CCIDF Unit II
CCIDF Unit II
UNIT- II
1. Cyber Crime Issues
2. Unauthorized Access to Computers
3. Computer Intrusions
9. Intellectual Property
11. Exploitation
Types of PC Intrusion
PC intrusion can happen in different ways:
1. Sweeper Attack – Hackers delete important data like internet history,
cache, and documents using a harmful program.
2. Denial of Service (DoS) – Hackers overload the system, making it stop
working and preventing the real user from accessing it.
3. Password Guessing – Hackers try to guess passwords to break into the
computer and damage security.
4. Snooping – Hackers secretly look through files, track keystrokes, steal
passwords, and monitor online activity without permission.
5. Eavesdropping – Hackers secretly listen to data being sent between
computers and servers to steal information.
Tools and techniques used in detecting and mitigating computer intrusions :
Detecting and stopping computer intrusions (or cyberattacks) is a key part of
keeping systems secure.
Tools for Detecting Computer Intrusions:
1. Intrusion Detection Systems (IDS): These are like security cameras for
your computer or network. They watch for suspicious activity and let you
know if something bad is happening. There are two main types:
o Network-based IDS (NIDS): Watches the network for strange or
dangerous behavior.
o Host-based IDS (HIDS): Looks at activities happening directly on
your computer or server. Examples: Snort and OSSEC.
2. Intrusion Prevention Systems (IPS): IPS not only detects threats but also
stops them immediately. If a bad action is detected, the IPS will block it
automatically. It’s like having a guard who stops the intruder before they
can cause damage. Examples: Cisco Firepower.
3. Firewalls: Firewalls act like a security gate that filters incoming and
outgoing traffic to block unauthorized access. They prevent malicious
actors from getting into your network or system. There are different types:
o Traditional Firewalls: Check if incoming traffic is allowed based on
a set of rules.
o Next-Generation Firewalls (NGFW): Have extra features like
detecting threats and filtering web traffic. Examples: Windows
Firewall or Palo Alto Networks.
4. Antivirus Software: Antivirus programs look for harmful software (like
viruses or malware) on your computer. They can scan your system to find
and remove anything that could harm it. Examples: McAfee, Norton,
Kaspersky.
5. Security Information and Event Management (SIEM): SIEM tools
collect information from different parts of your network and systems, like
logs, and look for signs of problems. They give you a big-picture view of
security and can alert you if something looks off. Examples: Splunk and
IBM QRadar.
6. Endpoint Detection and Response (EDR): These tools focus on the
devices (endpoints) like laptops, desktops, or servers. They monitor for
suspicious activity on those devices and can quickly respond to block an
attack. Examples: CrowdStrike and Carbon Black.
Techniques for Mitigating (Stopping) Computer Intrusions:
1. Patch Management: Keeping your software up to date is one of the
simplest ways to prevent attacks. When companies find problems (called
vulnerabilities) in their software, they release updates (called patches) to
fix them. Regularly updating software reduces the chances of an attacker
exploiting these weaknesses.
2. Network Segmentation: This technique divides a network into smaller
sections (segments), so if an attacker gets into one part, they can’t easily
access the rest. It's like having different locked rooms in a building to limit
the damage if someone breaks into one.
3. User Authentication: Strong login systems, like two-factor
authentication (2FA), make sure only authorized users can access a
system. It’s like having an extra lock on your door—after entering a
password, you also need a code sent to your phone to get in.
4. Regular Backups: Regularly backing up your data means that if an
attacker messes with your files, you can restore them easily. It’s like
having a backup key for your house—if you lose your original, you still
have access.
5. Network Traffic Monitoring: Continuously watching network activity
helps to
• There are several common warning signs that your computer or network has
fallen victim to malicious code or malware.
• Your computer slows down significantly overnight.
• Computer programs frequently begin crashing, even after restarting.
• Pop-ups spamming your screen often indicate there is spyware on a
computer.
• Having access to network activity while offline is a sign of a virus.
• You experience a sudden increase or decrease in your hard drive’s capacity.
• Your contacts might be receiving strange messages from your email.
