Unit 1
Unit 1
INTRODUCTION TO CYBERCRIME
India as we all know is the second most populous country in the world with population around
138 cores and out of which millions and millions of internet subscribers. According to telecom
regulatory Authority of India in March 2021 there are about 825.30 million active subscribers in
India. With their average data consumption over 20 GB a month. This is all possible because of
accessibility of internet and cheaper rates in India.
It is surprising to know that the first ever cybercrime was recorded in the year 1820. It is
believed and argued that cyber or digital crime in India started since 2005.
1.What is cybercrime?
Cybercrimes or digitalized crimes can be considered as the crimes that are committed using
electronic devices namely smart phones or interconnected computers. There can be variety of
motives to commit a cybercrime such as sexual exploitation prime fraud or even vengeance.
With the time the number of cybercrime cases in India are as well increasing with an
exponential number. This number is proportionate to the number of subscribers that are
increasing day by day. The Ministry of home affairs reported around 51,000 cybercrime cases in
the year 2020.
Cybercrime is the use of a computer as a weapon for committing crimes such as committing
fraud, identity theft, or breaching privacy. Cybercrime, especially through the Internet, has
grown in importance as the computer has become central to every field like commerce,
entertainment, and government. Cybercrime may endanger a person or a nation’s security and
financial health. Cybercrime encloses a wide range of activities, but these can generally be
divided into two categories: Crimes that aim at computer networks or devices. These types of
crimes involve different threats (like virus, bugs etc.) and denial-of-service (DoS) attacks.
Crimes that use computer networks to commit other criminal activities. These types of crimes
include cyber stalking, financial fraud or identity theft.
Cyber terrorism is the use of the computer and internet to perform violent acts that result in loss of life.
This may include different type of activities either by software or hardware for threatening life of
citizens.
In general, Cyber terrorism can be defined as an act of terrorism committed through the use of
cyberspace or computer resources.
∙ Cyber Extortion –
Cyber extortion occurs when a website, e-mail server or computer system is subjected to or threatened
with repeated denial of service or other attacks by malicious hackers. These hackers demand huge
money in return for assurance to stop the attacks and to offer protection.
* Cyber Warfare –
Cyber warfare is the use or targeting in a battle space or warfare context of computers, online control
systems and networks. It involves both offensive and defensive operations concerning to the threat of
cyber attacks, espionage and sabotage.
* Internet Fraud –
Internet fraud is a type of fraud or deceit which makes use of the Internet and could include hiding of
information or providing incorrect information for the purpose of deceiving victims for money or
property. Internet fraud is not considered a single, distinctive crime but covers a range of illegal and illicit
actions that are committed in cyberspace.
* Cyber Stalking –
This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and
emails. In this case, these stalkers know their victims and instead of offline stalking, they use the Internet
to stalk. However, if they notice that cyber stalking is not having the desired effect, they begin offline
stalking along with cyber stalking to make the victims’ lives more miserable.
The Cybercrime usually happen with illiterate people around the world who are unaware about their
cyber rights implemented by the government of that particular country.
* Anonymity-
Those who Commit cyber crime are anonymous for us so we cannot do anything to that person.
* Less numbers of case registered-
Every country in the world faces the challenge of cyber crime and the rate of cyber crime is
increasing day by day because the people who even don’t register a case of cyber crime and this
is major challenge for us as well as for authorities as well.
Committing a cyber crime is not a cup of tea for every individual. The person who commits
cyber crime is a very technical person so he knows how to commit the crime and not get caught
by the authorities.
* No harsh punishment-
In Cyber crime there is no harsh punishment in every cases. But there is harsh punishment in
some cases like when somebody commits cyber terrorism in that case there is harsh
punishment for that individual. But in other cases there is no harsh punishment so this factor
also gives encouragement to that person who commits cyber crime.
Below are some points by means of which we can prevent cyber crime:
Maintain different password and username combinations for each account and resist the
temptation to write them down. Weak passwords can be easily cracked using certain attacking
methods like Brute force attack, Rainbow table attack etc, So make them complex. That means
combination of letters, numbers and special characters.
Always use trustworthy and highly advanced antivirus software in mobile and personal
computers. This leads to the prevention of different virus attack on devices.
Always keep your social media accounts data privacy only to your friends. Also make sure only
to make friends who are known to you.
Whenever you get the updates of the system software update it at the same time because
sometimes the previous version can be easily attacked.
* Use secure network –
Public Wi-Fi are vulnerable. Avoid conducting financial or corporate transactions on these
networks.
A computer get infected by malware attacks and other forms of cybercrime is via email
attachments in spam emails. Never open an attachment from a sender you do not know.
Software should be updated – Operating system should be updated regularly when it comes to
internet security. This can become a potential threat when cybercriminals exploit flaws in the
system.
1.2.TYPES:
Types of cybercrimes:
There are numerous types of cybercrimes, and are some of the most common
forms of Cybercrimes:
* Phishing
Fishing is a kind of cybercrime in which the victim or the target is approved by way of sending
spam emails, telephonic calls, SMSes by someone who impersonated himself to be a legitimate
person or organization in order to gain your personal information. They usually send such
message that requires to fill in your details like, bank information or social medial passwords in
order to access the information. This is done to gain unlawful access of your personal accounts
and to commit frauds and withdraw money.
* Spamming
The act of spamming is a cybercrime which involves sending of unwonted and requested bulk
message via email ID or two in individual. There are various types of spamming such as engine
spamming, blogs spamming, ad spamming, social spamming etc. It disturbs the administrator of
a website.
