SlideShare a Scribd company logo
1 of 26
Download to read offline
Cyber Security 20MCA251
Module-1
Introduction to Cybercrime and Laws
Module Contents
●
Introduction, Cybercrime: Definition and Origins of
the word, Cybercrime and information Security, Who
are Cybercriminals? Classifications of Cybercrimes.
●
How Criminals Plan Them –Introduction, How
Criminals Plan the Attacks, Cybercafé and
Cybercrimes, Botnets, Attack Vector
●
The Indian IT ACT 2000 and amendments.
Definition and Origins of the word
●
Reaching consensus on a definition of computer
crime is difficult.
●
One definition that is advocated is, "a crime
conducted in which a computer was directly
and significantly instrumental"
●
This definition is not universally accepted.
●
We can propose the following alternative definitions of
computer crime:
– Any illegal act where a special knowledge of computer
technology is essential for its perpetration, investigation or
prosecution.
– Any traditional crime that has acquired a new dimension or
order of magnitude through the aid of a computer, and
abuses that have come into being because of computers.
– Any financial dishonesty that takes place in a computer
environment.
– Any threats to the computer itself, such as theft of hardware
or software, sabotage and demands for ransom.
Here is yet another definition:
●
"cyber crime (computer crime) is any illegal
behavior, directed by means of electronic
operations, that target the security of computer
systems and the data processed by them,"
●
Note that in a wider sense, "computer-related crime"
can be any illegal behavior committed by means of, or
in relation to, a computer system or network; however,
this is not cyber crime.
●
Statute and treaty law both refer to "cybercrime."
●
The term "cybercrime" relates to a number of
other terms that may sometimes be used
interchangeably to describe crimes committed
using computers.
●
Computer related crime, Computercrime,
Internet crime, Ecrime. High-tech crime, etc, are
the other synonymous terms.
●
Cybercrime specifically can be defined in a number
of ways a few definitions are:
– A crime committed using a computer and the Internet to
steal a person's identity (identity theft) or sell contraband
or stalk victims or disrupt operations with malevolent
programs.
– Crimes completed either on or with a computer.
– Any illegal activity done through the Internet or on the
computer.
– All criminal activities done using the medium of
computers, the Internet, cyberspace and the WWW.
●
However, while the legal systems around the world scramble
to introduce laws to combat cyber criminals,two types of attack
are prevalent:
– Techno-crime: A premeditated act against a system or systems, with
the intent to copy, steal, prevent access, corrupt or otherwise deface
or damage parts of or the complete computer system.
The 24×7connection to the Internet makes this type of cybercrime a
real possibility to engineer from anywhere in the world, leaving few, if
any, "finger prints."
– Techno-vandalism: These acts of "brainless" defacement of
websites and/or other activities, such as copying files and publicizing
their contents publicly, are usually opportunistic in nature.
Tight internal security, allied to strong technical safeguards, should
prevent the vast majority of such incidents.
Cybercrime and information
Security
●
Lack of information security gives rise to cyber
crimes.
●
Let us refer to the amended Indian Information
Technology Act (ITA) 2000 in the context of
cybercrime.
●
From an Indian perspective, the new version of the
Act (referred to as ITA 2008 ) provides a new focus
on "Information Security in India."
Cyber Security
●
"Cyber security" means protecting information,
equipment, devices, computer, computer resource,
communication device and information stored therein
from unauthorized access, use, disclosure,
disruption, modification or destruction.
●
The term incorporates both the physical security of
devices as well as the information stored therein.
●
It covers protection from unauthorized access, use,
disclosure, disruption, modification and destruction.
Who are Cybercriminals?
●
With the growth in the public domain in recent years
of the Internet, cyberlaw has emerged as a real
problem.
●
In a legal sense, cyberlaw encompasses cybercrime
(that is, crimes completed either on or with a
computer), electronic commerce theft, intellectual
property rights or copyright infringement, and privacy
rights infringement or identity theft
Who are Cybercriminals?
●
Cybercrime involves such activities as child
pornography; credit card fraud; cyberstalking;
defaming another online; gaining unauthorized access
to computer systems; ignoring copyright, software
licensing, and trademark protection; overriding
encryption to make illegal copies; software piracy; and
stealing another’s identity to perform criminal acts.
●
Cybercriminals are those who conduct such acts.
Types of Cybercriminals
●
Type I : Hunger for Recognition
●
Type II : Not interested in Recognition
●
Type III : The insiders
Type I : Hunger for Recognition
●
Hobby Hackers
●
IT Professionals (Social Engineering is one of
the biggest threat)
●
Politically Motivated hackers
●
Terorist Organizations.
Type II : Not interested in
Recognition
●
Psycological perverts
●
Financially motivated hackers (corporate
espionage)
●
State-sponsored hacking(national
espionage,subotage)
●
Organized criminals
Type III : The insiders
●
Disgruntled or former employees seeking
revange
●
Competing companies using employees to gain
economic advantage through damage and /or
theft.
Classifications of Cybercrimes
●
Crime is defined as
– "an act or the commission of an act that
is forbidden, or the omission of a duty
that is commanded by a public law and
that makes the offender liable to
punishment by that law".
●
Cybercrimes are classified as follows:
– 1. Cybercrime against individual
– 2. Cybercrime against property
– 3. Cybercrime against organization
– 4. Cybercrime against Society
– 5. Crimes emanating from Usenet newsgroup
1. Cybercrime against individual
– Electronic Mail (E-Mail) Spoofing and other online frauds
– Phishing, Spear Phishing and its various other forms
such as Vishing and Smishing
– Spamming
– Cyberdefamation
– Cyberstalking and Harassment
– Computer Sabotage
– Pornographic Offenses
– Password Sniffing
2. Cybercrime against property
– Credit card frauds
– Intellectual property (IP) crimes
– Internet time theft
3. Cybercrime against organization
– Unauthorized accessing of computer
– Password sniffing
– Denial-of-service attacks
– Virus attack/dissemination of viruses
– E-Mail bombing/mail bombs
– Salami attack/Salami technique
– Logic bomb
– Trojan Horse
– Data diddling
– Crimes emanating from Usenet newsgroup
– Industrial spying/industrial espionage
– Computer network intrusions
– Software piracy
4. Cybercrime against Society
– Forgery
– Cyberterrorism
– Web Jacking
5. Crimes emanating from Usenet newsgroup
– By its very nature, Usenet groups may carry very
offensive, harmful, inaccurate or otherwise
inappropriate material, or in some cases, postings
that have been mislabeled or are deceptive in another
way.
– Therefore, it is expected that you will use caution and
common sense and exercise proper judgment when
using Usenet, as well as use the service at your own
risk.

