Académique Documents
Professionnel Documents
Culture Documents
REPORT
GROUP MEMBER:
HANNAN SHAHID
HASEEB ALI
HAMZA ANWER
BILAL ASIF
UNKNOWN.....?
TABLE OF CONTENTS
1 Introduction..............................................(X)
5 Cyber Terrorism..........................................(X)
6 Denial-of-services Attacks..........................(X)
6.1 denial-of services attack...................(X)
7 Trojan horse Attacks.................................(X)
7.1 Tojan horse Attack..........................(X)
7.2 pupose of Trojan attacks.................(X)
8 Salami Attacks............................................(X)
8.1 Salami attacks.....................................(X)
8.2 How to Avoid a Salami attack..........(X)
9 Computer Vandalism...................................(X)
9.1 Computer Vandalism...........................(X)
9.2 who are the computer vandals?.........(X)
9.3 Today's vandalism computer threats...(X)
9.4 protection against computer vandalism..(X)
10 Conclusion....................................................(X)
10.1 Conclusion............................................(X)
10.2 Recommendation................................(X)
SUMMARY
Executive Summary Cyberspace is one of the great legal frontiers of our time. From 2000 to 2005, the
Internet has expanded at an average rate of 160 percent and currently an estimated 938 million people
are “on the Net.”1 Individuals, groups, and states depend on cyberspace for an unprecedented level of
services. Maintaining the confidentiality, integrity, and availability of the networks and the data they
carry increases the trust individuals and groups place in their information infrastructures to take
advantage of those services. Increasing trust allows greater levels of traditionally non-electronic services
to be made available, and encourages stable development and innovation of new services. Only through
developing compatible standards and laws can such innovation continue to grow. How we shape
standards and legal norms of conduct on the Internet now will affect millions of people in the future.
The standards and laws created must include greater flexibility to account for exponential growth in
technology and innovations. The Council of Europe Convention on Cybercrime is a historic milestone in
the combat against cyber crime. Member States of the Council of Europe should complete the
ratification of the Council of Europe Convention on Cybercrime of 2001, and other States should
evaluate the advisability of implementing the principles of the Convention, and consider the possibility
of acceding to that Convention. Based on the Council of Europe Convention on Cybercrime and the
recommendations from G8, OAS, and APEC, we may reach our goal of a global legal framework against
cybercrime. In order to make a proposal for the ratification or acceding to the Council of Europe
Convention on Cybercrime, establishing a Cybercrime Expert Committee is recommended. An Expert
Committee commission may be split in two reports. The first report should consist of a proposal for the
necessary amendments in the penal code and the criminal procedural law only for the ratification or
acceding to the Convention. The second report should cover a broader approach with an overview of all
possible amendments in the domestic penal and procedural provisions needed in the information and
communication technology of computer systems and networks. The strategy for a Committee may
therefore be using declarations according to article 40, and reservations according to article 42,
whenever it is possible. The Convention uses technology-neutral language so that the offences may be
applied to both current and future technology. States may exclude petty or insignificant misconduct
from implementation of the offences. The offences must be committed intentionally for criminal liability
to apply. Intentionally may be understood as wilfully or knowingly, but it is left to national
interpretation. Only in certain offences additional specific intentional element applies, for instance on
computer-related fraud with the requirement of fraudulent or dishonest intent of procuring an
economic benefit. The offence must be committed without right. This may refer to conducts undertaken
without authority or conducts not covered by established legal defences, excuses, justifications or
relevant principles under domestic law. The offences are not intended to criminalize legitimate and
common activities inherent in the design of networks, or legitimate and common operating or
commercial practices.
CHAPTER 1
INTRODUCTION
1.1 What is cyber crime?
Cyber crime, or computer related crime, is crime that involves a
computer and a network. The computer may have been used in
the commission of a crime, or it may be the target.Debarati
Halder and K. Jaishankar define cybercrimes as: "Offences that
are committed against individuals or groups of individuals with
a criminal motive to intentionally harm the reputation of the
victim or cause physical or mental harm, or loss, to the victim
directly or indirectly, using modern telecommunication
networks such as Internet (networks including but not limited
to Chat rooms, emails, notice boards and groups) and mobile
phones (Bluetooth/SMS/MMS)".
