unit 2-2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 7

Introduction to Computer Crime:

Computer crime, also known as cybercrime, refers to illegal activities that are carried out using
computers or computer networks.
It involves the use of technology to commit offenses, target individuals or organizations, and
exploit vulnerabilities in computer systems.
Computer crime encompasses a wide range of malicious activities, including hacking, identity
theft, phishing, malware distribution, online fraud, and intellectual property theft.
These crimes pose significant risks to individuals, businesses, and even governments, as they
can lead to financial losses, data breaches, privacy violations, and disruption of critical services.

Classification of Computer Crime:


Computer crimes can be classified into several categories based on the nature and intent of the
offense. Here are some common classifications:
1. Cyber Attacks: These involve unauthorized access, intrusion, or disruption of computer
systems. Examples include hacking, distributed denial-of-service (DDoS) attacks, and
malware infections.
2. Cyber Fraud: This category includes various forms of online fraud, such as identity theft,
phishing scams, credit card fraud, and online auction fraud. The aim is to deceive
individuals or organizations to gain financial benefits.
3. Cyber Espionage: Cyber espionage refers to the unauthorized gathering of confidential
or sensitive information from government entities, organizations, or individuals. This can
involve state-sponsored attacks, industrial espionage, or theft of intellectual property.
4. Cyber Terrorism: Cyber terrorism involves the use of technology to create fear, disrupt
critical infrastructure, or promote ideological agendas. Attacks on government systems,
financial institutions, or public utilities fall under this category.
5. Cyber Harassment and Cyberbullying: This category includes online harassment,
stalking, cyberbullying, and the distribution of offensive or defamatory content. These
crimes target individuals and can cause emotional distress and harm.
6. Cyber Exploitation: Cyber exploitation involves the creation, distribution, or possession of
explicit or illegal content, including child pornography, revenge porn, and human
trafficking facilitated through online platforms.
7. Cyber Financial Crimes: These crimes involve fraudulent activities targeting financial
institutions, online banking systems, or digital currencies. Examples include money
laundering, insider trading, and unauthorized access to financial accounts.
8. Cyber Privacy Violations: This category includes offenses related to the invasion of
privacy, such as unauthorized access to personal information, surveillance, or the
dissemination of private data without consent.
Classification of computer crime helps in understanding the different types of threats and
provides a framework for law enforcement agencies, organizations, and individuals to develop
preventive measures, detection techniques, and legal frameworks to combat these offenses and
protect against cyber threats.
Computer Virus:
1. A computer virus is a malicious program or code designed to infect and replicate itself on
computers and other electronic devices without the knowledge or consent of the user.
2. It attaches itself to legitimate files or software and spreads from one device to another,
often through email attachments, file downloads, infected websites, or removable
storage media.
3. Computer viruses can cause a range of harmful effects, including data loss, system
crashes, slow performance, unauthorized access, and theft of personal or sensitive
information.
4. Viruses can be classified into various types, such as file viruses, macro viruses, boot
sector viruses, and polymorphic viruses, each with its own method of propagation and
intended target.
5. Antivirus software plays a crucial role in detecting, preventing, and removing computer
viruses. It scans files, programs, and system memory to identify and eliminate known
viruses and prevent future infections.
6. To protect against computer viruses, it is important to practice safe computing habits,
such as regularly updating software, using strong passwords, being cautious of email
attachments and downloads, and avoiding suspicious websites or links.
7. The impact of computer viruses can be minimized through proactive measures like
regular data backups, network security protocols, and educating users about potential
threats and safe computing practices.
8. Cybercriminals often use computer viruses as a means to gain unauthorized access,
steal information, launch further attacks, or extort money from victims through
ransomware.
9. The evolution of technology and connectivity has given rise to more sophisticated and
complex viruses, making it crucial for individuals and organizations to stay vigilant and
employ robust security measures to protect against these threats.
10. Computer viruses have been a significant challenge in the digital world, necessitating
constant research, updates, and collaboration among security experts, software
developers, and users to stay ahead of evolving threats and safeguard digital
environments.

Types of Computer Viruses:


1. File Infectors: These viruses attach themselves to executable files, such as .exe or .com
files. When the infected file is executed, the virus activates and spreads to other files on
the system.
2. Macro Viruses: Macro viruses infect documents and spreadsheets that use macros, such
as Microsoft Word or Excel files. They can execute malicious actions when the infected
document is opened, often spreading to other documents.
3. Boot Sector Viruses: These viruses infect the boot sector of a computer's hard drive or
removable storage media. When the system is booted from an infected disk, the virus
loads into memory, allowing it to spread to other storage devices.
4. Polymorphic Viruses: Polymorphic viruses have the ability to change their code structure
or encryption methods to avoid detection by antivirus software. This makes them more
challenging to identify and eliminate.
5. Multipartite Viruses: Multipartite viruses infect both executable files and boot sectors.
They can spread through multiple means and are more complex in their infection
methods.
6. Worms: While technically not a virus, worms are self-replicating programs that spread
across computer networks without the need for human intervention. They exploit security
vulnerabilities and can cause significant damage by consuming network resources or
launching other malicious activities.
7. Logic Bombs: Logic bombs are viruses that lie dormant until a specific condition is met,
such as a particular date or a specific action. Once triggered, they can perform
destructive actions, such as deleting files or corrupting data.
8. Ransomware: Ransomware is a type of malware that encrypts a user's files, making
them inaccessible until a ransom is paid. It has become a prevalent and damaging form
of malware, often distributed through phishing emails or malicious downloads.
9. Spyware: Spyware is a type of malware that secretly gathers information about a user's
activities, such as browsing habits, keystrokes, or login credentials. This information is
then sent to a remote server without the user's knowledge or consent.
10. Adware: Adware is a type of malware that displays unwanted advertisements or redirects
users to advertising websites. While not necessarily harmful, it can be intrusive and
disruptive to the user's browsing experience.

