cyber security unit-1 notes
cyber security unit-1 notes
1. Introduction
Indian corporate and government sites have been attacked or defaced more than 780 times
between February 2000 and December 2002.
There are also stories/news of other attacks; for example, according to a story posted on 3
December 2009, a total of 3,286 Indian websites were hacked in 5 months – between January
and June 2009.
Various cybercrimes and cases registered under cybercrimes by motives and suspects in
States and Union Territories (UTs).
P
Prepared by:Suraj B S
3
Note that in a wider sense, “computer-related crime” can be any illegal behavior committed by
means of, or in relation to, a computer system or network; however, this is not cybercrime.
The term “cybercrime” relates to a number of other terms that may sometimes be used to
describe crimes committed using computers.
Computer-related crime
Computer crime
Internet crime
E-crime
High-tech crime, etc. are the other synonymous terms.
According to one information security, cybercrime is any criminal activity which uses
network access to commit a criminal act.
Cybercrime may be internal or external, with the former easier to perpetrate.
The term “cybercrime” has evolved over the past few years since the adoption of Internet
connection on a global scale with hundreds of millions of users.
Cybercrime refers to the act of performing a criminal act using cyberspace as the
communications vehicle.
P
Prepared by:Suraj B S
4
The legal systems around the world introduce laws to combat cybercriminals attacks. Two types
of attack are as follows.
1. Techno-crime: An act against a system or systems, with the intent to copy, steal, prevent
access, corrupt or otherwise deface or damage parts of or the complete computer system.
There is a very thin line between the two terms “computer crime” and “computer fraud”; both are
punishable.
Cybercrimes (harmful acts committed from or against a computer or network) differ from most
crimes in four ways:
(a) how to commit them is easier to learn,
(b) they require few resources relative to the potential damage caused,
(c) they can be committed in a jurisdiction without being physically present in it
(d) they are often not clearly illegal.
The term cybercrime has some stigma attached and is notorious due to the word “terrorism” or
“terrorist” attached with it, that is, cyberterrorism (see explanation of the term in Box 1.1).
a. Cyberterrorism
Cyberterrorism is defined as “any person, group or organization who, with terrorist intent,
utilizes accesses or aids in accessing a computer or computer network or electronic system
or electronic device by any available means, and thereby knowingly engages in or attempts
to engage in a terrorist act commits the offence of cyberterrorism.”
Cybercrime, especially through the Internet, has grown in number as the use of computer has
become central to commerce, entertainment and government.
The term cyber has some interesting synonyms: fake, replicated, pretend, imitation, virtual,
computer generated.
Cyber means combining forms relating to Information Technology, the Internet and Virtual
Reality.
b. cybernetics
This term owes its origin to the word “cybernetics” which deals with information and its
use;
cybernetics is the science that overlaps the fields of neurophysiology, information theory,
computing machinery and automation.
Worldwide, including India, cyberterrorists usually use computer as a tool, target for their
unlawful act to gain information.
P
Prepared by:Suraj B S
5
Internet is one of the means by which the offenders can gain priced sensitive information of
companies, firms, individuals, banks and can lead to intellectual property (IP) crimes, selling
illegal articles, pornography/child pornography, etc.
This is done using methods such as Phishing, Spoofing, Pharming, Internet Phishing, wire
transfer, etc. and use it to their own advantage without the consent of the individual.
c. “Phishing” refers to an attack using mail programs to deceive or coax (lure) Internet users
into disclosing confidential information that can be then exploited for illegal purposes. Figure
1.2 shows the increase in Phishing hosts.
d. Cyberspace
“cyberspace” is where users mentally travel through matrices of data. Conceptually,
“cyberspace” is the “nebulous place” where humans interact over computer networks.
The term “cyberspace” is now used to describe the Internet and other computer networks.
In terms of computer science, “cyberspace” is a worldwide network of computer networks
that uses the Transmission Control Protocol/Internet Protocol (TCP/IP) for communication to
facilitate transmission and exchange of data.
