Professional Documents
Culture Documents
that includes a computer and a network. The computer may have been used in the execution of a
crime or it may be the target. Cybercrime is the use of a computer as a weapon for committing
crimes such as committing fraud, identity theft, or breaching privacy. Cybercrime, especially
through the Internet, has grown in importance as the computer has become central to every field
like commerce, entertainment, and government. Cybercrime may endanger a person or a nation’s
security and financial health. Cybercrime encloses a wide range of activities, but these can
generally be divided into two categories:
1. Crimes that aim at computer networks or devices. These types of crimes involve different
threats (like virus, bugs etc.) and denial-of-service (DoS) attacks.
2. Crimes that use computer networks to commit other criminal activities. These types of crimes
include cyber stalking, financial fraud or identity theft.
2. Cyber Extortion –
Cyber extortion occurs when a website, e-mail server or computer system
is subjected to or threatened with repeated denial of service or other attacks by malicious
hackers. These hackers demand huge money in return for assurance to stop the attacks and to
offer protection.
3. Cyber Warfare –
Cyber warfare is the use or targeting in a battle space or warfare context of
computers, online control systems and networks. It involves both offensive and defensive
operations concerning to the threat of cyber attacks, espionage and sabotage.
4. Internet Fraud –
Internet fraud is a type of fraud or deceit which makes use of the Internet
and could include hiding of information or providing incorrect information for the purpose of
deceiving victims for money or property. Internet fraud is not considered a single, distinctive
crime but covers a range of illegal and illicit actions that are committed in cyberspace .
5. Cyber Stalking –
This is a kind of online harassment wherein the victim is subjected to a
barrage of online messages and emails. In this case, these stalkers know their victims and
instead of offline stalking, they use the Internet to stalk. However, if they notice that cyber
stalking is not having the desired effect, they begin offline stalking along with cyber stalking to
make the victims’ lives more miserable.
Challenges of Cyber Crime:
1. People are unaware of their cyber rights-
The Cybercrime usually happen with illiterate
people around the world who are unaware about their cyber rights implemented by the
government of that particular country.
2. Anonymity-
Those who Commit cyber crimes are anonymous for us so we cannot do
anything to that person.
5. No harsh punishment-
In Cyber crime there is no harsh punishment in every case. But there
is harsh punishment in some cases like when somebody commits cyber terrorism in that case
there is harsh punishment for that individual. But in other cases there is no harsh punishment
so this factor also gives encouragement to that person who commits cyber crime.
S.
No. Spoofing Phishing
It is operated in a fraudulent
2. It doesn’t require fraud.
manner.
Examples-
Examples- Emails containing these type of
Hacking of a complete website by modifying terms:
8. its IP Address. Click Here
A banking website appears to be legitimate Verify your personal
but it is used to gather sensitive information information
from user and many more. Payment Failed
Tax Refunds
The best and common way to stop a The best and common way
spoofing attack- to stop a phishing attack-
Ensure the destination of the link received via Be wary of grammatical flaws
emails by hovering over the link before in the communication’s
9. clicking on it. content.
Delete strange emails like unprofessional Keep a check on spelling
emails, alarming messages, misspellings in the mistakes in an email.
message body, etc. Check for the phrase
Open the attached documents or any other structure and unusual
type of attachment from reliable source only. sentence phrasing.
Spamming: - Spam is a form of email which is used to send to different email accounts and
in general contains advertising about any product or services. But the real problem is when they contain
malwares that can damage the user’s data.
Generally, they are sent to a massive list of emails for the mail purpose that a small percentage of users
might open them and respond. They are used to such treatment because they are cheap in infrastructure
investment, not too much time consuming and simple.
Domain Spoofing − the spammer sends an email on behalf of a known domain so the receivers
think that they know this person and open it.
Poisoning Filters − A filter can be poisoned by adding text with the same color of the background
to reduce the scoring of the filters.
Directory Harvesting − In directory harvesting, spammers generate email addresses by using
known email addresses from corporate or ISP (Internet Service Provider).
Social Engineering − Spammers send promotional emails to different users such as offering huge
discounts and tricking them to fill their personal data.
Junk Tags − Spam Words can be hidden by including invalid HTML tags within the words.
Invalid words − Special characters are inserted in the spam words. For example: V!AGRA.
Anti–Spam Techniques:-
In this section, we will discuss various anti-spam techniques and their advantages.
Signature Based Content Filtering − Most anti-spam email companies use this type of filtering
because it checks the received email with certain patterns after saving the message to the disk.
Naive Bayes Spam Filtering − Bayesian filter scans the context of the e-mail when it looks for
words or character strings that will identify the e-mail as spam.
Black Listing RBL − This is a type of database that updates the IP address and domains based on a
reputation and the system administrators who use these RBL don’t receive email from domains that
are blacklisted from this RBL.
Sender Policy Framework − The IP address of the domain of the sender is compared with the
genuine list of the IP addresses that the domain should have and if it is not same, then that email is
dropped.
Hacking the username and password of ISP of an individual and surfing the internet at his cost is
Internet Time Theft.
OR
It refers to the theft in a manner where the unauthorized person uses internet hours paid by
another person. The authorized person gets access to another person’s ISP user ID and
password, either by hacking or by illegal means without that person’s knowledge.
Salami attack:- A salami attack is a method of cybercrime that attackers or a hacker
typically used to commit financial crimes. Cybercriminals steal money or resources from
financial accounts on a system one at a time. This attack occurs when several minor attacks
combine to create a sturdy attack. Because of this sort of cybercrime, these attacks frequently
go undetected. Salami attacks are used for the commission of economic crimes. Those who
are found guilty of such an attack face punishment under Section 66 of the IT Act .