Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Acknowledgements

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 37

A project report on

CYBER CRIME

Submitted by
Sudeep Sharma 23BDS03151
Arindam Banerjee 23BKT0034
Mayuraksha Banerjee 23BDS0160
Agrim Dev 23BAI0049

Submitted to
Dr N.S VISHNU PRIYA
Associate Professor Sr.
Department of English
School of Social Sciences and Languages
VIT, Vellore

Submitted on
ACKNOWLEDGEMENTS

We wish to express our special thanks of gratitude towards our professor Dr.
Vishnu Priya N.S. who has bestowed upon us this amazing opportunity to work
on the report titled “Cybercrime” .This topic has helped us understand the need
for awareness among people and we have also come to know about so many
new things.
The report in general has helped us a lot understand some of the primary
mechanics involved in research. It has imparted to us the skill of report writing
which we are sure will be very useful in our future as professionals.
2

Table of Contents

Items Page no.


Acknowledgements 2
Introduction 4
Cyber Crime : What does it mean? 5
Reasons for Cyber-Crime 6
Mode and Manner of Committing Cyber- 7
Crime
Classification of Cybercrime 8
Methodology 10
Results and Findings 11
Discussion of the results 12
Recommendations 13
Conclusion 15
Reference 16
Annexure I- Newspaper reports 17
Annexure II- Survey Reports 28
3

INTRODUCTION

In an period where advanced impressions are advancing, cybercrime is


progressively influencing people, organizations, and governments. Cybercrime is
an illicit behavior committed through computerized communication, such as the
Web. A few of these sorts include taking and utilizing monetary exchanges made
by a individual from another account or credit card, which is called "taking",
whereas others are utilized in the frame of taking a person's social media
accounts. The increment in cybercrime exercises has expanded the security and
protection of computerized information, and this has ended up a caution in terms
of cyber security against this assault. This report, which analyzes all perspectives
related to cybercrime, examines the mindfulness, current level, and endeavors of
clients and indeed government authorities. This report analyzes the answers to
questions and significant data almost current cyber security hones, as well as
proposals for making strides cyber security to ensure against cyber dangers. This
is an issue that we must take truly as we endeavor to make a secure online
environment for everybody without compromising our possess computerized
personality.
4

CYBER CRIME : WHAT DOES IT MEAN?


Cyber-Crime:
Computer crime, or cybercrime, is crime that involves a computer and a network. "Any criminal
activity that uses a computer either as an instrumentality, target or a means for perpetuating
further crimes comes within the ambit of cyber-crime" A generalized definition of cyber-crime
may be "unlawful acts wherein the computer is either a tool or target or both" The computer
may be used as a tool in the following kinds of activity- financial crimes, sale of illegal articles,
pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber
defamation, cyber stalking. The computer may however be target for unlawful acts in the
following cases- unauthorized access to computer/ computer system/ computer networks,
theft of information contained in the electronic form, e-mail bombing, data diddling, salami
attacks, logic bombs, Trojan attacks, internet time thefts, web jacking, theft of computer
system, physically damaging the computer system.
.When was the first ever cybercrime recorded?
The first cybercrime was noted in 1820 by Joseph-Marie Jacquard, a textile manufacturer in
France which produced the loom This device allowed the repetition of a series of steps in the
weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their
traditional employment and livelihood were being threatened. They committed acts of
sabotage to discourage Jacquard from further use of the new technology. This is the first
recorded cyber-crime!
The first spam email took place in 1978 when it was sent out over the Arpanet (Advanced
Research Projects Agency Network). The first virus was installed on an Apple computer in 1982
when a high school student, Rich Skrenta, developed the Elk cloner.
. Who is carrying it out?
Cyber-attacks can be carried out by a host of people ranging between disgruntled employees,
individual hacker, organized cybercrime syndicates to enemy government or an activist. These
are the Cyber Criminals, the ill-motivated hackers, crackers and spammers
. What is the biggest myth related to cybercrime?
100 per cent Security! 100 per cent security can be difficult to attain and should not ideally be
the goal. Instead, one must establish a capability that deals with incidents to help minimize
threat and loss.

