Cyber Crime and Its Types
Cyber Crime and Its Types
Table of Contents
1. Abstract
2. Definition of Cyber-Crime
3. Pakistan and Cybercrime
4. Types of Cyber Crime
4.1. Hacking
4.2. Virus dissemination
4.3. Logic booms
4.4. Denial of service attack
4.5. Phishing
4.6. Email bombing and spamming
4.7. Web Jacking
4.8. Cyber Stalking
4.9.Data didling
4.10. Fraud and master card fraud
4.11. Salami slicing attack
4.12. Software Piracy
4.13. Others
5. Origin of Cyber Crime
6. Conclusion
1. ABSTRACT
As we know that science and technology is advancing day by day in almost every
perspective, so different corporations and the whole humanity are looking forward to it in
almost every regard. Some decades ago the companies were largely dependent on the human
brains and human resources but with the advancement in technology the humans are replaced
by computers and artificial intelligence. Now companies are interesting in hiring computer
experts rather than human experts. The 21st century can be said the century of most
sophisticated technology. New technologies, new discoveries and new inventions are
revolutionizing every aspect. From the last two decades the PC is becoming every person's
need day by day. A normal person is also dependent upon PC for many of its routine works.
Converter has become an essential part of the human life. Before the arrival of computers,
every single word or single data was dependent upon the human fingers to be written down in
hard form or by typewriters. But after the arrival of computers, even the typewriters are now
the part of the past and pages of history. Charles Babbage is known as the father of recent
computing. He invented the most modern computer. He was an English mathematician and
philosopher who gave this extraordinary concept of recent computing.
2. Definition of Cyber-Crime
"Cybercrime maybe a generic term that refers to all or any criminal activities done using the
medium of computers, the web, cyberspace and therefore the world wide Web". (Mali 2006)
or another words cybercrime can be defined as the offense that are committed against
individuals or group of people with a criminal motive to intentionally harm the reputation of
the victim or cause physical or mental harm to the victim directly or indirectly, using modern
telecommunication networks like internet. It can include any computer related crime like
digital kiddie porn piracy, stocking, forgery, harassment and property hacking or drug traffic
with digital proof. Original cybercrime in America emerged within the decade of 70s. They
used to commit crimes by using telephones. John rapper was the famous member of the group
this group would replicate the tones that were used in America telephoning purposes, and
used to make free calls consistent with some scholars. The history and origin of cybercrime is
said to be connected to ARPANET. It was a project funded by the US department of defense.
The aim of that project was to create a safe and secure communications for military purpose.
(Cybercrime and society 2006). The term hacking was first practically came to known when
some skilled computer programmers started to attack telephones within the
telecommunication sector. This group of highly skilled programmers was known as hackers.
They found the ways to enter in the system and manipulated according to their own. An
American investigation agency had to conduct operation during which different data storing
devices and different operating systems were recovered. These devices were used by different
hackers for free of charge calls and different types of credits thefts. Even now in the most
modern world there are different punishments in many laws regarding the cybercrimes, but
still cybercrimes are immensely increasing problem.
3. Pakistan and Cybercrime
Internet came in the region of Pakistan in 90s. Pakistan ranks in the top countries of internet
users because of its heavy population. as we all know that internet has made everyone life
easier and is a smaller time consuming but on the other end, it can also liable to theft, fraud,
kiddie porn, extortion etc. In Pakistan many people misuse this facility and therefore the
extreme usage is seen for the criminal acts. (Mohiuddin, 2006) about 7500000 users for
being reported to use internet in the year of 2004 in Pakistan. 2 years ago we had no proper
procedures or legislation for the cybercrimes in Pakistan. We have no proper regulating
authorities or regulating rules that can assess that matter. We had no proper investigation of
cybercrime neither expertise. So many of the times the offenders were not properly penalized
or treated. So government established the national response center for cybercrimes under the
flag of Federal Investigation Agency (FIA). The main purpose of this department was to
prevent the misuse of internet and to regulate the use of internet. This agency has the
expertise on handling cyber security, cyber fraud, technical investigation, digital forensics.
First case was reported in 2003. Five Pakistanis were involved during a business associated
with import and export while using fake information and misusing credit cards.
