CS Chapter - 4
CS Chapter - 4
Happy Learning
Chapter 1
INTRODUCTION
TO
CYBER CRIME
Module 1/Chapter 1: (Introduction to Cybercrime)
To Write Classification of
Classifications of cybercrime
cybercrime and able to
3 Cybercrime
Characterize Indian ITA
and the Indian ITA 2000
2000
To Analyze global
perspective on cybercrime
4 A global Perspective on cybercrimes.
and correlated it with
supported law
CYBER SECURITY & LAW
Book Authors & Editorial Team Members
Devika Satare
Bhakti Bheda
Surbhi Desai
Dr. Nilakshi Jain Mr. Ramesh Menon
5
Learning Objectives
Analyse and assess the impact of cybercrime on government,
businesses, individuals and society.
To Identify and Describe cybercrime
6
Chapter 1
Topic1
7
Uses of the Internet
•The evolution of
technology and increasing
accessibility of smart tech
means there are multiple
access points within users’
homes for hackers to exploit.
14
Cybercrime can be partitioned
into two classes:
15
16
17
What is
Cyberspace?
Cyberspace
A global domain within the
information environment
consisting of the interdependent
network of information systems
infrastructures including the
Internet, telecommunications
networks, computer systems, and
embedded processors and
controllers
19
What is
Cybersquatting?
Cybersquatti
ng
Cybersquatting is registering,
selling or using a domain name
with the intent of profiting from
the goodwill of someone else's
trademark. It generally refers to
the practice of buying up domain
names that use the names of
existing businesses with the intent
to sell the names for a profit to
those businesses. 21
What is Cyberpunk?
Cyberpunk
Cyberpunk depicts a fast
disintegration of cultural standards
because of an unavoidable move
toward the hard and fast utilization
of computer, to such an extent that
the lines between genuine
individuals and computer become
obscured.
23
What is
Cyberwarfare?
Cyberwarfare
Cyberwarfare includes the
utilization of technology and
innovation to assault different
countries, governments, and
residents by attacking their
computer frameworks and
systems.
25
Chapter 1
Topic 2
26
Categories of
2 Cybercrime
28
29
Chapter 1
Topic 3
30
31
32
Chapter 1
Topic 4
33
1 Cybersecurity
35
Cyber
Security
Cybersecurity is the protection of
internet-connected systems such
as hardware, software and data
from cyber-threats. The practice is
used by individuals and
enterprises to protect against
unauthorized access to data
centers and other computerized
systems.
36
37
What are the objectives
of Cyber Security?
Objective of Cyber Security
39
40
Cyber Security V/s Information Security
41
CYBER SECURITY INFORMATION SECURITY
43
Chapter 1
Topic 5
44
Global
1 Cybersecurit
y Agenda
46
Global Cybersecurity
Agenda (GCA)
The Global Cybersecurity Agenda (GCA) is an
ITU framework for international cooperation
aimed at proposing strategies for solutions to
enhance confidence and security in the
information society.
It is built on existing national and regional
initiatives to avoid duplication of work and
encourage collaboration amongst all relevant
partners.
47
The Global Cybersecurity Agenda has seven
main strategic goals, built on five work
areas as follows:
49
Chapter 1
Topic 6
50
Cyber
1 criminals
52
Cyber Criminals
53
Types of Cyber Criminals
Black Hat
Hackers
Black hat hackers are malicious hackers,
sometimes called crackers. Black hats
lack ethics, sometimes violate laws, and
break into computer systems with
malicious intent, and they may violate the
confidentiality, integrity, or availability of
an organization's systems and data.
55
White Hat
Hackers
White hat hackers are the good guys,
who include professional penetration
testers who break into systems with
permission, malware researchers who
study malicious code to provide better
understanding and to disclose
vulnerabilities to vendors, etc.
White hat hackers are also known as
ethical hackers; they follow a code of
ethics and obey laws.
56
Crackers
57
Phreakers
Phreakers are individuals who specialize in
attacks on the telephone system.
In the good 'ol days, phreakers whistled or
utilized an instrument to imitate the tones the
telephone framework then used to route calls and
identify payment, particularly as an approach to
abstain from paying for a costly call.
Present day phreaking includes breaking into and
controlling the telephone organization's computer
system, making it a particular sort of hacking.
58
Whackers
59
Script Kiddies
White Hat Hacker
Black hat hacker
Grey Hat hacker
Green Hat Hacker
Red Hat Hacker
Hacktivists
Cyber Terrorist
60
Chapter 1
Topic 7
61
Who are Cyber
Criminals
1
Cybercrime involves such activities as child ponography,credit card fraud, cyber stalking,defaming
another online,gaining unauthorised access to computer systems,ignoring copyright,software licensing
and trade protection, overriding encryption to make illegal copies,software piracy and stealing another
‘s identity to perform criminal acts. Cyber criminals are those who conduct the above acts.
i) Hobby hackers
ii) IT Professional (Social engineering is one of the biggest threat)
iii) Politically motivated hackers.
Terrorists organizations.
Type II: Cyber Criminals-Not interested in recognition
i) psychological perverts
ii)Financially motivated hackers(Corporate espionage)
iii) Sate-sponsored hacking(National espionage,sabotage)
iv) Organized criminals.
67
Phishing
Phishing is the fraudulent attempt to obtain
sensitive information, or data, such as
usernames, passwords and credit card
details by disguising oneself as a trustworthy
entity in an electronic communication.
Typically carried out by email spoofing or
instant messaging, phishing often directs
users to enter personal information at a fake
website which matches the look and feel of
the legitimate site.
