Chapter 1 - Cyber Security
Chapter 1 - Cyber Security
Introduction to
Cybercrime
A6562 - Cyber Security
Course Description
Course Overview
This Course provides a comprehensive overview of how to
integrate cloud and mobile technology. It is an emerging field
and this course explores how distributed resources can be
shared by mobile users in different ways and issues arising
there from. This course also provides understanding of
Architecture, Applications of Mobile Cloud Computing along
with Offloading concept and Resource allocation techniques.
This also introduces concept called Green Mobile Computing
and also discusses about the security issues in Mobile Cloud
Computing. This course enables the student to choose as
research area of interest.
Course Pre/co-requisites
A6510 - Computer Networks
A6552 - Network Security and Cryptography
Course Outcomes (COs)
After the completion of the course, the student will be able to:
A6562.1 Identify the cybercrimes and offences in the network
accesses.
A6562.2 Interpret the criminal plans before going to attack.
A6562.3 Choose various security measures on mobile devices
for a given scenario and make an effective report.
A6562.4 Identify the various methods and tools in Cyber
Crime.
A6562.5 Examine how to protect our organization from
intruders, attackers and cyber criminals.
Course Syllabus
Introduction to Cybercrime: Introduction, Cybercrime, and
Information Security, who are Cybercriminals, Classifications of
Cybercrimes. Cybercrime: The legal Perspectives and Indian
Perspective, Cybercrime and the Indian ITA 2000, A Global
Perspective on Cybercrimes.
Cyber Offenses: How Criminals Plan Them: Introduction, How
Criminals plan the Attacks, Social Engineering, Cyber stalking,
Cyber cafe and Cybercrimes. Botnets: The Fuel for Cybercrime,
Attack Vector, and Cloud Computing.
Cybercrime -Mobile and Wireless Devices: Introduction,
Proliferation of Mobile and Wireless Devices, Trends in Mobility,
Credit card Frauds in Mobile and Wireless Computing Era,
Security Challenges Posed by Mobile Devices, Registry Settings
for Mobile Devices, Authentication service Security, Attacks on
Mobile/Cell Phones, Mobile Devices: Security Implications for
Organizations, Organizational Measures for Handling Mobile,
Organizational Security Policies an Measures in Mobile
Computing Era, Laptops.
Tools andMethods Used in Cybercrime: Introduction, Proxy
Servers and Anonymizers, Phishing, Password Cracking,
Keyloggers and Spywares, Virus and Worms, Trojan Horse and
Backdoors, Steganography, DoS and DDoS attacks, SQL
Injection, Buffer Overflow.
Cyber Security: Organizational Implications Introduction,
Cost of Cybercrimes and IPR issues, Web threats for
Organizations, Security and Privacy Implications. Social media
marketing: Security Risks and Perils for Organizations, Social
Computing and the associated challenges for Organizations.
Books and Materials
Text Books:
1. Nina Godbole and Sunil Belapure., Cyber Security: Understanding
Cyber Crimes, Computer Forensics and Legal Prespectives, 1st
Edition, Wiley INDIA, 2011.
Reference Books:
1. James Graham, Richard Howard and Ryan Otson., Cyber Security
Essentials, 1st Edition,CRC Press, 2011.
2. Chwan-Hwa(John), Wu,J.David Irwin., Introduction to Cyber
Security, 1st Edition, CRC Press T&F Group, 2013.
3. Richard A. Clarke, Robert Knake., Cyberwar: The Next Threat to
Introduction
Internet has undeniably opened a new way of exploitation known as
cybercrime involving the use of computers, the Internet, cyberspace and the
worldwide web (WWW).
Spamming
• People who create electronic Spam are called spammers.
• Spam is the abuse of electronic messaging systems to send unsolicited bulk
messages indiscriminately.
• Spamming is widely detested, and has been the subject of legislation in
many jurisdictions – for example, the CAN-SPAM Act of 2003.
Search engine spamming
Spamming is alteration or creation of a document with the intent to
deceive(to believe something that is not true) an electronic catalog or filing
system.
Some web authors use “subversive techniques” to ensure that their site
appears more frequently or higher number in returned search results.
Cyberdefamation
• “Cyberdefamation” occurs when defamation(action of damaging the good
reputation) takes place with the help of computers and/or the According to
the IPC Section 499:
1. It may amount to defamation to impute(represent as being done) anything
to a deceased person, if the imputation would harm the reputation of that
person if living, and is intended to be hurtful to the feelings of his family or
other near relatives.
2. It may amount to defamation to make an imputation concerning a company,
association, or a collection of persons.
3. An imputation in the form of an alternative or expressed
ironically(sarcastically), may amount to defamation.
4. No imputation is said to harm a person’s reputation unless that imputation
directly or indirectly, in the estimation of others, lowers the moral or
intellectual character of that person, or lowers the character of that person in
respect of his caste or his calling, or lowers the credit of that person.
