BU 5th semCS 2
BU 5th semCS 2
Cyber crimes are crimes that involve criminal activities done through cyberspace by
devices connected to the internet.
At times, cyber crimes are also called ‘computer crimes’.
The major objective of committing such crimes is to gather confidential data from
people and use it for monetary, political, or personal motives.
Credit Card Fraud: As the name suggests, this is a fraud that happens by
the use of a credit card. This generally happens if someone gets to know
the card number or the card gets stolen.
Intellectual Property crimes: These include Software piracy: Illegal
copying of programs, distribution of copies of software. Copyright
infringement: Using copyrighted material without proper permission.
Trademarks violations: Using trademarks and associated rights without
permission of the actual holder. Theft of computer source code: Stealing,
destroying or misusing the source code of a computer.
Internet time theft: This happens by the usage of the Internet hours by
an unauthorized person which is actually paid by another person.
3. Cyber crime Against Organization
Forgery : Currency notes, revenue stamps, mark sheets etc. can be forged
using computers and high quality scanners and printers.
Web Jacking : Hackers gain access and control over the website of another,
even they change the content of website for fulfilling political objective or
for money.
Cybercrimes against women and children are particularly concerning because they
often involve harassment, exploitation, or abuse of vulnerable individuals. Here
are some common types of cybercrimes targeted at women and children:
1. Cyberbullying: Both women and children can be victims of cyberbullying,
which includes online harassment, threats, and intimidation. Perpetrators may
use social media, messaging apps, or other digital platforms to target their
victims.
2. Online Harassment: This includes sending unsolicited, offensive, or
threatening messages, images, or videos to women or children. It can be a
form of cyberbullying and may have severe emotional and psychological
effects.
3. Revenge Porn: Perpetrators may share explicit or intimate images or videos of
women without their consent, often as an act of revenge. This is a violation of
privacy and cancause significant harm to victims.
4. Sexting Exploitation: In cases involving children, sexting can lead to
exploitation when someone coerces or blackmails minors into sharing explicit
images or videos. This can have legal and psychological consequences for the
child involved.
5. Online Grooming: Predators may use online platforms to groom children for
sexual exploitation. They build trust with the child and gradually manipulate
them into sharing personal information or engaging in inappropriate
activities.
6. Child Pornography: The distribution, possession, or creation of child
pornography is illegal and exploits children. Criminals often use the internet
to share such material.
7. Online Trafficking: Human traffickers may use the internet to lure and exploit
women and children, including for purposes of forced labor or sexual
exploitation. Online platforms can be used to recruit victims.
8. Cyberstalking: This involves persistent and unwanted online attention, often
leading to fear or emotional distress. Women and children can be targeted by
cyber stalkers who may threaten or harass them through digital means.
9. Financial Fraud: Women can also be victims of financial fraud, including
online scams targeting personal finances or online dating scams where
perpetrators exploit emotional connections for financial gain.
10. Privacy Violations: Privacy breaches can occur when personal information
or photographs are shared without consent, affecting both women and
children. This canlead to identity theft or other forms of cybercrime.
To combat cybercrimes against women and children, various organizations and
governments have implemented laws and initiatives aimed at raising awareness,
providing support to victims, and prosecuting offenders.
Financial frauds
Financial frauds can have devastating consequences for individuals and the
economy as a whole. While digital payments have made life convenient and easy
In India, they have also made us prone to all kinds of financial frauds.
Ponzi Schemes: A Mirage of False Promises
• One infamous example is the Saradha chit fund scam, where millions of
investors lost their hard-earned money. The group, consisting of over 200
private companies, falsely portrayed its collective investment schemes as chit
funds.
• With an estimated collection of ₹200 to 300 billion (US$4–6 billion), the scheme
managed to attract deposits from more than 1.7 million individuals before its
eventualdownfall.
Identity fraud
− Bounced checks.
