Unit - I
Unit - I
UNIT I INTRODUCTION
Cyber Security – History of Internet – Impact of Internet – CIA Triad; Reason for
Cyber Crime – Need for Cyber Security – History of Cyber Crime; Cybercriminals –
Classification of Cybercrimes – A Global Perspective on Cyber Crimes; Cyber Laws –
The Indian IT Act – Cybercrime and Punishment.
The virus, named after a Scooby Doo villain, “Creeper,” was designed to move across
ARPANET (Advanced Research Projects Agency Network) – the forerunner to what we
now call the internet. ARPANET was established by the U.S. Department of Defense.
In response, Ray Tomlinson, Thomas’ colleague created the Reaper Program. It was similar to
the Creeper. It moves through the internet, replicating itself, and finds copies of the Creeper.
When it locates the copies, it logs them out, so they are rendered impotent. The Reaper was the
first attempt at cybersecurity – the first antivirus software program.
IMPACT OF INTERNET:
The internet has had an incredible impact on society since its inception. It has changed the
way we communicate, do business, learn, and even think. The internet has brought people
from different parts of the world together and has made information accessible to everyone
with an internet connection.
One of the biggest impacts of the internet is on communication. Social media platforms like
Facebook, Twitter, and Instagram have made it easy for people to connect with others from
anywhere in the world. People can share their thoughts, ideas, and experiences instantly with
their friends and family. Video conferencing tools like Zoom have revolutionized remote
communication, making it possible for people to work and learn from anywhere in the world.
The internet has also had a significant impact on business. E-commerce websites like
Amazon and eBay have made it possible for people to shop from the comfort of their own
homes. Small businesses can now reach a global audience by creating an online presence. The
internet has also made it easier for people to work from home, which has become
increasingly important during the COVID-19 pandemic.
Education is another area that has been greatly impacted by the internet. Online courses and
tutorials have made it possible for people to learn new skills from anywhere in the world.
Massive open online courses (MOOCs) like Coursera and edX have made higher education
more accessible to people who may not have the opportunity to attend a traditional university.
However, the internet has also had some negative impacts. Cyberbullying, online harassment,
and identity theft have become increasingly common. The internet has also made it easier for
people to access inappropriate content, which can have a negative impact on young children.
In conclusion, the internet has had a tremendous impact on society. It has changed the way
we communicate, do business, learn, and even think. While there are some negative impacts,
the benefits of the internet far outweigh the negatives. As the internet continues to evolve, it
will be interesting to see how it will shape our society in the future.
CIA TRIAD
When talking about network security, the CIA triad is one of the most important models which
is designed to guide policies for information security within an organization.
CIA stands for:
1. Confidentiality
2. Integrity
3. Availability
These are the objectives that should be kept in mind while securing a network.
Confidentiality
Confidentiality means that only authorized individuals/systems can view sensitive or
classified information. The data being sent over the network should not be accessed by
unauthorized individuals. The attacker may try to capture the data using different tools
available on the Internet and gain access to your information. A primary way to avoid this is
to use encryption techniques to safeguard your data so that even if the attacker gains access
to your data, he/she will not be able to decrypt it. Encryption standards include
AES(Advanced Encryption Standard) and DES (Data Encryption Standard). Another way to
protect your data is through a VPN tunnel. VPN stands for Virtual Private Network and helps
the data to move securely over the network.
Integrity
The next thing to talk about is integrity. Well, the idea here is to make sure that data has not
been modified. Corruption of data is a failure to maintain data integrity. To check if our data
has been modified or not, we make use of a hash function. We have two common types: SHA
(Secure Hash Algorithm) and MD5(Message Direct 5). Now MD5 is a 128-bit hash and SHA is
a 160-bit hash if we’re using SHA-1. There are also other SHA methods that we could use like
SHA-0, SHA-2, and SHA-3.
