SlideShare a Scribd company logo
Cryptography and Cyber Security
[IT311]
Sanjivani Rural Education Society’s
Sanjivani College of Engineering, Kopargaon-423603
(An Autonomous Institute Affiliated to Savitribai Phule Pune University, Pune)
NAAC ‘A’ Grade Accredited, ISO 9001:2015 Certified
Department of Information Technology
(NBAAccredited)
Mrs. Kanchan D. Patil
Assistant Professor
Unit 5: Introduction to Cyber Security
• Introduction, Definition and origin, Cybercrime and Information Security,
Classification of Cybercrimes, The legal Perspectives- Indian Perspective,
Global Perspective, Categories of Cybercrime, Types of Attacks, a Social
Engineering, Cyberstalking.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Introduction – Cybercrime Definitions
• A crime conducted in which a computer was directly and significantly
instrumental
• Any illegal act where a special knowledge of computer technology is
essential for its perpetration, investigation or prosecution
• Any traditional crime that has acquired a new dimension or order of
magnitude through the aid of a computer, and abuses that have come into
being because of computers.
• Any financial dishonesty that takes place in a computer environment.
• Any threats to the computer itself, such as theft of hardware or software,
sabotage and demands for ransom
• Cybercrime can also be referred as Computer-related crime, Computer
crime, Internet crime, E-crime, High-tech crime, etc.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Introduction – Cybercrime Definitions
• A cybercrime (computer crime) is any illegal behavior, directed by means
of electronic operations, that targets the security of computer systems
and the data processed by them.
• A crime committed using a computer and the Internet to steal a person's
identity (identity theft) or sell contraband or stalk victims or disrupt
operations with malevolent programs
• Crimes completed either on or with a computer
• Any illegal activity done through the Internet or on the computer
• All criminal activities done using the medium of computers, the Internet,
cyberspace and the WWW.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Introduction – Cybercrime Definitions
• According to one information security glossary, "cybercrime is any criminal
activity which uses network access to commit a criminal act.
• Opportunities for the exploitation due to weaknesses in information
security are multiplying because of the exponential growth of Internet
connection
• Cybercrime may be internal or external, with the former easier to
perpetrate
• The term "cybercrime" has evolved over the past few years since the
adoption of Internet connection on a global scale with hundreds of millions
of users
• Cybercrime refers to the act of performing a criminal act using cyberspace
as the communications vehicle
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Types of Attacks
• Some people argue that a cybercrime is not a crime as it is a crime against
software and not against a person or property
• However, while the legal systems around the world scramble to introduce
laws to combat cyber-criminals, two types of attack are prevalent:
• Techno-crime:
• A pre-meditated act against a system or systems, with the intent to copy,
steal, prevent access, corrupt or otherwise deface of damage parts of or
the complete computer system.
• The 24x7 connection to the Internet makes this type of cybercrime a
real possibility to engineer from anywhere in the world, leaving few, if
any, "finger prints."
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Types of Attacks
• Techno-vandalism:
• These acts of "brainless" defacement of websites and/or other activities,
such as copying files and publicizing their contents publicly, are usually
opportunistic in nature
• Tight internal security, allied to strong technical safeguards, should
prevent the vast majority of such incidents
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Cyberterrorism
• It is defined as "any person, group or organization who, with terrorist
intent, utilizes accesses or aids in accessing a computer or computer
network or electronic system or electronic device by any available means,
and thereby knowingly engages in or attempt to engage in a terrorist act
commits the offence of cyberterrorism."
• Cyber means combining forms relating to Information Technology, the
Internet and Virtual Reality.
• Cyber-terrorists usually use computer as a tool, target or both for their
unlawful act to gain information which can result in heavy loss/damage to
the owner of that intangible sensitive information.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Cyberspace
• Invented by William Gibson
• Cyberspace is where users mentally travel through matrices of data
• It is nebulous place where human interact over computer networks
• It is a worldwide network of computer networks that uses TCP/IP for
communication to facilitate transmission and exchange of data
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Cybercrime and Information Security
• Lack of information security gives rise to cybercrimes
• From an Indian perspective, the new version of the Act (referred to as ITA
2008) provides a new focus on "Information Security in India.
