Overview of Cyber Crime and Security
Overview of Cyber Crime and Security
Cyber Security-UNIT-1
Portions: Introduction and Overview of Cyber Crime, Nature
and Scope of Cyber Crime, Definition, Categories of Cyber
Crime, Preview, classification of Cyber Crime, Social
Engineering, Property Cyber Crime. Cybercrime-Indian
perspective/the Indian ITA 2000, Cyber Offenses: How
criminals plan then.
Text Book
Sunit Belapure and Nina Godbole,
“Cyber Security: Understanding Cyber
Crimes, Computer Forensics And Legal
Perspectives”, Wiley India Pvt Ltd, ISBN:
978-81- 265-21791, Publish Date 2013.
2
Introduction & Overview
• Internet has opened a new way of exploitation known as cybercrime.
• The activities involve the use of computers, internet , cyberspace and world
wide web.
• First known cybercrime was in 1820 in France. All over the world & India
also there were many cybercrimes found. Indian corporate & govt. sites
were attacked/defaced > 780 times between Feb.2000 & [Link] 2009
Dec. it is found total of 3286 Indian websites were hacked in 5 months (Jan
– June).
• While most cybercriminals use cybercrimes to generate a profit, some
cybercrimes are carried out against computers or devices to directly
damage or disable them.
3
1.1 Introduction to Cybercrime
• Figure below is based on a 2008 survey in Australia, shows the
cybercrime trend.
12/22/2024 [Link] AM 4
1.1 Introduction to Cybercrime
[Link]
12/22/2024 [Link] AM 6
Scope of cybercrime
The scope of cybercrime is broad and encompasses a wide range of illegal activities conducted through digital means.
1. Hacking and Unauthorized Access:
• Unauthorized access to computers, networks, and data.
• Exploiting vulnerabilities to gain control of systems.
2. Malware and Ransomware:
• Distribution of malicious software (malware) to damage or disrupt systems.
• Ransomware attacks that encrypt data and demand payment for its release.
3. Phishing and Social Engineering:
• Deceptive tactics to trick individuals into providing sensitive information.
• Fake emails, websites, or messages designed to steal personal data.
4. Identity Theft and Fraud:
• Stealing personal information to commit fraud or other crimes.
• Using stolen identities to open accounts, make purchases, or conduct illegal activities.
5. Financial Crimes:
• Online banking fraud, credit card fraud, and other financial scams.
• Money laundering using digital currencies.
6. Cyber Espionage:
• Spying on organizations or governments to steal sensitive information.
• Conducting cyber attacks to gather intelligence.
7. Intellectual Property Theft:
7
• Stealing trade secrets, copyrights, patents, and other intellectual property.
Scope of cybercrime (contd..)
8. Cyberstalking and Harassment:
○ Using digital means to stalk, harass, or intimidate individuals.
○ Online bullying, threats, and defamatory campaigns.
9. Data Breaches:
○ Unauthorized access to sensitive data, often involving large databases.
○ Exposing personal information of individuals or proprietary information of organizations.
[Link]:
○ Attacks on critical infrastructure such as power grids, water supply, and transportation systems.
○ Use of digital means to create fear, disrupt society, or cause harm.
[Link]:
○ Unauthorized use of someone else's computer to mine cryptocurrencies.
○ Often involves infecting computers with malware that performs the mining.
[Link] Web Activities:
○ Illegal marketplaces and forums on the dark web.
○ Sale of drugs, weapons, stolen data, and other contraband.
[Link]:
○ Networks of infected computers controlled remotely to conduct attacks.
○ Distributed Denial of Service (DDoS) attacks and spamming operations.
[Link] Child Exploitation:
○ Distribution and possession of child pornography.
○ Grooming and exploiting children through digital means.
8
Nature of Cybercrime
• Cyberspace misuse : Cyberspace is the internet & other computer networks. Misuse of these for unlawful
purpose is a cybercrime.