REASONS FOR CYBER CRIME

Herbert Lionel Adolphus Hart (18 July 1907-19 December 1992), in his work "The Concept of
Law" has said 'human beings are vulnerable so rule of law is required to protect them'. Applying
this to the cyberspace we may say that computers are vulnerable so rule of law is required to
protect and safeguard them against cyber- crime. The reasons for the vulnerability of
computers may be said to be:
1. Capacity to store data in comparatively small space: The computer has unique characteristic
of storing data in a very small space. This affords to remove or derive information either
through physical or virtual medium makes it much easier.
2. Easy to access: The problem encountered in guarding a computer system from unauthorized
access is that there is every possibility of breach not due to human error but due to the
complex technology. By secretly implanted logic bomb, key loggers that can steal access codes,
advanced voice recorders; retina imagers etc. that can fool biometric systems and bypass
firewalls can be utilized to get past many a security system.
3. Complex: The computers work on operating systems and these operating systems in turn are
composed of millions of codes. Human mind is fallible and it is not possible that there might not
be a lapse at any stage. The cyber criminals take advantage of these lacunas and penetrate into
the computer system.
4. Negligence: Negligence is very closely connected with human conduct. It is therefore very
probable that while protecting the computer system there might be any negligence, which in
turn provides a cyber-criminal to gain access and control over the computer system.
5. Loss of evidence: Loss of evidence is a very common & obvious problem as all the data are
routinely destroyed. Further collection of data outside the territorial extent also paralyses this
system of crime investigation.
6

MODE AND MANNER OF COMMITING CYBER CRIME

1. Unauthorized access to computer systems or networks / Hacking:


This kind of offence is normally referred as hacking in the generic sense. However the framers
of the information technology act 2000 have nowhere used this term so to avoid any confusion
we would not interchangeably use the word hacking for 'unauthorized Access’ as the latter has
wide connotation.
2. Theft of information contained in electronic form:
This includes information stored in computer hard disks, removable storage media etc. Theft
may be either by appropriating the data physically or by tampering them through the virtual
medium.
3. Email bombing:
This kind of activity refers to sending large numbers of mail to the victim, which may be an
individual or a company or even mail servers there by ultimately resulting into crashing.
4. Data diddling:
This kind of an attack involves altering raw data just before a computer processes it and then
changing it back after the processing is completed. The electricity board faced similar problem
of data diddling while the department was being computerized.
5. Salami attacks:
This kind of crime is normally prevalent in the financial institutions or for the purpose of
committing financial crimes. An important feature of this type of offence is that the alteration is
so small that it would normally go unnoticed.
E.g. the Ziegler case wherein a logic bomb was introduced in the bank's system, which deducted
10 cents from every account and deposited it in a particular account.

6. Denial of Service attack:


The computer of the victim is flooded with more requests than it can handle which cause it to
crash. Distributed Denial of Service (DDoS) attack is also a type of denial of service attack, in
which the offenders are wide in number and widespread. E.g. Amazon, Yahoo.

7
7. Virus / worm attacks-Viruses are programs that attach themselves to a computer or a file and
then circulate themselves to other files and to other computers on a network. They usually
affect the data on a computer, either by altering or deleting it. Worms, unlike viruses do not
need the host to attach themselves to. They merely make functional copies of themselves and
do this repeatedly till they eat up all the available space on a computer's memory.

8. Logic bombs:
These are event dependent programs. This implies that these programs are created to do
something only when a certain event (known as a trigger event) occurs.
E.g. even some viruses may be termed logic bombs because they lie dormant all through the
year and become active only on a particular date (like the Chernobyl virus).

