What are Cyber Crimes?
According to the Indian Information Technology Act of 2000, cyber crimes encompass any illegal activities done in a highly sophisticated fashion in which an electronic device such as a computer or mobile phone is either the instrument or the target, or both. It is an illegal usage of the Internet.
Classification of Cyber Crimes
1. Hacking
Hacking is defined in Section 66 of the Information Technology Act of 2000 as "wrongful loss or harm to the public or any individual destroys or deletes or modifies any information contained in a computer resource or lowers its value or utility or affects it injuriously by any means."
In simple terms, it is the unauthorized access of information system and the one who does hacking is called the Hacker. And the one who does hacking with malicious intent is called Cracker.
Hackers are classified into 6 types. They are:
- White Hat Hackers / Ethical Hackers – They are often government-backed security professionals, information security analysts, penetration testers, and cybersecurity researchers who utilize their expertise to safeguard others.
- Eg: Tim Berners-Lee (Founder of World Wide Web), Linus Torvalds (Founder of Linux systems), Richard M. Stallman (Founder of the free software project GNU), etc
- Gray Hat Hackers – Hackers who break into systems for sometimes good or sometimes for evil purposes. Their goals are often good, but they do not always use ethical hacking techniques. They are a category that lies between the White hat and the black hat.
- Black Hat Hackers – They use their knowledge and expertise to gain unauthorized access to computer networks, exploit security flaws, and circumvent security protocols in order to swindle and extort others.
- Red Hat Hackers – They are known as the Robinhood of Cybersecurity. They use extreme sometimes illegal methods to go against Black Hats and destroy their servers.
- Blue Hat Hackers – Amateur hackers that hack for personal vengeance (uses doxxing, uploads personal data on public sites, etc.) or security experts who operate outside of the business (performs penetration testing and similar tests to assess vulnerabilities in the organization's cyberspace).
- Green Hat Hackers – Amateur hackers trying to master hacking techniques.
- Script kiddies – They are a subset of green hats who are less interested in studying hacking methods and more interested in obtaining scripts, malware, and other similar tools.
Hacking Methods Employed:
- Denial of Service (DoS)/Distributed Denial of Service (DDoS)
- Spoofing
- Phishing
- Malware
- Keylogger
- SQL Injection Attack
- Man-in-the-middle (MitM) attack
- Cross-Site Scripting
Denial of Service (DoS)/Distributed Denial of Service (DDoS)
- Email bombing – Sending massive amounts of email to a certain email address, causing the system to crash.
- Smurf Attack – The target computer's IP address is first spoofed and then flooded with series of ping messages.
Spoofing
- Email Spoofing – A hacker sends an email that has been altered to appear to have come from a reliable source like banks.
- Website/URL Spoofing – When a hacker develops a phony website/URL that appears to be real and the hacker then obtains your credentials when you log in with your username and password.
- IP Spoofing – It is a type of DDOS attack in which a hacker changes a packet's original IP address to a bogus one.
Phishing
- Spear phishing –a finely crafted email aimed at a specific person.
- Whaling – very targeted email; targets are generally executives, CEOs of large organizations, etc.
- Vishing – It is the phishing done by phone/voice calls.
- Smishing – The target gets an SMS with a link that appears to be a legitimate source like the bank, when you click the link and enter your login details, your data is stolen.
- Internal phishing – phishing attacks originating from within an organization.
- Social media phishing – Luring users to click on malicious links in Facebook, Twitter, or other social media posts.
- Pharming – redirecting users to malicious sites by compromising a DNS cache.
- Search Engine Phishing – Hackers create their own websites, which are then be indexed by the search engines and used to lure online shoppers with unbelievable offers and deals. When the shoppers click the buy link, they will be requested to input their bank information, and their data will be hijacked.
Malware
Keylogger
SQL Injection Attack
Man-in-the-middle (MitM) attack / Session Hijacking
Cross-Site Scripting (XSS)
2. Cyber Stalking (e-stalking / Cyber Bullying):
Cyberstalking is the electronic equivalent of stalking, i.e. harassing or threatening someone by any viable means. It has a significant mental and physical impact on the victim, and it is one of the world's fastest increasing forms of cybercrime.3. Cyber Trespass:
Obtaining unauthorized access to another person's computer for financial benefit without tampering with the contents of the victim's computer.4. Cyber Vandalism:
It entails destroying data on the victim's computer or network, as well as causing physical harm to the system.5. Cyber Defamation:
It is an act of impugning anybody to damage a person's dignity by hacking his email account and sending a large number of emails using filthy language to an unknown person's email account.6. Cyber Terrorism:
It is a hybrid of cybercrime and terrorism and may be described as the unlawful damage or disruption of digital property or other illegal actions carried out in physical or digital space to frighten or force governments or society into pursuing political, religious, or ideological aims.7. Web Jacking:
Redirecting users from a trusted website to a hacker created website.8. Identity Theft:
It happens when someone steals your identity and impersonates you in order to get access to resources such as credit cards, bank accounts, and other advantages under your name.9. Data Diddling:
It occurs when someone alters, delete, or counterfeits documents or data in the victim's computer.10. Intellectual Property Crimes:
Copyright Infringement,
- Trademarks Violations,
- Theft of Computer Source Code,
- Software Piracy: Unauthorized copying, replication, usage, manufacturing, and sale of legally protected software.
- Cyber Squatting: It is the practice of registering an internet domain that is similar to a well-known brand or individual and profiting from it.
For example, Amal Augustine of Kochi registered the name maxchanzuckerberg.org, which Facebook CEO Mark Zuckerberg purchased for $700, or like www.google.com and www.goooogle.com.
11. Salami Attacks: Tiny attacks that pile up to one large attack that can go unnoticed, with the hacker siphoning out small quantities of money, which is most commonly found in the financial industry.
- World Computer Security Day – November 30.
- World Intellectual Property Day – April 26.
- First Computer in India was installed at – Indian Statistical Institute, Calcutta (1955).
- Internet services were launched in India – August 15, 1995 (by Videsh Sanchar Nigam Limited).
- Father of Cybersecurity – Bob Thomas.
- Father of Cyber Criminology – Karuppannan Jaishankar.
- First Cyber Forensic Laboratory – Tripura.
- First cybercrime in the World was registered against – Joseph Marie Jacquard.
- First cybercrime in India was registered against – Arif Asim.
- First Cyber Police Station in India – Bangalore.
- The first cyber police station in Kerala was in – Pattom, Thiruvananthapuram (2009). (Previous PSC Questions: Executive Officer Grade IV, Malabar Devasom Board, 2018)
- The Asian school of cyber laws is situated in – Pune (Maharashtra).
- Cyber State of India – Andhra Pradesh.
- First Cyber Post Office in India – Chennai.
- First Cyber crime Prevention Unit in India – AASHVAST (Gandhinagar, Gujarat).
- Inaugrated on – 10 January 2020.
- a helpline for the cyber crime victims.
- The district with the highest number of cyber crimes reported in Kerala in the year 2023 – Malappuram (26 cases).
- Author of 'Cyber Law: Crimes, Forensics and Cyber Security A171...Introductory Approach' – Raju Narayanaswami.
Post a Comment
Post a Comment