Introduction to Cyber
Crime and Cyber Security
Introduction
• What is Cyber Security?
• Cyber Security is the practice of protecting Computers, Servers, Mobile,
Devices, Networks, Data from malicious attacks.
• Also called Information Security or IT Security.
• Why is Cyber Security Important??
• Increasing use of the internet and smartphones, Online banking, shopping, and
payments, Rise in cyber threats like Hacking, Phishing, Data breaches,
Identity theft, etc.
• Key Objectives of Cyber Security?
• Confidentiality – Keep data private
• Integrity – Ensure data is not altered
• Availability – Make systems accessible only when needed.
Cybercrime
• Definition:
• Cybercrime is any criminal activity involving computers, networks, or digital devices.
• It includes both:
• Attacks on computers (e.g., malware, hacking)
• Attacks using computers (e.g., online fraud, cyberbullying)
• Types of Cybercrime:
• Hacking – Unauthorized access to systems
• Phishing – Fake emails to steal data
• Ransomware – Locking files and demanding money
• Cyberstalking – Online harassment or threats
• Identity Theft – Stealing someone's digital identity
• Online Fraud – Fake websites, lotteries, or shopping scams
• Reasons for Growth in Cybercrime:
• Increased use of smartphones and internet
• Lack of digital awareness
• Weak passwords and poor security
• Use of public Wi-Fi
Information Security
• Definition:
• Information Security (InfoSec) refers to protecting information from:
• Unauthorized access
• Disclosure
• Modification
• Destruction
• Types of Information:
• Personal Information: Name, address, Aadhaar, passwords
• Financial Information: Bank details, credit card numbers
• Business Information: Trade secrets, reports, strategies
• Government Data: Classified documents, defense data
• Threats to Information Security:
• Hacking – Breaking into systems
• Phishing – Tricking users to share info
• Malware – Viruses, worms, ransomware
Who are Cybercriminals?
• Categories of Cybercriminals:
• Hackers – Break into systems
• Crackers – Damage systems intentionally
• Script Kiddies – Use ready-made tools without deep knowledge
• Insiders – Employees who misuse internal access
• Cyber Terrorists – Attack for political or religious reasons
• State-Sponsored Hackers – Work for governments (espionage, sabotage)
E-Mail Spoofing
• Definition:
• E-mail spoofing is the act of forging the "From" address in an email to make it look
like it's from a trusted or known sender.
• The attacker sends an email that appears to be from someone the recipient knows (e.g.,
boss, bank, government).
• Common Purposes of E-Mail Spoofing:
• Phishing attacks – To steal login credentials
• Spreading malware – Via fake attachments
• Scams and fraud – Fake invoice or donation requests
• Impersonation – To damage someone's reputation
• How to Identify Spoofed Emails:
• Look for spelling/grammar errors
• Check email headers or full sender address
• Hover over links (without clicking) to see real URLs
Spamming
• Definition:
• Spamming refers to sending unsolicited, irrelevant, or bulk messages, usually via email,
but also via SMS, social media, etc.
• Types of Spam:
• Email Spam – Unwanted ads, fake offers, lottery wins
• SMS Spam – Promotional or scam texts
• Social Media Spam – Fake links, mass tagging
• Comment Spam – Repeated messages in forums/blogs
• Voice Spam – Robocalls or spam calls
• How to Identify Spam:
• Generic greetings: "Dear Customer"
• Too good to be true: "Win ₹10 lakh today!"
• Urgency: "Act now or lose access!"
• Unknown senders or suspicious email addresses
Cyber Defamation
• Definition:
• Cyber Defamation is the act of publishing false, harmful, or offensive content
about a person or organization on the internet.
• It can occur via social media, blogs, emails, websites, or messaging apps.
• Consequences of Cyber Defamation:
• Reputation damage
• Mental stress or bullying
• Job loss or relationship issues
• Legal action and penalties for the defamer
Internet Time Theft
• Definition:
• Internet Time Theft is the unauthorized or excessive use of internet or computer resources for
non-work-related activities during working hours.
