Unit 1 contents Introduction Cybercrime Information security Who are cyber criminals Classification of cyber crimes Cybercrime and the Indian ITA 2000 A Global perspective on Cybercrimes
CYBER CRIME Cybercrime is any criminal activity that involves a computer , internet, cyber space and world wide web. A crime committed using a computer and the internet to steal a person Identity Alternative definitions Any illegal act where a special knowledge of computer technology is essential for its perpetration investigation or prosecution Any traditional crime that has acquired a new dimension or order of magnitude through the aid of computer and abuses that have come into being used of computers Any financial dishonesty that takes place in computer environment Any threats to the computer itself such as theft of hardware or software sabotage and demands for random
Cyber crime is an illegal behaviour directed by means of electronic operations that target the security of computer systems and data process by them cyber crime may sometimes be used interchangeably to describe crimes committed using computers such as computer related crime ,computer crime ,Internet crime , Hitech crime etc Crimes completed either on or with a computer Any illegal activity done through the internet or on the computer All criminal activities done using the medium of computers the internet cyberspace and www
Cyber crime refers to the act of performing a criminal act using cyberspace as a communication vehicle some people argue that cyber crime is not a crime as it is a crime against software and not against a person or property however while the legal systems Around The World scramble to introduce laws to combat cyber criminals
Techno Crime - is defined as “ a predetermined act against a system or systems, with the intent to copy, steal, prevent access, corrupt or otherwise deface or damage parts of or the complete computer system .” Techno-vandalism is defined as “the act of brainless defacement of websites and/or other activities, such as copying of files and publicizing their contents publicly, are usually opportunistic in nature. Cyber terrorism The term cybercrime is notorious as it is attached to the word terrorism or terrorist, i.e., cyber terrorism. Cyber terrorism is defined as “any person, group or organization who, with terrorist intent, utilizes access or aids in accessing a computer or computer network or electronic system or device by any available means, and thereby knowingly engages in or attempts to engage in a terrorist act commits the offence of cyber terrorism.
In India and rest of the world, cyber terrorists generally use computer as a tool, target, or both for their criminal activities to gain unauthorized access to sensitive information which may lead to heavy loss or damage to the owner of that information. Cyber criminals use methods like phishing, spoofing, pharming etc for gaining access to the sensitive information.
Real-world Crimes vs. Cyber Crimes Cybercrimes are easier to carry out when compared to real-world crimes. Some of the differences between cybercrimes and real-world crimes are as given below:
Cyber Space Cyberspace is “a network of computer networks or devices that uses the TCP/IP for communication to facilitate transmission and exchange of data.” Cyber squatting refers to the practice of registering, trafficking, or using a domain name with the intent of profiting from the goodwill of someone else's trademark. This unethical practice can lead to confusion among consumers and harm the reputation of legitimate businesses. It is important for individuals and organizations to protect their trademarks and intellectual property rights to prevent cyber squatting.
Cyberpunk is a science fiction genre in which the future world is portrayed as one in which society is largely controlled by computers, at the expense of daily life and social order. Literature, movies and video games of this genre point to a fear that the world may eventually be run solely by computers, including unusual scenarios where nonliving forms take on life-like actions and capabilities. Rebellion against large corporations and established organizations is a key aspect of cyberpunk. As such, main characters are often portrayed as alienated and marginalized by society. Cyber warfare refers to the use of digital tactics and technologies to launch attacks on computer systems, networks, and infrastructure with the intent of causing disruption, damage, or espionage. These attacks can target government agencies, military organizations, critical infrastructure, businesses, or individuals. Cyber warfare can involve a range of tactics, including malware deployment, denial-of-service attacks, data breaches, and information manipulation. It is a growing concern in the realm of national security and requires constant vigilance and preparedness to defend against potential cyber threats
CYBER CRIME and INFORMATION SECURITY Cyber security means protecting information equipment devices computer resources communication device and information stored there in from unauthorised Axis use disclosure disruption modification or destruction the term incorporates both physical security of the devices as well as information Store there covers protection from unauthorised and axis use disclosure description modification and destruction
who are cyber criminals Cyber crime involves such activities as credit card fraud, cyber stacking ,D faming another online gaining and authorized access to computers ignoring copyright software licensing and Trademark protection, overriding encryption to make illegal copies software piracy and stealing others identity to perform criminal acts cyber criminals are those who conduct such as they can be categorized into 3 groups that reflect their motivation
Type 1 cyber criminals hungry for recognition Hobby hackers IT professionals Terrorist organizations Politically motivated hackers Type 2 cyber criminals not interested in recognition Psychological permits Financially motivated hackers State sponsored hacking Organized criminals Type 3 cyber criminals the Insider Disgruntled or former employees seeking revenge Competing companies using employees to gain economic advantage through damage or depth
The typical motives behind cyber crimes are to be greed , desire to gain power or publicity ,desired For Revenge , a sense of adventure looking for thrill to access Forbidden information ,destructive mindset and desire to sell network security services Cyber caves are known to play role in committing Cyber crimes
Classification of Cyber Crimes 1. Cyber crime against individual Electronic mail spoofing and other online fraud Phishing Spamming Cyber defamation Cyber stalking and harassment Computer sabotage Password sniffing
2. Cyber crime against property Credit card fraud Intellectual property crimes Internet time theft 3. Cyber crime against society Forgery Cyber terrorism Web jacking 4. Crimes and imiting from use net news groups
5. Cyber crime against organisation Unauthorised accessing of computer Password sniffing Denial of service attacks Virus attack/ dissemination of viruses Email bombing/ mail bomb Logic bomb Salami attack/ salami technique Trojan horse Data diddling Crimes imaginating from usenet news group Industrial spying/ industrial esponage Computer network intrusion Software piracy