CSL UT-1 Q.paper Solution
CSL UT-1 Q.paper Solution
Q.1 a) Explain How criminal plan the attacks with examples ? [10]
5. Criminals use many methods and tools to locate the vulnerabilities of their
targets.
6. The target can be an individual or organization.
7. Criminals plan passive and active attacks.
8. Active attacks are used to alter the system whereas passive attacks attempt to
gain information about the target.
9. Attacks can be either from inside or outside.
The following phases are involved in planning cybercrime.
1. Reconnaissance:
b) It is an act of reconnoitering-explore, often with the goal of finding
something or somebody.
c) In the world of hacking reconnaissance phase begins “Footprinting”- this is
the preparation toward pre-attack phase, and involves accumulating data
about the target’s environment and computer architecture to find ways to
intrude into that environment.
d) Footprinting gives an overview about system vulnerabilities and provides a
judgment about their possible exploitation.
e) The objective of this preparatory step is to understand the system, its
networking ports and services.
f) An attacker attempts to gather information in two phases active and passive.
2. Passive attacks:
b) A passive attack involves gathering information about a target without his/her
knowledge.
c) It can be done using search engines.
3. Active attacks:
An active attack involves probing the network to discover individual hosts to
confirm the info gathered in the passive attack phase.
It involves the risk of detection.
It can provide confirmation to an attacker about security measures in place
but the process can also the chance of being caught or raise a suspicion.
2) Spamming:
People who create electronic spam are called spammers.
Spam is the abuse of electronic messaging systems to send unsolicited bulk
messages indiscriminately.
E-mail spam is the most widely recognized spam.
There are various other spam instant messaging spam, UseNet newsgroup
spam, spam blogs etc.
Spamming is difficult to control because it has economic (feasibility)-
advertisers have no operating costs beyond the management of their mailing
lists, and it is difficult to senders accountable for their mass mailings.
3)Cyber defamation:
Defamation is the act in which, words either spoken or intended to be read, or
by signs or by visible representations any allegation concerning any person
intending to harm the reputation of that person Cyber defamation happens
when defamation takes place with the help of computers and/or internet.
For eg. Some one publishes defamatory matter about someone on website or
sends an e-mail containing defamatory information to all friends of that
person.
Libel is written defamation and slander is oral defamation.
6) Data diddling:
A data diddling attack involves altering raw data just before it is processed by
a computer and then changing it back after the processing is completed.
Electricity boards in India have been victims to data diddling programs when
private parties computerize their systems.
7)Forgery:
Counterfeit currency notes, postage and revenue stamps, mark sheets etc. can
be forged using sophisticated computers, printers and scanners.
Outside many colleges there are many miscreants soliciting sale of fake mark
sheets or even degree certificates.
8) Web jacking:
Web jacking occurs when someone forcefully takes control of a website.
The first stage involves password sniffing.
The actual owner of the website does not have any control over what appears
on that website.
The advent of Google groups and its large UseNet archive has made UseNet
more attractive to spammers than ever.
Spamming of Usenet newsgroups actually predates e-mail spam.
The first widely recognized UseNet spam titled “Global alert for all: Jesus is
coming soon” was posted on 18 th Jan 1994
11) Hacking:
There are few major types of crimes under the category of hacking: spoofing
websites and E- mail security alerts, hoax mails about virus threats, lottery
frauds and spoofing.
In spoofing websites and e-mail security fear, fraudsters create authentic
looking websites that are nothing but spoof.
It prompts the user to enter personal information which is then used to access
business and bank accounts.
Such links come embedded in e-mails In virus hoax(fraud) emails, the
warning may be genuine, so there is always a dilemma whether to take them
lightly or seriously.
Lottery frauds are typically letters or e-mails that inform the recipient that he
or she has won a prize in a lottery.
They take bank details to transfer money and they also ask for processing fee.
The details provided can easily be used for other scams.
Spoofing means illegal intrusion, wherein the hacker poses as a genuine
user(false identity).
