Cyber Crime Explained PDF
Document Details
Uploaded by EngrossingVenus
MG University
Tags
Summary
This document provides an overview of various types of cybercrimes. It discusses different categories of cybercrimes such as cybercrimes against persons, property, and the government. The document also explains different cybercrimes like hacking, virus attacks, cyber terrorism, phishing, and online gambling.
Full Transcript
Forms of Cyber crime and frauds History of Cyber Crimes The first recorded cyber crime took place in 1820. That is not surprising considering the fact that the abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.c...
Forms of Cyber crime and frauds History of Cyber Crimes The first recorded cyber crime took place in 1820. That is not surprising considering the fact that the abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.c In India, Japan and China the era of modern computer, however, began with the analytical engine of Charles Babbage. The first spam email took place in 1975 when it was sent out over the ARPANT. The first virus was installed on an Apple computer in 1982 when a high school student Rich skrenta, developed the EIK Cloner. Cyber Crimes The commission of illegal acts through the use of a computer or against a computer system. Cybercrime is nothing but where the computer used as an object or subject of crime. Cyber Crimes are basically divided into 3 major categories 1. Cyber crimes against persons 2. Cyber crimes against property 3. Cyber crimes against Government Different types of Cyber Crimes The crimes in which the computer is the target. Examples Hacking Virus attacks Dos attack etc The crimes in which the computer is used as a weapon. Examples Cyber terrorism IPR violations Credit card frauds EFT frauds Pornography etc Different Kinds of Cyber Crim Unauthorized Access and Hacking Theft of information contained in Web Hijacking, pornography, Child Pronography electronic form Cyber Stalking Email bombing Denial of service attack Data diddling Virus attacks Internet time theft Software Privacy Phishing Theft of computer system Sale of illegal articles Physically damaging a computer Online gambling system Email spoofing Breach of Privacy and Cyber Defamation Forgery Confidentiality Sakami attack E-commerce/ Investment Frauds Cyber Terrorism Unauthorized Access Unauthorized access means any kind of access without the permission of either of the rightful or person in charge of the computer system or computer network. Hacking Hacking means an illegal intrusion into a computer system and/or network. Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. They process the desire to destruct and they get the kick out of such destruction. Some hackers hack for personal monetary gains, such as to staling the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money. Government websites are the most targeted sites for the hackers. Types of Hackers White Hat Hackers – A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. Black Hat Hackers – A black hat hacker is a person who attempts to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons. Gray Hat Hackers – A gray hat hacker (also spelled grey hat hacker) is someone who may violate ethical standards or principles, but without the malicious intent ascribes to black hat hacker. Web Hijacking Web hijacking means taking forceful control of another person’s website. In this case the owner of the website loses control over his website and its content. Pornography Pornography means showing sexual ats in order to cause sexual excitement. The definition of pornography also includes pornographic websites, pornographic magazines produced using computer and the internet pornography delivered over mobile phones. Child Pornography : The Internet is being highly used as a medium to sexually abuse children. The children are viable victim to the cyber crime. Computers and internet having become a necessity of every household, the children have got an easy access to the internet. There is an easy access to the pornographic contents on the internet. Cyber Stalking In general terms, stalking can be termed as the repeated acts of harassment targeting the victim such as following the victim, making harassing phone calls, killing the victim, making harassing phone calls, killing the victims pet, vandalizing victims property, leaving written messages or objects. Stalking may be followed by serious violent acts such as be followed by serious volent acts such as physical harm to the victim. Cyber stalking means repeated acts of harassment or threatening behavior of the cyber criminal towards the victim by using internet services. Both kind of Stalkers i.e; Online & Offline – have desire to control the victims life. Denial of Service Attack This is an attack in which the criminal floods the bandwidth of the victim’s network or fills his email box with spam mail depriving him of the services he is entitled to access or provide. This kind of attack is designed to bring the network to crash by flooding it with useless traffic. Another variation to a typical denial of service attack is known as Distributed Denial of Service (DDOS) attack wherein the perpetrators are many and are geographically widespread. Software Piracy Software piracy refers to the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. These kind of crimes also include copyright infringement, trademarks violations theft of computer source code, patent violations etc. (continues) Nowadays, no one is ready to use the original software’s as they are too costly. Some of the organizations are now doing a serious attempt against the people who are involved in the distribution of pirated software’s. For Example: BSA has many running cases. Virus Attacks Viruses are the programs that have the capability to infect other programs and make copies of itself and spread into other program. Programs that multiply like viruses but spread from computer to computer are called as worms. These are malicious software that attach themselves to other software. Keep a regular backup of your important files. Be aware that most current viruses arrive as email attachments. Be very aware of any attachment that has any of the following file extensions:.exe.vbs.scr.vbe.com.bat.shs.cpl.dll.ocx.pif.drv.lnk.bin.sys.eml.nw s It is impossible for any anti-virus program to protect against all new viruses, so your best protection is to be very cautions about opening e-mail attachments. Trojan Horse Trojan Horse is a program that acts like something useful but do the things that are quiet damping. Trojans come in two parts, a Client part and a Server part. Salami Attacks These attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. E.g. A bank employee inserts a program, into the banks server’s, that deducts a small amount of money (say Rs 5 a month) from the account of every customer. No account holder will probably notice this unauthorizes debit, but the bank employee will make a sizeable amount of money every month. Phishing Phishing is the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information. Sale of illegal articles This category of cyber crimes includes sale of narcotics, weapons and wildlife etc., by posting information on websites, auction websites and bulletin boards or simply by using email communication. Computer vandalism Damaging or destroying data rather than stealing. Transmitting virus. Ethical way to deal with computer vandalism is not to give permissions to software without reading the agreements. For Example: Write the following code In Notepad Exactly as it says 010010110001111001010101010101 Save as a.EXE –any name will do Run the.exe You are done! Don’t try this at your friend’s laptop it’s just for information purpose :p Online gambling There are millions of websites; all hosted on servers abroad, that offer online gambling. In fact for money laundering. Cases of hawala transactions and money laundering over the Internet have been reported. Spoofing The word “spoof” means to trick, or deceive. Therefore, in the IT world, spoofing refers tricking or deceiving computer users. This is typically done by hiding one’s identity or faking the identity of another user on the Internet. Spoofing can take place on the Internet in several different ways: o E-mail Spoofing o IP Spoofing o Fake Identity Email spoofing: email spoofing refers to email that appears to originate from one source but actually has been sent from another source. Email spoofing can also cause monetary damage. (continues) Always keep your computer system updated with a good anti virus software. Do not open the mail if you do not recognize the sender. Ignore any mails with comes without names. Ignore any mail which has your name in the sender details. Do not open any mails if it has only a link in the body of the message. Cyber Defamation When a person publishes defamatory matter bout someone on a website or sends e-mails containing defamatory information to all of that person’s friends it is termed as cyber defamation. Forgery Computers, printers and scanners are used to forge counterfeit currency notes, postage and revenue stamps, mark sheet etc. These are mad using computers, and high quality scanners and printers. Theft of information contained in electronic form This includes theft of information stored in computer hard disk, removable storage media etc. Email bombing Email bombing refers to sending a large number of email to the victim resulting in the victim’s email account in case of an individual or mail servers (incase of a company or an email service provider) crashing. Data diddling This kind of an attack involves altering raw data just before it is processed by a computer and then changing it back after processing is completed. Internet time theft Internet time refers to usage by an unauthorized person of the Internet hours paid for by another person. Theft of computer system This type of offence involves the theft of a computer, some part(s) of a computer or a peripheral attached to the computer. Physically damaging a computer system This crime is committed by physically damaging a computer or its peripherals. Breach of Privacy and Confidentiality Privacy refers to the right of an individual/s to determine when, how and to what extent his or her personal data will be shared with others. Breach of privacy means unauthorized use or distribution or disclosure of personal information. Confidentiality means non disclosure of information to unauthorized or unwanted persons. In addition to Personal information some other type of information which useful for business and leakage of such information to other persons may cause damage to business or person, such information should be protected. E-commerce/ Investment Frauds An offering that uses false or fraudulent claims to solicit investments or loans, or that provides for the purchase, use, or trade of forged or counterfeit securities. Investors are enticed to invest in this fraudulent scheme by the promises of abnormally high profits. Cyber Terrorism Targeted attacks on military installations, power plants, air traffic control, banks, trail traffic control, telecommunication networks re the most likely targets. Others like police, medical, fire and rescue systems etc. Use of Internet based attacks in terrorist activities. There are laws to prevent cyber crimes. For example: o Seven Iranians working on behalf of Iranian government indicted on hacking charges. o Many persons has sent to jail recently in Rawalpindi for blackmailing on the social media. Credit Card Fraud When an individual uses another individual’s credit card for personal reasons while the owner of the card and the card issuer are not aware of the fact that the card is being used. This problem occur while using online banking, shopping. To avoid such a fraud the banks are now make a privacy so that one can’t use the others credit card because of the mobile security code and two steps verification. Now this is an ethical conduct that is enforce by the banks to avoid such type of hacking. Cyber Security Cyber Security Cyber Security involves protection of sensitive personal and business information through prevention, detection and response to different online attacks. Cyber security actually preventing the attacks, cyber security. Privacy Policy: Before submitting your name, e-mail, address, on a website look for the sites privacy policy. Keep Software Up to Date : If the seller reduces patches for the software operating system your device, install them as soon as possible. Installing them will prevent attackers from being from being able to take advantage. Use good password which will be difficult for thieves to guess. Do not choose option that allows your computer to remember your password. Cyber Security Disable Remote Connectivity: Some PDA’s and phones are equipped with wireless technologies, such as Bluetooth, that can be used to connect to other devices or computers. You should disable these features when they are not in use. Advantages of Cyber Security: Defend us from critical attacks. Browse the safe website. Internet security process all the incoming and outgoing data on our computer. Safety tips to Cyber Crime Use antivirus Software. Insert Firewalls Uninstall unnecessary software Maintain backup Check security settings