PCI1E - Final Notes
PCI1E - Final Notes
2. Cyber crime
● Cybercrime refers to criminal activities that are carried out using computers,
networks, or the internet.
● These crimes can include hacking, identity theft, phishing, malware distribution,
online fraud, cyberbullying, and more.
● Cybercriminals often use advanced techniques to exploit vulnerabilities in
computer systems and networks, steal sensitive information, or extort money
from their victims.
● Cybercrime is a growing concern as more and more aspects of modern life
progress towards online.
● Governments and law enforcement agencies around the world are developing
new strategies to combat cybercrime, and individuals are encouraged to take
steps to protect themselves from becoming victims, such as using strong
passwords, being cautious about sharing personal information online, and
keeping software up-to-date.
3. Limitations of Cyber space
There are several limitations of cyberspace, including:
● Security risks:
○ Cyberspace is vulnerable to a wide range of security threats, such as
hacking, malware, and phishing attacks, which can compromise the
confidentiality, integrity, and availability of information.
● Digital divide:
○ Not all people have equal access to cyberspace, which can create a digital
divide and exacerbate existing social, economic, and political inequalities.
● Dependence on technology:
○ As we become more dependent on technology, our ability to function
without it may be compromised, and we may become more vulnerable to
cyberattacks and other disruptions.
● Online addiction:
○ The constant availability and stimulation of cyberspace can lead to online
addiction, which can have negative consequences for mental health,
relationships, and productivity.
● Information overload:
○ The abundance of information available in cyberspace can make it difficult
to filter, prioritize, and make sense of it all, leading to information overload
and decision paralysis.
9. IPR
● IPR stands for Intellectual Property Rights, which refer to legal rights that protect
creations of the human mind and incentivize innovation and creativity.
● Examples of intellectual property include patents, trademarks, copyrights, and
trade secrets.
● These rights give creators and owners the exclusive right to use, sell, or license
their intellectual property, and prevent others from using or reproducing it without
permission.
● Intellectual property is important in promoting innovation and economic growth,
as it encourages investment in research and development and protects the fruits
of these investments.
● However, it is also important to balance the protection of intellectual property with
the need for accessibility and openness in the marketplace.
8. Cybercrimes Vs. Conventional Crimes
Victims of cybercrime
experience damage to their Conventional crime can have
Types of digital reputation or loss of physical, emotional, and
Consequences sensitive personal information financial consequences for
that can be used for identity victims.
theft.
13. Malwares
● Malware is a type of malicious software designed to damage or disrupt computer
systems, steal sensitive information, or gain unauthorized access to computer
networks.
Here are some common types of malware:
● Virus:
○ A computer program that is designed to spread from one computer to
another and can cause damage to data or software.
● Trojan:
○ A type of malware that is disguised as a legitimate program but is
designed to damage or steal data from the victim's computer.
● Ransomware:
○ A type of malware that encrypts the victim's data and demands payment in
exchange for the decryption key.
● Spyware:
○ A type of malware that is designed to collect information about the victim's
computer activities and send it to the attacker.
● Adware:
○ A type of malware that displays unwanted advertisements or pop-ups on
the victim's computer.
14. Steganography
● Steganography is the practice of hiding secret or confidential information within a
non-secret message or image.
● The goal of steganography is to conceal the existence of the hidden message or
information.
● This can be done by modifying the least significant bits of an image or audio file,
or by using techniques such as invisible ink or microdots.
● Steganography is often used in combination with encryption to provide an
additional layer of security to the hidden information.
● Steganography has been used for centuries and is still used today in various
applications such as digital watermarking, data authentication, and covert
communication.
17. Psychology
● Psychology is the scientific study of behavior and mental processes.
● It is a broad field that includes many subfields such as social, cognitive,
developmental, clinical, and forensic psychology.
20. Spoofing
● Spoofing refers to the act of falsifying information in order to deceive or
manipulate someone or something.
● It can involve falsifying a sender's identity in an email or text message, creating a
fake website to steal personal information, or manipulating market data to
deceive investors.
● Spoofing is typically done with malicious intent and is often illegal.
21. Ransomware
● Ransomware is a type of malicious software that encrypts a victim's files or data
and demands payment, usually in the form of cryptocurrency, in exchange for the
decryption key.
● It can infect a computer or network through various methods, such as email
attachments, software vulnerabilities, or social engineering tactics.
● Ransomware attacks can cause significant damage to individuals, businesses,
and even critical infrastructure.
