CYBER SECURITY
Unit I: Introduction to Cybercrime: Introduction – Cybercrime: Definition and origins of the
word – Cybercrime and Information security – Who are cybercriminals? - Classification of
Cybercrimes – Cybercrime: The Legal Perspectives.
INTRODUCTION TO CYBERCRIME
As the name says, "cyber" means computer and "crime" means something unfair and
illegal, which collectively means a crime executed using computer technologies.
It could be that the computer may be involved in the crime or a target of a big one
This could harm someone's privacy and finances.
It comprises a wide range of crimes such as cyber fraud, financial scams, cybersex
trafficking, ad scams, etc.
Many privacy concerns refer to cyber crime when the privacy is intercepted and
disclosed. The World Economic Forum 2020 Global Risk Report confirmed that
organized cybercrime bodies are joining forces to execute criminal activities online.
This also affects global GDP and the world economy as financial scams related
activities are more notable and popular in the cyber world.
Cybercrime Types
1. Cyber Fraud
2. Cyberterrorism
3. Ad Fraud
4. Cybersex Trafficking
5. Computer as a Target
6. Computer as a Tool
7. Drug Trafficking
Origins of the word
One of the most high-profile banking computer crimes happened in 1970. The top
teller at New York's Union Dime Savings Bank's Park Avenue branch stole over $1.5
million from hundreds of accounts.
A hacker organization known as MOD (Masters of Deception) is accused of stealing
passwords and technical data from Pacific Bell, Nynex, and other telephone providers,
as well as six major credit bureaus and two major colleges. Damage was substantial;
one firm, Southwestern Telephone, alone incurred losses of $370,000.
In 2006, the Russian Business Network (RBN) was registered as an online site. Most
of its operations were initially legal,
CYBERCRIME AND INFORMATION SECURITY
Computer crime is an act that describes a large category of offenses, which is also
known as hi-tech crime, e-crime, cybercrime, or electronic crime.
It is performed by a computer user who has great knowledge about hacking.
The hacker tries to gain unauthorized access to any particular account, personal
information or steals a company's or individual's private information.
In some cases, hackers can corrupt the computer or data files that can be very harmful
to you.
The computer as a target
The computer as an instrument of the crime:
The computer as incidental to a crime
Crimes associated with the prevalence of computers
Examples of computer crimes
Child pornography
Cracking:
Copyright violation
Cyber terrorism:
Cybersquatting:
Cyberbully or Cyberstalking:
Creating Malware
Denial of Service attack:
Doxing
Espionage
Fraud
Harvesting:
Human trafficking
Identity theft
Illegal sales
Intellectual property theft
Phishing or vishing
Salami slicing
Scam
Slander
Spamming
Spoofing
Typosquatting
Unauthorized access
Wiretapping
INFORMATION SECURITY
Information security is a set of practices designed to carry private data secure from
unauthorized access and alteration for the duration of storing or transmitting from one
location to another.
Information security is designed and carried out to protect the print, digital, and other private,
sensitive, and private data from unauthorized persons.
It can be used to secure data from being misused, acknowledgment, destruction, alteration,
and disruption.
Protection − The user needs to be capable of configuring their devices and networks
accurately.
Detection − The user should detect whether the configuration has been modified or
get a notification if there are some issues in the network traffic.
Reaction − After detecting the issues, the user should acknowledge them and should
return to a protected position as rapidly as available.
WHO ARE CYBERCRIMINALS?
A threat in cybersecurity is a malicious activity by an individual or organization to corrupt or
steal data, gain access to a network, or disrupts digital life in general. The cyber community
defines the following threats available today:
CLASSIFICATION OF CYBER CRIMES
Classification Of Cyber Crimes Cyber crimes can be classified in to 4 major categories as the
following:
Cyber crime against Individual
(1) (i) Email spoofing
(2) (ii) Spamming
(3) (iii) Cyber Defamation
(4) (iv) Harassment & Cyber stalking :
(2) Cyber crime Against Property
(i) Credit Card Fraud
(ii) Intellectual Property crimes
(iii) Internet time theft
(3) Cyber crime Against Organization
(i) Unauthorized Accessing of Computer:
(ii) Denial Of Service :
(iii) Computer contamination / Virus attack :
(iv) Email Bombing :
(v) Salami Attack :
(vi) Logic Bomb :
(vii) Trojan Horse :
(viii) Data diddling :
(4) Cyber crime Against Society
(i) Forgery :
(ii) Cyber Terrorism :
(iii) Web Jacking :