Cs 1
Cs 1
Cs 1
1.1Introduction
“Cyber security is the protection of internet-connected systems, including hardware, software
and data, from cyber attacks”.
“Cybersecurity” means protecting information, equipment, devices, computer, computer
resource, communication device and information stored therein from unauthorized access,
use, disclosure, disruption, modification or destruction.
Almost everyone is aware of the rapid growth of the Internet. Given the unrestricted number
of free websites, the Internet has opened a new way of exploitation known as cybercrime.
These activities involve the use of computers, the Internet, cyberspace and the worldwide
web (WWW).
cybercrime is not a new phenomena; the first recorded cybercrime took place in the year
1820.
It is one of the most talked about topics in the recent years.
1
CYBERSECURITY-UNIT1
According to one information security, cybercrime is any criminal activity which uses network
access to commit a criminal act.
Cybercrime may be internal or external, with the former easier to perpetrate.
The term “cybercrime” has evolved over the past few years since the adoption of Internet
connection on a global scale with hundreds of millions of users.
Cybercrime refers to the act of performing a criminal act using cyberspace as the communications
vehicle.
The legal systems around the world introduce laws to combat cybercriminals attacks. Two types of
attack are as follows.
1. Techno-crime: An act against a system or systems, with the intent to copy, steal, prevent
access, corrupt or otherwise deface or damage parts of or the complete computer system.
2. Techno-vandalism: These acts of “brainless” defacement of websites and/or other
activities, such as copying files and publicizing their contents publicly, are usually
opportunistic in nature. “Tight internal security” and “strong technical safeguards” should
prevent the vast majority of such incidents.
There is a very thin line between the two terms “computer crime” and “computer fraud”; both are
punishable.
Cybercrimes (harmful acts committed from or against a computer or network) differ from most
crimes in four ways:
(a) how to commit them is easier to learn,
(b) they require few resources relative to the potential damage caused,
(c) they can be committed in a jurisdiction without being physically present in it
(d) they are often not clearly illegal. The term cybercrime has some stigma attached and is notorious
due to the word “terrorism” or “terrorist” attached with it, that is, cyberterrorism.
Important Definitions related to Cyber Security
a. Cyberterrorism
Cyberterrorism is defined as “any person, group or organization who, with terrorist intent, utilizes
accesses or aids in accessing a computer or computer network or electronic system or electronic
device by any available means, and thereby knowingly engages in or attempts to engage in a terrorist
act commits the offence of cyberterrorism.”
Cybercrime, especially through the Internet, has grown in number as the use of computer has
become central to commerce, entertainment and government.
The term cyber has some interesting synonyms: fake, replicated, pretend, imitation, virtual,
computer generated.
Cyber means combining forms relating to Information Technology, the Internet and Virtual
Reality.
b. cybernetics
This term owes its origin to the word “cybernetics” which deals with information and its use;
cybernetics is the science that overlaps the fields of neurophysiology, information theory,
computing machinery and automation.
Worldwide, including India, cyberterrorists usually use computer as a tool, target for their unlawful
act to gain information.
2
CYBERSECURITY-UNIT1
Internet is one of the means by which the offenders can gain priced sensitive information of
companies, firms, individuals, banks and can lead to intellectual property (IP) crimes, selling illegal
articles, pornography/child pornography, etc.
This is done using methods such as Phishing, Spoofing, Pharming, Internet Phishing, wire transfer,
etc. and use it to their own advantage without the consent of the individual.
c. “Phishing” refers to an attack using mail programs to deceive or coax (lure) Internet users into
disclosing confidential information that can be then exploited for illegal purposes.
d. Cyberspace
“cyberspace” is where users mentally travel through matrices of data. Conceptually, “cyberspace”
is the “nebulous place” where humans interact over computer networks.
The term “cyberspace” is now used to describe the Internet and other computer networks.
In terms of computer science, “cyberspace” is a worldwide network of computer networks that
uses the Transmission Control Protocol/Internet Protocol (TCP/IP) for communication to facilitate
transmission and exchange of data.
