Chapter—2
Chapter—2
2. Phishing: passwords, credit card numbers, or personal details by posing as a legitimate entity
through email, text messages, or fake websites.
3. Identity Theft: access their financial resources.
4. Online Scams:, lottery scams, and romance scams. These scams deceive people into sending
money or personal information to fraudsters.
5. DDoS Attacks: Distributed Denial of Service (DDoS) attacks overwhelm a target's computer or
network with traffic, making it unavailable to users. These attacks are often used to disrupt
services or extort money.
6. Data Breaches: trade secrets, or financial records. These breaches can result in significant
financial losses and reputational damage.
7. Cyber bullying: harass, threaten, or intimidate individuals. It can take place through social
media, messaging apps, or email.
8. Mobile Device Theft and Hacking: hack into them to access personal data, financial
information, or install malware.
Cyber crime against women and
children
1. Cyber bullying: online harassment, threats, and intimidation. Perpetrators may use social media, messaging
apps, or other digital platforms to target their victims.
2. Online Harassment: This includes sending unsolicited, offensive, or threatening messages, images, or videos to
women or children. It can be a form of cyber bullying and may have severe emotional and psychological effects.
3. Revenge Porn: Perpetrators may share explicit or intimate images or videos of women without their consent,
often as an act of revenge. This is a violation of privacy and can cause significant harm to victims.
4. Sexting Exploitation: In cases involving children, sexting can lead to exploitation when someone coerces or
blackmails minors into sharing explicit images or videos. This can have legal and psychological consequences for
the child involved.
5. Online Grooming: Predators may use online platforms to groom children for sexual exploitation. They build trust
with the child and gradually manipulate them into sharing personal information or engaging in inappropriate
activities.
6. Child Pornography: The distribution, possession, or creation of child pornography is illegal and exploits children.
Criminals often use the internet to share such material.
7. Online Trafficking: Human traffickers may use the internet to lure and exploit women and children, including for
purposes of forced labor or sexual exploitation. Online platforms can be used to recruit victims.
8. Cyberstalking: This involves persistent and unwanted online attention, often leading to fear or emotional
distress. Women and children can be targeted by cyberstalkers who may threaten or harass them through
digital means.
9. Financial Fraud: Women can also be victims of financial fraud, including online scams targeting personal
finances or online dating scams where perpetrators exploit emotional connections for financial gain.
10. Privacy Violations: Privacy breaches can occur when personal information or photographs are shared without
consent, affecting both women and children.
Financial frauds
Financial frauds can have economy as a whole. While digital
payments have made life convenient and easy In India, they have
also made us prone to all kinds of financial frauds.
Ponzi Schemes: A Mirage of False Promises, Ponzi schemes lure
investors with promises of unusually high returns in a short period.
The fraudsters use funds from new investors to pay off earlier
investors, creating a false illusion of profitability.
One infamous example is the Saradha chit fund scam, where
millions of investors lost their hard-earned money. The group,
consisting of over 200 private companies, falsely portrayed its
collective investment schemes as chit funds.
With an estimated collection of ₹200 to 300 billion (US$4–6 billion),
the scheme managed to attract deposits from more than 1.7 million
individuals before its eventual downfall.
IDENTITY FRAUD
• Malware Attacks
• ▪ Malware attacks are any type of malicious software designed to cause harm or damage to a computer, server,
client or computer network and/or infrastructure without end-user knowledge
• ▪ Cyber attackers create, use and sell malware for many different reasons, but it is most frequently used to steal
personal, financial or business information.
• Types of Malware
• Adware: Display ads (sometimes malicious ads) to users as they work on their computers or browse the web.
• Viruses: A virus infects a computer and performs a variety of payloads. It may corrupt files, destroy operating
systems, delete or move files, or deliver a payload at a specific date.
• Worms: A worm is a self-replicating virus, but instead of affecting local files, a worm spreads to other systems and
exhausts resources.
• Trojans: A Trojan is named after the Greek war strategy of using a Trojan horse to enter the city of Troy. The
malware masquerades as a harmless program, but it runs in the background stealing data, allowing remote control
of the system, or waiting for a command from an attacker to deliver a payload.
• Bots: Infected computers can become a part of a botnet used to launch a distributed denial-of-service by sending
extensive traffic to a specific host.
• Keyloggers: Capture keystrokes as users type in URLs, credentials, and personal information and send it to an
attacker.
• RAT: “Remote access tools” enable attackers to access and control the targeted device remotely.
• Downloaders: Download other malware to install locally. The type of malware depends on the attacker’s motives.
• POS: Compromise a point-of-sale (PoS) device to steal credit card numbers, debit card and PINs, transaction
history, and contact information.
• How do I know I’ve been infected with malware?
•
¸À
▪ The most common signs that your computer has been compromised by malware are:
• ▪ Slow computer performance
• ▪ Browser redirects, or when your web browser takes you to sites you did not intend to visit
• ▪ Infection warnings, frequently accompanied by solicitations to buy something to fix them
• ▪ Problems shutting down or starting up your computer
• ▪ Frequent pop-up ads
Mitigation Measures:
1. Strong Security Practices: Implement robust security measures, such as firewalls, antivirus software, and
intrusion detection and prevention systems, to protect against cyber threats.
2. Regular Updates and Patching: Keep software, operating systems, and firmware up to date with the latest
security patches to mitigate vulnerabilities that cyber criminals may exploit.
3. Employee Education: Provide cybersecurity awareness and training programs to employees to educate them
about common cyber threats, phishing techniques, and safe online practices.
4. Multi-factor Authentication (MFA): Implement MFA wherever possible to add an extra layer of security,
making it harder for cyber criminals to gain unauthorized access to accounts or systems.
5. Data Encryption: Encrypt sensitive data, both in transit and at rest, to ensure that even if it is intercepted or
stolen, it remains unreadable and unusable for unauthorized individuals.
6. Regular Security Audits: Conduct regular security audits and vulnerability assessments to identify and address
any weaknesses or potential entry points for cyber criminals.
Legal perspective of cyber crime
• ▪
• All legal issues related to internet crime are dealt with
through cyber laws.
• ▪ As the number of internet users is on the rise, the need
for cyber laws and their application has also gathered great
momentum.
• ▪ Cyber law is a framework created to give legal
recognition to all risks arising out of the usage of
computers and computer networks.
• ▪ Cyber law encompasses laws relating to:
1. Cyber crimes
2. Electronic and digital signatures
3. Intellectual property
4. Data protection and privacy
Cyber crime and offences
• ▪ Cybercrime encompasses various illegal activities
conducted through digital means, often targeting
individuals, organizations, or systems. Here are some
common cybercrimes and offenses:
1. Hacking
• 2. Identity Theft:.
• 3. Phishing and Spoofing.
• 4. Cyber bullying:
• 5. Online Fraud.
• 6. Distributed Denial of Service (DDoS) Attacks:
• 7. Cyber Espionage:
• 8. Child Exploitation and Pornography:
• 9. Ransomware Attacks:
• 10. Cyberstalking:
Organizations dealing with Cybercrime and
Cyber security in India,
• In India, several organizations are involved in dealing with cybercrime and
cyber security at various levels, including law enforcement, regulatory
bodies, and agencies focused on awareness and prevention.