Here are some easy ways to keep your computer safe from viruses and
malware :
• In the past, they were transferred using floppy disks, but today, they are more
commonly spread via the internet.
• Viruses can be sent through email attachments, and some even hijack the
victim's email software to spread themselves to others.
• They may also attach to legitimate software, or be bundled within software
packages.
• Viruses can also be downloaded from compromised app stores or infected
online code repositories.
• A key feature of viruses is that they need the victim to run the infected code
or program, which activates the virus and allows it to spread further.
Types of Computer Viruses :
• Resident Virus: This virus infects programs as you open them. It stays
on the computer even when the program is closed and spreads through
other programs.
• Multipartite Virus: It uses several ways to spread and infect your
computer. It can stay in memory and affect other parts of your system,
slowing it down.
• Direct Action Virus: This virus infects files when the system is running,
changes your system settings, and then deletes itself. It can destroy all
data on your computer.
• Browser Hijacker: This virus changes your web browser settings, like
your homepage or search engine. It can also cause pop-up ads and is often
found in free, untrusted software.
• Overwrite Virus: This virus replaces your files with its own content. Once
your files are infected, they can’t be restored unless deleted. It affects all
types of systems.
• Web Scripting Virus: This virus attacks your browser security and adds
harmful code to websites. It can steal information, send spam, or damage
website files.
• File Infector: This is a common virus that infects files like .exe or .com.
It spreads when you open those files and can quickly spread across your
computer or network.
• Network Virus: These viruses are dangerous because they can infect an
entire network of computers. They spread quickly and can be hard to
detect.
• Boot Sector Virus: This virus targets the part of your computer that starts
it up. It infects the boot-up process and can cause problems with starting
your computer. Modern computers have protections to stop this virus.
2.7 PORNOGRAPHY
• The prevalence of pornography in cybercrime is a serious issue with various
consequences. While pornography itself isn't always illegal, its connection to
cybercrime is concerning because it can be used as a tool to exploit or
manipulate people.
• Here’s how it contributes to cybercrime:
1. Child Exploitation: Pornography is often used as a way to distribute
illegal content, such as child pornography, which is a severe crime.
Cybercriminals use websites, social media platforms, and file-sharing
networks to share this content.
2. Revenge Porn: The non-consensual sharing of explicit content, commonly
known as "revenge porn," has become a growing issue. Cybercriminals
may exploit personal videos or images, leaking them online to damage the
victim's reputation or extort money.
3. Phishing and Scams: Some cybercriminals use pornography websites or
email offers as bait to lure victims into clicking malicious links. These links
often lead to phishing websites or download malware.
4. Online Trafficking: Cybercrime networks may use pornographic material
to facilitate human trafficking. They may exploit vulnerable individuals by
tricking or coercing them into creating explicit content that is then sold or
distributed.
5. Ransomware and Extortion: Cybercriminals might threaten to release
private explicit content unless the victim pays money. This form of
blackmail is becoming more common, with attackers using explicit
material to manipulate their targets.
The challenges in addressing the issue of pornography-related cybercrime are
multifaceted:
1. Anonymity and Accessibility: The internet allows individuals to hide
their identities, making it difficult to trace cybercriminals. The ability to
quickly access and share content—whether legal or illegal—adds to the
problem, as harmful material can be distributed widely with little effort.
This makes monitoring and preventing such activities more challenging
for authorities.
2. Global Nature: Cybercrime doesn't adhere to national borders. This
means that criminals can operate from any part of the world, and
investigating these crimes requires cooperation across different countries.
However, each country has its own laws and regulations, and varying
levels of enforcement. This makes it difficult to create a unified global
strategy to tackle pornography-related cybercrimes effectively.
3. Technological Advancements: As technology evolves, so do the methods
used by cybercriminals. One major advancement is the creation of
deepfakes—realistic but fake videos or images that can be used to
manipulate and create harmful explicit content. These fake materials are
often difficult to distinguish from real ones, complicating investigations.
The rapid pace of technological change makes it harder for laws, tools, and
investigators to keep up.
Ethical Challenges:
• Freedom of Expression vs. Protection: Balancing free speech with
protecting people from harmful content.