Cyberspace is most definitely a place where you chat, explore, research and play.
e. Cybersquatting
The term is derived from “squatting” which is the act of occupying an abandoned space/ building
that the user does not own, rent or otherwise have permission to use.
Cybersquatting, however, is a bit different in that the domain names that are being squatted are
(sometimes but not always) being paid for by the cybersquatters through the registration process.
Cybersquatters usually ask for prices far greater than those at which they purchased it. Some
cybersquatters put up derogatory or defamatory remarks about the person or company thedomain is
meant to represent in an effort to encourage the subject to buy the domain from them.
This term is explained here because, in a way, it relates to cybercrime given the intent of
cybersquatting.
cybersquatting means registering, selling or using a domain name with the intent of profiting from
the goodwill of someone else’s trademark. In this nature, it can be considered to be a type of
cybercrime.
Cybersquatting is the practice of buying “domain names” that have existing businesses names.
f. Cyberpunk
According to science fiction literature, the words “cyber” and “punk5 ” emphasize the two basic
aspects of cyberpunk: “technology” and “individualism.”
The term “cyberpunk” could mean something like “anarchy6 via machines” or “machine/computer
rebel movement.”
g. Cyberwarfare
Cyberwarfare means information attacks against an unsuspecting opponent’s computer networks,
destroying and paralyzing nations.
This perception seems to be correct as the terms cyberwarfare and cyberterrorism have got
historical connection in the context of attacks against infrastructure.
The term “information infrastructure” refers to information resources, including communication
systems that support an industry, institution or population.
3
CYBERSECURITY-UNIT1
These type of Cyberattacks are often presented as threat to military forces and the Internet has
major implications for espionage and warfare.
4
CYBERSECURITY-UNIT1
Types of Cybercriminals
1. Type I: Cybercriminals – hungry for recognition
• Hobby hackers; • IT professionals (social engineering is one of the biggest threat); • Politically
motivated hackers; • Terrorist organizations.
2. Type II: Cybercriminals – not interested in recognition
• Psychological perverts; • financially motivated hackers (corporate espionage);
3. Type III: Cybercriminals – the insiders
• Disgruntled or former employees seeking revenge; • Competing companies using employees to
gain economic advantage through damage and/or theft.
5
CYBERSECURITY-UNIT1
There is a rise in the number of financial institutions’ customers who receive such EMails which
usually contain a link to a spoof website and mislead users to enter user ids and passwords on the
pretence that security details can be updated or passwords changed.
It is wise to be alert and careful about E-Mails containing an embedded link, with a request for you
to enter secret details. It is strongly recommended not to input any sensitive information that might
help criminals to gain access to sensitive information, such as bank account details, even if the page
appears legitimate.
In virus E-Mails, the warnings may be genuine, so there is always a dilemma whether to take them
lightly or seriously.
A wise action is to first confirm by visiting an antivirus site such as McAfee, Sophos or Symantec
before taking any action, such as forwarding them to friends and colleagues.
c. Phishing,
Spear Phishing and its various other forms such as Vishing and Smishing
“Phishing” refers to an attack using mail programs to deceive or coax (lure) Internet users into
disclosing confidential information that can be then exploited for illegal purposes.
“Spear Phishing” is a method of sending a Phishing message to a particular organization to gain
organizational information for more targeted social engineering. Here
“Vishing” is the criminal practice of using social engineering over the telephone system, most
often using features facilitated by VoIP, to gain access to personal and financial information from the
public for the purpose of financial reward. o The term is a combination of V – voice and Phishing
o Vishing is usually used to steal credit card numbers or other related data used in ID theft
schemes from individuals.
o The most profitable uses of the information gained through a Vishing attack include:1.ID
theft; 2. purchasing luxury goods and services; 3. transferring money/funds; 4. monitoring the
victims’ bank accounts; 5. making applications for loans and credit cards.
“Smishing” is a criminal offense conducted by using social engineering techniques similar to
Phishing. The name is derived from “SMS PhISHING.” SMS – Short Message Service – is the text
messages communication component dominantly used into mobile phones.
d. Spamming:
People who create electronic Spam are called spammers.