• Cyberpunk : hackers/crackers with punk attitudes committing cybercrime.
• Cyberwarefare: This is the act of information warriors unleashing attacks against unsuspecting computer
networks, creating havoc and paralyzing nations.
• Cybersquatting: (or domain squatting) It is the act of registering, trafficking in, selling, or using an Internet
domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else.
• Cyberterrorism: (Barry Collin in 1997) It is premediated use of disruptive activities or the threat against
computers & networks, with the intention to cause harm or further social, ideological, religious , political or
similar objectives or to intimidate persons.
• Cracking: gaining unauthorized access to computer systems to commit a crime, such as digging into the History
and Types of Cybercrime code to make a copy-protected program run without a password or a valid license
string, flooding Internet sites and thus denying service to legitimate users, erasing information, corrupting
information, and deliberately defacing Web sites
• Piracy: copying protected software without authorization
• Phreaking: obtaining free telephone calls or having calls charged to a different account by using a computer or
another device to manipulate a phone system
• Cyberstalking: harassing and terrorizing selected human and institutional targets using the computer, causing
them to fear injury or harm
9
• Cyberpornography: producing and/or distributing pornography using a computer
Cybercrime definition
1) It is a crime conducted in which a computer was directly and significantly
instrumental, and is related to technology, computers, and the Internet.
2) It is a crime committed using computer and the internet to steal a
person’s identity, or sell contraband, or stalk victims or disrupt operations
with malevolent programs, with mainly two types of attacks.
• Techno-crime: A premediated act against system/s with intent to
copy, steal, prevent access, corrupt or otherwise deface or damage
parts of or the complete computer system.
• Techno-vandalism: These acts of "brainless" defacement of
websites and/or other activities, such as copying files and
publicizing their contents publicly, are usually opportunistic in
nature. Tight internal security, allied to strong technical safeguards,
should prevent the vast majority of such incidents.
10
Categories of cyber crime
There are 2 ways:
• The computer as a target: Using a computer to attack other
computer
Eg: Hacking, virus/worms, attacks, dos attack
• The computer as a weapon: using a computer to commit real
world crime
Example: cyber terrorism, credit card fraud and pornography
etc..
11
Safety tips to protect from cybercrime
• Use antivirus software
• Inset Firewalls
• Uninstall unnecessary software
• Maintain Backup
• Check security settings
12
What is Cybersecurity?
• Lack of information security gives rise to cybercrimes
• “Cybersecurity” means protecting information, equipment,
devices, computer, computer resource, communication device and
information stored therein from unauthorized access, use,
disclosure, disruption, modification or destruction. (Indian
Information Technology Act (ITA-2008))
• The term incorporates both the physical security of devices as
well as the information stored therein.
• It covers protection from unauthorized access, use, disclosure,
disruption, modification and destruction.
13
Advantages of cyber security
• Protection of Sensitive Data • Enhanced Collaboration
• Business Continuity • Remote Work Security
• Compliance with Regulations • Improved Cyber Posture
• Enhanced Customer Trust • Removing Unwanted Programs
• Competitive Benefit • Denying Unwanted Access
• Early Detection and Response • Helps Educate the Workforce
• Intellectual Property Protection • Easy Data Recovery
• Reputation Protection
14
15
One of Cybercrimes
16
17
18
Who are Cybercriminals?
12/22/2024 [Link] AM 19
Who are cyber criminals - a categorization
Type I : Cybercriminals hungry for recognition - hobby hackers, IT
professionals using social engineering, politically motivated hackers,
terrorist organizations.
Type II: Cybercriminals not interested in recognition
psychological perverts, financially motivated hackers (corporate
espionage), state sponsored hacking (national espionage , sabotage) ,
organized criminals
Type III : Cybercriminals insiders
Disgruntled or former employees seeking revenge, competing
companies using employees to gain economic advantage through
damage / theft.
20
Who are Cybercriminals?
12/22/2024 [Link] AM 21
cybercrime classification A scheme for is given in table 1.6 below.
