Cyber Security-Unit-I
Cyber Security-Unit-I
Mr.V.Yuvaraj
Assistant Professor – Department of Computer Applications
Dr. N.G.P. ARTS AND SCIENCE COLLEGE
Dr. N.G.P.-KALAPATTI ROAD
COIMBATORE-641 048
Tamil Nadu, India
Mobile: +917502919891,
E-mail: [email protected]
Dr. NGPASC
COIMBATORE | INDIA
UNIT-I
Unit I
Introduction to Cybercrime
Cybercrime and Information Security – Who are
Cybercriminals? – Classification of Cybercrimes : E-Mail
Spoofing, Spamming, Cyberdefamation, Internet Time
Theft, Salami Attack, Data Diddling, Forgery, Web Jacking,
Newsgroup Spam, Industrial Spying, Hacking, Online
Frauds, Pornographic Offenses, Soft Piracy, Computer
Sabotage, E-Mail Bombing, Computer Network Intrusions,
Password Sniffing, Credit Card Frauds, Identity Thefts.
Dr. NGPASC
COIMBATORE | INDIA
Introduction to Cyber crime
The internet in India is growing rapidly. It has given
rise to new opportunities in every field we can think
of be it entertainment, business, sports or
education.
Dr. NGPASC
COIMBATORE | INDIA
Cybercrime definitions
• A crime conducted in which a computer was directly
and significantly instrumental is known as “Computer
Crime”.
• Computer crime as also other various definitions :
– Any threats to the computer itself, such as theft of
hardware or software and demands for ransom.
– Any financial dishonesty that takes place in a computer
environment.
Dr. NGPASC
COIMBATORE | INDIA
Cyber Crime definitions…
Dr. NGPASC
COIMBATORE | INDIA
Cyberspace
Dr. NGPASC
COIMBATORE | INDIA
Cyberspace
Dr. NGPASC
COIMBATORE | INDIA
Cyber squatting
Dr. NGPASC
COIMBATORE | INDIA
Cyberpunk
• The word “cyber” and “punk” are two different
words which means “disorder via machine”.
• The word cyberpunk was coined by writer Bruce
Bethke, who wrote a story with that title in 1982. He
derived the term from the words cybernetics, the
science of replacing human functions with
computerized ones, and punk, the harsh music that
developed in the youth culture during the 1970s and
'80s.
Dr. NGPASC
COIMBATORE | INDIA
• The movies based on cyberpunk are :
– Terminator I, II and III
– Until the end of the world
– Mad MAX I, II and III
– The Matrix (series)
– The X-Files
– Solaris
Dr. NGPASC
COIMBATORE | INDIA
Cyber warfare
• Defn: Information warriors unleashing vicious attacks against
an unsuspecting opponent’s computer networks, wreaking
havoc and paralyzing nations.
• Cyber warfare refers to politically motivated hacking.
• Attack on information infrastructure.
• information infrastructure refers to information resources,
including communication systems that support an industry,
institution or population.
• Example :
– Pentagon planning.
Dr. NGPASC
COIMBATORE | INDIA
Cyberterrorism
• Cyberterrorism is the premeditated , politically motivated
attack against information, computer systems, computer
programs and data which result in violence against
noncombatant targets by sub national groups or clandestine
agents.
• Cyber terrorism is “any person, group or organization who
with terrorist intent, utilizes, accesses or aids in accessing a
computer or computer network or electronic system or
electronic device by any available means and there by
knowingly engages in a terrorist act.
Dr. NGPASC
COIMBATORE | INDIA
Cybercrime and Information Security
Dr. NGPASC
COIMBATORE | INDIA
Who are Cybercriminals
• Cybercrime involves such activities like
– Child pornography
– Credit card fraud
– Cyberstalking (irritation)
– Defaming another online
– Gaining unauthorized access to computer system
– Overriding encryption to make illegal copies
– Software piracy
– Stealing another’s identity to perform criminal act.
Dr. NGPASC
COIMBATORE | INDIA
Types of Cybercriminals
Dr. NGPASC
COIMBATORE | INDIA
Type 1: Hungry for recognition
• Hobby hackers
• IT professionals
• Politically motivated hackers
• Terrorist organizations.
Dr. NGPASC
COIMBATORE | INDIA
Type 2: Not interested in recognition
• Psychological spoiled
• State-sponsored hacking
• Organized criminals
Dr. NGPASC
COIMBATORE | INDIA
Type 3 : The insiders
Dr. NGPASC
COIMBATORE | INDIA
Classifications of Cybercrimes
• Cybercrime against individual
Dr. NGPASC
COIMBATORE | INDIA
Cybercrime against individual
• Email spoofing
• Phishing
• Spamming
• Cyberdefamation
• Cyberstalking and harassment
• Pornographic offense
• Password sniffing
Dr. NGPASC
COIMBATORE | INDIA
Cybercrime against property
Dr. NGPASC
COIMBATORE | INDIA
Cybercrime against organization
• Password sniffing
• Denial-of-service attacks
• Email bombing
Dr. NGPASC
COIMBATORE | INDIA
• Salami attack
• Logic bomb
• Trojan Horse
• Data diddling
Dr. NGPASC
COIMBATORE | INDIA
• Crimes starts from Usenet newsgroup
• Industrial spying
• Software piracy
Dr. NGPASC
COIMBATORE | INDIA
Cybercrime against society
• Forgery
• Cyberterrorism
• Web jacking
Dr. NGPASC
COIMBATORE | INDIA
E-Mail Spoofing
Dr. NGPASC
COIMBATORE | INDIA
Example
Dr. NGPASC
COIMBATORE | INDIA
Spamming
Dr. NGPASC
COIMBATORE | INDIA
• The another definition of spamming is in the
context of “search engine spamming”.
