SlideShare une entreprise Scribd logo
1  sur  32
Unit II: Cyber Crime
Cyber World, Cyber crime, Methods and Taxonomy of Cyber Attacks, reason behind cyber crime,
Role playing factors responsible for cyber crimec
The Cyber World
The Cyber World, or cyberspace, is more than just the Internet. It refers to an online environment where many
participants are involved in social interactions and have the ability to affect and influence each other. People
interact in cyberspace through the use of digital media. Examples of cyberspace interactions are: Create media,
share media and consume media.
The Cyber World
(History)
In 1984, Wiliam Gibson published his science fiction book – Necromancer, which describes an online world of
computers and elements of the society who use these computers. The word cyberspace first appeared in this
book.
According to him, cyberspace looked like a physical space but was actually a computer generated construction.
Also, it represented abstract data.
The book caught the imagination of many writers and in 1986, major English language dictionaries introduced
the word ‘cyberspace’. According to the New Oxford Dictionary of English, ‘CyberSpace’ is the notional
environment in which people communicate over computer networks.
The Cyber World
Characteristics of Cyberspace
When people are online, most of them engage in activities that leave a digital footprint. A digital footprint
refers to all information found online about a person; it is either posted by that person or others, intentionally
or unintentionally. This information leaves a permanent mark as it can be easily retraced, retrieved and passed
on by others. The digital footprint can be used by potential employers and universities looking for information
on their potential employees and students. The following infographic shows the characteristics of cyberspace
and its impact:
The Cyber World
Characteristics of Cyberspace
Since cyberspace is a virtual space, it has no boundaries, mass, or gravity. It simply represents the
interconnected space between computers, systems, and other networks.
It exists in the form of bits and bytes – zeroes and ones (0’s and 1’s). In fact, the entire cyberspace is a dynamic
environment of 0’s and 1’s which changes every second. These are simply electronic impulses. Also, it is an
imaginary location where the words of two parties meet in conversation.
Cyber Crime
Cybercrime is any criminal activity that involves a computer, networked device or a network. While most
cybercrimes are carried out in order to generate profit for the cybercriminals, some cybercrimes are carried out
against computers or devices directly to damage or disable them, while others use computers or networks to
spread malware, illegal information, images or other materials. Some cybercrimes do both -- i.e., target computers
to infect them with a computer virus, which is then spread to other machines and, sometimes, entire networks.
A primary effect of cybercrime is financial; cybercrime can include many different types of profit-driven criminal
activity, including ransomware attacks, email and internet fraud, and identity fraud, as well as attempts to steal
financial account, credit card or other payment card information.
Cybercriminals may also target an individual's private information, as well as corporate data for theft and resale.
As many workers settle into remote work routines due to the pandemic, cybercrimes are expected to grow in
frequency in 2021, making it especially important to protect backup data.
Cyber Crime
Defining cybercrime
The U.S. Department of Justice (DOJ) divides cybercrime into three categories:
crimes in which the computing device is the target -- for example, to gain network access;
crimes in which the computer is used as a weapon -- for example, to launch a denial-of-service (DoS) attack; and
crimes in which the computer is used as an accessory to a crime -- for example, using a computer to store illegally
obtained data.
Cyber Crime
Indian IT Act 2000:
Cybercrime in a narrow sense (computer crime):
Any illegal behavior directed by means of electronic operations that targets the security of computer systems and
the data processed by them.
Cybercrime in a broader sense (computer-related crime):
Any illegal behavior committed by means of, or in relation to, a computer system or network, including such
crimes as illegal possession and offering or distributing information by means of a computer system or network.
Any contract for the sale or conveyance of immovable property or any interest in such property;
Any such class of documents or transactions as may be notified by the Central Government Confidential.
Cyber Attack Classification
CLASSIFICATION RESPONSIBLE AGENT ATTACK EFFECT
EQUIVALENCY
Cyber Attack
[generic]
- -
Cyber Warfare
[includes Cyber Espionage, Cyber
Sabotage]
State
[nation]
war act
Cyber Crime Non-State
(individual/organization)
criminal act
Cyber Terrorism Non-State
(individual/organization)
terrorism act
Types of Cyber Attacks: Web-based
attacks
Web-based attacks
These are the attacks which occur on a website or web applications. Some of the important web-based
attacks are as follows-
1. Injection attacks
It is the attack in which some data will be injected into a web application to manipulate the application and
fetch the required information. Example- SQL Injection, code Injection, log Injection, XML Injection etc.
2. DNS Spoofing
DNS Spoofing is a type of computer security hacking. Whereby a data is introduced into a DNS resolver's
cache causing the name server to return an incorrect IP address, diverting traffic to the attacker?s computer
or any other computer. The DNS spoofing attacks can go on for a long period of time without being detected
and can cause serious security issues.
Types of Cyber Attacks: Web-based
attacks
3. Session Hijacking
It is a security attack on a user session over a protected network. Web applications create cookies to
store the state and user sessions. By stealing the cookies, an attacker can have access to all of the user
data.
4. Phishing
Phishing is a type of attack which attempts to steal sensitive information like user login credentials and
credit card number. It occurs when an attacker is masquerading as a trustworthy entity in electronic
communication.
5. Brute force
It is a type of attack which uses a trial and error method. This attack generates a large number of
guesses and validates them to obtain actual data like user password and personal identification number.
This attack may be used by criminals to crack encrypted data, or by security, analysts to test an
organization's network security.
Types of Cyber Attacks: Web-based
attacks
6. Denial of Service
It is an attack which meant to make a server or network resource unavailable to the users. It accomplishes this by flooding
