Cybersecurity, also known as information technology security, is the practice of protecting computer systems, networks, programs, devices, and data from malicious attacks, damage, or unauthorized access. It encompasses a wide range of strategies, technologies, and processes designed to ensure the confidentiality, integrity, and availability of digital assets.
Information security :
• Information Security is not only about securing information from unauthorized access.
• Information Security is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information
• Information can be physical or electronic one. Information can be anything like Your details or we can say your profile on social media. your data in mobile phone, your biometrics etc.
• Thus Information Security spans so many research areas like Cryptography, Mobile Computing, Cyber Forensics, Online Social Media etc.
•Information Security programs are build around 3 objectives, commonly known as CIA - Confidentiality, Integrity, Availability.
2)Write Are not on confidenty, integrity, availability.
1 Confidentiality :
means information is not disclosed to unauthorized individuals, entities and process. For example if we say I have a password for my Gmail account but someone saw while I was doing a login into Gmail account. In that case my password has been compromised and Confidentiality has been breached.
2. Integrity :
means maintaining accuracy and completeness of data This means data cannot be edited in an unauthorized way. For example if an employee leaves an organisation then in that case data for that employee in all departments like accounts, should be updated to reflect status to JOB LEFT so that data is complete and accurate and in addition to this only authorized person should be allowed to edit employee data.
3.Availability :
means information must be available when needed. For example if one needs to access information of a particular employee to check whether employee has outstanded the number of leaves, in that case it requires collaboration from different organizational teams like network operations, development operations, incident response and policy/changemanagement. Denial of service attack is one of the factor that can hamper the availability
___ _
3)Who are cybercriminals discuss in detail The various type.
• Are those who conduct acts such as:Credit card fraud--Cyberstalking - Defaming another online - Gaining unauthorized access to computer systems - Ignoring copyrights Software licensing and trademark protection - Overriding encryption to make illegal copies Software piracy Stealing another's identity to perform criminal acts
Categorization of Cybercriminals
Type 1:
Cybercriminals- hungry for recognition- Hobby hackers A person who enjoys exploring the limits of what is possible, in a spirit of playful cleverness. May modify hardware/ software - IT professional(social engineering): Ethical hacker - Politically motivated hackers:. promotes the objectives of individuals, groups or nations supporting a variety of causes such as Anti globalization, transnational conflicts and protest Terrorist organizations • Cyberterrorism • Use the internet attacks in terrorist activity • Large scale disruption of computer networks , personal computers attached to internet via
viruses
Type_2: Cybercriminals-_ not _ interested in recognition-
Financially motivated hackers • Make money from cyber attacks • Bots-for-hire : fraud through phishing, information theft, spam and extortion - State-sponsored hacking • Hacktivists • Extremely professional groups working for governments • Have ability to worm into the networks of the media, major corporations, defense departments
Type3: Cybercriminals- the insiders
Disgruntled or former employees seeking revenge Competing companies using employees to gain economic advantage through damage and/ or theft.
4) Explain various classification of cybercrane.
CLASSIFICATION OF CYBERCRIME:
Cybercrime are majorly of 4 types:
1. Against Individuals: These include e-mail spoofing, spamming, cyber defamation, cyber harassments and cyber stalking
2. Against Property: These include credit card frauds, internet time theft and intellectual property crimes
3. Against Organisations: These include unauthorized accessing of computer, denial Of service, computer contamination / virus attack, e-mail bombing, salami attack, logic bomb, trojan horse and data diddling.
4. Against Society: These include Forgery, CYber Terrorism, Web Jacking.
Classification Of Cyber Crimes Cyber crimes can be classified in to 4
major categories as the following:
(1) Cyber crime against Individual
(2) Cyber crime Against Property
(3) Cyber crime Against Organization
(4) Cyber crime Against Society
5)Explain hacking and Indian law under the IT Act 2000 (Cybercrime).
Hacking:
•Hacking is defined as unauthorized access to or control over computer network security systems for some illicit purpose.
•It involves gaining access to a system without the owner’s permission and can result in data theft, damage, or misuse.
Indian Law – IT Act 2000:
The Information Technology Act 2000 is India's main law dealing with cybercrime and electronic commerce.
Section 66 of the IT Act specifically deals with hacking.
Section 66: Hacking with computer system
If any person, with the intent to cause or knowing that he is likely to cause wrongful loss or damage to the public or any person, destroys or deletes any information or diminishes its value or utility, he shall be punished with:
●Imprisonment up to 3 years
●Fine up to ₹5 lakh, or both.
6) How to file a complaint about hacking?
• A complaint about the cyber crime can be filed at any cyber cell globally. There are various cyber crime cells in India; a complaint can be filled at any of these
1.Firstly write an application to the head of the cyber celldepartment and the complaint should contain the name, address, e-mail and telephone number.
2. Secondly, submit the following documents with the cell;
• Server logs- log files that get automatically with the server when files are opened. It saves a list of activities performed on day to day basis.
• Hardcopy and soft copy of the defected material- all the material that has been tempered with by the hacker needs to be submitted with the cyber cell as evidence.
• A hard copy of the original web pages and the defaced ones- copies of both the original and defaced material should be submitted so that it makes the work easy to locate the defaced or tampered material.
• Details of the control mechanism where the complainant needs to tell the details of those who had the access to the password and the computer.
• If there is any suspicion on any person, a list of the suspects should also be given for further reference that could help the cyber cell in investigatio
7) Identify the cybercrime, IT Act 2000 section and punishment of each of the following scenario.
Scenario 1:
Publishing on offensive statement against the person on a social networking site.
Scenario 2 :
A law for India discovered that someone code of website abc.com change the India reference to Russia and rooted to fake sight
Scenario 1:
Publishing an offensive statement against a person on a social networking site.
Cybercrime: Cyber Defamation / Offensive Messages
Relevant Section: Section 66A of IT Act 2000 (Note: Though this section was struck down by the Supreme Court in 2015, it's still mentioned in educational materials)
Description: Sending offensive messages through communication service (like Facebook, WhatsApp, Twitter, etc.)
Punishment:
Imprisonment up to 3 years
Fine
Scenario 2:
Someone changed the India reference to Russia on website abc.com and redirected it to a fake site.
Cybercrime: Website Defacement / Hacking / Spoofing
Relevant Sections:
Section 66: Hacking
Section 66C: Identity theft (if credentials were misused)
Section 66D: Cheating by personation using computer resources
Section 65: Tampering with computer source documents
Punishment:
Section 66: Up to 3 years imprisonment or ₹5 lakh fine or both
Section 65: Up to 3 years jail or ₹2 lakh fine or both
Section 66D: Up to 3 years imprisonment and fine up to ₹1 lakh

0 Comments