● It is important to regularly back up data and implement strong cybersecurity
measures to protect against ransomware.
29. Defamation
● Defamation is a false statement that harms the reputation of an individual or
organization.
● It can take two forms:
○ Libel, which is a written defamatory statement.
○ Slander, which is a spoken defamatory statement.
● Defamation can cause significant damage to the reputation and livelihood of the
victim, and can lead to legal consequences for the perpetrator.
● To prove defamation, the victim must show that the statement was false, that it
caused harm, and that it was made with the intent to harm or with reckless
disregard for the truth.
30. Adware
● Adware is a type of software that automatically displays or downloads
advertisements on a computer or mobile device.
● It is often bundled with free software or downloaded from malicious websites
without the user's knowledge or consent.
● Adware can slow down the computer or device, consume bandwidth, and be a
nuisance to the user.
● In some cases, it may also be used to track the user's online activity and collect
personal information for targeted advertising purposes.
● To prevent adware, it is important to only download software from reputable
sources and to use anti-malware software to scan for and remove any potentially
unwanted programs.
● Phishing:
○ Phishing is a type of cyber fraud that involves sending fraudulent emails or
messages to individuals, typically with the goal of tricking them into
revealing personal information, such as login credentials or credit card
details.
○ These emails or messages often appear to be from legitimate sources,
such as banks, social media platforms, or government agencies.
● Identity Theft:
○ Identity theft is a type of cyber fraud in which an individual's personal
information, such as their name, address, or Social Security number, is
stolen and used for fraudulent activities, such as opening bank accounts
or obtaining credit.
● Online Scams:
○ Online scams refer to a wide range of fraudulent activities, such as fake
online stores, job scams, or investment scams.
○ These scams typically involve the promise of financial gain or other
benefits, but in reality, the perpetrators aim to steal money or personal
information.
● Malware:
○ Malware is a type of software that is designed to damage or disable
computer systems, steal data, or control computer networks.
○ Malware can be spread through email attachments, malicious websites, or
other forms of online communication.
● Ransomware:
○ Ransomware is a type of malware that encrypts a victim's files and
demands payment, typically in the form of cryptocurrency, in exchange for
the decryption key.
○ Ransomware attacks can be devastating for individuals or businesses, as
they can result in the loss of important data or the disruption of critical
systems.
● Business Email Compromise:
○ BEC is a type of cyber fraud in which criminals gain access to a
company's email system and use it to conduct fraudulent activities, such
as wire transfer fraud or invoice scams.
○ BEC attacks often involve social engineering tactics, such as
impersonating a company executive or supplier
10. Suggest ways to fight telecom frauds (at least 6)
● Telecom fraud refers to fraudulent activities that occur within the
telecommunications industry, such as phone scams, SMS scams, or subscription
fraud.
Here are some ways to fight telecom fraud:
● Education and Awareness:
○ Education and awareness campaigns can help to inform the public about
the different types of telecom fraud and how to recognize and avoid them.
○ This can involve providing information through social media, public service
announcements, or other forms of media.
● Improved Authentication:
○ Telecom operators can implement improved authentication measures,
such as biometric identification, to help prevent fraudulent activities.
○ This can include voice recognition, facial recognition, or fingerprint
scanning.
● Fraud Detection and Prevention:
○ Telecom operators can implement fraud detection and prevention
mechanisms, such as real-time monitoring, to detect and prevent
fraudulent activities before they occur.
● Customer Verification:
○ Telecom operators can implement customer verification measures, such
as identity verification, to prevent subscription fraud and other types of
fraudulent activities.
● Collaboration and Information-Sharing:
○ Collaboration and information-sharing between telecom operators, law
enforcement agencies, and other stakeholders can help to identify and
prevent telecom fraud.
○ This can include sharing data and intelligence on fraudulent activities and
collaborating on investigations and enforcement actions.
● Regulatory Frameworks:
○ Strong regulatory frameworks can help to deter telecom fraud by imposing
penalties on perpetrators and providing guidelines for telecom operators
on how to prevent fraud.
○ This can involve working with government agencies to develop and
enforce laws and regulations related to telecom fraud
There are several ways in which cyber defamation can occur, such as:
● Posting false or defamatory statements about an individual or organization on
social media or other websites.
● Spreading rumors or malicious lies about an individual or organization online.
● Sharing personal or confidential information about an individual or organization
without their consent.
● Creating fake profiles or impersonating someone online to spread false
information.
