CS Unit-4
CS Unit-4
• Cyber Law is a framework created to give legal recognition to all risks arising
out of the usage of computers, computer network or related technology.
• “Cyber Law” is a term used to describe the legal issues related to use of
Computer and Communications Technology.
• The Indian Parliament passed the Information Technology Bill on 17th May
2000, known as the ITA 2000, aimed at providing legal infrastructure for E-
Commerce in India.
Cyber Crime Classification
• We can categorize Cyber crimes in two ways
– The Computer as a Target :- using a computer to attack other
computers. e.g. Hacking, Virus/Worm attacks, DOS attack etc.
– The Computer as a Weapon :- using a computer to commit real world
crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT
frauds, Pornography etc.
• Types of Cybercrime
1. Cybercrime against individual
2. Cybercrime against property
3. Cybercrime against organization
4. Cybercrime against society
5. Crimes originating from Usenet newsgroup
Cont...
Cont...
• Cybercrime against individual
The term cybercrime against the individual refers to those criminal
offences which are committed against an individual. Such cybercrime
affects the individual’s personality.
Cont...
• Electronic mail (E-Mail) Spoofing: E-mail spoofing is the forgery of an e-mail
header so that the message appears to have originated from someone or
somewhere other than the actual source.
• Vishing: Vishing is the criminal practice of using social engineering over the
telephone system, most often using features facilitated by VoIP, to gain access
to personal and financial information from the public for the purpose of
financial reward. The term is a combination of V-voice and Phishing.
Cont...
• Smishing: The name is derived from “SMs PhISHING”. Smishing uses cell phone
text messages to deliver a lure message to get the victim to reveal his/her
personal information.
• Cyber stalking and harassment: Cyber stalking refers to the use of internet
and/or other electronic communication devices to stalk another person. It
involves repeatedly harassing or threatening an individual via the internet or
other electronic means of communication.
• An attack vector is a path or means by which a hacker (or cracker) can gain
access to a computer or network server in order to deliver a payload or
malicious outcome.
• Attack vectors are routes or methods used to get into computer systems,
usually for malicious purposes.
• They take advantage of known weak spots to gain entry. Many attack
vectors take advantage of the human element in the system, because that's
often the weakest link.
Cont...
Cont...
• An attack vector is a path or means by which a hacker can gain access to a
computer or network server in order to deliver a malicious payload or malware.
• Attack vectors include viruses, e-mail attachments, Web pages, pop-up windows,
instant messages, chat rooms, and deception. All of these methods involve
programming except deception
• To some extent, firewalls and anti-virus software can block attack vectors. But no
protection method is totally attack-proof.
Cont...
Malicious macros
• Microsoft Word and Microsoft Excel are some of the examples that
allow macros.
cyber space and criminal behaviour
• Cyberspace refers to the virtual space that provides the infrastructure, electronic
medium and related elements necessary for online global communication.
• It can be thought of as the second life space where human beings operate for
social interactions, entertainment, business operations as well as for personal
activities and interests.
• The term cyberspace first came into existence in various contexts in visual arts and
science fiction during 1940, 1960 and 1984.
• However, the first reference was made by the founder of Electronic Frontier
Foundation, in the year 1990 and later in 1991 by Mr. Benedict, which is close to
the existing relationship of computer and telecommunication systems.
Cont...
• Cyberspace is worldwide network of computer networks for communication
and exchange of data using TCP/IP.
• Cyberspace is most definitely a place where you chat, explore, research and
play.
• The Information or Digital Revolution has created a new forum for both
terrorist activity and criminal behavior.
• The cybercriminals are categorized based on motive into following groups:
• Cybercriminals- hungry for recognition
– Hobby hackers, IT professionals, Politically motivated hackers, Terrorist
organizations
Cont...
• The advent of the computer has changed the way individuals behave.
• A similar point can be made about Criminal behavior; namely, a significant
amount of crimes are connected to technology.
• In common fraud scams the criminals gathers the information by phishing
and spoofing leading to identity theft.
• Crimes related to health care, insurances are also performed by hacking and
forging identities.
• Cyber harassment and defamation especially the cases of pedophiles' and
stalkers use false identities to trap the children and teenagers.
Cont...
Cybercrime
• A specific term used to refer to any criminal activity which has been
committed through or facilitated by the Internet.
Digital-crime
• A term used to refer to any criminal activity which involves the
unauthorized access, dissemination, manipulation, destruction, or
corruption of electronically stored data.
Traditional Problems
• Gathering information and then prioritizing individual incidents and steps for
a response.
6) Recovery
• Develop a near-term remediation strategy and roadmap
• Focus on resuming normal business operations
• Develop a long-term risk mitigation strategy
• Document the incident to improve the IR plan and update security measures
to avoid such incidents in future
Digital Forensics
• Digital forensics is a fairly novel science.
• Digital forensics is as “the collection of techniques, proven methods and
tools used to find digital evidence derived from digital sources ”.
