Sub Code: Bcc301
Sub Code: Bcc301
Section A:
Section B
1. Explain how the term ‘cybercrime’ originated. State few Cyber Crimes.
Ans: Cybercrime is the use of computers, the internet, or network devices for illegal
activities like fraud, identity theft, or privacy violation. The term "cybercrime"
originated from hackers breaking into computer networks, some for fun, and others to
gain sensitive information. For example, hackers have started infecting computer
systems with viruses, causing breakdowns.
Few Cyber Crimes are discussed below:
2. Identity Theft
Identity theft occurs when a cybercriminal uses another person’s personal data like
credit card numbers or personal pictures without their permission to commit a fraud or
a crime.
3. Ransomware Attack
Ransomware attacks are a very common type of cybercrime. It is a type of malware
that has the capability to prevent users from accessing all of their personal data on the
system by encrypting them and then asking for a ransom in order to give access to the
encrypted data.
5. Internet Fraud
Internet fraud is a type of cybercrimes that makes use of the internet and it can be
considered a general term that groups all of the crimes that happen over the internet
like spam, banking frauds, theft of service, etc.
2. Explain wireless devices with example. What are the security challenges faced by
wireless devices?
Ans: Wireless devices are electronic gadgets that can communicate with other devices
or networks without the use of physical cables. They rely on various wireless
communication technologies such as Wi-Fi, Bluetooth, cellular, and infrared, among
others. Here are examples of wireless devices:
Smartphones: These are versatile handheld devices that can connect to cellular
networks, Wi-Fi, and Bluetooth. They enable users to make calls, send messages,
browse the internet, access applications, and much more.
Wireless routers: These devices enable wireless connectivity to the internet, allowing
multiple devices within the vicinity to access the network wirelessly. They typically
use Wi-Fi technology to create a local area network (LAN).
Wireless printers: These printers connect to computers and other devices via Wi-Fi or
Bluetooth, eliminating the need for physical connections. Users can send print
commands to the printer from anywhere within the wireless network range.
Wireless security cameras: These cameras use Wi-Fi or other wireless protocols to
transmit video footage to a connected device or network. They are commonly used for
surveillance purposes both indoors and outdoors.
e. Device Theft or Loss: Wireless devices such as smartphones and tablets are
often small and portable, making them susceptible to theft or loss. If these
devices contain sensitive data and are not properly secured, it could lead to
data breaches or identity theft.
.
3. Explain 7 Tools used in Cyber Crime.
Ans:
a. Malware: Malicious software, or malware, is a broad category of software designed
to damage or disrupt computer systems, steal sensitive information, or gain
unauthorized access to networks. Examples include viruses, worms, Trojans,
ransomware, and spyware. Malware is often distributed through phishing emails,
malicious websites, or infected software downloads.
b. Exploit Kits: Exploit kits are tools used by cybercriminals to exploit vulnerabilities in
software applications or operating systems. These kits contain pre-written code that
can automatically detect and exploit vulnerabilities, enabling attackers to install
malware or gain unauthorized access to systems. Common exploit kits include
Blackhole, Angler, and Nuclear.
c. Remote Access Trojans (RATs): Remote Access Trojans are malicious programs that
allow attackers to remotely control infected computers. Once installed on a victim's
system, RATs provide attackers with a range of capabilities, including viewing and
manipulating files, capturing keystrokes, and accessing webcam and microphone
feeds. RATs are often used for espionage, data theft, or launching further attacks
within a compromised network.
e. Phishing Kits: Phishing kits are packages of tools and resources used to create and
launch phishing attacks. These kits often include pre-made phishing website
templates that mimic legitimate sites, as well as scripts to collect user credentials or
other sensitive information entered into the fake sites. Phishing kits make it easier for
attackers to deploy phishing campaigns at scale, targeting a large number of users
with minimal effort.
g. SQL Injection Tools: SQL injection tools are used to exploit vulnerabilities in web
applications that use SQL databases. These tools allow attackers to inject malicious
SQL queries into input fields on web forms or URLs, bypassing authentication
mechanisms and gaining unauthorized access to the underlying database. With SQL
injection, attackers can steal sensitive data, modify or delete database records, or
execute arbitrary commands on the server hosting the web application.
