Fundamentals of The Cybercrimes
Fundamentals of The Cybercrimes
INTRODUCTION
Cybercrime is now commonplace and presents new challenges in the prevention and detection
of crime.
Depiction on a broad introduction to the history, functions and technologies of the Internet, these
topics address the issues of prevention and regulation in Cybercrime and also to discuss the
differences between the Computer Programming Experts and the Bad Actors as well as their role in
Cyberspace.
CYBERCRIME
CYBER-relating to or characteristic of the culture of computers, information technology, and virtual
reality.
CRIME- an action or omission punishable by law.
CYBERCRIME- Any illegal behavior committed by means of, or in relation to, a computer system or
network, including such crimes as illegal possession, offering or distributing information my means of a
computer system or network. (UN Definition).
1
Profile of Cyber Criminals
Children and adolescents between the age group of 6 – 18 years
Organized Hackers (Political Hactivist)
Black Hat Hackers/Crackers - is a hacker who violates computer security for their own personal
profit or out of malice.
Disgruntled (angry or dissatisfied) employees
Business Rival.
Ex-Boy or Ex-Girl Friend.
Divorced Husband. Etc
Victims
Gullible - easily persuaded to believe something (uto-uto)
Greedy people
Unskilled and Inexperienced
Unlucky people
Cybersquatting - the practice of registering names, especially well-known company or brand names,
as internet domains, in the hope of reselling them at a profit.
Section 33 of the law has two (2) provisions that enumerates and penalizes the following acts:
Computer hacking,
Introduction of computer virus, and
Copyright infringement - the action of breaking the terms of a law or agreement
Cybercrime offences
The following acts constitute the offense of Cybercrime:
2
1. Offense against Confidentiality, Integrity, and Availability (CIA) of computer data and system: such
as;
Illegal Access;
Illegal Interception;
Data Interference;
System Interference;
Misuse of Devices, and
Cyber Squatting
WHAT IS Cybersecurity?
Refers to the collection of tools, policies, risk management approaches, actions, training, best
practices, assurance, and technologies that can be used to protect the cyber environment and
organization and user’s assets.
Cybersecurity is the prevention, protection, and restoration from cyber-attacks, to protect
networks, computers, programs and data from attacks, damage or unauthorized access. Involves
protecting information and systems from cyber threats.
Cybercrime
Is an all-encompassing/embracing legal topic.
Cybersecurity
Strives/seek to ensure the attainment and maintenance of the security properties of the
organization and user’s assets against relevant security risks in the cyber environment.
3
Advanced Persistent threats;
Insider Threats;
Cryptojacking ;
Distribution Denial of Service (DDoS);
Ransomware; and
Social Engineering attacks.
PHISHING EMAIL
From : *****Bank[mailto:support@****Bank.com]
Sent :08 June 2004 03:35
To : India
Subject: Official information from ***** Bank
Dear valued ***** Bank Customer!
For security purposes your account has been randomly chosen for verification. To verify
your account information we are asking you to provide us with all the data we are requesting. Otherwise
we will not be able to verify your identify and access to your account will be denied. Please click on the
link below to get to the bank secure page and verify your account details. Thank you.
https://infinity.*****bank.co.in/Verify.isp
****** Bank Limited
PHISHING
Easier to identify
Targets one person at a time
Malicious email sent to the inbox
4
VISHING
The fraudulent practice of making phone calls or leaving voice messages purporting to be from
reputable companies in order to induce individuals to reveal personal information, such as bank
details and credit card numbers.
2. VISHING ATTACK
4. Whaling attack
Also known as, whaling phishing or a whaling phishing attack is a specific type of
phishing attack that targets high-profile employees, such as the chief executive officer of
chief financial officer, in order to steal sensitive information from a company.
5. Hacking
Is simple terms means illegal intrusion into a computer system without the permission of the
computer owner/user.
The first phase is reconnaissance. As the name implies, the stage involves gathering
information about the target computer
6. SQL INJECTION
An SQL (structured language query) injection is a type of cyber-attack used to take control of
and steal data from a database.
Cybercriminals exploit vulnerabilities in data-driven applications to insert malicious code into a
databased via a malicious SQL statement. This gives them access to the sensitive information
contained in the database.
7. MAN-IN-THE-MIDDLE
A man-in-the-middle attack is a type of cyber threat where a cybercriminal intercepts
communication between two individuals in order to steal data.
For example, on an unsecure WiFi network, an attacker could intercept data being passed from
the victim’s device and the network.
5
8. MALWARE
THREATS ON POSTED OR SHARED LINKS
It’s usual that a malware is at the end of the link of the fake information
DPA: ATTACKERS
Hacker – A general term that has historically been used to describe a computer-programming
expert.
More recently, this term is often used in a negative way to describe an individual that attempts
to gain unauthorized access to network resources with malicious intent.
Cracker – A more accurate term to describe someone who tries to gain unauthorized access to
network resources with malicious intent.
TYPES OF HACKER
White hat – an individual who looks for vulnerabilities in systems or networks and then reports
these vulnerabilities to the owners of the system so that they can be fixed. They are ethically
opposed to the abuse of computer systems.
*A white hat generally focuses on securing IT systems*
Black hat – Another term for individuals who use their knowledge of computer systems to break
into systems or networks that they are not authorized to use, usually for personal or financial gain.
A cracker is an example of a black hat.
Gray hat – individual who works both offensively and defensively at various time
Red hat – Also called eagle-eyed or vigilante hackers, are similar to ethical hackers.
Blue hat – Also known as vengeful hackers, use hacking as a social weapon.
Green hat – are types of hackers who are learning the ropes of hacking.
6
Hacktivists
Goal: Exposing secrets and disrupting organisations they view as immoral
Hacktivists are bad actors that attack systems as part of their activism. They’ll seek unauthorised
access to systems to find incriminating information, disrupt systems, and spread social, political, or
ideological messages.
Insiders
Goal: Financial gain, revenge
An insider bad actor comes from within your business. They could be current or previous employees,
contractors, business partners, etcetera. They aim to get around cybersecurity defences by attacking
from the inside. From there, they may steal and sell data, or sabotage systems.
Hacktivists
Goal: Exposing secrets and disrupting organisations they view as immoral
Hacktivists are bad actors that attack systems as part of their activism. They’ll seek unauthorised
access to systems to find incriminating information, disrupt systems, and spread social, political, or
ideological messages.
Insiders
Goal: Financial gain, revenge
An insider bad actor comes from within your business. They could be current or previous employees,
contractors, business partners, etcetera. They aim to get around cybersecurity defences by attacking
from the inside. From there, they may steal and sell data, or sabotage systems.
Government/state-sponsored
Goal: Espionage, whether it’s political, economic or military
Some bad actors are actually spies. They’re funded by nations to discover sensitive information for
political gain.
Cyberterrorists
Goal: Cause harm and/or damage to critical services
Cyber terrorists are those that attack critical systems with the goal of causing harm to further their
cause. Think things like contaminating water supplies, messing with national electricity, and so on.
Script kiddies – novice hackers – reserved for the inexperience of black hats or other bad actors
Hacktivists - are security actors who aim TO USE THEIR POWERS FOR GOOD- use their skills to
uncover and draw public attention to things they find wrong.
Organized Crime Hackers- traditional organized crime in cyberspace
Insider actors gone rogue – an insider threat; Malicious activity by trusted insiders can be very hard
to catch, so look for these red flags.
7
8