Cyber Security Module 1notes Jan9 2023
Cyber Security Module 1notes Jan9 2023
Chapter 1: Cybercrime:
• Cyberspace is now used to describe the internet and other computer networks
• In terms of computer science cyberspace is a worldwide network of computer
networks that uses the transmission control protocol or internet protocol for
communication to facilitate transmission and exchange of data
• Common Factor in almost all definition of cyber space is the sense of place
that they convey - cyberspace is most definitely a place where you chat,
explore, research and play.
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology
Introduction to Cyber Security (22ETC15I) Module 1
Cybersquatting:
Cyber terrorism
Cyber punk
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology
Introduction to Cyber Security (22ETC15I) Module 1
Cyber warfare
• techno crime
• techno vandalism
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology
Introduction to Cyber Security (22ETC15I) Module 1
techno crime
• premeditated act against system or systems, with the intent to copy, Steal,
prevent access, corrupt or otherwise deface or damage parts of complete
computer system.
• The 24/7 connection to the internet makes this type of Cybercrime a real
possibility to engineer from anywhere in the world.
techno vandalism
Botnet Menace:
• Botnet is used to refer to a group of compromised computers (Zombie
computers, i.e., personal computers secretly under the control of hackers
running malware under a common command and control infrastructure.
• Examples of illegal process are the denial-of-service attack (DoS), adware,
spyware, email spam click fraud, theft of application serial numbers, login IDs
and financial information such as credit card numbers etc.,
• An attack against the control by infecting computers with a virus or other
malicious code.
• A problem of botnet is global in nature.
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology
Introduction to Cyber Security (22ETC15I) Module 1
• India as has an average of 374 new bought attacks per day and had more
than 38000 distinct Bot infected computers in the first half of the year 2009.
• As shown in below figure the attacker spreads the Worm/Zombie to the Pocket
PC device using 802.11, Bluetooth. The PC devices reads the E-Mail, then
Zombie will be installed and worm propagates.
• The worm/Zombie will spread to Contact list of the victim and also to the
DDoS zombies flood and Desktop DC.
• Then later attacker will take control over the entire network.
Cybercriminals are those who conduct act such as child pornography; credit card
fraud, cyber stalking, defame another online; gaining unauthorised access to a
computer system; ignoring copyright, software licensing and Trademark protection;
overriding encryption to make illegal copies; software piracy and stealing another's
identity to perform criminal acts.
They can be categorised into three groups that reflect their motivation.
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology
Introduction to Cyber Security (22ETC15I) Module 1
• Hobby hackers: A person who enjoys exploring the limits of what is possible
in the spirit of play full cleverness
• IT professionals: ethical hacker
• Politically motivated hackers: promote the objective of individuals groups
or Nation supporting a variety of causes such as anti-globalization transitional
conflict and protest.
• Terrorist organizations: cyber terrorism terrorist using the internet for
attacks, large scale destruction of computer networks.
The classification of Cybercrimes based on broad and narrow sense. The table
shows the classification based on the role of computer.
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology
Introduction to Cyber Security (22ETC15I) Module 1
Questions:
1. Explain the classification of cybercrime Against Individual, property,
organization, society and crimes emanating from Usenet newsgroups.
2. Discuss about the classification of cybercrime. What are the different types
of cybercrime towards an individual?
The Cybercrimes are also classified as below based on the crimes victims
number and groups or on society.
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology
Introduction to Cyber Security (22ETC15I) Module 1
2. Phishing Spear phishing and its various other forms such as vishing and
smishing
3. Spamming
4. Cyber defamation
5. Cyberstalking and harassment
6. Computers sabotage
7. Pornography offences
8. Password sniffing this also belongs to the category of Cybercrime against
organisation because the use of password could be an individual for his or
her personal work or the work here or she is doing using the computer that
belongs to an organisation.
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology
Introduction to Cyber Security (22ETC15I) Module 1
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology
Introduction to Cyber Security (22ETC15I) Module 1
1.5.2. Spamming
• It means sending multiple copies of unsolicited mails for mass emails such
as chain letters difficult to control
• In context of search engine spamming, it is alteration or creation of a
document with the intent to deceive an electronic catalog or filling system.
1.5.3. Cyberdefamation
• Cyberdefamation occurs when defamation takes place with the help of a
computer and/or internet.
• For example, someone publishing defamatory matter about someone's
website or send emails contain defamatory information to all friends of that
person.
• CHAPTER XXI of the Indian Penal Code (IPC) is about the defamation.
• According IPC section 499;
• 1. It may amount to defamation to impute anything to a deceased person, if
the imputation would harm the reputation of that person if living, and is
intended to be hurtful to the feelings of his family or other near relatives.
• 2. It may amount to defamation to make an invitation concerning a company
or an association of election of persons as such.
• 3. Imputation in the form of an alternative or expressed ironically the amount
to defamation.
