CYBER CRIME:TYPES AND
SECURITY
Presented to: Dr. Shuchita Chandhok, AICC
Presented by: Medabalimi Navadeep Dorai
Shivi Chauhan
Tanushree Banerjee (M.Sc. MSM) Sem-1 , AIMMSCR
CONTENT
I n t r o d u c t i o n
E x a m p l e s
R e a s o n s f o r c y b e r c r i m e s
C y b e r s e c u r i t y a n d C y b e r l a w o f I n d i a
Ty p e s o f C y b e r c r i m e
INTRODUCTION
Cybercrime is criminal activity that either targets or uses a computer, a computer network or a
networked device.
DEFINITION- “Cybercrime is defined as a crime in which a computer is the object of the
crime or is used as a tool to commit an offense.”
Cybercriminals may use computer technology to access personal information, business
trade secrets, or use the Internet for exploitive or malicious purposes.
Criminals can also use computers for communication and document or data storage.
Criminals who perform these illegal activities are often referred to as hackers.
Most, but not all, cybercrime is committed by cybercriminals or hackers who want to
make money. Cybercrime is carried out by individuals or organizations.
Some cybercriminals are organized, use advanced techniques and are highly technically
skilled. Others are novice hackers.
Rarely, cybercrime aims to damage computers for reasons other than profit. These could
be political or personal.
So, what exactly counts as cybercrime?
Email and internet fraud.
Identity fraud (where personal information is stolen and used).
Theft of financial or card payment data.
Theft and sale of corporate data.
Cyberextortion (demanding money to prevent a threatened attack).
Ransomware attacks (a type of cyberextortion).
Crypto jacking (where hackers mine cryptocurrency using resources they do not
own).
Cyberespionage (where hackers access government or company data).
REASONS FOR CYBER CRIME
1. Capacity to store data in comparatively small space:
• The computer has unique characteristics of storing data in a very small space. This affords
to remove information either through physical or virtual medium makes it much easier.
2. Easy to access:
• The problem encountered in guarding a computer system from unauthorized access is
that there is possibility of breach not due to human error but due to the complex
technology. By secretly implanted logic bomb, key loggers that can steal access codes,
advanced voice recorders; retina imagers etc. that can fool biometric systems and bypass
firewalls can be utilized to get past many a security system.
3. Complex:
• The computers work on operating system & these operating systems in turn are
composed of millions of codes. Human mind is fallible & is not possible that there might
not be a lapse at any stage. The cyber criminals take advantage of these lacunas and
penetrate into the computer system.
4. Negligence:
• Negligence is very closely connected with human conduct. It is therefore very
probable that while protecting the computer system there might be any negligence,
which in turn provides a cyber criminal to gain access and control over the
computer system
5. Loss of evidence:
• Loss of evidence is a very common & obvious problem as all the data areroutinely
destroyed. Further collection of data outside the territorial extent also paralyses this
system of crime investigation.
CYBER SECURITY
Cyber Security involves protection of sensitive personal and business information
through prevention, detection and response to different online attacks. Cyber
security actually preventing the attacks, cyber security.
CYBER LAW OF
INDIA
Cyber crime can involve criminal activities that are traditional in nature, such as theft, fraud,
deformation and mischief, all of which are subjected to the India Penal code. In simple way we
can say that cyber crime is unlawful acts where in the computer is either a tool or both. The
abuse of computer has also given birth of new age crime that are addressed by the
EUROPEAN CONVENTION OF CYBERCRIME.
The Convention is the first international treaty on crimes committed via the Internet and other
computer networks, dealing particularly with infringements of copyright, computer-related fraud,
child pornography and violations of network security. It also contains a series of powers and
procedures such as the search of computer networks and interception.
Its main objective, set out in the preamble, is to pursue a common criminal policy aimed at the
protection of society against cybercrime, especially by adopting appropriate legislation and fostering
international co-operation.
The convention casts a wide net and there are numerous malicious computer-related crimes which it
considers cybercrime. For example:
Illegally intercepting or stealing data.
Interfering with systems in a way that compromises a network.
Infringing copyright.
Illegal gambling.
TYPES OF CYBER CRIME
Hacking
Cyber Terrorism
Malwares
Online gambling
Cyber stalking
Virus dissemination
Spoofing
Phishing
Salami attack
Child pornography
1. HACKING
• Hacking involves gaining unauthorized access to a computer and
altering the system in such a way as to permit continued access,
along with changing the configuration, purpose, or operation of the
target machine, all without the knowledge or approval of the
systems owners.
• In simple terms, it is an illegal intrusion into a computer system or a
network.
• A virtual private network (VPN) is a great way to protect sensitive
data, especially when accessing a public Wi-Fi network. A VPN
encrypts all information transmitted by your device and helps
prevent many types of cyber attacks.
