0% found this document useful (0 votes)
31 views5 pages

CS Unit-1 Notes

The document provides an overview of cybercrime, defining it as criminal activities conducted through computers and networks, with characteristics such as occurring in virtual spaces and the difficulty of identifying offenders. It discusses various types of cybercriminals, classifications of cybercrime, and the security challenges posed by mobile devices. Key concepts include the importance of information security, attack vectors, and the role of cybercafés in facilitating cybercrime.

Uploaded by

althafsk739
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views5 pages

CS Unit-1 Notes

The document provides an overview of cybercrime, defining it as criminal activities conducted through computers and networks, with characteristics such as occurring in virtual spaces and the difficulty of identifying offenders. It discusses various types of cybercriminals, classifications of cybercrime, and the security challenges posed by mobile devices. Key concepts include the importance of information security, attack vectors, and the role of cybercafés in facilitating cybercrime.

Uploaded by

althafsk739
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Unit-1

Introduction to Cybercrime: Introduction, Cybercrime: Definition and Origins of the Word, Cybercrime
and Information Security, Cybercriminals, Classifications of Cybercrime, Cyberstalking, Cybercafe and
Cybercrimes, Botnets. Attack Vector, Proliferation of Mobile and Wireless Devices, Security Challenges
Posed by Mobile Devices, Attacks on Mobile/CellPhones, Network and Computer Attacks

1. Introduction to Cybercrime: Cybercrime refers to criminal activities carried


out using computers, digital devices, networks, or the internet. With the advancement of
information technology, many traditional crimes have shifted from physical space to
cyberspace.
Earlier, crimes were limited to physical acts such as theft or fraud. Today, criminals can commit
crimes remotely using computers, affecting victims across the world within seconds.
Key Characteristics
 Crime occurs in virtual space
 Criminal and victim may be in different countries
 Difficult to identify and catch offenders
 Requires technical knowledge to investigate
Examples
 Online banking fraud
 Social media account hacking
 Spreading malware through emails
2. Cybercrime: Definition and Origins of the Word:Cybercrime is any illegal activity in
which a computer or network is used as:
1. A tool (to commit the crime)
2. A target (system or data attacked)
3. A place (crime occurs in cyberspace)
Origin of the Term
 The word “Cyber” is derived from Cybernetics, meaning control and communication in
machines.
 The term cybercrime became popular in the 1990s with the rise of the internet and
digital communication.

Examples
 Using a computer to send phishing emails (tool)
 Hacking a website (target)
 Online gambling fraud (place)
3. Cybercrime and Information Security: Information Security (InfoSec) is concerned with
protecting data and information systems from cyber threats. Cybercrime occurs when
information security controls fail or are weak.
Objectives of Information Security (CIA Triad):
1. Confidentiality
o Ensures that information is accessible only to authorized users
o Achieved through passwords and encryption
2. Integrity
o Ensures data is accurate and not modified by unauthorized persons
o Achieved through checksums and access controls
3. Availability
o Ensures information is available when needed
o Achieved through backups and secure networks
Example
 Altering marks in a college database violates Integrity
 Website crash due to DDoS attack affects Availability

4. Cybercriminals: Cybercriminals are individuals or organized groups who commit


cybercrimes for financial gain, revenge, political motives, or fun.
Types of Cybercriminals
1. Hackers
o Gain unauthorized access to systems
2. Crackers
o Malicious hackers who cause damage or steal data
3. Script Kiddies
o Beginners using ready-made hacking tools
4. Insiders
o Employees misusing authorized access
5. Cyber Terrorists
o Attack government and critical infrastructure
Example
 An employee stealing customer data and selling it online
5. Classification of Cybercrime: Cybercrimes can be classified based on the target or
victim.
1. Crimes Against Individuals
 Email spoofing
 Cyberstalking
 Online harassment
 Identity theft
Example: Creating a fake social media profile to defame a person
2. Crimes Against Property
 Data theft
 Intellectual property theft
 Malware attacks
Example: Stealing software source code
3. Crimes Against Organizations
 Denial of Service (DoS) attacks
 Website defacement
 Corporate espionage
Example: Bringing down an e-commerce website
4. Crimes Against Government
 Cyber terrorism
 Attacks on military systems
 Espionage
Example: Hacking a government website

6.Cyberstalking: Cyberstalking is the use of electronic communication to repeatedly harass,


threaten, or monitor a person.
Features
 Continuous behavior
 Causes fear and mental stress
 Violates privacy
Methods
 Sending threatening emails or messages
 Fake profiles on social media
 Tracking online activities
Example
 Repeated threatening WhatsApp messages

7. Cybercafé and Cybercrimes: Cybercafés provide public internet access and are often used
for cybercrimes due to anonymous access.
Reasons for Misuse
 No proper identity verification
 Shared computers
 Lack of monitoring
Common Crimes
 Phishing
 Email fraud
 Accessing illegal content
Example
 Sending scam emails from a cybercafé to avoid tracing
8. Botnets:A Botnet is a network of compromised computers called bots, controlled by a central
attacker known as the Botmaster.
Working
 Malware infects systems
 Infected systems become bots
 Botmaster controls them remotely
Uses
 Distributed Denial of Service (DDoS)
 Sending spam emails
 Stealing sensitive data
Example
 Thousands of infected computers attacking a bank server
9. Attack Vector: An attack vector is the method or path used by attackers to gain unauthorized
access to a system.
Common Attack Vectors
 Phishing emails
 Malicious websites
 Infected USB drives
 Weak passwords
Example
 Clicking on a fake bank email link that installs malware

10. Proliferation of Mobile and Wireless Devices: The rapid growth of mobile devices and
wireless technologies has increased cybercrime risks.
Reasons
 Devices are always connected
 Store personal and financial data
 Use public networks
Example
 Mobile banking through public Wi-Fi
11. Security Challenges Posed by Mobile Devices: Mobile devices face several security
challenges due to portability and connectivity.
Challenges
 Loss or theft of devices
 Malicious applications
 Unsecured Wi

You might also like