Spam is the abuse of electronic messaging systems (including most broadcast media, digital
delivery systems) to send unrequested bulk messages indiscriminately.
Although the most widely recognized form of Spam is E-Mail Spam, the term is applied to similar
abuses in other media: instant messaging Spam, Usenet newsgroup Spam, web search engine
Spam, Spam in blogs, wiki Spam, online classified ads Spam, mobile phone messaging
Spam, Internet forum Spam, junk fax transmissions, social networking Spam, file sharing
network Spam, video sharing sites, etc.
Spamming is difficult to control because it has economic viability – advertisers have no operating
costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for
their mass mailings.
Spammers are numerous; the volume of unrequested mail has become very high because the barrier
to entry is low.
6
CYBERSECURITY-UNIT1
The costs, such as lost productivity and fraud, are borne by the public and by Internet service
providers (ISPs), who are forced to add extra capacity to cope with the deluge.
Spamming is widely detested, and has been the subject of legislation in many jurisdictions – for
example, the CAN-SPAM Act of 2003.
Therefore, the following web publishing techniques should be avoided:
1. Repeating keywords;
2. use of keywords that do not relate to the content on the site;
3. use of fast meta refresh;
4. redirection;
5. IP Cloaking;
6. use of colored text on the same color background;
7. tiny text usage;
8. duplication of pages with different URLs;
9. hidden links;
10. use of different pages that bridge to the same URL (gateway pages).
e. Cyber defamation:
Cyber defamation is a Software offense.
Let us first understand what the term entails. CHAPTER XXI of the Indian Penal Code (IPC) is
about DEFAMATION. In Section 499 of CHAPTER XXI of IPC, regarding “defamation” there is a
mention that “Whoever, by words either spoken or intended to be read, or by signs or by visible
representations, makes or publishes any imputation concerning any person intending to harm, or
knowing or having reason to believe that such imputation will harm, the reputation of such person, is
said, except in the cases hereinafter expected, to defame that person.”
Cyberdefamation happens when the above takes place in an electronic form.
In other words, “cyberdefamation” occurs when defamation takes place with the help of computers
and/or the Internet,
for example, someone publishes defamatory matter about someone on a website or sends an E-Mail
containing defamatory information to all friends of that person. According to the IPC Section 499: 1.
It may amount to defamation to impute anything to a deceased person, if the imputation wouldharm
the reputation of that person if living, and is intended to be hurtful to the feelings of his family or
other near relatives.
f. Cyberstalking and harassment:
The dictionary meaning of “stalking” is an “act or process of following prey stealthily – trying to
approach somebody or something.”
Cyberstalking has been defined as the use of information and communications technology,
particularly the Internet, by an individual or group of individuals to harass another individual, group
of individuals, or organization.
The behavior includes false accusations, monitoring, transmission of threats, ID theft, damage to
data or equipment, solicitation of minors for sexual purposes, and gathering information for
harassment purposes.
7
CYBERSECURITY-UNIT1
g. Computer sabotage:
The use of the Internet to stop the normal functioning of a computer system through the
introduction of worms, viruses or logic bombs, is referred to as computer sabotage.
It can be used to gain economic advantage over a competitor, to promote the illegal activities of
terrorists or to steal data or programs for extortion purposes.
Logic bombs are event-dependent programs created to do something only when a certain event
(known as a trigger event) occurs.
Some viruses may be termed as logic bombs because they lie dormant all through the year and
become active only on a particular date
h. Pornographic offenses:
“Child pornography” means any visual depiction, including but not limited to the following: 1. Any
photograph that can be considered obscene and/or unsuitable for the age of child viewer; 2. film,
video, picture;
3. computer-generated image or picture of sexually explicit conduct where the production of such
visual depiction involves the use of a minor engaging in sexually explicit conduct.
the Internet has become a household commodity in the urban areas of the nation. Its explosion has
made the children a viable victim to the cybercrime.
