Cyber+Crimes+Types

Embed Size (px)

Citation preview

  • 8/2/2019 Cyber+Crimes+Types

    1/9

    Cyber Crimes Types: On Role ofComputer

    1. Computer As a Mean

    When the individual is the main target of the crime, thecomputer can be considered the tool rather than thetarget. It Could be

    A. Spam: Spamming is the act of sending unsolicited messages tomany users at a time, possibly up to the thousands, with theusual intention of advertising products to potential customers.

    B. Cyber Stalking: Getting the secret information from you withoutmaking you know about it.

  • 8/2/2019 Cyber+Crimes+Types

    2/9

    C. Fraud: When the rip-off results in some form of financial harm, then

    it is called fraud.

    q Phishing: the act of sending faked e-mails to a user that falsely appears to

    come from a legitimate source.

    q Auction Fraud: Includes

    Non Delivery,

    Giving false information about the item,

    Traingulation,

    Fee Stacking,

    Black Market Goods like pirated soft wares,

    Multiple Bidding

    Shill Bidding

    q Pyramid Schemes: This attracts the target by pay the money, develop the

    network and earn commission on a target reach.

    q Nigerian Scam: A letter informs the recipient about a major corporation,

    government agency or high-profile individuals (royalty or officials) who are insome sort of embarrassing or legal situation. The reward for lending a hand in

  • 8/2/2019 Cyber+Crimes+Types

    3/9

    D. Piracy: Piracy involves the illegal reproduction and distribution ofsoftware applications, games, movies and audio CDs. Can be done

    through copying the original or from Warez sites or through Cracking.

    E. Identity Theft: an unscrupulous person obtains enough of ones

    personal information to be able to impersonate you and use your

    identities to obtain financial gain.

    F. Cyber Pornography: This would include pornographic websites;

    pornographic magazines produced using computers (to publish and

    print the material) and the Internet (to download and transmit

    pornographic pictures, photos, writings etc).

    G. Forgery: Counterfeit currency notes, postage and revenue stamps,

    mark sheets etc can be forged using sophisticated computers, printers

    and scanners.

  • 8/2/2019 Cyber+Crimes+Types

    4/9

    Cyber Crimes Types: When Computer As a Target2. Computer As a Target

    When the computer is the main target of the crime, the computer can beconsidered the target rather than the tool. Requires high technical knowledge.

    It Could be

    A. Network Intrusion: Involve unauthorized entry in the network and

    accessing the information he needs.

    B. Network Attack: Network attacks concern themselves mostly with bringing

    down a network in order that it becomes almost totally unusable. It

    includes:

    q Eavesdropping: secretly listening to the data traveling through the attacked network.

    Network Admn. Doesnt know about it.

    q Identity Spoofing: It involves tricking the network into believing that the hacker is

    using some other computer.

    q Denial for Service: DOS attack repeatedly attacks a particular network or server untilit is too overwhelmed that it is brought down.

  • 8/2/2019 Cyber+Crimes+Types

    5/9

    C. Malware: Malware or malicious programs arewritten with the intention of causing various

    types of damages and nuisances to a computerand the information on the computer.

    . Viruses:A virus is a piece of computer code that hides within otherprograms so that it can spread from computer to computer,

    infecting as it travels. Viruses can damage software, your hardware,and files.

    .Worms: A worm, like a virus, is programmed to spread from one computer toanother, but it does so without any user interaction. Worms do not need totravel through a "host" program or file. They can travel alone and replicate

    themselves in great volume. Worms slow down networks

    . Trojans: computer programs that disguise themselves to be useful software,but instead they compromise your security and cause a lot of damage.

  • 8/2/2019 Cyber+Crimes+Types

    6/9

    Cyber Crimes Types: When ComputerAs a Target

    D. Cyber Terrorism: the act of carrying out terrorism usingcyberspace, or in other words, the Internet. It is thehacking or attacking of networks and computers to obtainor modify information for political and/or social objectives.

    D. Defacement: It is the act of intruding into a server andchanging without permission all the aspects of a websitewhich the public can see.

  • 8/2/2019 Cyber+Crimes+Types

    7/9

    People Behind Cyber crimes: Cybercriminals

    A. Categories Kids (Age Group 9-16 etc.): They consider that hey know

    lot about computers and proud to hack a website for fun.

    Organized Hacktivists: Hacktivists are hackers with aparticular (mostly political) motive. In other cases this reasoncan be social activism, religious activism, etc

    Disgruntled Employees: the increase independence oncomputers and the automation of processes, it is easier fordisgruntled employees to do more harm to their employers bycommitting computer related crimes.

    Professional Hackers:All information are now a days in e-format. Rival organizations employ hackers to steal industrialsecrets and other information that could be beneficial to them

  • 8/2/2019 Cyber+Crimes+Types

    8/9

    Motives Behind Cyber Crimes &Controls Authorities in India

    Putting the public or any section of the public in fear

    Affecting adversely the harmony between different religious,racial, language or regional groups or castes or communities

    Coercing or overawing the government established by law

    Endangering the sovereignty and integrity of the nation.

    Adjudicating Authorities & Laws in India:Cyber Regulations Appellate Tribunal (CRAT). Cyber Crime Investigation CellJurisdictional Procedure The Information Technology Act 2000

  • 8/2/2019 Cyber+Crimes+Types

    9/9

    Tools & Techniques Used in CyberCrimes

    1. Unauthorized Access: "Access" is defined in Section 2(1)(a) of theInformation Technology Act as "gaining entry into, instructing orcommunicating with the logical, arithmetical, or memory functionresources of a computer, computer system or computer network".Unauthorized access would therefore mean any kind of access withoutthe permission

    2. Packet Sniffing: A person is trying to access to the whole process -'C'wishes to intercept the transmission between 'A' and 'B', he would haveintercept the data packets and then go on to translate them back fromhex to the actual data.

    3. Tempest Attack: Tempest is the ability to monitor electromagneticemissions from computers in order to reconstruct the data.

    4.Password Cracking: computer attempts to "cache" the password so thatinternal prompts during the same session do not cause externalprompts to the user and this cache can be hacked.

    5. Buffer Overflow: It involves input of excessive data into a computer.The excess data "overflows" into other areas of the computer'smemory. This allows the hacker to insert executable code along withthe input, thus enabling the hacker to break into the computer.