• Impact on Minors: Protecting children from exposure to harmful or
inappropriate material.
• Consent Issues: Ensuring all content is created with consent to avoid
exploitation.
Social Challenges:
• Normalization of Harmful Content: Pornography can normalize harmful
behaviors and unrealistic views of relationships.
• Addiction and Mental Health: Excessive pornography use can lead to
addiction and mental health issues.
• Gender and Power Dynamics: Pornography often reinforces harmful
stereotypes and power imbalances.
• Privacy Violations: Non-consensual sharing of intimate content can
cause significant social harm to victims.
Legal Challenges:
• Regulation and Enforcement: Controlling cyber pornography is difficult
due to the global nature of the internet.
• Age Verification: Verifying ages to prevent minors from accessing explicit
content is challenging.
• Protection of Minors: Laws must protect children from exposure to
explicit material.
• International Cooperation: Legal systems across countries need to
cooperate to combat cyber pornography.
• Free Speech vs. Censorship: Balancing free speech with controlling
harmful content is a key challenge.
• Education and Awareness: Spreading the word about the risks and legal
issues of software piracy can encourage businesses and individuals to use
legitimate software.
• Software Licensing and Auditing: Organizations should keep track of the
software they use by conducting regular audits to ensure they are
compliant with licensing agreements.
• Legal Alternatives: Offering affordable, accessible, and legitimate
software options can encourage users to choose the legal route over piracy.
• Mass Mailing: Sending multiple copies of the same email to the same
address.
• List Linking: Subscribing the victim to multiple mailing lists, creating a
constant influx of emails.
• Zip Bombing: Attaching large, compressed files to emails, overloading the
recipient's email system.
Motivations for Mail Bombing
• Robust Email Filters: Implementing strong spam filters can help block a
significant portion of mail bombs.
• Email Limits: Setting limits on the number of emails that can be received
per hour or day can mitigate the impact.
• Dedicated Spam Servers: Using separate servers for spam can isolate the
attack and protect primary email systems.
• Network Security: Implementing firewalls and intrusion prevention
systems can help prevent mail bomb attacks.
• User Education: Educating users about the risks of opening suspicious
emails can help prevent accidental participation in mail bomb attacks.
2.11 EXPLOITATION
• Exploitation in cybercrime refers to the malicious use of vulnerabilities in
systems, networks, or individuals to achieve illicit gains.
• Cybercriminals exploit weaknesses to steal data, disrupt services, or commit
financial fraud.
Types of Exploitation in Cybercrime:
1. Vulnerability Exploitation:
o Software vulnerabilities: Cybercriminals target bugs or flaws in
software applications to gain unauthorized access, such as through
outdated or poorly coded programs.
o System vulnerabilities: Weaknesses in operating systems or
network infrastructures are exploited to bypass security measures
or gain control over systems.
o Hardware vulnerabilities: Flaws in physical devices (e.g., USB
ports or IoT devices) are exploited to compromise systems or steal
data.
2. Human Exploitation:
o Social engineering: Attackers manipulate individuals into
revealing sensitive information or taking actions that compromise
security, such as installing malware.
o Phishing: Deceptive attempts to trick users into clicking malicious
links or providing personal information, often appearing as
legitimate emails or websites.
o Spear phishing: A targeted form of phishing where attackers focus
on specific individuals or organizations, making the attack more
personalized and convincing.
o Identity theft: Criminals steal personal information to impersonate
victims and carry out fraudulent activities, such as making
unauthorized purchases.
3. Data Exploitation:
o Data breaches: Unauthorized access to sensitive data by hackers
or insiders, often leading to the exposure of personal, financial, or
proprietary information.
o Data leakage: Accidental or intentional release of confidential
information, either by insiders or through poorly secured systems.
o Data misuse: The use of stolen or leaked data for fraudulent
activities, such as identity theft, financial fraud, or blackmail.
2.12 STALKING AND OBSCENITY IN INTERNET
Cyberstalking is a form of online harassment where an individual uses electronic
communication to repeatedly threaten, intimidate, or monitor another person. The
actions involved can significantly harm the victim's mental health and safety.
