Module-1a Cyber Sec
Module-1a Cyber Sec
Module-1a Cyber Sec
BETCK105I
Emerging Technology Course (ETC)
Dr. GURURAJ K S
hodise@gsss.edu.in
Expectation and Commitment
MODULE -1
INTRODUCTION TO CYBER CRIME
Cyber Crime
Criminal activities carried out by means of computer/internet(network) i.e
it may be a tool or target A crime conducted in which a computer was
directly and significantly instrumental is known as “Computer Crime.
MODULE -1
INTRODUCTION TO CYBER CRIME
A crime committed using a computer and the Internet to steal
person’s identity or sell illegal or smuggled goods or disturb any
operations with malicious program is known as “Cyber Crime”
Cyberspace
Cyber terrorism
Cyber terrorism is defined as “any person, group or organization who with
terrorist intent, utilizes, accesses or aids in accessing a computer or computer
network or electronic system or electronic device by any available means and there
by knowingly engages in a terrorist act.
Classification of Cyber Attacks
Cybercrime and Information Security
damage / theft
CLASSIFICATION OF CYBER CRIMES
• Email Spoofing, Phishing, Spamming, Cyber Defamation
• Forgery
Disadvantage of piracy
• The software, if pirated, may potentially contain hard-drive infection virus.
• There is no technical support in the case of software failure.
• There is no warranty protection
• There is no legal right to use the product.
1. August 4, 2006 Announcement: The US Senate ratifies CoE Convention on Cyber Crime. The convention
targets hackers, those spreading destructive computer viruses, those using the Internet for the sexual
exploitation of children or the distribution of racist material, and terrorists attempting to attack
infrastructure facilities or financial institutions. The Convention is in full accord with all the US
constitutional protections, such as free speech and other civil liberties, and will require no change to the
US laws.
2. In August 18, 2006: News article published “ISPs Wary About ‘Drastic Obligations’ on Web Site
Blocking.” European Union (EU) officials want to debar suspicious websites as part of a 6-point plan to
boost joint antiterrorism activities. They want to block websites that incite terrorist action. Once again it
is underlined that monitoring calls, Internet and E-Mail traffic for law enforcement purposes is a task
vested in the government, which must reimburse carriers and providers for retaining the data.
3. CoE Cyber Crime Convention (1997–2001) : First international treaty seeking to address Internet crimes
by harmonizing national laws, improving investigative techniques and increasing cooperation among
nations. More than 40 countries have ratified the Convention to date.
Cyber Crime : Extended Enterprise
Core
Competencies
Perseverance Prevention
Preservation Protection
Cyber Crime : Extended Enterprise
Kaspersky Spam and Phishing in 2021
What you’ve learned
1 Definition of Cyber
Security? 2 Cyber Crime and
Information Security
3 Classification of
Cyber Criminals 4 Classification of
Cyber Crimes
5 Cyber Laws :
Indian Perspective 6 Cyber Laws :
Global Perspective
7 Extended Enterprise
and 5 P’s