Cyberspace is most definitely a place where you chat, explore, research and play.
e. Cybersquatting
The term is derived from “squatting” which is the act of occupying an abandoned space/
building that the user does not own, rent or otherwise have permission to use.
Cybersquatting, however, is a bit different in that the domain names that are being squatted
are (sometimes but not always) being paid for by the cybersquatters through the registration
process.
Cybersquatters usually ask for prices far greater than those at which they purchased it. Some
cybersquatters put up derogatory or defamatory remarks about the person or company the
P
Prepared by:Suraj B S
6
domain is meant to represent in an effort to encourage the subject to buy the domain from
them.
This term is explained here because, in a way, it relates to cybercrime given the intent of
cybersquatting.
cybersquatting means registering, selling or using a domain name with the intent of profiting
from the goodwill of someone else’s trademark. In this nature, it can be considered to be a
type of cybercrime.
Cybersquatting is the practice of buying “domain names” that have existing businesses
names.
f. Cyberpunk
According to science fiction literature, the words “cyber” and “punk5” emphasize the two
basic aspects of cyberpunk: “technology” and “individualism.”
The term “cyberpunk” could mean something like “anarchy6 via machines” or
“machine/computer rebel movement.”
g. Cyberwarfare
Cyberwarfare means information attacks against an unsuspecting opponent’s computer
networks, destroying and paralyzing nations.
This perception seems to be correct as the terms cyberwarfare and cyberterrorism have got
historical connection in the context of attacks against infrastructure.
The term “information infrastructure” refers to information resources, including
communication systems that support an industry, institution or population.
These type of Cyberattacks are often presented as threat to military forces and the Internet
has major implications for espionage and warfare.
P
Prepared by:Suraj B S
7
The 2008 CSI Survey on computer crime and security supports this.
Cybercrimes occupy an important space in information security domain because of their
impact.
The other challenge comes from the difficulty in attaching a quantifiable monetary value to
the corporate data and yet corporate data get stolen/lost (through loss/theft of laptops).
Because of these reasons, reporting of financial losses often remains approximate.
In an attempt to avoid negative publicity, most organizations abstain from revealing facts and
figures about “security incidents” including cybercrime.
In general, organizations perception about “insider attacks” seems to be different than that
made out by security solution vendor.
However, this perception of an organization does not seem to be true as revealed by the 2008
CSI Survey. Awareness about “data privacy” too tends to be low in most organizations.
When we speak of financial losses to the organization and significant insider crimes, such as
leaking customer data, such “crimes” may not be detected by the victimized organization and
no direct costs may be associated with the theft (Table 1.5).
Figure 1.4 shows several categories of incidences – viruses, insider abuse, laptop theft and
unauthorized access to systems.
P
Prepared by:Suraj B S
8
|
Box 1.2 The Botnet Menace!
Botnet: A group of computers that are controlled by software containing harmful programs,
without their users' knowledge
The term “Botnet” is used to refer to a group of compromised computers (zombie computers,
i.e., personal computers secretly under the control of hackers) running malwares under a
common command and control infrastructure. Figure 1.3 shows how a “zombie” works.
P
Prepared by:Suraj B S
9
A Botnet maker can control the group remotely for illegal purposes, the most common being
denial-of-service attack (DoS attack),
Adware,
Spyware,
E-Mail Spam,
Click Fraud
theft of application serial numbers,
login IDs
financial information such as credit card numbers, etc.
An attacker usually gains control by infecting the computers with a virus or other Malicious
Code. The computer may continue to operate normally without the owner’s knowledge that
his computer has been compromised.
The problem of Botnet is global in nature and India is also facing the same.
India has an average of 374 new Bot attacks per day and had more than 38,000 distinct Bot-
infected computers in the first half of the year 2009.
Small and medium businesses in the country are at greater risk, as they are highly vulnerable
to Bots, Phishing, Spam and Malicious Code attacks.
Mumbai with 33% incidences tops the Bot-infected city list,
followed by New Delhi at 25%,
Chennai at 17% and
Bangalore at 13%.
