cber law
TRANSCRIPT
-
7/24/2019 Cber Law
1/8
meraj
Module 1A:-Introduction Of Cybercrime
cyber crime
Cybercrime encompasses any criminal act dealingwithcomputersandnetworks(called hacking). Additionally, cyber crime also includes traditional
crimes conducted through the Internet.For example; hate crimes, telemarketing and Internet
raud, identity thet, and credit card account thets are considered to be cyber crimes when the
illegal acti!ities are committed through the use o a computer and the Internet.
Cybercrime: The facts
Cybercrime has now surpassed illegal drug traicking as a criminal moneymaker
"omebody#s identity is stolen e!ery $ seconds as a result o cybercrime
%ithout a sophisticated security package, your unprotected &C can become inected
within our minutes o connecting to the Internet.
'het o personal data
Copyright inringement
Fraud
Child pornography
Cyberstalking
ullying
Type 1 cybercrime
sually a single e!ent rom the perspecti!e o the !ictim. An example would be where
the !ictim unknowingly downloads a 'ro*an horse !irus, which installs a keystroke logger onhis or her machine. 'he keystroke logger allows the hacker to steal pri!ate data such asinternet banking and email passwords.
Another common orm o 'ype + cybercrime is phishing. 'his is where the !ictim
recei!es a supposedly legitimate email (uite oten claiming to be a bank or credit cardcompany) with a link that leads to a hostile website. -nce the link is clicked, the &C canthen be inected with a !irus.
ackers oten carry out 'ype + cybercrime by taking ad!antage o laws in a web
browser to place a 'ro*an horse !irus onto the unprotected !ictims computer
Any cybercrime that relates to thet or manipulation o data or ser!ices !ia hacking or
!iruses, identity thet, and bank or e/commerce raud.
Type 2 cybercrime
'ype 0 cybercrime tends to be much more serious and co!ers things such as
cyberstalking and harassment, child predation, extortion, blackmail, stock marketmanipulation, complex corporate espionage, and planning or carrying out terrorist acti!ities.
It is generally an on/going series o e!ents, in!ol!ing repeated interactions with the
target. For example, the target is contacted in a chat room by someone who, o!er time,attempts to establish a relationship. 1!entually, the criminal exploits the relationship to
http://www.webopedia.com/TERM/C/cyber.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/H/hacker.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/H/hacker.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/C/cyber.html -
7/24/2019 Cber Law
2/8
merajcommit a crime. -r, members o a terrorist cell or criminal organisation may use hiddenmessages to communicate in a public orum to plan acti!ities or discuss money launderinglocations, or example.
2ore oten than not, it is acilitated by programs that do not it under the classiication
crimeware. For example, con!ersations may take place using I2 (instant messaging) clients
or iles may be transerred using F'&.
Forgery
Forgery is the faking of a signature without permission, making a false document
or changing an existing document without authorization. The most common form of
forgery is signing someone else's name to a check, but objects, data and
documents can also be forged. Legal contracts, historical papers, art objects,
diplomas, licenses, certificates and identification cards can be forged.
example, works of arts can be copied or replicated and no crime be committed
unless someone attempted to sell or represent the copies as originals. Then the
copies would become illegal forgeries.
Hacker
n computer networking, hackingis any technical effort to manipulate the normal
beha!ior of network connections and connected systems. " hackeris any person
engaged in hacking. The term #hacking# historically referred to constructi!e, cle!er
technical work that was not necessarily related to computer systems. Today,
howe!er, hacking and hackers are most commonly associated with maliciousprogramming attacks on the nternet and other networks.
$xample. %..T. engineers in the &()s and &*)s first popularized the term and
concept of hacking.
Hacking vs. Cracking
%alicious attacks on computer networks are officially known as cracking,
while hackingtruly applies only to acti!ities ha!ing good intentions. %ost non+
technical people fail to make this distinction, howe!er. utside of academia, itsextremely common to see the term #hack# misused and be applied to cracks as
well.
-
7/24/2019 Cber Law
3/8
merajCommon Network Hacking Techniques
-acking on computer networks is often done through scripts or other network
programming. These programs generally manipulate data passing through a
network connection in ways designed to obtain more information about how the
target system works. %any such pre+packaged scripts are posted on the nternet
for anyone, typically entry+le!el hackers, to use. %ore ad!anced hackers may study
and modify these scripts to de!elop new methods. " few highly skilled hackers work
for commercial firms with the job to protect that company's software and data from
outside hacking.
sotware piracy
'he unauthori3ed copyingo sotware. 2ost retail programsarelicensedor use at *ust
onecomputersite or or use by only oneuserat any time. y buying the sotware, you become
a licensed userrather than an owner (see EULA). 4ou are allowed to make copies o the
program or backuppurposes, but it is against the law to gi!e copies to riends and colleagues.
"otware piracy is all but impossible to stop, although sotware companies are launching more
and more lawsuits against ma*or inractors. -riginally, sotware companies tried to stop sotware
piracy by copy/protectingtheir sotware. 'his strategy ailed, howe!er, because it was
incon!enient or users and was not +55 percent oolproo. 2ost sotware now reuires some
sort o registration, which may discourage would/be pirates, but doesn6t really stop sotware
piracy.
