Upload
sahil-aggarwal
View
222
Download
0
Embed Size (px)
Citation preview
8/2/2019 Cyber+Crimes+Types
1/9
Cyber Crimes Types: On Role ofComputer
1. Computer As a Mean
When the individual is the main target of the crime, thecomputer can be considered the tool rather than thetarget. It Could be
A. Spam: Spamming is the act of sending unsolicited messages tomany users at a time, possibly up to the thousands, with theusual intention of advertising products to potential customers.
B. Cyber Stalking: Getting the secret information from you withoutmaking you know about it.
8/2/2019 Cyber+Crimes+Types
2/9
C. Fraud: When the rip-off results in some form of financial harm, then
it is called fraud.
q Phishing: the act of sending faked e-mails to a user that falsely appears to
come from a legitimate source.
q Auction Fraud: Includes
Non Delivery,
Giving false information about the item,
Traingulation,
Fee Stacking,
Black Market Goods like pirated soft wares,
Multiple Bidding
Shill Bidding
q Pyramid Schemes: This attracts the target by pay the money, develop the
network and earn commission on a target reach.
q Nigerian Scam: A letter informs the recipient about a major corporation,
government agency or high-profile individuals (royalty or officials) who are insome sort of embarrassing or legal situation. The reward for lending a hand in
8/2/2019 Cyber+Crimes+Types
3/9
D. Piracy: Piracy involves the illegal reproduction and distribution ofsoftware applications, games, movies and audio CDs. Can be done
through copying the original or from Warez sites or through Cracking.
E. Identity Theft: an unscrupulous person obtains enough of ones
personal information to be able to impersonate you and use your
identities to obtain financial gain.
F. Cyber Pornography: This would include pornographic websites;
pornographic magazines produced using computers (to publish and
print the material) and the Internet (to download and transmit
pornographic pictures, photos, writings etc).
G. Forgery: Counterfeit currency notes, postage and revenue stamps,
mark sheets etc can be forged using sophisticated computers, printers
and scanners.
8/2/2019 Cyber+Crimes+Types
4/9
Cyber Crimes Types: When Computer As a Target2. Computer As a Target
When the computer is the main target of the crime, the computer can beconsidered the target rather than the tool. Requires high technical knowledge.
It Could be
A. Network Intrusion: Involve unauthorized entry in the network and
accessing the information he needs.
B. Network Attack: Network attacks concern themselves mostly with bringing
down a network in order that it becomes almost totally unusable. It
includes:
q Eavesdropping: secretly listening to the data traveling through the attacked network.
Network Admn. Doesnt know about it.
q Identity Spoofing: It involves tricking the network into believing that the hacker is
using some other computer.
q Denial for Service: DOS attack repeatedly attacks a particular network or server untilit is too overwhelmed that it is brought down.
8/2/2019 Cyber+Crimes+Types
5/9
C. Malware: Malware or malicious programs arewritten with the intention of causing various
types of damages and nuisances to a computerand the information on the computer.
. Viruses:A virus is a piece of computer code that hides within otherprograms so that it can spread from computer to computer,
infecting as it travels. Viruses can damage software, your hardware,and files.
.Worms: A worm, like a virus, is programmed to spread from one computer toanother, but it does so without any user interaction. Worms do not need totravel through a "host" program or file. They can travel alone and replicate
themselves in great volume. Worms slow down networks
. Trojans: computer programs that disguise themselves to be useful software,but instead they compromise your security and cause a lot of damage.
8/2/2019 Cyber+Crimes+Types
6/9
Cyber Crimes Types: When ComputerAs a Target
D. Cyber Terrorism: the act of carrying out terrorism usingcyberspace, or in other words, the Internet. It is thehacking or attacking of networks and computers to obtainor modify information for political and/or social objectives.
D. Defacement: It is the act of intruding into a server andchanging without permission all the aspects of a websitewhich the public can see.
8/2/2019 Cyber+Crimes+Types
7/9
People Behind Cyber crimes: Cybercriminals
A. Categories Kids (Age Group 9-16 etc.): They consider that hey know
lot about computers and proud to hack a website for fun.
Organized Hacktivists: Hacktivists are hackers with aparticular (mostly political) motive. In other cases this reasoncan be social activism, religious activism, etc
Disgruntled Employees: the increase independence oncomputers and the automation of processes, it is easier fordisgruntled employees to do more harm to their employers bycommitting computer related crimes.
Professional Hackers:All information are now a days in e-format. Rival organizations employ hackers to steal industrialsecrets and other information that could be beneficial to them
8/2/2019 Cyber+Crimes+Types
8/9
Motives Behind Cyber Crimes &Controls Authorities in India
Putting the public or any section of the public in fear
Affecting adversely the harmony between different religious,racial, language or regional groups or castes or communities
Coercing or overawing the government established by law
Endangering the sovereignty and integrity of the nation.
Adjudicating Authorities & Laws in India:Cyber Regulations Appellate Tribunal (CRAT). Cyber Crime Investigation CellJurisdictional Procedure The Information Technology Act 2000
8/2/2019 Cyber+Crimes+Types
9/9
Tools & Techniques Used in CyberCrimes
1. Unauthorized Access: "Access" is defined in Section 2(1)(a) of theInformation Technology Act as "gaining entry into, instructing orcommunicating with the logical, arithmetical, or memory functionresources of a computer, computer system or computer network".Unauthorized access would therefore mean any kind of access withoutthe permission
2. Packet Sniffing: A person is trying to access to the whole process -'C'wishes to intercept the transmission between 'A' and 'B', he would haveintercept the data packets and then go on to translate them back fromhex to the actual data.
3. Tempest Attack: Tempest is the ability to monitor electromagneticemissions from computers in order to reconstruct the data.
4.Password Cracking: computer attempts to "cache" the password so thatinternal prompts during the same session do not cause externalprompts to the user and this cache can be hacked.
5. Buffer Overflow: It involves input of excessive data into a computer.The excess data "overflows" into other areas of the computer'smemory. This allows the hacker to insert executable code along withthe input, thus enabling the hacker to break into the computer.