Cyber Security Unit-1
Cyber Security Unit-1
Cyber Security Unit-1
UNIT-I:
INTRODUCTION TO CYBER CRIME:
1.1 Introduction
Almost everyone is aware of the phenomenal growth of the Internet. Given the unrestricted number of
free websites, the Internet has undeniably opened a new way of exploitation known as cybercrime.
These activities involve the use of computers, the Internet, cyber- space and the worldwide web
(WWW). Interestingly, cybercrime is not a new phenomena, the first recorded cybercrime took place in
the year 1820. It is one of the most talked about topics in the recent years. Indian corporate and
government sites have been attacked or defaced more than 780 times between February 2000 and
December 2002. There are also stories/news of other attacks, for example, according to a story posted
on 3 December 2009, a total of 3,286 Indian websites were hacked in 5 months-between January and
June 2009.
vehicle. Some people argue that a cybercrime is not a crime as it is a crime against software and not
against a person or property. However, while the legal systems around the world scramble to introduce
laws to combat cyber- criminals, two types of attack are prevalent:
1. Techno-crime: A premeditated act against a system or systems, with the intent to copy, steal, pre
vent access, corrupt or otherwise deface or damage parts of or the complete computer system. The
24x7 connection to the Internet makes this type of cybercrime a real possibility to engineer from
anywhere in the world, leaving few, if any, "finger prints."
2. Techno-vandalism: 'These acts of "brainless" defacement of websites and/or other activities, such as
copying files and publicizing their contents publicly, are usually opportunistic in nature. Tight internal
security, allied to strong technical safeguards, should prevent the vast majority of such incidents.
There is a very thin line between the two terms "computer crime" and "computer fraud"; both are
punishable.
Cybercrimes (harmful acts committed from or against a computer or network) differ from most
terrestrial crimes in four ways:
(a) how to commit them is easier to learn,
(b) they require few resources relative to the potential damage caused.
(c) they can be committed in a jurisdiction without being physically present in it and
(d) they are often not clearly illegal.
The term cybercrime has some stigma attached and is notorious due to the word "terrorism" or
"terrorist" attached with it, that is, cyberterrorism. Cyberterrorism is defined as "any person, group or
organization who, with terrorist intent, utilizes accesses or aids in accessing a computer or computer
network or electronic system or electronic device by any available means, and thereby knowingly
engages in or attempts to engage in a terrorist act commits the offence of cyberterrorism." Cybercrime,
especially through the Internet, has grown in number as the use of computer has become central to
commerce, entertainment and government.
The term cyber has some interesting synonyms: fake, replicated, pretend, imitation, virtual, computer-
generated. Cyber means combining forms relating to Information Technology, the Internet and Virtual
Reality. This term owes its origin to the word "cybernetics" which deals with information and its use;
furthermore, cybernetics is the science that overlaps the fields of neurophysiology, information theory,
computing machinery and automation. However, beyond this, there does not seem to be any further
connection to the term "cybernetics" as per other sources searched, According to Wikipedia,
cybernetics is the interdisciplinary study of the structure of regulatory systems. It is closely related to
control theory and systems theory.
People are curious to know how cybercrimes are planned and how they actually take place. Worldwide,
including India, cyberterrorists usually use computer as a tool, target or both for their unlawful act to
gain information which can result in heavy loss/damage to the owner of that intangible sensitive
information. Internet is one of the means by which the offenders can gain priced sensitive information
of companies, firms, individuals, banks and can lead to intellectual property (IP) crimes (such as stealing
new product plans, its description, market program plans, list of customers, etc.), selling illegal articles,
pornography/child pornography, etc. This is done using methods such as Phishing, Spoofing, Pharming,
Internet Phishing, wire transfer, etc. and use it to their own advantage without the consent of the
individual. "Phishing" refers to an attack using mail programs to deceive or coax Internet users into
disclosing confidential information that can be then exploited for illegal purposes.
