CYBERsecurity Module2
CYBERsecurity Module2
CYBERsecurity Module2
SECURITY
MODULE -2
A cybercriminal is a person who uses his skills in technology to do malicious acts and illegal activities
known as cybercrimes. They can be individuals or teams.
Different reasons for the big increase in cybercrimes:
- Vulnerable devices:
The lack of efficient security measures and solutions introduces a wide range of vulnerable devices
which is an easy target for cybercriminals.
- Personal motivation:
Cybercriminals sometimes commit cybercrimes as a kind of revenge against someone they hate or have
any problem with.
- Financial motivation:
The most common motivation of cybercriminals and hacker groups, most attacks nowadays are
committed to profit from it.
Two Main Types of Cyber Crimes
- Targeting computers
This type of cybercrimes includes every possible way that can lead to harm to computer devices for
example malware or denial of service attacks.
- Using computers
This type includes the usage of computers to do all the classifications of computer crimes.
Classifications of Cybercrimes
Cybercrimes in general can be classified into four categories:
3. Property Cybercrimes:
This type targets property like credit cards or even intellectual property rights.
4. Society Cybercrimes:
This is the most dangerous form of cybercrime as it includes cyber-terrorism.
TYPE 1- Where computer is the target of Criminal Activity A.
A. unauthorized access (hacking)
Unauthorized access is when someone gains access to a website, program, server, service, or other system using
someone else's account or other methods. For example, if someone kept guessing a password or username for an
account that was not theirs until they gained access, it is considered unauthorized access.
Unauthorized access could also occur if a user attempts to access an area of a system they should not be
accessing. When attempting to access that area, they would be denied access and possibly see an unauthorized
access message.
Some system administrators set up alerts to let them know when there is an unauthorized access attempt, so that
they may investigate the reason. These alerts help stop hackers from gaining access to a secure or confidential
system. Many secure systems may also lock an account with too many failed login attempts.
B. Malicious Code
A malicious code attack refers to the deployment of harmful software or scripts designed to cause unwanted
outcomes, compromise security, or inflict damage on a system. This broad category encompasses various cyber
threats such as viruses, worms, Trojans, backdoors, and malicious active content.
1.Virus
A computer virus is a type of malicious software, or malware, that spreads between computers and causes damage
to data and software.
Computer viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage. A key
thing to know about computer viruses is that they are designed to spread across programs and systems. Computer
viruses typically attach to an executable host file, which results in their viral codes executing when a file is opened. The
code then spreads from the document or software it is attached to via networks, drives, file-sharing programs, or
infected email attachments.
Common Signs of Computer Viruses
Speed of System
A computer system running slower than usual is one of the most common signs that the device has a virus. This
includes the system itself running slowly, as well as applications and internet speed suffering. If a computer does not
have powerful applications or programs installed and is running slowly, then it may be a sign it is infected with a
virus.
Pop-up Windows
Unwanted pop-up windows appearing on a computer or in a web browser are a telltale sign of a computer virus.
Unwanted pop-ups are a sign of malware, viruses, or spyware affecting a device.
Programs Self-executing
If computer programs unexpectedly close by themselves, then it is highly likely that the software has been infected
with some form of virus or malware. Another indicator of a virus is when applications fail to load when selected from
the Start menu or their desktop icon. Every time that happens, your next step should be to perform a virus scan and
remove any files on programs that might not be safe to use.
.
Accounts Being Logged Out
Some viruses are designed to affect specific applications, which will either cause them to crash or force the user to
automatically log out of the service.
2. Trojan
A Trojan horse is a type of program that pretends to be something it is not to get onto a device and infect it with malware.
Therefore, a Trojan horse virus is a virus disguised to look like something it is not. For example, viruses can be hidden
within unofficial games, applications, file-sharing sites, and bootlegged movies.
3. Logic bombs
Logic bombs are malicious code segments embedded within legitimate software that activate under specific
conditions, such as a certain date or event. Once triggered, logic bombs can cause significant damage, including
data corruption, system crashes, or the deletion of crucial files.
For example, a programmer may hide a piece of code that starts deleting files (such as a salary database
trigger), should they ever be terminated from the company.
4. computer worm
A computer worm is a subset of the Trojan horse malware that can propagate or self-replicate from
one computer to another without human activation after breaching a system. Typically, a worm
spreads across a network through your Internet or LAN (Local Area Network) connection.
The malware is known as "Android Worm" enters users' phone as a message and then infects their
contact list without them knowing anything about it. WhatsApp is often used by cybercriminals to send
infected messages to users and get access to their sensitive information or disable their account
completely
Cybercriminals frequently use Facebook and Facebook Messenger to spread viruses, worms, and other
malware. Most popularly, they hijack user accounts and spam their friends list with links leading to malicious
domains
How does a computer worm spread?
Phishing: Fraudulent emails that look authentic can carry worms in corrupt attachments. Such emails may
also invite users to click malicious links or visit websites designed to infect users with worms.
Spear-Phishing: Targeted phishing attempts can carry dangerous malware like ransomware cryptoworms.
Networks: Worms can self-replicate across networks via shared access.
Security holes: Some worm variants can infiltrate a system by exploiting software vulnerabilities.
File sharing: P2P file networks can carry malware like worms.
Social networks: Social platforms like MySpace have been affected by certain types of worms.
Instant messengers (IMs): All types of malware, including worms, can spread through text messages and IM
platforms such as Internet Relay Chat (IRC).
