Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
57 views36 pages

MISERP - Unit V PNR

This document provides an overview of cybercrime and cybersecurity. It defines cybercrime and discusses the origins of the term. It describes different types of cybercriminals and classifications of cybercrimes such as crimes against individuals, property, organizations, and society. It also discusses cybercrime from legal and global perspectives and provides strategies for survival in the cyber era. The document concludes with an overview of the Information Technology Act of 2000 in India.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views36 pages

MISERP - Unit V PNR

This document provides an overview of cybercrime and cybersecurity. It defines cybercrime and discusses the origins of the term. It describes different types of cybercriminals and classifications of cybercrimes such as crimes against individuals, property, organizations, and society. It also discusses cybercrime from legal and global perspectives and provides strategies for survival in the cyber era. The document concludes with an overview of the Information Technology Act of 2000 in India.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 36

UNIT V

Introduction to Cyber Crime


Contents

 Introduction

 Cybercrime: Definition and Origins of the Word

 Cybercrime and Information Security

 Who are Cybercriminals?

 Classifications of Cybercrimes

 Cyber Crime : The Legal Perspectives

 Cyber Crime : An Indian Perspectives

 ITA 2000 and ITA 2008

 Global Perspective on Cyber Crimes

 Cyber Era
Cyber Crime

 “A crime conducted in which a computer was directly or


significantly instrumental”

 “Cybercrime is any illegal behavior, directed by means of


electronic operations, that targets the security of computer
systems and the data processed by them.”

 Computer related crime, Computer crime, Internet crime, E-


crime, High-tech crime etc.
Few definition of Cyber Crime

 A crime committed using a computer and the Internet to steal


person’s identity.

 Crime completed either on or with a computer

 Any illegal activity done through the Internet or on the computer

 All criminal activities done using the medium of computers, the


Internet, cyberspace and WWW
Types of attack

 Techno-crime
 A premeditated act against a system or systems with the intent

to copy, steal, corrupt or otherwise deface or damage part of or


the complete computer system

 Possible when computer connected with the Internet 24 X 7

 Techno-vandalism
 These acts of “brainless” defacement of websites and/or other

activities, such as copying files and publicizing their contents


publicly
Who are Cyber Criminals

 Type I: Cybercriminals- hungry for recognition


 Hobby hackers
 IT professionals
 Politically motivated hackers
 Terrorist organizations

 Type II: Cybercriminals- not interested in recognition


 Psychological perverts
 Financially motivated hackers
 State-sponsored hacking
 Organized criminals
Who are Cyber Criminals (II)

Type III: cybercriminals- the insiders


Former employees seeking revenge
Competing companies using employees to gain economic
advantage through damage and/or theft
Classification of Cyber Crimes
Cybercrime against individual

 E-Mail spoofing and other online fraud


 Phishing
 Spamming
 Cyber defamation
 Cyber stalking and harassment
 Computer sabotage
 Pornographic offenses
Cybercrime Attack Types

1. Hacking:
It is an act of gaining unauthorized access to a computer system
or network.
2. Denial Of Service Attack:
In this cyber attack, the cyber-criminal uses the bandwidth of the
victim’s network or fills their e-mail box with spammy mail.
Here, the intention is to disrupt their regular services.
3. Software Piracy:
Theft of software by illegally copying genuine programs or
counterfeiting. It also includes the distribution of products
intended to pass for the original.
4. Phishing:
Pishing is a technique of extracting confidential information from
the bank/financial institutional account holders by illegal ways.
5. Spoofing:
It is an act of getting one computer system or a network to
pretend to have the identity of another computer. It is mostly used
to get access to exclusive privileges enjoyed by that network or
computer.
Cybercrime against property

 Credit card frauds


 Intellectual property crime
 Internet time theft
Cybercrime against organization

 Unauthorized accessing of computer


 Password sniffing
 Denial-of-service attacks
 Virus
 E-Mail bombing
 Salami attack
 Logic bomb
 Trojan horse
 Data diddling
 Industrial spying
 Crimes emanating from Usenet newsgroup
 Computer network intrusions
 Software piracy
Cybercrime against society

 Forgery
 Cyber terrorism
 Web jacking
E-Mail Spoofing

 A spoofed email is one in which e-mail header is forged so that


mail appears to originate from one source but actually has been
sent from another source
Spamming

 Spamming means sending multiple copies of unsolicited mails


or mass e-mails such as chain letters.