Lack of information security gives rise to cybercrimes. Let us refer to the amended Indian Information
Technology Act (ITA) 2000 in the context of cybercrime. From an Indian perspective, the new version of
the Act (referred to as ITA 2008) provides a new focus on "Information Security in India."
"Cybersecurity" means protecting information, equipment, devices, computer, computer resource,
communication device and information stored therein from unauthorized access, use, disclosure,
disruption, modification or destruction. The term incorporates both the physical security of devices as
well as the information stored therein. It covers protection from unauthorized access, use, disclosure,
disruption, modification and destruction
Where financial losses to the organization due to insider crimes are concerned (e.g., leaking customer
data). often some difficulty is faced in estimating the losses because the financial impacts may not be
detected by the victimized organization and no direct costs may be associated with the data theft. The
2008 CS1 Survey on computer crime and security supports this. Cybercrimes occupy an important
space in information security domain because of their impact. For anyone trying to compile data on
business impact of cybercrime, there are number of challenges. One of them comes from the fact that
organizations do not explicitly incorporate the cost of the vast majority of computer security incidents
into their accounting as opposed to, say, accounting for the "shrinkage" of goods from retail stores.
Because of these reasons, reporting of financial losses often remains approximate. In an attempt to
avoid negative publicity, most organizations abstain from revealing facts and figures about "security
incidents" including cybercrime. In general, organizations perception about "insider attacks" seems to
be different than that made out by security solution vendor. However, this perception of an
organization does not seem to be true as revealed by the 2008 CSI Survey. Awareness about "data
privacy" too tends to be low in most organizations. When we speak of financial losses to the
organization and significant insider crimes, such as leaking customer data, such "crimes" may not be
detected by the victimized organization and no direct costs may be associated with the theft.
Typical network misuses are for Internet radio/streaming audio, streaming video, file sharing, instant
messaging and online gaming (such as online poker, online casinos, online betting, etc.; refer to
http://en.wikipedia.org/wiki/Online_gambling). Online gambling is illegal in some countries for
example, in India. However, India has yet to pass laws that specifically deal with the issue, leaving a sort
of legal loophole in the meantime.
Hobby hackers;
IT professionals (social engineering is one of the biggest threat);
politically motivated hackers;
terrorist organizations.
2. Type II: Cybercriminals - not interested in recognition
Psychological perverts;
financially motivated hackers (corporate espionage);
state-sponsored hacking (national espionage, sabotage);
organized criminals.
3.Type III: Cybercriminals - the insiders
4
By its very nature, Usenet groups may carry very offensive, harmful, inaccurate or otherwise
inappropriate material, or in some cases, postings that have been mis- labeled or are deceptive in
another way. Therefore, it is expected that you will use caution and common sense and exercise proper
judgment when using Usenet, as well as use the service at your own risk.
Let us take a brief look at some of the cybercrime forms mentioned above.
1.5.1 E-Mail Spoofing
A spoofed E-Mail is one that appears to originate from one source but actually has been sent from
another source. For example, let us say, Roopa has an E-Mail address roopa@asianlaws.org. Let us say
her boyfriend Suresh and she happen to have a show down. Then Suresh, having become her enemy,
spoofs her E-Mail and sends obscene/vulgar messages to all her acquaintances. Since the E-Mails
appear to have originated from Roopa, her friends could take offense and relationships could be
spoiled for life.
1.5.2 Spamming
People who create electronic Spam are called spammers. Spam is the abuse of electronic messaging
systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages
indiscriminately. Although the most widely recognized form of Spam is E-Mail Spam, the term is applied
to similar abuses in other media: instant messaging Spam, Usenet newsgroup Spam, web search engine
Spam, Spans in blogs, wiki Spam, online classified ads Spam, mobile phone messaging Spam, Internet
forum Spam, junk fax transmissions, social networking Spam, file sharing network Spam, video sharing
sites, etc.