C. Interrupting of Computer Services
1.disrupting computer service
Malicious software that is created and deployed with the intent of damaging and disrupting critical
business functions. The most frequent example, Ransomware, is used by cyber criminals to
cryptographically lock and hold files and/or access to computer resources for a monetary ransom.
Additional forms of disruptive malware include cryptojacking or using an unauthorized computer to mine
cryptocurrency, and any unauthorized software that enables unauthorized control, degradation, or loss of
service to a system or computing resource. Disruptive Malware can have a long and lasting effect on
business operations.
2. Denying of Computer Service
denial of service attack (DoS attack), type of cybercrime in which an Internet site is made unavailable,
typically by using multiple computers to repeatedly make requests that tie up the site and prevent it from
responding to requests from legitimate users.
Distributed DoS (DDoS) attacks are a special kind of hacking. A criminal salts an array of computers with
computer programs that can be triggered by an external computer user. These programs are known as
Trojan horses since they enter the unknowing users’ computers as something benign, such as a photo or
document attached to an e-mail. At a predesignated time, this Trojan horse program begins to send
messages to a predetermined site. If enough computers have been compromised, it is likely that the
selected site can be tied up so effectively that little if any legitimate traffic can reach it
D.Theft and Misuse of Services Most Common Cyber Crimes
2. Identity Theft
Identity theft occurs when a cybercriminal uses another person’s personal data like credit card numbers or
personal pictures without their permission to commit a fraud or a crime.
3. Ransomware Attack
Ransomware attacks are a very common type of cybercrime. It is a type of malware that has the capability to
prevent users from accessing all of their personal data on the system by encrypting them and then asking for a
ransom in order to give access to the encrypted data.
4.Military Service
Stuxnet was a worm that attacked the Iranian nuclear program. It is among the most sophisticated cyber
attacks in history. The malware spread via infected Universal Serial Bus devices and targeted data acquisition
and supervisory control systems. According to most reports, the attack seriously damaged Iran’s ability to
manufacture nuclear weapons.
5.Copyright Infringement
Copyright infringement is the use or production of copyright-protected material without the permission of the
copyright holder. Copyright infringement means that the rights afforded to the copyright holder, such as the
exclusive use of a work for a set period of time, are being breached by a third party. Music and movies are two of
the most well-known forms of entertainment that suffer from significant amounts of copyright infringement.
6.Intellectual Copy Right
The IPR protects these works both in tangible and intangible form. Patent, Copyright, Trademarks,
Trade Secrets, Industrial and Layout Designs, Geographical Indications are intellectual property rights
for which legal remedies are available even for online infringements.
7. Counterfeiting and Forgery
Until recently, creating passable currency required a significant amount of skill and access to technologies
that individuals usually do not own, such as printing presses, engraving plates, and special inks. The advent
of inexpensive, high-quality colour copiers and printers has brought counterfeiting to the masses. Ink-jet
printers now account for a growing percentage of the counterfeit currency confiscated by the U.S. Secret
Service. In 1995 ink-jet currency accounted for 0.5 percent of counterfeit U.S. currency; in 1997 ink-jet
printers produced 19 percent of the illegal cash. By 2014 almost 60 percent of the counterfeit money
recovered in the U.S. came from ink-jet printers. The widespread development and use of computer
technology prompted the U.S. Treasury to redesign U.S. paper currency to include a variety of
anticounterfeiting technologies. The European Union currency, or euro, had security designed into it from the
start. Special features, such as embossed foil holograms and special ribbons and paper, were designed to
make counterfeiting difficult.
B. Unauthorized alteration of data
1. Identity Theft
Identity theft is the crime of obtaining the personal or financial information of another person to use their
identity to commit fraud, such as making unauthorized transactions or purchases. Identity theft is
committed in many different ways and its victims are typically left with damage to their credit, finances, and
reputation.
2.cyber fraud
Cyber fraud, also known as online fraud or internet fraud is a crime in which someone uses the internet to
steal money. Fraudsters can target the individual and contact them via SMS, call, email, or other ways to get
personal information or send the malicious link to apps or websites to hack into the computer, mobile device,
or network to get sensitive information, such as bank account numbers, credit card details, social security
numbers, and personal information.
6.Stock market manipulation is conduct or technique used by stock market entities to fool the
investors by artificially affecting the prices of securities. These entities undertake various measures to
falsely increase or decrease the demand for the securities to represent them as a profitable
investment even when they know securities to be fundamentally flawed. Almost all the entities indulge
in market manipulation for personal gains and exit their positions when their predetermined goals are
achieved.
Cyber harassment is a threat via the use of digital technologies. It can take place on social media, messaging
platforms and cell phones. It is a repeated behavior, aimed at threatening, scaring, shaming, and silencing
those who are targeted.
Type of cyber harassment
Cyber-intimidation and harassment fall into one or more of the following categories:
Harassment and stalking: repeatedly sending threats or hurtful messages via messaging platforms or phone
calls.Outing and trickery: engaging someone in instant messaging, tricking him or her into revealing personal and
sensitive information.
Denigration: sending or posting gossip or rumours about a person to damage his or her reputation, friendships or to
disadvantage his or her social inclusion.
In Cyber Stalking, a cyber criminal uses the internet to consistently threaten somebody. This crime is often
perpetrated through email, social media, and the other online medium
Social engineering attacks happen in one or more steps. A perpetrator first investigates the intended
victim to gather necessary background information, such as potential points of entry and weak security
protocols, needed to proceed with the attack. Then, the attacker moves to gain the victim’s trust and
provide stimuli for subsequent actions that break security practices