Tier-II locations are now also a target of Bot-networks with Bhopal at 4% and Hyderabad,
Surat, Pune and Noida at 1% each.
The Internet is a network of interconnected computers. If the computers, computer systems,
computer resources, etc. are unsecured and vulnerable to security threats, it can be
detrimental to the critical infrastructure of the country.
P
Prepared by:Suraj B S
10
Types of Cybercriminals
1. Type I: Cybercriminals – hungry for recognition
• Hobby hackers;
• IT professionals (social engineering is one of the biggest threat);
• Politically motivated hackers;
• Terrorist organizations.
2. Type II: Cybercriminals – not interested in recognition
• Psychological perverts;
• financially motivated hackers (corporate espionage);
3. Type III: Cybercriminals – the insiders
• Disgruntled or former employees seeking revenge;
• Competing companies using employees to gain economic advantage through
damage and/or theft.
5. Classifications of Cybercrimes
Table 1.6 presents a scheme for cybercrime classification (broad and narrow classification).
P
Prepared by:Suraj B S
11
“Crime is defined as “an act or the commission of an act that is forbidden, or the omission of a
duty that is commanded by a public law and that makes the off ender liable to punishment by that
law”
b. Online Frauds
Online Scams. There are a few major types of crimes under the category of hacking:
Spoofing website and E-Mail security alerts, false mails about virus threats, lottery
frauds and Spoofing.
In Spoofing websites and E-Mail security threats, fraudsters create authentic looking
websites that are actually nothing but a spoof.
The purpose of these websites is to make the user enter personal information which is
then used to access business and bank accounts.
Fraudsters are increasingly turning to E-Mail to generate traffic to these websites.
This kind of online fraud is common in banking and financial sector.
There is a rise in the number of financial institutions’ customers who receive such E-
Mails which usually contain a link to a spoof website and mislead users to enter user ids
and passwords on the pretence that security details can be updated or passwords changed.
It is wise to be alert and careful about E-Mails containing an embedded link, with a
request for you to enter secret details. It is strongly recommended not to input any
sensitive information that might help criminals to gain access to sensitive information,
such as bank account details, even if the page appears legitimate.
In virus E-Mails, the warnings may be genuine, so there is always a dilemma whether to
take them lightly or seriously.
A wise action is to first confirm by visiting an antivirus site such as McAfee, Sophos or
Symantec before taking any action, such as forwarding them to friends and colleagues.
P
Prepared by:Suraj B S
12
c. Phishing, Spear Phishing and its various other forms such as Vishing
and Smishing
“Phishing” refers to an attack using mail programs to deceive or coax (lure) Internet
users into disclosing confidential information that can be then exploited for illegal
purposes.
“Vishing” is the criminal practice of using social engineering over the telephone system,
most often using features facilitated by VoIP, to gain access to personal and financial
information from the public for the purpose of financial reward.
o The term is a combination of V – voice and Phishing
o Vishing is usually used to steal credit card numbers or other related data used in ID
theft schemes from individuals.
o The most profitable uses of the information gained through a Vishing attack include:
1. ID theft;
2. purchasing luxury goods and services;
3. transferring money/funds;
4. monitoring the victims’ bank accounts;
5. making applications for loans and credit cards.
“Smishing” is a criminal offense conducted by using social engineering techniques
similar to Phishing. The name is derived from “SMS PhISHING.” SMS – Short Message
Service – is the text messages communication component dominantly used into mobile
phones.
d. Spamming:
People who create electronic Spam are called spammers.
Spam is the abuse of electronic messaging systems (including most broadcast media,
digital delivery systems) to send unrequested bulk messages indiscriminately.
Although the most widely recognized form of Spam is E-Mail Spam, the term is applied
to similar abuses in other media:
instant messaging Spam,
Usenet newsgroup Spam,
web search engine Spam,
Spam in blogs,
wiki Spam,
online classified ads Spam,
mobile phone messaging Spam,
Internet forum Spam,
junk fax transmissions,
social networking Spam,
file sharing network Spam,
video sharing sites, etc.
