Introduction, Cybercrime, Definitions, Types of Attacks, Cyberterrorism, Cyberspace, Cybercrime and Information Security, Cybercriminals, Types of Cybercriminals, Legal Perspective, Global Perspective, Indian Perspective,
1. Cryptography and Cyber Security
[IT311]
Sanjivani Rural Education Society’s
Sanjivani College of Engineering, Kopargaon-423603
(An Autonomous Institute Affiliated to Savitribai Phule Pune University, Pune)
NAAC ‘A’ Grade Accredited, ISO 9001:2015 Certified
Department of Information Technology
(NBAAccredited)
Mrs. Kanchan D. Patil
Assistant Professor
2. Unit 5: Introduction to Cyber Security
• Introduction, Definition and origin, Cybercrime and Information Security,
Classification of Cybercrimes, The legal Perspectives- Indian Perspective,
Global Perspective, Categories of Cybercrime, Types of Attacks, a Social
Engineering, Cyberstalking.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
3. Introduction – Cybercrime Definitions
• A crime conducted in which a computer was directly and significantly
instrumental
• Any illegal act where a special knowledge of computer technology is
essential for its perpetration, investigation or prosecution
• Any traditional crime that has acquired a new dimension or order of
magnitude through the aid of a computer, and abuses that have come into
being because of computers.
• Any financial dishonesty that takes place in a computer environment.
• Any threats to the computer itself, such as theft of hardware or software,
sabotage and demands for ransom
• Cybercrime can also be referred as Computer-related crime, Computer
crime, Internet crime, E-crime, High-tech crime, etc.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
4. Introduction – Cybercrime Definitions
• A cybercrime (computer crime) is any illegal behavior, directed by means
of electronic operations, that targets the security of computer systems
and the data processed by them.
• A crime committed using a computer and the Internet to steal a person's
identity (identity theft) or sell contraband or stalk victims or disrupt
operations with malevolent programs
• Crimes completed either on or with a computer
• Any illegal activity done through the Internet or on the computer
• All criminal activities done using the medium of computers, the Internet,
cyberspace and the WWW.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
5. Introduction – Cybercrime Definitions
• According to one information security glossary, "cybercrime is any criminal
activity which uses network access to commit a criminal act.
• Opportunities for the exploitation due to weaknesses in information
security are multiplying because of the exponential growth of Internet
connection
• Cybercrime may be internal or external, with the former easier to
perpetrate
• The term "cybercrime" has evolved over the past few years since the
adoption of Internet connection on a global scale with hundreds of millions
of users
• Cybercrime refers to the act of performing a criminal act using cyberspace
as the communications vehicle
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
6. Types of Attacks
• Some people argue that a cybercrime is not a crime as it is a crime against
software and not against a person or property
• However, while the legal systems around the world scramble to introduce
laws to combat cyber-criminals, two types of attack are prevalent:
• Techno-crime:
• A pre-meditated act against a system or systems, with the intent to copy,
steal, prevent access, corrupt or otherwise deface of damage parts of or
the complete computer system.
• The 24x7 connection to the Internet makes this type of cybercrime a
real possibility to engineer from anywhere in the world, leaving few, if
any, "finger prints."
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
7. Types of Attacks
• Techno-vandalism:
• These acts of "brainless" defacement of websites and/or other activities,
such as copying files and publicizing their contents publicly, are usually
opportunistic in nature
• Tight internal security, allied to strong technical safeguards, should
prevent the vast majority of such incidents
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
8. Cyberterrorism
• It is defined as "any person, group or organization who, with terrorist
intent, utilizes accesses or aids in accessing a computer or computer
network or electronic system or electronic device by any available means,
and thereby knowingly engages in or attempt to engage in a terrorist act
commits the offence of cyberterrorism."
• Cyber means combining forms relating to Information Technology, the
Internet and Virtual Reality.
• Cyber-terrorists usually use computer as a tool, target or both for their
unlawful act to gain information which can result in heavy loss/damage to
the owner of that intangible sensitive information.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
9. Cyberspace
• Invented by William Gibson
• Cyberspace is where users mentally travel through matrices of data
• It is nebulous place where human interact over computer networks
• It is a worldwide network of computer networks that uses TCP/IP for
communication to facilitate transmission and exchange of data
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
10. Cybercrime and Information Security
• Lack of information security gives rise to cybercrimes
• From an Indian perspective, the new version of the Act (referred to as ITA
2008) provides a new focus on "Information Security in India.
