Cyber Crimes
& Its Types
Shri Vaishnav Institute of Forensic Science, Indore
Submitted By,
Namrata Patankar
MSc. Forensic Science
2nd Year 3rd Semester
Submitted To,
Mr Dinesh Kamble
Asst. Professor
SVIFS, Indore
Presentation : Digital Forensic & Cyber Crime
Cyber Crime in Modern Society
 Today, criminals that indulge in cybercrimes are not driven by
ego or expertise.
 Instead, they want to use their knowledge to gain benefits
quickly. They are using their expertise to steal, deceive and
exploit people as they find it easy to earn money without
having to do an honest days work.
 Cybercrimes have become a real threat today and are quite
different from old- school crimes, such as robbing, mugging or
stealing.
 Cybercrimes can be committed single handedly and does not
require the physical presence of the criminals.
 The crimes can be committed from a remote location and the
criminals need not worry about the law enforcement agencies
in the country where they are committing crimes.
 The same systems that have made it easier for people to
conduct e-commerce and online transactions are now being
exploited by cyber criminals.
Categories of Cyber Crime
Cybercrimes are broadly categorized into three
categories, namely crime against
 1. Individual
 2. Property
 3. Government
Each category can use a variety of methods and the
methods used vary from one criminal to another.
 Individual:
 This type of cybercrime can be in the form of cyber stalking, distributing
pornography, trafficking and grooming‘.
 Today, law enforcement agencies are taking this category of cybercrime very
seriously and are joining forces internationally to reach and arrest the perpetrators.
 Property:
 Just like in the real world where a criminal can steal and rob, even in the cyber
world criminals resort to stealing and robbing.
 In this case, they can steal a persons bank details and siphon off money; misuse the
credit card to make numerous purchases online; run a scam to get naïve people to
part with their hard earned money; use malicious software to gain access to an
organizations website or disrupt the systems of the organization.
 The malicious software can also damage software and hardware, just like vandals
damage property in the offline world.
 Government:
 Although not as common as the other two categories, crimes against a government
are referred to as cyber terrorism. If successful, this category can wreak havoc and
cause panic amongst the civilian population.
 In this category, criminals hack government websites, military websites or circulate
propaganda.
 The perpetrators can be terrorist outfits or unfriendly governments of other nations.
Unauthorized Access and Hacking
Unauthorized access means any kind of access without the
permission of either of the rightful or person in charge of
the
computer, computer system or computer network
a) White Hat Hackers- They believes that information
sharing is good, and that it is their duty to share their
expertise by facilitating access to information.
b) Black Hat Hackers- They cause damage after intrusion.
They may steal or modify data or insert viruses or worms
which damage the system. They are also called―crackers.
c) Grey Hat Hackers- Typically ethical but occasionally
violates hacker ethics. Hackers will hack into networks,
stand-alone computers and software.
Web Hijackings
 Web hijacking means taking forceful control of website of
others. In this case the owner of the website loses control
over his website and its content.
Pornography
 Pornography means showing sexual acts in order to cause
sexual excitement.
 The definition of pornography also includes pornographic
websites, pornographic magazines produced using
computer and the internet pornography delivered over
mobile phones.
 Child Pornography
 The Internet is being highly used as a medium to
sexually abuse children. The children are viable
victim to the cybercrime.
 Computers and internet having become a necessity
of every household, the children have got an easy
access to the internet.
 Sometimes pedophiles contact children in the chat
rooms posing as teenagers or a child of similar age
and then they start becoming friendlier with them
and win their confidence. Then slowly pedophiles
start sexual chat to help children shed their
inhibitions about sex and then call them out for
personal interaction.
 Denial of service Attack
 This is an attack in which the criminal floods the
bandwidth of the victim network or fills his e-mail box
with spam mail depriving him of the services he is
entitled to access or provide. This kind of attack is
designed to bring the network to crash by flooding it
with useless traffic.
 Another variation to a typical denial of service attack is
known as a Distributed Denial of Service (DDoS) attack
wherein the perpetrators are many and are
geographically widespread.