22
Classification of Cybercrimes
23
1. Cybercrime against Individual
• E-Mail Spoofing, spamming and other online frauds: Email spoofing is a
threat that involves sending email messages with a fake sender address.
• Phishing, Spear Phishing and its various other forms such as Vishing and
smishing
• Cyberdefamation: the act of making false statements about someone on
the internet that harm their reputation.
• Cyberstalking and harassment: a crime to harass or stalk online.
• Computer sabotage: input, alteration, erasure or suppression of computer
data or computer programmes, or interference with computer systems
• Pornographic offenses : transmission & distribution of pornographic
content
• Password sniffing: This also belongs to the category of cybercrimes
against organization because the use of password could be by an
individual for his/her personal work or the work he/she is doing using a
computer that belongs to an organization
24
25
3. Cyber crime against organization
1. Unauthorized accessing of computer: Hacking is one method of doing
this and hacking is a punishable offense
2. Password sniffing:
3. Denial-of-service attacks (known as DoS attacks):.
4. Virus attack/dissemination of viruses:
5. E-Mail bombing/mail bombs:
6. Salami attack/Salami technique:
7. Logic bomb: (Computer Sabotage).
8. Trojan Horse:
9. Data diddling:
[Link] emanating from Usenet newsgroup:
[Link] spying/industrial espionage:
[Link] network intrusions:
[Link] piracy
26
Recently the site of MIT (Ministry of Information Technology) was hacked by the
Pakistani hackers and some obscene matter was placed therein. Further the
site of Bombay crime branch was also web jacked
27
5. Crimes emanating from Usenet newsgroup
12/22/2024 [Link] AM 33
Classifications of Cybercrimes - Salami Attack
Example:
A bank employee inserts a program, into the bank’s servers, that deducts
a small amount of money (say ` 2/- or a few cents in a month) from the
account of every customer. No account holder will probably notice this
unauthorized debit, but the bank employee will make a sizable amount
every month.
12/22/2024 [Link] AM 34
• A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to
its intended users. DoS attacks accomplish this by flooding the target with traffic, or sending it information that
triggers a crash
• A malware attack is where a computer system or network is infected with a computer virus or other type of
malware
• A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your
computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your
data or network. The victim receives an official-looking email with an attachment. The attachment contains
malicious code that is executed as soon as the victim clicks on the attachment.
• A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function
when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files
(such as a salary database trigger), should they ever be terminated from the company.
• An email bomb is an attack against an email inbox or server designed to overwhelm an
inbox or inhibit the server’s normal function, rendering it unresponsive, preventing
email communications, degrading network performance, or causing downtime.
• A salami attack is a series of smaller attacks that together result in a large-scale attack. For example, slicing
fractions of cents from each transaction wouldn't show in calculations because of rounding up sums, but after
billions of transactions, you can steal a considerable amount
• Data diddling is an illegal or unauthorized data alteration. Changing data before or as it is input into a computer or
output. Example: Account executives can change the employee time sheet information of employees before
entering to the HR payroll application
35
1.4 Classifications of Cybercrimes - Data Diddling
12/22/2024 [Link] AM 38
1.4 Classifications of Cybercrimes
• Industrial Spying/Industrial Espionage
• There are also the E-Mail worms automating similar “data exfiltration
features”.
• E-Mail worms can scan the hard drive of infected machines for all files
with the following extensions: .. Such files are uploaded on an FTP
server owned by the cybercrooks, with the
pdf, .doc, .dwg, .sch, .pcb, .dwt, .dwf, .max, .mdbaim of stealing as
much IP as possible wherever it can be and then selling it to people who
are ready to pay for it.
• Organizations subject to online extortion tend to keep quiet about it to
avoid negative publicity about them.