"ome common types o sotware piracy includecountereit sotware, -12
unbundling, sotliting,hard disk loading, corporate sotware piracy,and Internet sotware piracy.
"otware &iracy
"otware piracy is the stealing o legally protected sotware. nder copyright law, sotware
piracy occurs when copyright protected sotware is copied, distributed, modiied or sold.
"otware piracy is considered direct copyright inringement when it denies copyright holders due
compensation or use o their creati!e works.
Computer 7etwork Intrusions
http://www.webopedia.com/http://www.webopedia.com/TERM/S/software.htmlhttp://www.webopedia.com/TERM/P/program.htmlhttp://www.webopedia.com/TERM/S/software_licensing.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/U/user.htmlhttp://www.webopedia.com/TERM/E/EULA.htmlhttp://www.webopedia.com/TERM/B/backup.htmlhttp://www.webopedia.com/TERM/C/copy_protection.htmlhttp://www.webopedia.com/TERM/C/copy_protection.htmlhttp://www.webopedia.com/TERM/C/counterfeit_software.htmlhttp://www.webopedia.com/TERM/C/counterfeit_software.htmlhttp://www.webopedia.com/TERM/O/OEM_unbundling.htmlhttp://www.webopedia.com/TERM/O/OEM_unbundling.htmlhttp://www.webopedia.com/TERM/S/softlifting.htmlhttp://www.webopedia.com/TERM/S/softlifting.htmlhttp://www.webopedia.com/TERM/H/hard_disk_loading.htmlhttp://www.webopedia.com/TERM/H/hard_disk_loading.htmlhttp://www.webopedia.com/TERM/C/corporate_software_piracy.htmlhttp://www.webopedia.com/TERM/C/corporate_software_piracy.htmlhttp://www.webopedia.com/TERM/I/Internet_software_piracy.htmlhttp://www.webopedia.com/http://www.webopedia.com/TERM/S/software.htmlhttp://www.webopedia.com/TERM/P/program.htmlhttp://www.webopedia.com/TERM/S/software_licensing.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/U/user.htmlhttp://www.webopedia.com/TERM/E/EULA.htmlhttp://www.webopedia.com/TERM/B/backup.htmlhttp://www.webopedia.com/TERM/C/copy_protection.htmlhttp://www.webopedia.com/TERM/C/counterfeit_software.htmlhttp://www.webopedia.com/TERM/O/OEM_unbundling.htmlhttp://www.webopedia.com/TERM/O/OEM_unbundling.htmlhttp://www.webopedia.com/TERM/S/softlifting.htmlhttp://www.webopedia.com/TERM/H/hard_disk_loading.htmlhttp://www.webopedia.com/TERM/C/corporate_software_piracy.htmlhttp://www.webopedia.com/TERM/I/Internet_software_piracy.html -
7/24/2019 Cber Law
4/8
merajA strongirewallshould help you keep an eye on attempts to contact your computer. It should
also alert you i an application on your machine is attempting to contact another computer. 8eep
a close eye on these messages. "ome are harmless or e!en beneicial // you wouldn6t want to
block your anti/!irus program rom downloading the latest updates. ut others can be signs that
someone is trying to access your inormation or control your machine rom a remote location.
2ost %eb browsers ha!e security settings that can help you keep your network sae. "e!eral
will warn you i you are about to !isit a site known to host malware. 4ou can also ad*ust settings
such as whether or not your browser will accept cookies or run 9a!a applications.
:isabling cookies, 9a!aand other options will help keep your network sae but it will also aect
your browsing experience. 4ou may not be able to interact with sites the way the webmaster
intended i you turn o these options.
Administrators o commercial computer networks sometimes rely on special sotware and
hardware called intrusion detection systems (I:"). 'hese systems monitor data traic across
host computers and networks. A good I:" can compare this data against known malwarepatterns and alert the administrator i there6s a problem. ut that6s a solution or a much larger
computer network than your typical home network.
2ost anti/!irus sotware won6t detect an intruder. ut you might disco!er a malware application
that makes intrusions possible. un anti/!irus sotware reuently to make sure your system is
sae. 4ou should also be sure to install updates and patches or your operating systemas they
become a!ailable. 'hese patches may help seal up !ulnerabilities on your computer.
%odule &/+0ategory f 0ybercrime
Categories of Cybercrime:
Cybercrime could be committed against persons, property, and government. Here we will reveal
about three major categories of Cybercrime.
1. Against Person
Cybercrime done against person includes harassment by sending emails, cyber stalking, cyber
bullying, child soliciting and abuse, and sharing, trafficking, posting of obscene material. Such
cybercrime influence younger generation psychology in an awful manner and threaten them with
weakening their growth. Cybercrime breaks user privacy and leave irreparable scars on users if
not controlled.
