Unit 1: Cyber Crime – Introduction
- History and Development
- Definition, Nature and Extent of Cyber Crimes in India and other countries
- Classification of Cyber Crimes
- Trends in Cyber Crimes across the world
- History and Development:
- Overview: Understanding the evolution of cybercrime is crucial for effective cyber forensics.
- Example: The first computer virus, “Creeper,” appeared in the early 1970s, marking the beginning of cyber threats.
- In 1971, a computer programmer named Bob Thomas created the first-ever computer virus, Creeper. This experiment in self-duplicating code was named after a character from the popular Scooby-Doo cartoon show.
- Definition, Nature, and Extent of Cyber Crimes in India and other countries:
- Definition: Cybercrime involves criminal activities carried out using digital technologies.
- Nature: Varied, including hacking, identity theft, and online fraud.
- Extent in India: Growing with increased internet penetration and digital dependence.
- Classification of Cyber Crimes:
- Crimes against Individuals: Examples include online harassment, cyberbullying, and identity theft.
- Crimes against Property: Ransomware attacks, and unauthorized access to systems.
- Crimes against Government: Cyber espionage, attacks on critical infrastructure.
- Crimes against Society: Spread of fake news, cyber terrorism.
- Trends in Cyber Crimes across the World:
- Ransomware Attacks: Growing trend, affecting individuals and organizations globally.
- Social Engineering: Manipulating individuals for unauthorized access, is a prevalent technique.
- IoT Exploitation: With the rise of connected devices, cybercriminals exploit vulnerabilities.
- Nation-State Attacks: Governments engaging in cyber espionage for political or economic gain.
Unit 2: Forms of Cyber Crimes, Frauds
- Hacking
- Cracking
- DoS – viruses, worms
- Bombs – logical bombs, time bombs, email bombing
- Data diddling
- Salami attacks
- Phishing
- Steganography
- Cyberstalking
- Spoofing
- Pornography
- Defamation
- Computer vandalism
- Cyber terrorism
- Cyber warfare
- Crimes in social media
- Malware, adware, scareware, ransomware
- Social engineering
- Credit card frauds & financial frauds
- Telecom frauds
- Cloud-based crimes – understanding fraudulent behaviour
- Fraud triangle
- Fraud detection techniques
- Intellectual Property Rights and Violation of Intellectual Property Rights
- E-commerce Fraud and other forms
- Hacking:
- Definition: Unauthorized access to computer systems or networks.
- Example: A hacker gaining unauthorized access to a company’s database to steal sensitive information.
- Cracking:
- Overview: Modification of software to remove restrictions.
- Example: Cracking a software license code to use it without proper authorization.
- Phishing:
- Definition: Deceptive attempts to acquire sensitive information.
- Example: Fake emails pretending to be from a bank, tricking users into revealing login credentials.
- Steganography:
- Overview: Concealing information within digital media.
- Example: Hiding a message within an image file to evade detection.
- Cyber Stalking:
- Definition: Persistent online harassment or tracking of an individual.
- Example: Constantly sending threatening messages or monitoring someone’s online activities.
- Pornography:
- Cyber Pornography: Illicit distribution of explicit content online.
- Example: Sharing explicit content without consent.
- Defamation:
- Online Defamation: False statements harming an individual’s reputation.
- Example: Posting false accusations about someone on social media.
- Computer Vandalism:
- Definition: Malicious destruction of computer or network functionality.
- Example: Distributing malware that damages system files.
- Cyber Terrorism:
- Definition: Using technology to advance political or ideological goals.
- Example: Launching cyber attacks to disrupt critical infrastructure.
- Cyber Warfare:
- Overview: Nation-state conflicts in the digital realm.
- Example: State-sponsored attacks on another country’s military systems.
- Cloud-based Crimes – Understanding Fraudulent Behavior:
- Overview: Illicit activities exploiting vulnerabilities in cloud services.
- Example: Unauthorized access to sensitive data stored in a cloud server.
- Fraud Detection Techniques:
- Data Analytics: Analyzing patterns to identify anomalies.
- Example: Monitoring unusual transaction patterns to detect potential fraud.
- Intellectual Property Rights and Violation of Intellectual Property Rights:
- Overview: Protecting creations of the mind.
- Example: Software piracy infringing on copyrights.
Malware, Adware, Scareware, Ransomware:
-
- Malware: General term for malicious software.
- Example: Ransomware encrypting files and demanding payment for decryption.
Virus
- System or Boot Record Infectors
- Polymorphic Virus
- Stealth Virus
Trojan
Worm
RansomWare
- WannaCry Ransomware
- Locker Ransomware
- Crypto Ransomware
Scareware
Leakware
Bombs – Logical Bombs, Time Bombs, Email Bombing:
- Logical Bomb: Malicious code triggered by a specific event.
- Example: Code designed to erase files when a specific condition is met.
- Logical Bomb
- Time Bomb
- Email Bombing
Backdoor
- Bots/Botnets
- Adware
- Keyloggers
- Email Bomb
- Salami Attacks
- Overview: Stealthy theft of small amounts to avoid detection.