• Computer forensics generally focuses on particular methods for extracting
evidence from a specific platform, whereas digital forensics needs to be
formed in such a way that it covers all types of digital devices, including
future digital technologies.
• Regrettably, there is no regular or consistent digital forensic methodology.
• However there are a number of procedures and tools based on experiences
of law enforcement, system administrators and hackers.
• Gather evidence by applying approved methods that will reliably extract and
analyze evidence without bias or modification is challenging task.
COMPUTER LANGUAGE
• Computers are the mechanism through which raw information (i.e., data) is
processed.
• Although raw data may seem complex to understand, the structure of data is
actually very basic, and is based on a binary language.
• The smallest piece of data is called a bit.
• Each bit has two possible electrical states, on (1) or off (0).
• Thus, raw data is a series of 1s and 0s. Of course, raw data is difficult to interpret
by users, so computers group bits together to provide identifiable meaning.
• The smallest such grouping occurs when eight bits are combined to form a byte.
• Each byte of data represents a letter, number, or character. Forexample, the raw
data sequence of 01000001 appears to the user as the capital letter “A.”
• As stored information has increased, the data capacity of computers is also
increased from kilobytes (KB) to megabytes (MB) to gigabytes (GB), terabytes (TB).
Network Language
• Few most commonly used terms in network language are as follows:
1. TCP/IP
2. IMAP
3. POP
4. Routers
5. Hubs
6. Packets
7. Cookies
8. DNS
Cont...
TCP/IP
• TCP/IP stands for Transmission Control Protocol/Internet Protocol.
• It refers to the suite of protocols that define the Internet.
• TCP is a method of communication between programs which enables a bit-
stream transfer of information.
• Originally proposed and designed as the standard protocol for ARPANet, but
now TCP/IP software is available for every major kind of computer operating
system.
• Luckily, it is now built into many of the most common operating
systems.
Cont...
IMAP
• IMAP stands for Internet Message Access Protocol.
• It is an internet standard protocol used by email clients to retrieve email
messages from a mail server over a TCP/IP connection.
• E-mail stored on an IMAP server can be manipulated from anywhere without
the need to transfer messages or files back and forth between the computers.
Routers
• Routers are defined as special-purpose computers that handle the connection
between two or more networks.
• Routers spend all their time looking at the destination addresses of the packets
passing through them and deciding which route to send them on.
Cont...
POP
• POP stands for Post Office Protocol.
• Post Office Protocol is a standard mail protocol used to receive emails from a
remote server to a local email client.
• It allows you to download email messages on your local computer and read
them even when you are offline.
• It was designed to support offline/local email processing.
• Once the messages are downloaded, they are deleted from the mail server.
• This mode of access is not compatible with access from multiple computers.
Cont...
Hubs
• Hub is used for connecting multiple computers or segments of a LAN.
• Hubs are central switching devices for communications lines in a star topology.
• Hubs may be added to bus topologies, for example, a hub can turn an Ethernet
network into a star topology to improvetroubleshooting.
Packets
• Packets are the basic units of communication over a TCP/IP network.
• They are defined as units of data exchanged between host computers.
• A packet is a string of bits divided into three main sections:
1. A set of headers
2. The payload, the actual data being transmitted
3. The trailer, sometimes called the footer
Cont...
Cookies
• Cookies are small pieces of information that an HTTP server sends to the individual
browser upon the initial connection.
• Not all browsers support cookies. However, most popular browsers such as MS Internet
Explorer 3.0 or higher and Netscape Navigator 2.0 and higher.
• Cookies might contain information such as login or registration information, online
“shopping cart” information, user preferences, and so on.
• When a server receives a request from a browser that includes a cookie, the server is
able to use the information stored in the cookie.
• Cookies do not steal information. They simply act as storage platforms for information
that a user has supplied.
Cont...
DNS
• DNS stands for Domain Name System.
• Domain Name System is a hierarchical and decentralized naming system for
computers, services, or other resources connected to the Internet or a private network.
• DNS eases the translation of IP addresses through the utilizationof hierarchical
principles.
• Traditional top-level domain names include com (commercial organization), edu
(educational institutions), gov (government organizations), org (nonprofit
organizations), and net (Internet
access providers).
Realms of the Cyber world
• Basically, there are three different levels of networked systems: intranets,
internets, and the Internet.
• Intranets are small, local networks connecting computers which are within one
organization and which are controlled by a common system administrator.
• internets, on the other hand, connect several networks, and are distinguished
in the literature by a lower case (i.e., internet as opposed to Internet).
• These networks are usually located in a small geographic area, and share a
common protocol (usually TCP-Transmission Control Protocol/ IP-Internet
Protocol).
• The Internet, on the other hand, is the largest network in the world, an
international connection of all types and sizes of computer systems and
networks. It is a system of small networks of computers linked with other
networks via routers and software protocols.
Recognizing and Defining Computer Crime
• It is unclear exactly when and where the first “computer crime” actually
occurred.