Spamming is difficult to control because it has economic viability - advertisers have no operating costs
beyond the management of their mailing lists, and it is difficult to hold senders accountable for their
mass mailings. Spammers are numerous, the volume of unsolicited mail has become very high because
the barrier to entry is low. The costs, such as lost productivity and fraud, are borne by the public and by
Internet Service providers (ISPs), who are forced to add extra capacity to cope with the deluge.
Spamming is widely detested. and has been the subject of legislation in many jurisdictions - for
example, the CAN-SPAM Adely de Another definition of spamming is in the context of "search engine
spamming In this contest. spamming is alteration or creation of a document with the intent to deceive
an electronic catalog or a filing system. Some web authors use "subversive techniques" to ensure that
their site appears more frequently of higher number in returned search results - this is strongly
discouraged by search engines and there are fines/ penalties associated with the use of such subversive
techniques. Those who continually attempt to subvert of Spam the search engines may be permanently
excluded from the search index. Therefore, the following web publishing techniques should be avoided:
1. Repeating keywords;
2. use of keywords that do not relate to the content on the site;
3. use of fast meta refresh;
4. redirection:
5. IP Cloaking:
6. use of colored text on the same color background;
7. tiny text usage:
8. duplication of pages with different URLs:
9. hidden links;
10. use of different pages that bridge to the same URL (gateway pages).
1.5.3 Cyberdefamation
6
A data diddling attack involves altering raw data just before it is processed by a computer and then
changing it back after the processing is completed. Electricity Boards in India have been victims to data
diddling programs inserted when private parties computerize their systems.
1.5.7 Forgery
Counterfeit currency notes, postage and revenue stamps, marksheets, etc. can be forged using
sophisticated computers, printers and scanners. Outside many colleges there are miscreants soliciting
the sale of fake marksheets or even degree certificates. These are made using computers and high
quality scanners and printers. In fact, this is becoming a booming business involving large monetary
amount given to student gangs in exchange for these bogus but authentic looking certificates.
1.5.8 Web Jacking
Web jacking occurs when someone forcefully takes control of a website (by cracking the password and
later changing it). Thus, the first stage of this crime involves "password sniffing." The actual owner of
the website does not have any more control over what appears on that website.
1.5.9 Newsgroup Spam/Crimes Emanating from Usenet Newsgroup
As explained earlier, this is one form of spamming. The word "Spam" was usually taken to mean
excessive multiple posting (EMP). The advent of Google Groups, and its large Usenet archive, has made
Usenet more attractive to spammers than ever. Spamming of Usenet newsgroups actually predates E-
Mail Spam. The first widely recognized Usenet Spam titled Global Alert for All: Jesus is Coming Soon
(though not the most famous) was posted on 18 January 1994 by Clarence L. Thomas IV, a sysadmin at
Andrews University. It was a fun- damentalist religious tract claiming that "this world's history is coming
to a climax." The newsgroup posting Bot Serdar Argic also appeared in early 1994, posting tens of
thousands of messages to various newsgroups. consisting of identical copies of a political screed
relating to the Armenian Genocide.
1.5.10 Industrial Spying/Industrial Espionage
Spying is not limited to governments. Corporations, like governments, often spy on the enemy. The
Internet and privately networked systems provide new and better opportunities for espionage. "Spies"
can get information about product finances, research and development and marketing strategies, an
activity known as "industrial spying." However, cyberspies rarely leave behind a trail. Industrial spying is
not new; in fact it is as old as industries themselves. The use of the Internet to achieve this is probably
as old as the Internet itself. Traditionally, this has been the reserved hunting field of a few hundreds of
highly skilled hackers, contracted by high-profile companies or certain governments via the means of
escrow organizations (it is said that they get several hundreds of thousands of dollars, depending on
the "assignment").
With the growing public availability of Trojans and Spyware material, even low-skilled individuals are
now inclined to generate high volume profit out of industrial spying. This is referred to as "Targeted
Attacks" (which includes "Spear Phishing"). This aspect of Industrial Spying is the one to be addressed
in the fight against cybercrime.