the target with traffic or sending it information that triggers a crash. It uses the single system and single internet
connection to attack a server. It can be classified into the following-
Volume-based attacks- Its goal is to saturate the bandwidth of the attacked site, and is measured in bit per second.
Protocol attacks- It consumes actual server resources, and is measured in a packet.
Application layer attacks- Its goal is to crash the web server and is measured in request per second.
7. Dictionary attacks
This type of attack stored the list of a commonly used password and validated them to get original password.
8. URL Interpretation
It is a type of attack where we can change the certain parts of a URL, and one can make a web server to deliver web pages
for which he is not authorized to browse.
Types of Cyber Attacks: Web-based
attacks
9. File Inclusion attacks
It is a type of attack that allows an attacker to access unauthorized or essential files which is available
on the web server or to execute malicious files on the web server by making use of the include
functionality.
10. Man in the middle attacks
It is a type of attack that allows an attacker to intercepts the connection between client and server
and acts as a bridge between them. Due to this, an attacker will be able to read, insert and modify
the data in the intercepted connection.
Types of Cyber Attacks: System-based
attacks
1. Virus
It is a type of malicious software program that spread throughout the computer files without the
knowledge of a user. It is a self-replicating malicious computer program that replicates by inserting copies
of itself into other computer programs when executed. It can also execute instructions that cause harm to
the system.
2. Worm
It is a type of malware whose primary function is to replicate itself to spread to uninfected computers. It
works same as the computer virus. Worms often originate from email attachments that appear to be from
trusted senders.
3. Trojan horse
It is a malicious program that occurs unexpected changes to computer setting and unusual activity, even
when the computer should be idle. It misleads the user of its true intent. It appears to be a normal
application but when opened/executed some malicious code will run in the background.
Types of Cyber Attacks: System-based
attacks
4. Backdoors
It is a method that bypasses the normal authentication process. A developer may create a backdoor
so that an application or operating system can be accessed for troubleshooting or other purposes.
5. Bots
A bot (short for "robot") is an automated process that interacts with other network services. Some
bots program run automatically, while others only execute commands when they receive specific
input. Common examples of bots program are the crawler, chatroom bots, and malicious bots.
Cyber Attack Malware Taxonomy
MALWARE
TYPE
REQUIRES
HOST FILE TO
INFECT?
SELF-
SPREADING?
APPEARS
LEGITIMATE
(HARMLESS)?
CAN CARRY
HARMFUL
PAYLOAD?
CAN COMMO
WITH
COMMAND &
CONTROL
SERVER?
CAN ATTACK
OS KERNEL &
FIRMWARE?
Virus ✔ ❌ N/A ✔ N/A ❌
Worm ❌ ✔ N/A ✔ N/A ❌
Trojan ✔ ❌ ✔ ✔ N/A ❌
Bots/Botnet N/A N/A N/A ✔ ✔ ❌
Spyware ❌ ❌ N/A ❌ ✔ ❌
Rootkit N/A N/A N/A ❌ N/A ❌
Blended Threat ✔ ✔ ✔ ✔ ✔ ✔
Reason Behind Cyber Crime
Easy to access – The problem behind safeguarding a computer system from
unauthorized access is that there are many possibilities of breach due to the complex
technology. Hackers can steal access codes, retina images, advanced voice recorders,
etc. that can fool biometric systems easily and bypass firewalls can be utilized to get
past many security systems.
Capacity to store data in comparatively small space – The computer has the unique
characteristic of storing data in a very small space. This makes it a lot easier for the
people to steal data from any other storage and use it for their own profit.
Complex – The computers run on operating systems and these operating systems are
programmed of millions of codes. The human mind is imperfect, so they can do
mistakes at any stage. Cybercriminals take advantage of these gaps.
Reason Behind Cyber Crime
Negligence – Negligence is one of the characteristics of human conduct. So, there
may be a possibility that protecting the computer system we may make any
negligence which provides cyber-criminal access and control over the computer
system.
Loss of evidence – The data related to the crime can be easily destroyed. So, Loss of
evidence has become a very common & obvious problem which paralyzes the system
behind the investigation of cyber-crime.
Role playing factors responsible for
cyber crime
1. Disgruntled Employees
Read Write Web claim that employees (not hackers) are the biggest threat to security.
This is backed up by a survey conducted by Ponemon Institute, which stated that 59%
of ex-employees use their insider information to “get a new job, start their own
business or for revenge“. They can steal data simply by transmitting data files over the
internet, photocopying and distributing documents, and using their knowledge they
have gained whilst working for a company.
Role playing factors responsible for
cyber crime
2. Publicity
Some hackers (whether they are individuals or members of a group) will target big
branded website, knowing that they’ll cause huge amounts of publicity if they can get
away with it. Attacks on retailers, police forces and government websites have led to
the recognition of hacker groups such as Lulzsec and Anonymous who can now lay
their claim to attacking Sony, NHS, CIA and the US Senate websites, amongst many
others.
Role playing factors responsible for
cyber crime
3. Power
Cyber criminals look for a weakness within a target’s people, system, or network, and
then extract and transmit the data to other hackers. This may include conducting
research on the company’s employees and infrastructure. Many hackers are hard to
trace, which means that the majority get away with defacing websites and stealing
data. The power hackers have, knowing that they are untraceable, and unstoppable is
an attraction for many, encouraging them to repeatedly attack.
Role playing factors responsible for
cyber crime
4. Revenge
This is linked closely to the first point of disgruntled employees. Many hackers will attack a
website if they have reason to be annoyed with the organisation or brand. Either for political
reasons, beliefs, or personal grudges, hackers can use cyber attacks as a way of getting their
voices heard.
5. Freedom
Hacker culls such as Anonymous claim that they fight for freedom and that all the work they
do is to stop people controlling them. However, there is some confusion as to what
Anonymous is all about. The cull profess that they hack as a way of fighting for freedom, and