13)Pornographic offense:
Child pornography means any visual depiction, including but not limited to
the following.
Any photograph that can be considered obscene and/or unsuitable for the age
of a child viewer.
Film, video, picture
Computer generated image or picture of sexually explicit conduct where the
production of such visual depiction involves the use of minor engaging in
sexually explicit conduct.
Child pornography is considered an offense.
Internet explosion has made children a viable victim to the cybercrime and
pedophiles.
Pedophiles are the people who physically or psychologically pressurize
minors to engage in sexual activities.
The modus operandi of pedophiles is as under:
Pedophiles use false identity to trap the children/teenagers.
They seek children/teens in the kids areas on the services where the children
gather.
They befriend them.
They extract children’s personal information by gaining their confidence.
They start mailing these children using sexually explicit language.
They start sending pornographic images/text in order to shed their inhibitions
so that a feeling is created in the mind of victim that what is being fed to
them is normal and that everybody do it.
At thee end of it the pedophiles set up a meeting with the child out of the
house and then drag them into the net to further sexually assault him as a sex
object.
Such things can be avoided if the parents are aware about it.
In most of the scenarios parents are unaware about the internet and the
hidden dangers of it.
Most children remain unprotected in cyber world.
19)Password sniffing:
Password sniffers are programs that monitor and record the name and
password of network
users as they login, jeopardizing security at a site.
Whoever installs the sniffer can then impersonate an authorized user and
login to access restricted documents.
Laws are not yet set up to adequately prosecute a person for impersonating
another person online.
Laws designed to prevent unauthorized access to information should be
implemented.
Q.2 a) Explain about the cybercrime and Indian ITA 2000. [10]
Cybercrime and the Indian ITA 2000:
In India the ITA 2000 was enacted after the United Nation General Assembly
Resolution in January 30, 1997.
Hacking and the Indian laws:
Cybercrime is punishable under two categories: the ITA 2000 and the IPC
b)Identify categories of cybercrime and explain it with examples. [10]
Categories of cybercrime:
Cybercrime can be categorized based on the following
1. The target of the crime and
2. Whether the crime occurs as a single event or as a series of event.
Cybercrime can be targeted against individuals, property and organizations
5. Series of events:
this involves attacker interacting with the victims repetitively.
For eg. attacker interacts with the victim on the phone or via chat rooms to
establish
relationship first and they exploit that relationship to commit sexual
assault(Cyberstalking).
Q.3 a) Write a short note on 1) Cyber Stalking 2) Cyber Cafe and Cybercrime [10]
Cyberstalking:
Cyberstalking has been defined as the use of information and
communications technology, particularly the internet, by an individual or a
group of individuals to harass another individual, group of individuals or
organization.
The behavior includes false accusation(blame),monitoring, transmission of
threats, ID theft, damage to data or equipment, solicitation of minors for
sexual purposes, and gathering info for harassment purposes.
Cyberstalking refers to the use of internet and other devices.
Types of stalkers:
There are primarily two types of stalkers:
1. Online stalkers:
They aim to start the interaction with the victim directly with the help of the
internet.
E-mail and chat rooms are the most popular communication medium to get
connected with the victim.
The stalker makes sure that the victim recognizes the attack attempted on
him/her.
The stalker can make the use of third party to harass the victim.
2. Offline stalkers:
The stalker may begin attacks using traditional methods such as following the
victim, watching the daily routine of the victim, visiting the person’s home or
business place.
Searching on message boards/newsgroups personal websites are the most
common ways of gathering info about the victim on internet about which
victim is not aware.
Cases reported on cyberstalking:
The majority of cyberstalkers are men and victims are women.
In many cases the cyberstalker and the victim hold a prior relationship, for
example, ex-lover, ex-spouse, boss/subordibnate and neighbour or strangers.
Example:
The Delhi Police has registered India’s First Case of Cyberstalking. One Mrs.
