R20-CSF-UNIT-1-INTRODUCTION TO CYBERCRIME
R20-CSF-UNIT-1-INTRODUCTION TO CYBERCRIME
R20-CSF-UNIT-1-INTRODUCTION TO CYBERCRIME
UNIT 1
Introduction to Cybercrime
Introduction
• World- April 2024- 5.44 billion internet users
• India-world’s second-largest internet population at over 1.2 billion
users in 2023.
• Of these, 1.05 billion users accessed the internet via their mobile
phones.
• Estimates suggest that this figure would reach over 1.2 billion by
2050.
• Opens a new way of exploitation - cybercrime
Number of mobile phone internet users in India from 2015 to 2023
April 2024- 5.44 billion internet users
What is Cyber security ?
• Definition: Refers to the technologies and processes designed to protect computers, networks
and data from unauthorized access and attacks delivered via the internet by cyber criminals
Definition:
• A crime conducted in which a
computer was directly and
significantly instrumental.
Alternative definitions for computer
crime
1. Any illegal act where a special knowledge of computer technology is
essential for its perpetration, investigation or prosecution
• Investigation - formal or systematic examination or research:
• Perpetration is the act of committing a crime or a violent or harmful act.
2. Any traditional crime that has acquired a new dimension through the aid of
a computer, and abuses that have come into being because of computers
3. Any financial dishonesty that takes place in a computer environment.
4. Any threats to the computer itself, such as theft of hardware or software,
sabotage and demands for ransom
• Sabotage - act of destruction or disruption in which equipment is damaged
• Ransom- a large amount of money that is demanded in exchange for someone who has been taken prisoner, or
sometimes for an animal
Another definition
Psychological perverts
• Express sexual desires, deviates from normal behaviour
Financially motivated hackers
• Make money from cyber attacks
• Bots-for-hire : fraud through phishing, information theft, spam and extortion
State-sponsored hacking
• Hacktivists
• Extremely professional groups working for governments
• Have ability to worm into the networks of the media, major corporations,
Défense departments
organized criminals
3. Type 3: Cybercriminals- the insiders
6. Logic bomb
7. Trojan Horse
8. Data diddling
2. Cyberterrorism
3. Web jacking
• They aim to start the interaction with the victim directly with the help of
the internet (email/Chat Room).
• The stalker makes sure that the victim recognizes the attack attempted
on him/her.
• The stalker can make use of a third party to harass the victim.
2. Offline stalkers :
• The stalker may begin the attack using traditional methods such as
following victim, watching the daily routine of the victim, etc.
• For ex. Use of community sites, newsgroups, social websites, personal
websites.
• The victim is not aware that the Internet has been used to achieve an
attack against them.
Cases reported on Cyberstalking:
• The majority of cyberstalking are men and the majority of their victims
are women.
• In many cases, the cyberstalker is ex-lover, ex- spouse, boss/subordinate,
and neighbor.
• There also have been cases about strangers who are cyberstalkers.
How Stalking works?
1. Personal information gathering about the victim
– Name; family background; contact details- cell phone and telephone
numbers(residence as well as office)
2. Establish a contact with victim through telephone/cell phone.
– Once the contact is established, the stalker may make calls to the victim to harass.
3. Stalkers will almost always establish a contact with victim through e-
mail.
– The letters may have the tone of loving, threatening or can be sexually explicit.
The stalker may use multiple names while contacting the victim
4. Some stalkers keep on sending repeated E-mails asking for various
kinds of favors or threaten the victim.
5. The stalker may post the victim’s personal information as sex workers’
services or dating services. The stalker will use bad/attractive language
to invite the interested persons.
6. Whosoever comes across the information, starts calling victim and
asking for sexual services or relationship.
7. Some stalkers subscribe/register the e-mail account of the victim to
innumerable pornographic and sex sites.
Real Life Example:
• Botnet term is used for collection of software that run autonomously and
automatically.
2. Tablet PC
• It lacks a keyboard, is shaped like a slate or a paper notebook
and has features of a touch-screen with a stylus and
handwriting recognition software.
