module 2 (1)
module 2 (1)
Module 2
Dept. of CSE
The National Institute of Engineering
• Cyberoffenses: How, Criminals Plan
Them: How Criminals Plan the Attacks
• Social Engineering, Cyberstalking,
Topics Cybercafe and Cybercrimes
• Botnets: The Fuel for Cybercrime,
Attack, Vector.
Cyberoffenses: How Criminals Plan Them
• Technology is a “double-edged sword” can be used for both good and bad.
• Computer and tools, they are used either as target of offense or means of
committing an offense.
• Agencies collect information about the individuals (Aadhaar, Date of birth, Bank
account details, etc.)
• Attacker exploit vulnerabilities in the networks.
• Inadequate border protection.
• Remote access servers with weak access controls.
• Application servers with well-known exploits.
• Misconfigured systems and systems with default configuration.
• Can be categorized based on
• The target of the crime.
• Whether the crime occurs as a single
event or a series of events.
• Cyberstalking is the act of persistent and unwanted contact from someone online. It can include threats,
libel, defamation, harassment, or other actions to control, influence, or intimidate the target.
• In India, cyberstalking is considered a criminal offense under the
Information Technology (IT) Act, 2000, specifically under Section
354D. According to this section, any person who stalks or
causes annoyance to another individual through electronic
communication can be punished with imprisonment for up
to three years for the first offense, along with a fine. For subsequent
offenses, the punishment can extend up to five years of
imprisonment, along with a fine.
How Stalking Works?
1. Personal information gathering about the victim
2. Establish a contact with victim through telephone/cell phone. Once
the contact is established, the stalker may make calls to the victim to
threaten/harass.
3. Stalkers will almost always establish a contact with the victims
through E-Mail. The stalker may use multiple names while
contacting the victim.
Cyberstalking 4. Some stalkers keep on sending repeated E-Mails asking for various
kinds of favours or threaten the victim.
(Continued) 5. The stalker may post the victim’s personal information on any
website related to illicit services such as sex-workers’ services or
dating services, posing as if the victim has posted the information
and invite the people to call the victim on the given contact details
The stalker will use bad and/or offensive/attractive language to
invite the interested persons.
6. Whosoever comes across the information, start calling the victim on
the given contact details asking for sexual services or relationships.
7. Some stalkers subscribe/register the E-Mail account of the victim to
innumerable pornographic and sex sites, because of which victim
will start receiving such kind of unsolicited E-Mails.
• Cybercrimes such as stealing of bank
passwords and subsequent fraudulent
withdrawal of money have also happened
through cybercafes.
• Cybercafes have also been used regularly for
Cybercafe sending obscene mails to harass people.
• Indian Information Technology Act (ITA)
and 2000 interprets cybercafes as “network
Cybercrimes service providers” referred to under the
erstwhile Section 79, which imposed on
them a responsibility for “due diligence”
failing which they would be liable for the
offenses committed in their network.
• Cybercriminals can either install malicious
programs such as keyloggers and/or Spyware
or launch an attack on the target.
• Here are a few tips for safety and security
while using the computer in a cybercafe:
Cybercafe 1. Always logout
and 2. Stay with the computer
3. Clear history and temporary files
Cybercrimes 4. Be alert
(Continued) 5. Avoid online financial transactions
6. Change passwords
7. Virtual keyboard
8. Security warnings
• A Botnet (also called as zombie network) is a
network of computers infected with a
malicious program that allows
cybercriminals to control the infected
machines remotely without the users’
Botnets: knowledge.
The Fuel for • Your computer system maybe a part of a
Botnet even though it appears to be
Cybercrime operating normally.
• Botnets are often used to conduct a range of
activities, from distributing Spam and viruses
to conducting denial-of-service (DoS)
attacks.
1. Use antivirus and anti-Spyware software and keep it
up-to-date.
2. Set the OS to download and install security patches
automatically.
3. Use a firewall to protect the system from hacking
attacks while it is connected on the Internet.
Botnets 4. Disconnect from the Internet when you are away from
your computer.
(Continued) 5. Downloading the freeware only from websites that are
known and trustworthy
6. Check regularly the folders in the mail box – “sent
items” or “outgoing” – for those messages you did not
send.
7. Take an immediate action if your system is infected.
• An “attack vector” is a path or means by which an
attacker can gain access to a computer or to a
network server to deliver a payload or malicious
outcome.
• Attack vectors include viruses, E-Mail attachments,
webpages, pop-up windows, instant messages, chat
rooms, and deception.
• The most common malicious payloads are viruses,
Attack Vector Trojan Horses, worms, and Spyware.
• If an attack vector is thought of as a guided missile,
its payload can be compared to the warhead in the
tip of the missile.
• Payload means the malicious activity that the
attack performs.
• It is the bits that get delivered to the end-user at
the destination.
• The attack vectors described here are how
most of them are launched:
• Attack by E-Mail
• Attachments (and other files)
Attack Vector •
•
Attack by deception
Hackers
(Continued) • Heedless guests (attack by webpage)
• Attack of the worms
• Malicious macros
• Foistware (sneakware)
• Viruses
• Attack by E-Mail
• Content embedded in message or attachments.
• Attachments (and other files)
• Attachments install malicious code (Virus, trojan,
spyware)