 Many DoS attacks, such as the Ping of Death and
Teardrop attacks, exploit limitations in the TCP/IP
protocols.
 Virus Attacks
 Viruses are the programs that have the capability to
infect other programs and make copies of it and
spread into other program.
 Programs that multiply like viruses but spread from
computer to computer are called as worms.
 These are malicious software that attaches them to
other software. Virus, worms, Trojan horse, Time
bomb, Logic Bomb, Rabbit and Bacterium are the
malicious.
 Viruses usually affect the data on a computer,
either by altering or deleting it.
 Software Piracy
 Software piracy refers to the illegal copying of
genuine programs or the counterfeiting and
distribution of products intended to pass for the
original.
 These kind of crimes also include copyright
infringement, trademarks violations, theft of
computer source code, patent violations etc.
 Domain names are also trademarks and protected
by ICANN domain dispute resolution policy and also
under trademark laws.
 Cyber squatters register domain name identical to
popular service provider name so as to attract their
users and get benefit from them.
Salami Attacks
 These attacks are used for the commission of
financial crimes. The key here is to make the
alteration so insignificant that in a single case it
would go completely unnoticed.
 Eg. A bank employee inserts a program, into the
bank servers, that deducts a small amount of
money (say Rs. 5 a month) from the account of
every customer.
 No account holder will probably notice this
unauthorized debit, but the bank employee will
make a sizable amount of money every month.
 Phishing
 Phishing is the act of sending an e-mail to a user falsely
claiming to be an established legitimate enterprise in an
attempt to scam the user into surrendering private
information that will be used for identity theft.
 The e-mail directs the user to visit a web site where
they are asked to update personal information, such as
passwords and credit card, social security, and bank
account numbers that the legitimate organization
already has.
 The Web site, however, is bogus and set up only to steal
the user information.
 By spamming large groups of people, the phisher
counted on the e-mail being read by a percentage of
people who actually had listed credit card numbers with
legitimately.
Sale of illegal articles
 This category of cybercrimes includes sale of
narcotics, weapons and wildlife etc., by posting
information on websites, auction websites, and
bulletin boards or simply by using email
communication.
Online gambling
 There are millions of websites; all hosted on servers
abroad, that offer online gambling. In fact, it is
believed that many of these websites are actually
fronts for money laundering.
 Cases of hawala transactions and money laundering
over the Internet have been reported.
 Email spoofing
 E-mail spoofing is e-mail activity in which the sender addresses and
other parts of the e-mail header are altered to appear as though
the e-mail originated from a different source. E-mail spoofing is
sending an e-mail to another person in such a way that it appears
that the e-mail was sent by someone else.
 A spoof email is one that appears to originate from one source but
actually has been sent from another source. Spoofing is the act of
electronically disguising one computer as another for gaining as the
password system. It is becoming so common that you can no longer
take for granted that the e-mail you are receiving is truly from the
person identified as the sender.
 Email spoofing is a technique used by hackers to fraudulently send
email messages in which the sender address and other parts of the
email header are altered to appear as though the email originated
from a source other than its actual source.
 Hackers use this method to disguise the actual email address from
which phishing and spam messages are sent and often use email
spoofing in conjunction with Web page spoofing to trick users into
providing personal and confidential information.
Cyber Defamation
 When a person publishes defamatory matter about
someone on a website or sends e-mails containing
defamatory information to all of that person
friends, it is termed as cyber defamation.
Forgery
 Computers, printers and scanners are used to forge
counterfeit currency notes, postage and revenue
stamps, mark sheets etc.
 These are made using computers, and high quality
scanners and printers.
Theft of information contained in
electronic form
 This includes theft of information stored in computer
hard disks, removable storage media etc.
Email bombing
 Email bombing refers to sending a large number of
emails to the victim resulting in
 the victims email account (in case of an individual) or
mail servers (in case of a company or an email service
provider) crashing.
Internet time theft
 Internet time refers to usage by an unauthorized person
of the Internet hours paid
 for by another person.
Theft of computer system
 This type of offence involves the theft of a
computer, some part(s) of a computer or a
peripheral attached to the computer.
