SlideShare a Scribd company logo
What is Cybercrime?
• Cybercrime is defined as a crime where a computer is the object of
the crime or is used as a tool to commit an offense.
• A cybercriminal may use a device to access a user’s personal
information, confidential business information, government
information, or disable a device.
• It is also a cybercrime to sell or elicit the above information online.
•
Categories of Cybercrime
The heads are:
• cyber crimes against individuals,
• cyber crimes against Property, and
• cyber crimes against Government(society at large).
• Crimes Against Individual
• These crimes include cyber harassment and stalking, distribution of
child pornography, credit card fraud, human trafficking, spoofing,
identity theft, and online libel or slander.
• 2. Crimes Against Property
• Some online crimes occur against property, such as a computer or
server. These crimes include DDOS attacks, hacking, virus
transmission, phishing attacks,,ramsomeware computer vandalism,
copyright infringement, and IPR violations.
• Crimes Against Government
• When a cybercrime is committed against the government, it is
considered an attack on that nation's sovereignty. Cybercrimes
against the government include hacking, accessing confidential
information, cyber warfare, cyber terrorism, and pirated software.
How Criminal Plan the Attacks
• Reconnaissance (information gathering) is the first phase and is
treated as passive attacks.
• Scanning and scrutinizing the gathered information for the validity of
the information as well as to identify the existing vulnerabilities.
• Launching an attack (gaining and maintaining the system access).
1. Reconnaissance
• "Footprinting" - this is the preparation toward preattack phase, and
involves accumulating data about the target's environment and
computer architecture to find ways to intrude into that environment.
• provides a judgment about possible exploitation of those
vulnerabilities
2. Passive Attacks
A passive attack involves gathering information about a target without
his/her (individual's or company's) knowledge.
• Google or Yahoo search: People search to locate information about employees.
• Surfing online community groups like Orkut/Facebook will prove useful to gain the
information about an individual.
• Organization's website may provide a personnel directory or information about key
employees, for example, contact details, E-Mail address, etc. These can be used in a
social engineering attack to reach the target.
• Blogs, newsgroups, press releases, etc. are generally used as the mediums to gain
information about the company or employees.
• Going through the job postings in particular job profiles for technical persons can
provide information about type of technology, that is, servers or infrastructure
devices a company maybe using on its network
3. Active Attacks
• An active attack involves probing the network to discover individual
hosts to confirm the information (IP addresses, operating system type
and version, and services on the network) gathered in the passive
attack, phase.
4. Scanning and Scrutinizing Gathered Information
• Port scanning: Identify open/close ports and services.
• Network scanning: Understand IP Addresses and related information about the computer
network systems.
• Vulnerability scanning: Understand the existing weaknesses in the system.
• The scrutinizing phase is always called "enumeration" in the hacking
world. The objective behind this step is to identify:
• The valid user accounts or groups;
• Network resources and/or shared resources
• OS and different applications that are running on the OS.
5. Attack
The attack is launched using the following steps:
• Crack the password
• Exploit he password
• Execute the malicious command/applications;
• Hide the files (if required);
• Cover the tracks - delete the access logs, so that there is no trail illicit
activity.
Cyber crimes against individuals
Cyberbullying
• Humiliating/embarrassing content posted online about the victim of
online bullying,
• Hacking social media accounts
• Posting vulgar messages on social media
• Threatening the victim to commit any violent activity
• Child pornography or threatening someone with child pornography
Cyberstalking
• Browsing anyone’s internet history or online activity, and sending
obscene content online with the help of any social media, software,
application, etc. to know about that particular person is called
cyberstalking.
• In India, in the year 2020, the state of Uttar Pradesh witnessed the
highest number of cyberstalking incidents against women and
children
• Section 67 of the IT Act punishes cyber stalkers who send, cause to
send, or publish obscene posts or content on electronic media with
imprisonment of up to three years and a fine.
Cyber defamation
• Cyber defamation means injuring the other person’s reputation via the
internet through social media, Emails etc. There are two types of Cyber
defamation: libel and slander
• Libel: It refers to any defamatory statement which is in written form. For instance,
writing defamatory comments on posts, forwarding defamatory messages on social
media groups, etc. are a part of cyber defamation in the form of libel.
• Slander: It refers to any defamatory statement published in oral form. For instance,
uploading videos defaming someone on YouTube is a part of cyber defamation in the
form of slander.
• Section 67 of the IT Act; whoever publishes or transmits a defamatory
statement about a person shall be punished with 2 years imprisonment
and a fine up to ₹25000.
Phishing
• Phishing refers to the impersonation of a legitimate person and
fraudulently stealing someone’s data.
• Phishing refers to the fraudulent practice of sending emails under the
pretext of reputable companies to induce individuals to reveal
personal information, such as passwords, credit card numbers, etc.,
online.
• Section 66C of the IT Act penalises any offender committing phishing-
related activities & is punishable with imprisonment of up to three
years and a fine of up to rupees one lakh.
Cyber fraud
• Any person who dishonestly uses the internet to illegal deceive
people and gets personal data, communication, etc. with a motive to
make money is called a cyber fraud.
• Examples of cyber fraud include sending emails containing fake
invoices, sending fake emails from email addresses similar to the
official ones, etc.
• Section 420 of IPC is imprisonment of up to seven years with a fine.
Cyber theft
• Cyber theft is a type of cybercrime which involves the unauthorized
access of personal or other information of people by using the
internet.
• c yber theft is to gather confidential data like passwords, images,
phone numbers, etc. and use it as leverage to demand a lumpsum
amount of money.
• Section 66C of the IT Act. The punishment for the same is
imprisonment of up to three years and/or up to Rs 2 lakh fine.
Spyware
• Spyware is a type of malware or malicious software, when it is
installed it starts accessing and computing the other person’s device
without the end user’s knowledge. The primary goal of this software
is to steal credit card numbers, passwords, One-Time Passwords
(OTPs), etc.
Cyber crimes against organizations
• Attacks by virus
• A computer virus is a kind of malware which connects itself to another
computer program and can replicate and expand when any person attempts.
• For example, the opening of unknown attachments received from malicious
emails may lead to the automatic installation of the virus on the system in
which it is opened.
• These viruses are extremely dangerous, as they can steal or destroy
computer data, crash computer systems, etc.
Salami attack
• It is one of the tactics to steal money, which means the hacker steals
the money in small amounts. The damage done is so minor that it is
unnoticed.
• . In Salami slicing, the attacker uses an online database to obtain
customer information, such as bank/credit card details.
Web Jacking
• illegal redirection of a user’s browser from a trusted domain’s page to
a fake domain without the user’s consent.
• people visiting any well-known or reliable website can be easily
redirected to bogus websites, which in turn lead to the installation of
malware, leak of personal data, etc.
• Section 383 of IPC is imprisonment of up to three years or with a fine,
or both.
Denial of Service Attack
• The attackers generally attack systems in such a manner by trafficking
the targeted system until it ultimately crashes.
• DoS attacks cost millions of dollars to the corporate world,
Cyber crimes against society at large
• Cyber pornography
• It states that the following activities are punishable with
imprisonment of up to 3 years and a fine of up to 5 lakhs:
• Uploading pornographic content on any website, social media, etc.
where third parties may access it.
• Transmitting obscene photos to anyone through email, messaging,
social media, etc.
Cyber terrorism
• Hacking government-owned systems of the target country and getting
confidential information.
• Destructing and destroying government databases and backups by
incorporating viruses or malware into the systems.
• Disrupting government networks of the target nation.
• Distracting the government authorities and preventing them from
focusing on matters of priority.
Cyber Espionage
• espionage is “the practice of spying or using spies to obtain
information about the plans and activities especially of a foreign
government or a competing company.”
• Similarly, cyber espionage refers to the unauthorized accessing of
sensitive data or intellectual property for economic, or political
reasons. It is also called ‘cyber spying’.
• Military data
• Academic research-related data
• Intellectual property
• Politically strategic data, etc.
Introduction.pptx

