Unit IV. Students Safety on the net
Computer
virus- (malwares, spywares,trojan)- preventive measures- (Firewall, antivirus
software
Cyber privacy and password protection
Legal and ethical issues
v Copyright
v Creative Common
Licence
v Plagiarism,
Hacking, Netiquette, Phishing, Software privacy
Cyber law- IT Act 2000, IT Act 2008.
Role
of teacher in conscientizing about
v
Child
abuse over the net
v
Misuse
of internet (morphing, pornography)
v Health
hazards of using computer
COMPUTER VIRUS
A computer virus is a type of malicious
software when executed, replicates itself
by modifying other computer
programs and inserting its own code. When this replication
succeeds, the affected areas are then said to be "infected" with a
computer virus. The vast majority of viruses target systems running Microsoft
Windows, employing a variety of mechanisms to infect new
hosts and often using complex anti-detection/stealth strategies to
evade antivirus software.
Motives for creating viruses can include
seeking profit, desire to send a political message, personal amusement, to
demonstrate that a vulnerability exists in software, or simply because they
wish to explore cybersecurity issues, artificial
life and evolutionary
algorithms
Computer viruses currently cause
economic damage each year, due to causing system failure, wasting computer
resources, corrupting data, increasing maintenance costs, etc.
The term "virus" is also
commonly, but erroneously, used to refer to other types of malware.
MALWARE
Malware is any software intentionally
designed to cause damage to a computer, server or computer
network. Malware does the damage after it is implanted or introduced in
some way into a target’s computer and can take the form of executable
code, scripts, active content, and other software. Malware has a malicious intent, acting
against the interest of the computer user—and so does not include software that
causes unintentional harm due to some deficiency, which is typically described
as a software bug.
Programs officially supplied by companies can be considered malware if they secretly act against the interests of the computer user.
For
example, Sony sold the Sony rootkit, which contained a Trojan
horse embedded into CDs that silently installed and concealed itself
on purchasers' computers with the intention of preventing illicit copying.
"Malware" encompasses computer viruses
along with many other forms of malicious software, such as computer
"worms", ransomware, spyware, adware, trojan horses, keyloggers, rootkits, bootkits,
malicious Browser Helper Object (BHOs) and other malicious software.
The majority of active malware threats
are actually trojan horse programs or computer worms rather than computer
viruses. The term computer virus, coined by Fred Cohen in 1985, is a misnomer.
Today, malware is used by both black hat hackers and governments, to
steal personal, financial, or business information.
Malware is sometimes used broadly
against government or corporate websites to gather guarded information, or to
disrupt their operation in general. However, malware can be used against
individuals to gain information such as personal identification numbers or
details, bank or credit card numbers, and passwords.
Viruses often perform some type of
harmful activity such as
·
infected
host computers, such as acquisition of hard diskspace or central processing unit (CPU),
·
accessing
private information (e.g., credit card numbers),
·
corrupting
data,
·
displaying
political or humorous messages on the user's screen,
·
spamming their e-mail contacts, logging their keystrokes, or even rendering
the computer useless.
However, not all viruses carry a
destructive "payload" and attempt to hide themselves—the defining
characteristic of viruses is that they are self-replicating computer programs
which modify other software without user consent.
SPYWARES
Programs designed
to monitor users' web browsing, display unsolicited advertisements, or
redirect affiliate marketing revenues are called spyware.
Spyware programs do not spread like viruses; instead they are generally
installed by exploiting security holes. They can also be hidden and packaged
together with unrelated user-installed software
Operations and functions
Phases
This life cycle can be divided into four phases:
Dormant phase
The virus program is idle during this stage. The virus program has managed to access the target user's computer or software, but during this stage, the virus does not take any action. The virus will eventually be activated by the "trigger" which states which event will execute the virus, such as a date, the presence of another program or file, the capacity of the disk exceeding some limit or the user taking a certain action (e.g., double-clicking on a certain icon, opening an e-mail, etc.). Not all viruses have this stage.
Propagation phase
The virus starts propagating, that is multiplying and replicating itself. The virus places a copy of itself into other programs or into certain system areas on the disk. The copy may not be identical to the propagating version; viruses often "morph" or change to evade detection by IT professionals and anti-virus software. Each infected program will now contain a clone of the virus, which will itself enter a propagation phase.
Triggering phase
A dormant virus moves into this phase when it is activated, and will now perform the function for which it was intended. The triggering phase can be caused by a variety of system events, including a count of the number of times that this copy of the virus has made copies of itself.
Execution phase
This is the actual work of the virus, where the "payload" will be released. It can be destructive such as deleting files on disk, crashing the system, or corrupting files or relatively harmless such as popping up humorous or political messages on screen.
