Professional Documents
Culture Documents
Cybercrime & Economic Offence Project
Cybercrime & Economic Offence Project
Cybercrime & Economic Offence Project
FYBCOM
Semester I
CYBER CRIME
Submitted by:
Roll No:
Recent events throughout the world have evidenced that high-profile hackers and state-
sponsored attempts at security breaches have been steadily increasing since 2020. It is
becoming rapidly apparent that no sector is immune to becoming a victim of a data breach,
including the airline industry, where the safety of crew and passengers is put at grave risk.
The Air India security breach was India’s second major airline data breach within six months
Cybercrime is any criminal activity that involves a computer, networked device or a network.
While most cybercrimes are carried out in order to generate profit for the cybercriminals,
some cybercrimes are carried out against computers or devices directly to damage or disable
them. Others use computers or networks to spread malware, illegal information, images or
other materials. Some cybercrimes do both -- i.e., target computers to infect them with a
computer virus, which is then spread to other machines and, sometimes, entire networks.
A primary effect of cybercrime is financial. Cybercrime can include many different types of
profit-driven criminal activity, including ransomware attacks, email and internet fraud, and
identity fraud, as well as attempts to steal financial account, credit card or other payment card
information.
Cybercriminals may target an individual's private information or corporate data for theft and
resale. As many workers settle into remote work routines due to the pandemic, cybercrimes
are expected to grow in frequency in 2021, making it especially important to protect backup
data.
Cybercrime attacks can begin wherever there is digital data, opportunity and motive.
Cybercriminals include everyone from the lone user engaged in cyberbullying to state
sponsored actors, like China's intelligence services.
Cybercrimes generally do not occur in a vacuum; they are, in many ways, distributed in
nature. That is, cybercriminals typically rely on other actors to complete the crime. This is
whether it's the creator of malware using the dark web to sell code, the distributor of illegal
pharmaceuticals using cryptocurrency brokers to hold virtual money in escrow or state threat
actors relying on technology subcontractors to steal intellectual property (IP).
Cybercriminals often carry out their activities using malware and other types of software, but
social engineering is often an important component for executing most types of cybercrime.
Phishing emails are another important component to many types of cybercrime but especially
so for targeted attacks, like business email compromise (BEC).
TYPES OF CYBER CRIME
There are literally a dozen ways in which a cybercrime can be perpetrated, and
you need to know what they are;
In order to protect yourself you need to know about the different ways in which your
computer can be compromised and your privacy infringed. In this section, we discuss a
few common tools and techniques employed by the cyber criminals. This isn’t an
exhaustive list by any means, but will give you a comprehensive idea of the loopholes in
networks and security systems, which can be exploited by attackers, and also their
possible motives for doing so. Some of the ways are briefly explained below:
1. Hacking
In simple words, hacking is an act committed by an intruder by accessing your computer
system without your permission. Hackers (the people doing the ‘hacking’) are basically
computer programmers, who have an advanced understanding of computers and
commonly misuse this knowledge for devious reasons. They’re usually technology buffs
who have expert-level skills in one particular software program or language. As for
motives, there could be several, but the most common are pretty simple and can be
explained by a human tendency such as greed, fame, power, etc.
2. Virus dissemination
Viruses are computer programs that attach themselves to or infect a system or files, and
have a tendency to circulate to other computers on a network. They disrupt the
computer operation and affect the data stored – either by modifying it or by deleting it
altogether. “Worms” unlike viruses don’t need a host to cling on to. They merely
replicate until they eat up all available memory in the system. The term “worm” is
sometimes used to mean self replicating “malware” (Malicious Software). These terms
are often used interchangeably in the context of the hybrid viruses/worms that
dominate the current virus scenario. “Trojan horses” are different from viruses in their
manner of propagation.
3. Phishing
This a technique of extracting confidential information such as credit card numbers and
typically carried out by email spoofing. You’ve probably received email containing links
to legitimate appearing websites. You probably found it suspicious and didn’t click the
5. Web jacking
Web jacking derives its name from “hijacking”. Here, the hacker takes control of a web
site fraudulently. He may change the content of the original site or even redirect the
user to another fake similar looking page controlled by him. The owner of the web site
has no more control and the attacker may use the web site for his own selfish interests.
6. Software Piracy
Thanks to the internet and torrents, you can find almost any movie, software or song
from any origin for free. Internet piracy is an integral part of our lives which knowingly or
unknowingly we all contribute to. This way, the profits of the resource developers are
being cut down. It’s not just about using someone else’s intellectual property illegally but
also passing it on to your friends further reducing the revenue they deserve.
8. Cyber stalking
Cyber stalking is a new form of internet crime in our society when a person is pursued
or followed online. A cyber stalker doesn’t physically follow his victim; he does it virtually
by following his online activity to harvest information about the stalkee and harass him
or her and make threats using verbal intimidation. It’s an invasion of one’s online
privacy.
EFFECTS OF CYBER CRIME ON BUSINESS
The true cost of cybercrime is difficult to assess accurately. In 2018, McAfee released a
report on the economic impact of cybercrime that estimated the likely annual cost to the
global economy was nearly 600 billion.
While the financial losses due to cybercrime can be significant, businesses can also suffer
other disastrous consequences as a result, including the following:
Damage to investor perception after a security breach can cause a drop in the value of
the company.
In addition to potential share price drops, businesses may also face increased costs for
borrowing and greater difficulty in raising more capital as a result of the cyber attack.
Loss of sensitive customer data can result in fines and penalties, businesses may also
be sued over the data breach.
Damaged brand identity and loss of reputation.
While it may not be possible to completely eradicate cybercrime and ensure complete internet
security, businesses can reduce their exposure to it by maintaining an effective cybersecurity
strategy using a defensive-in-depth approach to securing systems, networks and data.
CONTENT
1. www.techtarget.com
2. www.researchgate.net
3. www.McAfee.com
IMAGES
1. Google images