via theft of your
physical credit card or your account numbers and PINs.
Credit card fraud is an inclusive term for fraud committed using a payment card, such
as a credit card or debit card. The purpose may be to obtain goods or services or to make
payment to another account, which is controlled by a criminal. The Payment Card Industry
Data Security Standard (PCI DSS) is the data security standard created to help financial
institutions process card payments securely and reduce card fraud.
Credit card fraud can be authorized, where the genuine customer themselves
processes a payment to another account which is controlled by a criminal, or unauthorized,
where the account holder does not provide authorization for the payment to proceed and the
transaction is carried out by a third party.
Against Organisation
1.Unauthorized Accessing of Computer:
Accessing the computer/network without permission from the owner.
it can be of 2 forms:
Changing/deleting data:
Unauthorized person changing of data.
Computer spy:
The criminal reads or copies confidential or proprietary information, but the data is
neither deleted nor changed.
2.Denial Of Service:
When Internet server is flooded with continuous bogus requests so as to denying legitimate
users to use the server or to crash the server.
4.Email Bombing :
Sending large numbers of mails to the individual or company or mail servers thereby
ultimately resulting into crashing.
5.Salami Attack :
When negligible amounts are removed & accumulated in to something larger. These attacks
are used for the commission of financial crimes.
6.Logic Bomb :
It‟s an event dependent programme , as soon as the designated event occurs, it crashes the
computer, release a virus or any other harmful possibilities.
7.Trojan Horse :
an unauthorized program which functions from inside what seems to be an authorized
program, thereby concealing what it is actually doing.
8.Data diddling :
This kind of an attack involves altering raw data just before it is processed by a computer and
then changing it back after the processing is completed.
4.Against Society
Forgery: currency notes, revenue stamps, mark sheets etc can be forged using
computers and high quality scanners and printers.
Cyber Terrorism: Use of computer resources to intimidate or coerce
(pressurize)others.
Web Jacking(steal): Hackers gain access and control over the website of another,
even they change the content of website for fulfilling political objective or for
money.
1. Cyber Extortion –
Cyber extortion occurs when a website, e-mail server or computer system is subjected to or
threatened with repeated denial of service or other attacks by malicious hackers. These hackers
demand huge money in return for assurance to stop the attacks and to offer protection.
2. Cyber Warfare –
Cyber warfare is the use or targeting in a battle space or warfare context of computers, online
control systems and networks. It involves both offensive and defensive operations concerning to
the threat of cyber-attacks, surveillance and obstruct.
3. Internet Fraud –
Internet fraud is a type of fraud or deceit which makes use of the Internet and could include
hiding of information or providing incorrect information for the purpose of deceiving victims
for money or property. Internet fraud is not considered a single, distinctive crime but covers a
range of illegal and illicit actions that are committed in cyberspace.
4. Cyber Stalking –
This is a kind of online harassment wherein the victim is subjected to a barrage of online
messages and emails. In this case, these stalkers know their victims and instead of offline
stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not having
the desired effect, they begin offline stalking along with cyber
stalking to make the victims‟ lives more miserable.
6.
Social engineering is now common tactics used by cybercriminals to gather user‟s sensitive
information.
Social engineering assaults come in wide range of structures and can be performed in any
place where human collaboration is included.
Social engineering is a manipulation technique that exploits human error to gain private
information, access, or valuables.
• Social engineers are clever and use manipulative tactics to trick their victims into disclosing
private or sensitive information.
Malware & Ransomware attacks:
Ransomware is a document encryption programming program that utilizes a special
encryption calculation to scramble records on objective framework.
It is particular malware disseminated to blackmail cash from targets and is one of most
pervasive and known instances of cyber attacks.
Assailant disseminates malware as infection to get to objective PC‟s hard drive. It, at that
point, encodes information and makes PC/information unusable for client until they make
the payoff instalment requested by assailant. It is frequently difficult to decode record‟s
substance without anyone else.
WannaCry and Maze ransomware are ongoing instances of how malware could unleash
devastation, driving numerous enterprises to dish out bitcoins and cash to pay for
recovering their undermined machines and information.
Malware is short for malicious software and refers to any software that is designed to cause harm
to computer systems, networks, or users.
Malware can take many forms. It‟s important for individuals and organizations to be aware of the
different types of malware and take steps to protect their systems, such as using antivirus software,
keeping software and systems up-to-date, and being cautious when opening email attachments or
downloading software from the internet.
Types of Malware
Viruses –
• A Virus is a malicious executable code attached to another executable file. The
virus spreads when an infected file is passed from system to system. Viruses can be
harmless or they can modify or delete data.
