You are on page 1of 13

1

CYBERCRIME AND SECURITY

HOD: Prof. Y.B.Sanap AUTHORS:

FACULTY: Prof. P.B.Mali Miss. Preety Nandkumar Koli

Miss. Saiyamee Santosh Salve

ABSTRACT: detection, deterioration, alteration or


suppression of computer data), misuse of
 The terms computer crime and cybercrime
devices, forgery(ID theft), and electronic
are more properly restricted to describing
fraud.
criminal activity in which the computer or
 Computer crime issues have become high-
network is a necessary part of the crime,
profile, particularly those surrounding
these terms are also sometimes used to
hacking, copyright infringement through
include traditional crimes, such as fraud,
warez, and child grooming.
identity theft, forgery, in which computer
 There are also problems of privacy when
or networks are used.
confidential information is lost or
 Computer crime can broadly be defined as
intercepted, lawfully or otherwise.
criminal activity involving an information
 Self-protection, while essential, is not
technology infrastructure, including illegal
sufficient to make cyberspace a safe place
access (unauthorized access), illegal
to conduct business. The rule of law must
interception (by technical means of non-
also be enforced.
public transmission of computer data to,
from or within a computer system), data Keywords: Cyber Attacks, Potential Economic
interference (unauthorized damaging, Impact, cyber crime, Consumer trust, National
Security, cyber security, cyber ethics, social
media, cloud computing, android apps.
2

1. INTRODUCTION:

Current era is too fast to utilize the time


factor to improve the performance factor. It is
only possible due the use of Internet. Everyone Fig. : 2
appreciates the use of Internet but there is another  Pranksters: These individuals perpetrate
side of the coin that is cyber crime by the use of tricks on others. They generally do not
Internet. Some of the kinds of Cyber-criminals are intend any particular or long-lasting harm.
mentioned as below:

 Crackers: These individuals are intent on


causing loss to satisfy some antisocial
motives or just for fun. Many computer
virus creators and distributors fall into this
category. Fig. : 3

 Career criminals: These individuals earn


part or all of their income from crime,
although they Malcontents, addicts, and
irrational and incompetent people. These
Fig. : 1 individuals extend from the mentally ill do
 Hackers: These individuals explore not necessarily engage in crime as a full-
others' computer systems for education, time occupation.
out of curiosity, or to compete with their
peers. They may be attempting to gain the  Cyber terrorists: There are many forms
use of a more powerful computer, gain of cyber terrorism. Sometimes it's a rather
respect from fellow hackers, build a smart hacker breaking into a government
reputation, or gain acceptance as an expert website, other times it's just a group of
without formal education. like-minded Internet users who crash a
website by flooding it with traffic.
3

2. CYBER CRIME:

Cyber crime is a term for any illegal


activity that uses a computer as its primary means
Fig. : 4
of commission and theft. The U.S. Department of
 Cyber bulls: Cyber bullying is any
Justice expands the definition of cyber crime to
harassment that occurs via the Internet.
include any illegal activity that uses a computer
Vicious forum posts, name calling in chat
for the storage of evidence.
rooms, posting fake profiles on web sites,
and mean or cruel email messages are all  98% of companies are maintaining or
ways of cyber bullying. increasing their cyber security resources
and of those, half are increasing resources
devoted to online attacks this year
 Only one-third are completely confident in
the security of their information and even
less confident about the security measures
Fig. : 5 of their business partners.

 Salami attackers: Those attacks are used


for the commission of financial crimes.
The key here is to make the alteration so
insignificant that in a single case it would
go completely unnoticed e.g. a bank
Fig. : 7
employee inserts program into bank‘s
servers, which deducts a small amount Table 1. Estimated daily cybercrime activity

from the account of every customer.


Cybercrime Estimated
Daily Activity
Malicious scans 80 billion
New malware 300,000
Phishing 33,000
Fig. : 6 Ransomware 4,000
4

3. CYBER ATTACKS : criminals would continue to target social media

A cyber attack is deliberate sites to steal personal data

exploitation of computer systems, Table 2:


technology-dependent enterprises and
networks. Cyber attacks use malicious Incidents Jan-June Jan-June %Increase/

code to alter computer code, logic or data, 2012 2013 (decrease)

resulting in disruptive consequences that Fraud 2439 2490 2

can compromise data and lead to Intrusion 2203 1726 (22)

cybercrimes, such as information and Spam 291 641 111

identity theft. Malicious 353 442 25


code

 Denial of Service attacks. Cyber 173 233 35


 Snipping attacks. Harassment
 Spoofing attack. Content 10 42 320
 Backdoor attack. Related
 Man-In-Middle attack. Intrusions 55 24 (56)
 Stolen e-mail addresses and login Attempts
credentials. Denial Of 12 10 (17)
Services
Vulnerability 45 11 (76)
reports
Total 5581 5592