Cybercrime may threaten a person or a nation's security and
financial health. Issues surrounding these types of crimes have
become high-profile, particularly those surrounding hacking,
copyright infringement, unwarranted mass-surveillance, and
child grooming. There are also problems of privacy when
confidential information is intercepted or disclosed, lawfully or
otherwise. Debarati Halder and K. Jaishankar further define
cybercrime from the perspective of gender and defined
'cybercrime against women' as "Crimes targeted against
women with a motive to intentionally harm the victim
psychologically and physically, using modern
telecommunication networks such as internet and mobile
phones". Internationally, both governmental and non-state
actors engage in cybercrimes, including espionage, financial
theft, and other cross-border crimes. Activity crossing
international borders and involving the interests of at least one
nation state is sometimes referred to as cyberwarfare
1.2 History
Cybercrime first started with hackers trying to break into
computer networks. Some did it just for the thrill of accessing
high-level security networks, but others sought to gain
sensitive, classified material. Eventually, criminals started to
infect computer systems with computer viruses, which led to
breakdowns on personal and business computers.
Computer viruses are forms of code or malware programs that
can copy themselves and damage or destroy data and systems.
When computer viruses are used on a large scale, like with
bank, government or hospital networks, these actions may be
categorized as cyberterrorism. Computer hackers also engage
in phishing scams, like asking for bank account numbers, and
credit card theft.
1.3 Types
• hacking
• information theft
• email bombing
• cyber terrorism
• computer vandalism
• denial-of-services attack
• trojan horses attack
• salami attack
(and many more types )
CHAPTER 2
HACKING
2.1 Hacking is cyber crime?
4 EMAIL BOMBING
5 CYBER TERRORISM
CHAPTER 6
DENIAL-OF-
SERVICES ATTACK
A DoS or DDoS attack is analogous to a group of people crowding the entry door
or gate to a shop or business, and not letting legitimate parties enter into the
shop or business, disrupting normal operations.
Criminal perpetrators of DoS attacks often target sites or services hosted on high-
profile web servers such as banks or credit card payment gateways. Revenge,
blackmail and activism can motivate these attacks.
A DoS attack can be done in a several ways. The basic types of DoS attack include:
1. Flooding the network to prevent legitimate network traffic
Another variant of the DoS is the smurf attack. This involves emails with
automatic responses. If someone emails hundreds of email messages with a fake
return email address to hundreds of people in an organization with an
autoresponder on in their email, the initial sent messages can become thousands
sent to the fake email address. If that fake email address actually belongs to
someone, this can overwhelm that person's account.
1. Ineffective services
2. Inaccessible services
4. Connection interference
Court testimony shows that the first demonstration of DoS attack was made by
Khan C. Smith in 1997 during a DEFCON event disrupting Internet access to the
Las Vegas Strip for over an hour and the release of sample code during the event
led to the online attack of Sprint, EarthLink, E-Trade, and other major
corporations in the year to follow.
CHAPTER 7
TROJAN HORSE ATTACKS
7.1 Trojan Horse Attacks
In computing, Trojan horse, or Trojan, is any malicious
computer program which is used to hack into a computer by
misleading users of its true intent. The term is derived from the
Ancient Greek story of the wooden horse that was used to help
Greek troops invade the city of Troy by stealth.
Trojans are generally spread by some form of social
engineering, for example where a user is duped into executing
an e-mail attachment disguised to be unsuspicious, (e.g., a
routine form to be filled in), or by drive-by download or from
spam links and fake pop up & Advertisement. Although their
payload can be anything, many modern forms act as a
backdoor, contacting a controller which can then have
unauthorized access to the affected computer.Trojans may
allow an attacker to access users' personal information such as
banking information, passwords, or personal identity (IP
address). Also, Ransomware attacks—which blocks access to
data or threatens to publish it until a ransom is paid—are
usually carried out using a Trojan.
Unlike computer viruses and worms, Trojans generally do not
attempt to inject themselves into other files or otherwise
propagate themselves.
1 Destructive
• Crashing the computer or device.
• Modification or deletion of files.
• Data corruption.
• Block any anti-virus program.
• Block any installation process.
• Formatting disks, destroying all contents.
• Spreading malware across the network.
• Spying on user activities and access sensitive information.