To combat cyber defamation, individuals and organizations can take the following steps:
● Monitor online presence:
○ Regularly monitoring your online presence and reputation can help to
identify instances of cyber defamation early and take appropriate action.
● Respond appropriately:
○ Responding to cyber defamation with anger or retaliation can often make
the situation worse.
○ Instead, respond calmly and professionally, and consider engaging with
the person responsible to try and resolve the issue.
● Contact the website owner:
○ If the defamatory statements are posted on a website, you can contact the
website owner or administrator to request that the content be removed.
● Seek legal action:
○ In some cases, cyber defamation can be a criminal offense, and legal
action may be necessary to protect your reputation or seek compensation
for damages.
● Educate others:
○ Educating others about the consequences of cyber defamation and
encouraging responsible online behavior can help to prevent future
incidents.
13. How will you profile cyber criminals committing crimes against a person?
Profiling cyber criminals who commit crimes against individuals can be a complex task,
but here are some key steps that can help:
● Collect and analyze data:
○ The first step in profiling a cyber criminal is to collect and analyze data
related to the crime.
○ This can include information on the type of crime committed, the victim,
the method of attack, and any evidence left behind by the perpetrator.
● Identify patterns and characteristics:
○ Once data has been collected and analyzed, the next step is to identify
any patterns or characteristics that are common among cyber criminals
who commit crimes against individuals.
○ This can include factors such as age, gender, location, or previous
criminal history.
● Build a profile:
○ Based on the data and patterns identified, a profile of the cyber criminal
can be built.
○ This can include information on their motivation for committing the crime,
their level of expertise, and any behavioral or psychological traits that may
be relevant.
● Refine the profile:
○ As more information becomes available, the profile can be refined and
updated.
○ This may involve revising assumptions or adding new data points as they
become available.
● Use the profile to inform investigations:
○ The final step is to use the profile to inform investigations and help law
enforcement agencies identify potential suspects or leads.
○ The profile can also be used to develop strategies for preventing future
cyber crimes against individuals.
14. How will you profile cyber criminals committing crimes against property?
Profiling cyber criminals who commit crimes against property can also be a complex
process. Here are some steps that can help:
● Collect and analyze data:
○ The first step is to collect and analyze data related to the crime.
○ This can include information on the type of crime committed, the target
property, the method of attack, and any evidence left behind by the
perpetrator.
● Identify patterns and characteristics:
○ Once data has been collected and analyzed, the next step is to identify
any patterns or characteristics that are common among cyber criminals
who commit crimes against property.
○ This can include factors such as the type of property targeted, the motive
for the attack, and any technical skills or tools used by the perpetrator.
● Build a profile:
○ Based on the data and patterns identified, a profile of the cyber criminal
can be built.
○ This can include information on their motivation for committing the crime,
their level of expertise, and any behavioral or psychological traits that may
be relevant.
● Refine the profile:
○ As more information becomes available, the profile can be refined and
updated.
○ This may involve revising assumptions or adding new data points as they
become available.
● Use the profile to inform investigations:
○ The final step is to use the profile to inform investigations and help law
enforcement agencies identify potential suspects or leads.
○ The profile can also be used to develop strategies for preventing future
cyber crimes against property
Evolving Cybercriminals:
● Furthermore, cybercriminals are becoming more sophisticated and better
organized, forming global networks and using advanced tools and
techniques to evade detection and stay ahead of law enforcement.
● These criminals are often highly skilled, well-funded, and able to operate
from countries with lax cybercrime laws or weak law enforcement.
High-Cost:
● Finally, even if it were possible to eliminate all cybercrime, the cost of
doing so would be prohibitive.
● Cybersecurity is already a significant expense for organizations and
governments, and the cost of implementing robust cybersecurity
measures is continually increasing.
● The resources required to mitigate cybercrime would be enormous, and
the cost-benefit analysis may not be favorable.
● Ping of Death:
○ This attack sends a malformed or oversized ping packet to the target
system, causing it to crash or become unresponsive.
● Smurf Attack:
○ This attack involves sending large numbers of ICMP echo request packets
to a network's broadcast address, causing all devices on the network to
respond to the request and overload the target system.
● HTTP Flood:
○ This type of attack targets web servers by overwhelming them with HTTP
requests, typically by using a botnet of compromised devices.