Section C
1. Hackers: The term hacker may refer to anyone with technical skills, however, it
typically refers to an individual who uses his or her skills to achieve unauthorized
access to systems or networks to commit crimes. The intent of the burglary
determines the classification of those attackers as white, grey, or black hats. White hat
attackers burgled networks or PC systems to get weaknesses to boost the protection of
those systems. The owners of the system offer permission to commit the burglary, and
they receive the results of the look at. On the opposite hand, black hat attackers make
the most of any vulnerability for embezzled personal, monetary, or political gain.
Grey hat attackers are somewhere between white and black hat attackers. Grey hat
attackers could notice a vulnerability and report it to the owners of the system if that
action coincides with their agenda.
(a). White Hat Hackers – These hackers utilize their programming aptitudes for a
good and lawful reason. These hackers may perform network penetration tests to
compromise networks to discover network vulnerabilities. Security vulnerabilities are
then reported to developers to fix them, and these hackers can also work together as a
blue team. They always use the limited number of resources which are ethical and
provided by the company, they basically perform pen testing only to check the
security of the company from external sources.
(b). Gray Hat Hackers – These hackers carry out violations and do seemingly
deceptive things, however not for individual addition or to cause harm. These hackers
may disclose a vulnerability to the affected organization after having compromised
their network and they may exploit it.
(c). Black Hat Hackers – These hackers are unethical criminals who violate network
security for personal gain. They misuse vulnerabilities to bargain PC frameworks.
These hackers always exploit the information or any data they got from the unethical
pretesting of the network.
2. Organized Hackers: These criminals embody organizations of cyber criminals,
hacktivists, terrorists, and state-sponsored hackers. Cyber criminals are typically
teams of skilled criminals targeted on control, power, and wealth. These criminals are
extremely subtle and organized and should even give crime as a service. These
attackers are usually profoundly prepared and well-funded.
3. Internet stalkers: Internet stalkers are people who maliciously monitor the web
activity of their victims to acquire personal data. This type of cybercrime is conducted
using social networking platforms and malware, that can track an individual’s PC
activity with little or no detection.
2. What is the fuel for cybercrime. How may a criminal plan cybercrime?
Ans: 1. Use antivirus and anti-Spyware software and keep it up to date: It is important
to remove and/or quarantine the viruses. The settings of these software’s should be
done during the installation so that this software gets updated automatically daily.
3. Use a firewall to protect the system from hacking attacks while it is connected on
the Internet: A firewall is a software and/or hardware that is designed to block
unauthorized access while permitting authorized communications. It is a device or set
of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out)
computer traffic between different security domains based upon a set of rules and
other criteria. A firewall is different from antivirus protection. Antivirus software
scans incoming communications and files for troublesome virus’s vis-a-vis properly
configured firewall that helps to block all incoming communications from
unauthorized sources.
4. Disconnect from the Internet. when you are away from your computer: Attackers
cannot get into the system when the system is disconnected from the Internet.
Firewall, antivirus, and anti-Spyware software’s are not foolproof mechanisms to get
access to the system.
5. Downloading the freeware only from websites that are known and trustworthy: It is
always appealing to download free software(s) such as games, file-sharing programs,
customized toolbars, etc. However, one should remember that many free software(s)
contain other software, which may include Spyware.
6. Check regularly the folders in the mail box- "sent items" or "outgoing"-for those
messages you did not send: If you do find such messages in your outbox, it is a sign
that your system may have infected with Spyware, and maybe a part of a Botnet. This
is not foolproof; many spammers have learned to hide their unauthorized access.
7. Take immediate action if your system is infected: If your system is found to be
infected by a virus, disconnect it from the Internet immediately. Then scan the entire
system with fully updated antivirus, and anti-Spyware software. Report the
unauthorized access to ISP and to the legal authorities. There is a possibility that your
passwords may have been compromised in such cases, so change all the passwords
immediately.
3. Explain the security measures and policies taken for mobile devices.
Ans:
Securing mobile devices involves:
Clear Policies: Establish and enforce policies regarding device usage, OS levels, data
access, and remote wiping.
Password Protection: Encourage strong, unique passwords and avoid using the same
password for multiple accounts.
Avoid Public Wi-Fi: Educate employees about the risks of using public Wi-Fi
networks and discourage their use.