As the broad-band connections get into the reach of more and more homes, larger child population
will be using the Internet and therefore greater would be the chances of falling victim to the
aggression of pedophiles.
“Pedophiles” a person who is sexually attracted to children.
i. Password sniffing:
This also belongs to the category of cybercrimes against organization because the use of password
could be by an individual for his/her personal work or the work he/she is doing using a computer that
belongs to an organization.
8
CYBERSECURITY-UNIT1
9
CYBERSECURITY-UNIT1
• E-Mail bombing refers to sending a large number of E-Mails to the victim to crash victim’s E-Mail
account (in the case of an individual) or to make victim’s mail servers crash (in the case of a
company or an E-Mail service provider).
• Computer program can be written to instruct a computer to do such tasks on a repeated basis. In
recent times, terrorism has hit the Internet in the form of mail bombings.
• By instructing a computer to repeatedly send E-Mail to a specified person’s E-Mail address, the
cybercriminal can overwhelm the recipient’s personal account and potentially shut down entire
systems. This may or may not be illegal, but it is certainly disruptive.
f. Salami attack/Salami technique:
These attacks are used for committing financial crimes.
The idea here is to make the alteration so insignificant that in a single case it would go completely
unnoticed;
for example a bank employee inserts a program, into the bank’s servers, that deducts a small
amount of money from the account of every customer.
No account holder will probably notice this unauthorized debit, but the bank employee will make a
sizable amount every month.
g. Logic bomb:
Logic bombs are event-dependent programs created to do something only when a certain event
(known as a trigger event) occurs.
Some viruses may be termed as logic bombs because they lie dormant all through the year and
become active only on a particular date
h. Trojan Horse:
Trojan Horses: A Trojan Horse, Trojan for short, is a term used to describe malware that appears,
to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user’s
computer system
i. Data diddling:
A data diddling (data cheating) attack involves altering raw data just before it is processed by a
computer and then changing it back after the processing is completed. Electricity Boards in India
have been victims to data diddling programs inserted when private parties computerize their systems.
j. Crimes emanating from Usenet newsgroup:
As explained earlier, this is one form of spamming. The word “Spam” was usually taken to mean
Excessive Multiple Posting (EMP).
The advent of Google Groups, and its large Usenet archive, has made Usenet more attractive to
spammers than ever.
Spamming of Usenet newsgroups actually predates E-Mail Spam.
Bot Serdar Argic also appeared in early 1994, posting tens of thousands of messages to various
newsgroups, consisting of identical copies of a political screed relating to the Armenian Genocide.
k. Industrial spying/industrial espionage:
Spying is not limited to governments. Corporations, like governments, often spy on the enemy.
The Internet and privately networked systems provide new and better opportunities for espionage.
“Spies” can get information about product finances, research and development and marketing
strategies, an activity known as “industrial spying.”
10
CYBERSECURITY-UNIT1
11
CYBERSECURITY-UNIT1
Outside many colleges there are miscreants soliciting the sale of fake mark-sheets or even degree
certificates.
These are made using computers and high quality scanners and printers. In fact, this is becoming a
booming business involving large monetary amount given to student gangs in exchange for these
bogus but authentic looking certificates.
b. Cyberterrorism:
Cyberterrorism is defined as “any person, group or organization who, with terrorist intent, utilizes
accesses or aids in accessing a computer or computer network or electronic system or electronic
device by any available means, and thereby knowingly engages in or attempts to engage in a terrorist
act commits the offence of cyberterrorism.”
c. Web jacking:
Web jacking occurs when someone forcefully takes control of a website (by cracking the password
and later changing it).
Thus, the first stage of this crime involves “password sniffing.”
The actual owner of the website does not have any more control over what appears on that website.
5. Crimes emanating from Usenet newsgroup:
By its very nature, Usenet groups may carry very off ensive, harmful, inaccurate or otherwise
inappropriate material, or in some cases, postings that have been mislabeled or are deceptive in
another way. Therefore, it is expected that you will use caution and common sense and exercise
proper judgment when using Usenet, as well as use the service at your own risk
. Usenet is a popular means of sharing and distributing information on the Web with respect to
specific topic or subjects
. Usenet is a mechanism that allows sharing information in a many-to-many manner.