- Example: Skimming small amounts from financial transactions over time.
- Denial of Service Attacks
- Denial of Service (DoS): Overloading a system to make it unavailable.
- Example: A flood of traffic overwhelming a website to make it crash.
- Data Diddling
- Definition: Unauthorized alteration of data.
- Example: Manipulating financial records to embezzle funds.
Social Media Crime
- Cyber Defamation
- Cyber Terrorism
- Cyber Warfare
- Cyber Trespass and Steganography
Spoofing
- Overview: Faking identity or data to deceive.
- Example: IP Spoofing to make it appear that network traffic is coming from a trusted source.
- APR Spoofing
- IP Spoofing
- URL or Website Spoofing
- Text Message Spoofing
- Email Spoofing
Inside Threat
- The Mole
- The Moonlighter
- Disloyal Insider
- Naive Insider
- The Saboteur
- Careless Insider
- Accidental/un-intentional Insider
- Malicious Insider
Social Engineering
- Overview: Manipulating individuals to divulge confidential information.
- Example: Posing as IT support to trick users into revealing passwords.
- Direct Human Interaction
- Impersonation
- Shoulder Surfing
- Dumpster Diving
- Eavesdropping
- Vishing
- Tailgating
- Quid pro Quo
- Indirect Human Interaction
- Phishing
- Baiting
- Pretexting
- Water Holing
- Pop-up Window
Social Media Crimes
- Harassment and Bullying: Targeting individuals on social platforms.
- Example: Spreading false rumours about someone on a social media platform.
-
- Identity Theft
- Obscene Content
- Cyberbullying
- Burglary via Social Networking
- Cyber Casing
- Online Job Portal
Fraud Triangle
- Elements: Opportunity, Motivation, Rationalization.
- Example: An employee exploiting a weak internal control system for personal gain.
- Perceived Pressure
- Opportunity
- Rationalization
Credit Cards
Credit Card Frauds: Unauthorized use of credit card information.
Example: Making online purchases using stolen credit card details.
- ATM Card Skimming
- Lost or Stolen Cards
- Synthetic Fraud
- Merchant Collusion
- Phishing
Financial Frauds
- Lottery Fraud/Nigerian Fraud
- Financial Frauds using Social Media Platforms
- Courier Delivery Fraud
- Scam through QR Code Scan
- Fake Loan Websites / App Frauds
- Online Job Fraud
- Vishing
Telecom Frauds
- Overview: Frauds related to telecommunication services.
- Example: Cloning SIM cards to make unauthorized calls.
- Wangiri Fraud
- SIM Jacking / SIM Swapping
- Virtual SIM Cards
- Combined Attacks
- AI-enabled Telecom Fraud
E-Commerce Frauds
- E-commerce Frauds: Deceptive practices in online transactions.
- Example: False advertising or non-delivery of purchased goods.
- Transaction Fraud
- Chargeback Fraud / Malicious-friendly Fraud
- Return Fraud: Switch fraud, Bricking, Inventory depletion
- Wardrobing
- Triangulation Fraud
- Bonus Abuse Fraud
Intellectual Property Crimes
Forgery
Data Espionage
Unit 3: Modus Operandi of various cybercrimes and frauds
- Definition of various types of cyber frauds
- Modus Operandi
- Fraud triangle
- Fraud detection techniques including data mining and statistical references
- Countermeasures
- Definition of Various Types of Cyber Frauds:
- Pharming: Redirecting website traffic to fraudulent sites.
- Identity Theft: Acquiring personal information to impersonate an individual.
- Online Auction Fraud: Deceptive practices in online auctions.
- Credit Card Skimming: Illegally collecting credit card information during transactions.
- Modus Operandi:
- Phishing: Sending fake emails or messages to trick individuals into revealing sensitive information.
- Spoofing: Faking identities or data to deceive victims.
- Ransomware: Encrypting files and demanding payment for decryption.
- Social Engineering: Manipulating individuals into divulging confidential information.
- Fraud Triangle:
- Opportunity: Conditions enabling the fraud to occur.
- Motivation: Incentives or pressures to commit fraud.
- Rationalization: The justification or excuse for committing fraud.
- Fraud Detection Techniques Including Data Mining and Statistical References:
- Data Mining: Analyzing large datasets to identify patterns or anomalies.
- Statistical References: Establishing baselines and detecting deviations from the norm.
- Behavioural Analysis: Monitoring individual or system behaviour for unusual patterns.
- Countermeasures:
- Encryption: Protecting data by converting it into a coded format.
- Multi-Factor Authentication: Adding layers of authentication for enhanced security.
- Regular Audits: Periodic assessments of systems and processes to identify vulnerabilities.
- Employee Training: Educating personnel to recognize and avoid cyber threats.
- Incident Response Plan: Preparing for and responding to cyber incidents in an organized manner.
