0% found this document useful (0 votes)
19 views9 pages

Unit-1 CS

The document provides an overview of cybercriminals, their motivations, and various types of cybercrimes categorized against individuals, property, organizations, and society. It discusses the evolution of cybercrime, the methods used by criminals, and the importance of cybersecurity awareness for netizens. Additionally, it explains specific cyber threats such as DDoS attacks, social engineering, and the role of botnets in facilitating cybercrime.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views9 pages

Unit-1 CS

The document provides an overview of cybercriminals, their motivations, and various types of cybercrimes categorized against individuals, property, organizations, and society. It discusses the evolution of cybercrime, the methods used by criminals, and the importance of cybersecurity awareness for netizens. Additionally, it explains specific cyber threats such as DDoS attacks, social engineering, and the role of botnets in facilitating cybercrime.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Unit-1

Who are Cybercriminals :- In the early periods of the cyber security world,
the standard cyber criminals were teenagers or some motivated individuals
operating from a home laptop, with attacks principally restricted to pranks
and malicious tasks. Today, the world of cyber criminals has become a lot
more dangerous.

Cybercriminals are people who use the internet to commit illegal activities.
They hack into computers, steal personal information, or spread harmful
software. Their actions can harm individuals, businesses, and organizations.
Often, they aim to make money, cause disruption, or gain unauthorized
access to data. Cyber criminals often aim to make a profit, but some may
also be motivated by personal grudges, political reasons, or the challenge of
breaking into secure systems.

Types of Cyber Criminals

 Hackers
 Internet Stalkers
 The Rogue Employees
Classification of Cybercrimes
Cyber crimes can be classified in to 4 major categories as the following:

 Cyber crime Against Individual


 Cyber crime Against Property
 Cyber crime Against Organization
 Cyber crime Against Society

Cyber crimes Against Individual

Email spoofing: A spoofed email is one in which the email header is forged so that the mail appears
to originate from one source but actually has been sent from another source.

Spamming: Spamming means sending multiple copies of unsolicited mails or mass emails such as
chain letters.

Harassment & Cyber stalking: Cyber Stalking Means following an individual's activity over
internet. It can be done with the help of many protocols available such as e- mail, chat rooms, user net
groups

Cyber crimes Against Property


Credit Card Fraud: As the name suggests, this is a fraud that happens by the use of a credit card.
This generally happens if someone gets to know the card number or the card gets stolen.

Intellectual Property Crimes:

 These include Software piracy: Illegal copying of programs, distribution of copies of software.
Copyright infringement: Using copyrighted material without proper permission.
 Trademarks violations: Using trademarks and associated rights without permission of the actual
holder.
 Theft of computer source code: Stealing, destroying or misusing the source code of a computer.

Internet Time Theft: This happens by the usage of the Internet hours by an unauthorized
person which is actually paid by another person.

Cyber crimes Against Organisations


Unauthorized Accessing of Computer: Accessing the computer/network without permission
from the owner.

Denial Of Service: When Internet server is flooded with continuous bogus requests so as to denying
legitimate users to use the server or to crash the server.

Virus attack: A computer virus is a computer program that can infect other computer programs by
modifying them in such a way as to include a (possibly evolved) copy of it. Viruses can be file infecting or
affecting boot sector of the computer.
Worms, unlike viruses do not need the host to attach themselves to.

Email Bombing: Sending large numbers of mails to the individual or company or mail servers
thereby ultimately resulting into crashing.

Trojan Horse: This is an unauthorized program which functions from inside what seems to be an
authorized program, thereby concealing what it is actually doing.

Cyber crimes Against Society


Forgery: Currency notes, revenue stamps, mark sheets etc. can be forged using computers and high
quality scanners and printers

. Web Jacking: Hackers gain access and control over the website of another, even they change the
content of website for fulfilling political objective or for money.

A Global Perspective on cybercrime :- Cybercrime encompasses a


wide range of malicious activities including ransomeware, data breaches , identify
theft . Cybercrime is not confined to specific geographic regions ; making it a
transactional threat . Cybercrime and their infrastructure can be located
anywhere in the world. Cybercrime impact diverse sectors including business ,
government, healthcare & critical infrastructure .

