The document discusses various types of cyber crimes such as hacking, eavesdropping, phishing/fraud emails, and ransomware. It provides details on how each crime is committed and examples. Hacking involves unauthorized access to computer systems for illicit purposes. Eavesdropping secretly intercepts digital communications. Phishing scams users into revealing sensitive data or installing malware through deception. Ransomware encrypts user files and demands payment for decryption. The document advises on preventing cyber crimes by keeping systems updated, using security software/strong passwords, avoiding suspicious links/emails, and not sharing personal details online without ensuring security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
20 views
Cyber Crime
The document discusses various types of cyber crimes such as hacking, eavesdropping, phishing/fraud emails, and ransomware. It provides details on how each crime is committed and examples. Hacking involves unauthorized access to computer systems for illicit purposes. Eavesdropping secretly intercepts digital communications. Phishing scams users into revealing sensitive data or installing malware through deception. Ransomware encrypts user files and demands payment for decryption. The document advises on preventing cyber crimes by keeping systems updated, using security software/strong passwords, avoiding suspicious links/emails, and not sharing personal details online without ensuring security.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11
CONTENTS
➢ What is Cyber Crime ?
➢ Hacking
➢ Eavesdropping
➢ Phishing and Fraud Emails
➢ Ransomware
➢ Preventing Cyber Crimes
WHAT IS CYBER CRIME ? ➢ The internet has grown rapidly and still expands. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education. But there are always two sides to a coin. Internet also has its own disadvantages.
➢ Crime has always been unpleasant and
unavoidable ingredient in our society. And now as computers and internet have dominated the society due to the dependence in matters of communication, banking, finance, examination and many other.
➢ They have become virtual lockers storing all our
information and secrets. And as it is essential and important in our lives, crime cannot spare it too.
➢ Cyber Crime is a term used to broadly describe
criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks.
➢ Computer crimes mainly consists of unauthorised
access to computer system data alteration, data destruction, theft of intellectual property. Cyber crime in the context of national security may involve hacking, traditional espionage, or information warfare and related activities.
➢ Threatening emails, defamation, spam, are some
examples where computers are used to commit crime, whereas viruses, worms, hacking are some examples where computers become target of the crime. Hacking ➢ Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.
➢ To better describe hacking, one needs to first
understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats.
➢ White hat professionals hack to check their own
security systems to make it more hack-proof. Black hat hackers hack to take control over the system for personal gains. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. All kinds of hacking are considered illegal barring the work done by white hat hackers. Eavesdropping ➢ Eavesdropping as we know it, is the act of secretly listening to a conversation, private or otherwise, of which we are not actively a part. In computer security, the definition carries the same meaning in digital terms. Eavesdropping in computer security is defined as the unauthorized interception of a conversation, communication or digital transmission in real time. The various forms of communication include phone calls, emails, instant messages or any other internet service.
➢ The activities of eavesdropping normally do not
cause disruptions on the normal operation of the systems being eavesdropped on. In reality, if one is eavesdropping on a conversation you hardly want there to be any form of disruption that can cause that conversation to cease. As such both parties of the communication - the sender and receiver - are completely unaware that their communication is being intercepted and data is being stolen. Phishing and Fraud Emails • Phishing ➢ Phishing is a form of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware such as ransomware.
➢ Phishing attacks have become increasingly
sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries with the victim.
➢ Measures to prevent or reduce the impact of
phishing attacks include legeslation, user education, public awareness, and technical security measures. The importance of phishing awareness has increased in both personal and professional settings, with phishing attacks among businesses rising from 72% to 86% from 2017 to 2020.
• Fraud Emails
➢ Email fraud refers to a variety of scams and
malicious activities that are carried out through email. These attacks can range from simple advance-fee scams targeting unsuspecting individuals, to sophisticated business email compromise (BEC) attacks that aim to trick large accounting departments into paying fraudulent invoices. Email fraud attackers often use social engineering tactics, such as posing as a trusted authority figure or using urgent or emotionally charged language, to manipulate their victims into taking action detrimental to themselves or their organization.
➢ There are many examples of email fraud, but one
of the most notorious examples is the advanced fee scam or the “Foreign Prince” email. In this scam, an individual posing as a wealthy prince promises to transfer a large sum of money to the victim’s account in exchange for a small upfront payment or transfer fee. Once the payment is made, the promised funds never materialize Ransomware ➢ Ransomware is a type of cryptovirological malware that permanently block access to the victim's personal data unless a ransom is paid. While some simple ransomware may lock the system without damaging any files, more advanced malware uses a technique called cryptoviral extortion.
➢ It encrypts the victim's files, making them
inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem, and difficult-to- trace digital currencies such as ‘paysafecard’ or ‘Bitcoin’ and other cryptocurrencies are used for the ransoms, making tracing and prosecuting the perpetrators difficult.
➢ Ransomware attacks are typically carried out
using a Trojan disguised as a legitimate file that the user is tricked into downloading or opening when it arrives as an email attachment.
➢ WannaCry, an encrypting ransomware computer
worm, was initially released on 12 May 2017. The ransom demand ranged from $300 to $600 to be paid in the cryptocurrency Bitcoin. WannaCry ransomware is also known as WannaCrypt, WCry, Wana Decrypt0r 2.0, WannaCrypt0r 2.0 and Wanna Decryptor.
➢ It targets computers running outdated versions of
the Microsoft Windows operating systems by exploiting the EternalBlue vulnerability in the Server Message Block (SMB) protocol. This allowed the ransomware to spread without victim participation. Preventing Cyber Crimes 1.Ensure your system is up-to-date. Generally, cybercriminals are aware of the flaws or loopholes to enter in your system. Therefore, fixing those exploits by updating system is crucial. 2.Use full service internet security suite. Considering reliable security software is a prudent approach, as it offers comprehensive protection for your devices, online privacy, and identity. 3.Use strong password. A combination of letters, numbers, and symbols will make a strong password. 4.When a pop-up or a spam email appears in your window and asks you to share your username or password, never fall for that trap. 5.Use anti-virus/malware software to prevent viruses from infecting your computer by installing and regularly update your anti-virus. 6.Do not click on untrusted websites or links. 7.Never give out personal data over the phone or via email unless you are completely sure the line or email is secure. Make certain that you are speaking to the person you think you are. Thank You