• Tablets may not be best suited for applications requiring a
physical keyboard for typing, but are otherwise capable of
carrying out most tasks that an ordinary laptop would be able to
perform.
3. Internet Tablet
• It is the Internet appliance in tablet form. Unlike a Tablet PC, the Internet
tablet does not have much computing power and its applications suite is
limited. Also it cannot replace a general-purpose computer.
• The Internet tablets typically feature an MP3 and video player, a Web
browser, a chat application and a picture viewer.
4. Personal Digital Assistant (PDA)
• It is a small, usually pocket-sized, computer with limited functionality.
• It is intended to supplement and synchronize with a desktop
computer, giving access to contacts, address book, notes, E-Mail and
other features.
5. Ultra Mobile PC
• It is a full-featured, PDA-sized computer running
a general-purpose operating system (OS).
6. Smartphone
• It is a PDA with an integrated cell phone
functionality.
• Current Smartphones have a wide range
of features and installable applications.
7. Carputer
• It is a computing device installed in an automobile.
• It operates as a wireless computer, sound system, and global
positioning system (GPS) and DVD player. It also contains word
processing software and is Bluetooth compatible.
8. Fly Fusion Pentop Computer
• It is a computing device with the size and shape of a pen. It
functions as a writing utensil, MP3 player, language translator,
digital storage device and calculator.
1.10 Security challenges posed by
mobile devices
1.10 Security challenges posed by
mobile devices
• Mobility brings two main challenges to cybersecurity:
• On the hand-held devices, information is being taken outside the physically controlled
environment and
• Remote access back to the protected environment is being granted.
• Increasing #mobile device users creates two security challenges:
1. Micro-challenges : Security Challenges at the device level.
2. Macro-challenges: Security Challenges at the organizational level.
Example: PalmOS
• Palms are one of the most common hand-held devices used in mobile
computing, Cryptographic security controls are deployed on these devices.
• Keep details.
• Make a record of all your phone information and keep this in a safe place.
Include the following elements in the information: Your phone number
• The make and model
• Color and appearance details
• The pin or security lock code
• The IMEI number (on GSM phones)
• International Mobile Equipment Identity
If you receive a phone call and your mobile phone displays(XALAN)on the screen don't
answer the call, END THE CALL IMMEDIATELY,if you answer the call,your phone will be
infected by a virus. This virus WILL ERASE all IMEI and IMSI information from both your
phone and your SIM card, which will make your phone unable to connect with the
telephone network. You will have to buy a new phone. This information has been
confirmed by both Motorola and Nokia. There are over 3 Million mobile phones being
infected by this virus in all around the world now. You can also check this news in the
CNN web site.
• ID theft
• Purchasing luxury goods and services
• Transferring money/ funds
• Monitoring the victims bank accounts
• Making applications for loans and credit cards
How Vishing works?
• Visher uses different methods based on the info gathered
• Short for SMS Phishing, smishing is a variant of phishing email scams that
instead utilizes Short Message Service (SMS) systems to send bogus text
messages.
• Also written as SMiShing, SMS phishing made recent headlines when a
vulnerability in the iPhone's SMS text messaging system was discovered
that made smishing on the mobile device possible.
How smishing works?
• Smishing scams frequently seek to direct the text message recipient to
visit a website or call a phone number, at which point the person being
scammed is enticed to provide sensitive information such as credit card
details or passwords.
• Smishing websites are also known to attempt to infect the person's
computer with malware.
Example :
Text message originating from either notice@jpecu or message@cccu :
• ABC CU – has –deactivated – your Debit_card. To reactivate
contact:210957XXXX
This is an automated message from ABC Bank.
• Your ATM card has been suspended. To reactivate call urgent at 1 866
215 XXXX
Text message originating from sms.alert@visa.com :
• sms.alert@visa.com/VISA. (Card Blocked) Alert. For more information
please call 1-877-269-XXXX
How to protect from Smishing attacks?
• Do not answer a text message
• Avoid calling any phone numbers
• Never click on a hot link received through messages
6. Hacking bluetooth