2. Use of resources or identity
• Use of the machine as part of a botnet (e.g. to perform
automated spamming or to distribute Denial-of-service
attacks)
• Using computer resources for mining cryptocurrencies
• Using the infected computer as proxy for illegal activities
and/or attacks on other computers.
• Infecting other connected devices on the network.
3. Money theft, ransom
• Electronic money theft
• Installing ransomware such as CryptoLocker
4. Data theft
• Data theft, including for industrial espionage
• User passwords or payment card information
• User personally identifiable information
• Trade secrets
Trojan horses in this way may require interaction with a
malicious controller (not necessarily distributing the Trojan
horse) to fulfill their purpose. It is possible for those involved
with Trojans to scan computers on a network to locate any with
a Trojan horse installed, which the hacker can then control.
Some Trojans take advantage of a security flaw in older
versions of Internet Explorer and Google Chrome to use the
host computer as an anonymizer proxy to effectively hide
Internet usage, enabling the controller to use the Internet for
illegal purposes while all potentially incriminating evidence
indicates the infected computer or its IP address. The host's
computer may or may not show the internet history of the sites
viewed using the computer as a proxy. The first generation of
anonymizer Trojan horses tended to leave their tracks in the
page view histories of the host computer. Later generations of
the Trojan horse tend to "cover" their tracks more efficiently.
Several versions of Sub7 have been widely circulated in the US
and Europe and became the most widely distributed examples
of this type of Trojan horse.
In German-speaking countries, spyware used or made by the
government is sometimes called govware. Govware is typically
a trojan horse software used to intercept communications from
the target computer. Some countries like Switzerland and
Germany have a legal framework governing the use of such
software. Examples of govware trojans include the Swiss
MiniPanzer and MegaPanzer and the German "state trojan"
nicknamed R2D2.
Due to the popularity of botnets among hackers and the
availability of advertising services that permit authors to violate
their users' privacy, Trojan horses are becoming more common.
According to a survey conducted by BitDefender from January
to June 2009, "Trojan-type malware is on the rise, accounting
for 83-percent of the global malware detected in the world."
Trojans have a relationship with worms, as they spread with the
help given by worms and travel across the internet with them.
BitDefender has stated that approximately 15% of computers
are members of a botnet, usually recruited by a Trojan
infection.
CHAPTER 8
SALAMI ATTACKS
The victims that take the fall for such acts are usually bank
holders, and websites that store account information like
PayPal. It can be quite scary to have amounts disappear in large
portions at once, making it a onetime incident for the company.
Raj B Lonsane states that the amount of money that is then lost
cannot be replaced by the company, leading them to take on
court battles without the money to replace what is lost.
Therefore for an insider to do this on a regular basis, he/she
deducts money slyly in small quantities without having the
customer in question, take notice.
CHAPTER 10
CONCLUSION
10.1
CONCLUSION
In my opinion, any sort of crime (online or offline) should never
be tolerated. The safety and well-being of citizens should be
safeguarded. Everyone deserves a right to live in a secure
environment, no matter in real-life or on the Internet.
After doing my research on this issue, I understand the motives
of cyber-criminals. To a certain extent, I see why some choose
to take their political/religious protests online:
• global reach of the Internet
• support is quickly gained
• online protests are sure to get attention
• protestors are less likely to get caught
However, I find cyber-crime more serious than real-life crime,
for the sole reason that it usually affects millions of web users
at once (as compared to perhaps one bank or store in a real-life
robbery).
When online business activities are disrupted, its leads to great
inconvenience for customers and companies.
With technology being such a big part of our lifestyles today,
cyber-crime has no place in it.
I fully support measures and plans to battle cyber-crime.
