Cyber Security Unit 01.
Cyber Security Unit 01.
Cyber Security Unit 01.
UNIT 01
Q.1 what purpose section 66 of ITA 2000 used discuss in details?
-Ans: Section 66. Computer related offences
66. Computer related offences.-- If any person, dishonestly or fraudulently, does any act
referred to in section 43, he shall be punishable with imprisonment for a term which may
extend to three years or with fine which may extend to five lakh rupees or with both.
Explanation.--For the purposes of this section,--
(a) the word "dishonestly" shall have the meaning assigned to it in section 24 of the Indian
Penal Code (45 of 1860);
(b) the word "fraudulently" shall have the meaning assigned to it in section 25 of the Indian
Penal Code (45 of 1860).]
Section 66A. Punishment for sending offensive messages through communication service,
etc
India Code
Section 66A. Punishment for sending offensive messages through communication service,
etc.Previous Next
1 [66A. Punishment for sending offensive messages through communication service, etc.--
Any person who sends, by means of a computer resource or a communication device,
(a) any information that is grossly offensive or has menacing character; or
(b) any information which he knows to be false, but for the purpose of causing annoyance,
inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred or ill
will, persistently by making use of such computer resource or a communication device;
(c) any electronic mail or electronic mail message for the purpose of causing annoyance or
inconvenience or to deceive or to mislead the addressee or recipient about the origin of such
messages,
shall be punishable with imprisonment for a term which may extend to three years and with
fine.
Explanation.--For the purposes of this section, terms "electronic mail" and "electronic mail
message" means a message or information created
transmitted or received on a computer, computer system, computer resource or
communication device including attachments in text, image, audio, video and any other
electronic record, which may be transmitted with the message.
UNIT 01
Section 66B. Punishment for dishonestly receiving stolen computer resource or
communication device.
Whoever dishonestly receive or retains any stolen computer resource or communication
device knowing or having reason to believe the same to be stolen computer resource or
communication device, shall be punished with imprisonment of either description for a term
which may extend to three years or with fine which may extend to rupees one lakh or with
both.
Section 66C. Punishment for identity theft.
Whoever, fraudulently or dishonestly make use of the electronic signature, password or any
other unique identification feature of any other person, shall be punished with imprisonment
of either description for a term which may extend to three years and shall also be liable to
fine which may extend to rupees one lakh.
Section 66D. Punishment for cheating by personation by using computer resource.
Whoever, by means of any communication device or computer resource cheats by
personation, shall be punished with imprisonment of either description for a term which may
extend to three years and shall also be liable to fine which may extend to one lakh rupees.
Section 66E. Punishment for violation of privacy.
Whoever, intentionally or knowingly captures, publishes or transmits the image of a private
area of any person without his or her consent, under circumstances violating the privacy of
that person, shall be punished with imprisonment which may extend to three years or with
fine not exceeding two lakh rupees, or with both.
Explanation.--For the purposes of this section--
(a) transmit means to electronically send a visual image with the intent that it be viewed by
a person or persons
(b) capture, with respect to an image, means to videotape, photograph, film or record by any
means;
(c) private area means the naked or undergarment clad genitals, *[pubic area], buttocks or
female breast:
(d) publishes means reproduction in the printed or electronic form and making it available
for public;
(e) under circumstances violating privacy means circumstances in which a person can have a
reasonable expectation that--
(i) he or she could disrobe in privacy, without being concerned that an image of his private
area was being captured; or
UNIT 01
(ii) any part of his or her private area would not be visible to the public, regardless of whether
that person is in a public or private place.
Criminal activity targeting computers using viruses and other types of malware.
Criminal activity using computers to commit other crimes.
Cybercriminals that target computers may infect them with malware to damage devices or
stop them working. They may also use malware to delete or steal data. Or cybercriminals
may stop users from using a website or network or prevent a business providing a software
service to its customers, which is called a Denial-of-Service (DoS) attack.
UNIT 01
Cybercrime that uses computers to commit other crimes may involve using computers or
networks to spread malware, illegal information or illegal images.
Cybercriminals are often doing both at once. They may target computers with viruses first
and then use them to spread malware to other machines or throughout a network. Some
jurisdictions recognize a third category of cybercrime which is where a computer is used as
an accessory to crime. An example of this is using a computer to store stolen data.
Spam calls and spam texts:Have you ever received a robocall? That’s call spam. A text
message from an unknown sender urging you to click an unknown link? That’s referred to as
text message spam or “smishing,” a combination of SMS and phishing.
