Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Cyber Law – CS204

Name: Misbah Hanif


Student ID: bc210403901
Assignment #: 01

Question#: 1 Marks 08

Identify the category of the following scenarios of cyber crimes


(1)Agains Individual
(2)Against Property
(3) Against Government

By placing an “X” as appropriate in the following table:

Sr # Scenario of Cyber crime Against Against Against


Individual Property Governme
nt
 Cyber Terrorism

 Phishing

 Crashing a web server of


a hosting company
 Bank Credit Card Fraud
Solution:
Now I discuss the scenarios of cybercrimes:
 Individual: This type of cybercrime has one user generating hostile or illicit
information via the internet.
 Property: This is identical to an actual scenario in which a criminal unfairly
obtains a person's bank or credit card information. The hacker takes a person's
bank account research to obtain access to funds, make online transactions, or
launch phishing scam to dupe people into giving over their personal information.
 Government: Although this is the rare type of cybercrime, it is the most severe.
Phishing is a crime against government.

Sr # Scenario of Cyber crime Against Against Against


Individual Property Governmen
t
 Cyber Terrorism X
 Phishing X X
 Crashing a web server of a X
hosting company
 Bank Credit Card Fraud X

Question#: 2 Marks 07

Mr. Omar received an email regarding “promotions and sales” from a fake e-
commerce site. The email contains a file that gets executed by a click, and the computer
gets infected with some kind of viruses that deletes all the necessary DLL files of the
windows and increases the CPU utilization by running fake .exe files, which makes the
system performance and speed very much slow. The whole activity results in the restart
of Mr. Omar's computer repeatedly.
Keeping in view the above scenario, answer the following questions:

1. Mention the cyber-crime name(s) which is occurring in the scenario.


2. Mention the category of cyber-crime.
3. Mention any 3 possible prevention measures for such type of cyber-crimes.
Solution:
1:Email spoofing:
Email spoofing is a type of cybercrime that occurs in the above scenario. Email
spoofing is a type of cyber-attack in which a hacker sends an email that has been altered
to appear as if it came from a reliable source. Because consumers are more likely to
read an email if they believe it was sent by a known sender, email spoofing is a
common phishing and spam method. The purpose of email spoofing is to persuade
recipients to open or transmit information.
2.Ans: Email spoofing can take different forms, including:

 Name spoofing: Name spoofing occurs when an attacker impersonates the


identity or display name of someone the email recipient would trust.
 Domain spoofing: Attackers can imitate a trusted domain to trick recipients
who have subscribed to emails from that domain.
 Look-alike domain spoofing: When a domain indicated in an email address is
used to deceive the receiver visually by sending emails from a similar domain,
this is known as look-alike domain spoofing. If the letter 'o' in the domain
address is replaced with a '0,' for example, the recipient is fooled into thinking
the email is from a reliable source.
3.Ans: There are a variety of strategies and methods for preventing spoofing email
assaults.
1. Create an SPF record:
SPF stands for Sender Policy Framework, which is email verification and
authentication tool that focuses on spoofing protection. It enables you to identify
IP addresses that are capable of sending emails using your domain.

2. Create a DKIM record:


DKIM also works to prevent thieves from sending malicious emails from your
domain. DKIM is an email finding system based on encryption.

3. Create a DMARC record.


DMARC works by standardizing the way servers check emails. It verifies the
sender using SPF and/or DKIM and allows the domain owner to take action.

You might also like