Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
6 views

Cyber Security-Module2 Notes

Uploaded by

twitterkatoolkit
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Cyber Security-Module2 Notes

Uploaded by

twitterkatoolkit
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

Cyber Security

Module-II: Cyber Crime and Cyber Law

Introduction to Cybercrime
Introduction

 The crime that involves and uses computer devices and Internet, is known as
cybercrime.
 Cybercrime can be committed against an individual or a group; it can also be committed
against government and private organizations. It may be intended to harm someone’s
reputation, physical harm, or even mental harm.
 Cybercrime can cause direct harm or indirect harm to whoever the victim is.
 However, the largest threat of cybercrime is on the financial security of an individual as
well as the government.
 Cybercrime causes loss of billions of USD every year.
Definition
Cybercrime is any criminal activity that involves a computer, networked device or a
network.
Cybercrime is defined as a crime in which a computer is the object of the crime or is
used as a tool to commit an offense.
Origin of Cyber Crime

 At the beginning of the 1970s, criminals regularly committed crimes via telephone lines.
The perpetrators were called Phreakers and discovered that the telephone system in
America functioned on the basis of certain tones. They were going to imitate these
tones to make free calls.
 John Draper was a well-known Phreaker who worked on it daily; he toured America in
his van and made use of public telephone systems to make free calls. Steve Jobs and
Steve Wozniak were inspired by this man, and even joined him. Of course they all ended
up on the right path: Steve Jobs and Wozniak founded Apple, the well-known computer
company.
 One person hacked another person’s computer to find, copy or manipulate personal
data and information. The first person to be found guilty of cybercrime was Ian Murphy,
also known as Captain Zap, and that happened in the year 1981. He had hacked the
American telephone company to manipulate its internal clock, so that users could still
make free calls at peak times.

 The first recorded cybercrime took place in the year 1820.


 The firm spam email took place in 1978 when it was sent out over the Arpanet.

 The first virus was installed on an Apple computer in 1982.

 Denial of Service (DoS) attacked by ‘Mafia Boy’ on eBay, Yahoo!, Amazon and other
popular sites in 2000.
Classifications of Cybercrimes
 Cybercrime against individuals
 Electronic mail (E -Mail) Spoofing, Online frauds, Data hiding, Cyberstalking and
harassment, Password sniffing etc.,
 Cybercrime against property
 Intellectual property crimes, Credit card fraud, Internet time theft etc.,
 Cybercrime against organization
 Unauthorised accessing of computer, Virus attack, Industrial spying, Software
privacy etc.,
 Cybercrime against society
 Forgery, Cyber terrorism, Web jacking etc.,

Cybercrime against individuals


 Electronic mail (E -Mail) Spoofing: It is one that appears to originate from one source but
actually has been sent from another source. For Example, Suresh send email in the
name of Ramesh to spoil the relationship with his friend. A hacker logs in to a computer
illegally, using a different identity than his own.
 Online Fraud: Like lottery Frauds are letters or emails that inform the recipient that
he/she has won a prize in a lottery. To get the money the recipient has to reply with
bank details so that money can be directly transferred. They also ask for processing
/handling fee.
 Data diddling: It is a attack involves altering raw data just before it is processed by a
computer and then changing it back after the processing is completed
 Cyberstalking and harassment: It refer to the use of internet and / or other electronic
communication devices to stalk another person. It involves harassing an individual will
conduct repeatedly. For example, following a person, visiting his home or business
place, making phone calls, leaving written messages
 Password sniffing: Password sniffers are the programs that monitor and record the
name and password of network users as they login.
Cybercrime against Property
 Intellectual property crime: Intellectual property crime is committed when someone
manufactures, sells or distributes counterfeit or pirated goods, such as such as patents,
trademarks, industrial designs or literary and artistic works, for commercial gain.
 Credit card Fraud: Credit card fraud increasing day by day. Millions of dollars may be
lost annually by consumers who have credit card, credit card number stolen from online
databases. Online services are frequent targets for hackers who want to access large
databases of credit card information.
 Internet time theft: Such a theft occurs when an unauthorised person uses the Internet
hours paid for by another person. Basically, in Internet theft the person who get access
to someone else’s ISP user ID and password, either by hacking or by gaining access to it
by illegal means, uses it to access the Internet without the other person’s knowledge.
Cybercrime against organization
 Virus attacks: A virus is a piece of code which is capable of copying itself and typically
has a detrimental effect, such as corrupting the system or destroying data. These viruses
can cause severe damage to organization data and important documents, also it can
cause companies to lose Client data, Customers, Money, Brand credibility.
 Industrial Spying: Spies can get information about product finances, research and
development and marketing strategies, an activity known as industrial spying.
 Software piracy: It is the theft of software through the illegally copying of genuine
programs or the copying and distribution of product intended to pass for original. Ex:
end use copying, duplication and distribution of illegally copied software, illegal
downloads from the internet etc.,
Cybercrime against society
 Forgery: It means the action of forging a copy or imitation of a document, signature,
banknote, or work of art. Fake currency notes, postage and revenue stamps, marksheets
etc., can be forged using sophisticated computers, printers and scanners.
 Cyberterrorism: It is terrorist activities intended to damage or disrupt vital computer
systems. It refers to unlawful attacks and threats of attacks against computers, networks
and the information stored therein.
 Web Jacking: It occurs when someone forcefully takes control of a website by cracking
the password and later changing it. Thus first stage of this crime involves password
sniffing. The actual owner of the website does not have any more control over what
appears on that website.
Cybercriminals modus-operandi
Legal perspective of cyber crime
IT Act 2000 and its amendments
Organisations dealing with Cyber-crime and Cyber security in India

You might also like