Organizations subject to online extortion tend to keep quiet about it to avoid negative publicity about
them. Not surprisingly, this also applies very well to organizations that are victim of focused attacks
aiming at stealing corporate data, Intellectual Property or whatever else that may yield a competitive
advantage for a rival company.
One interesting case is the famous Israeli Trojan story, where a software engineer in London created a
Trojan Horse program specifically designed to extract critical data gathered from machines infected by
his program. He had made a business out of selling his Trojan Horse program to companies in Israel,
which would use it for industrial spying by planting it into competitors networks. The methods used to
inoculate the Trojan Horse were varied and sometimes quite inventive, ranging from simple E-Mail
traps to the mailing of promotional CDs infected with the evil program!
1.5.11 Hacking
8
Although the purposes of hacking are many, the main ones are as follows:
1. Greed;
2. power;
3. publicity:
4. revenge;
5. adventure;
6. desire to access forbidden information;
7. destructive mindset.
Every act committed toward breaking into a computer and/or network is hacking and it is an offense.
Hackers write or use ready-made computer programs to attack the target computer. They possess the
desire to destruct and they get enjoyment out of such destruction. Some hackers hack for personal
monetary gains, such as stealing credit card information, transferring money from various bank
accounts to their own account followed by withdrawal of money. They extort money from some
corporate giant threatening him to publish the stolen information that is critical in nature. Government
websites are hot on hackers' target lists and attacks on Government websites receive wide press
coverage. For example, according to the story posted on December 2009, the NASA site was hacked via
SQL Injection.
1.5.12 Online Frauds
There are a few major types of crimes under the category of hacking: Spoofing website and E-Mail
security alerts, hoax mails about virus threats, lottery frauds and Spoofing. In Spoofing websites and
E-Mail security threats, fraudsters create authentic looking websites that are actually nothing but a
spoof. The purpose of these websites is to make the user enter personal information which is then used
to access business and bank accounts. Fraudsters are increasingly turning to E-Mail to generate traffic
to these websites. This kind of online fraud is common in banking and financial sector. There is a rise in
the number of financial institutions' customers who receive such E-Mails which usually contain a link to
a spoof website and mislead users to enter user ids and passwords that security details can be updated
or passwords changed. It is wise to be alert and careful about E-Mails containing an embedded link.
with a request for you to enter secret details. It is strongly recommended not to input any sensitive
information that might help criminals to gain access to sensitive information, such as bank account
details, even if the page appears legitimate.
In virus hoax E-Mails, the warnings may be genuine, so there is always a dilemma whether to take them
lightly or seriously. A wise action is to first confirm by visiting an antivirus site such as McAfee, Sophos
or Symantec before taking any action, such as forwarding them to friends and colleagues.
Lottery frauds are typically letters or E-Mails that inform the recipient that he/she has won a prize in a
lottery. To get the money, the recipient has to reply, after which another mail is received asking for bank
details so that the money can be directly transferred. The E-Mail also asks for a processing fee/handling
fee. Of course, the money is never transferred in this case, the processing fee is swindled and the
banking details are used for other frauds and scams.
"Spoofing" means illegal intrusion, posing as a genuine user. A hacker logs-in to a computer illegally,
using a different identity than his own. He is able to do this by having previously obtained the actual
pass word. He creates a new identity by fooling the computer into thinking that the hacker is the
genuine system operator and then hacker then takes control of the system. He can commit
innumerable number of frauds using this false identity.
"Child pornography" means any visual depiction, including but not limited to the following:
1. Any photograph that can be considered obscene and/or unsuitable for the age of child viewer;
2. film, video, picture;
3. computer-generated image or picture of sexually explicit conduct where the production of such
visual depiction involves the use of a minor engaging in sexually explicit conduct.