 Difficult to control

 In context of “search engine spamming”, spamming is


alternation or creation of a document with the intent to
deceive an electronic catalog or filing system
Cyber Defamation

 Cognizable offense

 This occurs when defamation takes place with


the help of computers and / or the Internet.

 E.g. someone publishes defamatory matter about


someone on a website or sends e- mails
containing defamatory information.
Internet Time Theft

 The usage of the Internet hours by an unauthorized person


which is actually paid by another person

 Comes under hacking


Salami Attack

 When negligible amounts are removed & accumulated in to


something larger.

 These attacks are used for the commission of financial crimes.


Data Diddling

 This kind of an attack involves altering raw data just before it is


processed by a computer and then changing it back after the
processing is completed.
Forgery

 Currency notes, revenue stamps, mark sheets etc can be forged


using computers and high quality scanners and printers.
Online Frauds

 Spoofing website and E-Mail security alerts, lottery frauds, virus


hoax E-Mail
Software Piracy

 Theft of software through the illegal copying of genuine


programs or the counterfeiting and distribution of products
intended to pass for the original.

 Illegal copying of programs, distribution of copies of software


Computer Sabotage

 The use of the Internet to hinder the normal functioning of a


computer system through the introduction of worms, viruses or
logical bombs is referred to as computer sabotage
E-mail Bombing

 Sending a large no. of E-Mails to the victim to crash victim’s E-


Mail account or to make victim’s server crash
Password Sniffing

 Programs that monitor and record the name and password of


network users as they login at a site
Cyber Crime: The Legal Perspectives

 Cybercrime possess a mammoth challenge


 International Legal aspects of computer crimes were studied in
1983
 Encompasses any illegal act for which the knowledge of
computer technology is essential for its preparation
 The network context of cyber crime make it one of the most
globalized offence of the present and most modernized threats of
the future
 Solution:
 Divide information system into segments bordered by state
boundaries
 Incorporate the legal system into an integrated entity
obliterating these state boundaries
Cyber Crime: The Indian Perspectives

India has the second highest number of internet users in


the world

1,368,737,513

57% are between 18 and 35

ITA 2000 specifies the acts which are punishable

27,248 Cases have been booked in 2018


Cyber Crime: The Global Perspectives

 Cyber space is boundary less world, which cannot divide in particular countries or territories as
like the physical world.

 Cyber space is subject matter of the users

 However, it is duty of legal system to protect the rights of their citizens in the cyber space.

 A safe and secure online environment enhances trust and confidence and contributes to a stable
and productive community.

 In initial period the countries, which are having the more territory and the strong power to
protect are known as powerful countries.

 However, now the position has undergone change.

 In this age of information technology the countries, which is having latest techniques about
internet, are call the powerful country.


Cybercrime Era:
Survival Mantra for the Netizens

Netizens

5P Mantras
 Precaution
 Prevention
 Protection
 Preservation
 Perseverance

Stranger is Danger
Cybercrime Era: Survival Mantra for the Netizens

NASSCOM urges that cybercrime awareness is


important.

This is the reason they have established cyberlabs across


major cities.

Address Protection
Information Technology Act 2000- An overview
To provide legal recognition for transactions:-
 Carried out by means of electronic data interchange, and other means

of electronic communication, commonly referred to as "electronic


commerce“
 To facilitate electronic filing of documents with Government

agencies and E-Payments


 To amend the Indian Penal Code, Indian Evidence Act,1872, the

Banker’s Books Evidence Act 1891,Reserve Bank of India Act ,1934


 Enacted on 17th May 2000- India is 12th nation in the world to

adopt cyber laws


 IT Act is based on Model law on e-commerce adopted by

UNCITRAL ( United Nations Commission on International Trade


Law).
 The I.T. Act contains 13 chapters, 94 sections and 4 schedules.

You might also like