• "Cybersecurity" means protecting information, equipment, devices,
computer, computer resource, communication device and information
stored therein from unauthorized access, use, disclosure, disruption,
modification or destruction. T
• he term incorporates both the physical security of devices as well as the
information stored therein.
• It covers protection from unauthorized access, use, disclosure, disruption,
modification and destruction.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
11. Cybercrime and Information Security
• Where financial losses to the organization due to insider crimes are
concerned (e.g., leaking customer data), often some difficulty is faced in
estimating the losses because the financial impacts may not be detected by
the victimized organization and no direct costs may be associated with the
data theft.
• The 2008 CSI Survey on computer crime and security supports this
Cybercrimes occupy an important space in information security domain
because of their impact.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
12. Cybercrime and Information Security
• For anyone trying to compile data on business impact of cybercrime, there
are number of challenges.
• One of them comes from the fact that organizations do not explicitly incorporate the
cost of the vast majority of computer security incidents into their accounting
• The other challenge comes from the difficulty in attaching a quantifiable monetary
value to the corporate data and yet corporate data get stolen/lost
• Because of these reasons, reporting of financial losses often remains
approximate in an attempt to avoid negative publicity, most organizations
abstain from revealing facts and figures about "security incidents including
cybercrime.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
13. Cybercrime and Information Security
• In general, organizations perception about "insider attacks” seems to be
different than that made out by security solution vendor
• However, this perception of an organization does not seem to be true as
revealed by the 2008 CSI Survey Awareness about "data privacy" too tends
to be low in most organizations.
• When we speak of financial losses to the organization and significant
insider crimes, such as leaking customer data, such crimes may not be
detected by the victimized organization and no direct costs may be
associated with the theft
• Figure shows several categories of incidences- virues, inuider abuse, laptop
theft and unauthorized
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
14. Cybercrime and Information Security
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
15. Cybercriminals
• Cybercrime involves such activities as
• child pornography
• Credit card fraud
• Cyberstalking
• defaming another online
• gaining unauthorized access to computer systems
• ignoring copyright
• software licensing and trade mark protection
• overriding encryption to make illegal copies
• software piracy and stealing another's identity (known as identity theft) to perform
criminal acts
• Cybercriminals are those who conduct such acts.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
16. Cybercriminals
• Motives behind cybercrime seem to be greed, desire to gain power and/or
publicity, desire for revenge, a sense of adventure, looking for thrill to
access forbidden information, destructive mindset and desire to sell
network security services
• Cybercafes are known to play role in committing cybercrimes
• Cybercriminals can be categorized into three groups that reflect the
motivation
• Type I Cybercriminals - hungry for recognition
• Hobby hackers
• IT professionals (social engineering is one of the biggest threat)
• politically motivated hackers
• terrorist organizations
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
17. Cybercriminals
• Type II Cybercriminals - not interested in recognition
• Psychological perverts
• financially motivated hackers (corporate espionage)
• state-sponsored hacking (national espionage, sabotage)
• organized criminals
• Type III Cybercriminals - the insiders
• Disgruntled or former employees seeking revenge
• competing companies using employees to gain economic advantage
through damage and/or theft
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
18. Cybercrime: The Legal Perspectives
• Cybercrime poses a mammoth challenge
• In the first comprehensive presentation of computer crime, Computer
Crime Criminal Justice Resource Manual (1979, computer-related crime was
defined in the broader meaning as: any illegal act for which knowledge of
computer technology is essential for a successful prosecution
• International legal aspects of computer crimes were studied in 1983.
• In that study, computer crime was consequently defined as: encompasses
any illegal act for which knowledge of computer technology is essential
for its perpetration
• Cybercrime is the outcome of "globalization”
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
19. Cybercrime: The Legal Perspectives
• Globalized information systems accommodate an increasing number of
offenses.
• The network context of cybercrime makes it one of the most globalized
offenses of the present and the most modernized threats of the future.
• This problem can be resolved in two ways
• To divide information systems into segments bordered by state
boundaries (cross-border flow of information).
• To incorporate the legal system into an integrated entity obliterating
these state boundaries.
• In a globally connected world, information systems become the unique
empire without tangible territory.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
20. Cybercrime: The Indian Perspectives
• India has the fourth highest number of Internet users in the world.
• According to the statistics, there are 45 million Internet users in India, 37%
of all Internet accesses happen from cybercafes and 57% of Indian Internet
users are between 18 and 35 years.