Let’s assume Host ‘A’ wants to send data to Host ‘B’ to maintain integrity. A hash function
will run over the data and produce an arbitrary hash value H1 which is then attached to the
data. When Host ‘B’ receives the packet, it runs the same hash function over the data which
gives a hash value of H2. Now, if H1 = H2, this means that the data’s integrity has been
maintained and the contents were not modified.
Availability
This means that the network should be readily available to its users. This applies to systems
and to data. To ensure availability, the network administrator should maintain hardware,
make regular upgrades, have a plan for fail-over, and prevent bottlenecks in a network.
Attacks such as DoS or DDoS may render a network unavailable as the resources of the
network get exhausted. The impact may be significant to the companies and users who rely
on the network as a business tool. Thus, proper measures should be taken to prevent such
attacks.
REASONS BEHIND CYBER ATTACKS:
Every business, regardless of its size, is a potential target of cyber attack. That is because
every business has key assets (financial or otherwise) that criminals may seek to exploit. By
recognising the common motives behind cyber attacks, you can build a better understanding
of the risks you may face, and understand how best to confront them.
Why do cyber attacks happen?
Most often, cyber attacks happen because criminals want your:
business' financial details
customers' financial details (eg credit card data)
sensitive personal data
customers' or staff email addresses and login credentials
customer databases
clients lists
IT infrastructure
IT services (eg the ability to accept online payments)
intellectual property (eg trade secrets or product designs)
Cyber attacks against businesses are often deliberate and motivated by financial gain.
However, other motivations may include:
making a social or political point - eg through hacktivism
espionage - eg spying on competitors for unfair advantage
intellectual challenge - eg 'white hat' hacking
The key point is that cyber security threats don't always come from anonymous hackers or
online criminal groups. Vulnerabilities can arise within your own business too.
How are cyber criminals motivated?
1. Financial Gain
The primary motivation of a hacker is money, and getting it can be done with a variety of
methods.
They could directly gain entry to a bank or investment account; steal a password to your
financial sites and then transfer the assets over to one of their own; swindle an employee
into completing a money transfer through a complicated spear phishing technique, or
conduct a ransomware attack on your entire organization.
The possibilities are endless, but most hackers are out to make a profit.
2. Recognition & Achievement
Some hackers are motivated by the sense of achievement that comes with cracking open a
major system. Some may work in groups or independently, but, on some scale, they would
like to be recognized.
This also ties into the fact that cyber criminals are competitive by nature, and they love the
challenge their actions bring. In fact, they often drive one another to complete more
complicated hacks.
3. Insider Threats
Individuals who have access to critical information or systems can easily choose to misuse that
access
—to the detriment of their organization.
These threats can come from internal employees, vendors, a contractor or a partner—and are
viewed as some of the greatest cyber security threats to organizations.
However, not all insider threats are intentional, according to an Insider Threat Report from
Crowd Research Partners. Most (51%) are due to carelessness, negligence, or compromised
credentials, but the potential impact is still present even in an unintentional scenario.
4. Political Motivation – “Hacktivism”
Some cyber criminal groups use their hacking skills to go after large organizations. They are
usually motivated by a cause of some sort, such as highlighting human rights or alerting a
large corporation to their system vulnerabilities. Or, they may go up against groups whose
ideologies do not align with their own.
These groups can steal information and argue that they are practicing free speech, but more
often than not, these groups will employ a DDoS (Distributed Denial of Service) attack to
overload a website with too much traffic and cause it to crash.
5. State Actors
State-sponsored actors receive funding and assistance from a nation-state. They are
specifically engaged in cyber crime to further their nation’s own interests. Typically, they
steal information, including “intellectual property, personally identifying information, and
money to fund or further espionage and exploitation causes.”
However, some state-sponsored actors do conduct damaging cyberattacks and claim that their
cyberespionage actions are legitimate activity on behalf of the state.
6. Corporate Espionage
Preserving Privacy:
In an era where personal information is increasingly collected, stored, and shared digitally,
cybersecurity is crucial for preserving privacy. Protecting personal data from unauthorized
access, surveillance, and misuse helps maintain individuals’ privacy rights and fosters trust in
digital services.