There are actually a dozen ways during which a cybercrime are often perpetrated, and
you need to understand what they're.
In order to guard yourself you would like to understand about the various ways during
which your computer are often compromised and your privacy infringed. during
this section, we discuss a couple of common tools and techniques employed by the cyber
criminals. This isn’t an exhaustive list by any means, but will offer you a comprehensive
idea of the loopholes in networks and security systems, which may be exploited by
attackers, and also their possible motives for doing so.
4.1. Hacking
In simple words we can define hacking as the intruding act committed by a irrelevant person
by accessing your computer without your permission. Hackers are the people doing the
hacking, they're basically computer programmers who have gained a complicated
understanding of computers and can use this for misusing. Then maybe our technology buffs
who has expert level skills in one particular software program or language. There may be
many motives for this thing, even several, but the most common and most usual are pretty
simple and can be explained by a person's tendency like greed, power, fame, etc. Even some
people do this just to show off their ability or expertise, buy simply harmless activities like
modifying software to hold some tasks without the users for creators intent, while others may
just want to cause destruction. greed may sometime cause a hacker to interrupt into system to
steal some personal information or maybe banking information, a corporation financial data,
etc. They can also try to modify system so they can execute some tasks of their interest.
Hackers who display such destructive conduct are also some time called "crackers". Or
sometimes they can also be called as "black hat hackers". Why don't the other hand there may
be some such brilliant minds who have the interest in computer hacking just because of their
intellectual curiosity. So some companies hire these computer and enthusiasts to find out the
flaws in their security system and help them to fix it mentioned as "White hat hacker", this
person cannot be categorized as the computer abusers. They plan to enter in the systems just
to warn the system holders that this system has some flaws in it. It's not always altruistic,
some do that for fame too and some do that to gain job in top companies or some may do that
to be called as security experts. "Grey hat" is another term that can be defined as cross
between black and white hacking. There are many such brilliant minds who were once the
hackers but then they use their mind for the security of the systems and constructive
technological development. The owner of Facebook Mark Zuckerberg is one of the example.
So if you want to prevent hackers from gaining access to your system, the first and foremost
thing is to find out how the hacking is completed, so now we will discuss some very
techniques which can be used by hackers to urge you via the web.
a. SQL Injections:
An SQL injection may be a technique that permits hackers to play upon the
safety vulnerabilities of the software that runs an internet site. It are often wont to attack
any sort of unprotected or improperly protected SQL database. This process involves
entering portions of SQL code into an internet form entry field – most
ordinarily usernames and passwords – to offer the hacker further access to the
location backend, or to a specific user’s account. once you enter logon information into
sign-in fields, this information is usually converted to an SQL command. This command
checks the info you’ve entered against the relevant table within the database. If your input
file matches the info within the table, you’re granted access, if not, you get the type of
error you'd have seen when
You put during a wrong password. An SQL injection is typically a further command that
when inserted into the online form, tries to vary the content of the database to reflect a
successful login. It also can be wont to retrieve information like mastercard numbers or
passwords from unprotected sites.
b. Theft of FTP Passwords :
This is another quite common thanks to tamper with websites. FTP password hacking
takes advantage of the very fact that a lot of webmasters store their website login
information on their poorly protected PCs. The thief searches the victim’s system for FTP
login details, then relays them to his own remote computer. He then logs into the
online site via the remote computer and modifies the online pages as he or she pleases.
c. Cross-site scripting:
Also referred to as XSS (formerly CSS, but renamed thanks to confusion with cascading
style sheets), may be a very easy way of circumventing a security system. Cross-site
scripting may be a hard-to-find loophole during an internet site, making it susceptible
to attack. during a typical XSS attack, the hacker infects an internet page with a malicious
client-side script or program. once you visit this website, the script is automatically
downloaded to your browser and executed. Typically, attackers inject HTML, JavaScript,
VBScript, ActiveX or Flash into a vulnerable application to deceive you and gather tip.
If you would like to guard your PC from malicious hackers, investing during a good
firewall should be first and foremost. Hacking is completed through a network, so
it’s vital to remain safe while using the web. You’ll read more about safety tips within
the last chapter of this book.
