0% found this document useful (0 votes)
19 views13 pages

Cyber Crime and Types

Uploaded by

Jainam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views13 pages

Cyber Crime and Types

Uploaded by

Jainam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Cyber Security 3IT81

DEFINITION OF CYBERCRIME

Cybercrimes can be defined as: “Offences that are committed against


individuals or groups of individuals with a criminal motive to
intentionally harm the reputation of the victim or mental harm, or
loss, to the victim directly or indirectly, using modern
telecommunication networks such as Internet (networks including
chat rooms and emails) and mobile phones (Bluetooth/SMS/MMS)”.

2
COMPARE TRADITIONAL CRIME AND CYBER CRIME

S. Traditional Crime Cyber Crime


No
1. Required weapon like knife, gun, Required Internet/Mobile/Computer as a source or
Iron rod and so on for execution target for execution of crime.
of crime.
2. The victim chance to know the The victim is no chance to know the cyber criminals.
criminals
3. Here police, Forensic Analyst and Here Police, Internet Service Provider(ISP),
Court are involved. Cyberforensic Analyst and Court are involved.
4. Maximum physical injury here Here physical injury not possible. Instead Repudiation
possible. spoiling, Internet Black mailing and so on.

5. Victims come to know about their Victims come to know about their
losses immediately losses long after the actual commission of crimes
after the actual commission of
crimes

3
We can categorize Cyber crimes in two ways
• The Computer as a Target :- using a computer to attack other computers. e.g. Hacking, Virus/Worm
attacks, DOS attack etc.
• The Computer as a Weapon :- using a computer to commit real world crimes. e.g. Cyber Terrorism,
IPR violations, Credit card frauds, EFT frauds, Pornography etc.
• Types of Cybercrime
• Cybercrime against individual
• Cybercrime against property
• Cybercrime against organization
• Cybercrime against society
• Crimes originating from Usenet newsgroup
Cybercrime against individual
• Email Spoofing
A spoofed email is one in which e-mail header is forged so that mail appears to
originate from one source but actually has been sent from another source.
Email spoofing is the creation of email messages with a forged sender address
• Spamming
Spamming means sending multiple copies of unsolicited mails or mass e-mails such as
chain letters.
In context of “search engine spamming”, spamming is alternation or creation of a
document with the intent to deceive an electronic catalog or filing system
◗ Cyber Defamation
This occurs when defamation takes place with the help of computers and
/ or the Internet.
E.g. someonepublishes defamatory matter about someone on a website
or sends emails containing defamatory information.
◗ Harassment & Cyber Stalking
Cyber Stalking Means following the moves of an individual's activity over
internet.
It can be done with the help of many protocols available such at e- mail,
chat rooms, user net groups.
◗ Phishing
A deception designed link to steal valuable personal data, such as credit
card numbers, passwords, account data, or other information.
Phishing is the fraudulent attempt to obtain sensitive information (such as
usernames, passwords, and credit card details) by masking as a
trustworthy entity.
For example : please reset your facebook password www.facebook.com
Cybercrime against property

◗ Intellectual Property crimes


These include Software piracy, illegal copying of
programs, distribution of copies of software, Copyright
violation, Trademarks violations, Theft of computer
source code.
◗ Credit Card Fraud
An u n a u t h o r i z e d taking of v i c t i m ’ s credit
card information for the purpose of purchases from
credit card or transferring funds from it.
Credit card fraud is a form of identity theft
◗ Internet Time Theft
The usage of the Internet hours by an unauthorized
Person which is actually paid by another person.
Cybercrime against organization

• Unauthorized accessing of computer


• Password sniffing
• Denial-of-service attacks
• Virus attack
• E-Mail bombing
• Logic bomb
• Data diddiling
• Software piracy
Cybercrime against organization

◗ Unauthorized Accessing of Computer


Accessing the computer/network without permission from
the owner.
it can be of 2 forms:
a. Changing/deleting data: Unauthorized changing of data.
b. Computer observe: The criminal reads or copies confidential or
proprietary information, but the data is neither deleted nor changed.

◗ Denial of Service (DoS) or DDos Attack


When Internet server is flooded with continuous bogus
requests so as to denying legitimate users to use the server or to
crash the server.
Cybercrime against organization
◗ Computer Virus / Contamination
A computer virus is a computer program that can infect other computer
programs by modifying them in such a way as to include a (possibly
evolved) copy of it.

◗ Email Bombing
Sending large numbers of mails to the individual or company or mail
servers thereby ultimately resulting into crashing.

◗ Salami Attack
Cybercrime against organization
◗ Logic Bomb
It is an event dependent program, as soon as the designated event
occurs, it crashes the computer, release a virus or any other harmful
possibilities.

◗ Trojan Horse
An unauthorized program which functions from inside what seems to be an
authorized program, thereby concealing what it is actually doing.

◗ Data diddling
This kind of an attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed
Cybercrimes against society

◗ Forgery
Currency notes, revenue stamps, mark sheets etc can be forged
using computers and high quality scanners and printers.

◗ Cyber Terrorism
Using computer resources to threaten or force others.

◗ Web Jacking
Hackers gain access and control over the website of another, even they change the content of website for fulfilling political objective or for money
Cyber Law
• Cyber Law is a framework created to give legal recognition to all risks arising out of
the usage of computers, computer network or related technology.
• “Cyber Law” is a term used to describe the legal issues related to use of Computer
and Communications Technology.
• The Indian Parliament passed the Information Technology Bill on 17th May 2000,
known as the
• ITA 2000, aimed at providing legal infrastructure for E-Commerce in India.

You might also like