• The population of educated youth is high in India.
• It is reported that compared to the year 2006, cybercrime under the
Information Technology (IT) Act recorded a whopping 50% increase in the
year 2007.
• A point to note is that the majority of offenders were under 30 years.
• The maximum cybercrime cases, about 46%, were related to incidents of
cyber pornography, followed by hacking.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
21. Cybercrime: The Indian Perspectives
• In over 60% of these cases, offenders were between 18 and 30 years,
according to the "Crime in 2007 report of the National Crime Record
Bureau (NCRB).
• The Indian Government is doing its best to control cybercrimes.
• For example, Delhi Police have now trained 100 of its officers in handling
cybercrime and placed them in its Economic Offences Wing.
• As at the time of writing this, the officers were trained for 6 weeks in
computer hardware and software, computer networks comprising data
communication networks, network protocols, wireless networks and
network security
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
22. Cybercrime: The Global Perspectives
• In Australia, cybercrime has a narrow statutory meaning as used in the Cyber Crime Act
2001, which details offenses against computer data and systems.
• In the Council of Europe's (CoE's) Cyber Crime Treaty, cybercrime is used as an umbrella
term to refer to an array of criminal activity including offenses against computer data
and systems, computer-related offenses, content offenses and copyright offenses.
• This wide definition of cybercrime overlaps in part with general offense categories that
need not be Information & Communication Technology (ICT)-dependent, such as white-
collar crime and economic crime.
• Although this status is from the International Telecommunication Union (ITU) survey
conducted in 2005, we get an idea about the global perspective.
• The growing phenomenon is the use of Spam to support fraudulent and criminal
activities - including attempts to capture financial information (eg, account numbers
and passwords) by masquerading messages as originating from trusted companies
("brand-spoofing" or "Phishing") and as a vehicle to spread viruses and worms.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
23. Cybercrime: The Global Perspectives
• On mobile networks, a peculiar problem is that of sending of bulk unsolicited text
messages aimed at generating traffic to premium-rate numbers.
• As there are no national "boundaries" to such crimes under cyber crime realm, it
requires international cooperation between those who seek to enforce anti-Spam laws.
• Thus, one can see that there is a lot to do toward building confidence and security in the
use of ICTs and moving toward international cooperation agenda.
• This is because in the 21" century, there is a growing dependency on ICTs that span the
globe.
• There was a rapid growth in ICTs and dependencies that led to shift in perception of
cyber security threats in mid-1990s.
• The linkage of cyber security and critical infrastructure protection has become a big
issue as a number of countries have began assessment of threats, vulnerabilities and
started exploring mechanisms to redress them
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
24. Cybercrime: The Global Perspectives
• Recently, there have been a number of significant developments such
• August 4, 2006 Announcement:
• The US Senate ratifies CoE Convention on Cyber Crime.
• The convention targets hackers, those spreading destructive computer viruses, those
using the Internet for the sexual exploitation of children or the distribution of racist
material, and terrorists attempting to attack infrastructure facilities or financial
institutions.
• The Convention is in full accord with all the US constitutional protections, such as free
speech and other civil liberties, and will require no change to the US laws
• In August 18, 2006
• There was a news article published "ISPs Wary About 'Drastic Obligations on Web Site
Blocking”
• European Union (EU) officials want to debar suspicious websites as part of a 6-point
plan to boost joint antiterrorism activities.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
25. Cybercrime: The Global Perspectives
• They want to block websites that incite terrorist action.
• Once again it is underlined that monitoring calls, Internet and E-Mail traffic for law enforcement
purposes is a task vested in the government, which must reimburse carriers and providers for
retaining the data.
• CoE Cyber Crime Convention (1997-2001)
• It was the first international treaty seeking to address Internet crimes by harmonizing national
laws, improving investigative techniques and increasing cooperation among nations.
• More than 40 countries have ratified the Convention to date.
• One wonders as to what is the role of business/private sector in taking up measures to prevent
cybercrime and toward responsibilities and role related to the ownership of information and
communication infrastructures.
• Effective security requires an in-depth understanding of the various aspects of information and
communication networks.
• Therefore, private sector's expertise should be increasingly involved in the development and
implementation of a country's cyber security strategy.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
26. References:
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
• Nina Godbole, Sunit Belapure, “Cyber Security-Understanding Cyber
Crimes, Computer Forensics and Legal Perspective”