1. Trojan Horse:
● A Trojan horse is a type of malicious software that disguises itself as legitimate or
desirable software, tricking users into installing or executing it.
● Once inside a system, the Trojan horse can perform various malicious activities,
such as stealing sensitive information, creating backdoors for remote access, or
damaging files and systems.
● Unlike viruses or worms, Trojan horses do not replicate themselves but rely on
user interaction to spread.
● They often enter systems through email attachments, software downloads, or
disguised links, and they can be challenging to detect without proper antivirus
protection.
● To prevent Trojan horse infections, it is important to be cautious when
downloading files, opening attachments, or clicking on suspicious links and to
regularly update and run antivirus software.

2. Trap Door:
● A trap door, also known as a backdoor, is a hidden entry point in a software
program or operating system that allows unauthorized access or bypasses
normal authentication mechanisms.
● Trap doors are intentionally inserted by developers for debugging purposes or to
provide authorized access for system administration.
● However, if a trap door is discovered or exploited by malicious actors, it can be
used to gain unauthorized control over a system, compromise security, or extract
sensitive information.
● Proper security measures, such as regular vulnerability scanning, code audits,
and access controls, can help detect and prevent unauthorized use of trap doors.
● Regular software updates and patches from vendors also help in closing known
trap doors and preventing potential exploitation.

3. Super Zapping:
● Super zapping refers to an unauthorized activity that bypasses normal security
measures to directly access or modify data in a computer system's storage.
● It involves using specialized tools or techniques to directly manipulate data at a
low level, bypassing normal application or system controls.
● Super zapping can be used for malicious purposes, such as unauthorized data
alteration, unauthorized access to sensitive information, or data theft.
● It is considered a serious security threat and can result in data corruption, loss, or
compromise.
● Implementing robust access controls, encryption, and regular monitoring can help
mitigate the risks associated with super zapping attacks.

4. Logic Bomb:
● A logic bomb is a type of malicious code or program that lies dormant until a
specific condition or trigger event occurs.
● Once triggered, the logic bomb executes a predefined action, such as deleting
files, corrupting data, or launching an attack.
● Logic bombs are often used by insiders or disgruntled employees as a means of
revenge or to cause damage to an organization.
● They can be difficult to detect as they may reside within seemingly legitimate
code or programs.
● Regular security audits, monitoring for unusual behavior, and strict access
controls can help identify and prevent logic bomb attacks.

5. Salami Logic:
● Salami logic, also known as salami slicing or penny shaving, refers to a
technique where small amounts of money or resources are fraudulently siphoned
off over a long period.
● In the context of computer systems, it involves manipulating or skimming tiny
increments of data or transactions to accumulate a significant gain over time.
● Salami logic is often used in financial fraud, where small amounts go unnoticed
or are considered negligible by victims or auditing systems.
● Preventing salami logic attacks requires robust security controls, regular
monitoring of transactions and data, and implementing anomaly detection
algorithms to identify suspicious patterns.
● Educating users about the risks and implementing strong authentication
measures can also help prevent unauthorized access and manipulation of
systems.

Characteristics of Computer Crime:


1. Use of Technology: Computer crimes involve the use of technology, specifically
computers, computer networks, and the internet. Criminals exploit vulnerabilities in
computer systems, networks, and software to carry out illegal activities.
2. Global Reach: Computer crimes can be committed from anywhere in the world,
transcending geographical boundaries. Attackers can target victims located in different
countries, making it challenging for law enforcement agencies to investigate and
prosecute these crimes.
3. Anonymity: Perpetrators of computer crimes can often remain anonymous or use false
identities. They can mask their IP addresses, use encryption techniques, or operate
through anonymizing networks, making it difficult to trace their activities back to them.
4. Complexity: Computer crimes can be highly sophisticated, requiring technical knowledge
and expertise. Attackers use advanced techniques, such as coding exploits, social
engineering, or encryption, to bypass security measures and gain unauthorized access
to systems or data.
5. Speed and Efficiency: Computer crimes can be executed quickly and efficiently, allowing
criminals to infiltrate systems, steal data, or launch attacks within seconds or minutes.
The speed of execution makes it challenging for victims to respond or detect the
intrusion in real-time.
6. Scale and Impact: Computer crimes have the potential to cause widespread damage,
affecting individuals, organizations, and even entire economies. They can lead to
financial losses, data breaches, privacy violations, disruption of critical services, or
reputational damage.
7. Constant Evolution: Computer crimes continuously evolve as technology advances.
Cybercriminals adapt their techniques to exploit new vulnerabilities, develop
sophisticated malware, and employ social engineering tactics to deceive users and gain
unauthorized access.
8. Collaboration and Networks: Cybercriminals often work in organized groups or
collaborate with others, sharing knowledge, tools, and resources. They may participate
in underground forums, dark web marketplaces, or hacker communities to exchange
information and coordinate attacks.
9. Motives: Computer crimes can be motivated by various factors, including financial gain,
political or ideological agendas, personal vendettas, espionage, or even curiosity. The
motivations behind computer crimes can vary widely, and understanding these motives
is crucial for combating and preventing such crimes.
10. Cross-border Jurisdiction: Computer crimes pose challenges in terms of jurisdiction and
legal frameworks. Perpetrators can operate from one country while targeting victims in
another, making it necessary for international cooperation and coordination among law
enforcement agencies to investigate and prosecute these crimes effectively.