P
Prepared by:Suraj B S
13
e. Cyber defamation:
Cyber defamation is a Software offense.
Let us first understand what the term entails. CHAPTER XXI of the Indian Penal Code
(IPC) is about DEFAMATION. In Section 499 of CHAPTER XXI of IPC, regarding
“defamation” there is a mention that
P
Prepared by:Suraj B S
14
g. Computer sabotage:
The use of the Internet to stop the normal functioning of a computer system through the
introduction of worms, viruses or logic bombs, is referred to as computer sabotage.
It can be used to gain economic advantage over a competitor, to promote the illegal
activities of terrorists or to steal data or programs for extortion purposes.
Logic bombs are event-dependent programs created to do something only when a certain
event (known as a trigger event) occurs.
Some viruses may be termed as logic bombs because they lie dormant all through the
year and become active only on a particular date
h. Pornographic offenses:
“Child pornography” means any visual depiction, including but not limited to the
following:
1. Any photograph that can be considered obscene and/or unsuitable for the age of child
viewer;
2. film, video, picture;
3. computer-generated image or picture of sexually explicit conduct where the production
of such visual depiction involves the use of a minor engaging in sexually explicit
conduct.
the Internet has become a household commodity in the urban areas of the nation. Its
explosion has made the children a viable victim to the cybercrime.
As the broad-band connections get into the reach of more and more homes, larger child
population will be using the Internet and therefore greater would be the chances of falling
victim to the aggression of pedophiles.
“Pedophiles” a person who is sexually attracted to children.
P
Prepared by:Suraj B S
15
Step 4: They extract personal information from the child/teen by winning his/her
confidence.
Step 5: Pedophiles get E-Mail address of the child/teen and start making contacts on the
victim’s E-Mail address as well. Sometimes, these E-Mails contain sexually explicit
language.
Step 6: They start sending pornographic images/text to the victim including child
pornographic images in order to help child/teen shed his/her inhibitions so that a feeling
is created in the mind of the victim that what is being fed to him is normal and that
everybody does it.
Step 7: At the end of it, the pedophiles set up a meeting with the child/teen out of the
house and then drag him/her into the net to further sexually assault him/her or to use
him/her as a sex object.
This is the “digital world”; in physical world, parents know the face of dangers and they
know how to avoid and face the problems by following simple rules and accordingly they
advice their children to keep away from dangerous things and ways.
However, it is possible, even in the modern times most parents may not know the basics
of the Internet and the associated (hidden) dangers from the services offered over the
Internet. Hence most children may remain unprotected in the cyberworld.
Pedophiles take advantage of this situation and lure the children, who are not advised by
their parents or by their teachers about what is right/wrong for them while browsing the
Internet.
Legal remedies exist only to some extent;
o for example, Children’s Online Privacy Protection Act or COPPA is a way of
preventing online pornography.
i. Password sniffing:
This also belongs to the category of cybercrimes against organization because the use of
password could be by an individual for his/her personal work or the work he/she is doing
using a computer that belongs to an organization.
P
Prepared by:Suraj B S
16
b. Password sniffing:
• Password Sniffers are programs that monitor and record the name and password of
network users as they login, jeopardizing security at a site.
• Whoever installs the Sniffer can then impersonate an authorized user and login to access
restricted documents.
• Laws are not yet set up to adequately prosecute a person for impersonating another
person online.
• Laws designed to prevent unauthorized access to information may be effective in
apprehending crackers using Sniffer programs.
P
Prepared by:Suraj B S
17
d. Virus attacks:
Virus attacks can be used to damage the system to make the system unavailable
Computer virus is a program that can “infect” legitimate (valid) programs by modifying
them to include a possibly “evolved” copy of itself.
Viruses spread themselves, without the knowledge or permission of the users, to
potentially large numbers of programs on many machines.
A computer virus passes from computer to computer in a similar manner as a biological
virus passes from person to person.