Fraudulent charities
• Scammers use philanthropy as fraud, too. Charity fraud entails creating a fake
charity andcollecting “donations” that disappear along with the thief
• How does charity fraud happen?
• There are several ways that criminals can steal your credit card information. They
could steal your physical card, trick you into entering information on a phishing
website or email, buy your details on the Dark Web, or use any number of other
credit card scams.
• Hackers can also create a clone of your physical card using just your credit card
numbers.
• Stock market manipulation includes activities like price rigging, spreading false
information, insider trading, and pump-and-dump schemes. Fraudsters
manipulate stock prices, deceiving investors and causing significant financial
losses.
• The Satyam Computer Services scandal is a prime example, where the company’s
promoters manipulated financial statements to inflate stock prices.
Bank Frauds
3. Be cautious online
Social engineers build the trust with the victim/person to gain the
unauthorizedinformation/access
Their goal is to fool someone into providing valuable information.
Example: The attacker (social engineer) calling a user & pretending to be a tech
support person & ask questions about the confidential files, passwords, etc.
Loss of funds
Loss of trust
Strict policies about service desk staff, not to ask for personal/sensitive information
Malware Attacks
Malware attacks are any type of malicious software designed to cause harm or
damage to a computer, server, client or computer network and/or infrastructure
without end-user knowledge
Cyber attackers create, use and sell malware for many different reasons, but it is
most frequently used to steal personal, financial or business information.
Types of Malware
1. Adware: Display ads (sometimes malicious ads) to users as they work on their
computers or browse the web.
2. Viruses: A virus infects a computer and performs a variety of payloads. It may
corrupt files, destroy operating systems, delete or move files, or deliver a payload at
a specific date.
3. Worms: A worm is a self-replicating virus, but instead of affecting local files, a worm
spreadsto other systems and exhausts resources.
4. Trojans: A Trojan is named after the Greek war strategy of using a Trojan horse to
enter the city of Troy. The malware masquerades as a harmless program, but it runs
in the background stealing data, allowing remote control of the system, or waiting
for a command from an attacker to deliver a payload.
5. Bots: Infected computers can become a part of a botnet used to launch a distributed
denial-of-service by sending extensive traffic to a specific host.
6. Keyloggers: Capture keystrokes as users type in URLs, credentials, and personal
information and send it to an attacker.
7. RAT: “Remote access tools” enable attackers to access and control the targeted
device remotely.
8. Downloaders: Download other malware to install locally. The type of malware
depends onthe attacker’s motives.
9. POS: Compromise a point-of-sale (PoS) device to steal credit card numbers, debit
card andPINs, transaction history, and contact information.
How do I know I’ve been infected with malware?
The most common signs that your computer has been compromised by malware are:
Browser redirects, or when your web browser takes you to sites you did not intend to
visit
Keep your operating system and applications updated. Cybercriminals look for
vulnerabilities in old or outdated software, so make sure you install updates as
soon as they become available.
Never click on a link in a popup. Simply close the message by clicking on “X” in
the upper corner and navigate away from the site that generated it.
Limit the number of apps on your devices. Only install apps you think you need
and will use regularly. And if you no longer use an app, uninstall it.
2. Be careful online
Avoid clicking on unknown links. Whether it comes via email, a social
networking site or a text message, if a link seems unfamiliar, keep away from it.
Be selective about which sites you visit. Do your best to only use known and trusted
sites,
If you are concerned that your device may be infected, run a scan using the
security software you have installed on your device.
Check your bank accounts and credit reports regularly.
Ransomware Attack
1. Locker ransomware
This ransomware encrypts the local files and documents on the computers.
Once the files are encrypted, finding the decryption key is impossible
unless the ransomware variant is old and the keys are already available
on the internet.
3. Scareware
It is a fake software that claims to have detected a virus or other issue on your
computer and directs you to pay to resolve the problem.
Some scareware locks the computer, while others flood the screen with pop-up
alertswithout damaging files.
How to Prevent Ransomware Attacks?