yet they steal other people’s data which removes the anonymity of innocent people. This
confusion has led to several hackers dropping out of Anonymous.
Cyber Crime Trends In India
Cyber Crime Trends In India
Cyber crime can be categorised into :
Cyber crime against person
Cyber crime against property
Cyber crime against government
Cyber crime against society
1. Cyber crime against person
Cyberstalking: The term stalking means unwanted or obsessive attention by an
individual or group towards another person. Cyberstalking refers to threat that is
created through the use of computer technology such as Internet, e-mails, SMS,
webcams, phones calls, websites or even videos.
Cybercrime Hacking : This means gaining unauthorised access over computer system
with the intent of personal gain or misuse. It generally destroys the whole data
present in computer system. Screenshot shows message that hacker can post once
your system is compromised.
1. Cyber crime against person
Cracking : Cracking refers to digitally removing the copy write protection code that
prevents copied or pirated software from running on computers that haven’t been
authorised to run it by the vendor of the software. The person who carries out this
task if called as Cracker.
Defamation : It involves action of damaging the good reputation of someone using
computer or electronic service as medium. For eg., Posting vulgar message and/or
photos about a person on his/her social network profile such as facebook, twitter etc.
1. Cyber crime against person
Online fraud : This refers to acts of stealing confidential details of victim such as
banking credentials using phishing sites and thereafter withdrawing money from
victims account, online lottery scams such as nigeria lottery scams. Screenshot shows
online lottery scam claiming that you have won $ 5,00,000 amount!
1. Cyber crime against person
Child pornography: This involves the use of electronic device and services to create, distribute or access materials
that sexually exploit minor children. For eg., Recording heinous act done with child on mobile device and
distributing on porn site.
Spoofing: The term spoofing means imitate something while exaggerating its characteristic features with some
personal gain or profit. Spoofing of user identity can be described as a situation in which one person or program
successfully masquerades (means pretending to be someone one is not) as another by falsifying data. Spoofing
can be done using email or SMS or WhatApp. For eg.,Constantly mailing a person claiming from bank and
requesting banking credentials. Screenshot shows hacker claiming to be from WhatsApp and sending an
attachment
2. Cyber crime against Property
Transmitting virus: A computer virus is a malware program that reproduces itself into another computer
programs, disk drive, files or booting sector of hard drive. Once this replication of so called virus is
succeeded the areas affected are termed as “infected”. Hacker generally transmit virus to target system
using email attachment as medium. When victim opens the attachment (which is infected with virus)
this virus gets replicated throughout the system and thereby slowing down your system.
Cyber Squatting: The term squatting means unlawfully occupying an uninhabited place. Cyber
Squatting is where two or more persons claim for the same Domain Name or any service available on
Internet such as facebook profile etc. The hacker claims that he/she had first registered the name
before other person or he/she is the owner for twitter handle.
For eg., the first case in India registered for cybersquatting was Yahoo Inc. v/s, Aakash Arora, in 1999
where the defendant launched a YahooIndia.com website nearly identical to the plaintiff’s popular
website Yahoo.com and also provided almost similar services. However, the court ruled in favour of
Yahoo Inc.
2. Cyber crime against Property
Cyber Vandalism: Vandalism refers to action involving deliberate destruction or damage of public or
private property. Cyber vandalism means destroying or damaging the data when a network service is
unavailable.
For eg., The Tribune of Pakistan had reported in November 2012 that hackers (group named as ‘eboz’ in
Pakistan) replaced Google’s Pakistan logo with a picture of two penguins walking up a bridge at sunset.
Intellectual Property Crimes: Intellectual property are intangible property that is the result of creativity
such as copyrights, trademark, patent etc. Intellectual Property Right (IPR) crime is any unlawful act by
which the owner is deprived of his/her rights completely or partially. These are the most common
offence occurring in India and includes software piracy, infringement of patents, designs, trademark,
copyright, theft of source code etc.
For eg., The popular case of trademark of Bikanervala v/s New Bikanerwala filed in 2005. The plaintiff
(here Bikanervala) had filed IPR case with defendant (here New Bikanerwala) since they were running
new outlet in Delhi by using trademark registered with plaintiff. The court had allowed plaintiff’s
application and the defendant was restrained by means of an ad interim injunction.
3. Cybercrime against government
Cyber Warfare: Cyberwarfare is an Internet-based conflict that involves politically motivated attacks on
information and its related systems. It can disable official websites and networks, disrupt or even
disable essential services such as Internet connection, steal or alter classified data such as sensex details
on official website, and cripple financial systems such as blocking payment gateways.
For eg., National Security Agency (NSA) of US spying on large scale on many countries. This spying was
blown up by former NSA agent Edward Snowden.
Cyber Terrorism: Cyber Terrorism is politically motivated use of computers and information technology
to cause severe disruption or widespread fear amongst people.
For eg., the recent example of 2015 dimapur mob lynching rape accused is due to outspread of
message on chatting app called Whatsapp amount locals of Dimapur district in Nagaland.
4. Cybercrime against society at large
Online Gambling: The term gambling means involving in activities that allow chance for
money. Online gambling is one of the most lucrative businesses that is growing today
in the list of cybercrimes in India. It is also known as Internet gambling or iGambling.
The cybercrime incident such as online lottery scam (particularly those of Nigeria
lottery scam), online jobs i.e. work from remote location etc.
Cyber Trafficking: The term trafficking means dealing or involving in trade activities
that is considered to be illegal and is prohibited by cybercrime law. Cyber Trafficking
refers to unlawful activities carried out using computer and/or computer services. For
eg., selling kidnapped child to human trafficking group using WhatsApp as medium.

