cyber unit 04
cyber unit 04
Cyber Crime encompasses a vast range of illegal activities facilitated through computers and the
internet, posing a significant and evolving threat in our increasingly digital world. From individual
financial loss to compromising corporate security and even threatening national infrastructure, its
impact is pervasive. Understanding the multifaceted nature of cyber crime is essential for developing
effective strategies for prevention, detection, investigation, and prosecution. In India, the
Information Technology Act, 2000 (and its amendments) provides the primary legal framework for
dealing with such offenses. This answer will explore the key dimensions of cyber crime: its
classifications, the methods employed by criminals, the forensic techniques used in investigations,
and the crucial digital security measures for protection, based on the provided structure.
This section categorizes cyber crimes based on the fundamental nature of the illegal act.
o Impact: Can range from individual data loss and financial harm to corporate
espionage, disruption of critical infrastructure, and threats to national security.
o Impact: Significant financial losses for individuals and businesses, loss of trust in
online transactions, reputational damage for affected companies.
o Example: A scammer creates a highly realistic but fake e-commerce website selling
popular electronics at very low prices. They collect payments via credit card but
never ship the goods, harvesting card details in the process.
o Mechanism: PII can be stolen through various means: data breaches of companies,
phishing attacks, malware (keyloggers, spyware), dumpster diving (physical trash),
mail theft, shoulder surfing, or social engineering. The stolen identity is then used to
open fraudulent accounts, take out loans, make purchases, file fake tax returns, or
even commit crimes in the victim's name.
o Types: Financial identity theft (accessing funds), criminal identity theft (committing
crimes under victim's name), medical identity theft (obtaining medical services),
child identity theft (using a child's identity).
o Impact: Severe financial hardship for victims, damaged credit scores, legal
complications, emotional distress, significant time and effort required to restore
their identity.
o Example: A criminal obtains a list of names, dates of birth, and Aadhaar numbers
from a data breach. They use this information to apply for multiple credit cards
online in the victims' names, max them out, and disappear, leaving the victims with
the debt and damaged credit history.
o Impact: Financial losses for creators and businesses, stifled innovation, potential job
losses, circulation of potentially substandard counterfeit goods, funding for
organized crime.
o Example: An employee leaving a tech company copies the source code for a
proprietary algorithm onto a USB drive and takes it to a competitor, giving them an
unfair market advantage. Or, distributing cracked versions of expensive software
online for free download.
o Mechanism: Can involve hacking into critical systems (power grids, water supplies,
air traffic control, financial markets, military networks) to disrupt or disable them,
using the internet for propaganda and recruitment, coordinating attacks, fundraising,
or spreading disinformation to incite panic or violence.
o Example: A terrorist group successfully hacks into the control systems of a nation's
railway network, causing collisions or widespread shutdowns to create chaos and
demonstrate capability.
o Definition: A catch-all for various other cyber offenses not fitting neatly into the
above categories.
o Examples:
o Impact: Varies widely depending on the specific offense, from emotional and
psychological harm to reputational damage and physical danger (in stalking cases).
2.1 Hacking:
o Types: Can be categorized by motive (e.g., black hat - malicious, white hat - ethical,
grey hat - ambiguous) or target (web server hacking, network hacking, email
hacking).
2.2 Phishing:
o Types:
2.3 Ransomware:
o Impact: Significant data loss (if backups aren't available or decryption fails), costly
downtime for businesses, financial loss due to ransom payment (not guaranteed to
work), reputational damage, potential data breach fines if sensitive data is
exfiltrated.
o Example: A hospital's computer systems are infected with ransomware, encrypting
patient records and scheduling systems. Critical operations are disrupted, surgeries
postponed, and the hospital faces a dilemma: pay a large ransom or risk
weeks/months of recovery from backups (if available and intact), potentially
endangering patient care.
o Impact: Data theft, system slowdown or crashes, unauthorized access, financial loss,
identity theft, use of the system in botnets.
o Example: A user downloads a "free screen saver" from an untrusted website. The
program installs a Trojan that includes a keylogger, silently capturing the user's
online banking credentials the next time they log in.
Quid Pro Quo: Offering a small service or benefit in exchange for information
(e.g., offering "help" with a computer problem in exchange for login
credentials).
Tailgating/Piggybacking: Following an authorized person into a restricted
area without proper credentials.
o Impact: Can lead to any type of cyber crime outcome – data breaches, malware
infection, financial fraud, unauthorized access – often serving as the initial entry
point for larger attacks.
Volume-based attacks: Flood the target with massive amounts of traffic (e.g.,
UDP floods, ICMP floods).
3. Cyber Forensics
This discipline focuses on the recovery, investigation, examination, and analysis of material found in
digital devices, often in relation to cybercrime or computer crime investigations.
Analysis: Examining the collected data (including hidden files, deleted files,
system logs, registry entries, internet history, emails) using specialized
software tools.
o Techniques: File carving (recovering deleted files), timeline analysis, registry analysis,
log file analysis, keyword searching, steganography detection.
o Application: Investigating virtually any crime where digital devices might hold
evidence, from terrorism and organized crime to corporate espionage and civil
litigation.
o Challenges:
Data Volume & Volatility: IoT devices often generate vast amounts of data,
much of which may be transient or stored temporarily in volatile memory.