The newsgroups are spread across 30,000 different topics. In principle, it is possible to prevent
the distribution of specific newsgroup.
In reality, however, there is no technical method available for controlling the contents of any
newsgroup.
It is merely subject to self-regulation and net etiquette.
It is feasible to block specific newsgroups, however, this cannot be considered as a definitive
solution to illegal or harmful content.
It is possible to put Usenet to following criminal use:
1. Distribution/sale of pornographic material;
2. distribution/sale of pirated software packages;
3. distribution of hacking software;
4. sale of stolen credit card numbers.
5. sale of stolen data/stolen property.
1.6.1 Hacking
Although the purposes of hacking are many, the main ones are as follows: 1. Greed; 2. power; 3.
publicity; 4. revenge; 5. adventure; 6. desire to access forbidden information; 7. destructive mindset.
12
CYBERSECURITY-UNIT1
Every act committed toward breaking into a computer and/or network is hacking and it is an
offense.
Hackers write or use ready-made computer programs to attack the target computer.
They possess the desire to destruct and they get enjoyment out of such destruction.
Some hackers hack for personal monetary gains, such as stealing credit card information,
transferring money from various bank accounts to their own account followed by withdrawal of
money.
They extort money from some corporate giant threatening him to publish the stolen information
that is critical in nature.
Government websites are hot on hackers’ target lists and attacks on Government websites receive
wide press coverage.
For example, according to the story posted on December 2009, the NASA site was hacked via SQL
Injection
Hackers, crackers and phrackers are some of the oft-heard terms.
The original meaning of the word “hack” meaning an elegant, witty or inspired way of doing
almost anything originated at MIT.
The meaning has now changed to become something associated with the breaking into or harming
of any kind of computer or telecommunications system.
Some people claim that those who break into computer systems should ideally be called “crackers”
and those targeting phones should be known as “phreaks”
1.6.2 Identity Theft
Identity theft is a fraud involving another person’s identity for an illicit purpose.
This occurs when a criminal uses someone else’s identity for his/her own illegal purposes.
Phishing and identity theft are related offenses
Examples include fraudulently obtaining credit, stealing money from the victim’s bank accounts,
using the victim’s credit card number
1.6.3 Spam in Cyberworld
Basically, “Spam” is the abuse of electronic messaging systems to send unsolicited bulk messages
indiscriminately.
Although the most widely recognized form of Spam is E-Mail Spam, this term is applied to similar
abuses in other media:
o instant messaging Spam, o Usenet newsgroup Spam, o web search engine Spam, o Spam in blogs,
o wiki Spam, o online classified ads Spam, o mobile phone messaging Spam, o Internet forum Spam,
o junk fax transmissions o file sharing network Spam.
Spam is caused by flooding the Internet with many copies of the same message, in an attempt to
force the message on people who would not otherwise choose to receive it.
Often, this may result in the notorious DoS attack.
Commercial advertising often happens to be the cause of Spam. Such advertisements are often for
products of dubious reputation and fraud schemes meant to make people believe they can get rich
overnight!
Some Spam may also get generated through quasi-legal services.
13
CYBERSECURITY-UNIT1
Spam hardly costs much to the sender; most of the costs are paid for by the recipient or the carriers
rather than by the sender.
People who engage in the activity of electronic Spam are called spammers.
Two main types of Spam are worth mentioning:
o “cancellable Usenet Spam” in which a single message is sent to several Usenet newsgroups
and
o “E-Mail Spam” which targets individual users with direct mail messages.
Often, spammers create E-Mail Spam lists by scanning Usenet postings, by stealing Internet
mailing lists or searching the Web for addresses.
Typically, it costs money to users if they receive E-Mail Spam.
Any person with measured phone service can read or receive their mail.
Spam does not cost much to people.
Spam does, however, cost money to ISPs and to online service providers to transmit Spam.