12/22/2024 [Link] AM 39
1.4 Classifications of Cybercrimes
Hacking
Purposes
• Greed
• Power
• Publicity
• Revenge
• Adventure
• Desire to access forbidden information
• Destructive mindset
• Every act committed toward breaking into a computer and/or
network is hacking and it is an offense. Those who break into
computer systems are called crackers and those targeting phones are
phreaks.
12/22/2024 [Link] AM 40
1.4 Classifications of Cybercrimes
Hacking (Cont…)
• Hackers write or use ready-made computer programs to attack the target
computer.
• They possess the desire to destruct, and they get enjoyment out of such
destruction.
• Some hackers hack for personal monetary gains, such as stealing credit card
information, transferring money from various bank accounts to their own account
followed by withdrawal of money.
• They extort money from some corporate giant threatening him to publish the
stolen information that is critical in nature.
• Government websites are hot on hackers’ target lists and attacks on Government
websites receive wide press coverage. (For example, according to the story posted
on December 2009, the NASA site was hacked via SQL Injection)
12/22/2024 [Link] AM 41
1.4 Classifications of Cybercrimes
Online frauds
• There are a few major types of crimes under the category of
hacking: Spoofing website and E-Mail security alerts, hoax mails
about virus threats, lottery frauds and Spoofing
• In Spoofing websites and E-Mail security threats, fraudsters create
authentic looking websites that are actually nothing but a spoof
• The purpose of these websites is to make the user enter personal
information which is then used to access business and bank
accounts.
• Fraudsters are increasingly turning to E-Mail to generate traffic to
these websites. This kind of online fraud is common in banking
and financial sector.
12/22/2024 [Link] AM 42
1.4 Classifications of Cybercrimes
Online frauds (Cont…)
• In virus hoax E-Mails, the warnings may be genuine, so there is always a dilemma
whether to take them lightly or seriously.
• A wise action is to first confirm by visiting an antivirus site such as McAfee, Sophos
or Symantec before taking any action, such as forwarding them to friends and
colleagues.
• Lottery frauds are typically letters or E-Mails that inform the recipient that he/she
has won a prize in a lottery. To get the money, the recipient has to reply, after which
another mail is received asking for bank details so that the money can be directly
transferred.
• The E-Mail also asks for a processing fee/handling fee. Of course, the money is
never transferred in this case; the processing fee is swindled, and the banking
details are used for other frauds and scams.
12/22/2024 [Link] AM 43
1.4 Classifications of Cybercrimes
Online frauds (Cont…)
• “Spoofing” means illegal intrusion, posing as a genuine user. A hacker logs-in
to a computer illegally, using a different identity than his own.
• He creates a new identity by fooling the computer into thinking that the
hacker is the genuine system operator and then hacker then takes control of
the system.
12/22/2024 [Link] AM 44
1.4 Classifications of Cybercrimes
Pornographic Offenses
• “Child pornography” means any visual depiction, including but not limited to the
following:
1. Any photograph that can be considered obscene and/or unsuitable for the
age of child viewer;
12/22/2024 [Link] AM 45
1.4 Classifications of Cybercrimes
• The Internet is being highly used by its abusers to reach and abuse children sexually,
worldwide. Its explosion has made the children a viable victim to the cybercrime.
• As the broad-band connections get into the reach of more and more homes, larger
child population will be using the Internet and therefore greater would be the
chances of falling victim to the aggression of pedophiles.
12/22/2024 [Link] AM 46
1.4 Classifications of Cybercrimes
Step 2: They seek children/teens in the kids’ areas on the services, such as the Teens BB,
Games BB or chat areas where the children gather.
Step 4: They extract personal information from the child/teen by winning his/her confidence.
Step 5: Pedophiles get E-Mail address of the child/teen and start making contacts on the
victim’s E-Mail address as well. Sometimes, these E-Mails contain sexually explicit language.
12/22/2024 [Link] AM 47
1.4 Classifications of Cybercrimes
Step 7: At the end of it, the pedophiles set up a meeting with the child/teen
out of the house and then drag him/her into the net to further sexually
assault him/her or to use him/her as a sex object.