CYBERCRIMINALS
A cybercriminal is a person who conducts some form of illegal activity using computers or
other digital technology such as the Internet. The criminal may use computer expertise,
knowledge of human behavior, and a variety of tools and services to achieve his or her goal.
Types of Cyber Criminals:
1. Hackers: The term hacker may refer to anyone with technical skills, however, it typically
refers to an individual who uses his or her skills to achieve unauthorized access to systems or
networks so as to commit crimes. The intent of the burglary determines the classification of
those attackers as white, grey, or black hats. White hat attackers burgled networks or PC
systems to get weaknesses so as to boost the protection of those systems. The owners of the
system offer permission to perform the burglary, and they receive the results of the take a
look at. On the opposite hand, black hat attackers make the most of any vulnerability for
embezzled personal, monetary or political gain. Grey hat attackers are somewhere between
white and black hat attackers. Grey hat attackers could notice a vulnerability and report it to
the owners of the system if that action coincides with their agenda.
(a). White Hat Hackers – These hackers utilize their programming aptitudes for a
good and lawful reason. These hackers may perform network penetration tests in an
attempt to compromise networks to discover network vulnerabilities. Security
vulnerabilities are then reported to developers to fix them and these hackers can also
work together as a blue team. They always use the limited amount of resources
which are ethical and provided by the company, they basically perform pentesting
only to check the security of the company from external sources.
(b). Gray Hat Hackers – These hackers carry out violations and do seemingly
deceptive things however not for individual addition or to cause harm. These
hackers may disclose a vulnerability to the affected organization after having
compromised their network and theymay exploit it .
(c). Black Hat Hackers – These hackers are unethical criminals who violate network
security for personal gain. They misuse vulnerabilities to bargain PC frameworks.
theses hackers always exploit the information or any data they got from the unethical
pentesting of the network.
2. Organized Hackers: These criminals embody organizations of cyber criminals,
hacktivists, terrorists, and state-sponsored hackers. Cyber criminals are typically teams
of skilled criminals targeted on control, power, and wealth. These criminals are
extremely subtle and organized, and should even give crime as a service. These
attackers are usually profoundly prepared and well- funded.
3. Internet stalkers: Internet stalkers are people who maliciously monitor the web activity
of their victims to acquire personal data. This type of cyber crime is conducted through the
use of social networking platforms and malware, that are able to track an individual’s PC
activity with little or no detection.
4. Disgruntled Employees: Disgruntled employees become hackers with a particular motive
and also commit cyber crimes. It is hard to believe that dissatisfied employees can become
such malicious hackers. In the previous time, they had the only option of going on strike
against employers. But with the advancement of technology there is increased in work on
computers and the automation of processes, it is simple for disgruntled employees to do
more damage to their employers and organization by committing cyber crimes. The attacks
by such employees brings the entire system down.
CLASSIFICATION OF CYBERCRIMES
It can be classified in to 4 major categories as
1. Cybercrime against Individual
1. Against Individuals
1. Email spoofing :
A spoofed email is one in which e-mail header is forged so that mail appears
to originate from one source but actually has been sent from another source
2. Spamming :
Spamming means sending multiple copies of unsolicited mails or mass e-
mails suchas chain letters.
3. Cyber Defamation :
This occurs when defamation takes place with the help of computers and / or
the Internet. E.g. someone publishes defamatory matter about someone on a
website or sends e-mails containing defamatory information.
4. Harassment & Cyber stalking :
Cyber Stalking Means following the moves of an individual’s activity over
internet. It can be done with the help of many protocols available such at e-
mail, chat rooms, user net groups.
2. Against Property:
1. Credit Card Fraud: As the name suggests, this is a fraud that happens by the
use of a credit card. This generally happens if someone gets to know the card
number or the card gets stolen.