The above Comparison of Cyber Security


Fig. : 8
Incidents reported to Cyber999 in Malaysia from
4. CYBER SECURITY: January–June 2012 and 2013 clearly exhibits the
cyber security threats. As crime is increasing even
Social networking sites provide a space
the security measures are also increasing.
where users feel safe as they interact with friends
and family. In the case of home users, cyber-
5

5. SECURITY ETHICS: and social networking services. There are some


common features:
A security professional is faced with
ethical dilemmas every day. He or she is then  Social media are interactive Web 2.0
expected to make ethical decisions. In order to Internet-based applications.
comprehend this vast responsibility, one must  User-generated content, such as text posts
learn the theoretical background of ethics. or comments, digital photos or videos, and
data generated through all online
interactions, is the lifeblood of social
media.
 Users create service-specific profiles for
the website or app that are designed and
Fig. : 9 maintained by the social media
 Codes of Ethics organization.
The Security Officer Code of Ethics  Social media facilitate the development of
includes ten key elements. These include: online social networks by connecting a
Respond to employer’s professional needs, user's profile with those of other
exhibit exemplary conduct, protect individuals or groups.
confidential information, maintain a safe
and secure workplace, dress to create
professionalism, enforce all lawful rules
and regulations, encourage liaison with
public officers, develop good rapport
within the profession, strive to attain.
Fig. : 11
6. SOCIAL MEDIA:
Most popular social networks:
Social media are interactive computer-mediated
The following list of the leading social
technologies that facilitate the creation and
networks shows the number of active users as of
sharing of information, ideas, career interests and
July 2018.
other forms of expression via virtual communities
6

 Face book: 2,196,000,000 users was popularized with “Amazon.com” releasing


its Elastic Compute Cloud product in
2006, references to the phrase "cloud computing"
appeared as early as 1996.

 YouTube: 1,900,000,000 users

Fig. : 12
 WhatsApp: 1,500,000,000 users
8. ANDROID:

Android is a mobile operating


system developed by Google, based on a modified
version of the Linux Kernel and other open source
 Instagram: 1,000,000,000 users
software and designed primarily for touch
screen mobile devices such as smart phones and
tablets. Initially developed by Android Inc., which
Google bought in 2005, Android was unveiled in
 Twitter: 336,000,000 users 2007, with the first commercial android
device launched in September 2008. The core
Android source code is known as Android Open
Source Project (AOSP), and is primarily licensed
under the Apache License.

7. CLOUD COMPUTING:

The “cloud” in cloud computing originated from


the habit of drawing the internet as a fluffy cloud Fig. : 13
in network diagrams. The term "cloud computing"
7

9. CONTENTS: Emerging technologies will greatly assist


in concealing the origin of ill-gotten gains.
 Types of Cyber Crime
The development of informal banking
 Impact of Cyber Crime institutions and parallel banking systems

 Computer Crimes may permit central bank supervision to be

 Laws Applicable for Cyber Crimes bypassed, but can also facilitate the

 Trends changing cyber security evasion of cash transaction reporting

 Security Approaches requirements in those nations which have

 Techniques for Cyber Security them.

 Future Preventions against Cyber  Electronic Vandalism, Terrorism and


Crime Extortion

As never before, western industrial


9.1. Types of Cyber Crime:
society is dependent upon complex data
 Theft of Telecommunications Services processing and telecommunications
systems. Damage to, or interference with,
The "phone phreakers" of three
any of these systems can lead to
decades ago set a precedent for what has
catastrophic consequences. Whether
become a major criminal industry. By
motivated by curiosity or vindictiveness
gaining access to an organization’s
electronic intruders cause inconvenience at
telephone switchboard (PBX) individuals
best, and have the potential for inflicting
or criminal organizations can obtain access
massive harm.
to dial-in/dial-out circuits and then make
their own calls or sell call time to third 9.2. Impacts of Cyber Crime:
parties.
 Impact of Cyber Crime over Socio-Eco-
 Electronic Money Laundering and Tax Political Riders
Evasion Conceptually, crime is a dynamic
and relative phenomenon and subjected to
For some time now, electronic the relative sociopolitical & economical
funds transfers have assisted in concealing changes occurring in existing system of
and in moving the proceeds of crime. society. With its dynamicity, it is
8