• "Cybersecurity" means protecting information, equipment, devices,
computer, computer resource, communication device and information
stored therein from unauthorized access, use, disclosure, disruption,
modification or destruction. T
• he term incorporates both the physical security of devices as well as the
information stored therein.
• It covers protection from unauthorized access, use, disclosure, disruption,
modification and destruction.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Cybercrime and Information Security
• Where financial losses to the organization due to insider crimes are
concerned (e.g., leaking customer data), often some difficulty is faced in
estimating the losses because the financial impacts may not be detected by
the victimized organization and no direct costs may be associated with the
data theft.
• The 2008 CSI Survey on computer crime and security supports this
Cybercrimes occupy an important space in information security domain
because of their impact.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Cybercrime and Information Security
• For anyone trying to compile data on business impact of cybercrime, there
are number of challenges.
• One of them comes from the fact that organizations do not explicitly incorporate the
cost of the vast majority of computer security incidents into their accounting
• The other challenge comes from the difficulty in attaching a quantifiable monetary
value to the corporate data and yet corporate data get stolen/lost
• Because of these reasons, reporting of financial losses often remains
approximate in an attempt to avoid negative publicity, most organizations
abstain from revealing facts and figures about "security incidents including
cybercrime.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Cybercrime and Information Security
• In general, organizations perception about "insider attacks” seems to be
different than that made out by security solution vendor
• However, this perception of an organization does not seem to be true as
revealed by the 2008 CSI Survey Awareness about "data privacy" too tends
to be low in most organizations.
• When we speak of financial losses to the organization and significant
insider crimes, such as leaking customer data, such crimes may not be
detected by the victimized organization and no direct costs may be
associated with the theft
• Figure shows several categories of incidences- virues, inuider abuse, laptop
theft and unauthorized
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Cybercrime and Information Security
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Cybercriminals
• Cybercrime involves such activities as
• child pornography
• Credit card fraud
• Cyberstalking
• defaming another online
• gaining unauthorized access to computer systems
• ignoring copyright
• software licensing and trade mark protection
• overriding encryption to make illegal copies
• software piracy and stealing another's identity (known as identity theft) to perform
criminal acts
• Cybercriminals are those who conduct such acts.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Cybercriminals
• Motives behind cybercrime seem to be greed, desire to gain power and/or
publicity, desire for revenge, a sense of adventure, looking for thrill to
access forbidden information, destructive mindset and desire to sell
network security services
• Cybercafes are known to play role in committing cybercrimes
• Cybercriminals can be categorized into three groups that reflect the
motivation
• Type I Cybercriminals - hungry for recognition
• Hobby hackers
• IT professionals (social engineering is one of the biggest threat)
• politically motivated hackers
• terrorist organizations
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Cybercriminals
• Type II Cybercriminals - not interested in recognition
• Psychological perverts
• financially motivated hackers (corporate espionage)
• state-sponsored hacking (national espionage, sabotage)
• organized criminals
• Type III Cybercriminals - the insiders
• Disgruntled or former employees seeking revenge
• competing companies using employees to gain economic advantage
through damage and/or theft
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Cybercrime: The Legal Perspectives
• Cybercrime poses a mammoth challenge
• In the first comprehensive presentation of computer crime, Computer
Crime Criminal Justice Resource Manual (1979, computer-related crime was
defined in the broader meaning as: any illegal act for which knowledge of
computer technology is essential for a successful prosecution
• International legal aspects of computer crimes were studied in 1983.
• In that study, computer crime was consequently defined as: encompasses
any illegal act for which knowledge of computer technology is essential
for its perpetration
• Cybercrime is the outcome of "globalization”
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Cybercrime: The Legal Perspectives
• Globalized information systems accommodate an increasing number of
offenses.
• The network context of cybercrime makes it one of the most globalized
offenses of the present and the most modernized threats of the future.
• This problem can be resolved in two ways
• To divide information systems into segments bordered by state
boundaries (cross-border flow of information).
• To incorporate the legal system into an integrated entity obliterating
these state boundaries.