Viruses may also contain malicious instructions that may cause damage or annoyance;
the combination of possibly Malicious Code with the ability to spread is what makes
viruses a considerable concern. Viruses can often spread without any readily visible
symptoms.
g. Logic bomb:
Logic bombs are event-dependent programs created to do something only when a certain
event (known as a trigger event) occurs.
Some viruses may be termed as logic bombs because they lie dormant all through the
year and become active only on a particular date
h. Trojan Horse:
Trojan Horses: A Trojan Horse, Trojan for short, is a term used to describe malware
that appears, to the user, to perform a desirable function but, in fact, facilitates
unauthorized access to the user’s computer system
P
Prepared by:Suraj B S
18
i. Data diddling:
A data diddling (data cheating) attack involves altering raw data just before it is
processed by a computer and then changing it back after the processing is completed.
Electricity Boards in India have been victims to data diddling programs inserted when
private parties computerize their systems.
P
Prepared by:Suraj B S
19
m. Software piracy :
This is a big challenge area indeed.
Cybercrime investigation cell of India defines “software piracy” as theft of software
through the illegal copying of genuine programs or the counterfeiting and distribution of
products intended to pass for the original.
There are many examples of software piracy:
o end-user copying – friends loaning disks to each other, or organizations under-
reporting the number of software installations they have made, or organizations
not tracking their software licenses;
o hard disk loading with illicit means – hard disk vendors load pirated software;
o counterfeiting – large-scale duplication and distribution of illegally copied
software;
o illegal downloads from the Internet – by intrusion, by cracking serial numbers,
etc. Beware that those who buy pirated software have a lot to lose:
(a) getting untested software that may have been copied thousands of times over,
(b) the software, if pirated, may potentially contain hard-drive-infecting viruses,
(c) there is no technical support in the case of software failure, that is, lack of
technical product support available to properly licensed users,
(d) there is no warranty protection,
(e) there is no legal right to use the product, etc.
b. Cyberterrorism:
Cyberterrorism is defined as “any person, group or organization who, with terrorist intent,
utilizes accesses or aids in accessing a computer or computer network or electronic system
or electronic device by any available means, and thereby knowingly engages in or attempts
to engage in a terrorist act commits the offence of cyberterrorism.”
c. Web jacking:
Web jacking occurs when someone forcefully takes control of a website (by cracking the
password and later changing it).
Thus, the first stage of this crime involves “password sniffing.”
The actual owner of the website does not have any more control over what appears on
that website.
P
Prepared by:Suraj B S
20
Hacking
Although the purposes of hacking are many, the main ones are as follows:
1. Greed;
2. power;
3. publicity;
4. revenge;
5. adventure;
6. desire to access forbidden information;
7. destructive mindset.
Every act committed toward breaking into a computer and/or network is hacking and it is
an offense.
Hackers write or use ready-made computer programs to attack the target computer.
They possess the desire to destruct and they get enjoyment out of such destruction.
Some hackers hack for personal monetary gains, such as stealing credit card information,
transferring money from various bank accounts to their own account followed by
withdrawal of money.
They extort money from some corporate giant threatening him to publish the stolen
information that is critical in nature.
Government websites are hot on hackers’ target lists and attacks on Government websites
receive wide press coverage.
P
Prepared by:Suraj B S
21
For example, according to the story posted on December 2009, the NASA site was
hacked via SQL Injection
Hackers, crackers and phrackers[11] are some of the oft-heard terms.
The original meaning of the word “hack” meaning an elegant, witty or inspired way of
doing almost anything originated at MIT.
The meaning has now changed to become something associated with the breaking into or
harming of any kind of computer or telecommunications system.
Some people claim that those who break into computer systems should ideally be called
“crackers” and those targeting phones should be known as “phreaks”
Identity Theft
Identity theft is a fraud involving another person’s identity for an illicit purpose.
This occurs when a criminal uses someone else’s identity for his/her own illegal
purposes.