Viruses are computer programs that attach themselves to or infect a system or files, and
have a bent to circulate to other computers on a network. They disrupt the pc operation and
affect the info stored – either by modifying it or by deleting it altogether. “Worms” unlike
viruses don’t need a number to cling on to. They merely replicate until they eat up all
available memory within the system. The term “worm” is usually wont to mean self-
replicating “malware” (MALicioussoftWARE). These terms are often used
interchangeably within the context of the hybrid viruses/worms that dominate the
present virus scenario. “Trojan horses” are different from viruses in their manner of
propagation.
They masquerade as a legitimate file, like an email attachment from a supposed friend
with a really believable name, and don’t disseminate themselves. The user also
can unknowingly install a Trojan-infected program via drive-by downloads when
visiting an internet site, playing online games or using internet-driven applications.
A computer virus can cause damage almost like other viruses, like steal information or
hamper/disrupt the functioning of computer systems. How does this happen? Well, the
malicious code or virus is inserted into the chain of command in order that when the
infected program is run, the viral code is additionally executed (or in some cases,
runs rather than the legitimate program). Viruses are usually seen as extraneous code
attached to a number program, but this isn’t always the case. Sometimes, the environment
is manipulated in order that calling a legitimate uninfected program calls the viral
program. The viral program can also be executed before the other program is run. this
will virtually infect every executable file on the pc, albeit none of these files’ code was
actually tampered with. Viruses that follow this routine include “cluster” or “FAT” (File
Allocation Table) viruses, which redirect system tips that could infected files, associate
viruses and viruses that modify the Windows Registry directory entries in order that their
own code is executed before the other legitimate program. Computer viruses usually
spread via removable media or the web. A flash disk, CDROM, mag tape or other memory
device that has been in an infected computer infects all future computers during which it’s
used. Your computer also can contract viruses from sinister email attachments,
rogue internet sites or infected software. And these disseminate to each other computer on
your network. All computer viruses cause direct or indirect economic damages.
supported this, there are two categories of viruses:
However, even by disseminating, they take up many memory space, and time and
resources that are spent on the clean-up job. Direct economic damages are caused when
viruses alter the knowledge during digital transmission. Considerable expenses are
incurred by individuals, firms and authorities for developing and implementing the anti-
virus tools to guard computer systems.
A slag code, also referred to as “slag code”, may be a malicious piece of code which is
intentionally inserted into software to execute a malicious task when triggered by a
selected event. It’s not an epidemic, although it always behaves during a similar
manner. it's stealthily inserted into the program where it lies dormant until specified
conditions are met. Malicious software like viruses and worms often contain logic bombs
which are triggered at a selected payload or at a predefined time. The payload of a slag
code is unknown to the user of the software, and therefore the task that it executes
unwanted. Program codes that are scheduled to execute at a specific time are referred to
as “time-bombs”. for instance, the infamous “Friday the 13th” virus which attacked the
host systems only on specific dates; it “exploded” (duplicated itself) every Friday that
happened to be the thirteenth of a month, thus causing system slowdowns. Logic bombs
are usually employed by disgruntled employees working within the IT sector.
4.4. Denial-of-Service attack
4.5. Phishing
This technique of extracting tip like MasterCard numbers and username password combos
by masquerading as a legitimate enterprise. Phishing is usually administered by email
spoofing. You’ve probably received email containing links to legitimate appearing
websites. you almost certainly found it suspicious and didn’t click the link. Smart move.
The malware would have installed itself on your computer and stolen private information.
Cyber-criminals use social engineering to trick you into downloading malware off the
web or cause you to fill in your personal information under false pretenses. A phishing
scam in an email message are often evaded by keeping certain things in mind.
• search for spelling mistakes within the text. Cyber-criminals aren't known for his or
her grammar andspelling.
• Hover your cursor over the hyperlinked URL but don’t click. Check if the address
matches with the one written within the message.
• be careful for fake threats. Did you receive a message saying “Your email account is
going to be closed if you don’t reply to the present email”? they could trick you by
threatening that your security has been compromised.
• Attackers use the names and logos of well-known internet sites to deceive you. The
graphics and therefore the web addresses utilized in the e-mail are strikingly almost
like the legitimate ones, but they lead you to phony sites.