US department of justice divide the cybercrime into three categories :

1) Crime in which computing device is targeted to gain network access


2) Crime in which the computer is used as a weapon virus attack
3) Crime in which computer is use to stole so useful data

August 4,2006 the US senate rectifies cyber crime separate from normal crime so
every country have different rules against cyber crime

In Australia cyber crime has a narrow meaning


In India cyber crime act 2001 it is a offense against computer & system
In the council of Europe cyber crime is used as umbrella form to refer many of
the criminal activities.
Cyber Crime : Survival Mantra For the Netizens :-
The Cybercrime Era is like living in a time where digital mischief is a common challenge. Survival Mantra
for the Netizens means having a set of rules or practices to stay safe in this digital age.

Survival Mantra for Netizens

Be Cyber-Aware: Stay alert and aware of potential online threats.

Use Strong Passwords: Create and regularly update strong, unique passwords.

Keep Software Updated: Ensure your computer and apps have the latest security updates.

Be Sceptical of Emails: Don't trust every email; be cautious, especially with links or attachments.

Use Trusted Websites: Stick to reputable websites to minimise risks.

Secure Personal Information: Be cautious about sharing sensitive info online.

Install Antivirus Software: Have reliable antivirus software to protect against digital threats.

The term “Netizens” was coined by “Michel Hasben” . there are 5P Mantra’s for
online security of Netizens :-
1. Precaution
2. Protection
3. Prevention
4. Preservace
5. Preservation

Cyber Offences : How Criminals Plan the Attacks


Cyber Offences are like digital crimes, and understanding how criminals plan their attacks is
crucial. It involves the strategies and methods they use to carry out illegal activities in the
digital space.

Identifying Weak Point Criminals look for vulnerabilities in computer systems or networks.
Exploiting Vulnerabilities They use weaknesses to gain unauthorized access or control.
Social engineering Tricking individuals into divulging sensitive information.
Malware Deployment Spreading malicious software to compromise systems.
Planning attack routes Deciding the best way to execute their digital mischief.
Example: Think of Cyber Offences like planning a heist. Criminals study the target (identifying weak
points), find ways to break in (exploiting vulnerabilities), use deception (social engineering), deploy tools
for the job (malware), and plan their entry and exit routes (planning attack routes). Understanding these
steps helps in building stronger digital defence

Social Engineering
Social Engineering is like a digital magic trick. It's when cybercriminals use charm, manipulation, or
deceit to trick people into giving up their personal information or doing something they shouldn't.

Techniques Used in Social Engineering


Phishing: Sending fake emails or messages to trick individuals into revealing sensitive information.
Pretexting: Creating a made-up scenario to obtain personal information.
Impersonation: Posing as someone trustworthy to gain access to information or systems.
Quizzes and Surveys: Using seemingly harmless quizzes or surveys to gather information.

Example: Imagine someone pretending to be a friend and asking for your password. That's Social
Engineering in action. It's like a digital con artist using charm or deception to get people to share their
secrets. Always be cautious, and never share sensitive information online, even if it seems harmless

Cyber Stalking
Cyber Stalking is like someone following you online. It involves persistent and unwanted attention,
harassment, or monitoring through digital means.

Characteristics of Cyber Stalking

Unwanted Attention: Receiving excessive, unsolicited online communication.


Monitoring: Being observed without consent, often through social media or other online platforms.
Harassment: Repeated and intrusive behaviour causing emotional distress.
Threats: Expressing harmful intentions or making individuals feel unsafe

Example: Imagine someone constantly commenting on your social media, sending numerous
messages, or tracking your online activity. That's Cyber Stalking. It's like an online shadow that won't go
away, causing discomfort and potentially putting your digital well-being at risk. Always report such
behaviour and take steps to protect your online privacy.
Cybercafe
A Cybercafe is like a digital hangout spot where people can use computers and the internet. It's a place
where individuals, often without personal computers, can access online services, play games, or work on
projects.

Features:

Computer Access: Provides computers with internet connectivity for public use.

Internet Browsing: Users can surf the web, check emails, and engage in online activities.

Gaming: Some cyber cafes offer gaming setups for multiplayer or individual gaming sessions.