Phishing and identity theft are related offenses
Examples include fraudulently obtaining credit, stealing money from the victim’s bank
accounts, using the victim’s credit card number
Spam in Cyberworld
Basically, “Spam” is the abuse of electronic messaging systems to send unsolicited bulk
messages indiscriminately.
Although the most widely recognized form of Spam is E-Mail Spam, this term is applied
to similar abuses in other media:
o instant messaging Spam,
o Usenet newsgroup Spam,
o web search engine Spam,
o Spam in blogs,
o wiki Spam,
o online classified ads Spam,
o mobile phone messaging Spam,
o Internet forum Spam,
o junk fax transmissions
o file sharing network Spam.
Spam is caused by flooding the Internet with many copies of the same message, in an
attempt to force the message on people who would not otherwise choose to receive it.
Often, this may result in the notorious DoS attack.
Commercial advertising often happens to be the cause of Spam. Such advertisements are
often for products of dubious reputation and fraud schemes meant to make people believe
they can get rich overnight!
Some Spam may also get generated through quasi-legal services.
Spam hardly costs much to the sender; most of the costs are paid for by the recipient or
the carriers rather than by the sender.
People who engage in the activity of electronic Spam are called spammers.
Two main types of Spam are worth mentioning:
P
Prepared by:Suraj B S
22
P
Prepared by:Suraj B S
23
|
Box 1.6 Cybercrimes: Indian Statistics
(A) Cybercrimes: Cases of Various Categories under ITA 2000
217 cases were registered under Information Technology Act (ITA) during the year 2007
as compared to 142 cases during the previous year (2006), thereby reporting an increase of
52.8% in 2007 over 2006.
22.3% cases (49 out of 217 cases) were reported from Maharashtra followed by Karnataka
(40), Kerala (38) and Andhra Pradesh and Rajasthan (16 each).
45.6% (99 cases) of the total 217 cases registered under ITA 2000 were related to obscene
publication/transmission in electronic form, known as cyberpornography.
86 persons were arrested for committing such offenses during 2007.
There were 76 cases of hacking with computer system during the year wherein 48 persons
were arrested.
Out of the total (76) hacking cases, the cases relating to loss/damage of computer
resource/utility under Section 66(1) of the IT Act were 39.5% (30 cases) whereas the cases
related to hacking under Section 66(2) of IT Act were 60.5% (46 cases).
Maharashtra (19) and Kerala (4) registered maximum cases under Section 66(1) of the IT
Act out of total 30 such cases at the National level.
Out of the total 46 cases relating to hacking under Section 66(2), most of the cases (31) were
reported from Karnataka followed by Kerala (7) and Andhra Pradesh (3). 29.9% of the 154
persons arrested in cases relating to ITA 2000 were from Maharashtra (46) followed by
Karnataka and Madhya Pradesh (16 each).
The age-wise profile of persons arrested in cybercrime cases under ITA 2000 showed that
63.0% of the offenders were in the age group 18–30 years (97 out of 154) and 29.9% of the
P
Prepared by:Suraj B S
24
offenders were in the age group 30–45 years (46 out of 154).
Tamil Nadu reported two offenders whose ages were below 18 years.
India is said to be the “youth country” given the population age distribution. From the
potential resources perspective, this is supposed to be a great advantage; assuming that these
youths will get appropriate training to develop the required professional skills in them.
However, from cybercrime perspective, this youth aspect does not seem good as revealed by
cybercrime statistics in India.
Crime head-wise and age-group-wise profile of the offenders arrested under ITA 2000
revealed that 55.8% (86 out of 154) of the offenders were arrested under “Obscene
publication/transmission in electronic form” of which 70.9% (61 out of 86) were in the age
group 18–30 years.
50% (24 out of 48) of the total persons arrested for “Hacking with Computer Systems” were
in the age group of 18–30 years.
P
Prepared by:Suraj B S
25
57.6% of the persons arrested under Criminal Breach of Trust/Cyberfraud offenses were in
the age group 30–45 years (49 out of 85).
P
Prepared by:Suraj B S