cber law

Upload: meraj-alam

Post on 21-Feb-2018

213 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/24/2019 Cber Law

    1/8

    meraj

    Module 1A:-Introduction Of Cybercrime

    cyber crime

    Cybercrime encompasses any criminal act dealingwithcomputersandnetworks(called hacking). Additionally, cyber crime also includes traditional

    crimes conducted through the Internet.For example; hate crimes, telemarketing and Internet

    raud, identity thet, and credit card account thets are considered to be cyber crimes when the

    illegal acti!ities are committed through the use o a computer and the Internet.

    Cybercrime: The facts

    Cybercrime has now surpassed illegal drug traicking as a criminal moneymaker

    "omebody#s identity is stolen e!ery $ seconds as a result o cybercrime

    %ithout a sophisticated security package, your unprotected &C can become inected

    within our minutes o connecting to the Internet.

    'het o personal data

    Copyright inringement

    Fraud

    Child pornography

    Cyberstalking

    ullying

    Type 1 cybercrime

    sually a single e!ent rom the perspecti!e o the !ictim. An example would be where

    the !ictim unknowingly downloads a 'ro*an horse !irus, which installs a keystroke logger onhis or her machine. 'he keystroke logger allows the hacker to steal pri!ate data such asinternet banking and email passwords.

    Another common orm o 'ype + cybercrime is phishing. 'his is where the !ictim

    recei!es a supposedly legitimate email (uite oten claiming to be a bank or credit cardcompany) with a link that leads to a hostile website. -nce the link is clicked, the &C canthen be inected with a !irus.

    ackers oten carry out 'ype + cybercrime by taking ad!antage o laws in a web

    browser to place a 'ro*an horse !irus onto the unprotected !ictims computer

    Any cybercrime that relates to thet or manipulation o data or ser!ices !ia hacking or

    !iruses, identity thet, and bank or e/commerce raud.

    Type 2 cybercrime

    'ype 0 cybercrime tends to be much more serious and co!ers things such as

    cyberstalking and harassment, child predation, extortion, blackmail, stock marketmanipulation, complex corporate espionage, and planning or carrying out terrorist acti!ities.

    It is generally an on/going series o e!ents, in!ol!ing repeated interactions with the

    target. For example, the target is contacted in a chat room by someone who, o!er time,attempts to establish a relationship. 1!entually, the criminal exploits the relationship to

    http://www.webopedia.com/TERM/C/cyber.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/H/hacker.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/H/hacker.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/C/cyber.html
  • 7/24/2019 Cber Law

    2/8

    merajcommit a crime. -r, members o a terrorist cell or criminal organisation may use hiddenmessages to communicate in a public orum to plan acti!ities or discuss money launderinglocations, or example.

    2ore oten than not, it is acilitated by programs that do not it under the classiication

    crimeware. For example, con!ersations may take place using I2 (instant messaging) clients

    or iles may be transerred using F'&.

    Forgery

    Forgery is the faking of a signature without permission, making a false document

    or changing an existing document without authorization. The most common form of

    forgery is signing someone else's name to a check, but objects, data and

    documents can also be forged. Legal contracts, historical papers, art objects,

    diplomas, licenses, certificates and identification cards can be forged.

    example, works of arts can be copied or replicated and no crime be committed

    unless someone attempted to sell or represent the copies as originals. Then the

    copies would become illegal forgeries.

    Hacker

    n computer networking, hackingis any technical effort to manipulate the normal

    beha!ior of network connections and connected systems. " hackeris any person

    engaged in hacking. The term #hacking# historically referred to constructi!e, cle!er

    technical work that was not necessarily related to computer systems. Today,

    howe!er, hacking and hackers are most commonly associated with maliciousprogramming attacks on the nternet and other networks.

    $xample. %..T. engineers in the &()s and &*)s first popularized the term and

    concept of hacking.

