Unit I-1
Unit I-1
Unit I-1
Paridhi Jain
UNIT- I
Global connectivity: Through real-time connections made possible by the internet, people may
communicate, collaborate, and share information with anyone anywhere in the globe.
Access to information: People may learn, educate themselves, and keep informed on a variety of
topics thanks to the massive volumes of information that are easily accessible in the cyber world.
Convenience and efficiency: Online platforms and services in the cyberspace provide convenience
and efficiency, saving time and effort with capabilities like digital communication, online banking,
and online shopping.
Economic opportunities: The internet has produced new employment and income-generating
opportunities, including online enterprises, freelancing, and remote labor.
Cybersecurity risks: The online world is vulnerable to a number of cybersecurity risks, including
hacking, data breaches, malware, and identity theft, which can jeopardize personal information,
physical safety, and financial security.
Privacy concerns: Because online activities can be followed, observed, and exploited by bad
individuals or organizations, the cyber world poses questions about privacy and the security of
personal information.
Online harassment and cyber-bullying: The anonymity of the internet can result in destructive
behavior such as online harassment and cyber-bullying, which can have detrimental psychological and
social effects.
The abundance of information available online can cause information overload and the propagation
of false or misleading information, which can cause confusion and misinterpretation.
Cyber Law
Cyber law, also known as Internet Law or Cyber Law, is the part of the overall legal system that is
related to legal informatics and supervises the digital circulation of information, e-commerce, and
software and information security.
1
Notes by Prof. Paridhi Jain
It is associated with legal informatics and electronic elements, including information systems,
computers, software, and hardware. It covers many areas, such as access to and usage of the Internet,
encompassing various subtopics as well as freedom of expression, and online privacy.
Cyber laws help to reduce or prevent people from cybercriminal activities on a large scale with the
help of protecting information access from unauthorized people, freedom of speech related to the use
of the Internet, privacy, communications, email, websites, intellectual property, hardware and
software, such as data storage devices. As Internet traffic is increasing rapidly day by day, that has led
to a higher percentage of legal issues worldwide. Because cyber laws are different according to the
country and jurisdiction, restitution ranges from fines to imprisonment, and enforcement is
challenging.
The Computer Fraud and Abuse Act was the first cyber law, called CFAA that was enacted in
1986. This law was helpful in preventing unauthorized access to computers. And it also provided a
description of the stages of punishment for breaking that law or performing any illegal activity.
Areas involving in Cyber Laws
These laws deal with multiple activities and areas that occur online and serve several purposes. Some
laws are formed to describe the policies for using the Internet and the computer in an organization, and
some are formed to offer people security from unauthorized users and malicious activities. There are
various broad categories that come under cyber laws; some are as follows:
Fraud
Cyber laws are formed to prevent financial crimes such as identity theft, credit card theft and other
that occurring online. A person may face confederate or state criminal charges if he commits any type
of identity theft. These laws have explained strict policies to prosecute and defend against allegations
of using the internet.
Copyrighting Issues
The Internet is the source that contains different types of data, which can be accessed anytime,
anywhere. But it is the authority of anyone to copy the content of any other person. The strict rules are
defined in the cyber laws if anyone goes against copyright that protects the creative work of
individuals and companies.
Scam/ Treachery
There are different frauds and scams available on the Internet that can be personally harmful to any
company or an individual. Cyber laws offer many ways to protect people and prevent any identity
theft and financial crimes that happen online.
Online Insults and Character Degradation
There are multiple online social media platforms that are the best resources to share your mind with
anyone freely. But there are some rules in cyber laws if you speak and defaming someone online.
Cyber laws address and deal with many issues, such as racism, online insults, gender targets to protect
a person's reputation.
2
Notes by Prof. Paridhi Jain
Harassment is a big issue in cyberspace, which is a violation of both criminal laws and civil. In cyber
laws, there are some hard laws defined to prohibit these kinds of despicable crimes.
Data Protection
People using the internet depends on cyber laws and policies to protect their personal information.
Companies or organizations are also relying on cyber laws to protect the data of their users as well as
maintain the confidentiality of their data.
When you are visiting a website, you click a button that gives a message to ask you to agree for
terms and conditions; if you agree with it that ensures you have used cyber law. For every website,
there are terms and conditions available that are associated with privacy concerns.
Trade Secrets
There are many organizations that are doing online businesses, which are often relying on cyber laws
to protect their trade secrets. For example, online search engines like Google spend much time to
develop the algorithms that generate a search result. They also spend lots of time developing other
features such as intelligent assistance, flight search services, to name a few and maps. Cyber laws help
these organizations to perform legal action by describing necessary legal laws for protecting their
trade secrets.
Cyber-attacks can have motives other than financial gain. Some cyber-attacks focus on destroying or
gaining access to critical data.
Organizations and individuals face the following types of typical cyber-attacks:
Malware
Cyber attackers use harmful software such as spyware, viruses, Ransomware, and worms known as
malware to access your system's data. When you click on a malicious attachment or link, the malware
can install itself and become active on your device.