Contenu connexe

Tendances

cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 

Tendances (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
PPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIAPPT on cyber LAW And ACT Of INDIA
PPT on cyber LAW And ACT Of INDIA
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 

Similaire à Cyber Crime

Similaire à Cyber Crime (20)

NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdf
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Network security
Network securityNetwork security
Network security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
English in written
English in writtenEnglish in written
English in written
 
Types of attacks in cyber security
Types of attacks in cyber securityTypes of attacks in cyber security
Types of attacks in cyber security
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Plus de Arnav Chowdhury

Plus de Arnav Chowdhury (20)

Startup Funding and Strategies for Future
Startup Funding and Strategies for FutureStartup Funding and Strategies for Future
Startup Funding and Strategies for Future
 
Marketing Management Introduction.pptx
Marketing Management Introduction.pptxMarketing Management Introduction.pptx
Marketing Management Introduction.pptx
 
Marketing Management Product.pptx
Marketing Management Product.pptxMarketing Management Product.pptx
Marketing Management Product.pptx
 
Institutional Support to Entrepreneurship
Institutional Support to EntrepreneurshipInstitutional Support to Entrepreneurship
Institutional Support to Entrepreneurship
 
New Venture Expansion and Exit Strategies
New Venture Expansion and Exit StrategiesNew Venture Expansion and Exit Strategies
New Venture Expansion and Exit Strategies
 