● Slowloris Attack:
○ This attack sends HTTP requests to the target server, but slowly and
continuously keeps the connection open without completing the request,
tying up the server's resources and causing it to become unresponsive
● Distributed Denial-of-Service (DDoS) attacks:
○ These attacks involve multiple devices, often controlled by a botnet,
targeting a single server or network.
○ This makes it more difficult to defend against the attack because the traffic
is coming from multiple sources.
● Financial loss:
○ Cybercrime can result in significant financial losses for corporations.
○ For example, hackers may steal sensitive financial information, such as
bank account details or credit card numbers, which can be used to make
fraudulent transactions.
○ This can result in direct financial losses for the company, as well as
damage to their reputation and customer trust.
● Downtime and loss of productivity:
○ Cyberattacks can also result in system downtime and loss of productivity.
○ For example, if a company's website or internal systems are taken down
by a cyberattack, employees may be unable to access critical information
or carry out their work, resulting in delays and loss of revenue.
● Reputational damage:
○ Perhaps the most significant impact of cybercrime on corporations is the
damage to their reputation.
○ Customers and stakeholders may lose trust in the company if it is
perceived to be vulnerable to cyberattacks or if sensitive information is
leaked.
○ This can result in a loss of business and long-term damage to the
company's brand.
● Motivation:
○ A person's motivation to commit a cybercrime can be influenced by their
psychological makeup.
○ For example, someone who is driven by a desire for power, recognition, or
financial gain may be more likely to engage in cybercrime.
○ Other psychological factors, such as a lack of empathy or a desire for
revenge, can also contribute to motivation.
● Risk perception:
○ Cybercriminals may have a different perception of risk than other people.
○ For example, they may believe that they are unlikely to get caught or that
the potential rewards outweigh the risks.
○ This perception can be influenced by individual psychology, such as a
tendency towards risk-taking or a belief in their own abilities.
● Impulse control:
○ Impulse control is an important factor in preventing cybercrime.
○ Individuals who struggle with impulse control may be more likely to
engage in impulsive or reckless behavior, such as committing cyber
crimes without fully considering the consequences.
● Moral development:
○ An individual's moral development can also play a role in cybercrime.
Someone with a lower level of moral development may be more likely to
engage in behavior that is harmful to others, including cybercrime.
○ Conversely, someone with a higher level of moral development may be
less likely to engage in cybercrime due to a strong sense of right and
wrong.
● Addiction:
○ Cybercrime can also be related to addiction, such as an addiction to
gaming or gambling. Individuals who are addicted to these activities may
be more likely to engage in cybercrime, such as stealing virtual items or
using fraudulent methods to obtain gaming or gambling resources.
● In conclusion, individual psychology can be a key factor in committing cyber
crimes.
are all psychological factors that can influence an individual's decision to engage
in cybercrime.
● Economic impact:
○ Cybercrime can also have a significant economic impact on governments,
both in terms of direct costs and lost productivity.
○ For example, governments may need to spend significant resources on
repairing and upgrading systems after a cyberattack, as well as
investigating and prosecuting cybercriminals.
○ Additionally, the loss of productivity and revenue due to system downtime
can have a negative impact on the economy as a whole.
● Political impact:
○ Cybercrime can also have a political impact by compromising public trust
in government.
○ If a government agency or official is found to be vulnerable to cyberattacks
or has failed to adequately protect sensitive information, it can erode
public confidence in their ability to govern effectively.
● Diplomatic impact:
○ Cybercrime can also have a diplomatic impact by straining relations
between countries.
○ For example, if a government is found to be responsible for a cyberattack
on another country's systems, it can lead to tension and even conflict
between nations.
● Addiction:
○ Technology dependence can lead to addiction, where individuals become
compulsively attached to their devices or online activities.
○ This can have negative impacts on mental health, relationships, and
productivity.
● Social isolation:
○ Over-reliance on technology can lead to social isolation, where individuals
withdraw from real-life social interactions in favor of online connections.
○ This can lead to feelings of loneliness and depression, as well as a lack of
critical social skills.
● Health issues:
○ Technology dependence can also lead to a range of health issues, such as
eye strain, neck and back pain, and repetitive strain injuries.
○ Additionally, excessive screen time can interfere with sleep and disrupt
circadian rhythms, leading to long-term health problems such as obesity,
diabetes, and cardiovascular disease.
● Privacy and security risks:
○ Dependence on technology can also put individuals and organizations at
risk of privacy and security breaches.
○ This can include cyberattacks, identity theft, and online scams that exploit
vulnerabilities in technology systems.