Physically damaging a computer system
 This crime is committed by physically damaging
a computer or its peripherals.
Breach of Privacy and Confidentiality
 Privacy refers to the right of an individual/s to
determine when, how and to what extent his
or her personal data will be shared with
others.
 Breach of privacy means unauthorized use or
distribution or disclosure of personal
information.
 Confidentiality means non-disclosure of
information to unauthorized or unwanted
persons. In addition to Personal information
some other type of information which useful for
business and leakage of such information to
other persons may cause damage to business or
person, such information should be protected.
Data diddling
 Data diddling involves changing data prior or during
input into a computer. The information is changed
from the way it should be entered by a person
typing in the data, a virus that changes data, the
programmer of the database or application, or
anyone else involved in the process of having
information stored in a computer file.
 It also includes automatic changing the financial
information for some time before processing and
then restoring original information. anyone else
involved in the process of having information stored
in a computer file.
 It also includes automatic changing the financial
information for some time before processing and
then restoring original information.
E-commerce/ Investment
Frauds
 An offering that uses false or fraudulent claims to solicit
investments or loans, or that provides for the purchase,
use, or trade of forged or counterfeit securities.
 Merchandise or services that were purchased or
contracted by individuals online are never delivered.
 The fraud attributable to the misrepresentation of a
product advertised for sale through an Internet auction
site or the non-delivery of products purchased through
an Internet auction site.
 Investors are enticed to invest in this fraudulent scheme
by the promises of abnormally high profits.
Cyber Terrorism
 Targeted attacks on military installations, power plants, air traffic control,
banks, trail traffic control, telecommunication networks are the most
likely targets. Others like police, medical, fire and rescue systems etc.
 Cyber terrorism is an attractive option for
modern terrorists for several reasons.
 It is cheaper than traditional terrorist methods.
 Cyber terrorism is more anonymous than traditional terrorist methods.
 The variety and number of targets are enormous.
 Cyber terrorism can be conducted remotely, a feature that is especially
appealing to terrorists.
 Cyber terrorism has the potential to affect directly a larger number of
people. An offering that uses false or fraudulent claims to solicit
investments or loans, or that provides for the purchase, use, or trade of
forged or counterfeit securities.
 Merchandise or services that were purchased or contracted by individuals
online are never delivered. The fraud attributable to the
misrepresentation of a product advertised for sale through an Internet
auction site or the non-delivery of products purchased through an Internet
auction site. Investors are enticed to invest in this fraudulent scheme by
the promises of abnormally high profits.
Thank You

Cyber crime and its types

  • 1.
    Cyber Crimes & ItsTypes Shri Vaishnav Institute of Forensic Science, Indore Submitted By, Namrata Patankar MSc. Forensic Science 2nd Year 3rd Semester Submitted To, Mr Dinesh Kamble Asst. Professor SVIFS, Indore Presentation : Digital Forensic & Cyber Crime
  • 2.
    Cyber Crime inModern Society  Today, criminals that indulge in cybercrimes are not driven by ego or expertise.  Instead, they want to use their knowledge to gain benefits quickly. They are using their expertise to steal, deceive and exploit people as they find it easy to earn money without having to do an honest days work.  Cybercrimes have become a real threat today and are quite different from old- school crimes, such as robbing, mugging or stealing.  Cybercrimes can be committed single handedly and does not require the physical presence of the criminals.  The crimes can be committed from a remote location and the criminals need not worry about the law enforcement agencies in the country where they are committing crimes.  The same systems that have made it easier for people to conduct e-commerce and online transactions are now being exploited by cyber criminals.
  • 3.
    Categories of CyberCrime Cybercrimes are broadly categorized into three categories, namely crime against  1. Individual  2. Property  3. Government Each category can use a variety of methods and the methods used vary from one criminal to another.
  • 4.