TROJAN
HORSE
Trojan horse is a programme installed on a computer that appears harmless, but is, in fact, malicious. Unexpected changes to computer settings and unusual activity, even when the computer should be idle, are strong indications that a Trojan is residing on a computer. The Trojan horse is hidden in an innocent-looking email attachment or free download. When the user clicks on the email attachment or downloads the free program, the malware that is hidden inside is transferred to the user's computing device. Once inside, this can execute whatever task the attacker designed it to carry out.
How a Trojan horse works
Trojan horse developers frequently spamming techniques to send their emails to hundreds or thousands of people. As soon as the email has been opened and the attachment has been downloaded, the Trojan server will be installed and will run automatically each time the computer turns on.
It attacks Laptop, desktop computer, mobiles etc. The victim receives an official-looking email with an attachment. The attachment contains malicious code that is executed as soon as the victim clicks on the attachment. Because nothing bad happens and the computer continues to work as expected, the victim does not suspect that the attachment is actually a Trojan horse and his computing device is now infected.
The malicious code resides undetected until a specific date or until the victim carries out a specific action, such as visiting a banking website. At that time, the trigger activates the malicious code and carries out its intended action. Depending upon how the Trojan has been created, it may delete itself after it has carried out its intended function, it may return to a dormant state or it may continue to be active.
Uses of a Trojan horse
When a Trojan horse becomes active, it puts sensitive user data at risk and can negatively impact performance. Once a Trojan has been transferred, it can:
- give the
attacker backdoor control over the computing device;
- record key strokes to steal
the user's account data and browsing history;
- download and install a virus or
worm to exploit a vulnerability in another program;
- install ransom ware to encrypt
the user's data and extort money for the decryption key;
- activate the computing device's
camera and recording capabilities;
- turn the computer into a zombie
computer that can be used to carry out click fraud schemes or illegal
actions and
- legally capture information
relevant to a criminal investigation for law enforcement.
· A Trojan horse through unusual behaviors displayed by a computer.
· The quirks could include:
- A change in the computer's screen,
including changing color and resolution or an unnecessary flip upside
down.
- Excessive amounts of pop-up ads
will appear
- The computer mouse may start
moving by itself or freezing up completely and the functions of the mouse
buttons may reverse.
- The browser will consistently
redirect the user to a different website than the one they are requesting.
This redirected website will often contain an offer that users can click
on or download which will, in turn, install more malware.
- The
computer's antivirus and anti malware programs will be disabled
and the necessary steps to remove malware will be inaccessible.
- Mysterious messages and abnormal
graphic displays may start appearing.
- Unrecognized programs will be
running in the task manager
- The taskbar will either change
in appearance or completely disappear.
- The computer's
desktop wallpaper may change as well as the format of desktop icons
and applications.
TYPES OF VIRUSES
RESIDENT Vs. NON-RESIDENT
VIRUSES
A memory-resident virus (or simply "resident virus") installs itself as part of the operating system when executed, after which it remains in RAM from the time the computer is booted up to when it is shut down.
Resident viruses overwrite interrupt handling code or other functions, and when the operating system attempts to access the target file or disk sector, the virus code intercepts the request and redirects the control flow to the replication module, infecting the target.
Non-memory-resident virus (or "non-resident virus"), when executed, scans the disk for targets, infects them, and then exits (i.e. it does not remain in memory after it is done executing).
MACRO VIRUSES
A macro virus (or "document virus") is a virus that is written in a macro language, and embedded into these documents so that when users open the file, the virus code is executed, and can infect the user's computer. This is one of the reasons that it is dangerous to open unexpected or suspicious attachments in e-mails. While not opening attachments in e-mails from unknown persons or organizations can help to reduce the likelihood of contracting a virus, in some cases, the virus is designed so that the e-mail appears to be from a reputable organization (e.g., a major bank or credit card company).
BOOT SECTOR VIRUSES
Boot sector viruses specifically target the boot sector and/or the Master Boot Record of the host's hard drive or removable storage media (flash drives, floppy disks, etc.).
E-MAIL VIRUS
Email virus – A virus that intentionally, rather than accidentally, uses the email system to spread. While virus infected files may be accidentally sent as email attachments, email viruses are aware of email system functions. They generally target a specific type of email system (Microsoft’s Outlook is the most commonly used), harvest email addresses from various sources, and may append copies of themselves to all email sent, or may generate email messages containing copies of themselves as attachments.
ANTIVIRUS SOFTWARE
Antivirus softwares are programmes that can detect and eliminate known viruses when the computer attempts to download or run the executable file. Some antivirus software blocks known malicious websites that attempt to install malware. Users must update their software regularly to patch security vulnerabilities. Antivirus software also needs to be regularly updated in order to recognize the latest threats. This is because malicious hackers and other individuals are always creating new viruses. Examples of Microsoft Windows anti virus and anti-malware software include the optional Microsoft Security Essentials (for Windows XP, Vista and Windows 7) for real-time protection, the Windows Malicious Software Removal Tool.
Ransomware is a virus that posts a message on the user's screen saying that the screen or system will remain locked or unusable until a ransom payment is made.