Common Uses:

1. Study and Work: Students or professionals without personal computers may use cyber cafes for
assignments or work.

2. Socialising: People may gather to play games, socialise, or collaborate on projects.

Cybercrime
Cybercrimes are like digital offences, where people use computers and the internet to break the law or
cause harm. These actions can range from stealing personal information to disrupting digital systems.

Common Types of Cybercrime


Hacking: Unauthorised access to computer systems or networks.
Phishing: Tricking individuals into revealing sensitive information through fake emails or messages.
Identity Theft: Pretending to be someone else online to steal personal information.
Malware Attacks: Spreading harmful software to compromise computer systems.
Online Fraud: Deceiving individuals to gain money or sensitive information.
Impact:
Financial Loss: Individuals or businesses may lose money.
Privacy Invasion: Personal information may be exposed.
Disruption: Digital systems may be interrupted or damaged.
Prevention:
Use Strong Passwords: Create complex and unique passwords.
Install Antivirus Software: Protect devices from malicious software.
Be Cautious Online: Avoid clicking on suspicious links or sharing sensitive information.
Botnets
Botnet are like digital zombie armies. They're networks of infected computers controlled by a single
entity, often a cybercriminal. These infected computers, known as "bots," work together without their
owners' knowledge to perform malicious activities.

How Botnets Work:

Infection: Cybercriminals infect computers with malicious software.


Control: Once infected, these computers become part of the botnet, and the attacker can control them
remotely.
Coordination: Bots work together to perform tasks, information, or launching cyber attacks like
spreading malware, stealing information, or launching cyber attacks.

Botnets: Fuel for Cybercrime

Distributed Power: Botnets provide attackers with a distributed and powerful network, making it
harder to trace and stop their activities.
Multipurpose Use: They can be used for various cybercrimes, from launching massive DDoS attacks
to sending spam emails.

Attack Vector
An Attack Vector is like finding a secret entry point. It's the method or path that cybercriminals use to
gain unauthorised access to computer systems or networks.

Types of Attack Vectors:

Malware: Infecting systems with malicious software.


Phishing: Tricking individuals into revealing sensitive information.
Drive-By Downloads: Installing malware when a user visits a compromised website.
Zero-Day Exploits: Taking advantage of undiscovered vulnerabilities in software.

DDoS(Distributed Denial of Service)


Distributed Denial of Service (DDoS) is a type of DOS attack where multiple systems, which
are trojan infected, target a particular system which causes a DoS attack.
A DDoS attack uses multiple servers and Internet connections to flood the targeted resource.
A DDoS attack is one of the most powerful weapons on the cyber platform. When you come to
know about a website being brought down, it generally means it has become a victim of
a DDoS attack. This means that the hackers have attacked your website or PC by imposing
heavy traffic. Thus, crashing the website or computer due to overloading.
Example: In 2000, Michael Calce, a 15-year-old boy who used the online name “Mafiaboy”,
was behind one of the first DDoS attacks. He hacked into the computer networks of various
different universities. He used their servers to operate a DDoS attack that brought down
several websites such as eBay and Yahoo. In 2016, Dyn was hit with a massive DDoS attack
that took down major websites and services such as Netflix, PayPal, Amazon, and GitHub.

Difference between DoS and DDoS

DoS DDoS

DoS Stands for Denial of service DDoS Stands for Distributed Denial of
attack. service attack.

In Dos attack single system targets In DDoS multiple systems attack the
the victim system. victim’s system.

Victim’s PC is loaded from the


Victim PC is loaded from the packet of data
packet of data sent from a single
sent from Multiple locations.
location.

Dos attack is slower as compared


A DDoS attack is faster than Dos Attack.
to DDoS.

It is difficult to block this attack as multiple


Can be blocked easily as only one
devices are sending packets and attacking
system is used.
from multiple locations.
DoS DDoS

In DOS Attack only a single device In a DDoS attack, The volumeBots are
is used with DOS Attack tools. used to attack at the same time.

DOS Attacks are Easy to trace. DDOS Attacks are Difficult to trace.

Types of DOS Attacks are: Types of DDOS Attacks are:


1. Buffer overflow attacks 1. Volumetric Attacks
2. Ping of Death or ICMP flood 2. Fragmentation Attacks
3. Teardrop Attack 3. Application Layer Attacks
4. Flooding Attack 4. Protocol Attack.

You might also like