• In a globally connected world, information systems become the unique
empire without tangible territory.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Cybercrime: The Indian Perspectives
• India has the fourth highest number of Internet users in the world.
• According to the statistics, there are 45 million Internet users in India, 37%
of all Internet accesses happen from cybercafes and 57% of Indian Internet
users are between 18 and 35 years.
• The population of educated youth is high in India.
• It is reported that compared to the year 2006, cybercrime under the
Information Technology (IT) Act recorded a whopping 50% increase in the
year 2007.
• A point to note is that the majority of offenders were under 30 years.
• The maximum cybercrime cases, about 46%, were related to incidents of
cyber pornography, followed by hacking.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Cybercrime: The Indian Perspectives
• In over 60% of these cases, offenders were between 18 and 30 years,
according to the "Crime in 2007 report of the National Crime Record
Bureau (NCRB).
• The Indian Government is doing its best to control cybercrimes.
• For example, Delhi Police have now trained 100 of its officers in handling
cybercrime and placed them in its Economic Offences Wing.
• As at the time of writing this, the officers were trained for 6 weeks in
computer hardware and software, computer networks comprising data
communication networks, network protocols, wireless networks and
network security
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Cybercrime: The Global Perspectives
• In Australia, cybercrime has a narrow statutory meaning as used in the Cyber Crime Act
2001, which details offenses against computer data and systems.
• In the Council of Europe's (CoE's) Cyber Crime Treaty, cybercrime is used as an umbrella
term to refer to an array of criminal activity including offenses against computer data
and systems, computer-related offenses, content offenses and copyright offenses.
• This wide definition of cybercrime overlaps in part with general offense categories that
need not be Information & Communication Technology (ICT)-dependent, such as white-
collar crime and economic crime.
• Although this status is from the International Telecommunication Union (ITU) survey
conducted in 2005, we get an idea about the global perspective.
• The growing phenomenon is the use of Spam to support fraudulent and criminal
activities - including attempts to capture financial information (eg, account numbers
and passwords) by masquerading messages as originating from trusted companies
("brand-spoofing" or "Phishing") and as a vehicle to spread viruses and worms.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Cybercrime: The Global Perspectives
• On mobile networks, a peculiar problem is that of sending of bulk unsolicited text
messages aimed at generating traffic to premium-rate numbers.
• As there are no national "boundaries" to such crimes under cyber crime realm, it
requires international cooperation between those who seek to enforce anti-Spam laws.
• Thus, one can see that there is a lot to do toward building confidence and security in the
use of ICTs and moving toward international cooperation agenda.
• This is because in the 21" century, there is a growing dependency on ICTs that span the
globe.
• There was a rapid growth in ICTs and dependencies that led to shift in perception of
cyber security threats in mid-1990s.
• The linkage of cyber security and critical infrastructure protection has become a big
issue as a number of countries have began assessment of threats, vulnerabilities and
started exploring mechanisms to redress them
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Cybercrime: The Global Perspectives
• Recently, there have been a number of significant developments such
• August 4, 2006 Announcement:
• The US Senate ratifies CoE Convention on Cyber Crime.
• The convention targets hackers, those spreading destructive computer viruses, those
using the Internet for the sexual exploitation of children or the distribution of racist
material, and terrorists attempting to attack infrastructure facilities or financial
institutions.
• The Convention is in full accord with all the US constitutional protections, such as free
speech and other civil liberties, and will require no change to the US laws
• In August 18, 2006
• There was a news article published "ISPs Wary About 'Drastic Obligations on Web Site
Blocking”
• European Union (EU) officials want to debar suspicious websites as part of a 6-point
plan to boost joint antiterrorism activities.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
Cybercrime: The Global Perspectives
• They want to block websites that incite terrorist action.
• Once again it is underlined that monitoring calls, Internet and E-Mail traffic for law enforcement
purposes is a task vested in the government, which must reimburse carriers and providers for
retaining the data.
• CoE Cyber Crime Convention (1997-2001)
• It was the first international treaty seeking to address Internet crimes by harmonizing national
laws, improving investigative techniques and increasing cooperation among nations.