More Related Content

Similar to Introduction.pptx

cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
PrinceKumar851167
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Animesh Shaw
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
Andreaa Viv
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
Journalist Ish
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
Dr. B T Sampath Kumar
 
cyber crime
cyber crimecyber crime
cyber crime
Akash Mehta
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
bcanawakadalcollege
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
cyber crime
cyber crimecyber crime
cyber crime
Saba MuShtaq
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
Harshita Ved
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
Kashif Latif
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
silambarasansam
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
patelripal99
 
Computer Forensics
Computer ForensicsComputer Forensics
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
Fit Tri
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
Arjith K Raj
 
Technology ComputerCrime presentation.pptx
Technology ComputerCrime presentation.pptxTechnology ComputerCrime presentation.pptx
Technology ComputerCrime presentation.pptx
johnmarklagarto1
 

Similar to Introduction.pptx (20)

cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Technology ComputerCrime presentation.pptx
Technology ComputerCrime presentation.pptxTechnology ComputerCrime presentation.pptx
Technology ComputerCrime presentation.pptx
 

Recently uploaded

1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
Tiktokethiodaily
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
ewymefz
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
John Andrews
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
nscud
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
Subhajit Sahu
 
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Subhajit Sahu
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
slg6lamcq
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
ewymefz
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
Opendatabay
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
benishzehra469
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
enxupq
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
balafet
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Subhajit Sahu
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
ewymefz
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
mbawufebxi
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
slg6lamcq
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
v3tuleee
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
ewymefz
 

Recently uploaded (20)

1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
1.Seydhcuxhxyxhccuuxuxyxyxmisolids 2019.pptx
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
 
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
Adjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTESAdjusting primitives for graph : SHORT REPORT / NOTES
Adjusting primitives for graph : SHORT REPORT / NOTES
 
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
Algorithmic optimizations for Dynamic Levelwise PageRank (from STICD) : SHORT...
 
