Cyber Crime and Law: Name: A.Haritha Roll No:17071D7804 Branch:M.Tech (CNIS)
Cyber Crime and Law: Name: A.Haritha Roll No:17071D7804 Branch:M.Tech (CNIS)
Name: A.HARITHA
Roll No:17071D7804
Branch:M.Tech(CNIS)
The Modern Thief Can Steal More With A Computer Than With A
Gun. Tomorrow's Terrorist May Be Able To Do More Damage
With A Keyboard Than With A Bomb.
WHAT IS CYBER CRIME?
INTRODUCTION
The first recorded cyber crime was recorded in the year 1820.
CONTENTS
Computer As Targets
Contaminants And Destruction Of Data
Indian IT Act 2000
CATEGORIZATION OF CYBERCRIME
Computers can be the target of a criminal activity, a storage place for data about a
criminal activity and/or the actual tool used to commit a crime (planning criminal
activity). One of the most publicized crimes targeting computers involves
unleashing a virus through email.
These crimes are committed by a selected group of criminals. Unlike crimes using
the computer as a tool, these crimes require the technical knowledge of the
perpetrators.
Crimes that primarily target computer networks or
devices include:
• Computer viruses
• Denial-of-service attacks
• Malware (malicious code)
COMPUTER VIRUSES
• Macro virus infect the file that are created from some application or programs which are mainly
contain macro files like doc, ppts, xls, mdb. So basically such virus infect the files with the macros
and also templates and document that are contained in the file. These virus hide in documents that
are shared through network and e-mail.
• Macro virus are relax, bablas , melissa. A, 097m/y2k.
MEMORY RESIDENT VIRUSES
• Resident viruses activated every time the OS runs and end up infecting other opened files. Such virus usually
fix themselves inside the computer memory, hide in RAM. Resident viruses are CMJ, meve, randex,
mrklunky.
OVERWRITE VIRUSES
• Overwrite viruses delete the information from the file partially or completely once it infect a file. It infect only
the file content may be change all the content but the file location and name remains the same, means doesn’t
infect the file name and the location. Overwrite viruses are trj. Reboot, way, trivial.88.D.
DIRECT ACTION VIRUSES
• Direct action virus activate when the file containing virus is executed. The virus take no
other action unless an infected file is executed again. Most viruses avoid this because this is
not so productive, but such virus damage in the past. Direct action viruses are vienna virus.
DIRECTORY VIRUS
• Directory virus is also known by cluster virus and file system virus. This can infect the
computer’s directory by changing the path by indication the location. Such virus located into
the hard disk but affect the entire directory. Directory viruses are die-2 virus.
WEB SCRIPTING VIRUS
• Mostly web pages contain complex code to make their web page content interactive so that
such code exploit that cause undesirable actions. Such virus originate from browser and web
pages. Web scripting viruses include JS.Fortnight that spread via malicious emails.
MULTIPARTITE VIRUS
• This type of virus spread in multiple ways and the taken action depending upon the type of OS
installed and presence of certain files. Most of the time this virus try to hide in computer’s memory
not to infect the hard disk. Multipartite viruses are flip, invader and tequila.
POLYMORPHIC VIRUS
• Polymorphic virus encode and encrypt themselves every time they are going to infect the computer
system. For that they use different encryption methods and algorithms. Since they use different
encryption method each time which is difficult for antivirus to locate and resolve them.
Polymorphism viruses are marburg, tuareg, satan bug, elkern.
WORM
• Worm is very similar to a virus having a capability to self-replicate which is leading to negative
effect on your system. This consume too much system memory and also affect web servers and
network servers. Worm viruses are lovgate.F, sobig.D, trile.C, pswbugbear.B, mapson.
TROJANS HORSES
• This name comes from a software which is very useful software but later do damage you system after run once. This virus
can track the login details of the users who is online. Example as we all know e-banking is very common, so its
vulnerability of tracing your login details whenever your PC is working without the support of strong antivirus.
EMAIL VIRUS
• This virus is spread via email, this will hide an email when recipient opens the mail.
BOOT INFECTORS
• This virus type will include boot sector and master boot record types. While all the viral codes are separated because they
infect the hard disks or the floppy. It include the viruses like the brain virus which is very first wild virus is to be created.
VIRUS PROTECTION METHODS
• Protection of virus is well designed software program which is used in infected computer systems to prevent
from viruses, worms and trojan horses. The main purpose of using virus protection is to remove any malicious
software code which is already infect a computer. Most of the virus protection utilities now bundle anti-
spyware and anti-malware ability that belong to anti-virus protection. To secure internet that include some
additional capabilities like anti-spam, anti-phishing, firewall, optimization of files and file protection.
•
DENIAL-OF-SERVICE ATTACKS
• Denial of service attack (dos) is a cyber attack where the perpetrator seeks to make a
machine or network resource unavailable to its intended users by temporarily or
indefinitely disrupting services of host connected to the internet.
• Denial of services is typically accomplished by flooding the targeted machine or resource
with superfluous requests in an attempt to overloaded systems and prevent some or all
legitimate requests from being fulfilled.
• Criminals of dos attacks often target sites or services hosted on high profile webservers
such as banks or credit card payment gateways,revenge,blackmail and activism can
motivate these attacks.
• The systems which are used for attacking are known as Zombie system’s.
TYPES OF DOS ATTACKS
FLOOD ATTACK
Attacker keeps on flooding victims system with ‘n’ number of pings which result in
huge traffic which the system cannot handle.
PING OF DEATH
The attacker sends huge oversize packet to the victim’s system which causes the
system to freeze or crash.
PREVENTION’S FROM DOS ATTACK
Implementing filters
Disable unused network services
Maintain regular backup
Maintain password policies
Tools such as zombie zapper, rid(remote intrusion detector)
MALWARE (MALICIOUS CODE)
Punishments
• Offences are punishable with imprisonment up to 3 yrs. And/or fine up to Rs. 2 lakh.
Section 69:
• Interception, monitoring of any information regarding the integrity, security or defense of India,
friendly relations with foreign countries.
Punishment
• 2 lakh and /or jail not extending 5yrs
Case study –
Extortion of money through Internet
•The complainant has received a threatening email and demanded protection from
unknown person claiming to be the member of halala gang, Dubai. Police registered a
case u/s. 384/506/511 ipc
.•The sender of the email used the email id [email protected] & [email protected] and
signed as Changes Babar.
•Both the email accounts were tracked, details collected from isp’s & locations were
identified.
• The cyber cafes from which the emails has been made were monitored and the accused
person was nabbed red handed.