Unit 4: Profile of Cyber Criminals
- Cyber Crime Psychology
- Psychological theories dealing with cybercriminals
- Cyber Crime Psychology:
- Overview: Understanding the psychological aspects of cybercriminals is crucial for effective profiling and prevention.
- Motivations: Range from financial gain to ideological or personal satisfaction.
- Anonymity: The digital realm provides a sense of anonymity, influencing behaviour.
- Psychological Theories Dealing with Cybercriminals:
- Routine Activity Theory: Cybercriminals exploit the opportunities presented by the routine activities of individuals online.
- Social Learning Theory: Behavior is learned through observation, and cybercriminals may acquire skills and techniques through online communities.
- Neutralization Theory: Cybercriminals may use neutralization techniques to justify their actions, such as rationalizing that their victims deserve it.
- Profile of Cyber Criminals:
- Individual Actors: Independent hackers or enthusiasts driven by personal motives.
- Organized Groups: Criminal organizations or state-sponsored actors engaging in sophisticated cyber activities.
- Insiders: Individuals within organizations exploit their access for malicious purposes.
- Hacktivists: Individuals or groups using cyber techniques to advance political or social causes.
- Psychological Traits of Cyber Criminals:
- High Intelligence: Many cybercriminals possess advanced technical skills.
- Lack of Empathy: Some cybercriminals exhibit a disregard for the impact of their actions on victims.
- Thrill-Seeking Behavior: The challenge and excitement of cyber attacks can attract certain individuals.
- Opportunistic Nature: Exploiting vulnerabilities and opportunities for personal gain.
- Motivations Behind Cyber Crimes:
- Financial Gain: Stealing sensitive information, conducting ransomware attacks, or engaging in fraud.
- Ideological Motives: Hacking for political or social causes, often associated with hacktivism.
- Personal Satisfaction: Some cybercriminals are motivated by the thrill of outsmarting security measures.
- Revenge or Retaliation: Targeting individuals or organizations as a form of retaliation.
- Cyber Crime Psychology in Investigations:
- Behavioural Analysis: Profiling based on behavioural patterns to identify potential suspects.
- Digital Forensics: Examining digital evidence to understand the actions and motivations of cybercriminals.
- Interview and Interrogation Techniques: Tailoring approaches based on psychological traits to elicit information.
- Preventive Measures Based on Cyber Crime Psychology:
- User Education: Raising awareness about online risks and promoting responsible online behaviour.
- Psychological Profiling: Developing profiles to identify potential threats and vulnerabilities.
- Employee Wellness Programs: Addressing psychological stressors that might lead to insider threats.
- Ethical Hacking Training: Encouraging ethical hacking to channel technical skills in a positive direction.
Unit 5: Impact of cybercrimes
- To the individual
- To the corporate companies
- To the government and the nation
- To the Individual:
- Financial Loss: Individuals may suffer monetary losses through online fraud and identity theft.
- Privacy Invasion: Cybercrimes can compromise personal information, leading to privacy breaches.
- Emotional Distress: Victims may experience stress, anxiety, or fear due to the violation of personal space.
- Reputation Damage: Online defamation or harassment can harm an individual’s reputation.
- To Corporate Companies:
- Financial Losses: Cyber attacks can result in substantial financial losses, including theft of intellectual property and trade secrets.
- Operational Disruption: Ransomware attacks or DDoS incidents can disrupt normal business operations.
- Reputation Damage: A data breach can erode trust, impacting the company’s brand and customer loyalty.
- Legal Consequences: Non-compliance with data protection laws may lead to legal actions and penalties.
- To the Government and the Nation:
- National Security Threats: Cyber attacks on critical infrastructure pose risks to national security.
- Economic Impact: Cybercrimes can have a cascading effect on the economy, affecting businesses and employment.
- Intellectual Property Theft: Nation-states engaging in cyber espionage can steal valuable intellectual property.
- Social and Political Consequences: Disinformation campaigns or cyber-attacks during elections can undermine democracy.
- Impact on Law Enforcement:
- Resource Strain: The increasing complexity of cybercrimes demands additional resources for law enforcement agencies.
- Global Collaboration: Cybercrimes often transcend borders, requiring international cooperation for effective investigation and prosecution.
- Technological Challenges: Staying ahead of rapidly evolving cyber threats requires continuous training and technological upgrades.
- Social Consequences:
- Trust Erosion: Widespread cybercrimes can erode trust in online platforms and digital services.
- Digital Divide: Unequal access to cybersecurity measures may exacerbate social and economic disparities.
- Fear and Uncertainty: A high prevalence of cybercrimes can create a climate of fear and uncertainty among the general population.
- Mitigation Strategies:
- Cybersecurity Education: Raising awareness and educating individuals, businesses, and government entities about cyber threats.
- Incident Response Plans: Developing and regularly testing plans to respond effectively to cyber incidents.
- International Cooperation: Collaborating with other nations to share threat intelligence and coordinate responses.
- Regulatory Frameworks: Implementing and enforcing robust cybersecurity regulations to protect individuals, companies, and national interests.