• 4. No imputation is said to be harm a person's reputation and less that
imputation directly or indirectly in the estimation of the others Louis the
moral or intellectual character of that person, his cast
• Liable is written defamation on slander is oral defamation
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology
Introduction to Cyber Security (22ETC15I) Module 1
• These types of attacks occur when negligible amount received removed and
accumulated into something larger from bank accounts these attacks are
used for the commission of a financial crimes
• Example attackers withdrawing rupees to from every customer's account.
1.5.7. Forgery
• Currency notes, revenue stamps, marksheets, fake certificate, etc., can be
formed using computers and high-quality scanners and printers does these
types of forgery can be categorised as a cyber crime.
1.5.11. Hacking
• Every act committed towards breaking into computer and or network is
hacking.
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology
Introduction to Cyber Security (22ETC15I) Module 1
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology
Introduction to Cyber Security (22ETC15I) Module 1
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology
Introduction to Cyber Security (22ETC15I) Module 1
*********************
Important Topics:
pornography offences:
Child pornography means, any photograph that can be considered obscene and/or
unsuitable for the age of child viewer;
film. video. picture; or
computer generated image or picture of sexually explicit conduct where the
production of such visual depiction involves the use of a minor engaging in sexually
explicit conduct.
• child pornographv is considered an offense.
• Unfortunately, child pornography is a reality of the Internet.
• The Internet is being highly used by its abusers to reach and abuse children
sexually, worldwide. In India too, the Internet has become a household
commodity in the urban areas of the nation.
• Its explosion has made the children a viable victim to the cybercrime.
• As the broad-band connections get into the reach of more and more homes.
• larger child population will be using the Internet and therefore greater would
be the chances of falling victim to the aggression of pedophiles.
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology
Introduction to Cyber Security (22ETC15I) Module 1
Questions: What is the main purpose of hacking, explain hacking with examples
Hacking:
The following are the few main purpose of hacking
1.Greed;
2. power;
3. publicity
4. revenge
5. adventure
6. desire to access forbidden information;
7. destructive mindset
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology
Introduction to Cyber Security (22ETC15I) Module 1
Questions:
1. Explain the Indian perspective of Cybercrime.
2. What are the hacking and Indian laws present on cybercrimes and discuss.
3. Explain cybercrime and the Indian ITA 2000
4. Discuss a global perspective on cyber crime
5. Write a short note on cybercrime and the extended Enterprise with diagram.
Computer related crime is defined as an illegal any illegal act for which the
knowledge of Computer technology is essential for successful prosecution.
International legal aspects of computer crimes that define it as an confesses any
illegal act for which the knowledge of Computer technology is essential for it
represents for its perpetration.
Cybercrime is the outcome of Globalization; this leads to increase in number of
offenses and introduces the threats to the future.
This can be solved by incorporating the legal system into a society.
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology
Introduction to Cyber Security (22ETC15I) Module 1
• A total cybercrime were registered under the IT Act in 2007 compared to 142
cases registered 2006.
• Under the IPC in to, 339 cases were recorded in 2007 compared noteworthy
to 311 cases in 2006. The laws, crime details and punishment details given
in table below.
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology
Introduction to Cyber Security (22ETC15I) Module 1
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology
Introduction to Cyber Security (22ETC15I) Module 1
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology
Introduction to Cyber Security (22ETC15I) Module 1
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology
Introduction to Cyber Security (22ETC15I) Module 1
What are the major types of Incidents occurring in the computer environment.
The following are the major incidents occurs in the computer environment
• Denial of Service attack
• Laptop theft
• Telecom fraud
• unauthorised access
• viruses
• financial fraud
• insider abuse
• sabotage
• theft or loss of information
• website defacement
• abuse of wireless network
• misuse of web application
• bots
• DoS attacks
• instant messaging abuse
• password sniffing
• theft or loss of computer customer data
o from mobile devices
o from all other sources
Explain the Spamming? What the different types. And explain the web publishing
techniques to be avoided in search engine spam.
Spamming:
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology
Introduction to Cyber Security (22ETC15I) Module 1
Although the most widely recognized form of Spam is E-Mail Spam, the term is
applied to similar abuses in other media:
• Instant messaging Spam,
• Usenet newsgroup Spam,
• web search engine Spam.
• Spam in blogs,
• wiki Spam,
• online classified ads Spam,
• mobile phone messaging Spam.
• Internet forum Spam. Junk fax transmissions,
• social networking Spam, file sharing network Spam,
• video sharing sites, etc
• Spamming is difficult to control because it has economic viability advertise
have no operating cost beyond the management of their mailing lists it is
difficult to hold centres accountable for their mass mailings.
• Spammers are numerous the volume of unsolicited mail has become very high
because the barrier to entry is slow.
• spamming is in the context of search engines spamming. In this context of
spamming alteration or creation of a document with the intent to deceive and
electronic catalog or filling system.
• some web authors use subversive techniques to ensure that there are fines
penalties associated with the use old techniques.
• sites appears more frequently or penalties associated with the use of such
submersible technique
• Those who continually attempt to subvert or spam the search engine may be
permanently excluded from search index.
****************End**************
Dr. Asha K, Associate Professor, Dept. of ECE Sai Vidya Institute of Technology