Dr. NGPASC
COIMBATORE | INDIA
• Repeating keywords
• Use of keywords that do not relate to the
content on the site
• Redirection
• Duplication of pages with different URLs
• Hidden links
Dr. NGPASC
COIMBATORE | INDIA
Cyberdefamation
• The Indian Penal Code says about defamation is
– “Whoever by words either spoken or intended to be read,
or by signs or by visible representations, makes or
publishes any imputation concerning any person
intending to harm or knowing or having reason to believe
that such imputation will harm, the reputation of such
person, is said, except in the cases hereinafter expected,
to defame that person.”
Dr. NGPASC
COIMBATORE | INDIA
• When above happens in electronic form, its
known as Cyberdefamation
• Libel is written defamation and Slander is oral
defamation.
Dr. NGPASC
COIMBATORE | INDIA
Internet Time Theft
Dr. NGPASC
COIMBATORE | INDIA
Salami Attack
Dr. NGPASC
COIMBATORE | INDIA
• For ex. A bank employee inserts a program,
into bank’s servers, that deducts a small
amount of money from the account of every
customer. No account holder will notice this
unauthorized debit, but the bank employee
will make sizable amount.
Dr. NGPASC
COIMBATORE | INDIA
Data diddling
Dr. NGPASC
COIMBATORE | INDIA
Forgery
Dr. NGPASC
COIMBATORE | INDIA
Web Jacking
Dr. NGPASC
COIMBATORE | INDIA
Newsgroup Spam
Dr. NGPASC
COIMBATORE | INDIA
Industrial Spying
Dr. NGPASC
COIMBATORE | INDIA
• One of the interesting case is about The famous
Israeli Trojan story, where a software engineer in
London created a Trojan Horse program specifically
designed to extract critical data gathered from
machines infected by his program.
• He had made a business out of selling his Trojan
Horse program to companies in Israel, which would
use it for industrial spying by planting it into
competitor’s network.
Dr. NGPASC
COIMBATORE | INDIA
Hacking
• Purpose of hacking are many, the main ones
are as follows :
– Greed (Hunger)
– Power
– Publicity
– Revenge
– Adventure
– Desire to access forbidden information
– Destructive mindset
Dr. NGPASC
COIMBATORE | INDIA
• Hackers write or use ready-made computer
programs to attack the target computer.
• Government websites are hot on hacker’s
target lists and attacks on government
websites receive wide press coverage.
Dr. NGPASC
COIMBATORE | INDIA
• In December 2009, NASA’s site was hacked by
SQL Injection.
Dr. NGPASC
COIMBATORE | INDIA
Online Frauds
• This comes under spoofing. The purpose of
spoofing is to make the user enter personal
information which is then used to access
business and bank accounts.
• This kind of online fraud is common in banking
and financial sector.
• It is strongly recommended not to input any
sensitive information that might help criminals
to gain personal information.
Dr. NGPASC
COIMBATORE | INDIA
• Story of Nadya Suleman and her eight babies.
Hacked by MOD (Mother of Disappointment).
• CIA (Central Intelligence Agency), the US
website was hacked.
• Dept. of Justice site defaced.
• Pentagon, the US site defaced.
• Twitter site hacked.
Dr. NGPASC
COIMBATORE | INDIA
Pornographic Offenses
Dr. NGPASC
COIMBATORE | INDIA
How they operate?
Dr. NGPASC
COIMBATORE | INDIA
• They start sending pornographic images/text
to the victim to fed to into his/her mind that
“This is normal and everybody does it”.
• At the end of it, the pedophiles set up a
meeting with the child out of the house and
then use them as a sex object.
Dr. NGPASC
COIMBATORE | INDIA
Software Piracy
Dr. NGPASC
COIMBATORE | INDIA
Disadvantage of piracy
Dr. NGPASC
COIMBATORE | INDIA
• According to the fourth annual BSA (Business
Software Alliance ) and IDC global Software
Piracy study, in Asia pacific 55% of software
installed are illegal.
Dr. NGPASC
COIMBATORE | INDIA
Computer Sabotage
Dr. NGPASC
COIMBATORE | INDIA
Email bombing
Dr. NGPASC
COIMBATORE | INDIA
Usenet Newsgroup
• Usenet is a mechanism that allows sharing
information in a many-to-many manner.
• Usenet mainly used for following crime :
– Distribution/sale of pornographic material
– Distribution/sale of pirated software
– Distribution of hacking software
– Sale of stolen credit card number
– Sale of stolen data
Dr. NGPASC
COIMBATORE | INDIA
Password Sniffing
Dr. NGPASC
COIMBATORE | INDIA
Credit Card Fraud
Dr. NGPASC
COIMBATORE | INDIA
Identity theft
Dr. NGPASC
COIMBATORE | INDIA
Computer Network Intrusions
Dr. NGPASC
COIMBATORE | INDIA
Questions
Dr. NGPASC
COIMBATORE | INDIA
5. Define the following terms
1. Cyberterrorism
2. Cyberpunk
3. Cyberdefamation
4. Cyberwarefare
Dr. NGPASC
COIMBATORE | INDIA
Dr. NGPASC
COIMBATORE | INDIA 64