• Considered a form of cybercrime and productivity theft, especially in organizations..
• Common Activities Leading to Time Theft:
• Browsing social media during work
• Watching YouTube/Netflix
• Shopping on e-commerce websites
• Playing online games
• Personal chatting via WhatsApp or email
• Downloading or streaming non-work content
• Why is it Considered a Cyber Offense?
• Wastes company resources
• Reduces employee productivity
• Misuse of company bandwidth and time
• May lead to security risks (e.g., accessing malicious sites)
Salami Attack
• Definition:
• A Salami Attack is a type of cybercrime where small, unnoticeable amounts of
data or money are stolen repeatedly over time.
• Each theft is so minor that it goes undetected, but together, it results in a large
loss.
• Why is It Called a "Salami" Attack?
• Just like slicing a salami very thinly — one slice doesn’t seem like much.
• But many small slices = one whole salami stolen.
• How Does It Work?
• Attacker programs the system to round off small fractions (like ₹0.01)
• These fractions are transferred to the attacker’s account
• This happens repeatedly with many transactions
• Over time, it results in large gains for the attacker
Data Diddling
• Definition:
• Data Diddling is the act of modifying data before or during entry into a
computer system, with the intention to change the final output or results.
• It usually happens at the input stage, often by internal employees.
• How Data Diddling Works?
• Original data is intentionally changed
• Altered data is processed by the system
• Output is manipulated to benefit the attacker
• Changes may be reversed after processing to avoid detection.
Forgery
• Definition:
• Cyber Forgery refers to the creation or alteration of digital documents,
messages, or signatures with the intent to deceive or defraud others.
• What does Cyber Forgery involve?
• Creating fake digital documents
• Altering original data or records
• Faking digital signatures
• Impersonating a person or organization
• Impact of Forgery:
• Financial fraud and monetary loss
• Reputation damage to individuals/companies
• Legal complications for both victims and offenders
• Threat to data integrity and trust
Web Jacking
• Definition:
• Web Jacking is a cybercrime where an attacker takes control of a website or
webpage by tricking the original owner into giving up access or by exploiting
vulnerabilities.
• How It Works?
• Hacker creates a lookalike website or login page
• Sends the fake link to the victim (via email/social media)
• Victim unknowingly enters login details
• Hacker captures the credentials and takes over the real website
• Prevention:
• Use HTTPS and secure hosting
• Enable 2-Factor Authentication (2FA)
• Avoid clicking unknown admin/login links
Computer Sabotage
• Definition:
• Computer Sabotage is the deliberate act of damaging, disrupting, or destroying
computer systems, networks, or data with the intent to cause harm to an
individual, organization, or nation.
• How It Happens:
• Installing malware, viruses, or ransomware
• Deleting or corrupting critical files
• Tampering with hardware or software
• Denial-of-service (DoS) attacks to crash systems
• Target Areas:
• Government or defense infrastructure
• Corporate servers and databases
• Utility services like power, water, transportation
Password Sniffing
• Definition:
• Password sniffing is the act of intercepting and capturing passwords as they
are transmitted across a network.
• It is a type of cyber-attack used to gain unauthorized access to user accounts.
• How It Works:
• Attackers use sniffer tools to monitor and capture data packets on a network.
• If passwords are transmitted in plain text, they can be easily extracted.
• Common in unsecured or public Wi-Fi networks.
• Preventive Measures:
• Use HTTPS instead of HTTP
• Encrypt passwords during transmission
• Avoid logging in over public/unsecured Wi-Fi
• Implement multi-factor authentication (MFA)
Credit Card Frauds
• Definition:
• Credit card fraud is the unauthorized use of someone else's credit card information to
make purchases or withdraw funds.
• It is one of the most common forms of cybercrime in e-commerce and banking.