influenced by the changes occurring in the commonly misuse this knowledge for
correlated phenomenon and value system devious reasons.
generated by these changes. a) SQL Injections: An SQL injection
is a technique that allows hackers
 Impact of Cyber Crime over Teenager to play upon the security
These days a worst fear in vulnerabilities of the software that
teenager’s eyes is Cyber Bullying. It is runs a web site. It can be used to
become common over past five years, attack any type of unprotected or
generally from the age below eighteen are improperly protected SQL
more susceptible and feared from Cyber database.
Bullying as per inspection. It is becoming 2. Theft of FTP Passwords: This is another
an alarming trend in our society. very common way to tamper with web
sites. FTP password hacking takes
9.3 Computer Crimes:
advantage of the fact that many
In order to protect yourself you need to webmasters store their website login
know about the different ways in which your information on their poorly protected PCs.
computer can be compromised and your privacy The thief searches the victim’s system for
infringed. This isn’t an exhaustive list by any FTP login details, and then relays them to
means, but will give you a comprehensive idea of his own remote computer.
the loopholes in networks and security systems, 3. Logic bombs
which can be exploited by attackers, and also their A logic bomb, also known as “slag
possible motives for doing so. code”, is a malicious piece of code which
is intentionally inserted into software to
1. Hacking
execute a malicious task when triggered
In simple words, hacking is an act
by a specific event. It’s not a virus,
committed by an intruder by accessing
although it usually behaves in a similar
your computer system without your
manner. It is stealthily inserted into the
permission. Hackers (the people doing the
program where it lies dormant until
‘hacking’) are basically computer
specified conditions are met.
programmers, who have an advanced
understanding of computers and
4. Denial-of-Service attack
9

A Denial-of-Service (DoS) attack Web jacking derives its name from


is an explicit attempt by attackers to deny “hijacking”. Here, the hacker takes control
service to intended users of that service. of a web site fraudulently. He may change
Another variation to a denial-of-service the content of the original site or even
attack is known as a “Distributed Denial of redirect the user to another fake similar
Service” (DDoS) attack wherein a number looking page controlled by him. The
of geographically widespread perpetrators owner of the web site has no more control
flood the network traffic. Websites of and the attacker may use the web site for
companies such as Amazon, CNN, Yahoo, his own selfish interests.
Twitter and eBay! Are not spared either. 8. Cyber stalking
Cyber stalking is a new form of
5. Phishing internet crime in our society when a
This technique of extracting person is pursued or followed online. A
confidential information such as credit cyber stalker doesn’t physically follow his
card numbers and username password victim; he does it virtually by following
combos by masquerading as a legitimate his online activity to harvest information
enterprise. Phishing is typically carried out about the stalkee and harass him or her
by email spoofing. You’ve probably and make threats using verbal
received email containing links to intimidation.
legitimate appearing websites.
9.4. Laws Applicable for Cyber Crimes
6. Email bombing and spamming
Email bombing is characterized by
 India :
an abuser sending huge volumes of email
to a target address resulting in victim’s  INFORMATION TECHNOLOGY
email account or mail servers crashing. ACT 2000 Online
The message is meaningless and
excessively long in order to consume  United States :

network resources. Such mail arriving


 Access Device Fraud. 18 U.S.C. §
frequently in your inbox can be easily
1029. Fraud and related activity in
detected by spam filters.
connection with access devices.
7. Web jacking
10

 Computer Fraud and Abuse Act. 9.5. TRENDS CHANGING CYBER


18 U.S.C. § 1030--Fraud and SECURITY:
related activity in connection with
Here mentioned below are some of the
computers.
trends that are having a huge impact on cyber
 CAN-SPAM ACT. 15 U.S.C. §
security.
7704. Controlling the Assault of
Non-Solicited Pornography and  Web servers: The threat of attacks on
Marketing Act of 2003. web applications to extract data or to
distribute malicious code persists. Cyber
 Canada : criminals distribute their malicious code
via legitimate web servers they’ve
 Criminal Code of Canada, Section
compromised. But data-stealing attacks,
342.1.Unauthorized Use of
many of which get the attention of media,
Computer.
are also a big threat. Web servers are
 Criminal Code of Canada, Section
especially the best platform for these cyber
184. Interception of
criminals to steal the data.
Communications.
 APT’s and targeted attacks: APT
 Malaysia : (Advanced Persistent Threat) is a whole
new level of cyber crime ware. As
 Computer Crimes Act 1997 (Act attackers grow bolder and employ more
563) vague techniques, network security must
integrate with other security services in
 Pakistan :
order to detect attacks

 Prevention of Electronic Crimes  Mobile Networks: Today we are able to

Ordinance 200 connect to anyone in any part of the world.