• To protect business data, it’s important to secure hardware, back up
and encrypt data, invest in cyber security insurance, promote a
security-focused culture, and use robust cyber security software.
2. CYBER TERRORISM
Cyber terrorism is the convergence of terrorism and cyberspace.
It is generally understood to mean unlawful attacks and threats of
attack against computers, networks, and the information stored
therein when done to intimidate or coerce a government or its
people in furtherance of political or social objectives.
Cyber terrorism can be also defined as the intentional use of
computers, networks, and public internet to cause destruction and
harm for personal objectives.
Experienced cyber terrorists, who are very skilled in terms of
hacking can cause massive damage to government systems and
might leave a country in fear of further attacks.
The objectives of such terrorists may be political or ideological
since this can be considered a form of terror
3. MALWARES
According to the definition in malware refers to software designed
to penetrate or destroy a computer system without the knowledge
of the owner.
The word malware combines the words malicious and software.
As generally used by computer professionals, the expression refers
to all kinds of software or program codes with hostile or intrusive
purposes.
However, the term “malware” is seldom used by computer users,
and many people are confused by the terms “malware” and
“virus”.
The term “virus” is inappropriately used in common parlance to
describe all kinds of malware, but not all kinds of malware are
actually viruses.
Software is considered malware only if the creator’s intent is
malicious.
There are many examples of malware, such as computer viruses,
4. ONLINE GAMBLING
Online gambling generally refers to gambling over the Internet.
In the following, we will introduce some forms of online gambling,
as well as some general issues.
EXAMPLE: In November 2002, sports betting with interstate
electronic information transmissions was prohibited by the US Court
of Appeals for the Fifth Circuit; however, there is a lower court
ruling for the betting related to sports through the Internet.
Any possible form of online gambling is prevented in some states
by special laws for online gambling. Without a license, it is illegal for
anyone to own an online game. However, there is currently no law
on granting online gaming licenses in any state.
5.CYBER STALKING
• The Criminal follows the victim by sending emails, entering the chat
rooms frequently. In order to harass a woman her telephone
number is given to others as if she wants to befriend males
befriend males.
• Cyber stalking is the use of electronic communication by a person
to follow a person, or attempts to contact a person to foster
personal interaction repeatedly despite a clear indication of
disinterest by such person; or monitors the internet, email or any
other form of electronic communication commits the offence of
stalking.
6. VIRUS DISSEMINATION
• This category of criminal activity involves either direct or search
unauthorized access to computer system by introducing new
programs known as viruses, worms or logic bombs.
• The unauthorized modification suppression or erasure of computer
data or functions with the Internet to hinder normal functioning of
the system is clearly a criminal activity and is commonly referred to
as computer sabotage.
• Malicious code is computer code that is written with the sole intent
to cause damage to a machine or to invade the machine to steal
information.
• The most common forms of malicious code are viruses, worms, and
Trojan programs
VIRUS: (Vital information resources under seize). Virus is a series of
program codes with the ability to attach itself to legitimate programs
and propagate itself to other computer programs. Viruses are file
viruses and boot sector viruses. It attacks the fat so that there is no
sequence of file content and it destroys the data content.
WORMS:(Write Once Read Many) They are just added to the files and
they do not manipulate. It differs from a virus in that it does not have
the ability to replicate itself.
LOGIC BOMB: As it involves the programming the destruction or
modification of data is at a specific time in the future.
Why do people Create These Viruses?
• To attack the products of specific companies
• For data breach
• Some consider their creations to be works of art, and see as a
creative hobby .
7.SPOOFING
Getting one computer on a network to pretend to have the identity
of another computer, usually one with special access Privileges, so
as to obtain access to the other computers on the network.
8. PHISHING
• In computing, phishing refers to attempts to criminally and
fraudulently gain sensitive information, such as usernames,
passwords, and credit card details, by means of some public
entities that run on electronic systems, such as online banks,
PayPal, and eBay.
• Typically, phishing uses e‐ mail or instant messaging and directs
users to enter their detailed information on the Web site.
• Nowadays, efforts have been made to protect people from phishing,
including legislation, user training, and technical measures.
• Phishers also target social networks; through which they can gain a
customer’s personal information for identity theft.
9.SALAMI ATTACK
• In such crime criminal makes insignificant changes in such a
manner that such changes would go unnoticed.
• Criminal makes such program that deducts small amount like
Rs.2.50 per month from the account of all the customer of the Bank
and deposit the same in his account.
• In this case no account holder will approach the bank for such
small amount but criminal gains huge amount.
10.CHILD PORNOGRAPHY
• Child pornography is the term used to describe the sexual abuse of
children by means of pornographic material.
• With the help of the Internet, it is quite easy to spread images and
video.
• Child pornography is illegal all over the world. Related production of
such material is also prohibited.
• The main reason that such criminal activities continue is the profit
that can be generated from the sale of such images.
• Photographs and movies are still being produced and purchased.