12/22/2024 [Link] AM 48
1.4 Classifications of Cybercrimes
12/22/2024 [Link] AM 49
1.4 Classifications of Cybercrimes
Software piracy
• It Is defined as theft of software through the illegal copying of genuine
programs, or the counterfeiting and distribution of products intended to
pass for the original.
• There are many examples of software piracy:
• end-user copying – friends loaning disks to each other, or organizations
under-reporting the number of software installations they have made, or
organizations not tracking their software licenses;
• hard disk loading with illicit means – hard disk vendors load pirated
software;
• counterfeiting – large-scale duplication and distribution of illegally copied
software;
• illegal downloads from the Internet – by intrusion, by cracking serial
numbers, etc.
12/22/2024 [Link] AM 50
1.4 Classifications of Cybercrimes
Software piracy (Cont…)
• Beware that those who buy pirated software have a lot to lose:
• (a) getting untested software that may have been copied
thousands of times over,
• (b) the software, if pirated, may potentially contain hard-drive-
infecting viruses,
• (c) there is no technical support in the case of software failure,
that is, lack of technical product support available to properly
licensed users,
• (d) there is no warranty protection
• (e) there is no legal right to use the product, etc.
12/22/2024 [Link] AM 51
1.4 Classifications of Cybercrimes
Software piracy (Cont…)
12/22/2024 [Link] AM 53
1.4 Classifications of Cybercrimes
E-Mail Bombing/Mail Bombs
• E-Mail bombing refers to sending a large number of E-Mails to the victim
to crash victim’s E-Mail account (in the case of an individual) or to make
victim’s mail servers crash (in the case of a company or an E-Mail service
provider).
12/22/2024 [Link] AM 56
1.4 Classifications of Cybercrimes
Password sniffing
• These are programs that monitor and record the name and password
of network users as they login
• Whoever installs the Sniffer can then impersonate an authorized user
and login to access restricted documents.
• Laws are not yet set up to adequately prosecute a person for
impersonating another person online.
• Laws designed to prevent unauthorized access to information may be
effective in apprehending crackers using Sniffer programs.
12/22/2024 [Link] AM 57
1.4 Classifications of Cybercrimes
• Bulletin boards and other online services are frequent targets for
hackers who want to access large databases of credit card information.
Identity theft
• This fraud involves another person’s identity for an illicit purpose.
• Phishing and identity theft are related offenses.
• Examples include fraudulently obtaining credit, stealing money from
the victim’s bank accounts, using the victim’s credit card number,
establishing accounts with utility companies, renting an apartment or
even filing bankruptcy using the victim’s name.
• The cyberimpersonator can steal unlimited funds in the victim’s name
without the victim even knowing about it for months,
12/22/2024 [Link] AM 59
60
Social Engineering
61
Classification of Social Engineering
• Human Based Social Engineering : Person-person interaction to get
the required / desired information . Ex. Calling the help desk and
trying to find out a password.
62
Human based social engineering
63
Computer based social engineering
64
Examples of typical of Social Engineering Attacks
[Link]: tactics include deceptive emails, websites, and text messages to steal information.
[Link] Phishing: email is used to carry out targeted attacks against individuals or businesses.
[Link]: an online and physical social engineering attack that promises the victim a reward.
[Link]: victims are tricked into believing that malware is installed on their computer and
that if they pay, the malware will be removed.
[Link]: uses false identity to trick victims into giving up information.
[Link] Pro Quo: relies on an exchange of information or service to convince the victim to act.
[Link]: relies on human trust to give the criminal physical access to a secure building or
area.
[Link]: urgent voice mails convince victims they need to act quickly to protect themselves
from arrest or other risk.
[Link]-Holing: an advanced social engineering attack that infects both a website and its
visitors with malware.
65
Property Cybercrime : Cybercrimes Resulting in Harm to Property
69
Cybercrimes : Indian statistics (contd..)