If you’re receiving spam calls and texts on your Android or iPhone, most major carriers give
you an option to report spam. Blocking numbers is another way to combat mobile spam. In
the US, you can add your phone number to the National Do Not Call Registry to try to cut
down on the amount of unwanted sales calls you receive, but you should still be alert to
scammers who ignore the list.
c)Internet time Theft
Internet Time Theft: The person who gets access to someone else's ISP user ID and password,
either by hacking or by gaining access to it by illegal means, uses it to access the Internet
without the other person's knowledge. You can identify time theft if your Internet time has
to be recharged often, despite infrequent usage. This offence is usually covered under IPC
and the Indian Telegraph Act.
d )Denial of service
A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network,
making it inaccessible to its intended users. DoS attacks accomplish this by flooding the target
with traffic, or sending it information that triggers a crash. In both instances, the DoS attack
deprives legitimate users (i.e. employees, members, or account holders) of the service or
resource they expected.
Victims of DoS attacks often target web servers of high-profile organizations such as banking,
commerce, and media companies, or government and trade organizations. Though DoS
attacks do not typically result in the theft or loss of significant information or other assets,
they can cost the victim a great deal of time and money to handle.
There are two general methods of DoS attacks: flooding services or crashing services. Flood
attacks occur when the system receives too much traffic for the server to buffer, causing
them to slow down and eventually stop. Popular flood attacks include:
UNIT 01
Buffer overflow attacks – the most common DoS attack. The concept is to send more traffic
to a network address than the programmers have built the system to handle. It includes the
attacks listed below, in addition to others that are designed to exploit bugs specific to certain
applications or networks
ICMP flood – leverages misconfigured network devices by sending spoofed packets that ping
every computer on the targeted network, instead of just one specific machine. The network
is then triggered to amplify the traffic. This attack is also known as the smurf attack or ping
of death.
SYN flood – sends a request to connect to a server, but never completes the handshake.
Continues until all open ports are saturated with requests and none are available for
legitimate users to connect to.
Other DoS attacks simply exploit vulnerabilities that cause the target system or service to
crash. In these attacks, input is sent that takes advantage of bugs in the target that
subsequently crash or severely destabilize the system, so that it can’t be accessed or used.
E )Computer contamination
NRS 205.4737 "Computer contaminant" defined.
1. "Computer contaminant" means any data, information, image, program, signal or sound
that is designed or has the capability to:
(a) Contaminate, corrupt, consume, damage, destroy, disrupt, modify, record or transmit; or
(b) Cause to be contaminated, corrupted, consumed, damaged, destroyed, disrupted,
modified, recorded or transmitted,
any other data, information, image, program, signal or sound contained in a computer,
system or network without the knowledge or consent of the person who owns the other
data, information, image, program, signal or sound or the computer, system or network
g)Salami attack
A salami attack is a method of cybercrime that attackers or a hacker typically used to commit
financial crimes. Cybercriminals steal money or resources from financial accounts on a
system one at a time. This attack occurs when several minor attacks combine to create a
sturdy attack. because of this sort of cybercrime, these attacks frequently go undetected.
Salami attacks are used for the commission of economic crimes Those who are found guilty
of such an attack face punishment under Section 66 of the IT Act.
10. Passwords.
Having the same password setup for everything can be dangerous. Once a hacker figures out
your password, they now have access to everything in your system and any application you
use.Having different passwords setup for every application you use is a real benefit to your
security, and changing them often will maintain a high level of protection against external
and internal threats.
Q.6 Explain the term with example: 1) Logic Bomb 2) data diddling 3) forgery 4) cyber
terrorism 5) web jacking 6) cyber defamation 7) Trojan Horse
ANS- a) Logic bomb: A logic bomb is a set of instructions in a program carrying a malicious
payload that can attack an operating system, program, or network. It only goes off after
certain conditions are met. A simple example of these conditions is a specific date or time. A
more complex example is when an organization fires an employee and logs their dismissal in
their system.A logic bomb usually carries a computer virus or a computer worm. Even though
some people use the two terms interchangeably, they’re not the types of malware.
Examples of logic bombs
Although logic bombs are a common attack vector for disgruntled employees, state-
sponsored agents can also use them. One of the most frequently told examples of a logic
bomb incident occurred in 1982 and was known as the Trans-Siberian Pipeline incident. The
story of this incident had the makings of a spy movie, from the KGB and the CIA to secret
documents and international intrigue. Interestingly, it may have sounded like a spy novel
because some of the story could have been a hoax.
UNIT 01
b)Data Diddling: A data diddling attack is based on how the user input or transactions are
validated or processed. In a data diddling attack, the user modifies the transaction data on
client side and forwards it to the server. If no proper validation is done on the server-side,
the modified data by the attacker is processed and results in a loss for the target. For
example, while purchasing items on a retail website like Amazon, if the data in a transaction
like quantity of items, price of each item, etc., are not validated on server-side once
submitted by the buyer, a malicious buyer can change this data for his/her own personal gain