For instance, following cyber-attacks on Sony, the Federal
Bureau of Investigation has issued search warrants to arrest the
culprits. To me, it is a massive piece of news, because it
indicates a strengthening commitment against cyber-criminals:
10.2
Recommendations
Glossary
•
Glossary of Cybercrime Terms
• Cybercrime Dictionary
• back door -- a vulnerability intentionally left in the security of a computer system or its
software by its designers
• black hat -- a term used to describe a hacker who has the intention of causing damage or
stealing information
• cracker -- a term sometimes used to refer to a hacker who breaks into a system with the
intent of causing damage or stealing data
• decrypt -- the process of converting encrypted information back into normal, understandable
text
• denial of service (DoS) -- an attack that causes the targeted system to be unable to fulfill its
intended function
• dumpster diving -- looking through trash for access codes or other sensitive information
• email -- an application that allows the sending of messages between computer users via a
network
• encryption -- the process of protecting information or hiding its meaning by converting it into
a code
• firewall -- a device designed to enforce the boundary between two or more networks, limiting
access
• hacker -- a term sometimes used to describe a person who pursues knowledge of computer
and security systems for its own sake; sometimes used to describe a person who breaks into
computer systems for the purpose of stealing or destroying data
• hacking -- original term referred to learning programming languages and computer systems;
now associated with the process of bypassing the security systems on a computer system or
network
• high risk application -- a computer application that, when opened, can cause the user to
become vulnerable to a security breach
• hijacking -- the process of taking over a live connection between two users so that the
attacker can masquerade as one of the users
• host -- a computer system that resides on a network and can independently communicate
with other systems on the network
• Hypertext Markup Language (HTML) -- the language in which most webpages are written
• information security -- a system of procedures and policies designed to protect and control
information
• Internet service provider (ISP) -- any company that provides users with access to the
Internet
• intranet -- a private network used within a company or organization that is not connected to
the Internet
• IP spoofing -- an attack where the attacker disguises himself or herself as another user by
means of a false IP network address
• keystroke monitoring -- the process of recording every character typed by a computer user
on a keyboard
• leapfrog attack -- using a password or user ID obtained in one attack to commit another
attack
• letterbomb -- an email containing live data intended to cause damage to the recipient's
computer
• malicious code -- any code that is intentionally included in software or hardware for an
unauthorized purpose
• one-time password -- a password that can be used only once, usually randomly generated
by special software
• packet sniffer -- a device or program that monitors the data traveling over a network by
inspecting discrete packets
• password sniffing -- the process of examining data traffic for the purpose of finding
passwords to use later in masquerading attacks
• pen register -- a device that records the telephone numbers of calls received by a particular
telephone
• phreaker -- a person who hacks telephone systems, usually for the purpose of making free
phone calls
• piggyback -- gaining unauthorized access to a computer system via another user's legitimate
connection
• piracy -- the act of illegally copying software, music, or movies that are copyright-protected
• probe -- an effort to gather information about a computer or its users for the purpose of
gaining unauthorized access later
• risk assessment -- the process of studying the vulnerabilities, threats to, and likelihood of
attacks on a computer system or network
• smart card -- an access card that contains encoded information used to identify the user
• social engineering -- term often used to describe the techniques virus writers and hackers
utilize to trick computer users into revealing information or activating viruses
• trap and trace device -- a device used to record the telephone numbers dialed by a specific
telephone
• virus -- a computer program designed to make copies of itself and spread itself from one
• war dialer -- software designed to detect dial-in access to computer systems
Biography
Reference Page
• [And12] R. Anderson, C. Barton, R. Böhme, R. Clayton, M. J. G. van
Eeten, M. Levi, T. Moore, and S. Savage. Measuring the cost of
cybercrime. In 11th Workshop on the Economics of Information
Security (WEIS), Article 10, Berlin, Germany, Jun
2012. http://weis2012.econinfosec.org/papers/Anderson_WEIS2012.
pdf.
• [Har12] P. H. Hartel and M. Junger. Teaching information security
students to "think thief". Technical Report TR-CTIT-12-19, CTIT,
University of Twente, Jul
2012. http://eprints.eemcs.utwente.nl/22066/.
• [Kum09] P. Kumaraguru, J. Cranshaw, A. Acquisti, L. Cranor, J.
Hong, M. Blair, and T. Pham. School of phish: a real-word evaluation
of anti-phishing training. In 5th Symp. on Usable Privacy and
Security (SOUPS), page Article 3, Mountain View, California, Jul
2009. ACM. http://dx.doi.org/10.1145/1572532.1572536.
• [New09] G. R. Newman. Cybercrime. In M. D. Krohn, A. J. Lizotte,
and G. Penly Hall, editors, Handbook on Crime and Deviance, pages
551-584. Springer, Nov 2009. http://dx.doi.org/10.1007/978-1-4419-
0245-0_25.