     Individual:  Thistype of cybercrime can be in the form of cyber stalking, distributing pornography, trafficking and grooming‘.  Today, law enforcement agencies are taking this category of cybercrime very seriously and are joining forces internationally to reach and arrest the perpetrators.  Property:  Just like in the real world where a criminal can steal and rob, even in the cyber world criminals resort to stealing and robbing.  In this case, they can steal a persons bank details and siphon off money; misuse the credit card to make numerous purchases online; run a scam to get naïve people to part with their hard earned money; use malicious software to gain access to an organizations website or disrupt the systems of the organization.  The malicious software can also damage software and hardware, just like vandals damage property in the offline world.  Government:  Although not as common as the other two categories, crimes against a government are referred to as cyber terrorism. If successful, this category can wreak havoc and cause panic amongst the civilian population.  In this category, criminals hack government websites, military websites or circulate propaganda.  The perpetrators can be terrorist outfits or unfriendly governments of other nations.
  • 6.
    Unauthorized Access andHacking Unauthorized access means any kind of access without the permission of either of the rightful or person in charge of the computer, computer system or computer network a) White Hat Hackers- They believes that information sharing is good, and that it is their duty to share their expertise by facilitating access to information. b) Black Hat Hackers- They cause damage after intrusion. They may steal or modify data or insert viruses or worms which damage the system. They are also called―crackers. c) Grey Hat Hackers- Typically ethical but occasionally violates hacker ethics. Hackers will hack into networks, stand-alone computers and software.
  • 7.
    Web Hijackings  Webhijacking means taking forceful control of website of others. In this case the owner of the website loses control over his website and its content. Pornography  Pornography means showing sexual acts in order to cause sexual excitement.  The definition of pornography also includes pornographic websites, pornographic magazines produced using computer and the internet pornography delivered over mobile phones.
  • 8.
     Child Pornography The Internet is being highly used as a medium to sexually abuse children. The children are viable victim to the cybercrime.  Computers and internet having become a necessity of every household, the children have got an easy access to the internet.  Sometimes pedophiles contact children in the chat rooms posing as teenagers or a child of similar age and then they start becoming friendlier with them and win their confidence. Then slowly pedophiles start sexual chat to help children shed their inhibitions about sex and then call them out for personal interaction.
  • 9.
     Denial ofservice Attack  This is an attack in which the criminal floods the bandwidth of the victim network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide. This kind of attack is designed to bring the network to crash by flooding it with useless traffic.  Another variation to a typical denial of service attack is known as a Distributed Denial of Service (DDoS) attack wherein the perpetrators are many and are geographically widespread.  Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols.
  • 10.
     Virus Attacks Viruses are the programs that have the capability to infect other programs and make copies of it and spread into other program.  Programs that multiply like viruses but spread from computer to computer are called as worms.  These are malicious software that attaches them to other software. Virus, worms, Trojan horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious.  Viruses usually affect the data on a computer, either by altering or deleting it.
  • 11.
     Software Piracy Software piracy refers to the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.  These kind of crimes also include copyright infringement, trademarks violations, theft of computer source code, patent violations etc.  Domain names are also trademarks and protected by ICANN domain dispute resolution policy and also under trademark laws.  Cyber squatters register domain name identical to popular service provider name so as to attract their users and get benefit from them.
  • 12.
    Salami Attacks  Theseattacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed.  Eg. A bank employee inserts a program, into the bank servers, that deducts a small amount of money (say Rs. 5 a month) from the account of every customer.  No account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month.
  • 13.
     Phishing  Phishingis the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.  The e-mail directs the user to visit a web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers that the legitimate organization already has.  The Web site, however, is bogus and set up only to steal the user information.  By spamming large groups of people, the phisher counted on the e-mail being read by a percentage of people who actually had listed credit card numbers with legitimately.
  • 14.
    Sale of illegalarticles  This category of cybercrimes includes sale of narcotics, weapons and wildlife etc., by posting information on websites, auction websites, and bulletin boards or simply by using email communication. Online gambling  There are millions of websites; all hosted on servers abroad, that offer online gambling. In fact, it is believed that many of these websites are actually fronts for money laundering.  Cases of hawala transactions and money laundering over the Internet have been reported.
  • 15.
