Unit-1
Introduction to Cybercrime: Introduction, Cybercrime: Definition and Origins of the Word, Cybercrime
and Information Security, Cybercriminals, Classifications of Cybercrime, Cyberstalking, Cybercafe and
Cybercrimes, Botnets. Attack Vector, Proliferation of Mobile and Wireless Devices, Security Challenges
Posed by Mobile Devices, Attacks on Mobile/CellPhones, Network and Computer Attacks
1. Introduction to Cybercrime: Cybercrime refers to criminal activities carried
out using computers, digital devices, networks, or the internet. With the advancement of
information technology, many traditional crimes have shifted from physical space to
cyberspace.
Earlier, crimes were limited to physical acts such as theft or fraud. Today, criminals can commit
crimes remotely using computers, affecting victims across the world within seconds.
Key Characteristics
Crime occurs in virtual space
Criminal and victim may be in different countries
Difficult to identify and catch offenders
Requires technical knowledge to investigate
Examples
Online banking fraud
Social media account hacking
Spreading malware through emails
2. Cybercrime: Definition and Origins of the Word:Cybercrime is any illegal activity in
which a computer or network is used as:
1. A tool (to commit the crime)
2. A target (system or data attacked)
3. A place (crime occurs in cyberspace)
Origin of the Term
The word “Cyber” is derived from Cybernetics, meaning control and communication in
machines.
The term cybercrime became popular in the 1990s with the rise of the internet and
digital communication.
Examples
Using a computer to send phishing emails (tool)
Hacking a website (target)
Online gambling fraud (place)
3. Cybercrime and Information Security: Information Security (InfoSec) is concerned with
protecting data and information systems from cyber threats. Cybercrime occurs when
information security controls fail or are weak.
Objectives of Information Security (CIA Triad):
1. Confidentiality
o Ensures that information is accessible only to authorized users
o Achieved through passwords and encryption
2. Integrity
o Ensures data is accurate and not modified by unauthorized persons
o Achieved through checksums and access controls
3. Availability
o Ensures information is available when needed
o Achieved through backups and secure networks
Example
Altering marks in a college database violates Integrity
Website crash due to DDoS attack affects Availability
4. Cybercriminals: Cybercriminals are individuals or organized groups who commit
cybercrimes for financial gain, revenge, political motives, or fun.
Types of Cybercriminals
1. Hackers
o Gain unauthorized access to systems
2. Crackers
o Malicious hackers who cause damage or steal data
3. Script Kiddies
o Beginners using ready-made hacking tools
4. Insiders
o Employees misusing authorized access
5. Cyber Terrorists
o Attack government and critical infrastructure
Example
An employee stealing customer data and selling it online
5. Classification of Cybercrime: Cybercrimes can be classified based on the target or
victim.
1. Crimes Against Individuals
Email spoofing
Cyberstalking
Online harassment
Identity theft
Example: Creating a fake social media profile to defame a person
2. Crimes Against Property
Data theft
Intellectual property theft
Malware attacks
Example: Stealing software source code
3. Crimes Against Organizations
Denial of Service (DoS) attacks
Website defacement
Corporate espionage
Example: Bringing down an e-commerce website
4. Crimes Against Government
Cyber terrorism
Attacks on military systems
Espionage
Example: Hacking a government website
6.Cyberstalking: Cyberstalking is the use of electronic communication to repeatedly harass,
threaten, or monitor a person.
Features
Continuous behavior
Causes fear and mental stress
Violates privacy
Methods
Sending threatening emails or messages
Fake profiles on social media
Tracking online activities
Example
Repeated threatening WhatsApp messages
7. Cybercafé and Cybercrimes: Cybercafés provide public internet access and are often used
for cybercrimes due to anonymous access.
Reasons for Misuse
No proper identity verification
Shared computers
Lack of monitoring
Common Crimes
Phishing
Email fraud
Accessing illegal content
Example
Sending scam emails from a cybercafé to avoid tracing
8. Botnets:A Botnet is a network of compromised computers called bots, controlled by a central
attacker known as the Botmaster.
Working
Malware infects systems
Infected systems become bots
Botmaster controls them remotely
Uses
Distributed Denial of Service (DDoS)
Sending spam emails
Stealing sensitive data
Example
Thousands of infected computers attacking a bank server
9. Attack Vector: An attack vector is the method or path used by attackers to gain unauthorized
access to a system.
Common Attack Vectors
Phishing emails
Malicious websites
Infected USB drives
Weak passwords
Example
Clicking on a fake bank email link that installs malware
10. Proliferation of Mobile and Wireless Devices: The rapid growth of mobile devices and
wireless technologies has increased cybercrime risks.
Reasons
Devices are always connected
Store personal and financial data
Use public networks
Example
Mobile banking through public Wi-Fi
11. Security Challenges Posed by Mobile Devices: Mobile devices face several security
challenges due to portability and connectivity.
Challenges
Loss or theft of devices
Malicious applications
Unsecured Wi