Creating a Business Plan
Creating a Business PlanCreating a Business Plan
Creating a Business Plan
 
Business Research Methodology ( Data Collection)
Business Research Methodology ( Data Collection)Business Research Methodology ( Data Collection)
Business Research Methodology ( Data Collection)
 
Business Research Methods (Introduction)
Business Research Methods (Introduction)Business Research Methods (Introduction)
Business Research Methods (Introduction)
 
Planning and organizing Entrepreneurial Venture
Planning and organizing Entrepreneurial VenturePlanning and organizing Entrepreneurial Venture
Planning and organizing Entrepreneurial Venture
 
Fundamentals of Entrepreneurship
Fundamentals of EntrepreneurshipFundamentals of Entrepreneurship
Fundamentals of Entrepreneurship
 
ICT tools in Education
ICT tools in EducationICT tools in Education
ICT tools in Education
 
Unit v: Cyber Safety Mechanism
Unit v: Cyber Safety MechanismUnit v: Cyber Safety Mechanism
Unit v: Cyber Safety Mechanism
 
UNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement StrategiesUNIT IV:Security Measurement Strategies
UNIT IV:Security Measurement Strategies
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Information Technology and Modern Gadgets
Information Technology and Modern GadgetsInformation Technology and Modern Gadgets
Information Technology and Modern Gadgets
 
Unit iv FMIS
Unit iv FMISUnit iv FMIS
Unit iv FMIS
 
Unit iii FMIS
Unit iii FMISUnit iii FMIS
Unit iii FMIS
 
Unit ii FMIS
Unit ii FMISUnit ii FMIS
Unit ii FMIS
 
Unit iv graphics
Unit iv  graphicsUnit iv  graphics
Unit iv graphics
 
Unit v: Device Management
Unit v: Device ManagementUnit v: Device Management
Unit v: Device Management
 

Dernier

Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Dernier (20)

