Chapter 1 - Cyber Security
Chapter 1 - Cyber Security
Introduction to
Cybercrime
Introduction
.
Cybercrime and Information Security
Indian Information Technology Act (ITA 2008) provides a new
focus on “Information Security in India.”
• The law on defamation attempts to create a workable balance between two equally
important human rights
Internet time theft occurs when an unauthorized person uses the Internet hours
paid for by another person.
It comes under hacking because the person gets access to someone else’s ISP
user ID and password, either by hacking or by gaining access to it by illegal
means
Data Diddling
A data diddling attack involves altering raw data just before it is processed by a
computer and then changing it back after the processing is completed.
Electricity Boards in India have been victims to data diddling programs inserted
when private parties computerize their systems.
Forgery
• Forging counterfeit currency notes, postage and revenue stamps,
marksheets, etc. using sophisticated computers, printers and scanners.
Web Jacking
• Web jacking occurs when someone forcefully takes control of a website (by
cracking the password and later changing it).
Newsgroup Spam/Crimes Emanating from Usenet Newsgroup
• The advent of Google Groups, and its large Usenet archive, has
made Usenet more attractive to spammers than ever.
• Spamming of Usenet newsgroups actually predates E-Mail Spam.
They possess the desire to destruct and they get enjoyment out of
such destruction.
.
Cracker: A cracker is a person who breaks into computers. Crackers
should not be confused with hackers. The term “cracker” is usually
connected to computer criminals. Some of their crimes include
vandalism, theft and snooping in unauthorized areas.
Online Frauds
Types of crimes under the category of hacking
Spoofing website and E-Mail security alerts
Hoax mails about virus threats
lottery frauds
Spoofing.
Spoofing websites and E-Mail security threats
o Fraudsters create authentic looking websites that are actually nothing but
a spoof.
o The purpose of these websites is to make the user enter personal
information which is then used to access business and bank accounts
o This kind of online fraud is common in banking and financial sector.
o It is strongly recommended not to input any sensitive information that
might help criminals to gain access to sensitive information, such as bank
account details, even if the page appears legitimate.
Virus hoax E-Mails
o The warnings may be genuine, so there is always a dilemma
whether to take them lightly or seriously.
o A wise action is to first confirm by visiting an antivirus site such
as McAfee, Sophos or Symantec before taking any action, such
as forwarding them to friends and colleagues.
Lottery frauds
.
Pornographic Offenses
“Child pornography” includes:
1. Any photograph that can be considered obscene and/or
unsuitable for the age of child viewer;
2. film, video, picture;
3. computer-generated image or picture of sexually explicit
conduct where the production of such visual depiction involves
the use of a minor engaging in sexually explicit conduct.
Password Sniffing
Password Sniffers are programs that monitor and record the name and
password of network users as they login, jeopardizing(harm) security at
a site.
Sniffing is a process of
Capturing packets of data
Being sent across a
network.
.
Credit Card Frauds
Identity Theft
2024
In the first four months of 2024, the I4C reported 740,957
cybercrime complaints.
Economic impact
Cybercrime is estimated to cost the global economy over $8 trillion
in 2023, and could reach over $11 trillion. By 2026, the cost is
CYBERCRIME ERA: SURVIVAL MANTRA FOR THE
NETIZENS
• The term “Netizen” was coined by Michael Hauben.
• Quite simply, “Netizens” are the Internet users.
• Therefore, by corollary, “Netizen” is someone who spends
considerable time online and also has a considerable presence
online (through websites about the person, through his/her active
blog contribution and/or also his/her participation in the online
chat rooms).
• The 5P Netizen mantra for online security is:
a. Precaution
b. Prevention
c. Protection
d. Preservation