Khanna(namechanged)complained to the police against the a person who was using
her identity to chat over the Internet at the website www.mirc.com, mostly in the
Delhi channel for four consecutive days. Mrs. Khanna further complained that the
person was chatting on the Net, using her name and giving her address and was
talking obscene language. The same person was also deliberately giving her
telephone number to other chatters encouraging them to call Mrs. Khanna at odd
hours. Consequently, Mrs Khanna received almost 40 calls in three days mostly at
odd hours from as far away as Kuwait, Cochin, Bombay and Ahmedabad. The said
calls created havoc in the personal life and mental peace of Mrs. Khanna who
decided to report the matter.
In Feb 2009, Nielson survey on the profile of cybercafes users in India, it was
found that 90% of the audience, across 8 cities and 3500 cafes, were male
and in the age group of 15-35 years, 52% were graduates and post graduates,
50% were students.
It is extremely important to understand the IT security and governance
practiced in the cybercafes.
In past several years, many instances have been reported in India where
cybercafes are used for real or false terrorist communication.
Cybercafes are often used for frauds, sending obscene mails to harass people.
Computers available in CC are hold two types of risks:
First, we do not what programs are installed on computer-there is a risk of
spyware or keylogger being installed at the background and monitoring the
browsing behaviour.
Second, shoulder surfing can enable others to find out your passwords.
Therefore, one should be extremely protective about privacy.
ITA 2000 does not define cybercafes and interprets them as network service
providers referred under section 79, which imposed on them a responsibility
for due diligence(attentiveness), failing which they would be liable for
offences committed in their n/w.
Cybercriminals prefer cybercafes to carry out their activities.
The criminal tend to identify one particular PC to prepare it for their use.
Cybercriminals can either install malicious programs such as keyloggers or
spyware or launch an attack on the target.
Cybercriminals will visit these cafes at a particular time and on the prescribed
frequency, maybe alternate day or twice a week.
A recent survey conducted in one of the metropolitan cities reveals the
following facts.
Pirated software such as OS, browser, office automation software(MS Office)
are installed in all the computers.
Antivirus software is found to be not updated to the latest patch or antivirus
signature.
Several cafes had installed “Deep freeze”(is widely used software in some
kind of networks which requires to keep every workstations clean, without
changing their configuration or installing new software. This could apply to
libraries, schools, offices, cybercafes and more.
In a few words, no matter what programs you install or what things you do,
when you restart the PC...everything comes back to the restore point) for
protecting their computers form malware attacks. Deep freeze can wipe out
the details of all activities carried on the computer when one clicks on the
restart button which poses a challenge to the police and crime investigators.
Annual maintenance contract found to be not in place for servicing the
computer; hence hard disks for all computers are not formatted unless the
computer is down. Not having the AMC is a risk because the cybercriminal
can install a malicious code on computer and conduct criminal activities
without any interruption.
Porn websites and other similar websites are not blocked.
CC owners have very less awareness about IT security and IT governance.
Government/ISP/ state police do not seem to provide IT governance
guidelines to cybercafe owners.
CC associations or cyber cell wing do not seem to conduct periodic visits to
CC. Secondly an FIR is to be reported regarding the crime to take some
action.
While using emails at the cybercafé simply closing browser window is not enough
one should always sign-out, because if somebody uses the same service after you one
can get an easy access to your account.
Be alert:
One should be alert and aware of the surroundings while using a public computer.
Snooping over the shoulder is an easy way of getting your username and password.
Avoid online financial transactions:
One should avoid online banking, shopping or other transactions. One should change
the
passwords frequently using trusted computer.
Change passwords:
Passwords should be changed suitably and should not be revealed to anybody after
any
transaction on public computer.
Virtual keyboard:
Nowadays almost every bank has provided the virtual keyboard on their
websites. It is malware protected.
Security warnings:
One should take utmost care while accessing the websites of any
banks/financial institutions.
Above measures are not only applicable to CC but also other public places
wherever internet is available.