     Email spoofing E-mail spoofing is e-mail activity in which the sender addresses and other parts of the e-mail header are altered to appear as though the e-mail originated from a different source. E-mail spoofing is sending an e-mail to another person in such a way that it appears that the e-mail was sent by someone else.  A spoof email is one that appears to originate from one source but actually has been sent from another source. Spoofing is the act of electronically disguising one computer as another for gaining as the password system. It is becoming so common that you can no longer take for granted that the e-mail you are receiving is truly from the person identified as the sender.  Email spoofing is a technique used by hackers to fraudulently send email messages in which the sender address and other parts of the email header are altered to appear as though the email originated from a source other than its actual source.  Hackers use this method to disguise the actual email address from which phishing and spam messages are sent and often use email spoofing in conjunction with Web page spoofing to trick users into providing personal and confidential information.
  • 16.
    Cyber Defamation  Whena person publishes defamatory matter about someone on a website or sends e-mails containing defamatory information to all of that person friends, it is termed as cyber defamation. Forgery  Computers, printers and scanners are used to forge counterfeit currency notes, postage and revenue stamps, mark sheets etc.  These are made using computers, and high quality scanners and printers.
  • 17.
    Theft of informationcontained in electronic form  This includes theft of information stored in computer hard disks, removable storage media etc. Email bombing  Email bombing refers to sending a large number of emails to the victim resulting in  the victims email account (in case of an individual) or mail servers (in case of a company or an email service provider) crashing. Internet time theft  Internet time refers to usage by an unauthorized person of the Internet hours paid  for by another person.
  • 18.
    Theft of computersystem  This type of offence involves the theft of a computer, some part(s) of a computer or a peripheral attached to the computer. Physically damaging a computer system  This crime is committed by physically damaging a computer or its peripherals.
  • 19.
    Breach of Privacyand Confidentiality  Privacy refers to the right of an individual/s to determine when, how and to what extent his or her personal data will be shared with others.  Breach of privacy means unauthorized use or distribution or disclosure of personal information.  Confidentiality means non-disclosure of information to unauthorized or unwanted persons. In addition to Personal information some other type of information which useful for business and leakage of such information to other persons may cause damage to business or person, such information should be protected.
  • 20.
    Data diddling  Datadiddling involves changing data prior or during input into a computer. The information is changed from the way it should be entered by a person typing in the data, a virus that changes data, the programmer of the database or application, or anyone else involved in the process of having information stored in a computer file.  It also includes automatic changing the financial information for some time before processing and then restoring original information. anyone else involved in the process of having information stored in a computer file.  It also includes automatic changing the financial information for some time before processing and then restoring original information.
  • 21.
    E-commerce/ Investment Frauds  Anoffering that uses false or fraudulent claims to solicit investments or loans, or that provides for the purchase, use, or trade of forged or counterfeit securities.  Merchandise or services that were purchased or contracted by individuals online are never delivered.  The fraud attributable to the misrepresentation of a product advertised for sale through an Internet auction site or the non-delivery of products purchased through an Internet auction site.  Investors are enticed to invest in this fraudulent scheme by the promises of abnormally high profits.
  • 22.
    Cyber Terrorism  Targetedattacks on military installations, power plants, air traffic control, banks, trail traffic control, telecommunication networks are the most likely targets. Others like police, medical, fire and rescue systems etc.  Cyber terrorism is an attractive option for modern terrorists for several reasons.  It is cheaper than traditional terrorist methods.  Cyber terrorism is more anonymous than traditional terrorist methods.  The variety and number of targets are enormous.  Cyber terrorism can be conducted remotely, a feature that is especially appealing to terrorists.  Cyber terrorism has the potential to affect directly a larger number of people. An offering that uses false or fraudulent claims to solicit investments or loans, or that provides for the purchase, use, or trade of forged or counterfeit securities.  Merchandise or services that were purchased or contracted by individuals online are never delivered. The fraud attributable to the misrepresentation of a product advertised for sale through an Internet auction site or the non-delivery of products purchased through an Internet auction site. Investors are enticed to invest in this fraudulent scheme by the promises of abnormally high profits.
  • 23.