Phishing
Phishing attacks rely on communication methods like email to convince you to open the message and
follow the instructions inside. If you follow the attackers’ instructions, they gain access to personal
data, such as credit cards, and can install malware on your device.
Spoofing
Cyber attackers will sometimes imitate people or companies to trick you into giving up personal
information. This can happen in different ways. A common spoofing strategy involves using a fake
caller ID, where the person receiving the call doesn’t see that the number is falsified. Other spoofing
methods include subverting facial recognition systems, using a fake domain name, or creating a fake
website.
3
Notes by Prof. Paridhi Jain
Backdoor Trojan
Backdoor Trojan attacks involve malicious programs that can deceptively install malware or data and
open up what’s referred to as the “backdoor” to your computer system. When attackers gain access to
the backdoor, they can hijack the device without it being known to the user.
Ransomware (ररररररररर)
Ransomware is malicious software that cyber attackers can install on your device, allowing them to
block your access until you pay the attackers a ransom. However, paying the ransom doesn’t guarantee
the removal of the software, so experts often advise individuals not to pay the ransom if possible.
Password attacks
Password attacks can be as simple as someone correctly guessing your password or other methods
such as key logging, where attackers can monitor the information you type and then identify passwords.
An attacker can also use the aforementioned phishing approach to masquerade as a trusted site and try
to fool you into revealing your account credentials.
Drive-by download
Drive-by download attacks occur when you download malicious code to your device through an app,
website, or operating system with flawed security systems. This means you could do nothing wrong
and still be a victim of a drive-by download since it can occur due to a lack of security measures on a
site you believe to be safe.
****************************************************************
Difference between Conventional Crime and Cybercrime
Basis Cybercrime Conventional crime
Conventional crime
These crimes basically involve typically involves physical
the use of computers, the internet, force or the threat of
Methods used
or other digital devices to commit physical force to commit
to commit the
a crime. Examples of cybercrimes the crime. Examples of
crime
include malware attacks, identity conventional crimes
theft, and online fraud. include theft, assault, and
burglary.
4
Notes by Prof. Paridhi Jain
Types of Cybercrime
Piracy
Piracy refers to the unauthorized duplication of copyrighted content that is then sold at substantially
lower prices in the 'grey' market. The ease of access to technology has meant that over the years,
piracy has become more rampant. For example, CD writers are available off the shelf at very low
prices, making music piracy a simple affair.
Hacking
Hacking is the activity of identifying weaknesses in a computer system or a network to exploit the
security to gain access to personal data or business data. An example of computer hacking can be:
using a password cracking algorithm to gain access to a computer system.
While your computer is linked to the Internet, spyware installed by a hacker silently
communicates your personal and financial information without your awareness or agreement. The
hackers can:
Steal usernames and passwords.
Take out a cash advance
5
Notes by Prof. Paridhi Jain
Steal your money and use your name to obtain credit cards and bank accounts.
Destroy your credit.
Exploit your Social Security number
Make a new account requesting Additional credit cards or personal identification numbers
(PINs)
Misuse personal information and share it with third parties (illegal purposes).
Purchase something.
Data Breach
A data breach is any security incident in which unauthorized parties’ access sensitive or confidential
information, including personal data (Social Security numbers, bank account numbers, healthcare
data) and corporate data (customer records, intellectual property, financial information).
However, not all cyber-attacks are data breaches. Data breaches include only those security
breaches where someone gains unauthorized access to data.
Examples of personal data breaches include: Human error, for example an email attachment
containing personal data being sent to the incorrect recipient or records being deleted
accidentally. Sharing of passwords or other credentials with third parties.
SQL Injection
SQL Injection is a code-based vulnerability that allows an attacker to read and access sensitive data
from the database. Attackers can bypass security measures of applications and use SQL queries to
6
Notes by Prof. Paridhi Jain
modify, add, update, or delete records in a database. A successful SQL injection attack can badly
affect websites or web applications using relational databases such as MySQL, Oracle, or SQL
Server.
Identity Theft/Hack
Identity theft is the crime of using the personal or financial information of another person to commit
fraud, such as making unauthorized transactions or purchases.
Identity theft is committed in many different ways and its victims are typically left with damage to
their credit, finances, and reputation.
Examples of Identity Theft
It can be difficult to know if you've been a victim of identity theft, especially if you don't check
your financial statements regularly. Some clear indicators of identity theft include:
Bills for items that you didn't buy that you discover on your credit card statement, online
account, or via invoices by email or U.S. mail
Calls from debt collectors regarding accounts that you didn't open
Loan applications that are denied even though you believe your credit is in good standing
Bounced checks
A warrant for your arrest
Unfounded medical bills and explanations of benefits (EOBs) from an insurance company
Utilities being shut off
The inability to sign into accounts
Inexplicable hard inquiries into your credit report
New credit cards in your name that you didn't apply for.
Cyber terrorism
Cyber terrorism (also known as digital terrorism) is defined as disruptive attacks by recognized
terrorist organizations against computer systems with the intent of generating alarm, panic, or the
physical disruption of the information system.
