Lesson- 1_Cyber Security
Lesson- 1_Cyber Security
3x14= 42
Unit 1 Chapter 1
Unit 2 chapter 2
Unit 3 chapter 4
Unit 4 chapter 5
Unit 5 chapter 7
Unit-1
Lesson-1
Introduction to Cybercrime
(Chapter-1)
Chapter 1
Introduction to Cybercrime
Introduction
Internet has undeniably opened a new way of exploitation known as cybercrime involving the use of
computers, the Internet, cyberspace and the worldwide web (WWW).
Figure 1, based on a 2008 survey in Australia, shows the cybercrime trend.
While the worldwide scenario on cybercrime looks bleak, the situation in India is not any better.
➢ Indian corporate and government sites have been attacked or defaced more than 780 times between
February 2000 and December 2002.
➢ A total of 3,286 Indian websites were hacked in 5 months – between January and June 2009.
1. Techno-crime: A premeditated act against a system or systems, with the intent to copy, steal,
prevent access, corrupt or otherwise deface or damage parts of or the complete computer
system.
2. Techno-vandalism: These acts of “brainless” defacement of websites and/or other activities,
such as copying files and publicizing their contents publicly, are usually opportunistic in nature.
Cyberterrorism is defined as “any person, group or organization who, with terrorist intent, utilizes
accesses or aids in accessing a computer or computer network or electronic system or electronic
device by any available means, and thereby knowingly engages in or attempts to engage in a
terrorist act commits the offence of cyberterrorism.”
Indian Information Technology Act (ITA 2008) provides a new focus on “Information Security in
India.”
➢ “Cybersecurity” means protecting information, equipment, devices, computer, computer
resource, communication device and information stored therein from unauthorized access.
➢ Where financial losses to the organization due to insider crimes are concerned, difficulty is
faced in estimating the losses because the financial impacts may not be detected by the
victimized organization and no direct costs may be associated with the data theft.
➢ For anyone trying to compile data on business impact of cybercrime, there are number of
challenges.
o Organizations do not explicitly incorporate the cost of the vast majority of computer
security incidents into their accounting.
o There is always a difficulty in attaching a quantifiable monetary value to the corporate
data and yet corporate data get stolen/lost.
o Most organizations abstain from revealing facts and figures about “security incidents”
including cybercrime.
o Organizations perception about “insider attacks” seems to be different than that made
out by security solution vendor.
o Awareness about “data privacy” too tends to be low in most organizations.
Classifications of Cybercrimes
Data Diddling
➢ A data diddling attack involves altering raw data just before it is processed by a computer and
then changing it back after the processing is completed.
➢ Electricity Boards in India have been victims to data diddling programs inserted when private
parties computerize their systems.
Web Jacking
• Web jacking occurs when someone forcefully takes control of a website (by cracking the
password and later changing it).
➢ Hackers write or use ready-made computer programs to attack the target computer.
➢ They possess the desire to destruct and they get enjoyment out of such destruction.
➢ Some hackers hack for personal monetary gains, such as stealing credit card information,
transferring money from various bank accounts to their own account followed by withdrawal
of money.
Online Frauds
Types of crimes under the category of hacking
✓ Spoofing website and E-Mail security alerts
✓ Hoax mails about virus threats
✓ lottery frauds
✓ Spoofing.
Spoofing websites and E-Mail security threats
o Fraudsters create authentic looking websites that are actually nothing but a spoof.
o The purpose of these websites is to make the user enter personal information which is then
used to access business and bank accounts
o This kind of online fraud is common in banking and financial sector.
o It is strongly recommended not to input any sensitive information that might help criminals to
gain access to sensitive information, such as bank account details, even if the page appears
legitimate.
Cyber Security by Nina Godbole/Sunit Belapure
Copyright © 2011 Wiley India Pvt. Ltd. All rights reserved.
Virus hoax E-Mails
o The warnings may be genuine, so there is always a dilemma whether to take them lightly or seriously.
o A wise action is to first confirm by visiting an antivirus site such as McAfee, Sophos or Symantec before
taking any action, such as forwarding them to friends and colleagues.
Lottery frauds
o Typically letters or E-Mails that inform the recipient that he/she has won a prize in a lottery.
o To get the money, the recipient has to reply, after which another mail is received asking for bank details
so that the money can be directly transferred.
Spoofing
o A hacker logs-in to a computer illegally, using a different identity than his own.
o He creates a new identity by fooling the computer into thinking that the hacker is the genuine system
operator and then hacker then takes control of the system.
Pornographic Offenses
“Child pornography” includes:
1. Any photograph that can be considered obscene and/or unsuitable for the age of child
viewer;
2. film, video, picture;
3. computer-generated image or picture of sexually explicit conduct where the production
of such visual depiction involves the use of a minor engaging in sexually explicit conduct.
➢ As the broad-band connections get into the reach of more and more homes, larger
child population will be using the Internet and therefore greater would be the chances
of falling victim to the aggression of pedophiles.
Cyber Security by Nina Godbole/Sunit Belapure
Copyright © 2011 Wiley India Pvt. Ltd. All rights reserved.
Software Piracy
▪ Theft of software through the illegal copying of genuine programs or the counterfeiting and
distribution of products intended to pass for the original.
Password Sniffing
➢ Password Sniffers are programs that monitor and record the name and password of network
users as they login, jeopardizing security at a site.
➢ Whoever installs the Sniffer can then impersonate an authorized user and login to access
restricted documents.
Identity Theft
➢ Identity theft is a fraud involving another person’s identity for an illicit purpose.
➢ This occurs when a criminal uses someone else’s identity for his/her own illegal purposes.
➢ The cyberimpersonator can steal unlimited funds in the victim’s name without the victim even
knowing about it for months, sometimes even for years!
Cyber Security by Nina Godbole/Sunit Belapure
Copyright © 2011 Wiley India Pvt. Ltd. All rights reserved.
Cybercrime: The Legal Perspectives
Computer Crime: Criminal Justice Resource Manual (1979)
➢ The first comprehensive presentation of computer crime
➢ computer-related crime was defined in the broader meaning as: any illegal act for which
knowledge of computer technology is essential for a successful prosecution.
Cybercrime:
➢ outcome of “globalization.”
➢ Globalized information systems accommodate an increasing number of transnational offenses.
This problem can be resolved in two ways:
1. Divide information systems into segments bordered by state boundaries
2. Incorporate the legal system into an integrated entity obliterating these state boundaries