mod 1
mod 1
UNIT – II 08 Hours
Cyber Offenses: How Criminals Plan Them: Introduction, How criminals plan the attacks, Social
Engineering, Cyber Stalking, Cyber cafe & cybercrimes. Botnets: The fuel for cybercrime, Attack
Vector. Textbook:1 Chapter 2 (2.1 to 2.7)
Tools and Methods used in Cybercrime: Introduction, Proxy Servers, Anonymizers, Phishing,
Password Cracking, Key Loggers and Spyways, Virus and Worms, Trozen Horses and Backdoors,
Steganography, DoS and DDOS Attackes, Attacks on Wireless networks. Textbook:1 Chapter 4
(4.1 to 4.9, 4.12)
UNIT – IV 08 Hours
Phishing and Identity Theft: Introduction, methods of phishing, phishing, phising techniques,
spear phishing, types of phishing scams, phishing toolkits and spy phishing, counter measures,
Identity Theft Textbook:1 Chapter 5 (5.1. to 5.3)
UNIT – V 08 Hours
and will almost always leave an electronic 'calling card' to ensure that
their pseudonym identity is known.
Techno – vandalism: Passive attack
Techno Vandalism is a term used to describe a hacker or cracker who
breaks into a computer system with the sole intent of defacing and or
destroying its contents.
Techno Vandals can deploy 'sniffers' on the Internet to locate soft
(insecure) targets and then execute a range of commands using a variety
of protocols towards a range of ports. If this sounds complex - it is! The
best weapon against such attacks is a firewall which will hide and
disguise your organization's presence on the Internet.
1.3 Cybercrime and information security
Lack of information security give rise to
cybercrime
Cybersecurity: means protecting
information, equipment, devices, computer,
computer resource, communication device
and information stored therein from
unauthorized access, use, disclosure,
disruption, modification or destruction.
Challenges for securing data in business
perspective
Cybercrime occupy an important space in
information security due to their impact.
Most organizations do not incorporate the cost
of the vast majority of computer security
incidents into their accounting
The difficulty in attaching a quantifiable
monetary value to the corporate data and yet
corporate data get stolen/lost
Financial loses may not be detected by the
victimized organization in case of Insider
attacks : such as leaking customer data
Cybercrime trends over years
1.4 Who are Cybercriminals?
Are those who conduct acts such as:
Child pornography
Credit card fraud
Cyberstalking
Defaming another online
Gaining unauthorized access to computer
systems
Ignoring copyrights
Software licensing and trademark protection
Overriding encryption to make illegal copies
Software piracy
Stealing another’s identity to perform criminal
acts
Categorization of Cybercriminals
Type 1: Cybercriminals- hungry for
recognition
Hobby hackers
A person who enjoys exploring the limits of
what is possible, in a spirit of playful cleverness.
May modify hardware/ software
IT professional(social engineering):
Ethical hacker