• More than 40 countries have ratified the Convention to date.
• One wonders as to what is the role of business/private sector in taking up measures to prevent
cybercrime and toward responsibilities and role related to the ownership of information and
communication infrastructures.
• Effective security requires an in-depth understanding of the various aspects of information and
communication networks.
• Therefore, private sector's expertise should be increasingly involved in the development and
implementation of a country's cyber security strategy.
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
References:
Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
• Nina Godbole, Sunit Belapure, “Cyber Security-Understanding Cyber
Crimes, Computer Forensics and Legal Perspective”

More Related Content

PDF
Unit 5_Classification of Cyber Crimes.pdf
PDF
Unit 2_AES_AES_Structure_Encryption_Example.pdf
PDF
Unit 1_Classical Encryption Techniques.pdf
PDF
Unit 3_Hash function and MD5 working.pdf
PDF
Unit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdf
PDF
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
PDF
Unit 6_Introduction_Phishing_Password Cracking.pdf
PDF
Unit 6_DoS and DDoS_SQL Injection_tools.pdf
Unit 5_Classification of Cyber Crimes.pdf
Unit 2_AES_AES_Structure_Encryption_Example.pdf
Unit 1_Classical Encryption Techniques.pdf
Unit 3_Hash function and MD5 working.pdf
Unit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdf
Unit 2_Public Key Cryptograohy_RSA_Example.pdf
Unit 6_Introduction_Phishing_Password Cracking.pdf
Unit 6_DoS and DDoS_SQL Injection_tools.pdf

What's hot (20)

PDF
Unit 5_Social Engineering and Cyberstalking.pdf
PDF
Unit 1_Transposition Techniques_Ciphers.pdf
PDF
Unit 3_Digital Signature Model Details.pdf
PDF
Unit 3_Kerberos Protocol_Working_Version.pdf
PDF
Unit 6_Cyber Laws Indian Act_Digital Signature.pdf
PDF
Unit 4_SSL_Handshake Protocol_Record Layer Protocol.pdf
PDF
Machine Learning_Unit_II_Regression_notes.pdf
PDF
ML_Unit_IV_Clustering in Machine Learning.pdf
PDF
Unit 3_Digital Certificate_Intro_Types.pdf
PPT
Cloud presentation
PDF
Unit 2_DES Algorithm_Encryption_Decryption.pdf
PDF
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
PDF
Unit 2_Key distribution_Deffi-Hellman.pdf
PDF
AES Solved Example on Encryption all rounds.pdf
PDF
Unit 1_Security Fundamentals_services_mechanisms.pdf
PDF
Unit1_Types of MACHINE LEARNING 2020pattern.pdf
PDF
Unit 3_Private Key Management_Protection.pdf
PDF
Unit 6_keylogger_Spywares_virus_worms.pdf
DOCX
Unit 1 DVWA (Damn Vulnerable Web Application).docx
DOCX
Unit 1 Stored Cross-Site Scripting (XSS)
Unit 5_Social Engineering and Cyberstalking.pdf
Unit 1_Transposition Techniques_Ciphers.pdf
Unit 3_Digital Signature Model Details.pdf
Unit 3_Kerberos Protocol_Working_Version.pdf
Unit 6_Cyber Laws Indian Act_Digital Signature.pdf
Unit 4_SSL_Handshake Protocol_Record Layer Protocol.pdf
Machine Learning_Unit_II_Regression_notes.pdf
ML_Unit_IV_Clustering in Machine Learning.pdf
Unit 3_Digital Certificate_Intro_Types.pdf
Cloud presentation
Unit 2_DES Algorithm_Encryption_Decryption.pdf
Unit 3_Secure Hash Algorithm_SHA_Working.pdf
Unit 2_Key distribution_Deffi-Hellman.pdf
AES Solved Example on Encryption all rounds.pdf
Unit 1_Security Fundamentals_services_mechanisms.pdf
Unit1_Types of MACHINE LEARNING 2020pattern.pdf
Unit 3_Private Key Management_Protection.pdf
Unit 6_keylogger_Spywares_virus_worms.pdf
Unit 1 DVWA (Damn Vulnerable Web Application).docx
Unit 1 Stored Cross-Site Scripting (XSS)
Ad

Similar to Unit 5_Introduction to Cyber Security.pdf (20)

PPTX
Cyber Crime
PPTX
cs computer notes of studies in education
PPTX
Cyber_Crime_Security.pptx
PDF
Module 1 Introduction to cryptography...
