Cybercrime, also known as Computer crime, involves a computer/mobile and a network.
The computer can be:
Used in the commission of a crime.
The target of a crime.
Netcrime is the criminal exploitation of the internet.
Cybercrime is defined as "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)".
Such crimes may threaten a nation’s security and financial health.
Definition: “unlawful acts wherein the computer is either a tool or a target or both”.
Biggest Cyber Attacks 2017
Equifax Data Breach – 145.5 Million Accounts
Uber Data Breach – 57 Million Records
WannaCry Cyber Attack – 300,000 Systems
Yahoo! Makes History, Again – 3 Billion Accounts
Deep Root Analytics Data Breach – 198 Million U.S. Voters
Rasputin Attacks – 60 Universities and Federal Agencies
Surface Web vs Deep Web vs Dark Web
Surface Web
Accessible.
Indexed for Search Engines.
Little illegal activity.
Relatively small in size.
Deep Web
Accessible by password, encryption, or through gateway software.
Not indexed for Search Engines.
Little illegal activity outside of Dark Web.
Huge in size and growing exponentially.
Dark Web/Darknet
Restricted to special browsers.
Not indexed for Search Engines.
Large scale illegal activity.
Unmeasurable due to nature.
Cost of Information in Dark Web
Bank credential: $1,000 plus (6% of the total dollar amount in the account)
U.S. credit card with track data (account number, expiration date, name and more): $12
EU, Asia credit card with track data: $28
Hacking into a website: $100 to $300
Counterfeit social security cards: $250 and $400
Counterfeit driver's license: $100 to $150
Classification of Cyber Crimes
Threatening email, assuming someone’s identity, defamation, SPAM and Phishing are some examples where computers are used to commit crime.
Viruses, worms and industrial espionage, software piracy and hacking are examples where computers become target of crime.
Where computers are used to commit crime
Traditional offenses such as fraud committed through the use of a computer.
Some examples are:
Financial Crime
Online Gambling
Intellectual Property Crimes
Email spoofing
Cyber defamation
Cyber stalking
1. Financial crimes
Cheating, credit card frauds, money laundering etc.
2. Online gambling
Millions of websites hosted on servers abroad offer online gambling.
Many of these websites are fronts for money laundering.
3. Intellectual Property crimes
Software piracy, copyright infringement, trademarks violations, theft of computer source code etc.
4. Email spoofing
A spoofed email appears to originate from one source but has been sent from another source.
5. Cyber Defamation
Defamation that takes place with the help of computers and / or the Internet.
Example: Publishing defamatory matter about someone on a website or sending e-mails containing defamatory information to all of that person's contacts.
6. Cyber stalking
Following a person's movements across the Internet by posting messages on bulletin boards, entering chat-rooms, bombarding the victim with emails etc.
Where computers become target of crime
Computer oriented cyber crimes.
Some types are:
A. Unauthorized Access (Hacking)
B. Malicious Software (Viruses, Trojans- corrupts server)
C. Worm (Self-replicating programs)
D. Spyware – parasitic software, invades privacy
E. Divulging details through tracking cookies.
F. Cyber terrorism
A. Unauthorized Access
Also known as Hacking.
Gaining access illegally to a computer system or network.
Making unauthorized use of this access.
Hacking is used to commit other forms of cyber-crime (e.g., fraud, terrorism).
A. Theft of information
Theft of any information contained in electronic form such as that stored in computer hard disks, removal storage media, Can extend to identity theft.
A. Email Bombing
Sending large number of emails to the victim resulting in the victim's email account or mail servers crashing.
A. Salami Attacks
Alteration would go unnoticed in a single case.
Financial crime.
E.g. a bank employee inserts a program, into the bank's servers, that deducts a small amount of money (say 5 cents a month) from the account of every customer.
A. Denial of Service (DoS) Attack
Flooding a computer resource with more requests than it can handle, causing the resource (e.g. a web server) to crash thereby denying authorized users the service offered by the resource.
B. Virus
Programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network.
They usually affect the data on a computer, either by altering or deleting it.
B. Logic Bombs
Event dependent programs where programs kick into action only when a certain event (known as a trigger event) occurs.
Some viruses may be termed logic bombs because they lie dormant throughout the year and become active only on a particular date (e.g. Chernobyl virus).
B. Trojan Attacks
An unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing.
C. Worm
Unlike viruses do not need the host to attach themselves to.
They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory.
D. Web Jacking
Someone forcefully takes control of a website (by cracking the password and later changing it).
E. Cyber-Terrorism
Hacking designed to cause terror.
Utilizes hacking to cause violence against persons or property, or at least cause enough harm to generate fear.
Computer Security
Computer security (also known as cyber security or IT security) is information security as applied to computing devices such as computers and smartphones, as well as computer networks such as private and public networks, including the Internet as a whole.
Computer Security is the protection of computing systems and the data that they store or access.
Computer Security covers all the processes and mechanisms by which computer- based equipment, information and services are protected from unintended or unauthorized access, change or destruction.
Computer security also includes protection from unplanned events and natural disasters.
Why is Computer Security Important?
Enabling people to carry out their jobs, education, and research.
Supporting critical business process.
Protecting personal and sensitive information.
Why do I need to learn about Computer Security?
Good Security Standards follow the "90 / 10" Rule:
10% of security safeguards are technical.
90% of security safeguards rely on the computer user ("YOU") to adhere to good computing practices
Example: The lock on the door is the 10%. You remembering to lock the lock, checking to see if the door is closed, ensuring others do not prop the door open, keeping control of the keys, etc. is the 90%. You need both parts for effective security.
What Does This Mean for Me?
Everyone who uses a computer needs to understand how to keep their computer and data secure.
Information Technology Security is everyone's responsibility
Simple measures to be followed
Many cyber security threats are largely avoidable.
Use good, cryptic passwords that can't be easily guessed and keep your passwords secret
Make sure your operating system and applications are protected with all necessary security patches and updates
Make sure your computer is protected with up-to-date antivirus and anti- spyware software
Don't click on unknown or unsolicited links or attachments, and don't download unknown files or programs onto your computer
Remember that information and passwords sent via standard, unencrypted wireless are especially easy for hackers to intercept
To help reduce the risk, look for https in the URL and the little padlock that appears in the URL bar or in a corner of the browser window before you enter any sensitive information or a password.
Also avoid standard, unencrypted e-mail and unencrypted Instant Messaging (IM) if you are concerned about privacy
What are the consequences for security violations?
Risk to security and integrity of personal or confidential information
e.g. identity theft, data corruption or destruction, unavailability of critical information in an emergency, etc.
Loss of valuable business information
Loss of employee and public trust, embarrassment, bad publicity, media coverage, news reports
Costly reporting requirements in the case of a compromise of certain types of personal, financial and health information
Internal disciplinary action(s) up to and including termination of employment, as well as possible penalties, prosecution and the potential for sanctions / lawsuits