• Contextually, theft of an abacus or a simple adding machine would constitute
a computer crime.
• It is safe to assume that these types of activities occurred long before written
or formal documentation was in vogue.
• However, the first documented instance of computer disruption occurred in
the early Nineteenth Century, when a textile manufacturer named Joseph
Jacquard developed what would soon become the precursor to the
computer card.
• His invention, which allowed repetitive automation of a series of steps in the
weaving of special fabrics, was not popular among his workers, who feared
for their continued employment. Thus, they dismantled his invention.
Contemporary Crime (Modern Crime)
• Legislative bodies have been slow to respond to the potentiality of
contemporary computer crime in the Twenty-first Century.
• In fact, the steps made in electronic communications and point-and-click
platforms have enabled a variety of criminally minded people to expand their
limits.
• who would never walk into an adult book store in search of photographs or
videos, download those same materials in the privacy of their home from
web.
• Instead of looting bank with a gun criminal may feel comfortable altering
bank records or manipulating stock records using cyber technology.
• Revenge through traditional avenues, may feel completely confident in
posting embarrassing or compromising information on the web.
Contaminants and Destruction of Data
• Data destruction is the process of destroying data stored on tapes, hard disks and
other forms of electronic media so that it is completely unreadable and cannot be
accessed or used for unauthorized purposes.
• Data contamination The alteration, maliciously or accidentally, of data in a
computer system.
• Environment surrounding of data storage area may affect on the stored data.
• Five most commonly experienced culprits of data loss
1. Power Outage
2. Virus, Malware, or Attack
3. Natural Disaster
4. Human Error
5. Equipment Failure or Malfunction
Indian IT ACT 2000
• Let us look into some common cyber-crime scenarios which can attract
prosecution as per the penalties and offences prescribed in IT Act 2000
(amended via 2008) Act.
1. Harassment via fake public profile on social networking site
– A fake profile of a person is created on a social networking site with the
correct address, residential information or contact details but he/she is
labeled as ‘prostitute’ or a person of ‘loose character’. This leads to
harassment of the victim.
– Provisions Applicable: Sections 66A, 67 of IT Act and Section 509 of the
Indian Penal Code.
Cont...
2. Online Hate Community
Online hate community is created inciting a religious group to act or pass
objectionable remarks against a country, national figures etc.
Provisions Applicable: Section 66A of IT Act and 153A & 153B of the Indian Penal
Code.
3. Email Account Hacking
If victim’s email account is hacked and obscene emails are sent to people in
victim’s address book.
Provisions Applicable: Sections 43, 66, 66A, 66C, 67, 67A and 67B of IT Act.
4.Credit Card Fraud
Unsuspecting victims would use infected computers to make online transactions.
Provisions Applicable: Sections 43, 66, 66C, 66D of IT Act and section 420 of the
IPC.
Cont...
5. Web Defacement
– The homepage of a website is replaced with a pornographic or
defamatory page. Government sites generally face the wrath of hackers
on symbolic days.
– Provisions Applicable: Sections 43 and 66 of IT Act and Sections 66F, 67
and 70 of IT Act also apply in some cases.
6. Introducing Viruses, Worms, Backdoors, Rootkits, Trojans, Bugs
– All of the above are some sort of malicious programs which are used to
destroy or gain access to some electronic information.
– Provisions Applicable: Sections 43, 66, 66A of IT Act and Section 426 of
Indian Penal Code.
Cont...
7. Cyber Terrorism
Many terrorists are use virtual (GDrive, FTP sites) and physical storage
media(USB’s, hard drives) for hiding information and records of their illicit
business.
Provisions Applicable: Conventional terrorism laws may apply along with Section
69 of IT Act.
9.Cyber Pornography
Among the largest businesses on Internet. Pornography may not be illegal in many
countries, but child pornography is.
Provisions Applicable: Sections 67, 67A and 67B of the IT Act.
Cont...
10. Phishing and Email Scams
– Phishing involves fraudulently acquiring sensitive information through
masquerading a site as a trusted entity. (E.g. Passwords, credit card
information).
– Provisions Applicable: Section 66, 66A and 66D of IT Act and Section 420
of IPC.
11. Theft of Confidential Information
– Many business organizations store their confidential information in
computer systems. This information is targeted by rivals, criminals and
disgruntled employees.
– Provisions Applicable: Sections 43, 66, 66B of IT Act and Section 426 of
Indian Penal Code.
Cont...
12. Source Code Theft
– A Source code generally is the most coveted and important "crown jewel"
asset of a company.
– Provisions applicable: Sections 43, 66, 66B of IT Act and Section 63 of
Copyright Act.
13. Tax Evasion and Money Laundering
– Money launderers and people doing illegal business activities hide their
information in virtual as well as physical activities.
– Provisions Applicable: Income Tax Act and Prevention of Money
Laundering Act. IT Act may apply case-wise.
Cont...