You are on page 1of 6

Topic 1 - Cyber crime

Cybercrime or a computer-oriented crime is a crime that includes a computer and a


network. The computer may have been used in the execution of a crime or it may be the
target. Cybercrime is the use of a computer as a weapon for committing crimes such as
committing fraud, identity theft, or breaching privacy. Cybercrime, especially through
the Internet, has grown in importance as the computer has become central to every field
like commerce, entertainment, and government. Cybercrime may endanger a person or a
nation’s security and financial health. Cybercrime encloses a wide range of activities,
but these can generally be divided into two categories:
1. Crimes that aim at computer networks or devices. These types of crimes
involve different threats (like virus, bugs etc.) and denial-of-service (DoS)
attacks.
2. Crimes that use computer networks to commit other criminal activities. These
types of crimes include cyber stalking, financial fraud or identity theft.
Classification of Cyber Crime:
1. Cyber Terrorism –
Cyber terrorism is the use of the computer and internet to perform violent acts
that result in loss of life. This may include different type of activities either
by software or hardware for threatening life of citizens.
In general, Cyber terrorism can be defined as an act of terrorism committed
through the use of cyberspace or computer resources.

2. Cyber Extortion –
Cyber extortion occurs when a website, e-mail server or computer system is
subjected to or threatened with repeated denial of service or other attacks by
malicious hackers. These hackers demand huge money in return for assurance
to stop the attacks and to offer protection.

3. Cyber Warfare –
Cyber warfare is the use or targeting in a battle space or warfare context of
computers, online control systems and networks. It involves both offensive
and defensive operations concerning to the threat of cyber attacks, espionage
and sabotage.

4. Internet Fraud –
Internet fraud is a type of fraud or deceit which makes use of the Internet and
could include hiding of information or providing incorrect information for the
purpose of deceiving victims for money or property. Internet fraud is not
considered a single, distinctive crime but covers a range of illegal and illicit
actions that are committed in cyberspace.
5. Cyber Stalking –
This is a kind of online harassment wherein the victim is subjected to a
barrage of online messages and emails. In this case, these stalkers know their
victims and instead of offline stalking, they use the Internet to stalk.
However, if they notice that cyber stalking is not having the desired effect,
they begin offline stalking along with cyber stalking to make the victims’
lives more miserable.

Challenges of Cyber Crime:

1. People are unaware of their cyber rights-


The Cybercrime usually happen with illiterate people around the world who
are unaware about their cyber rights implemented by the government of that
particular country.

2. Anonymity-
Those who Commit cyber crime are anonymous for us so we cannot do
anything to that person.

3. Less numbers of case registered-


Every country in the world faces the challenge of cyber crime and the rate of
cyber crime is increasing day by day because the people who even don’t
register a case of cyber crime and this is major challenge for us as well as for
authorities as well.

4. Mostly committed by well educated people-


Committing a cyber crime is not a cup of tea for every individual. The person
who commits cyber crime is a very technical person so he knows how to
commit the crime and not get caught by the authorities.

5. No harsh punishment-
In Cyber crime there is no harsh punishment in every cases. But there is harsh
punishment in some cases like when somebody commits cyber terrorism in
that case there is harsh punishment for that individual. But in other cases
there is no harsh punishment so this factor also gives encouragement to that
person who commits cyber crime.

Topic 2 – Threat to internet security


The internet has become an essential part of our daily lives, allowing
us to connect with friends and family, work remotely, and access a
wealth of information. However, with this convenience comes the risk
of cyber threats. Internet security threats are on the rise, and it's
crucial to be aware of the most common ones to protect yourself and
your personal information online.

Malware

Malware is a type of software designed to damage, disrupt, or gain


unauthorized access to a computer system. There are different types
of malware, such as viruses, worms, and Trojan horses. Some common
examples of malware attacks include ransomware, where attackers
encrypt the victim's files and demand a ransom in exchange for the
decryption key, and spyware, which can monitor a user's online activity
and steal personal information.

Phishing

Phishing is a type of social engineering attack where attackers send


fraudulent messages or emails, often impersonating a trustworthy
source, to trick the recipient into giving up sensitive information such
as login credentials or financial information. Common types of
phishing attacks include spear phishing, where the attacker targets a
specific individual or organization, and whaling, where the attacker
targets high-level executives or other important individuals.

Social Engineering

Social engineering is a tactic used by attackers to manipulate


individuals into divulging confidential information. This can include
tactics such as pretexting, where the attacker creates a scenario to
gain the victim's trust, or baiting, where the attacker offers a tempting
reward to the victim in exchange for information. Social engineering
attacks can be difficult to detect, as they rely on human interaction
rather than technical vulnerabilities.

Password Attacks

Password attacks are a common way for attackers to gain


unauthorized access to a system or account. These attacks can take
various forms, such as brute-force attacks, where attackers try every
possible combination of characters until they find the correct
password, or dictionary attacks, where attackers use a list of commonly
used passwords. Attackers can also use social engineering tactics, such
as phishing, to obtain a victim's password.

Denial-of-Service Attacks

A denial-of-service (DoS) attack is a type of cyber attack where the


attacker floods a network or system with traffic, making it unavailable
to users. This can be achieved through various means, such as
overloading the system with requests or exploiting vulnerabilities in
the system. Distributed denial-of-service (DDoS) attacks, where
multiple systems are used to attack a single target, are also common.

Man-in-the-Middle Attacks

A man-in-the-middle (MitM) attack is a type of attack where the


attacker intercepts communication between two parties, allowing
them to eavesdrop or even modify the communication. This can occur
in various scenarios, such as in public Wi-Fi networks, where the
attacker can intercept the victim's internet traffic.
Ransomware

Ransomware is a type of malware that encrypts a victim's files and


demands a ransom in exchange for the decryption key. Ransomware
attacks can be devastating, as they can result in the loss of important
data or financial loss. Common methods of ransomware distribution
include phishing emails or exploiting vulnerabilities in software.

In conclusion, internet security threats are a significant concern in


today's digital age. By being aware of the common threats and taking
steps to protect oneself online, such as using strong passwords and
avoiding suspicious links or emails, individuals can minimize their risk
of falling victim to cyber attacks.

Topic 3 – Computer Related offences


CLASSIFICATION OF CYBER OFFENCES
The increased rate of technology in computers has led to the enactment
of Information Technology Act 2000. The converting of the paperwork into
electronic records, the storage of the electronic data, has tremendously changed the
scenario of the country.[xiii]
Offenses: Cyber offenses are the unlawful acts which are carried in a very
sophisticated manner in which either the computer is the tool or target or both.
Cybercrime usually includes:
(a) Unauthorized access of the computers (b) Data diddling (c) Virus/worms attack (d)
Theft of computer system (e) Hacking (f) Denial of attacks (g) Logic bombs (h)
Trojan attacks (i) Internet time theft (j) Web jacking (k) Email bombing (l) Salami
attacks (m) Physically damaging computer system.

The offenses included in the IT Act 2000 are as follows :


[xiv]

1. Tampering with the computer source documents.


2. Hacking with computer system.
3. Publishing of information which is obscene in electronic form.
4. Power of Controller to give directions
5. Directions of Controller to a subscriber to extend facilities to decrypt
information
6. Protected system
7. Penalty for misrepresentation
8. Penalty for breach of confidentiality and privacy
9. Penalty for publishing Digital Signature Certificate false in certain
particulars
10.Publication for fraudulent purpose
11.Act to apply for offense or contravention committed outside India
12.Confiscation
13.Penalties or confiscation not to interfere with other punishments.
14.Power to investigate offenses.

You might also like