App Awareness: Train employees to recognize and avoid malicious apps, and
consider implementing restrictions on app downloads.
4. State some attacks on Mobile devices. What are the security implications for
organizations.
Ans: Some attacks on Mobile devices are stated below:
1. Data Leakage: Unintentional transmission of personal or corporate data from
mobile apps to remote servers, often exploited by advertisers or cybercriminals.
Users should limit app permissions and avoid granting unnecessary access.
3. Network Spoofing: Cybercriminals create fake Wi-Fi access points in public areas
to trick users into connecting, enabling theft of personal information. Caution is
advised when connecting to free Wi-Fi, and users should avoid providing personal
information.
The security implications for organizations from mobile security threats are:
8. What is Identity Theft. How it is done and how ID Theft can be handled?
Ans: Identity theft is the crime of using the personal or financial information of
another person to commit fraud, such as making unauthorized transactions or
purchases.
Identity theft is committed in many different ways and its victims are typically left
with damage to their credit, finances, and reputation.
Thieves can attempt to obtain your personal information in various ways. For
instance, some sift through trash bins looking for bank account and credit card
statements.
To find such information, they may search the hard drives of stolen or discarded
computers; hack into computers or computer networks of organizations and
corporations; access computer-based public records; use information-gathering
malware to infect computers; browse social networking sites; or use deceptive emails
or text messages. Once identity thieves have the information they are looking for, they
can ruin a person's credit rating and the standing of other personal information.
a. Monitor Accounts: Check bank statements, credit card bills, and credit reports
for unauthorized transactions or accounts.
b. Place Fraud Alerts: Contact credit bureaus to set alerts, requiring verification
before opening new accounts
c. Freeze Credit: Consider freezing credit reports to prevent unauthorized
account openings.
d. Report Theft: File reports with FTC and local authorities to document the
theft.
e. Contact Financial Institutions: Notify banks and credit issuers, close
compromised accounts, and dispute charges.
f. Update Security: Improve online security with strong passwords, multi-factor
authentication, and vigilance against phishing.
g. Seek Legal Help: Consider legal aid or identity theft resolution services for
assistance.
Steganography is a means of concealing secret information within (or even on top of)
an otherwise mundane, non-secret document or other media to avoid detection. It
comes from the Greek words steganos, which means “covered” or “hidden,” and
graph, which means “to write.” Hence, “hidden writing.”
• The email data is extracted in full and there is no question whether all data has
been recovered.
• The validity of the data can be relied upon in both civil and criminal courts as
admissible evidence.
• Ensures that no changes are made to the email metadata.
• It is compliant with the ACPO guidelines, and the quality standards set out
within the ISO17025 documentation and Forensic Science Regulator’s Codes
of Good Practice and Conduct.
• Any deleted emails and files are recovered where possible.
11. What are privacy threats? What are the challenges faced?
Ans: Privacy threats pose significant risks to individuals' personal information and
data privacy. These threats, ranging from data breaches and surveillance to social
engineering and IoT vulnerabilities, can lead to the unauthorized access and
exploitation of sensitive data. Challenges in addressing these threats stem from factors
such as limited awareness among individuals, the complex nature of technology,
inadequacies in legal and regulatory frameworks, and the pervasive data sharing
practices of organizations. Moreover, the rise of data monetization, coupled with
cybersecurity threats and government surveillance programs, further complicates
efforts to protect individuals' privacy rights in the digital age.
Cyber laws in India cover the following statutes, rules, and guidelines:
a. Information Technology Act, 2000: This act regulates cyber laws in India and
came into effect in 2000. It provides legal recognition to electronic commerce
and makes it easier to register real-time records with the government. The act
also includes amendments that outline the definition and punishment of cyber
crime.
a. Section 65: This section deals with tampering with computer source
documents.
b. Section 66: This section deals with hacking with computer systems.
c. Section 66B: This section deals with receiving stolen computer or
communication devices.
d. Section 66C: This section deals with using another person's password.
e. Section 66D: This section deals with cheating using computer resources.
f. Section 66E: This section deals with publishing private images of others.
g. Section 69-A: This section deals with blocking public access of any
information through any computer resources.
h. Section 69-B: This section deals with the power to monitor or collect traffic
data or information generated transmitted, received or stored in any computer
resource.