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证书)阿德莱德大学毕业证如何办理
 
SOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape ReportSOCRadar Germany 2024 Threat Landscape Report
SOCRadar Germany 2024 Threat Landscape Report
 
一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单一比一原版(BU毕业证)波士顿大学毕业证成绩单
一比一原版(BU毕业证)波士顿大学毕业证成绩单
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
 
一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单一比一原版(YU毕业证)约克大学毕业证成绩单
一比一原版(YU毕业证)约克大学毕业证成绩单
 
Machine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptxMachine learning and optimization techniques for electrical drives.pptx
Machine learning and optimization techniques for electrical drives.pptx
 
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
 
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
一比一原版(Bradford毕业证书)布拉德福德大学毕业证如何办理
 
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
一比一原版(UniSA毕业证书)南澳大学毕业证如何办理
 
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理一比一原版(UofS毕业证书)萨省大学毕业证如何办理
一比一原版(UofS毕业证书)萨省大学毕业证如何办理
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
 

Introduction.pptx

  • 1.
  • 2. What is Cybercrime? • Cybercrime is defined as a crime where a computer is the object of the crime or is used as a tool to commit an offense. • A cybercriminal may use a device to access a user’s personal information, confidential business information, government information, or disable a device. • It is also a cybercrime to sell or elicit the above information online. •
  • 3. Categories of Cybercrime The heads are: • cyber crimes against individuals, • cyber crimes against Property, and • cyber crimes against Government(society at large).
  • 4. • Crimes Against Individual • These crimes include cyber harassment and stalking, distribution of child pornography, credit card fraud, human trafficking, spoofing, identity theft, and online libel or slander. • 2. Crimes Against Property • Some online crimes occur against property, such as a computer or server. These crimes include DDOS attacks, hacking, virus transmission, phishing attacks,,ramsomeware computer vandalism, copyright infringement, and IPR violations. • Crimes Against Government • When a cybercrime is committed against the government, it is considered an attack on that nation's sovereignty. Cybercrimes against the government include hacking, accessing confidential information, cyber warfare, cyber terrorism, and pirated software.
  • 5. How Criminal Plan the Attacks • Reconnaissance (information gathering) is the first phase and is treated as passive attacks. • Scanning and scrutinizing the gathered information for the validity of the information as well as to identify the existing vulnerabilities. • Launching an attack (gaining and maintaining the system access).
  • 6. 1. Reconnaissance • "Footprinting" - this is the preparation toward preattack phase, and involves accumulating data about the target's environment and computer architecture to find ways to intrude into that environment. • provides a judgment about possible exploitation of those vulnerabilities
  • 7. 2. Passive Attacks A passive attack involves gathering information about a target without his/her (individual's or company's) knowledge. • Google or Yahoo search: People search to locate information about employees. • Surfing online community groups like Orkut/Facebook will prove useful to gain the information about an individual. • Organization's website may provide a personnel directory or information about key employees, for example, contact details, E-Mail address, etc. These can be used in a social engineering attack to reach the target. • Blogs, newsgroups, press releases, etc. are generally used as the mediums to gain information about the company or employees. • Going through the job postings in particular job profiles for technical persons can provide information about type of technology, that is, servers or infrastructure devices a company maybe using on its network
  • 8. 3. Active Attacks • An active attack involves probing the network to discover individual hosts to confirm the information (IP addresses, operating system type and version, and services on the network) gathered in the passive attack, phase.
  • 9. 4. Scanning and Scrutinizing Gathered Information • Port scanning: Identify open/close ports and services. • Network scanning: Understand IP Addresses and related information about the computer network systems. • Vulnerability scanning: Understand the existing weaknesses in the system. • The scrutinizing phase is always called "enumeration" in the hacking world. The objective behind this step is to identify: • The valid user accounts or groups; • Network resources and/or shared resources • OS and different applications that are running on the OS.
  • 10. 5. Attack The attack is launched using the following steps: • Crack the password • Exploit he password • Execute the malicious command/applications; • Hide the files (if required); • Cover the tracks - delete the access logs, so that there is no trail illicit activity.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Cyber crimes against individuals Cyberbullying • Humiliating/embarrassing content posted online about the victim of online bullying, • Hacking social media accounts • Posting vulgar messages on social media • Threatening the victim to commit any violent activity • Child pornography or threatening someone with child pornography
