Unit 1 Introduction to Cyber Security
Unit 1 Introduction to Cyber Security
commission of crime”
Introduction to Cyber Security
Cybercrime and Origins of the World
Cybercrime is,
» Any illegal act where a special knowledge of computer technology is essential for its perpetration,
investigation or prosecution
» Any traditional crime that has acquired a new dimension or order of magnitude through the aid of a
computer, and abuses that have come into being because of computers
» Any financial dishonesty that takes place in a computer environment
» Any threats to the computer itself, such as theft of hardware or software, sabotage and demands for
ransom.
» The term “cybercrime” relates to a number of other terms such as:
Introduction to Cyber Security
Cybercrime and Origins of the World
Computer-
Internet
related E-crime
crime
crime
Computer High-tech
crime crime
Introduction to Cyber Security
Cybercrime and Origins of the World
1. Techno-crime: A premeditated act against a system or systems, with the intent to copy, steal,
prevent access, corrupt or otherwise deface or damage parts of or the complete computer
system.
Child Pornography/ Child sexually abusive material (CSAM) refers to material containing
sexual image in any form, of a child who is abused or sexually exploited.
CSAM Section 67 (B) of IT Act states it to be a punishable offense
Debit/Credit Card An unauthorized use of another's credit or debit card information for
Fraud the purpose of purchases or withdrawing funds from it
Impersonation and Fraudulently making use of the electronic signature, password or any
identity theft other unique identification feature of any other person
Introduction to Cyber Security
Types of Cybercrime
Espionage is the act or practice of obtaining data and information without the
Espionage permission and knowledge of the owner
For anyone trying to compile data on business impact of cybercrime, there are number of challenges.
» Organizations do not explicitly incorporate the cost of the vast majority of computer security incidents into
their accounting
» Difficulty in attaching a quantifiable monetary value to the corporate data and yet corporate data get
stolen/lost
» Organizations abstain from revealing facts and figures about “security incidents” including cybercrime
» Organizations perception about “insider attacks” seems to be different than that made out by security
solution vendor
» Awareness about “data privacy” too tends to be low in most organizations
Cybercrime is defined as “an act or the
commission of an act that is forbidden, or
the omission of a duty that is commanded
by a public law and that makes the
offender liable to punishment by that
law”
Introduction to Cyber Security
Classifications of Cybercrime
Crimes
Cybercrime
emanating from
against
Usenet
Society
newsgroup
Introduction to Cyber Security
Classifications of Cybercrime
1. Cybercrime against individual crimes that are committed by the cyber criminals
against an individual or a person. A few cyber crimes against individuals are
(iii) Cyber Defamation : This occurs when defamation takes place with the help of
computers and/or the Internet. E.g. someone publishes defamatory matter about
someone on a website or sends e-mails containing defamatory information.
(iv) Harassment & Cyber stalking : Cyber Stalking Means following an individual's
activity over internet. It can be done with the help of many protocols available
such as e- mail, chat rooms, user net group
Introduction to Cyber Security
Classifications of Cybercrime
(i) Credit Card Fraud : This generally happens if someone gets to know the credit card
number or the card gets stolen
(iii) Internet time theft: This happens by the usage of the Internet hours by
an unauthorized person which is actually paid by another person
Introduction to Cyber Security
Classifications of Cybercrime
(i) Forgery: Currency notes, revenue stamps, mark sheets etc. can be
forged using computers and high quality scanners and printers
(iii) Web Jacking: Hackers gain access and control over the website of
another, even they change the content of website for fulfilling
political objective or for money
Introduction to Cyber Security
Classifications of Cybercrime
Precaution Perseverance
Introduction to Cyber Security
Summary
» Classifications of cybercrime
» Cybercrime and the Indian ITA – 2000
Introduction to Cyber Security
Introduction to Cyber Security
Reference
https://www.javatpoint.com/types-of-cyber-attacks
https://www.ques10.com/p/49005/classifications-of-cybercrime-1/
http://www.edtechnology.in/cyber-crime-and-laws/classifications-of-cybercrime/
https://www.lawyersclubindia.com/articles/classification-of-cybercrimes--1484.as
p