• Types of Credit Card Frauds:
• Carding: Using stolen credit card numbers to perform fraudulent activities
• Phishing: Tricking users into giving card details via fake emails or websites
• Skimming: Stealing card info using hidden devices at ATMs or POS machines
• Data Breach Theft: Hacking databases of companies to extract customer card data
• Preventive Measures:
• Never share OTP or card details over phone or email
• Use secure websites (HTTPS) for online transactions
• Enable transaction alerts via SMS or email
• Use virtual credit cards or two-factor authentication
• Regularly monitor credit card statements
Vulnerability
• Definition:
• A vulnerability is a weakness or flaw in a system, network, software, or process
that can be exploited by a cyber attacker to gain unauthorized access, disrupt
operations, or steal data.
• Types of Vulnerabilities:
• Hardware Vulnerabilities – Flawed physical components
• Software Vulnerabilities – Bugs in applications or OS
• Network Vulnerabilities – Unsecured communication channels
• Human Vulnerabilities – Lack of awareness, social engineering risks
• How to Manage Vulnerabilities:
• Regular patching and updates
• Conducting vulnerability assessments
• Implementing security policies and awareness training
Threats and Harmful Acts in Cyber Security
• Definition:
• A threat is any potential danger that may exploit a vulnerability and cause harm to data,
systems, or networks.
• Common Cyber Threats:
• Viruses/Worms/Trojans – Malicious programs
• Phishing Attacks – Fraudulent messages to steal info
• Ransomware – Data is encrypted until ransom is paid
• Spyware – Secretly gathers user information
• DDoS Attacks – Overloading a system to crash it
• Social Engineering – Manipulating people to reveal confidential info
• Harmful Acts Include:
• Data theft or leakage
• Destruction of files or systems
• Service disruption (e.g., websites, apps)
• Financial frauds or unauthorized transactions
CIA Triad
• C – Confidentiality:
• Ensures that only authorized individuals have access to information.
• Risks to Confidentiality:
• Unauthorized Access:
• This occurs when an unauthorized individual gains access to sensitive data, either by
bypassing security measures or exploiting weaknesses.
• Weak Encryption:
• If encryption standards are not robust enough, encrypted data may be easily decrypted by
attackers.
• Insider Threats:
• Employees or other trusted individuals within the organization intentionally or
unintentionally leak sensitive information.
• Confidentiality Measures:
• Use encryption techniques
CIA Triad
• I – Integrity:
• Assures that information is accurate and unaltered during storage or transfer.
• Risks to Integrity:
• Data Tampering:
• Attackers or unauthorized users may intentionally alter, corrupt, or destroy data to
manipulate information for malicious purposes or personal gain.
• Malware and Ransomware:
• Malicious software can infect systems, altering or encrypting data, and rendering it
unusable until a ransom is paid or it is repaired.
CIA Triad
• A – Availability:
• Guarantees that systems, data, and services are accessible when needed.
• Risks to Availability:
• DoS and DDoS Attacks:
• Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks can overwhelm
network resources, making the network unavailable to legitimate users.
Cyber Security Policy and Domains of Cyber
Security Policy
• Definition:
• A Cyber Security Policy is a formal set of rules and guidelines that governs
how an organization protects its information assets, systems, and networks
from cyber threats.
• Purpose of Cyber Security Policy:
• Define security practices and procedures
• Prevent unauthorized access, data leaks, or misuse
• Ensure legal and regulatory compliance
• Promote user responsibility and awareness
Domains of Cyber Security Policy
• Access Control Policy
• Defines who can access what data and under what conditions.
• Acceptable Use Policy
• Guides how employees use company IT resources responsibly.
• Incident Response Policy
• Steps to identify, report, and recover from a cyber attack.
• Network Security Policy
• Rules for firewalls, antivirus, VPNs, and monitoring tools.
• Data Protection and Privacy Policy
• Ensures confidential handling of sensitive personal or corporate data.
• Remote Access Policy
• Secures offsite or mobile access to organizational resources.
• BYOD Policy (Bring Your Own Device)
• Manages risks from personal devices used for work purposes.