Common forms of internet stalking include:
• Sending Unwanted Messages: This involves bombarding the victim with
emails, texts, or social media messages that are unwanted or harassing in
nature.
• Monitoring Online Activity: The stalker may track the victim's online
behavior, such as social media posts, location updates, or browsing
history, without the victim’s consent.
• Impersonating the Victim: Cyberstalkers sometimes create fake profiles
on social media or websites pretending to be the victim. This can be used
to deceive others or damage the victim’s reputation.
• Threatening or Harassing Behavior: This includes using electronic
communication to intimidate or threaten the victim, often causing fear for
their safety.
Obscenity on the Internet:
Obscenity on the internet refers to content that is offensive, inappropriate, or
sexually explicit in nature, often violating community standards. It may include:
• Pornographic Material: Content that is sexually explicit and often shared
or spread illegally.
• Explicit or Offensive Language: Text or images that contain vulgar
language, racial slurs, or obscene gestures.
• Inappropriate Content for Minors: Websites, videos, or online materials
that expose minors to inappropriate sexual or explicit content.
Types of Cyberstalking:
Cyberstalking can manifest in many forms. Here are some common types:
• Catfishing: This involves creating fake online profiles or stealing existing
ones to deceive and manipulate the victim. The stalker often uses this
tactic to gain the victim's trust and control over them.
• Monitoring Check-ins on Social Media: Stalkers may monitor the
victim's social media activity, including check-ins and posts, to track their
behavior and routine.
• Spying via Google Maps and Street View: Stalkers use tools like Google
Maps and Street View to identify a victim’s location, often using publicly
shared photos or posts to piece together where the victim may be.
• Hijacking Webcam: Cyberstalkers can infect a victim's computer with
malware that gives them access to the victim’s webcam, allowing them to
spy on the victim without their knowledge.
• Installing Stalkerware: Stalkerware is malicious software installed on a
victim's device to monitor their activities, including text messages,
browsing history, and even recording audio, all without the victim’s
knowledge.
Common Examples of Cyberstalking:
• Sending offensive or suggestive messages online.
• Joining groups or forums that the victim participates in to keep tabs on
them.
• Sending threatening, controlling, or lewd emails or messages.
• Creating fake social media profiles to observe or interact with the victim.
• Gaining unauthorized access to the victim’s online accounts.
• Posting or sharing photos (real or altered) of the victim without consent.
• Trying to obtain explicit images of the victim.
• Tracking the victim’s online movements through tracking devices.
• Regularly sending explicit photos or messages.
• The rapid evolution of technology and its integration into our daily lives has
necessitated the development of specific legal frameworks to address the
unique challenges posed by the digital world.
• Digital laws serve several critical purposes:
- Protecting individuals: Safeguarding personal information,
privacy, and online safety.
- Facilitating e-commerce: Creating a legal environment that
supports online transactions and consumer protection.
- Combating cybercrime: Establishing legal frameworks for
investigating, prosecuting, and preventing cybercrimes.
- Intellectual property protection: Safeguarding digital content
and inventions.
Example of Digital Laws
Essay questions
Unit-II
1. Explain the concept of unauthorized access to computers and its
implications for data security.
2. Discuss the tools and techniques used in detecting and mitigating
computer intrusions.
3. Analyze the impact of white-collar cyber crimes on the economy and trust
in digital systems.
4. Explain how viruses and malicious codes are created, spread, and their
effects on computer systems.
5. Differentiate between hacking and cracking, with examples of their
methods and motives.
6. What are virus attacks? Discuss their methods of propagation and their
impact on systems and networks.
7. Discuss the ethical, social, and legal challenges in controlling cyber
pornography.
8. Discuss the measures taken by organizations and governments to prevent
software piracy.
9. Discuss the role of international laws and agreements in protecting
intellectual property rights.
10. Explain the concept of mail bombs and their impact on email
communication systems.
11. Discuss the measures taken to address exploitation, stalking, and
obscenity on the internet.
12. Analyze the challenges faced in enforcing digital laws across international
borders.
13. Explain the role of law enforcement agencies in investigating and
preventing cyber crimes.