2. Against Property
http://computer.howstuffworks.com/firewall.htmhttp://computer.howstuffworks.com/firewall.htmhttp://computer.howstuffworks.com/cookie.htmhttp://computer.howstuffworks.com/program.htmhttp://computer.howstuffworks.com/operating-system.htmhttp://computer.howstuffworks.com/firewall.htmhttp://computer.howstuffworks.com/cookie.htmhttp://computer.howstuffworks.com/program.htmhttp://computer.howstuffworks.com/operating-system.htm -
7/24/2019 Cber Law
5/8
merajCybercrime against property includes cybercrime vandalism that can be done by
spreading harmful programs to steal database of other organizations with the help
of corporate cyber spy. Theft of persons details, misuse credit card, running a fraud to
take away money from users is some instances of cybercrime against property.
3.Against Government
When cyber attacker cracks government website, military website, then such type of crimes
come under Against Government class of cybercrime. Even such crime happens by circulating
false information with a reason to spread terror among people of that particular country.
Criminal ackers &lanning Cyber Attacks
Cyber-criminals are planning teir !its! more carefully and te attacks are lasting
longer tan e"er - and many #e$ %ealanders are lea"ing temsel"es e&posed tocyber treats on teir computers' mobiles and social net$orks(
An internet security report' released last nigt' by soft$are company )ymantec into
cyber attacks as re"ealed te lengts some people go to to e"ade security to
obtain personal information and de"ise ne$ $ays of breacing pri"acy(
"ome o those impacts areblue screen o death> ("-:)
:ata corruption
Formattingdisks, destroying all contents
se o the machine as part o a botnet(e.g. to perorm automated spammingor
todistribute :enial/o/ser!ice attacks)
1lectronic moneythet
Inects entire 7etwork banking inormation and other connected de!ices
:ata thet, including conidential iles, sometimes or industrial espionage, and
inormation with inancial implications such as passwords and payment cardinormation
2odiication ordeletion o iles
:ownloading or uploadingo iles or !arious purposes
:ownloading and installing sotware, including third/partymalwareand ransomware
8eystroke logging
%atching the user6s screen
@iewing the user6s webcam
Controlling the computer system remotely
1ncrypting iles; a ransom payment may be demanded or decryption, as with
theCrypto?ockerransomware
2odiications o registry
sing computer resources or mining cryptocurrency
?inking computer to otnet
sing inected computer as proxy or illegal acti!ities and attacks on other computers.
http://en.wikipedia.org/wiki/Crash_(computing)http://en.wikipedia.org/wiki/Crash_(computing)http://en.wikipedia.org/wiki/Blue_screen_of_deathhttp://en.wikipedia.org/wiki/Format_(computing)http://en.wikipedia.org/wiki/Botnethttp://en.wikipedia.org/wiki/Spam_(electronic)http://en.wikipedia.org/wiki/Denial-of-service_attack#Distributed_attackhttp://en.wikipedia.org/wiki/Denial-of-service_attack#Distributed_attackhttp://en.wikipedia.org/wiki/Electronic_moneyhttp://en.wikipedia.org/wiki/Data_thefthttp://en.wikipedia.org/wiki/Industrial_espionagehttp://en.wikipedia.org/wiki/Payment_cardhttp://en.wikipedia.org/wiki/File_deletionhttp://en.wikipedia.org/wiki/File_deletionhttp://en.wikipedia.org/wiki/Uploading_and_downloadinghttp://en.wikipedia.org/wiki/Uploading_and_downloadinghttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Ransomware_(malware)http://en.wikipedia.org/wiki/Keystroke_logginghttp://en.wikipedia.org/wiki/Data_scraping#Screen_scrapinghttp://en.wikipedia.org/wiki/Webcamhttp://en.wikipedia.org/wiki/Remote_administrationhttp://en.wikipedia.org/wiki/CryptoLockerhttp://en.wikipedia.org/wiki/CryptoLockerhttp://en.wikipedia.org/wiki/Crash_(computing)http://en.wikipedia.org/wiki/Blue_screen_of_deathhttp://en.wikipedia.org/wiki/Format_(computing)http://en.wikipedia.org/wiki/Botnethttp://en.wikipedia.org/wiki/Spam_(electronic)http://en.wikipedia.org/wiki/Denial-of-service_attack#Distributed_attackhttp://en.wikipedia.org/wiki/Electronic_moneyhttp://en.wikipedia.org/wiki/Data_thefthttp://en.wikipedia.org/wiki/Industrial_espionagehttp://en.wikipedia.org/wiki/Payment_cardhttp://en.wikipedia.org/wiki/File_deletionhttp://en.wikipedia.org/wiki/Uploading_and_downloadinghttp://en.wikipedia.org/wiki/Malwarehttp://en.wikipedia.org/wiki/Ransomware_(malware)http://en.wikipedia.org/wiki/Keystroke_logginghttp://en.wikipedia.org/wiki/Data_scraping#Screen_scrapinghttp://en.wikipedia.org/wiki/Webcamhttp://en.wikipedia.org/wiki/Remote_administrationhttp://en.wikipedia.org/wiki/CryptoLocker