4. No imputation is said to harm a person’s reputation unless that imputation
directly or indirectly, in the estimation of others, lowers the moral or
intellectual character of that person, or lowers the character of that person in
respect of his caste or of his calling, or lowers the credit of that person, or
causes it to be believed that the body of that person is in a
loathsome(dislikable) state or in a state generally considered as disgraceful.
• The law on defamation attempts to create a workable balance between two
equally important human rights
1. The right to an unimpaired(un shrink) reputation
2. The right to freedom of expression
Internet Time Theft
Internet time theft occurs when an unauthorized person uses the
Internet hours paid for by another person.
It comes under hacking because the person gets access to someone
else’s ISP user ID and password, either by hacking or by gaining
access to it by illegal means
Data Diddling
A data diddling attack involves altering raw data just before it is
processed by a computer and then changing it back after the
processing is completed.
Electricity Boards in India have been victims to data diddling
programs inserted when private parties computerize their systems.
Forgery
• Forging counterfeit currency notes, postage and revenue stamps, marksheets, etc.
using sophisticated computers, printers and scanners.
Web Jacking
• Web jacking occurs when someone forcefully takes control of a website (by cracking
the password and later changing it).
Newsgroup Spam/Crimes Emanating from Usenet Newsgroup
• This is one form of spamming. The word “spam” was usually taken to mean
excessive multiple posting(EMP)
• The advent of Google Groups, and its large Usenet archive, has made Usenet more
attractive to spammers than ever.
• Spamming of Usenet newsgroups actually predates E-Mail Spam.
Industrial Spying/Industrial Espionage
• “Spies” can get information about product finances, research and development and
marketing strategies, an activity known as “industrial spying.”
• “Targeted Attacks” - applies very well to organizations that are victim of focused
attacks aiming at stealing corporate data, Intellectual Property or whatever else that
may yield a competitive advantage for a rival company.
• There are two distinct business models for cybercrime applied to industrial spying
Selling Trojan-ware
Selling Stolen Intellectual Property.
Hacking
Hackers, crackers and phrackers are some of the oft-heard terms. The original
meaning of the word “hack” meaning an elegant, witty or inspired way of doing
almost anything originated at MIT.
Online Frauds
Types of crimes under the category of hacking
Spoofing(imitate) website and E-Mail security alerts
Hoax(a plan to deceive a large group of people) emails about virus threats
lottery frauds
Spoofing.
Spoofing websites and E-Mail security threats
o Fraudsters create authentic looking websites that are actually nothing but a spoof.
o The purpose of these websites is to make the user enter personal information
which is then used to access business and bank accounts
o This kind of online fraud is common in banking and financial sector.
o It is strongly recommended not to input any sensitive information that might help
criminals to gain access to sensitive information, such as bank account details,
even if the page appears legitimate.
Virus hoax E-Mails
o The warnings may be genuine, so there is always a dilemma whether to take them
lightly or seriously.
o A wise action is to first confirm by visiting an antivirus site such as McAfee, Sophos
or Symantec before taking any action, such as forwarding them to friends and
colleagues.
Lottery frauds
o Typically letters or E-Mails that inform the recipient that he/she has won a prize in
a lottery.
o To get the money, the recipient has to reply, after which another mail is received
asking for bank details so that the money can be directly transferred.
Spoofing
o A hacker logs-in to a computer illegally, using a different identity than his own.
o He creates a new identity by fooling the computer into thinking that the hacker
is the genuine system operator and then hacker then takes control of the
system.
Pornographic Offenses
“Child pornography” includes:
1. Any photograph that can be considered obscene and/or unsuitable for the age
of child viewer;
2. film, video, picture;
3. computer-generated image or picture of sexually explicit conduct where the
production of such visual depiction involves the use of a minor engaging in
sexually explicit conduct.
As the broad-band connections get into the reach of more and more homes,
larger child population will be using the Internet and therefore greater would
be the chances of falling victim to the aggression of pedophiles.
Software Piracy
Theft of software through the illegal copying of genuine programs or the
counterfeiting and distribution of products intended to pass for the original.
Those who buy pirated software have a
lot to lose:
(a) getting untested software that may
have been copied thousands of times
over
(b) the software, if pirated, may
potentially contain hard-drive-
infecting viruses
(c) there is no technical support in the
case of software failure, that is, lack
of technical product support
available to properly licensed users
(d) there is no warranty protection,
(e) there is no legal right to use the
product, etc.
Economic impact of software piracy is
grave (see Fig. 4).
Computer Sabotage
It is the use of the Internet to hinder the normal functioning of a computer system
through the introduction of worms, viruses or logic bombs. It can be used to gain
economic advantage over a competitor, to promote the illegal activities of terrorists
or to steal data or programs for extortion purposes. Logic bombs are event-
dependent programs created to do something only when a certain event (known as a
trigger event) occurs. Some viruses may be termed as logic bombs.