Child pornography is considered an offense. Unfortunately, child pornography is a reality of the
Internet. The Internet is being highly used by its abusers to reach and abuse children sexually,
worldwide. In India too,the Internet has become a household commodity in the urban areas of the
nation. Its explosion has made the children a viable victim to the cybercrime. As the broad-band
connections get into the reach of more and more homes, larger child population will be using the
Internet and therefore greater would be the chances of falling victim to the aggression of pedophiles.
"Pedophiles" are people who physically or psychologically coerce minors to engage in sexual activities,
which the minors would not consciously consent to.
Here is how pedophiles operate:
Step 1: Pedophiles use a false identity to trap the children/teenagers (using "false identity" which in
itself is another crime called "identity theft").
Step 2: They seek children/teens in the kids' areas on the services, such as the Teens BB, Games BB or
chat areas where the children gather.
Step 3: They befriend children/teens.
Step 4: They extract personal information from the child/teen by winning his/her confidence.
Step 5: Pedophiles get E-Mail address of the child/teen and start making contacts on the victim's E-Mail
address as well. Sometimes, these E-Mails contain sexually explicit language.
Step 6: They start sending pornographic images/text to the victim including child pornographic images
in order to help child/teen shed his/her inhibitions so that a feeling is created in the mind of the victim
that what is being fed to him is normal and that everybody does it.
Step 7: At the end of it, the pedophiles set up a meeting with the child/teen out of the house and then
drag him/her into the net to further sexually assault him/her or to use him/her as a sex object.
This is the irony of the "digital world"; in physical world, parents know the face of dangers and they
know how to avoid and face the problems by following simple rules and accordingly they advice their
children to keep away from dangerous things and ways. However, it is possible, even in the modern
times most parents may not know the basics of the Internet and the associated (hidden) dangers from
the services offered over the Internet. Hence most children may remain unprotected in the cyberworld.
Pedophiles take advantage of this situation and lure the children, who are not advised by their parents
or by their teachers about what is right/wrong for them while browsing the Internet. Legal remedies
exist only to some extent, for example, Children's Online Privacy Protection Act of COPPA is a way of
preventing online pornography. Interested readers are referred to COPPA sites. Readers would like to
note that Net Nanny and Cybersitter are software, originally designed for parents concerned about
their children's unrestricted access to the seamier side of the Internet, which can be used to block a
user's access to websites containing "dangerous" or "offensive" material.
1.5.14 Software Piracy
This is a big challenge area indeed. Cybercrime investigation cell of India defines "software piracy" as
theft of software through the illegal copying of genuine programs or the counterfeiting and distribution
of products intended to pau fer the original. There are many examples of software piracy: end-user
copying-friends loaning disks to each other, or organizations under-reporting the number of software
installations they have made, or organizations not tracking their software licenses; hard disk loading
10
with illicit means - hard disk vendors load pirated software, counterfeiting-large-scale duplication and
distribution of illegally copied software, illegal downloads from the Internet-by intrusion, by cracking
serial numbers, etc.
Beware that those who buy pirared software have a lot to lose:
(a) getting untested software that may have been copied thousands of times over,
(b) the software, if pirated, may potentially contain hard-drive-infecting viruses,
(c) there is no technical support in the case of software failure, that is, lack of technical product support
available to properly licensed users,
(d) there is no warranty protection,
(e) there is no legal right to use the product, etc.
1.5.15 Computer Sabotage
The term "sabotage" has been mentioned many times in this chapter. The use of the Internet to hinder
the normal functioning of a computer system through the introduction of worms, viruses or logic
bombs, is referred to as computer sabotage. It can be used to gain economic advantage over a
competitor, to pro mote the illegal activities of terrorists or to steal data or programs for extortion
purposes. Logic bombs are event-dependent programs created to do something only when a certain
event (known as a trigger event) occurs. Some viruses may be termed as logic bombs because they lie
dormant all through the year and become active only on a particular date (e.g.. the Chernobyl virus and
Y2K viruses).