Characteristics of Computer Criminals:


1. Technical Knowledge: Computer criminals typically possess a high level of technical
knowledge and expertise in areas such as computer programming, network security,
hacking techniques, and software vulnerabilities. They understand computer systems
and exploit weaknesses to carry out their illegal activities.
2. Malicious Intent: Computer criminals engage in illegal activities with the intention of
causing harm, whether it is financial gain, personal satisfaction, revenge, or disruption of
systems. They knowingly and intentionally violate laws and ethical norms to achieve their
goals.
3. Deception and Social Engineering: Computer criminals often employ deception and
social engineering techniques to manipulate individuals or exploit their trust. They may
use phishing emails, fake websites, or social media to deceive users and trick them into
revealing sensitive information or installing malware.
4. Adaptability: Computer criminals constantly adapt their methods and techniques to
bypass security measures and exploit new vulnerabilities. They stay updated with the
latest technologies, trends, and security systems to find new ways to infiltrate systems
and avoid detection.
5. Anonymity and Stealth: Computer criminals frequently operate under pseudonyms or
anonymous online identities to hide their true identity and avoid being traced. They
employ various methods to cover their tracks, such as using proxy servers, encryption,
or anonymizing tools, making it challenging for law enforcement agencies to identify and
apprehend them.
6. Persistence: Computer criminals demonstrate persistence in their attempts to breach
security systems or carry out illegal activities. They may employ trial and error methods,
repeated attacks, or persistent surveillance to achieve their objectives, often using
automated tools or bots to expedite the process.
7. Collaboration and Organized Crime: Some computer criminals operate in organized
groups or collaborate with other individuals sharing similar interests or skills. These
organized criminal networks often specialize in different aspects of cybercrime, such as
hacking, malware development, identity theft, or financial fraud, leveraging collective
expertise and resources.
8. Evolving Techniques: Computer criminals are constantly evolving and adapting their
techniques to exploit new technologies, emerging trends, and changing security
measures. They are quick to adopt new attack vectors, malware variants, or social
engineering tactics to bypass defenses and continue their criminal activities.
Common Targets of Computer
Criminals:
1. Individuals: Computer criminals frequently target individuals to gain unauthorized access
to personal information, financial accounts, or sensitive data. They may use techniques
such as phishing, social engineering, or malware to exploit vulnerabilities and steal
personal identities, banking details, or login credentials.
2. Businesses: Businesses of all sizes are prime targets for computer criminals. They may
seek to infiltrate corporate networks to steal valuable intellectual property, customer
data, or trade secrets. They may also target businesses for financial gain through
ransomware attacks, where they encrypt critical data and demand payment for its
release.
3. Government Agencies: Government agencies, including national security organizations,
are often targeted by computer criminals seeking classified information or attempting to
disrupt critical infrastructure. Attacks on government entities can range from espionage
and data breaches to sophisticated cyber-espionage operations.
4. Financial Institutions: Computer criminals frequently target financial institutions, such as
banks and credit card companies, to gain access to valuable financial data or carry out
fraudulent transactions. They may use techniques like malware, hacking, or social
engineering to breach security systems and compromise customer accounts.
5. Healthcare Organizations: The healthcare sector is increasingly targeted by computer
criminals due to the valuable patient data it holds. Attacks on healthcare organizations
can involve data breaches, ransomware attacks, or theft of medical records for financial
gain or identity theft.
6. Educational Institutions: Educational institutions, including universities and schools, are
attractive targets for computer criminals. They may seek to gain access to research data,
personal information of students and faculty, or exploit vulnerabilities in network
infrastructure for various purposes.
7. Critical Infrastructure: Computer criminals may target critical infrastructure systems,
including power grids, transportation systems, and communication networks. These
attacks can have severe consequences, disrupting services and potentially
compromising public safety.
8. Online Platforms: Computer criminals may target online platforms, such as social media
networks, e-commerce websites, or cloud service providers. Their objectives may
include stealing user data, launching distributed denial-of-service (DDoS) attacks, or
exploiting vulnerabilities in the platform's security.

You might also like