68
Spamming
Spamming is the use of messaging systems
to send an unsolicited message (spam) to
large numbers of recipients for the purpose
of commercial advertising, for the purpose of
non-commercial proselytizing, or for any
prohibited purpose.
Spam emails are usually sent to try to get
the person to buy something or do
something else that will cause gain for the
sender.
69
Cyber Stalking and
Harassment
Cyberstalking is the use of the Internet or
other electronic means to stalk or harass an
individual, group, or organization.
It may include false accusations, defamation,
slander and libel.
It may also include monitoring, identity theft,
threats, vandalism, gathering information
that may be used to threaten, embarrass or
harass.
70
Defamation
Defamation can be comprehended as the
improper and purposeful spread of
something either in the composed or oral
structure about an individual to hurt his
reputation in the general public.
Libel – A statement that is defamatory and
is published in a written form.
Slander – A defamatory statement spoken
that means a verbal form of defamation
71
Computer sabotage
The use of the Internet to hinder the normal
functioning of a computer system through
the introduction of worms, viruses or logic
bombs is referred to as Computer sabotage.
72
Pornographic Offenses
a) Publication or transmission of any material depicting children
in explicit sexual act or conduct by using any computer resource
and communication device.
74
Intellectual property (IP)
crimes
Intellectual property/capital are terms used to describe intangible
assets: the results of human endeavor that have value and are
original.
Intellectual property theft includes the theft of the following:
▸Unregistered trade secrets,
▸Copyrighted, Patented or registered works,
▸Trademark violations,
▸Technical notes,
▸Strategic business planning,
▸Gray-market distributions,
▸Counterfeiting,
▸Illegal distributions
75
Internet time theft
Internet time theft comes under hacking because the person who
gets access to someone else ‘s ISP user ID and password,
either by hacking or by gaining access to it by illegal means,
uses it to access the Internet without the other person’s
knowledge.
However,One can identify Internet time theft if the Internet time
has to be recharged often, even when one’s own use of the
Internet is not frequent.
76
Password Sniffing
77
DOS Attack
Denial-of-service attack (DoS attack) is a cyber-attack
in which the perpetrator seeks to make a machine or
network resource unavailable to its intended users by
temporarily or indefinitely disrupting services of a host
connected to the Internet.
78
Virus Attack
A virus is a software program written to change the
behavior of a computer or other device on a network,
without the permission or knowledge of the user.
A virus is a program that spreads from machine to
machine, for the most part making harm to every
framework.
Viruses are a major cause of shutdown of network
components.
79
Salami Attack
A salami attack is when small attacks add up to one
major attack that can go undetected due to the nature
of this type of cyber crime. It also known as salami
slicing.
Although salami slicing is often used to carry out
illegal activities, it is only a strategy for gaining an
advantage over time by accumulating it in small
increments, so it can be used in perfectly legal ways
as well.
80
Data Diddling
Data diddling includes changing information entered to
a computer.
Data diddling is a type of cybercrime in which data is
altered as it is entered into a computer system, most
often by a data entry clerk or a computer virus.
Computerized processing of the altered data results in
a fraudulent benefit.
81
Forgery
Forgery is a white-collar crime that generally refers to
the false making or material alteration of a legal
instrument with the specific intent to defraud anyone
(other than themself).
Tampering with a certain legal instrument may be
forbidden by law in some jurisdictions but such an
offense is not related to forgery unless the tampered
legal instrument was actually used in the course of the
crime to defraud another person or entity.
82
Web Jacking
Illegally seeking control of a website by taking over a
domain is know as Web Jacking.
Web jacking is simply when someone clones your
website, and tricks you to believe the cloned site is
yours.
The malicious link is placed somewhere on your
webpage waiting for a click. Immediately, you click on
it; a malicious web server replaces it.
And that means you have lost complete access to
your website.
83
Cyberterrorism
Cyberterrorism is the premeditated, politically
motivated attack against information, computer
systems, computer programs and data which result in
violence against noncombatant targets by sub
national groups or clandestine agents.
84
85
Indian IT Act
2000
2
87
Information Technology Act
2000
The Information Technology Act, 2000 (also known as
ITA-2000, or the IT Act) is an Act of the Indian
Parliament (No 21 of 2000) notified on 17 October
2000.
It is the primary law in India dealing with cybercrime
and electronic commerce.
The original Act contained 94 sections, divided into 13
chapters and 4 schedules.
The laws apply to the whole of India. If a crime
involves a computer or network located in India,
persons of other nationalities can also be indicted
under the law,
88
89
90
91
92
Chapter 1
Topic 8
93
94
Cybercrime is a kind of crime that
happens in "cyberspace", that is,
happens in the world of computer and
the Internet.
Although many people have a limited
knowledge of "cybercrime", this kind of
crime has the serious potential for
severe impact on our lives and society,
because our society is becoming an
information society, full of information
exchange happening in "cyberspace".
Thus, it is necessary to introduce
cybercrime detailed.
95
Guidelines for the Cooperation between Law Enforcement and Internet Service
Providers Against Cybercrime
96
Government and the private sector
jointly have to give cyber security some
priority in their security and risk
management plan.
Cyber awareness must be spread and
there should be multi-stakeholder
approach- technological inputs, legal
inputs, strengthening law enforcements,
systems and then dealing with transborder
crime involves lot of international
cooperation.
97
Lab
Experiment
To Remove Malware with Wi
ndows Defender Antivirus
98
Thank You for Listening
We can now take questions...
Get in Touch:
Dr. Nilakshi Jain
Associate Professor
IQAC Coordinator
Research Coordinator
SAKEC
www.nilakshijain.com