CLASSIFICATION:
Cybercrimes can be classifies into 4 major categories as the following:

(1) Cybercrime against Individual


(2) Cybercrime Against Property
(3) Cybercrime Against Organization
(4) Cybercrime Against Society

(1) Against Individuals


(i) Email spoofing : A spoofed email is one in which the e-mail header is forged so that the mail
appears to originate from one source but actually has been sent from another source.
(ii) Spamming: Spamming means sending multiple copies of unsolicited mails or mass e-mails
such as chain letters.

8
(iii) Cyber Defamation: This occurs when defamation takes place with the help of computers
and/or the Internet. E.g. someone publishes defamatory matter about someone on a website or
sends e-mails containing defamatory information.
(iv) Harassment & Cyber stalking : Cyber Stalking Means following an individual's activity over
internet. It can be done with the help of many protocols available such as e- mail, chat rooms,
user net groups.

(2) Against Property


(i)Credit Card Fraud : As the name suggests, this is a fraud that happens by the use of a credit
card. This generally happens if someone gets to know the card number or the card gets stolen.

(ii) Intellectual Property crimes : These include Software piracy: Illegal copying of programs,
distribution

of copies of software. Copyright infringement: Using copyrighted material without proper


permission. Trademarks violations: Using trademarks and associated rights without permission
of the actual holder.

(3) Against Organizations:


(i) Unauthorized Accessing of Computer: Accessing the computer/network without permission
from the owner. It can be of 2 forms: a) Changing/deleting data: Unauthorized changing of
data. b) Computer voyeur: The criminal reads or copies confidential or proprietary information,
but the data is neither deleted nor changed.
(ii) Denial Of Service : When Internet server is flooded with continuous bogus requests so as to
denying legitimate users to use the server or to crash the server.
(iii) Computer contamination / Virus attack : A computer virus is a computer program that can
infect other computer programs by modifying them in such a way as to include a (possibly
evolved) copy of it. Viruses can be file infecting or affecting boot sector of the computer.
Worms, unlike viruses do not need the host to attach themselves to.

METODOLOGY
Our team took assistance of one of the most popular data collection methods; survey. The
survey targeted respondents who were undergraduate students of Vellore Institute of
Technology across the ages of 18-22.they were asked a series of questions. The purpose of this
study is to better understand the cybercrime problem and collect relevant information for
analysis.
The first method of data collection was an administrative survey using Google forms. The
survey included a series of questions designed to measure knowledge, understanding and
awareness of cybercrime. The questions covered topics such as personal familiarity with cyber
threats, security awareness, and attitudes toward cyber security. These responses provide
insight into youth’s general understanding of cybercrime, revealing patterns and trends of
awareness and behavior.
In addition to collecting primary data, secondary data was also used to support the report. We
reviewed national newspapers to gather information on cybercrime incidents, police responses.
This analysis helps to place the findings in a social and legal context.
Interviews were conducted with representatives from the general public and those
academically interested in the issue to gather diverse opinions on the challenges posed by
cybercrime and the effectiveness of current measures. These interview provided a broader
understanding of public perception and the complexities of cybercrime prevention.
A survey was conducted among the public to gather information and opinions on cybercrime.
The questions for survey were set with an intention to gather relevant data, and the survey
population was selected without bias or preference. Simple random sampling used to make
sure we had a diverse group of participants. The questionnaire included 20 questions, featuring
a mix of closed-ended , open-ended response questions. The survey was prepared, distributed,
and responses were collected via Google Forms. Google tools were utilized to analyze the
responses, maintaining a diverse group of respondents with no restrictions on participation.
Care was taken to ensure that the research does not violate the privacy or rights of the
individuals involved.
The prepared questions include.
1. How much trust do you have in your online privacy?
2. Have your ever taken a course or training on cyber security?
3. What is the most common loss due to cybercrime?
4. Have you ever experienced cybercrime? If yes, what type of cybercrime did you experience?
10

Although this approach provides good insight, it is important to acknowledge its limitations.
While the sample size is sufficient for preliminary findings, it may not be representatives of the
general population. Additionally, self-reported data may introduce bias because participants
reported past experiences or expressed knowledge of cyber security practices.

