11801322110_AKASH.KHAN (1)
11801322110_AKASH.KHAN (1)
11801322110_AKASH.KHAN (1)
TECHNOLOGY
NAME- AKASH KHAN
ROLL NO- 11801322110
REG NO- 221180120032
SEMESTER- 7th
YEAR- 4th
SESSION- 2024-25
Department-Civil Engineering
SUBJECT-Cyber Law & Ethics
SUBJECT CODE-CE(OE)701C
An example of software piracy is when you download a fresh non-activated copy of windows and use what is
known as “Cracks” to obtain a valid license for windows activation. This is considered software piracy.
Not only software can be pirated but also music, movies, or pictures.
4. Social Media Frauds
The use of social media fake accounts to perform any kind of harmful activities like impersonating other users or
sending intimidating or threatening messages. And one of the easiest and most common social media frauds is
Email spam.
5. Online Drug Trafficking
With the big rise of cryptocurrency technology, it became easy to transfer money in a secured private way and
complete drug deals without drawing the attention of law enforcement. This led to a rise in drug marketing on
the internet.
Illegal drugs such as cocaine, heroin, or marijuana are commonly sold and traded online, especially on what is
known as the "Dark Web".
6. Electronic Money Laundering
Also known as transaction laundering. It is based on unknown companies or online business that makes
approvable payment methods and credit card transactions but with incomplete or inconsistent payment
information for buying unknown products.
It is by far one of the most common and easy money laundering methods.
What is Cybercrime?
Cybercrime can be defined as “The illegal usage of any communication device to commit or facilitate in
committing any illegal act”.
A cybercrime is explained as a type of crime that targets or uses a computer or a group of computers
under one network for the purpose of harm.
Cybercrimes are committed using computers and computer networks. They can be targeting individuals,
business groups, or even governments.
Investigators tend to use various ways to investigate devices suspected to be used or to be a target of a
cybercrime.
Cybercriminals
A cybercriminal is a person who uses his skills in technology to do malicious acts and illegal activities known as
cybercrimes. They can be individuals or teams.
Cybercriminals are widely available in what is called the “Dark Web” where they mostly provide their illegal
services or products.
Not every hacker is a cybercriminal because hacking itself is not considered a crime as it can be used to reveal
vulnerabilities to report and batch them which is called a “white hat hacker”.
However, hacking is considered a cybercrime when it has a malicious purpose of conducting any harmful
activities and we call this one “black hat hacker” or a cyber-criminal.
It is not necessary for cybercriminals to have any hacking skills as not all cyber crimes include hacking.
Cybercriminals can be individuals who are trading in illegal online content or scammers or even drug dealers. So
here are some examples of cybercriminals:
- Black hat hackers
- Cyberstalkers
- Cyber terrorists
- Scammers
Classifications of Cybercrimes
A passive attack is a type of network attack which involves monitoring and occasionally
scanning a system for open ports and vulnerabilities without actually tampering or
altering with the data. A passive attack doesn't directly harm the target; instead, its
goal is to learn more about the system that is the target .
Active attack
An active attack is an attempt to alter your computer network systems resources or operations
by making changes to your existing data, modifying data in transit, or inserting data into the
system. The main objective of an active attack is to interfere with the way your network
performs its operations by either modifying the target data or introducing new data into your
system or device. Think of all the activities a hacker can perform while compromising your
network server or computer, they can be grouped under active attacks. The hacker will try to
manipulate data to harm the target's computer network system.
What is Cyberstalking?
Cyberstalking is the use of the internet or digital tools to repeatedly harass,
threaten, or stalk someone. It includes sending unwanted messages, hacking
accounts, or spreading lies online. The goal is often to scare or distress the victim.
Cyberstalkers often use social media, email, or other online platforms. Cyberstalking
involves using digital platforms to intimidate or control someone by continuously
monitoring or harassing them online, they can track the victim’s online activity.
Cyberstalkers may impersonate their victims, post false information, or make
threatening comments. They often create multiple accounts to avoid detection and
can track the victim’s location or personal activities using GPS or spyware.
Cyberstalking can results into offline threats and is a serious situation of destruction
of privacy which can often requires legal action to stop. Cyberstalking is harmful and
illegal.
Attack Vector
Cloud Computing
Cloud users should enable MFA for all their cloud accounts to prevent unauthorized
access. Unpatched software is another common cause of cloud cyber crimes.
Cyber criminals can exploit vulnerabilities in cloud software to gain unauthorized
access to cloud resources or execute malicious code.
REFERENCES-GOOGLE
THANK YOU