1.5.16 E-Mail Bombing/Mail Bombs
E-Mail bombing refers to sending a large number of E-Mails to the victim to crash victim's E-Mail
account (in the case of an individual) or to make victim's mail servers crash (in the case of a company or
an E-Mail service provider). Computer program can be written to instruct a computer to do such tasks
on a repeated basis. In recent times, terrorism has hit the Internet in the form of mail bombings. By
instructing a computer to repeatedly send E-Mail to a specified person's E-Mail address, the
cybercriminal can overwhelm the recipient's personal account and potentially shut down entire
systems. This may or may not be illegal, but it is certainly disruptive.
1.5.17 Usenet Newsgroup as the Source of Cybercrimes
Usenet is a popular means of sharing and distributing information on the Web with respect to specific
topic or subjects. Usenet is a mechanism that allows sharing information in a many-to-many manner.
The news- groups are spread across 30,000 different topics. In principle, it is possible to prevent the
distribution of specific newsgroup. In reality, however, there is no technical method available for
controlling the contents of any newsgroup. It is merely subject to self-regulation and net etiquette. It is
feasible to block specific news- groups, however, this cannot be considered as a definitive solution to
illegal or harmful content.
It is possible to put Usenet to following criminal use:
1. Distribution/sale of pornographic material;
2. distribution/sale of pirated software packages;
3. distribution of hacking software;
4. sale of stolen credit card numbers;
5. sale of stolen data/stolen property.
11
Cybercrime, in a way, is the outcome of "globalization" However, globalization does not mean
globalized welfare at all. Globalized information systems accommodate an increasing number of trans
national offenses. The network context of cybercrime makes it one of the most globalized offenses of
the present and the most modernized threats of the future. This problem can be resolved in two ways.
One is to divide information systems into segments bordered by state boundaries (cross-border flow of
information). The other is to incorporate the legal system into an integrated entity obliterating these
state boundaries. Apparently the first way is unrealistic. Although all ancient empires including Rome
Greece and Mongolia became historical remnants, and giant empires are not prevalent in current
world, the partition of information systems cannot be an imagined practice. In a globally connected
world. information systems become the unique empire without tangible territory
Thus, one can see that there is a lot to do toward building confidence and security in the use of ICT and
moving toward international cooperation agenda. This is because in the 21" century, there is a growing
dependency on ICTs that span the globe There was a rapid growth in ICTs and dependencies that led to
shift in perception of cybersecurity threats in mid-1990s. The linkage of cybersecurity and critical
infrastructure protection has become a big issue as a number of countries have began assessment of
threats, vulnerabilities and started exploring mechanisms to redress them Recently, there have been a
number of significant developments such as
1. August 4, 2006 Announcement: The US Senate ratifies CoE Convention on Cyber Crime The
convention targets hackers, those spreading destructive computer viruses those using the Internet for
the sexual exploitation of children or the distribution of racist material, and terrorists attempting to
attack infrastructure facilities or financial institutions. The Convention is in full accord with all the US
constitutional protections, such as free speech and other civil liberties, and will require no change to
the US laws.
2. In August 18, 2006, there was a news article published "ISPs Wary About 'Drastic Obligations on Web
Site Blocking." European Union (EU) officials want to debar suspicious websites as part of a 6-point plan
to boost joint antiterrorism activities. They want to block websites that incite terrorist action. Once
again it is underlined that monitoring calls. Internet and E-Mail traffic for law enforcement purposes is a
task vested in the government, which must reimburse carriers and providers for retaining the data.
3. CoE Cyber Crime Convention (1997-2001) was the first international treaty seeking to address
Internet crimes by harmonizing national laws. improving investigative techniques and increasing
cooperation among nations. 19% More than 40 countries have ratified the Convention to date.
One wonders as to what is the role of business/private sector in taking up measures to prevent
cybercrime and toward responsibilities and role related to the ownership of information and
communication infrastructures. Effective security requires an in-depth understanding of the various
aspects of information and communication networks. Therefore private sectors expertise should be
increasingly involved in the development and implementation of a country's cybersecurity strategy.