Not all phishing is completed via email or internet sites. Vishing (voice phishing) involves
calls to victims using fake identity fooling you into considering the decision to be from a
trusted organization. they'll claim to be from a bank asking you to dial variety (provided
by VoIP service and owned by attacker) and enter your account details. Once you are
doing that, your account security is compromised. Treat all unsolicited phone calls with
skepticism and never provide any personal information. Many banks have issued
preemptive warnings informing their users of phishing scams and therefore the do’s and
don’ts regarding your account information. Those of you reading Digit for long enough
will remember that we successfully phished many our readers by reporting how to hack
other people’s Gmail accounts by sending an email to a made up account together with
your own username and password… and that we did that years ago during a story about ,
yes, you guessed it, phishing!
Web jacking derives its name from “hijacking”. Here, the hacker takes control of an
internet site fraudulently. He may change the content of the first site or maybe redirect the
user to a different fake similar looking page controlled by him. The owner of the
online site has no more control and therefore the attacker may use the online site for his
own selfish interests. Cases are reported where the attacker has asked for ransom, and even
posted obscene material on the location.
The web jacking method attack could also be wont to create a just like the online site, and
present the victim with the new link saying that the location has moved. Unlike usual
phishing methods, once you have your cursor over the link provided, the URL
presented are going to be the first one, and not the attacker’s site. But once you click on
the new link, it opens and is quickly replaced with the malicious web server. The name on
the address bar are going to be slightly different from the first website which will trick the
user into thinking it’s a legitimate site. for instance, “Gmail” may direct you to “gmai1”.
Notice the one in situ of ‘L’. It is often easily overlooked. Web jacking also can be done
by sending a counterfeit message to the registrar controlling the name registration, under a
false identity asking him to attach a website name to the webjacker’s IP address, thus
sending unsuspecting consumers who enter that specific name to an internet site controlled
by the online hacker. the aim of this attack is to undertake to reap the credentials,
usernames, passwords and account numbers of users by employing a fake website with a
legitimate link which opens when the user is redirected thereto after opening the legitimate
site.
Cyber stalking may be a new sort of internet crime in our society when an individual is
pursued or followed online. A cyber stalker doesn’t physically follow his victim; he does it
virtually by following his online activity to reap information about the stalkee and harass
him or her and make threats using verbal intimidation. It’s an invasion of one’s online
privacy. Cyber stalking uses the web or the other electronic means and is different from
offline stalking, but is typically amid it. Most victims of this crime are women who are
stalked by men and youngsters who are stalked by adult predators and pedophiles. Cyber
stalkers thrive on inexperienced web users who aren't cognizant of netiquette and therefore
the rules of internet safety. A cyber stalker could also be a stranger, but could even
as easily be someone you recognize. Cyber stalkers harass their victims via email, chat
rooms, web sites, discussion forums and open publishing websites (e.g. blogs). the
supply of free email / internet site space and therefore the anonymity provided by chat
rooms and forums has contributed to the rise of cyber stalking incidents. Everyone has a
web presence nowadays, and it’s very easy to try to to a Google search and obtain one’s
name, alias, contact number and address, contributing to the menace that's cyber
stalking. because the internet is increasingly becoming an integral a part of our personal
and professional lives, stalkers can cash in of the convenience of communications and
therefore the availability of private information only a couple of mouse clicks
away. additionally, the anonymous and non-confrontational nature of internet
communications further tosses away any disincentives within the way of cyber stalking.
• Internet Stalking: Here the stalker harasses the victim via the web . Unsolicited email is
that the commonest way of threatening someone, and therefore the stalker may even send
obscene content and viruses by email. However, viruses and unsolicited telemarketing
email alone don't constitute cyber stalking. But if email is shipped repeatedly in an
effort to intimidate the recipient, they'll be considered as stalking. Internet
stalking isn't limited to email; stalkers can more comprehensively use the web to harass the
victims. the other cyber-crime that we’ve already examine , if through with an intention to
threaten, harass, or slander the victim may amount to cyber stalking.
• Computer Stalking: The more technologically advanced stalkers apply their computer
skills to help them with the crime. They gain unauthorized control of the victim’s
computer by exploiting the working of the web and therefore the Windows OS.