Data Location: Data might be stored on the device, a connected mobile app,
a manufacturer's cloud server, or distributed across all three, complicating
acquisition.
Legal & Privacy Issues: Questions around data ownership, jurisdiction (data
stored in the cloud across borders), and user privacy.
This section covers the measures, tools, and practices used to protect digital assets.
o Mechanism: Users create one strong "master password" to unlock the password
manager's encrypted database (vault). The manager can generate highly complex,
unique passwords for each website/service, store them securely, and often
automatically fill login forms in web browsers via extensions. Many also offer
features like password security audits (checking for weak or reused passwords),
breach monitoring (alerting if stored credentials appear in known data breaches),
and secure sharing options.
o Mechanism: Operates at the network stack level, inspecting data packets based on
rules that specify criteria like IP addresses, protocols (TCP, UDP, ICMP), port numbers,
and application programs. "Stateful" means it tracks the state of active network
connections, allowing expected return traffic while blocking unsolicited incoming
connections. The "Advanced Security" interface allows granular configuration of
inbound, outbound, and connection security rules.
o Features: Profile-based rules (Domain, Private, Public networks), support for IPsec
(see below), detailed logging, integration with Windows security ecosystem.
o Importance: Provides essential protection, especially against network worms and
direct connection attempts from attackers scanning the internet. Needs proper
configuration for optimal effectiveness.
o Example: Configuring the firewall to block all incoming traffic on the Remote
Desktop Protocol (RDP) port from the public internet, allowing it only from specific
trusted IP addresses within the company network, significantly reduces the risk of
brute-force RDP attacks.
4.3 Connection Security Rules (IPsec):
o Definition: Specific rules, often configured within advanced firewalls (like Windows
Firewall with Advanced Security) or dedicated network devices, that enforce secure
communication channels using the Internet Protocol Security (IPsec) suite of
protocols. IPsec provides authentication, integrity, and confidentiality for IP
communications.
o Mechanism: IPsec operates at the network layer (Layer 3). Connection Security Rules
define when and how IPsec should be used between two endpoints (computers,
servers, networks). They specify requirements like:
Authentication: Verifying the identity of the communicating parties (using
certificates or pre-shared keys).
Data Integrity: Ensuring data hasn't been tampered with in transit (using
hashing algorithms).
o Application: Commonly used to create Virtual Private Networks (VPNs) for secure
remote access or site-to-site connections, secure server-to-server communication
within a domain (e.g., protecting domain controller traffic), or isolate sensitive
systems by requiring authenticated and encrypted connections.
o Practices:
Verify HTTPS: Ensure websites handling sensitive data use HTTPS (padlock
icon in address bar), encrypting data between browser and server.
o Example: Before entering login details on a bank's website, a user checks that the
address starts with "https://" and the domain name is correct, ignoring a pop-up ad
warning them their computer is infected and urging them to download a "cleaner"
tool (which is likely malware).
o Practices:
Look for Secure Connections: Always ensure the payment page uses HTTPS.
Use Secure Payment Methods: Credit cards generally offer better fraud
protection than debit cards (liability limits). Payment services like PayPal add
another layer of security by not exposing card details directly to the
merchant. Avoid wire transfers or direct bank transfers for unknown sellers.
Strong Passwords for Accounts: Use strong, unique passwords for shopping
accounts.
Monitor Statements: Regularly check bank and credit card statements for
unauthorized transactions.
Read Privacy Policies & Return Policies: Understand how your data will be
used and what the return/refund process is.
Secure Your Device: Ensure the device used for shopping is protected with
security software.
o Importance: Protects financial information, prevents fraud, ensures legitimate
transactions.
o Example: A user wants to buy a popular smartphone. They compare prices on the
official manufacturer site, major electronics retailers (like Croma, Reliance Digital
online), and large marketplaces (Amazon, Flipkart). They avoid clicking on social
media ads offering the phone at an unbelievably low price from an unknown
website, opting to purchase from a well-established retailer using a credit card
through the secure checkout page (HTTPS).
Disable WPS (Wi-Fi Protected Setup): While convenient, WPS (especially the
PIN method) has known vulnerabilities and should generally be disabled.
Network Name (SSID): Change the default SSID to something unique (though
hiding the SSID offers minimal security benefits against determined
attackers).
Keep Router Firmware Updated: Regularly check for and install firmware
updates from the manufacturer to patch security vulnerabilities.
Guest Network: If the router supports it, set up a separate guest network for
visitors, isolating them from your main network and devices.
MAC Address Filtering (Limited Security): Can restrict access to only devices
with specific MAC addresses, but MAC addresses can be spoofed, so this is
not a primary security measure.
o Example: When setting up a new home Wi-Fi router, the user immediately logs into
the router's admin panel, changes the default admin password, sets the wireless
security mode to WPA2/WPA3-Personal (AES), creates a strong, long passphrase for
the Wi-Fi network, and changes the default network name (SSID).