All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 

Cyber Crime

  • 1. Unit II: Cyber Crime Cyber World, Cyber crime, Methods and Taxonomy of Cyber Attacks, reason behind cyber crime, Role playing factors responsible for cyber crimec
  • 2. The Cyber World The Cyber World, or cyberspace, is more than just the Internet. It refers to an online environment where many participants are involved in social interactions and have the ability to affect and influence each other. People interact in cyberspace through the use of digital media. Examples of cyberspace interactions are: Create media, share media and consume media.
  • 3. The Cyber World (History) In 1984, Wiliam Gibson published his science fiction book – Necromancer, which describes an online world of computers and elements of the society who use these computers. The word cyberspace first appeared in this book. According to him, cyberspace looked like a physical space but was actually a computer generated construction. Also, it represented abstract data. The book caught the imagination of many writers and in 1986, major English language dictionaries introduced the word ‘cyberspace’. According to the New Oxford Dictionary of English, ‘CyberSpace’ is the notional environment in which people communicate over computer networks.
  • 4. The Cyber World Characteristics of Cyberspace When people are online, most of them engage in activities that leave a digital footprint. A digital footprint refers to all information found online about a person; it is either posted by that person or others, intentionally or unintentionally. This information leaves a permanent mark as it can be easily retraced, retrieved and passed on by others. The digital footprint can be used by potential employers and universities looking for information on their potential employees and students. The following infographic shows the characteristics of cyberspace and its impact:
  • 5. The Cyber World Characteristics of Cyberspace Since cyberspace is a virtual space, it has no boundaries, mass, or gravity. It simply represents the interconnected space between computers, systems, and other networks. It exists in the form of bits and bytes – zeroes and ones (0’s and 1’s). In fact, the entire cyberspace is a dynamic environment of 0’s and 1’s which changes every second. These are simply electronic impulses. Also, it is an imaginary location where the words of two parties meet in conversation.
  • 6. Cyber Crime Cybercrime is any criminal activity that involves a computer, networked device or a network. While most cybercrimes are carried out in order to generate profit for the cybercriminals, some cybercrimes are carried out against computers or devices directly to damage or disable them, while others use computers or networks to spread malware, illegal information, images or other materials. Some cybercrimes do both -- i.e., target computers to infect them with a computer virus, which is then spread to other machines and, sometimes, entire networks. A primary effect of cybercrime is financial; cybercrime can include many different types of profit-driven criminal activity, including ransomware attacks, email and internet fraud, and identity fraud, as well as attempts to steal financial account, credit card or other payment card information. Cybercriminals may also target an individual's private information, as well as corporate data for theft and resale. As many workers settle into remote work routines due to the pandemic, cybercrimes are expected to grow in frequency in 2021, making it especially important to protect backup data.
  • 7. Cyber Crime Defining cybercrime The U.S. Department of Justice (DOJ) divides cybercrime into three categories: crimes in which the computing device is the target -- for example, to gain network access; crimes in which the computer is used as a weapon -- for example, to launch a denial-of-service (DoS) attack; and crimes in which the computer is used as an accessory to a crime -- for example, using a computer to store illegally obtained data.
  • 8. Cyber Crime Indian IT Act 2000: Cybercrime in a narrow sense (computer crime): Any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed by them. Cybercrime in a broader sense (computer-related crime): Any illegal behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession and offering or distributing information by means of a computer system or network. Any contract for the sale or conveyance of immovable property or any interest in such property; Any such class of documents or transactions as may be notified by the Central Government Confidential.
  • 9. Cyber Attack Classification CLASSIFICATION RESPONSIBLE AGENT ATTACK EFFECT EQUIVALENCY Cyber Attack [generic] - - Cyber Warfare [includes Cyber Espionage, Cyber Sabotage] State [nation] war act Cyber Crime Non-State (individual/organization) criminal act Cyber Terrorism Non-State (individual/organization) terrorism act
  • 10. Types of Cyber Attacks: Web-based attacks Web-based attacks These are the attacks which occur on a website or web applications. Some of the important web-based attacks are as follows- 1. Injection attacks It is the attack in which some data will be injected into a web application to manipulate the application and fetch the required information. Example- SQL Injection, code Injection, log Injection, XML Injection etc. 2. DNS Spoofing DNS Spoofing is a type of computer security hacking. Whereby a data is introduced into a DNS resolver's cache causing the name server to return an incorrect IP address, diverting traffic to the attacker?s computer or any other computer. The DNS spoofing attacks can go on for a long period of time without being detected and can cause serious security issues.
  • 11. Types of Cyber Attacks: Web-based attacks 3. Session Hijacking It is a security attack on a user session over a protected network. Web applications create cookies to store the state and user sessions. By stealing the cookies, an attacker can have access to all of the user data. 4. Phishing Phishing is a type of attack which attempts to steal sensitive information like user login credentials and credit card number. It occurs when an attacker is masquerading as a trustworthy entity in electronic communication. 5. Brute force It is a type of attack which uses a trial and error method. This attack generates a large number of guesses and validates them to obtain actual data like user password and personal identification number. This attack may be used by criminals to crack encrypted data, or by security, analysts to test an organization's network security.
