Introduction to Cyber Crime and Cyber Security

  •  Introduction

        The advanced technologies have changed the modern way of life. The internet provides us with many benefits. Be it communicating with friends, searching for information, doing banking transactions, availing online services, finding job, finding life partner or even running entire businesses. The internet touches almost all aspects of our lives. we have increased the use of internet in daily life.

         People keep important files, documents, software Data on the internet. The hacker access this data without any permission that is called as cyber cybercriminal

1. Cyber Security:-  Cyber Security is a process of defending computers, server, mobile devices, electronic systems, protect networks and data from malicious attacks. InShort it is a application of technology protect data from cyber attacks.

2. Cyber Crime : Cyber crime also called as computer crime. means any criminal activity which takes with the help of computer or internet or other technology.

Cybercrime: Definition and Origin of the Word

    As a criminal activity, it began when hackers started illegally accessing high-level computer network. cyber crime really began to takc off in the the early when social media come to life. 

        The surge of people putting all the information they could into a profile database created a flood of personal information and the rise of ID theft. Thieves used the information in a number of ways including accessing bank accounts, setting up credit cards or other financial fraud.

     These criminals operate in gangs, use well-established methods and target anything and everyone with a presence on the web. 

Definition of Cyber Crime ?

        Cyber crime is not an old sort of crime to the world. It is defined as any criminal activity which takes place on or over the medium of computers or internet or other technology recognised by the Information Technology Act.

Cybercrime and Information Security 

        Cyber crime that involves and uses computer devices and internet. it can be committed against an individual or a group, it can also be committed against government and private organizations. It may be intended to harm someone’s reputation, physical harm, or even mental harm.

    Information security is a set of practices designed to keep personal data secure from unauthorized access and alteration during storing or transmitting from one place to another.

        Information security is designed and implemented to protect the print, electronic and other private, sensitive and personal data from unauthorized persons. It is used to protect data from being misused, disclosure, destruction, modification, and disruption.

Who are Cybercriminals? 

        Cybercriminals are individuals or teams of people who use technology to commit malicious activities on digital systems or networks with the intention of stealing sensitive company information or personal data, and generating profit.

        Criminals access underground markets found in the deep web to trade malicious goods and services, such as hacking tools and stolen data. underground markets are known to specialize in certain products or services.

Classifications of Cybercrimes :
  1. E-Mail Spoofing
  2. Spamming
  3. Cyber defamation
  4.  Internet Time Theft
  5. Salami Attack/Salami Technique
  6.  Data Diddling
  7. Forgery
  8.  Web Jacking
  9. Newsgroup
  10.  Spam/Crimes Emanating from Usenet Newsgroup
  11.  Industrial Spying/Industrial Espionage
  12.  Hacking
  13. Online Frauds
  14. Computer Sabotage,
  15. Email Bombing/Mail Bombs
  16.  Computer Network Intrusions
  17.  Password Sniffing
  18.  Credit Card Frauds
  19. Identity Theft
  • E-Mail Spoofing 
    Email spoofing means When attacker sends emails with false sender addresses, these attacks are designed to steal your information, infect your computer with malware, or simply blackmail you for money. 
  • Spamming
    Spamming is the use of electronic messaging systems like emails and other digital delivery systems and broadcast media to send unwanted bulk messages indiscriminately.     
        The term spamming is also applied to other media like in internet forums, instant messaging, and mobile text messaging, social networking spam, junk fax transmissions, television advertising and sharing network spam.
  • Cyber defamation
        Cyber defamation is also known as internet defamation or online defamation in the world of internet and its users. This is a new concept but it literally defames a person through a new medium. Computers are a means of defaming a person through the Internet.
  •  Internet Time Theft
Internet Time theft means authorized person gets access to another person's ISP user ID and password, either by hacking or by illegal means without that person's knowledge.
  • Salami Attack/Salami Technique
the attacker is stealing a specific small amount of money during the transaction of each customer's account store it to his account that is called as salami attacks.
  •  Data Diddling
Data manipulation is the act of modifying or deleting data in an unauthorized way
  • Forgery
Forgery is a type message related attack against a cryptographic digital signature scheme.
  •  Web Jacking
        Web jacking is when someone clones your website and tricks you into believing that the cloned site is yours and malicious links places somewhere on your webpage waiting for click, anyone click on it, a malicious web server replaces it and that means you have lost complete access to your website.
  • Newsgroup
    NewsGroups means Internet based discussing Groups to discused about a particular topic. 
  •  Spam/Crimes Emanating from Usenet Newsgroup
        It is a kind of discussion group where people can share views on topic of their interest. The article posted to a newsGroup becomes available to all readers of the newsgroup.
  •  Industrial Spying/Industrial Espionage
        Industrial espionage is the practice of secretly, and sometimes illegally, interrogating competitors for commercial gain. The target of the investigation may be trade secrets, such as proprietary product details or formulas or business plan information. In most cases, industrial spies are only looking for data that their organization can take advantage of.
  •  Hacking
        Hacking is the use of digital devices and networks to gain unauthorized access to an account or computer system.
  • Online Frauds
    Internet fraud is the use of Internet services or software with Internet access to defraud victims or to otherwise take advantage of them.
  • Email Bombing/Mail Bombs
        Email bombing is a type of cybercrime that involves sending large amounts of emails to an address to overflow a mailbox or to overflow an email address hosted server. This disrupts the website or web portal and its online functioning and causes the server to crash.
  •  Computer Network Intrusions
        Network intrusion is any unauthorized activity on a computer network to detecting an intrusion depands on the defenders having a clear understanding of how attacks work.
  •  Password Sniffing
        Password sniffing is an attack on the Internet that is used to steal usernames and passwords from the network.
  •  Credit Card Frauds
        Credit card fraud is a form of identity theft in which criminals make purchases using a designated credit card account or receive a cash advance.
  • Identity Theft
        Identity theft and identity fraud are terms used to refer to all types of crimes in which someone incorrectly obtains and uses another person's personal data, including fraud or deception, especially for financial gain.