 Electronic Transactions Ordinance But for these mobile networks security is a

2002 very big concern. These days’ firewalls


and other security measures are becoming
 Singapore : porous as people are using devices such as
tablets, phones, PC’s etc all of which again
 Computer Misuse Act 1993
11

require extra securities apart from those Here are several approaches to security in
present in the applications used. computing; sometimes a combination of
 IPv6: New internet protocol IPv6 is the approaches is valid:
new Internet protocol which is replacing  Trust all the software to abide by a
IPv4 (the older version), which has been a security policy but the software is not
backbone of our networks in general and trustworthy (this is computer
the Internet at large. insecurity).
 Encryption of the code: Encryption is  Trust all the software to abide by a
the process of encoding messages in such security policy and the software is
a way that eavesdroppers or hackers validated as trustworthy (by tedious
cannot read it... In an encryption scheme, branch and path analysis for example).
the message or information is encrypted  Trust no software but enforce a
using an encryption algorithm, turning it security policy with mechanisms that
into an unreadable cipher text. This is are not trustworthy (again this is
usually done with the use of an encryption computer insecurity).
key, which specifies how the message is to  Trust no software but enforce a
be encoded. security policy with trustworthy
mechanisms.
9.6. Security Approaches:

 Crime Security: Computer security is a


HARDWARE MECHANISMS THAT
branch of technology known as
PROTECT COMPUTERS AND DATA:
information security as applied to
computers and networks. The objective of Hardware based or assisted computer security
computer security includes protection of offers an alternative to software-only computer
information and property from theft, security. Devices such as dongles may be
corruption, or natural disaster, while considered more secure due to the physical access
allowing the information and property to required in order to be compromised. Hardware-
remain accessible and productive to its based security solutions can prevent read and
intended users. write access to data and hence offers very strong

 Some Approaches: protection against tampering.

SECURE OPERATING SYSTEMS:


12

One use of the term computer security refers to software that are often grouped together
technology to implement a secure operating and referred to as malware.
system. Much of this technology is based on  Firewalls: A firewall is a software
science developed in the 1980s and used to program or piece of hardware that helps
produce what may be some of the most screen out hackers, viruses, and worms
impenetrable operating systems ever. that try to reach your computer over
Internet.
9.7. Techniques for Cyber Security:

 Access control and password security:


The concept of user name and password
has been fundamental way of protecting
our information. This may be one of the
first measures regarding cyber security. Fig. : 15

 Anti-virus software: Antivirus software


is a computer program that detects,
prevents, and takes action to disarm or
remove malicious software programs, such
Fig. : 14
as viruses and worms.
 Authentication of data : The documents
9.8. Future Prevention against Cyber Crime:
that we receive must always be
authenticated be before downloading that In honor of National Cyber Security
is it should be checked if it has originated Awareness Month, (NCSAM) here are some
from a trusted and a reliable source and measures you can take to protect yourself from
that they are not altered. online criminals.
 Malware scanners: This is software that
 Create Strong Passwords – Create
usually scans all the files and documents
passwords with eight characters or more
present in the system for malicious code or
and that use combinations of letters,
harmful viruses. Viruses, worms, and
numbers, and symbols.
Trojan horses are examples of malicious
13

 Keep Private Information Private – in order to have a safe and secure future in cyber
Keep social security numbers, account space. Computer security is critical in almost any
numbers, and passwords private, as well as technology-driven industry which operates on
specific information about yourself, such computer systems. Computer security can also be
as your full name and date of birth. referred to as computer safety. The issues of
 Lock Your Computer – Lock your computer based systems and addressing their
computer and smart phones when not in countless vulnerabilities are an integral part of
use. maintaining an operational industry.
 Protect Your Computer – Be cautious
about opening attachments or clicking on
links in emails and remember that free 11. REFERENCES:
apps (games, ringtones, and screen savers)
LINKS:
can hide viruses or spam.
 Own You’re Online Presence – Always 1. http://paperpresentationtopicsandpapers.bl
use privacy settings on social networking ogspot.com/2010/01/cyber-crime-and-
websites. security.html
2. https://arxiv.org/ftp/arxiv/papers/1402/140
10. CONCLUSION :
2.1842.pdf

Cyber crime continues to diverge down 3. https://www.slideshare.net/aemankhan/cybe

different paths with each New Year that passes rcrimeppt-27376284

and so does the security of the information. The 4. https://www.ijera.com/papers/Vol2_issue2

latest and disruptive technologies, along with the /AG22202209.pdf


5. https://www.digit.in/technology-
new cyber tools and threats that come to light
guides/fasttrack-to-cyber-crime/the-12-types-
each day, are challenging organizations with not
of-cyber-crime.html
only how they secure their infrastructure, but how
6. http://www.norse-corp.com/
they require new platforms and intelligence to do
so. There is no perfect solution for cyber crimes
but we should try our level best to minimize them

You might also like