  • 17. Cyberstalking • Browsing anyone’s internet history or online activity, and sending obscene content online with the help of any social media, software, application, etc. to know about that particular person is called cyberstalking. • In India, in the year 2020, the state of Uttar Pradesh witnessed the highest number of cyberstalking incidents against women and children • Section 67 of the IT Act punishes cyber stalkers who send, cause to send, or publish obscene posts or content on electronic media with imprisonment of up to three years and a fine.
  • 18. Cyber defamation • Cyber defamation means injuring the other person’s reputation via the internet through social media, Emails etc. There are two types of Cyber defamation: libel and slander • Libel: It refers to any defamatory statement which is in written form. For instance, writing defamatory comments on posts, forwarding defamatory messages on social media groups, etc. are a part of cyber defamation in the form of libel. • Slander: It refers to any defamatory statement published in oral form. For instance, uploading videos defaming someone on YouTube is a part of cyber defamation in the form of slander. • Section 67 of the IT Act; whoever publishes or transmits a defamatory statement about a person shall be punished with 2 years imprisonment and a fine up to ₹25000.
  • 19. Phishing • Phishing refers to the impersonation of a legitimate person and fraudulently stealing someone’s data. • Phishing refers to the fraudulent practice of sending emails under the pretext of reputable companies to induce individuals to reveal personal information, such as passwords, credit card numbers, etc., online. • Section 66C of the IT Act penalises any offender committing phishing- related activities & is punishable with imprisonment of up to three years and a fine of up to rupees one lakh.
  • 20. Cyber fraud • Any person who dishonestly uses the internet to illegal deceive people and gets personal data, communication, etc. with a motive to make money is called a cyber fraud. • Examples of cyber fraud include sending emails containing fake invoices, sending fake emails from email addresses similar to the official ones, etc. • Section 420 of IPC is imprisonment of up to seven years with a fine.
  • 21. Cyber theft • Cyber theft is a type of cybercrime which involves the unauthorized access of personal or other information of people by using the internet. • c yber theft is to gather confidential data like passwords, images, phone numbers, etc. and use it as leverage to demand a lumpsum amount of money. • Section 66C of the IT Act. The punishment for the same is imprisonment of up to three years and/or up to Rs 2 lakh fine.
  • 22. Spyware • Spyware is a type of malware or malicious software, when it is installed it starts accessing and computing the other person’s device without the end user’s knowledge. The primary goal of this software is to steal credit card numbers, passwords, One-Time Passwords (OTPs), etc.
  • 23. Cyber crimes against organizations • Attacks by virus • A computer virus is a kind of malware which connects itself to another computer program and can replicate and expand when any person attempts. • For example, the opening of unknown attachments received from malicious emails may lead to the automatic installation of the virus on the system in which it is opened. • These viruses are extremely dangerous, as they can steal or destroy computer data, crash computer systems, etc.
  • 24. Salami attack • It is one of the tactics to steal money, which means the hacker steals the money in small amounts. The damage done is so minor that it is unnoticed. • . In Salami slicing, the attacker uses an online database to obtain customer information, such as bank/credit card details.
  • 25. Web Jacking • illegal redirection of a user’s browser from a trusted domain’s page to a fake domain without the user’s consent. • people visiting any well-known or reliable website can be easily redirected to bogus websites, which in turn lead to the installation of malware, leak of personal data, etc. • Section 383 of IPC is imprisonment of up to three years or with a fine, or both.
  • 26. Denial of Service Attack • The attackers generally attack systems in such a manner by trafficking the targeted system until it ultimately crashes. • DoS attacks cost millions of dollars to the corporate world,
  • 27. Cyber crimes against society at large • Cyber pornography • It states that the following activities are punishable with imprisonment of up to 3 years and a fine of up to 5 lakhs: • Uploading pornographic content on any website, social media, etc. where third parties may access it. • Transmitting obscene photos to anyone through email, messaging, social media, etc.
  • 28. Cyber terrorism • Hacking government-owned systems of the target country and getting confidential information. • Destructing and destroying government databases and backups by incorporating viruses or malware into the systems. • Disrupting government networks of the target nation. • Distracting the government authorities and preventing them from focusing on matters of priority.
  • 29. Cyber Espionage • espionage is “the practice of spying or using spies to obtain information about the plans and activities especially of a foreign government or a competing company.” • Similarly, cyber espionage refers to the unauthorized accessing of sensitive data or intellectual property for economic, or political reasons. It is also called ‘cyber spying’. • Military data • Academic research-related data • Intellectual property • Politically strategic data, etc.