More Related Content

Similar to M1-01-CybercrimeIntroduction.pdf

cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesVivekanandaGN1
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diplomaDrPraveenKumar37
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its securityAshwini Awatare
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersAman Sharma
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
Cyber crime
Cyber crimeCyber crime
Cyber crime24sneha
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeDivithC
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2AVISHITYAGI
 

Similar to M1-01-CybercrimeIntroduction.pdf (20)

UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture NotesCyber Secuirty Fully explained Lecture Notes
Cyber Secuirty Fully explained Lecture Notes
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber crimes and its security
Cyber crimes and its securityCyber crimes and its security
Cyber crimes and its security
 
Cyber Crime.ppt
Cyber Crime.pptCyber Crime.ppt
Cyber Crime.ppt
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Societal impacts PART2
Societal impacts PART2Societal impacts PART2
Societal impacts PART2
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 

M1-01-CybercrimeIntroduction.pdf

  • 2. Module Contents ● Introduction, Cybercrime: Definition and Origins of the word, Cybercrime and information Security, Who are Cybercriminals? Classifications of Cybercrimes. ● How Criminals Plan Them –Introduction, How Criminals Plan the Attacks, Cybercafé and Cybercrimes, Botnets, Attack Vector ● The Indian IT ACT 2000 and amendments.
  • 3.
  • 4.
  • 5. Definition and Origins of the word ● Reaching consensus on a definition of computer crime is difficult. ● One definition that is advocated is, "a crime conducted in which a computer was directly and significantly instrumental" ● This definition is not universally accepted.
  • 6. ● We can propose the following alternative definitions of computer crime: – Any illegal act where a special knowledge of computer technology is essential for its perpetration, investigation or prosecution. – Any traditional crime that has acquired a new dimension or order of magnitude through the aid of a computer, and abuses that have come into being because of computers. – Any financial dishonesty that takes place in a computer environment. – Any threats to the computer itself, such as theft of hardware or software, sabotage and demands for ransom.
  • 7. Here is yet another definition: ● "cyber crime (computer crime) is any illegal behavior, directed by means of electronic operations, that target the security of computer systems and the data processed by them," ● Note that in a wider sense, "computer-related crime" can be any illegal behavior committed by means of, or in relation to, a computer system or network; however, this is not cyber crime.
  • 8. ● Statute and treaty law both refer to "cybercrime." ● The term "cybercrime" relates to a number of other terms that may sometimes be used interchangeably to describe crimes committed using computers. ● Computer related crime, Computercrime, Internet crime, Ecrime. High-tech crime, etc, are the other synonymous terms.
  • 9. ● Cybercrime specifically can be defined in a number of ways a few definitions are: – A crime committed using a computer and the Internet to steal a person's identity (identity theft) or sell contraband or stalk victims or disrupt operations with malevolent programs. – Crimes completed either on or with a computer. – Any illegal activity done through the Internet or on the computer. – All criminal activities done using the medium of computers, the Internet, cyberspace and the WWW.
  • 10. ● However, while the legal systems around the world scramble to introduce laws to combat cyber criminals,two types of attack are prevalent: – Techno-crime: A premeditated act against a system or systems, with the intent to copy, steal, prevent access, corrupt or otherwise deface or damage parts of or the complete computer system. The 24×7connection to the Internet makes this type of cybercrime a real possibility to engineer from anywhere in the world, leaving few, if any, "finger prints." – Techno-vandalism: These acts of "brainless" defacement of websites and/or other activities, such as copying files and publicizing their contents publicly, are usually opportunistic in nature. Tight internal security, allied to strong technical safeguards, should prevent the vast majority of such incidents.