  • 12. Types of Cyber Attacks: Web-based attacks 6. Denial of Service It is an attack which meant to make a server or network resource unavailable to the users. It accomplishes this by flooding the target with traffic or sending it information that triggers a crash. It uses the single system and single internet connection to attack a server. It can be classified into the following- Volume-based attacks- Its goal is to saturate the bandwidth of the attacked site, and is measured in bit per second. Protocol attacks- It consumes actual server resources, and is measured in a packet. Application layer attacks- Its goal is to crash the web server and is measured in request per second. 7. Dictionary attacks This type of attack stored the list of a commonly used password and validated them to get original password. 8. URL Interpretation It is a type of attack where we can change the certain parts of a URL, and one can make a web server to deliver web pages for which he is not authorized to browse.
  • 13. Types of Cyber Attacks: Web-based attacks 9. File Inclusion attacks It is a type of attack that allows an attacker to access unauthorized or essential files which is available on the web server or to execute malicious files on the web server by making use of the include functionality. 10. Man in the middle attacks It is a type of attack that allows an attacker to intercepts the connection between client and server and acts as a bridge between them. Due to this, an attacker will be able to read, insert and modify the data in the intercepted connection.
  • 14. Types of Cyber Attacks: System-based attacks 1. Virus It is a type of malicious software program that spread throughout the computer files without the knowledge of a user. It is a self-replicating malicious computer program that replicates by inserting copies of itself into other computer programs when executed. It can also execute instructions that cause harm to the system. 2. Worm It is a type of malware whose primary function is to replicate itself to spread to uninfected computers. It works same as the computer virus. Worms often originate from email attachments that appear to be from trusted senders. 3. Trojan horse It is a malicious program that occurs unexpected changes to computer setting and unusual activity, even when the computer should be idle. It misleads the user of its true intent. It appears to be a normal application but when opened/executed some malicious code will run in the background.
  • 15. Types of Cyber Attacks: System-based attacks 4. Backdoors It is a method that bypasses the normal authentication process. A developer may create a backdoor so that an application or operating system can be accessed for troubleshooting or other purposes. 5. Bots A bot (short for "robot") is an automated process that interacts with other network services. Some bots program run automatically, while others only execute commands when they receive specific input. Common examples of bots program are the crawler, chatroom bots, and malicious bots.
  • 16. Cyber Attack Malware Taxonomy MALWARE TYPE REQUIRES HOST FILE TO INFECT? SELF- SPREADING? APPEARS LEGITIMATE (HARMLESS)? CAN CARRY HARMFUL PAYLOAD? CAN COMMO WITH COMMAND & CONTROL SERVER? CAN ATTACK OS KERNEL & FIRMWARE? Virus ✔ ❌ N/A ✔ N/A ❌ Worm ❌ ✔ N/A ✔ N/A ❌ Trojan ✔ ❌ ✔ ✔ N/A ❌ Bots/Botnet N/A N/A N/A ✔ ✔ ❌ Spyware ❌ ❌ N/A ❌ ✔ ❌ Rootkit N/A N/A N/A ❌ N/A ❌ Blended Threat ✔ ✔ ✔ ✔ ✔ ✔
  • 17. Reason Behind Cyber Crime Easy to access – The problem behind safeguarding a computer system from unauthorized access is that there are many possibilities of breach due to the complex technology. Hackers can steal access codes, retina images, advanced voice recorders, etc. that can fool biometric systems easily and bypass firewalls can be utilized to get past many security systems. Capacity to store data in comparatively small space – The computer has the unique characteristic of storing data in a very small space. This makes it a lot easier for the people to steal data from any other storage and use it for their own profit. Complex – The computers run on operating systems and these operating systems are programmed of millions of codes. The human mind is imperfect, so they can do mistakes at any stage. Cybercriminals take advantage of these gaps.
  • 18. Reason Behind Cyber Crime Negligence – Negligence is one of the characteristics of human conduct. So, there may be a possibility that protecting the computer system we may make any negligence which provides cyber-criminal access and control over the computer system. Loss of evidence – The data related to the crime can be easily destroyed. So, Loss of evidence has become a very common & obvious problem which paralyzes the system behind the investigation of cyber-crime.
  • 19. Role playing factors responsible for cyber crime 1. Disgruntled Employees Read Write Web claim that employees (not hackers) are the biggest threat to security. This is backed up by a survey conducted by Ponemon Institute, which stated that 59% of ex-employees use their insider information to “get a new job, start their own business or for revenge“. They can steal data simply by transmitting data files over the internet, photocopying and distributing documents, and using their knowledge they have gained whilst working for a company.
  • 20. Role playing factors responsible for cyber crime 2. Publicity Some hackers (whether they are individuals or members of a group) will target big branded website, knowing that they’ll cause huge amounts of publicity if they can get away with it. Attacks on retailers, police forces and government websites have led to the recognition of hacker groups such as Lulzsec and Anonymous who can now lay their claim to attacking Sony, NHS, CIA and the US Senate websites, amongst many others.
  • 21. Role playing factors responsible for cyber crime 3. Power Cyber criminals look for a weakness within a target’s people, system, or network, and then extract and transmit the data to other hackers. This may include conducting research on the company’s employees and infrastructure. Many hackers are hard to trace, which means that the majority get away with defacing websites and stealing data. The power hackers have, knowing that they are untraceable, and unstoppable is an attraction for many, encouraging them to repeatedly attack.
  • 22. Role playing factors responsible for cyber crime 4. Revenge This is linked closely to the first point of disgruntled employees. Many hackers will attack a website if they have reason to be annoyed with the organisation or brand. Either for political reasons, beliefs, or personal grudges, hackers can use cyber attacks as a way of getting their voices heard. 5. Freedom Hacker culls such as Anonymous claim that they fight for freedom and that all the work they do is to stop people controlling them. However, there is some confusion as to what Anonymous is all about. The cull profess that they hack as a way of fighting for freedom, and yet they steal other people’s data which removes the anonymity of innocent people. This confusion has led to several hackers dropping out of Anonymous.
