UNIT V
Introduction to Cyber Crime
Contents
Introduction
Cybercrime: Definition and Origins of the Word
Cybercrime and Information Security
Who are Cybercriminals?
Classifications of Cybercrimes
Cyber Crime : The Legal Perspectives
Cyber Crime : An Indian Perspectives
ITA 2000 and ITA 2008
Global Perspective on Cyber Crimes
Cyber Era
Cyber Crime
“A crime conducted in which a computer was directly or
significantly instrumental”
“Cybercrime is any illegal behavior, directed by means of
electronic operations, that targets the security of computer
systems and the data processed by them.”
Computer related crime, Computer crime, Internet crime, E-
crime, High-tech crime etc.
Few definition of Cyber Crime
A crime committed using a computer and the Internet to steal
person’s identity.
Crime completed either on or with a computer
Any illegal activity done through the Internet or on the computer
All criminal activities done using the medium of computers, the
Internet, cyberspace and WWW
Types of attack
Techno-crime
A premeditated act against a system or systems with the intent
to copy, steal, corrupt or otherwise deface or damage part of or
the complete computer system
Possible when computer connected with the Internet 24 X 7
Techno-vandalism
These acts of “brainless” defacement of websites and/or other
activities, such as copying files and publicizing their contents
publicly
Who are Cyber Criminals
Type I: Cybercriminals- hungry for recognition
Hobby hackers
IT professionals
Politically motivated hackers
Terrorist organizations
Type II: Cybercriminals- not interested in recognition
Psychological perverts
Financially motivated hackers
State-sponsored hacking
Organized criminals
Who are Cyber Criminals (II)
Type III: cybercriminals- the insiders
Former employees seeking revenge
Competing companies using employees to gain economic
advantage through damage and/or theft
Classification of Cyber Crimes
Cybercrime against individual
E-Mail spoofing and other online fraud
Phishing
Spamming
Cyber defamation
Cyber stalking and harassment
Computer sabotage
Pornographic offenses
Cybercrime Attack Types
1. Hacking:
It is an act of gaining unauthorized access to a computer system
or network.
2. Denial Of Service Attack:
In this cyber attack, the cyber-criminal uses the bandwidth of the
victim’s network or fills their e-mail box with spammy mail.
Here, the intention is to disrupt their regular services.
3. Software Piracy:
Theft of software by illegally copying genuine programs or
counterfeiting. It also includes the distribution of products
intended to pass for the original.
4. Phishing:
Pishing is a technique of extracting confidential information from
the bank/financial institutional account holders by illegal ways.
5. Spoofing:
It is an act of getting one computer system or a network to
pretend to have the identity of another computer. It is mostly used
to get access to exclusive privileges enjoyed by that network or
computer.
Cybercrime against property
Credit card frauds
Intellectual property crime
Internet time theft
Cybercrime against organization
Unauthorized accessing of computer
Password sniffing
Denial-of-service attacks
Virus
E-Mail bombing
Salami attack
Logic bomb
Trojan horse
Data diddling
Industrial spying
Crimes emanating from Usenet newsgroup
Computer network intrusions
Software piracy
Cybercrime against society
Forgery
Cyber terrorism
Web jacking
E-Mail Spoofing
A spoofed email is one in which e-mail header is forged so that
mail appears to originate from one source but actually has been
sent from another source
Spamming
Spamming means sending multiple copies of unsolicited mails
or mass e-mails such as chain letters.
Difficult to control
In context of “search engine spamming”, spamming is
alternation or creation of a document with the intent to
deceive an electronic catalog or filing system
Cyber Defamation
Cognizable offense
This occurs when defamation takes place with
the help of computers and / or the Internet.
E.g. someone publishes defamatory matter about
someone on a website or sends e- mails
containing defamatory information.
Internet Time Theft
The usage of the Internet hours by an unauthorized person
which is actually paid by another person
Comes under hacking
Salami Attack
When negligible amounts are removed & accumulated in to
something larger.
These attacks are used for the commission of financial crimes.
Data Diddling
This kind of an attack involves altering raw data just before it is
processed by a computer and then changing it back after the
processing is completed.
Forgery
Currency notes, revenue stamps, mark sheets etc can be forged
using computers and high quality scanners and printers.
Online Frauds
Spoofing website and E-Mail security alerts, lottery frauds, virus
hoax E-Mail
Software Piracy
Theft of software through the illegal copying of genuine
programs or the counterfeiting and distribution of products
intended to pass for the original.
Illegal copying of programs, distribution of copies of software
Computer Sabotage
The use of the Internet to hinder the normal functioning of a
computer system through the introduction of worms, viruses or
logical bombs is referred to as computer sabotage
E-mail Bombing
Sending a large no. of E-Mails to the victim to crash victim’s E-
Mail account or to make victim’s server crash
Password Sniffing
Programs that monitor and record the name and password of
network users as they login at a site
Cyber Crime: The Legal Perspectives
Cybercrime possess a mammoth challenge
International Legal aspects of computer crimes were studied in
1983
Encompasses any illegal act for which the knowledge of
computer technology is essential for its preparation
The network context of cyber crime make it one of the most
globalized offence of the present and most modernized threats of
the future
Solution:
Divide information system into segments bordered by state
boundaries
Incorporate the legal system into an integrated entity
obliterating these state boundaries
Cyber Crime: The Indian Perspectives
India has the second highest number of internet users in
the world
1,368,737,513
57% are between 18 and 35
ITA 2000 specifies the acts which are punishable
27,248 Cases have been booked in 2018
Cyber Crime: The Global Perspectives
Cyber space is boundary less world, which cannot divide in particular countries or territories as
like the physical world.
Cyber space is subject matter of the users
However, it is duty of legal system to protect the rights of their citizens in the cyber space.
A safe and secure online environment enhances trust and confidence and contributes to a stable
and productive community.
In initial period the countries, which are having the more territory and the strong power to
protect are known as powerful countries.
However, now the position has undergone change.
In this age of information technology the countries, which is having latest techniques about
internet, are call the powerful country.
Cybercrime Era:
Survival Mantra for the Netizens
Netizens
5P Mantras
Precaution
Prevention
Protection
Preservation
Perseverance
Stranger is Danger
Cybercrime Era: Survival Mantra for the Netizens
NASSCOM urges that cybercrime awareness is
important.
This is the reason they have established cyberlabs across
major cities.
Address Protection
Information Technology Act 2000- An overview
To provide legal recognition for transactions:-
Carried out by means of electronic data interchange, and other means
of electronic communication, commonly referred to as "electronic
commerce“
To facilitate electronic filing of documents with Government
agencies and E-Payments
To amend the Indian Penal Code, Indian Evidence Act,1872, the
Banker’s Books Evidence Act 1891,Reserve Bank of India Act ,1934
Enacted on 17th May 2000- India is 12th nation in the world to
adopt cyber laws
IT Act is based on Model law on e-commerce adopted by
UNCITRAL ( United Nations Commission on International Trade
Law).
The I.T. Act contains 13 chapters, 94 sections and 4 schedules.