Cyber Laws and Security Introduction
Cyber Laws and Security Introduction
Syllabus
UNIT 1: Introduction to Cybercrime, Cyber
offenses
UNIT 2: Cybercrime: Mobile and Wireless
devices
UNIT 3: Tools and method used in Cybercrime
UNIT 4: Computer Forensics
UNIT 5: Security policies and cyber laws
TEXT BOOK:
1. Sunit Belapure and Nina Godbole, “Cyber Security:
Understanding Cyber Crimes, Computer Forensics And
Legal Perspectives”, Wiley India Pvt Ltd, ISBN: 978-81-
265-21791, 2011, First Edition (Reprinted 2018)
2. Dr. Surya PrakashTripathi, RitendraGoyal, Praveen Kumar
Shukla, KLSI. “Introduction to information security and
cyber laws”. Dreamtech Press. ISBN: 9789351194736,
2015.
Unit 1: Learning Objectives
Learn what cybercrime is and appreciate the importance of cybercrime as
a topic.
Understand the different types cybercrime.
Understand the difference between cybercrime and cyberfraud.
Learn about different types of cybercriminals and the motives behind
them
Get an overview of cybercrime scenario in India and global
Understand legal perspective on cybercrime.
Understand different types of cyberattacks.
Get an overview of the steps involved in planning cybercrime
Understand tools used for gathering information about the target
Get an overview on social engineering
Learn about the role of cybercafe in cybercrime
Understand what is cyberstalking
Learn about botnet and attack vector
Get an overview of cloud computing
Unit 2: Learning Objectives
Understand the security challenges
presented by mobile devices and information
systems access in the cybercrime world.
Understand challenges faced by the mobile
workforce and implication under the
cybercrime era.
Mitigation strategy – credit card users.
Security issues due to use of media players
Unit 3: Learning Objectives
Proxy servers and anonymizers
Password cracking
Keyloggers and spywares
Overview of virus and worms
Trojan horses and backdoors
Steganography
DoS attacks
SQL injection
Phishing and its techniques
Identity theft
Unit 4: Learning Objectives
understand the fundamental concepts in
cyberforensics.
Learn what digital evidence means along with
the base term forensics science.
Learn how cyberforensics is used in cybercrime
investigations.
Get an overview of the role of forensic expert.
Understand data privacy issues involved in
cyberforensics.
Understand the challenges faced in
cyberforensics.
Unit 5: Learning Objectives
Cyber laws
Legal perspectives
Course Outcomes
On Successful completion of the course,
the students will be able to:
Explain the classification of cybercrimes
Identify the steps of attacks
Discuss challenges posed by mobile devices
Recognize the attack on mobile networks
Discuss Phishing in cybercrime
Explain the different security challenges to
Indian law
1.1 INTRODUCTION
The internet in India is growing rapidly. It has given rise to
new opportunities in every field we can think of be it
entertainment, business, sports or education.
and will almost always leave an electronic 'calling card' to ensure that
their pseudonym identity is known.
Techno – vandalism: Passive attack
Techno Vandalism is a term used to describe a hacker or cracker who
breaks into a computer system with the sole intent of defacing and or
destroying its contents.
Techno Vandals can deploy 'sniffers' on the Internet to locate soft
(insecure) targets and then execute a range of commands using a variety
of protocols towards a range of ports. If this sounds complex - it is! The
best weapon against such attacks is a firewall which will hide and
Here is how much Indians lost to cyber frauds between
Jan and Apr of 2024
Between January and April 2024, Indian citizens suffered losses
exceeding Rs 1,750 crore due to cybercriminal activities. This
was reported through over 740,000 complaints lodged on the
National Cybercrime Reporting Portal, which is managed by the
Ministry of Home Affairs.
The Indian Cyber Crime Coordination Centre (I4C) stated that in
May 2024, an average of 7,000 cybercrime complaints were
recorded daily, marking a significant surge of 113.7 per cent
compared to the period between 2021 and 2023, and a 60.9 per
cent increase from 2022 to 2023, according to a report in the
Economic Times.
Most victims fell prey to online investment fraud, gaming apps,
algorithm manipulations, illegal lending apps, sextortion, and
OTP scams. In 2023, the I4C reported over 100,000 investment
fraud incidents. Digital arrests resulted in a loss of Rs 120 crore
across 4,599 cases in the initial four months of 2024. Trading
scams accounted for 20,043 cases, leading to a loss of Rs 1,420
crore to cybercriminals during the same period.
1.3 Cybercrime and information security
Lack of information security give rise to
cybercrime
Cybersecurity: means protecting
information, equipment, devices, computer,
computer resource, communication device
and information stored therein from
unauthorized access, use, disclosure,
disruption, modification or destruction.
Challenges for securing data in business
perspective
Cybercrime occupy an important space in
information security due to their impact.
Most organizations do not incorporate the cost
of the vast majority of computer security
incidents into their accounting
The difficulty in attaching a quantifiable
monetary value to the corporate data and yet
corporate data get stolen/lost
Financial loses may not be detected by the
victimized organization in case of Insider
attacks: such as leaking customer data
Cybercrime trends over years
1.4 Who are Cybercriminals?
Are those who conduct acts such as:
Child pornography
Credit card fraud
Cyberstalking
Defaming another online
Gaining unauthorized access to computer
systems
Ignoring copyrights
Software licensing and trademark protection
Overriding encryption to make illegal copies
Software piracy
Stealing another’s identity to perform criminal
acts
Categorization of Cybercriminals
Type 1: Cybercriminals- hungry for
recognition
Hobby hackers
A person who enjoys exploring the limits of
what is possible, in a spirit of playful cleverness.
May modify hardware/ software
IT professional(social engineering):
Ethical hacker