Unit 4 (Part 2)
Malware
• Malware is the shortened form of malicious software.
• Malware is an umbrella term used to refer to a variety of forms of hostile or
intrusive software including Ransom wares, Computer Viruses, Worms,
Trojan Horses, Spyware, Adware, Scareware etc.
• This is any program or file that is harmful to a computer user.
• These malicious programs can perform a variety of functions, including
stealing, encrypting or deleting sensitive data, altering or hijacking core
computing functions and monitoring users’ computer activity without their
permission.
Evolution of Malware
• Computer-enabled fraud and service theft evolved in parallel with the
information technology that enabled it.
• The term malware was first used by computer scientist and security
research YisraelRadai in 1990.
• Before the term malware, malicious software was referred to as computer
viruses.
• One of the first known examples of malware was the Creeper virus in 1971,
which was created as an experiment by BBN Technologies engineer Robert
Thomas.
1
What is the purpose of creating a Malware?
• Initially, it started as a prank among software developers. However, later on,
malware converted into a full-fledged industry of black and white market.
• It may be used by black hat hackers or even some governments for monitoring
their targets.
• Demand for sophisticated malware is created primarily by organised crime
syndicates and state-sponsored espionage agents.
Worms: Worms are very similar to viruses in that they are computer
programs that replicate functional copies of themselves (usually to other
computer systems via network connections) and often, but not always,
contain some functionality that will interfere with the normal use of a
computer or a program. Unlike viruses, however, worms exist as separate
entities; they do not attach themselves to other files or programs. Because of
their similarity to viruses, worms also are often referred to as viruses.
Trojan horses: A Trojan horse is a program that does something
undocumented which the programmer intended, but that users would not
accept if they knew about it. By some definitions, a virus is a particular case
of a Trojan horse, namely, one which is able to spread to other programs
(that is, it turns them into Trojans too). According to others, a virus that does
not do any deliberate damage (other than merely replicating) is not a Trojan.
Finally, despite the definitions, many people use the term "Trojan" to refer
only to a non-replicating malicious program.
Spyware: Spyware is software that spies on you, tracking your internet
activities in order to send advertising (Adware) back to your system.
2
3
Cyber Stalking
Phishing Attack
4
5
Spoofing:
Spamming
6
A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or
network, making it inaccessible to its intended users. DoS attacks accomplish this
by flooding the target with traffic, or sending it information that triggers a crash. In
both instances, the DoS attack deprives legitimate users (i.e. employees, members,
or account holders) of the service or resource they expected.
7
Introduction of Cyber Law about Internet Frauds
• In Simple way we can say that cyber crime is unlawful acts where in the
computer is either a tool or a target or both. Cyber crimes can involve
criminal activities that are traditional in nature, such as theft, fraud, forgery,
defamation and mischief, all of which are subject to the Indian Penal Code.
Introduction of Cyber Law about Internet Frauds
• We can categorize Cyber crimes in two ways
1. The Computer as a Target :-
Using a computer to attack other computers.
e.g. Hacking, Virus/Worm attacks, DOS attack etc.
2. computer as a weapon :-
Using a computer to commit real world crimes.
e.g. Cyber Terrorism, IPR violations, Credit card frauds, Pornography etc.
Cyber Law
• Cyber Law also called IT Law is the law regarding Information-technology
including computers and internet. It is related to legal informatics and
supervises the digital circulation of information, software, information
security and e-commerce.
• IT law does not consist a separate area of law rather it encloses aspects of
contract, intellectual property, privacy and data protection laws. Intellectual
property is a key element of IT law. The area of software licence is
controversial and still evolving in Europe and elsewhere.
8
Importance of Cyber Law:
• It covers all transaction over internet.
• It keeps eyes on all activities over internet.
• It touches every action and every reaction in cyberspace.
Area of Cyber Law:
• Fraud:
• Copyright:
• Defamation:
• Harassment and Stalking:
Advantages of Cyber Law:
• Organizations are now able to carry out e-commerce using the legal
infrastructure provided by the Act.
• Digital signatures have been given legal validity and sanction in the Act.
• It has opened the doors for the entry of corporate companies for issuing
Digital Signatures Certificates in the business of being Certifying
Authorities.
• It allows Government to issue notification on the web thus heralding e-
governance.
• It gives authority to the companies or organizations to file any form,
application or any other document with any office, authority, body or agency
9
owned or controlled by the suitable Government in e-form by means of such
e-form as may be prescribed by the suitable Government.
• The IT Act also addresses the important issues of security, which are so
critical to the success of electronic transactions.
Good Computing Practices
• Use passwords that can't be easily guessed, and protect your passwords.
• Minimize storage of sensitive information.
• Beware of scams.
• Protect information when using the Internet and email.
• Make sure your computer is protected with anti-virus and all necessary
security "patches" and updates.
• Secure laptop computers and mobile devices at all times: Lock them up or
carry them with you.
• Shut down, lock, log off, or put your computer and other devices to sleep
before leaving them unattended, and make sure they require a secure
password to start up or wake-up.
• Don't install or download unknown or unsolicited programs/apps.
• Secure your area before leaving it unattended.
• Make backup copies of files or data you are not willing to lose.
10
Money Laundering:
Money Laundering is to ensure that the money that has been acquired
illegally appears to have been obtained legitimately. In simpler terms, it is
the process of turning the profit of illegal activity into a legitimate income.
Money laundering, which is the process of concealing the proceeds of crime
and integrating them into the legitimate financial system, is also a method
used to hide the nature, source, location, situation, and movement of a crime
or to give a legal image to the proceeds of crime.
Electronic Money Laundering
Electronic money provides an easy way to transfer value without revealing its
identity, such as untraceable banknotes. Money can also be streamed through
online auctions and sales, gambling websites and converted into real, usable, and
untraceable "clean" money. The newest form of money laundering involves
cryptocurrencies like Bitcoin. While not entirely anonymous, they are increasingly
used in racketeering schemes, drug trafficking, and other criminal activities due to
their relative anonymity compared to more traditional forms of currency.
11