Module Contents
Introduction, Cybercrime: Definition and Origins of
the word, Cybercrime and information Security, Who
are Cybercriminals? Classifications of Cybercrimes.
How Criminals Plan Them
–Introduction, How Criminals Plan the Attacks, Cybercafé and Cybercrimes, Botnets, Attack Vector
The Indian IT ACT 2000 and amendments.
2. Module Contents
●
Introduction, Cybercrime: Definition and Origins of
the word, Cybercrime and information Security, Who
are Cybercriminals? Classifications of Cybercrimes.
●
How Criminals Plan Them –Introduction, How
Criminals Plan the Attacks, Cybercafé and
Cybercrimes, Botnets, Attack Vector
●
The Indian IT ACT 2000 and amendments.
3.
4.
5. Definition and Origins of the word
●
Reaching consensus on a definition of computer
crime is difficult.
●
One definition that is advocated is, "a crime
conducted in which a computer was directly
and significantly instrumental"
●
This definition is not universally accepted.
6. ●
We can propose the following alternative definitions of
computer crime:
– Any illegal act where a special knowledge of computer
technology is essential for its perpetration, investigation or
prosecution.
– Any traditional crime that has acquired a new dimension or
order of magnitude through the aid of a computer, and
abuses that have come into being because of computers.
– Any financial dishonesty that takes place in a computer
environment.
– Any threats to the computer itself, such as theft of hardware
or software, sabotage and demands for ransom.
7. Here is yet another definition:
●
"cyber crime (computer crime) is any illegal
behavior, directed by means of electronic
operations, that target the security of computer
systems and the data processed by them,"
●
Note that in a wider sense, "computer-related crime"
can be any illegal behavior committed by means of, or
in relation to, a computer system or network; however,
this is not cyber crime.
8. ●
Statute and treaty law both refer to "cybercrime."
●
The term "cybercrime" relates to a number of
other terms that may sometimes be used
interchangeably to describe crimes committed
using computers.
●
Computer related crime, Computercrime,
Internet crime, Ecrime. High-tech crime, etc, are
the other synonymous terms.
9. ●
Cybercrime specifically can be defined in a number
of ways a few definitions are:
– A crime committed using a computer and the Internet to
steal a person's identity (identity theft) or sell contraband
or stalk victims or disrupt operations with malevolent
programs.
– Crimes completed either on or with a computer.
– Any illegal activity done through the Internet or on the
computer.
– All criminal activities done using the medium of
computers, the Internet, cyberspace and the WWW.
10. ●
However, while the legal systems around the world scramble
to introduce laws to combat cyber criminals,two types of attack
are prevalent:
– Techno-crime: A premeditated act against a system or systems, with
the intent to copy, steal, prevent access, corrupt or otherwise deface
or damage parts of or the complete computer system.
The 24×7connection to the Internet makes this type of cybercrime a
real possibility to engineer from anywhere in the world, leaving few, if
any, "finger prints."
– Techno-vandalism: These acts of "brainless" defacement of
websites and/or other activities, such as copying files and publicizing
their contents publicly, are usually opportunistic in nature.
Tight internal security, allied to strong technical safeguards, should
prevent the vast majority of such incidents.
11. Cybercrime and information
Security
●
Lack of information security gives rise to cyber
crimes.
●
Let us refer to the amended Indian Information
Technology Act (ITA) 2000 in the context of
cybercrime.
●
From an Indian perspective, the new version of the
Act (referred to as ITA 2008 ) provides a new focus
on "Information Security in India."
12. Cyber Security
●
"Cyber security" means protecting information,
equipment, devices, computer, computer resource,
communication device and information stored therein
from unauthorized access, use, disclosure,
disruption, modification or destruction.
●
The term incorporates both the physical security of
devices as well as the information stored therein.
●
It covers protection from unauthorized access, use,
disclosure, disruption, modification and destruction.
13.
14. Who are Cybercriminals?
●
With the growth in the public domain in recent years
of the Internet, cyberlaw has emerged as a real
problem.
●
In a legal sense, cyberlaw encompasses cybercrime
(that is, crimes completed either on or with a
computer), electronic commerce theft, intellectual
property rights or copyright infringement, and privacy
rights infringement or identity theft
15. Who are Cybercriminals?
●
Cybercrime involves such activities as child
pornography; credit card fraud; cyberstalking;
defaming another online; gaining unauthorized access
to computer systems; ignoring copyright, software
licensing, and trademark protection; overriding
encryption to make illegal copies; software piracy; and
stealing another’s identity to perform criminal acts.
●
Cybercriminals are those who conduct such acts.
16. Types of Cybercriminals
●
Type I : Hunger for Recognition
●
Type II : Not interested in Recognition
●
Type III : The insiders
17. Type I : Hunger for Recognition
●
Hobby Hackers
●
IT Professionals (Social Engineering is one of
the biggest threat)
●
Politically Motivated hackers
●
Terorist Organizations.
18. Type II : Not interested in
Recognition
●
Psycological perverts
●
Financially motivated hackers (corporate
espionage)
●
State-sponsored hacking(national
espionage,subotage)
●
Organized criminals
19. Type III : The insiders
●
Disgruntled or former employees seeking
revange
●
Competing companies using employees to gain
economic advantage through damage and /or
theft.
20. Classifications of Cybercrimes
●
Crime is defined as
– "an act or the commission of an act that
is forbidden, or the omission of a duty
that is commanded by a public law and
that makes the offender liable to
punishment by that law".
21. ●
Cybercrimes are classified as follows:
– 1. Cybercrime against individual
– 2. Cybercrime against property
– 3. Cybercrime against organization
– 4. Cybercrime against Society
– 5. Crimes emanating from Usenet newsgroup
22. 1. Cybercrime against individual
– Electronic Mail (E-Mail) Spoofing and other online frauds
– Phishing, Spear Phishing and its various other forms
such as Vishing and Smishing
– Spamming
– Cyberdefamation
– Cyberstalking and Harassment
– Computer Sabotage
– Pornographic Offenses
– Password Sniffing
23. 2. Cybercrime against property
– Credit card frauds
– Intellectual property (IP) crimes
– Internet time theft
26. 5. Crimes emanating from Usenet newsgroup
– By its very nature, Usenet groups may carry very
offensive, harmful, inaccurate or otherwise
inappropriate material, or in some cases, postings
that have been mislabeled or are deceptive in another
way.
– Therefore, it is expected that you will use caution and
common sense and exercise proper judgment when
using Usenet, as well as use the service at your own
risk.