2. Trademarks violations:
Theft of computer source code:
3. Internet time theft:
the usage of the Internet hours by an unauthorized person which is actually paid
byanother person.
3. Against Organisation:
2. Computer voyeur:
The criminal reads or copies confidential or proprietary information,
but the data is neither deleted nor changed.
2. Denial Of Service:
When Internet server is flooded with continuous bogus requests so as to denying
legitimate users to use the server or to crash the server.
3. Computer contamination / Virus attack:
A computer virus is a computer program that can infect other computer
programs by modifying them in such a way as to include a (possibly evolved)
copy of it.
Viruses can be file infecting or affecting boot sector of the computer.
Worms, unlike viruses do not need the host to attach themselves to.
4. Email Bombing:
Sending large numbers of mails to the individual or company or mail servers
therebyultimately resulting into crashing.
5. Salami Attack:
When negligible amounts are removed & accumulated in to something larger.
These attacks are used for the commission of financial crimes.
6. Logic Bomb:
Its an event dependent programme, as soon as the designated event occurs, it
crashes the computer, release a virus or any other harmful possibilities.
7. Trojan Horse:
an unauthorized program which functions from inside what seems to be an
authorized program, thereby concealing what it is actually doing.
8. Data diddling:
This kind of an attack involves altering raw data just before it is processed by a
computer and then changing it back after the processing is completed.
4. Against Society
3. Web Jacking: Hackers gain access and control over the website of another,
even they change the content of website for fulfilling political objective or for
money.
CYBER LAWS
Cyber law, also known as internet law or digital law, signifies the legal regulations and
frameworks governing digital activities. It covers a large range of issues, including online
communication, e- commerce, digital privacy, and the prevention and prosecution of
cybercrimes.
Types of Cyber Law
Privacy Laws:
Privacy laws focus on protecting individuals' personal information from unauthorized access
and use. They establish guidelines for the responsible handling of personal data by
organizations, ensuring individuals' privacy rights are upheld.
Cybercrime Laws:
Cybercrime laws define and penalize various cybercrimes, ensuring legal consequences for
offenders. These laws play a crucial role in deterring individuals from engaging in illegal
online activities and provide a legal framework for prosecuting cybercriminals.
Intellectual Property Laws:
Intellectual property laws in the digital domain protect patents, copyrights, and trademarks
from unauthorized use. They provide a legal foundation for creators and innovators to protect
their digitalassets.
E-commerce Laws:
E-commerce laws regulate online business transactions, defining rules for contracts,
transactions, and consumer protection. These laws contribute to the establishment of a secure
and fair online marketplace.
Cyber Defamation Laws:
Cyber defamation laws address libel and slander in the digital space. They provide legal
remedies for individuals or entities whose reputations may be tarnished by false or damaging
information circulated online.
Cybersecurity Laws:
Cybersecurity laws establish standards for securing digital systems and data. These laws
mandate organizations to implement measures to protect against cyber threats, contributing to
the overall resilience of digital infrastructure.
Social Media Laws:
Social media laws address legal issues related to social media platforms, including user rights
and content regulations. These laws aim to strike a balance between freedom of expression and
the prevention of online abuse or misinformation.
Cyber Contracts and E-signature Laws:
Governing the validity and enforceability of contracts formed online, cyber contracts and e-
signature laws provide legal certainty for electronic transactions. They facilitate the growth
of online commerce by ensuring the legal recognition of digital agreements.
International Cyber Laws:
With the increasing prevalence of cross-border cybercrimes, international cyber laws address
the need for cooperation between nations. These laws facilitate collaboration in investigating
and prosecuting cybercriminals operating across borders.
Data Breach Notification Laws:
Mandating organizations to inform individuals and authorities in the event of a data breach of
data breach notification laws enhances transparency and accountability. They ensure prompt
action in response to security incidents, minimizing the potential impact on individuals and
businesses.
8. Confiscation.
15. Sections and Punishments under Information Technology Act, 2000 are as follows:
SECTION PUNISHMENT