• Opening a file can trigger a virus. Once a program virus is active, it will infect other
programs on the computer.
Worms –
• Worms replicate themselves on the system, attaching themselves to different files
and looking for pathways between computers, such as computer network that shares
common file storage areas.
• Worms usually slow down networks. A virus needs a host program to run but
worms can run by themselves.
• After a worm affects a host, it is able to spread very quickly over the network.
Trojan horse –
• A Trojan horse is malware that carries out malicious operations under the
appearance of a desired operation such as playing an online game.
• A Trojan horse varies from a virus because the Trojan binds itself to non-executable
files, such as image files, and audio files.
Adware – It displays unwanted ads and pop-ups on the computer. It comes along with
software downloads and packages.
• It generates revenue for the software distributer by displaying ads.
Spyware – Its purpose is to steal private information from a computer system for a third
party. Spyware collects information and sends it to the hacker.
Logic Bombs –
• A logic bomb is a malicious program that uses a trigger to activate the malicious
code.
• The logic bomb remains non-functioning until that trigger event happens. Once
triggered, a logic bomb implements a malicious code that causes harm to a
computer.
• Cybersecurity specialists recently discovered logic bombs that attack and destroy
the hardware components in a workstation or server including the cooling fans, hard
drives, and power supplies.
• The logic bomb overdrives these devices until they overheat or fail.
Backdoors –
• A backdoor bypasses the usual authentication used to access a system
• . The purpose of the backdoor is to grant cyber criminals future access to the system
even if the organization fixes the original vulnerability used to attack the system.
Keyloggers – Keylogger records everything the user types on his/her computer system to
obtain passwords and other sensitive information and send them to the source of the
keylogging program.
The Information Technology Act, 2000 also has provisions for punishment under the following
sections:
Section 66C-Identify cyber hacking is a punishable offense with imprisonment of 3 years
and fines of Rs. 1 lakh.
Section 66E- Deals with the offense of capturing, publishing, or sending pictures of women
in circumstances that violate privacy. This causes imprisonment of 3 years.
Section 67A- Makes it illegal to publish and transmit sexually explicit content and is
punishable with imprisonment of up to 5 to 7 years.
The Cyber Crime Prevention against Women and Children (CCPWC) scheme is introduced to
develop effective measures to handle cyber crimes against women and children in India.
It allows a cyber crime victim to file a complaint through an online cyber crime reporting platform.
The platform also provides details of law enforcement and regulatory agencies at the local and
national levels.
The CCPWC also conducts awareness programs starting from the school level as a proactive
measure to mitigate cyber crimes.
• USB baiting
In USB baiting cybercriminals install malware onto USB sticks and leave them in strategic places,
hoping that someone will pick the USB up and plug it into a corporate environment, thereby
unwittingly unleashing malicious code into their organization.
Because zero-click attacks are based on no interaction from the victim, it follows that there isn‟t much
you can do to protect yourself. While that is a daunting thought, it‟s important to remember that, in
general, these attacks tend to be targeted at specific victims for espionage purposes or perhaps
monetary gain.
That said, practicing basic cyber hygiene will help to maximize your online safety. Sensible
precautions you can take include:
Keep your operating system, firmware, and apps on all your devices up to date as prompted.
Only download apps from official stores.
Delete any apps you no longer use.
Avoid „jailbreaking‟ or „rooting‟ your phone since doing so removes protection provided by
Apple and Google.
Use your device password protection.
Use strong authentication to access accounts, especially critical networks.
Use strong passwords – i.e., long and unique passwords.
Regularly backup systems. Systems can be restored in cases of ransomware, and having a
current backup of all data speeds the recovery process.
Enable pop-up blockers or prevent pop-ups from appearing by adjusting your browser
settings. Scammers routinely use pop-ups to spread malware.
Using a comprehensive antivirus will also help keep you safe online
66B and 66 C
Section 66B of the IT Act and Section 411 of IPC deal with the offense of dishonestly receiving
stolen computer resources or devices.
Section 66C of the IT Act prescribes punishment for identity theft and states that any person who uses
the identity credentials of a person for fraud or in a dishonest manner is liable for punishment with
imprisonment up to 3 years and a fine up to Rupees 3 lacs.
Cheating by personation using a computer resource is punishable under Section 66D of the IT Act.
Similar provisions for these offenses are given under IPC under Section 419, 463, 465, and 468. IT
Act not only punishes persons but corporate as well if they fail to implement and maintain a
reasonable and diligent mechanism to protect the sensitive data of any person in their possession.
Such a body corporate is liable to pay compensation to the aggrieved person who has suffered a loss
due to the negligence of the corporation.