One must always have backups of their data. Cloud storage for backup
is easy, but a physical backup in a hard drive is always recommended.
Keeping the system updated with the latest security patches is always
a good idea.
Apart from system updates, one must always have reputed antivirus
software installed.
The term "zero-day" refers to the fact that the vendor or developer has only just
learned of the flaw – which means they have “zero days” to fix it.
A zero-day attack takes place when hackers exploit the flaw before developers
have a chance to address it.
Zero-day attackers can steal data, corrupt files, take control of devices, install
malware or spyware, and more.
Typical targets for a zero-day exploit include:
1. Government departments.
2. Large enterprises.
1. Keep all software and operating systems up to date. This is because the vendors
include security patches to cover newly identified vulnerabilities in new releases.
Keeping up to date ensures you are more secure.
2. Use only essential applications. The more software you have, the more potential
vulnerabilities you have. You can reduce the risk to your network by using only
the applications you need.
3. Use a firewall. A firewall plays an essential role in protecting your system against
zero-day threats. You can ensure maximum protection by configuring it to allow
only necessary transactions.
Zero click
zero-click attacks require no action from the victim – meaning that even the most
advancedusers can fall prey to serious cyber hacks and spyware tools.
also called interaction-less or fully remote attacks.
1. Apple zero-click, forced entry, 2021: In 2021, a Bahraini human rights activist
had their iPhone hacked by powerful spyware sold to nation-states.
2. WhatsApp breach, 2019:This infamous breach was triggered by a missed call,
which exploited a flaw in the source code framework of WhatsApp.
Keep your operating system, firmware, and apps on all your devices up to date as
prompted.
2. Protect identity
Offenders can also harass others by making offensive calls to them and
annoying them.
Many a time anonymous calls are used by the criminals as an effective tool in
making extortion or threatening call. Females are often harassed by stalkers by
this means ofcommunication.
Landlines having no Caller Ids pose a problem for the quick analysis of an
incoming call, which is an undue advantage to the cyber stalkers, cyber
bullies, etc.
Calls can be made by spoofing the mobile number using various sites. Such
calls are intended to hide the actual location of the caller and any fake or
annoying calls are made. Such calls are often used for terrorist activity and
for trafficking illegal goodsor for any ransom or blackmailing purposes.
Cyber Criminals operating from overseas and indulged in forgery are hard
to trace without the co-operation of international agencies.
Reporting of cyber crimes
Reporting cybercrimes is essential to combat online threats and hold perpetrators
accountable. Here are the steps you can take to report cybercrimes:
1. Contact Your Local Law Enforcement: If you believe you are a victim of a
cybercrime, you should report it to your local police department or law
enforcement agency. They can investigate the incident and take appropriate action.
2. Report to a National Cybersecurity Agency: In many countries, there are
dedicated agencies responsible for handling cybercrimes. In the United States, for
example, you can report cybercrimes to the Federal Bureau of Investigation (FBI)
through their Internet Crime Complaint Center (IC3). Check if your country has a
similar agency and report the incident to them.
3. Report to the Appropriate Online Platforms: If the cybercrime occurred on a
specific online platform, such as a social media site, email service, or e-commerce
website, report the incident to that platform. They may have mechanisms in place
to address various online abuses and can take action against the responsible
parties.
As the number of internet users is on the rise, the need for cyber laws and their
applicationhas also gathered great momentum.
Cyber law is a framework created to give legal recognition to all risks arising out of
the usage of computers and computer networks.
Cyber law encompasses laws relating to:
1. Cyber crimes
3. Intellectual property
The IT Act has undergone amendments over the years to address emerging cyber
threats and strengthen cybercrime provisions.
For example, the Information Technology (Amendment) Act, 2008 introduced
additional provisions to tackle cyber terrorism, data privacy, and intermediary
liability.
It is important to consult with legal professionals or refer to official sources for
comprehensive and up-to-date information on the legal aspects of cybercrime in
India.
Cyber crime and offences