PPTX
Cyber Security Concepts, layers of security,
PPTX
Cyber security for engg students and diploma
PPTX
Cyber Security Awareness Session for Executives and Non-IT professionals
PPTX
Cyber Security.pptx
PPT
CYBER CRIME AND SECURITY
PPTX
Introduction Of Cyber Security in 2024.pptx
PPTX
Cyber security talks 2019 by theko moima
PPTX
Cybersecurity PowerPoint Presentation
PPTX
Cyber security.pptxelectronic systems, networks, and data from malicious
PPTX
Module 1- Introduction to Cybercrime.pptx
PPTX
unit -ii security1.pptx for Information system management
PPSX
Cyber security
PDF
CyberSecurity: A computer-misuse-and-cybercrimes-act.pdf
PDF
CyberSecurity.pdf
PPTX
Introduction to cyber security presentation
PPTX
Introduction to cyber security presentation
Cyber Crime
cs computer notes of studies in education
Cyber_Crime_Security.pptx
Module 1 Introduction to cryptography...
Cyber Security Concepts, layers of security,
Cyber security for engg students and diploma
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security.pptx
CYBER CRIME AND SECURITY
Introduction Of Cyber Security in 2024.pptx
Cyber security talks 2019 by theko moima
Cybersecurity PowerPoint Presentation
Cyber security.pptxelectronic systems, networks, and data from malicious
Module 1- Introduction to Cybercrime.pptx
unit -ii security1.pptx for Information system management
Cyber security
CyberSecurity: A computer-misuse-and-cybercrimes-act.pdf
CyberSecurity.pdf
Introduction to cyber security presentation
Introduction to cyber security presentation
Ad

More from KanchanPatil34 (8)

PDF
Unit 1_Data Validation_Validation Techniques.pdf
PDF
Unit 1_Concet of Feature-Feature Selection Methods.pdf
PDF
Unit 1_Introduction to ML_Types_Applications.pdf
PDF
Unit 1_Stack and Queue using Linked Organization.pdf
PDF
Unit 1_Single Linked List and Double Linked List.pdf
PDF
Unit 2_2 Binary Tree as ADT_General Tree.pdf
PDF
Unit 2_1 Tree.pdf
PDF
Unit 2_3 Binary Tree Traversals.pdf
Unit 1_Data Validation_Validation Techniques.pdf
Unit 1_Concet of Feature-Feature Selection Methods.pdf
Unit 1_Introduction to ML_Types_Applications.pdf
Unit 1_Stack and Queue using Linked Organization.pdf
Unit 1_Single Linked List and Double Linked List.pdf
Unit 2_2 Binary Tree as ADT_General Tree.pdf
Unit 2_1 Tree.pdf
Unit 2_3 Binary Tree Traversals.pdf

Recently uploaded (20)

PPTX
Lesson notes of climatology university.
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Computing-Curriculum for Schools in Ghana
PDF
Complications of Minimal Access Surgery at WLH
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Insiders guide to clinical Medicine.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Pre independence Education in Inndia.pdf
Lesson notes of climatology university.
O7-L3 Supply Chain Operations - ICLT Program
102 student loan defaulters named and shamed – Is someone you know on the list?