  • 23. Cyber Crime Trends In India
  • 24. Cyber Crime Trends In India Cyber crime can be categorised into : Cyber crime against person Cyber crime against property Cyber crime against government Cyber crime against society
  • 25. 1. Cyber crime against person Cyberstalking: The term stalking means unwanted or obsessive attention by an individual or group towards another person. Cyberstalking refers to threat that is created through the use of computer technology such as Internet, e-mails, SMS, webcams, phones calls, websites or even videos. Cybercrime Hacking : This means gaining unauthorised access over computer system with the intent of personal gain or misuse. It generally destroys the whole data present in computer system. Screenshot shows message that hacker can post once your system is compromised.
  • 26. 1. Cyber crime against person Cracking : Cracking refers to digitally removing the copy write protection code that prevents copied or pirated software from running on computers that haven’t been authorised to run it by the vendor of the software. The person who carries out this task if called as Cracker. Defamation : It involves action of damaging the good reputation of someone using computer or electronic service as medium. For eg., Posting vulgar message and/or photos about a person on his/her social network profile such as facebook, twitter etc.
  • 27. 1. Cyber crime against person Online fraud : This refers to acts of stealing confidential details of victim such as banking credentials using phishing sites and thereafter withdrawing money from victims account, online lottery scams such as nigeria lottery scams. Screenshot shows online lottery scam claiming that you have won $ 5,00,000 amount!
  • 28. 1. Cyber crime against person Child pornography: This involves the use of electronic device and services to create, distribute or access materials that sexually exploit minor children. For eg., Recording heinous act done with child on mobile device and distributing on porn site. Spoofing: The term spoofing means imitate something while exaggerating its characteristic features with some personal gain or profit. Spoofing of user identity can be described as a situation in which one person or program successfully masquerades (means pretending to be someone one is not) as another by falsifying data. Spoofing can be done using email or SMS or WhatApp. For eg.,Constantly mailing a person claiming from bank and requesting banking credentials. Screenshot shows hacker claiming to be from WhatsApp and sending an attachment
  • 29. 2. Cyber crime against Property Transmitting virus: A computer virus is a malware program that reproduces itself into another computer programs, disk drive, files or booting sector of hard drive. Once this replication of so called virus is succeeded the areas affected are termed as “infected”. Hacker generally transmit virus to target system using email attachment as medium. When victim opens the attachment (which is infected with virus) this virus gets replicated throughout the system and thereby slowing down your system. Cyber Squatting: The term squatting means unlawfully occupying an uninhabited place. Cyber Squatting is where two or more persons claim for the same Domain Name or any service available on Internet such as facebook profile etc. The hacker claims that he/she had first registered the name before other person or he/she is the owner for twitter handle. For eg., the first case in India registered for cybersquatting was Yahoo Inc. v/s, Aakash Arora, in 1999 where the defendant launched a YahooIndia.com website nearly identical to the plaintiff’s popular website Yahoo.com and also provided almost similar services. However, the court ruled in favour of Yahoo Inc.
  • 30. 2. Cyber crime against Property Cyber Vandalism: Vandalism refers to action involving deliberate destruction or damage of public or private property. Cyber vandalism means destroying or damaging the data when a network service is unavailable. For eg., The Tribune of Pakistan had reported in November 2012 that hackers (group named as ‘eboz’ in Pakistan) replaced Google’s Pakistan logo with a picture of two penguins walking up a bridge at sunset. Intellectual Property Crimes: Intellectual property are intangible property that is the result of creativity such as copyrights, trademark, patent etc. Intellectual Property Right (IPR) crime is any unlawful act by which the owner is deprived of his/her rights completely or partially. These are the most common offence occurring in India and includes software piracy, infringement of patents, designs, trademark, copyright, theft of source code etc. For eg., The popular case of trademark of Bikanervala v/s New Bikanerwala filed in 2005. The plaintiff (here Bikanervala) had filed IPR case with defendant (here New Bikanerwala) since they were running new outlet in Delhi by using trademark registered with plaintiff. The court had allowed plaintiff’s application and the defendant was restrained by means of an ad interim injunction.
  • 31. 3. Cybercrime against government Cyber Warfare: Cyberwarfare is an Internet-based conflict that involves politically motivated attacks on information and its related systems. It can disable official websites and networks, disrupt or even disable essential services such as Internet connection, steal or alter classified data such as sensex details on official website, and cripple financial systems such as blocking payment gateways. For eg., National Security Agency (NSA) of US spying on large scale on many countries. This spying was blown up by former NSA agent Edward Snowden. Cyber Terrorism: Cyber Terrorism is politically motivated use of computers and information technology to cause severe disruption or widespread fear amongst people. For eg., the recent example of 2015 dimapur mob lynching rape accused is due to outspread of message on chatting app called Whatsapp amount locals of Dimapur district in Nagaland.
  • 32. 4. Cybercrime against society at large Online Gambling: The term gambling means involving in activities that allow chance for money. Online gambling is one of the most lucrative businesses that is growing today in the list of cybercrimes in India. It is also known as Internet gambling or iGambling. The cybercrime incident such as online lottery scam (particularly those of Nigeria lottery scam), online jobs i.e. work from remote location etc. Cyber Trafficking: The term trafficking means dealing or involving in trade activities that is considered to be illegal and is prohibited by cybercrime law. Cyber Trafficking refers to unlawful activities carried out using computer and/or computer services. For eg., selling kidnapped child to human trafficking group using WhatsApp as medium.