* Hacking
It is an act of first identifying a backdoor into others' computer in order to gain unlawful and
unauthorized access to the data inside such computer. This back door is exploited to gain access
to the computer.
* Identity Theft
This is an act of stealing personal information of a targeted individual and later using such
information to impersonate him/her. With the help of the acquired information the offender
pretends to be the targeted person in order to commit fraud, or violate laws being the victim.
* Malware
This can be considered as a wide term used for various types of viruses or program that are
designed to access the information of the victim without his knowledge and consent.
* Trojans
1.3.The Internet spawns crime:
Internet crime is any crime or illegal online activity committed on the Internet, through the
Internet or using the Internet. The widespread Internet crime phenomenon encompasses
multiple global levels of legislation and oversight. In the demanding and continuously changing
IT field, security experts are committed to combating Internet crime through preventative
technologies, such as intrusion detection networks and packet sniffers.
Advertisements:
Internet crime is a strong branch of cybercrime. Identity theft, Internet scams and cyberstalking
are the primary types of Internet crime. Because Internet crimes usually engage people from
various geographic areas, finding and penalizing guilty participants is complicated.
Preventing Real Online Threats to Economic Creativity and Theft of Intellectual Property Act of
2011
As the U.S. works to combat Internet crime, other countries are experiencing increased
cybercriminal activity. In 2001, Websense (an organization focused on network abuse research)
reported the alarming spread of Internet crime in Canada. This global shift is under review by
the Canadian government.
2.Financial extortion
5.Password trafficking
9.Counterfeit trademarks
14.Email phishing
16.Virus spreading
To prevent becoming an Internet crime, online vigilance and common sense are critical. Under
no circumstances should a user share personal information (like full name, address, birth date
and Social Security number) to unknown recipients. Moreover, while online, a user should
remain suspicious about exaggerated or unverifiable claims.
1. Worms :
Worms are similar to a virus but it does not modify the program. It replicates itself more and
more to cause slow down the computer system. Worms can be controlled by remote. The main
objective of worms is to eat the system resources. The WannaCry ransomware worm in 2000
exploits the Windows Server Message Block (SMBv1) which is a resource-sharing protocol.
2. Virus:
A virus is a malicious executable code attached to another executable file that can be harmless
or can modify or delete data. When the computer program runs attached with a virus it
performs some action such as deleting a file from the computer system. Viruses can’t be
controlled by remote. The ILOVEYOU virus spreads through email attachments.
* Difference between Worms and Virus :
1.5.Computer roles in crime:
Computers serve a major role in crime which is usually referred to as “Cybercrime”. This
cybercrime is performed by a knowledgeable computer user who is usually referred to
as a “hacker”,
who illegally browses or steals a company’s information or a piece of individual private
information and uses this information for malevolent uses. In some cases, this person or
group of individuals may become evil and they destroy and corrupt data files.
This cyber or computer-based crime is also known as hi-tech crime or electronic crime.
As the computer is the main source of communication across the world, thus this can be
used as a source of stealing information and this information can be used for their own
benefits.
The role of a computer in the crime may vary depending upon the activity that a person
does, for instance, a person may steal the details and misuse them on one hand, and on
the other hand, a terrorist may use the information to do violent activities and some
persons may steal financial information for trading purposes and so on, but these all
activities can be done by the means of a computer only.
There are several examples of crime that use computers they are as follows:
∙ Espionage:
This is a process of spying on a person or business.
∙ Malware creation:
The process of creating malware like viruses etc.
∙ Cybersquatting:
It is a process of gaining personal information and trying to resell them.
∙ Harvesting:
Here, hackers usually steal a person’s private information from an account
and use it for illegal activities.
∙ Wiretapping:
Here, the hacker connects a device to a phone line and tries to listen to the
conversations.
∙ Disk Forensics:
It deals with extracting raw data from the primary or secondary storage of the
device by searching active, modified, or deleted files.
∙ Network Forensics:
It is a sub-branch of Computer Forensics that involves monitoring and
analyzing the computer network traffic.
∙ Database Forensics:
It deals with the study and examination of databases and their related
metadata.
∙ Malware Forensics:
It deals with the identification of suspicious code and studying viruses, worms,
etc.
∙ Email Forensics:
It deals with emails and their recovery and analysis, including deleted emails,
calendars, and contacts.
∙ Memory Forensics:
Deals with collecting data from system memory (system registers, cache, RAM)
in raw form and then analyzing it for further investigation.
∙ Mobile Phone Forensics:
It mainly deals with the examination and analysis of phones and smart phones
and helps to retrieve contacts, call logs, incoming, and outgoing SMS, etc., and
other data present in it.
AAASFSSH
sAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAASWHY6 this
CHARACTERISTICS: uses. In so cases, this
\CC of individuals may become evil and they destroy and corrupt data files. This
1.7.INTRODUCTION TO INCIDENT:
INCIDENT RESPONSE METHODOLOY:
5.Recovery - Testing, monitoring, and validating systems while putting them back
into production in order to verify that they are not re-infected or compromised
are the main tasks associated with this step of incident response.
∙ This phase also includes decision making in terms of the time and date to
restore operations, testing and verifying the compromised systems,
monitoring for abnormal behaviors, and using tools for testing, monitoring,
and validating system behavior.
6.Lessons Learned: One of the most important and often overlooked stages.
During this stage, the incident response team and partners meet to determine
how to improve future efforts. This can involve evaluating current policies and
procedure.
1.Preparation;
3.Containment,
5. Post-Event Activity