Computing-Curriculum for Schools in Ghana
Complications of Minimal Access Surgery at WLH
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Insiders guide to clinical Medicine.pdf
Microbial diseases, their pathogenesis and prophylaxis
Sports Quiz easy sports quiz sports quiz
PPH.pptx obstetrics and gynecology in nursing
2.FourierTransform-ShortQuestionswithAnswers.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
GDM (1) (1).pptx small presentation for students
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
RMMM.pdf make it easy to upload and study
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Pre independence Education in Inndia.pdf

Unit 5_Introduction to Cyber Security.pdf

  • 1. Cryptography and Cyber Security [IT311] Sanjivani Rural Education Society’s Sanjivani College of Engineering, Kopargaon-423603 (An Autonomous Institute Affiliated to Savitribai Phule Pune University, Pune) NAAC ‘A’ Grade Accredited, ISO 9001:2015 Certified Department of Information Technology (NBAAccredited) Mrs. Kanchan D. Patil Assistant Professor
  • 2. Unit 5: Introduction to Cyber Security • Introduction, Definition and origin, Cybercrime and Information Security, Classification of Cybercrimes, The legal Perspectives- Indian Perspective, Global Perspective, Categories of Cybercrime, Types of Attacks, a Social Engineering, Cyberstalking. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 3. Introduction – Cybercrime Definitions • A crime conducted in which a computer was directly and significantly instrumental • Any illegal act where a special knowledge of computer technology is essential for its perpetration, investigation or prosecution • Any traditional crime that has acquired a new dimension or order of magnitude through the aid of a computer, and abuses that have come into being because of computers. • Any financial dishonesty that takes place in a computer environment. • Any threats to the computer itself, such as theft of hardware or software, sabotage and demands for ransom • Cybercrime can also be referred as Computer-related crime, Computer crime, Internet crime, E-crime, High-tech crime, etc. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 4. Introduction – Cybercrime Definitions • A cybercrime (computer crime) is any illegal behavior, directed by means of electronic operations, that targets the security of computer systems and the data processed by them. • A crime committed using a computer and the Internet to steal a person's identity (identity theft) or sell contraband or stalk victims or disrupt operations with malevolent programs • Crimes completed either on or with a computer • Any illegal activity done through the Internet or on the computer • All criminal activities done using the medium of computers, the Internet, cyberspace and the WWW. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 5. Introduction – Cybercrime Definitions • According to one information security glossary, "cybercrime is any criminal activity which uses network access to commit a criminal act. • Opportunities for the exploitation due to weaknesses in information security are multiplying because of the exponential growth of Internet connection • Cybercrime may be internal or external, with the former easier to perpetrate • The term "cybercrime" has evolved over the past few years since the adoption of Internet connection on a global scale with hundreds of millions of users • Cybercrime refers to the act of performing a criminal act using cyberspace as the communications vehicle Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 6. Types of Attacks • Some people argue that a cybercrime is not a crime as it is a crime against software and not against a person or property • However, while the legal systems around the world scramble to introduce laws to combat cyber-criminals, two types of attack are prevalent: • Techno-crime: • A pre-meditated act against a system or systems, with the intent to copy, steal, prevent access, corrupt or otherwise deface of damage parts of or the complete computer system. • The 24x7 connection to the Internet makes this type of cybercrime a real possibility to engineer from anywhere in the world, leaving few, if any, "finger prints." Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 7. Types of Attacks • Techno-vandalism: • These acts of "brainless" defacement of websites and/or other activities, such as copying files and publicizing their contents publicly, are usually opportunistic in nature • Tight internal security, allied to strong technical safeguards, should prevent the vast majority of such incidents Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 8. Cyberterrorism • It is defined as "any person, group or organization who, with terrorist intent, utilizes accesses or aids in accessing a computer or computer network or electronic system or electronic device by any available means, and thereby knowingly engages in or attempt to engage in a terrorist act commits the offence of cyberterrorism." • Cyber means combining forms relating to Information Technology, the Internet and Virtual Reality. • Cyber-terrorists usually use computer as a tool, target or both for their unlawful act to gain information which can result in heavy loss/damage to the owner of that intangible sensitive information. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 9. Cyberspace • Invented by William Gibson • Cyberspace is where users mentally travel through matrices of data • It is nebulous place where human interact over computer networks • It is a worldwide network of computer networks that uses TCP/IP for communication to facilitate transmission and exchange of data Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 10. Cybercrime and Information Security • Lack of information security gives rise to cybercrimes • From an Indian perspective, the new version of the Act (referred to as ITA 2008) provides a new focus on "Information Security in India. • "Cybersecurity" means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction. T • he term incorporates both the physical security of devices as well as the information stored therein. • It covers protection from unauthorized access, use, disclosure, disruption, modification and destruction. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 11. Cybercrime and Information Security • Where financial losses to the organization due to insider crimes are concerned (e.g., leaking customer data), often some difficulty is faced in estimating the losses because the financial impacts may not be detected by the victimized organization and no direct costs may be associated with the data theft. • The 2008 CSI Survey on computer crime and security supports this Cybercrimes occupy an important space in information security domain because of their impact. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 12. Cybercrime and Information Security • For anyone trying to compile data on business impact of cybercrime, there are number of challenges. • One of them comes from the fact that organizations do not explicitly incorporate the cost of the vast majority of computer security incidents into their accounting • The other challenge comes from the difficulty in attaching a quantifiable monetary value to the corporate data and yet corporate data get stolen/lost • Because of these reasons, reporting of financial losses often remains approximate in an attempt to avoid negative publicity, most organizations abstain from revealing facts and figures about "security incidents including cybercrime. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 13. Cybercrime and Information Security • In general, organizations perception about "insider attacks” seems to be different than that made out by security solution vendor • However, this perception of an organization does not seem to be true as revealed by the 2008 CSI Survey Awareness about "data privacy" too tends to be low in most organizations. • When we speak of financial losses to the organization and significant insider crimes, such as leaking customer data, such crimes may not be detected by the victimized organization and no direct costs may be associated with the theft • Figure shows several categories of incidences- virues, inuider abuse, laptop theft and unauthorized Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 14. Cybercrime and Information Security Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 15. Cybercriminals • Cybercrime involves such activities as • child pornography • Credit card fraud • Cyberstalking • defaming another online • gaining unauthorized access to computer systems • ignoring copyright • software licensing and trade mark protection • overriding encryption to make illegal copies • software piracy and stealing another's identity (known as identity theft) to perform criminal acts • Cybercriminals are those who conduct such acts. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 16. Cybercriminals • Motives behind cybercrime seem to be greed, desire to gain power and/or publicity, desire for revenge, a sense of adventure, looking for thrill to access forbidden information, destructive mindset and desire to sell network security services • Cybercafes are known to play role in committing cybercrimes • Cybercriminals can be categorized into three groups that reflect the motivation • Type I Cybercriminals - hungry for recognition • Hobby hackers • IT professionals (social engineering is one of the biggest threat) • politically motivated hackers • terrorist organizations Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 17. Cybercriminals • Type II Cybercriminals - not interested in recognition • Psychological perverts • financially motivated hackers (corporate espionage) • state-sponsored hacking (national espionage, sabotage) • organized criminals • Type III Cybercriminals - the insiders • Disgruntled or former employees seeking revenge • competing companies using employees to gain economic advantage through damage and/or theft Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 18. Cybercrime: The Legal Perspectives • Cybercrime poses a mammoth challenge • In the first comprehensive presentation of computer crime, Computer Crime Criminal Justice Resource Manual (1979, computer-related crime was defined in the broader meaning as: any illegal act for which knowledge of computer technology is essential for a successful prosecution • International legal aspects of computer crimes were studied in 1983. • In that study, computer crime was consequently defined as: encompasses any illegal act for which knowledge of computer technology is essential for its perpetration • Cybercrime is the outcome of "globalization” Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 19. Cybercrime: The Legal Perspectives • Globalized information systems accommodate an increasing number of offenses. • The network context of cybercrime makes it one of the most globalized offenses of the present and the most modernized threats of the future. • This problem can be resolved in two ways • To divide information systems into segments bordered by state boundaries (cross-border flow of information). • To incorporate the legal system into an integrated entity obliterating these state boundaries. • In a globally connected world, information systems become the unique empire without tangible territory. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 20. Cybercrime: The Indian Perspectives • India has the fourth highest number of Internet users in the world. • According to the statistics, there are 45 million Internet users in India, 37% of all Internet accesses happen from cybercafes and 57% of Indian Internet users are between 18 and 35 years. • The population of educated youth is high in India. • It is reported that compared to the year 2006, cybercrime under the Information Technology (IT) Act recorded a whopping 50% increase in the year 2007. • A point to note is that the majority of offenders were under 30 years. • The maximum cybercrime cases, about 46%, were related to incidents of cyber pornography, followed by hacking. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 21. Cybercrime: The Indian Perspectives • In over 60% of these cases, offenders were between 18 and 30 years, according to the "Crime in 2007 report of the National Crime Record Bureau (NCRB). • The Indian Government is doing its best to control cybercrimes. • For example, Delhi Police have now trained 100 of its officers in handling cybercrime and placed them in its Economic Offences Wing. • As at the time of writing this, the officers were trained for 6 weeks in computer hardware and software, computer networks comprising data communication networks, network protocols, wireless networks and network security Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 22. Cybercrime: The Global Perspectives • In Australia, cybercrime has a narrow statutory meaning as used in the Cyber Crime Act 2001, which details offenses against computer data and systems. • In the Council of Europe's (CoE's) Cyber Crime Treaty, cybercrime is used as an umbrella term to refer to an array of criminal activity including offenses against computer data and systems, computer-related offenses, content offenses and copyright offenses. • This wide definition of cybercrime overlaps in part with general offense categories that need not be Information & Communication Technology (ICT)-dependent, such as white- collar crime and economic crime. • Although this status is from the International Telecommunication Union (ITU) survey conducted in 2005, we get an idea about the global perspective. • The growing phenomenon is the use of Spam to support fraudulent and criminal activities - including attempts to capture financial information (eg, account numbers and passwords) by masquerading messages as originating from trusted companies ("brand-spoofing" or "Phishing") and as a vehicle to spread viruses and worms. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 23. Cybercrime: The Global Perspectives • On mobile networks, a peculiar problem is that of sending of bulk unsolicited text messages aimed at generating traffic to premium-rate numbers. • As there are no national "boundaries" to such crimes under cyber crime realm, it requires international cooperation between those who seek to enforce anti-Spam laws. • Thus, one can see that there is a lot to do toward building confidence and security in the use of ICTs and moving toward international cooperation agenda. • This is because in the 21" century, there is a growing dependency on ICTs that span the globe. • There was a rapid growth in ICTs and dependencies that led to shift in perception of cyber security threats in mid-1990s. • The linkage of cyber security and critical infrastructure protection has become a big issue as a number of countries have began assessment of threats, vulnerabilities and started exploring mechanisms to redress them Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 24. Cybercrime: The Global Perspectives • Recently, there have been a number of significant developments such • August 4, 2006 Announcement: • The US Senate ratifies CoE Convention on Cyber Crime. • The convention targets hackers, those spreading destructive computer viruses, those using the Internet for the sexual exploitation of children or the distribution of racist material, and terrorists attempting to attack infrastructure facilities or financial institutions. • The Convention is in full accord with all the US constitutional protections, such as free speech and other civil liberties, and will require no change to the US laws • In August 18, 2006 • There was a news article published "ISPs Wary About 'Drastic Obligations on Web Site Blocking” • European Union (EU) officials want to debar suspicious websites as part of a 6-point plan to boost joint antiterrorism activities. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 25. Cybercrime: The Global Perspectives • They want to block websites that incite terrorist action. • Once again it is underlined that monitoring calls, Internet and E-Mail traffic for law enforcement purposes is a task vested in the government, which must reimburse carriers and providers for retaining the data. • CoE Cyber Crime Convention (1997-2001) • It was the first international treaty seeking to address Internet crimes by harmonizing national laws, improving investigative techniques and increasing cooperation among nations. • More than 40 countries have ratified the Convention to date. • One wonders as to what is the role of business/private sector in taking up measures to prevent cybercrime and toward responsibilities and role related to the ownership of information and communication infrastructures. • Effective security requires an in-depth understanding of the various aspects of information and communication networks. • Therefore, private sector's expertise should be increasingly involved in the development and implementation of a country's cyber security strategy. Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology
  • 26. References: Cryptography & Cyber Security Mrs. Kanchan Patil Department of Information Technology • Nina Godbole, Sunit Belapure, “Cyber Security-Understanding Cyber Crimes, Computer Forensics and Legal Perspective”