Though this is often usually done by proficient and computer savvy stalkers, instructions
on the way to accomplish this are easily available on the web .
4.9. Data diddling
This is one among the only methods of committing a computer-related crime, because
even a computer amateur can roll in the hay . Despite this being an easy task, it can have
detrimental effects. for instance, an individual liable for accounting may change data about
themselves or a lover or relative showing that they’re paid fully. By altering or failing to
enter the knowledge, they’re ready to steal from the enterprise. Other examples include
forging or counterfeiting documents and exchanging valid computer tapes or cards with
prepared replacements. Electricity boards in India are victims of knowledge diddling by
computer criminals when private parties were computerizing their systems.
Identity theft occurs when someone steals your identity and pretends to be you to access
resources like credit cards, bank accounts and other benefits in your name. The
imposter can also use your identity to commit other crimes. “Credit card fraud” may be
a wide ranging term for crimes involving fraud where the criminal uses your master
card to fund his transactions. master card fraud is fraud in its simplest form. the
foremost common case of master card fraud is your pre-approved card falling into
someone else’s hands.
Credit card fraud is that the commonest way for hackers to steal your money. He can use
it to shop for anything until you report back to the authorities and obtain your card
blocked. The sole security measure on master card purchases is that the signature on the
receipt but which will very easily be forged. However, in some countries the merchant
may even ask you for an ID or a PIN. Some master card companies have software to
estimate the probability of fraud. If a strangely large transaction is formed, the issuer may
even call you to verify. Often people forget to gather their copy of the master card receipt
after eating at restaurants or elsewhere once they pay by master card. These receipts have
your master card number and your signature for anyone to ascertain and use. With only
this information, someone can make purchases online or by phone. You won’t notice it
until you get your monthly statement, which is why you ought to carefully study your
statements. Make surethe website is trustworthy and secure when shopping online. Some
hackers may get a hold of your master card number by employing phishing techniques.
Sometimes a small padlock icon appears on the left screen corner of the address bar on
your browser which provides a better level of security for data transmission. If you
click there on, it'll also tell you the encryption software it uses. A more serious concern is
that the use of your personal information with the assistance of stolen or fake documents to
open accounts (or even worse, using your existing account) to require a
loan in your name. These unscrupulous people can collect your personal details from your
mailbox or ashcan (remember to shred all sensitive documents). consider all the important
details printed on those receipts, pay stubs and other documents. You won’t know a thing
until the master card people track you down and tail you until you clear all of your dues.
Then for months and months you’ll be fighting to urge your credit restored and your name
cleared.
With rising cases of master card fraud, many financial institutions have stepped in with
software solutions to watch your credit and guard your identity. ID theft insurance are
often taken to recover lost wages and restore your credit. But before you spend a fortune
on these services, apply the no-cost, sense measures to avert such a criminal offense.
Stealing money electronically is that the commonest use of the salami slicing technique,
but it’s not restricted to concealment. The salami technique also can be applied to
collect little bits of data over a period of your time to deduce an overall picture of an
organization. This act of distributed operation could also be against a private or an
organization. Data are often collected from internet sites , advertisements, documents
collected from trash cans, and therefore the like, gradually build up an entire database of
factual intelligence about the target.Since the quantity of misappropriation is
simply below the edge of perception, we'd like to be more vigilant. Careful examination of
our assets, transactions and each other dealing including sharing of tip with others might
help reduce the probabilities of an attack by this method.
Thanks to the web and torrents, you'll find almost any movie, software or song from any
origin for free of charge. Internet piracy is an integral a part of our lives which knowingly
or unknowingly we all contribute to. This way, the profits of the resource developers are
being hamper. It’s not almost using someone else’s property illegally but also passing it on
to your friends further reducing the revenue they deserve. Piracy is rampant in India, but
you knew that Software piracy is that the unauthorized use and distribution of computer
software. Software developers exerting to develop these programs, and piracy curbs their
ability to get enough revenue to sustain application development. This affects the
entire global economy as funds are relayed from other sectors which ends up in less
investment in marketing and research.