RESULTS AND FINDING:


1. A survey conducted among undergraduate Students at VIT, Vellore revealed the
following key issues regarding their knowledge and experiences of cybercrime.
2. Awareness: A significant majority of respondents (approximately 75%) reported a
general understanding of cybercrime and potential risks p.
3. Password security: While most participants agreed that strong passwords are important,
nearly 40% admitted to using passwords that are easy to guess, such as date of birth or
words that aren’t den is used.
4. Training and education: Only 30% of respondents had received formal training in cyber
security, indicating a need to increase educational opportunities in this area.
5. Personal experience: About 25% of respondents have experienced some form of
cybercrime, including phishing attempts and unauthorized access to social media
accounts.
6. Perceptions of corruption: A large proportion (more than 60%) believed that systemic
corruption in law enforcement hinders effective response to cybercrime.
7. Barriers to reporting: Many participants (55%) indicated that they were reluctant to
report cybercrime due to privacy concerns and possible lack of action to authorities.
11
DISSCUSION ON THE RESULTS.

1. Even while many college students are aware of the risks associated with cybercrime, some
still use weak passwords. This suggests a gap between their actions and their realizations.
Program that teach online safety and strong password usage must be implemented in schools.
Students can increase their self-defense with practical advice.

2. Just 30% of students have completed cybersecurity-related courses, making them the least
likely to get formal cybersecurity training. This implies that pupils are not being adequately
prepared for internet threats by their institutions. Cybersecurity workshops or courses have to
be required at colleges. Students will learn how to protect their personal information from this.

3. Even well-educated people can be targeted, as seen by the 25% of students who reported
having experienced cybercrime. This suggests that young adults frequently underestimate the
risks they face when using the internet. Campaigns to raise awareness should focus on actual
cybercrime cases.

4.With more than 60% of students voicing misgivings about authorities, many students fear that
corruption in law enforcement makes it difficult to combat cybercrime. This can exacerbate the
issue by discouraging people from reporting crimes. Improved assistance and openness are
necessary to increase public trust in law enforcement. Involving the community helps facilitate
communication between the general population and law enforcement.

5. Many people are reluctant to report cybercrimes due to concerns about privacy. Students
frequently mistrust the system or fear reprisals. Authorities must to explain how they safeguard
victim data when conducting investigations. Encouraging people to come forward requires
establishing a safe environment for reporting.
12

RECOMMENDATIONS
Most significant suggestions to protect our-self from Cyber Crime.
1. Strengthen Password Policies : Encourage the use of strong, unique passwords and
regular updates.
2. Implement Two-Factor Authentication: Make two-factor authentications
mandatory for sensitive accounts.
3. Update Software Regularly: Keeping our software and systems fully up to date.
4. Encourage Multi-Factor Authentication: Beyond two-factor, promote the adoption
of multi-actor authentication methods.
5. Strengthen Home Network: To protect home network from malicious cyber acts,
setting a strong Wi-Fi password and using WPA2 encryption.
6. Use of VPN: Virtual Private Networks add an extra layer of security by encrypting
internet connections.
7. Backup Data: Storing essential information on external devices against data loss in
the event of hardware failure etc.
8. Educating Our self : Staying informed about the least developments in cybercrime
and security.
9. Protect your personal information:
10. Exercise caution when sharing personal information such as your name, home
address, phone number, and email address online
• Don't respond to email messages that ask for personal information.
• Steer clear of fraudulent Web sites used to steal personal information.
• Pay attention to privacy policies on Web sites and in software.
Online offers that look too good to be true usually are:
While you may not directly pay for the software or service with money, the free
software or service you asked for may have been bundled with advertising software
("adware") that tracks your behavior and displays unwanted advertisements. You may
have to divulge personal information or purchase something else in order to claim your
supposed content winnings. If an offer looks so good it's hard to believe, ask for
someone else's opinion, read the fine print, or even better, simply ignore it.
13