    Hacking vs. Cracking

    %alicious attacks on computer networks are officially known as cracking,

    while hackingtruly applies only to acti!ities ha!ing good intentions. %ost non+

    technical people fail to make this distinction, howe!er. utside of academia, itsextremely common to see the term #hack# misused and be applied to cracks as

    well.

  • 7/24/2019 Cber Law

    3/8

    merajCommon Network Hacking Techniques

    -acking on computer networks is often done through scripts or other network

    programming. These programs generally manipulate data passing through a

    network connection in ways designed to obtain more information about how the

    target system works. %any such pre+packaged scripts are posted on the nternet

    for anyone, typically entry+le!el hackers, to use. %ore ad!anced hackers may study

    and modify these scripts to de!elop new methods. " few highly skilled hackers work

    for commercial firms with the job to protect that company's software and data from

    outside hacking.

    sotware piracy

    'he unauthori3ed copyingo sotware. 2ost retail programsarelicensedor use at *ust

    onecomputersite or or use by only oneuserat any time. y buying the sotware, you become

    a licensed userrather than an owner (see EULA). 4ou are allowed to make copies o the

    program or backuppurposes, but it is against the law to gi!e copies to riends and colleagues.

    "otware piracy is all but impossible to stop, although sotware companies are launching more

    and more lawsuits against ma*or inractors. -riginally, sotware companies tried to stop sotware

    piracy by copy/protectingtheir sotware. 'his strategy ailed, howe!er, because it was

    incon!enient or users and was not +55 percent oolproo. 2ost sotware now reuires some

    sort o registration, which may discourage would/be pirates, but doesn6t really stop sotware

    piracy.

    "ome common types o sotware piracy includecountereit sotware, -12

    unbundling, sotliting,hard disk loading, corporate sotware piracy,and Internet sotware piracy.

    "otware &iracy

    "otware piracy is the stealing o legally protected sotware. nder copyright law, sotware

    piracy occurs when copyright protected sotware is copied, distributed, modiied or sold.

    "otware piracy is considered direct copyright inringement when it denies copyright holders due

    compensation or use o their creati!e works.

    Computer 7etwork Intrusions

    http://www.webopedia.com/http://www.webopedia.com/TERM/S/software.htmlhttp://www.webopedia.com/TERM/P/program.htmlhttp://www.webopedia.com/TERM/S/software_licensing.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/U/user.htmlhttp://www.webopedia.com/TERM/E/EULA.htmlhttp://www.webopedia.com/TERM/B/backup.htmlhttp://www.webopedia.com/TERM/C/copy_protection.htmlhttp://www.webopedia.com/TERM/C/copy_protection.htmlhttp://www.webopedia.com/TERM/C/counterfeit_software.htmlhttp://www.webopedia.com/TERM/C/counterfeit_software.htmlhttp://www.webopedia.com/TERM/O/OEM_unbundling.htmlhttp://www.webopedia.com/TERM/O/OEM_unbundling.htmlhttp://www.webopedia.com/TERM/S/softlifting.htmlhttp://www.webopedia.com/TERM/S/softlifting.htmlhttp://www.webopedia.com/TERM/H/hard_disk_loading.htmlhttp://www.webopedia.com/TERM/H/hard_disk_loading.htmlhttp://www.webopedia.com/TERM/C/corporate_software_piracy.htmlhttp://www.webopedia.com/TERM/C/corporate_software_piracy.htmlhttp://www.webopedia.com/TERM/I/Internet_software_piracy.htmlhttp://www.webopedia.com/http://www.webopedia.com/TERM/S/software.htmlhttp://www.webopedia.com/TERM/P/program.htmlhttp://www.webopedia.com/TERM/S/software_licensing.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/U/user.htmlhttp://www.webopedia.com/TERM/E/EULA.htmlhttp://www.webopedia.com/TERM/B/backup.htmlhttp://www.webopedia.com/TERM/C/copy_protection.htmlhttp://www.webopedia.com/TERM/C/counterfeit_software.htmlhttp://www.webopedia.com/TERM/O/OEM_unbundling.htmlhttp://www.webopedia.com/TERM/O/OEM_unbundling.htmlhttp://www.webopedia.com/TERM/S/softlifting.htmlhttp://www.webopedia.com/TERM/H/hard_disk_loading.htmlhttp://www.webopedia.com/TERM/C/corporate_software_piracy.htmlhttp://www.webopedia.com/TERM/I/Internet_software_piracy.html
  • 7/24/2019 Cber Law