Unfortunately, subscribers end up paying these costs because the costs are transmitted directly to
subscribers.
14
CYBERSECURITY-UNIT1
Although this status is from the International Telecommunication Union (ITU) survey conducted in
2005, we get an idea about the global perspective.
ITU activities on countering Spam can be read by visiting the link www.itu.int/spam (8 May 2010).
The Spam legislation scenario mentions “none” about India as far as E-Mail legislation in India is
concerned.
The legislation refers to India as a “loose” legislation, although there is a mention in Section 67 of
Indian ITA 2000.
About 30 countries have enacted some form of anti-Spam legislation.
There are also technical solutions by ISPs and end-users.
However, in spite of this, so far there has been no significant impact on the volume of Spam with
spammers sending hundreds of millions of messages per day.
The growing phenomenon is the use of Spam to support fraudulent and criminal activities –
including attempts to capture financial information (e.g., account numbers and passwords) by
masquerading messages as originating from trusted companies (“brand-spoofi ng” or “Phishing”) –
and as a vehicle to spread viruses and worms.
On mobile networks, a peculiar problem is that of sending of bulk unsolicited text messages aimed
at generating traffic to premium-rate numbers. As there are no national “boundaries” to such crimes
under cybercrime realm, it requires international cooperation between those who seek to enforce
anti-Spam laws.
Thus, one can see that there is a lot to do toward building confidence and security in the use of
ICTs and moving toward international cooperation agenda.
This is because in the 21st century, there is a growing dependency on ICTs that span the globe.
There was a rapid growth in ICTs and dependencies that led to shift in perception of cybersecurity
threats in mid-1990s.
The linkage of cybersecurity and critical infrastructure protection has become a big issue as a
number of countries have began assessment of threats, vulnerabilities and started exploring
mechanisms to redress them. Recently, there have been a number of significant developments such
as
1. August 4, 2006 Announcement: The US Senate ratifies CoE Convention on Cyber Crime. The
convention targets hackers, those spreading destructive computer viruses those using the Internet for
the sexual exploitation of children or the distribution of racist material, and terrorists attempting to
attack infrastructure facilities or financial institutions. The Convention is in full accord with all the
US constitutional protections, such as free speech and other civil liberties, and will require no change
to the US laws.
2. In August 18, 2006, there was a news article published “ISPs Wary About ‘Drastic Obligations’
on Web Site Blocking.” European Union (EU) officials want to debar suspicious websites as part of
a 6-point plan to boost joint antiterrorism activities. They want to block websites that incite terrorist
action. Once again it is underlined that monitoring calls, Internet and E-Mail traffi c for law
enforcement purposes is a task vested in the government, which must reimburse carriers and
providers for retaining the data.
15
CYBERSECURITY-UNIT1
3. CoE Cyber Crime Convention (1997–2001) was the first international treaty seeking to address
Internet crimes by harmonizing national laws, improving investigative techniques and increasing
cooperation among nations More than 40 countries have ratified the Convention to date.
One wonders as to what is the role of business/private sector in taking up measures to prevent
cybercrime and toward responsibilities and role related to the ownership of information and
communication infrastructures. Effective security requires an in-depth understanding of the various
aspects of information and communication networks. Therefore, private sector’s expertise should be
increasingly involved in the development and implementation of a country’s cybersecurity strategy.
16
CYBERSECURITY-UNIT1
The maximum cybercrime cases, about 46%, were related to incidents of cyberpornography,
followed by hacking. In over 60% of these cases, offenders were between 18 and 30 years, according
to the “Crime in 2007” report of the National Crime Record Bureau (NCRB).
Box 1.6 shows the Indian Statistics on cybercrimes.
The Indian Government is doing its best to control cybercrimes.
For example, Delhi Police have now trained 100 of its officers in handling cybercrime and placed
them in its Economic Offences Wing.
As at the time of writing this, the officers were trained for 6 weeks in computer hardware and
software, computer networks comprising data communication networks, network protocols, wireless
networks and network security.
17
CYBERSECURITY-UNIT1
18