  • 11. Cybercrime and information Security ● Lack of information security gives rise to cyber crimes. ● Let us refer to the amended Indian Information Technology Act (ITA) 2000 in the context of cybercrime. ● From an Indian perspective, the new version of the Act (referred to as ITA 2008 ) provides a new focus on "Information Security in India."
  • 12. Cyber Security ● "Cyber security" means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction. ● The term incorporates both the physical security of devices as well as the information stored therein. ● It covers protection from unauthorized access, use, disclosure, disruption, modification and destruction.
  • 13.
  • 14. Who are Cybercriminals? ● With the growth in the public domain in recent years of the Internet, cyberlaw has emerged as a real problem. ● In a legal sense, cyberlaw encompasses cybercrime (that is, crimes completed either on or with a computer), electronic commerce theft, intellectual property rights or copyright infringement, and privacy rights infringement or identity theft
  • 15. Who are Cybercriminals? ● Cybercrime involves such activities as child pornography; credit card fraud; cyberstalking; defaming another online; gaining unauthorized access to computer systems; ignoring copyright, software licensing, and trademark protection; overriding encryption to make illegal copies; software piracy; and stealing another’s identity to perform criminal acts. ● Cybercriminals are those who conduct such acts.
  • 16. Types of Cybercriminals ● Type I : Hunger for Recognition ● Type II : Not interested in Recognition ● Type III : The insiders
  • 17. Type I : Hunger for Recognition ● Hobby Hackers ● IT Professionals (Social Engineering is one of the biggest threat) ● Politically Motivated hackers ● Terorist Organizations.
  • 18. Type II : Not interested in Recognition ● Psycological perverts ● Financially motivated hackers (corporate espionage) ● State-sponsored hacking(national espionage,subotage) ● Organized criminals
  • 19. Type III : The insiders ● Disgruntled or former employees seeking revange ● Competing companies using employees to gain economic advantage through damage and /or theft.
  • 20. Classifications of Cybercrimes ● Crime is defined as – "an act or the commission of an act that is forbidden, or the omission of a duty that is commanded by a public law and that makes the offender liable to punishment by that law".
  • 21. ● Cybercrimes are classified as follows: – 1. Cybercrime against individual – 2. Cybercrime against property – 3. Cybercrime against organization – 4. Cybercrime against Society – 5. Crimes emanating from Usenet newsgroup
  • 22. 1. Cybercrime against individual – Electronic Mail (E-Mail) Spoofing and other online frauds – Phishing, Spear Phishing and its various other forms such as Vishing and Smishing – Spamming – Cyberdefamation – Cyberstalking and Harassment – Computer Sabotage – Pornographic Offenses – Password Sniffing
  • 23. 2. Cybercrime against property – Credit card frauds – Intellectual property (IP) crimes – Internet time theft
  • 24. 3. Cybercrime against organization – Unauthorized accessing of computer – Password sniffing – Denial-of-service attacks – Virus attack/dissemination of viruses – E-Mail bombing/mail bombs – Salami attack/Salami technique – Logic bomb – Trojan Horse – Data diddling – Crimes emanating from Usenet newsgroup – Industrial spying/industrial espionage – Computer network intrusions – Software piracy
  • 25. 4. Cybercrime against Society – Forgery – Cyberterrorism – Web Jacking
  • 26. 5. Crimes emanating from Usenet newsgroup – By its very nature, Usenet groups may carry very offensive, harmful, inaccurate or otherwise inappropriate material, or in some cases, postings that have been mislabeled or are deceptive in another way. – Therefore, it is expected that you will use caution and common sense and exercise proper judgment when using Usenet, as well as use the service at your own risk.