    4/8

    merajA strongirewallshould help you keep an eye on attempts to contact your computer. It should

    also alert you i an application on your machine is attempting to contact another computer. 8eep

    a close eye on these messages. "ome are harmless or e!en beneicial // you wouldn6t want to

    block your anti/!irus program rom downloading the latest updates. ut others can be signs that

    someone is trying to access your inormation or control your machine rom a remote location.

    2ost %eb browsers ha!e security settings that can help you keep your network sae. "e!eral

    will warn you i you are about to !isit a site known to host malware. 4ou can also ad*ust settings

    such as whether or not your browser will accept cookies or run 9a!a applications.

    :isabling cookies, 9a!aand other options will help keep your network sae but it will also aect

    your browsing experience. 4ou may not be able to interact with sites the way the webmaster

    intended i you turn o these options.

    Administrators o commercial computer networks sometimes rely on special sotware and

    hardware called intrusion detection systems (I:"). 'hese systems monitor data traic across

    host computers and networks. A good I:" can compare this data against known malwarepatterns and alert the administrator i there6s a problem. ut that6s a solution or a much larger

    computer network than your typical home network.

    2ost anti/!irus sotware won6t detect an intruder. ut you might disco!er a malware application

    that makes intrusions possible. un anti/!irus sotware reuently to make sure your system is

    sae. 4ou should also be sure to install updates and patches or your operating systemas they

    become a!ailable. 'hese patches may help seal up !ulnerabilities on your computer.

    %odule &/+0ategory f 0ybercrime

    Categories of Cybercrime:

    Cybercrime could be committed against persons, property, and government. Here we will reveal

    about three major categories of Cybercrime.

    1. Against Person

    Cybercrime done against person includes harassment by sending emails, cyber stalking, cyber

    bullying, child soliciting and abuse, and sharing, trafficking, posting of obscene material. Such

    cybercrime influence younger generation psychology in an awful manner and threaten them with

    weakening their growth. Cybercrime breaks user privacy and leave irreparable scars on users if

    not controlled.

    2. Against Property

    http://computer.howstuffworks.com/firewall.htmhttp://computer.howstuffworks.com/firewall.htmhttp://computer.howstuffworks.com/cookie.htmhttp://computer.howstuffworks.com/program.htmhttp://computer.howstuffworks.com/operating-system.htmhttp://computer.howstuffworks.com/firewall.htmhttp://computer.howstuffworks.com/cookie.htmhttp://computer.howstuffworks.com/program.htmhttp://computer.howstuffworks.com/operating-system.htm
  • 7/24/2019 Cber Law

    5/8

    merajCybercrime against property includes cybercrime vandalism that can be done by

    spreading harmful programs to steal database of other organizations with the help

    of corporate cyber spy. Theft of persons details, misuse credit card, running a fraud to

    take away money from users is some instances of cybercrime against property.

    3.Against Government

    When cyber attacker cracks government website, military website, then such type of crimes

    come under Against Government class of cybercrime. Even such crime happens by circulating

    false information with a reason to spread terror among people of that particular country.