70
Cybercrimes : Indian statistics (contd..)
71
Cybercrimes : Indian statistics (contd..)
72
Cybercrime and the Indian ITA 2000 (chapter1.8)
In India, the ITA 2000 was enacted after the United Nation General Assembly
Resolution A/RES/51/162 in January 30, 1997 by adopting the Model Law on
Electronic Commerce adopted by the United Nations Commission on
International Trade Law. This was the first step toward the Law relating to E-
Commerce at inter- national level to regulate an alternative form of
commerce and to give legal status in the area of E-Commerce. It was enacted
taking into consideration UNCITRAL model of Law on Electronic Commerce.
1) Hacking and the Indian Law: Cybercrimes are punishable under two
categories: the ITA 2000 (Information technology Act) and the IPC . A total of
207 cases of cybercrime were registered under the IT Act in 2007 compared
to 142 cases are registered.
73
Indian ITA 2000 – main provisions (sections )
Contd..
74
Indian ITA 2000 (contd..)
75
Cyber Offenses: How criminals plan then
(ch.2)
An attacker exploits the vulnerabilities of the network because the
network is not adequately protected. These categories of vulnerabilities
are as below.
[Link] border protection (border as in the sense of network
periphery);
2. Remote access servers (RASS) with weak access controls;
3. Application servers with well-known exploits;
4. Misconfigured systems and systems with default configurations.
76
2.1
Introduction Few tools for hacking
12/22/2024 [Link] AM 78
2.2
How Criminals Plan the Attacks
5. Series of events:
• This involves attacker interacting with the victims repetitively.
• For e.g., attacker interacts with the victim on the phone and/or via chat rooms to
establish relationship first and then they exploit that relationship to commit the
sexual assault.
12/22/2024 [Link] AM 79
How Criminals plan the attacks
• Criminals use many methods and tools to locate the vulnerabilities of their target.
The target can be an individual and/or an organization. Criminals plan passive and
active attacks .
• Active attacks are usually used to alter the system (i.e., computer network)
whereas passive attacks attempt to gain information about the target.
• Active attacks may affect the availability, integrity and authenticity of data whereas
passive attacks lead to breaches of confidentiality.
• Attacks can also be categorized as either inside or outside. An attack originating
and/or attempted within the security perimeter of an organization is an inside
attack; it is usually attempted by an "insider" who gains access to more resources
than expected. An outside attack is attempted by a source outside the security
perimeter, maybe attempted by an insider and/or an outsider, who is indirectly
associated with the organization, it is attempted through the Internet or a remote
access connection.
Contd..
81
Passive Attack
82
Active attack
83
2.2
How Criminals Plan the Attacks
86
2.2
How Criminals Plan the Attacks
The following phases are involved in planning
cybercrime:
Scanning and
Reconnaissance Attack
scrutinizing
the gathered
(information gathering) information for the Launching an attack
is the first phase and is validity of the (gaining and
treated as passive information as well as maintaining system
attacks. to identify the existing access).
vulnerabilities.
12/22/2024 [Link] AM 87
2.2
How Criminals Plan the Attacks
1. Reconnaissance:
• The literal meaning of “Reconnaissance” is an act of reconnoitering – explore,
often with the goal of finding something or somebody (especially to gain
information about an enemy or potential enemy).
• In the world of “hacking,” reconnaissance phase begins with “Footprinting” –
this is the preparation toward preattack phase, and involves accumulating data
about the target’s environment and computer architecture to find ways to
intrude into that environment.
• Footprinting gives an overview about system vulnerabilities and provides a
judgment about possible exploitation of those vulnerabilities.
• The objective of this preparatory phase is to understand the system, its
networking ports and services, and any other aspects of its security that are
needful for launching the attack.
• Thus, an attacker attempts to gather information in two phases: passive and
active attacks.
12/22/2024 [Link] AM 88
Scanning and scrutinizing gathered
information
89
Attack : gaining and maintaining the system access
90