• Distributing a licensed or unlicensed (“cracked”) version of software over the web and
offline
“Cloning” is another threat. It happens when someone copies the thought behind your
software and writes his own code. Since ideas aren't copy protected across borders all the
time, this isn’t strictly illegal. A software “crack” is an illegally obtained version of the
software which works its way round the encoded copy prevention. Users of pirated
software may use a key generator to get a “serial” number which unlocks an evaluation
version of the software, thus defeating the copy protection. Software cracking and using
unauthorized keys are illegal acts of infringement of copyright.
Using pirated material comes with its own risks. The pirated software may contain
Trojans, viruses, worms and other malware, since pirates will often infect software with
malicious code. Users of pirated software could also be punished by the law for illegal use
of copyrighted material. Plus you won’t get the software support that's provided by the
developers.
To protect your software from piracy if you’re a developer, you ought to apply strong
safeguards. Some websites sell software with a “digital fingerprint” that helps in tracing
back the pirated copies to the source. Another common method is hardware locking. Using
this, the software license is locked to a selected hardware, such it runs
only thereon computer. Unfortunately, hackers still find their way around these measures.
4.13. Others
So far we’ve discussed the dedicated methods of committing cyber crimes. during
a nutshell, any offence committed using electronic means like net extortion, cyber
bullying, kiddie porn and internet fraud is termed as cyber crime. the web may be
a huge tract for pornography, which has often been subject to censorship on grounds of
obscenity. But what could also be considered obscene in India, won't be considered so in
other countries.
Since every country features a different legal stand on this material , pornography is
rampant online. However, consistent with the Indian Constitution, largely, pornography
falls under the category of obscenity and is punishable by law. kiddie porn may be
a serious offence, and may attract the harshest punishments provided for by law.
Pedophiles lurk in chat rooms to lure children. the web allows long-term victimization of
such children, because the photographs once put up, spread like wild-fire, and
should never get taken down completely. Internet crimes against children are a matter of
grave concern, and are being addressed by the authorities, but this problem has no easy
solution.
So, now you understand the threat cybercrime represents, what are the simplest ways to
guard your computer and your personal data? Here are our top tips:
Keeping your software and OS up so far ensures that you simply enjoy the newest security
patches to guard your computer.
Be sure to use strong passwords that folks won't guess and don't record them anywhere. Or
use a reputable password manager to get strong passwords randomly to form this easier.
Another way people become victims of cybercrime is by clicking on links in spam emails
or other messages, or unfamiliar websites. Avoid doing this to remain safe online.
Never give out personal data over the phone or via email unless you're completely sure the
road or email is secure. make sure that you simply are chatting with the person you think
that you're .
Contact companies directly about suspicious requests
If you get asked for data from a corporation who has called you, hang up. Call them back
using the amount on their official website to make sure you're chatting with them and not a
cybercriminal.
Ideally, use a special phone because cybercriminals can hold the road open. once you think
you’ve re-dialed, they will pretend to be from the bank or other organization that you
simply think you’re chatting with .
Keep an eye fixed on the URLs you're clicking on. Do they appear legitimate?
Avoid clicking on links with unfamiliar or spammy looking URLs.
Our tips should assist you avoid falling foul of cybercrime. However, if all else fails,
spotting that you simply became a victim of cybercrime quickly is vital.
Keep an eye fixed on your bank statements and query any unfamiliar transactions with the
bank. The bank can investigate whether or not they are fraudulent.
6. Conclusion
Today’s era is the era of knowledge and a decade from now on there'll be an era of
knowledge currency. But this success of technology is directly proportional to
cybercrime. the various nature of cybercrime makes investigation difficult for
various agencies, because a day a replacement app is formed and also a
replacement to crack that specific act. Sophistication is being achieved within
the technological development and as both the phenomenon of cybercrime and technology
are intertwined, there's an extended thanks to tackle it. With the advancement of
technology, a replacement way of tampering and hacking into it's discovered. Countries
like China, us of America, England, France, Japan, Korea etc. are considered to be the
highest digital and knowledge technology hubs, but still thanks to cyber-criminal
activities, the above mentioned countries need to face serious trouble and damage leading
to billions and billions of dollars. No proper system or software are often introduced by
any company and corporation that would tackle all the cyber criminals and every one of
their cybercriminal activities. Can cybercrime be ended? the solution is “no”, it can only
be restricted to a limited extent.