    Criminal ackers &lanning Cyber Attacks

    Cyber-criminals are planning teir !its! more carefully and te attacks are lasting

    longer tan e"er - and many #e$ %ealanders are lea"ing temsel"es e&posed tocyber treats on teir computers' mobiles and social net$orks(

    An internet security report' released last nigt' by soft$are company )ymantec into

    cyber attacks as re"ealed te lengts some people go to to e"ade security to

    obtain personal information and de"ise ne$ $ays of breacing pri"acy(

    "ome o those impacts areblue screen o death> ("-:)

    :ata corruption

    Formattingdisks, destroying all contents

    se o the machine as part o a botnet(e.g. to perorm automated spammingor

    todistribute :enial/o/ser!ice attacks)

    1lectronic moneythet

    Inects entire 7etwork banking inormation and other connected de!ices

    :ata thet, including conidential iles, sometimes or industrial espionage, and

    inormation with inancial implications such as passwords and payment cardinormation

    2odiication ordeletion o iles

    :ownloading or uploadingo iles or !arious purposes

    :ownloading and installing sotware, including third/partymalwareand ransomware

    8eystroke logging

    %atching the user6s screen

    @iewing the user6s webcam

    Controlling the computer system remotely

    1ncrypting iles; a ransom payment may be demanded or decryption, as with

    theCrypto?ockerransomware

    2odiications o registry

    sing computer resources or mining cryptocurrency

    ?inking computer to otnet

    sing inected computer as proxy or illegal acti!ities and attacks on other computers.

    http://en.wikipedia.org/wiki/Crash_(computing)http://en.wikipedia.org/wiki/Crash_(computing)http://en.wikipedia.org/wiki/Blue_screen_of_deathhttp://en.wikipedia.org/wiki/Format_(computing)http://en.wikipedia.org/wiki/Botnethttp://en.wikipedia.org/wiki/Spam_(electronic)http://en.wikipedia.org/wiki/Denial-of-service_attack#Distributed_attackhttp://en.wikipedia.org/wiki/Denial-of-service_attack#Distributed_attackhttp://en.wikipedia.org/wiki/Electronic_moneyhttp://en.wikipedia.org/wiki/Data_thefthttp://en.wikipedia.org/wiki/Industrial_espionagehttp://en.wikipedia.org/wiki/Payment_cardhttp://en.wikipedia.org/wiki/File_deletionhttp://en.wikipedia.org/wiki/File_deletionhttp://en.wikipedia.org/wiki/Uploading_and_downloadinghttp://en.wikipedia.org/wiki/Uploading_and_downloadinghttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Ransomware_(malware)http://en.wikipedia.org/wiki/Keystroke_logginghttp://en.wikipedia.org/wiki/Data_scraping#Screen_scrapinghttp://en.wikipedia.org/wiki/Webcamhttp://en.wikipedia.org/wiki/Remote_administrationhttp://en.wikipedia.org/wiki/CryptoLockerhttp://en.wikipedia.org/wiki/CryptoLockerhttp://en.wikipedia.org/wiki/Crash_(computing)http://en.wikipedia.org/wiki/Blue_screen_of_deathhttp://en.wikipedia.org/wiki/Format_(computing)http://en.wikipedia.org/wiki/Botnethttp://en.wikipedia.org/wiki/Spam_(electronic)http://en.wikipedia.org/wiki/Denial-of-service_attack#Distributed_attackhttp://en.wikipedia.org/wiki/Electronic_moneyhttp://en.wikipedia.org/wiki/Data_thefthttp://en.wikipedia.org/wiki/Industrial_espionagehttp://en.wikipedia.org/wiki/Payment_cardhttp://en.wikipedia.org/wiki/File_deletionhttp://en.wikipedia.org/wiki/Uploading_and_downloadinghttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Ransomware_(malware)http://en.wikipedia.org/wiki/Keystroke_logginghttp://en.wikipedia.org/wiki/Data_scraping#Screen_scrapinghttp://en.wikipedia.org/wiki/Webcamhttp://en.wikipedia.org/wiki/Remote_administrationhttp://en.wikipedia.org/wiki/CryptoLocker