Review bank and credit card statements regularly:


The impact of identity theft and online crimes can be greatly reduced if you can catch it
shortly after your data is stolen or when the first use of your information is attempted.
One of the easiest ways to get the tip-off that something has gone wrong is by reviewing
the monthly statements provided by your bank and credit card companies for anything
out of the ordinary.
14

Conclusion:
Cybercrime is a serious threat to people, businesses, and society at large in the current digital
era. The definition of cybercrime, the factors contributing to its growth, and the numerous
tactics employed by cybercriminals have all been covered in this paper. The results point to a
troubling discrepancy between people's awareness and behavior, especially among young
adults. Even though a large portion of students are aware of the dangers posed by cybercrime,
many continue to use weak passwords and other risky online behaviors.

A survey of Vellore Institute of Technology undergraduate students found that many of them
lacked formal cybersecurity training, even if they were well-informed about cyberthreats. This
suggests that educational establishments must incorporate thorough cybersecurity instruction
into their curricula. Online safety workshops and seminars can give students the information
and abilities they need to safeguard themselves in a world that is becoming more
interconnected by the day.

The research also highlights how crucial it is to increase public confidence in law enforcement in
order to promote the reporting of cybercrimes. Many respondents voiced worries about
perceived inefficiency of agencies and corruption, which can discourage victims from coming
forward. A safer online environment can be promoted by increasing law enforcement's
openness and communication with the public.

Adopting strong security measures, such as creating strong passwords, turning on two-factor
authentication, and keeping up with the most recent advancements in cybersecurity, is
essential to effectively combating cybercrime. The likelihood of becoming a victim of
cybercriminals can be considerably decreased by promoting a culture of prudence and
attentiveness.

In conclusion, the strategies used by cybercriminals are always changing along with technology.
Governments, businesses, and individuals must collaborate to raise awareness of cybersecurity
issues and put preventative measures in place.By doing this, we can make the internet
landscape safer for everyone.
15

Reference
1.Slideshare. (n.d.). A report on cyber crime.
Retrieved from https://www.slideshare.net/slideshow/a-report-on-cyber-crime/70799178

2.Cyber-crime Report 2015 given by KMPG-India.


https://internationalsecurityjournal.com/
3.https://www.northerntrust.com/united-states/institute/articles/10-steps-to
https://www.slideshare.net/slideshow/a-report-on-cyber-crime/70799178

4.International Security Journal. (n.d.). Ways to prevent cyber crime.

Retrieved from https://internationalsecurityjournal.com/ways-to-prevent-cyber-crime/

5.https://www.google.com/search?
sca_esv=173e33c9059ff87d&q=newspaper+article+on+cyber+crime+in+india&udm=2&fbs=AEQ
Nm0Aa4sjWe7Rqy32pFwRj0UkWd8nbOJfsBGGB5IQQO6L3J5MIFhvnvU242yFxzEEp3BcbXWGQj
Bp6XyyqfUu6Wz8hDrmQY6r35AfNzVfNsL-IsJAaetF9yPOU-
SEO5PZfYsNis3jDptA3FnHsJ39fki4iqqzfa8bS3aREzMDiVF3cGeJ4MfM&sa=X&ved=2ahUKEwirscm
viLaJAxVHxjgGHf0TInMQtKgLegQIEBAB&biw=1396&bih=663&dpr=1.38#imgrc=wfUePMzdgaCTt
M&imgdii=Dc7FbBn9I_XzqM
https://www.lawyersclubindia.com/articles/classification-of-cybercrimes--1484.asp
16
Annexure I- Newspaper reports
17
18
19
20
21
22
23
24
25
26
27
Annexure II- Survey Reports

28
29
30
31
32
33
34
35

You might also like