The internet can be used by terrorists to finance their operations, train other terrorists, and plan
terror attacks. The more mainstream idea of cyber terrorism is the hacking of government or private
servers to access sensitive information or even siphon funds for use in terror activities. However,
there is currently no universally accepted definition of cyber terrorism.
Dark Web
The dark web is an encrypted portion of the internet not visible to the general public via a
traditional search engine such as Google.
Tor (The Onion Router) is a web browser that lets users access a network that anonymizes web
traffic to provide private web browsing.
Insiders
An insider attack is a malicious attack perpetrated on a network or computer system by a person
with authorized system access.
An insider threat is a perceived threat to an organization that comes from people within the
organization, such as employees, former employees, contractors or business associates, who have
inside information concerning the organization's security practices, data and computer systems.
Examples include mistyping an email address and accidentally sending a sensitive business
document to a competitor, unknowingly or inadvertently clicking on a hyperlink, opening an
attachment in a phishing email that contains a virus, or improperly disposing of sensitive documents.
7
Notes by Prof. Paridhi Jain
UPI Hacking
UPI frauds are becoming increasingly common in India due to the rise of digital transactions. There
were over 95,000 cases of UPI fraud reported in the 2022-23 financial year, according to finance
ministry data.
UPI fraud refers to fraudulent activities and scams that take place within the Unified Payments
Interface (UPI) system in India with reference to UPI based digital transactions.
Fraudsters often trick you into revealing their UPI PIN or personal information, enabling them to
access your bank accounts and carry out fraudulent transactions.
Types of UPI frauds / online frauds
Vishing
Vishing refers to fraudsters posing as bank representatives, asking questions on behalf of the bank.
These individuals weave a web of lies and enquire about your personal information to extract your
PIN or password.
Human Trafficking:-
Human trafficking consists of transporting, recruiting, transferring, harboring and receiving of
persons by using means like force, threat or coercion. The ultimate purpose of these acts and means is
to use these individuals for the purpose of exploitation. The exploitation of these persons takes
8
Notes by Prof. Paridhi Jain
various extremely degrading forms like prostitution, organ trade, sexual exploitation, forced labor,
slavery and servitude. Although the problem exists in all parts of the world some of the most affected
areas in this respect are Sub-Saharan Africa, Central Asia and South Asia.
Every year, 30th of July is observed as the World Day against Trafficking in Persons.
In the year 2010, the United Nations adopted the Global Plan of Action to Combat Trafficking in
Persons so that more awareness is created the world over regarding the heinous nature of the crime of
trafficking.
The overwhelming proportion of individuals that are trafficked consists of women and children
who are then used for various unethical forms of labor or for sexual exploitation.
Causes of Trafficking
Some of the causes or reasons for human trafficking are described below.
Poverty
Trafficking thrives at places where there is widespread poverty. Parents sell their kids because
poverty leaves them with no other option often thinking that selling their children will take them to
places that are much better and where their lives will improve.
Social factors
One of the most vulnerable sections of the society that are more prone to trafficking are young
women, and this is because in most societies both socially and culturally women are de-valued and
unwanted and as such they are more vulnerable to the practice of trafficking.
Migration
The desire to migrate from places where their lives are miserable makes individuals open to
approaches from traffickers who in the initial stages lure them with promises of better lives, but
once the victims are under their control, coercive measures are enforced to bend them.
Other factors
Other causes are porous nature of borders, corrupt government officials, the involvement of
international organized criminal groups or networks and the limited capacity of or commitment by
immigration and law enforcement officers to control borders.
Malicious Advertisement Campaign (Malvertising):-
though malvertising awareness is key. You will be protecting your own devices as well as the
business network.
There are a number of ways to get malicious adverts on to sites, hijacking the processes used by
legal advertisers; paying for ads, compromising an ad network or building their own ad agencies.
By paying for the ads – paying to post adverts on sites is common practice however hackers hide
malicious content in their adverts or direct the visitor to a malicious server to infect them with
malware.
By compromising an ad network – hackers can compromise a legitimate ad network and use it to
spread their malicious ads instead. This technique is useful for spreading ads on more tightly guarded
websites, just like in the attack against the New York Times, the BBC and other websites discussed
in the previous section.
By building their own ad agencies – This method isn’t as common because it’s a lot more work,
but it’s still a possibility. A good example is the 2017 Zirconium attacks, which involved a
cybercriminal that created 28 fake ad agencies, and was responsible for delivering an estimated one
billion malicious ads.
Online Gambling:-
Online gambling, also known as e-gambling or internet gambling, refers to the act of betting or
wagering money on games of chance or skill through the internet. It encompasses various forms of
gaming, including:
1. Online Casinos: Virtual versions of traditional casinos, offering games like slots, roulette,
blackjack, and craps.
2. Sports Betting: Wagering on sports events, such as football, basketball, tennis, and horse racing.
3. Poker Rooms: Online platforms for playing poker against other players.
4. Bingo and Lottery: Online versions of traditional bingo and lottery games.
7. Online Slots: Virtual slot machines with various themes and payouts.
10