Phishing is a deception in which the malicious individual pretends to be a friend, computer security expert, or other benevolent individual, with the goal of convincing the targeted individual to reveal passwords or other personal information.
Recovery strategies and methods
· timely operating system updates,
· software updates,
· careful Internet browsing (avoiding shady websites), and
· installation of only trusted software.
· regular backups of data (and the operating systems) on different media, that are either kept unconnected to the system (most of the time, as in a hard drive),
· if data is lost through a virus, one can start again using the backup.
If a backup session on optical media like CD and DVD is closed, it becomes read-only and can no longer be affected by a virus (so long as a virus or infected file was not copied onto the CD/DVD). Likewise, an operating system on a bootable CD can be used to start the computer if the installed operating systems become unusable. Backups on removable media must be carefully inspected before restoration. The Gammima virus, for example, propagates via removable flash drives.
·
Operating system
reinstallation
Definition
of privacy
The
term 'privacy' has been described as "the rightful claim of the individual
to determine the extent to which he wishes to share of himself with others. It
means his right to withdraw or to participate as he sees fit. It also means the
individual's right to control dissemination of information about himself....
The
concept of privacy is used to describe not only rights purely in the private
domain between individuals but also constitutional rights against the State.
Though
the whole world is yet to arrive at an agreed definition on privacy, the
advocates of 'right to privacy' have agreed that the meaning of privacy is
dependent on a nation's culture.
Today,
we find four distinct common law torts that are available as remedy for breach
of privacy. These are:
1.
Intrusion upon seclusion: Intrusion
was substantial and highly offensive to a reasonable person.
2.
Appropriation of name or likeness:
if somebody appropriates your name or picture, without any authorisation, then,
he is violating your right to privacy.
Eg. name or picture of a living person is
used for commercial
3.
Publicity given to private life:
4.
Publicly placing a person in false light:
It involves falsely implicating a person
to an immoral, illegal, or embarrassing situation resulting in injury.
Internet
Privacy
Internet privacy is a broad term, which shows the
right or mandate of personal
privacy and security level of personal data published via the Internet. It
refers to a variety of factors, techniques and technologies used to protect
sensitive and private data, communications and preferences.
It involves privacy concerning the storing, repurposing, provision to
third parties, and displaying of information pertaining to oneself via
the Internet
Internet privacy and anonymity are paramount to users,
especially as e-commerce continues to gain traction. Privacy violations and
threat risks are standard considerations for any website under development.
Internet privacy is also known as online privacy.
Crimes Involving Cyber-Privacy
1. Malware which can access a user's identity and/or information
2. Denial of Service Attacks (block a user from accessing his or her information)
3. Computer Viruses which takes user information as well as identity
4. All of these crimes fall under the category or fraud, identity theft, phishing scams and or information warfare.
5. Terrorism
6. Tracking
Movements of individuals are tracked by websites, advertisers, etc and give ads according tour browsing results.
Cookie profiling and other techniques are used to track overall activities online and create a detailed profile of browsing habits. Some people may not mind having relevant ads being served up to them, but for others this is a serious invasion of privacy.
7.
Surveillance
Some governments spy on their citizens online to monitor the Internet usage of its citizens. Internet companies (ISPs), telcos, as well as other communication service providers are required to retain customers’ Internet connection records for a year, which can be obtained by government authorities and used in investigations – even if you’re not related to them in any way
8.
Theft
Cybercriminals use malware, spyware, and phishing techniques to break into your online accounts or device and steal personal information to engage in activities like identity theft which may result in losing most or all of their hard earned money
WHAT YOU SHOULD
DO WHILE USING INTERNET
1.
Do
not use the Same Credentials for Multiple Accounts
It becomes easy to a cybercriminal to gain access into your one account; they’ll most likely get into the other ones as well.
2.
Do
not Stay Logged into Websites
Since websites leaves your online accounts and personal information vulnerable to anyone who uses or hacks into your device.
3.
Do
not use Services without Reading their Terms & Conditions
Companies and service providers access to all kinds of data and then sell this information to the highest bidder
4. Do not Open Suspicious Attachments or Download
Malicious Files
WAYS TO PROTECT YOUR PRIVACY AND SECURITY ON THE INTERNET
1. Secure Your Web Browser
2. Use a Virtual Private Network (VPN)
Using Pure VPN is the best way to protect Internet privacy.
It change your IP address and assign new
one based on the VPN server you’re connected to and protects incoming and
outgoing traffic with military-grade encryption. As a result, your online
activities and personal information stays secure and private from snoopers.
3. Keep
Software Up-to-Date
Keep operating system, browser, as well as other software (like Adobe Flash and Java) up to date to ensure that you don’t miss out on new features and security fixes.
4. Install an
Anti-virus Program & Activate Firewall
A strong anti-virus program will keep device free from all types of malware, such as spyware, viruses, Trojans, etc. It activate your firewall to keep unwanted network traffic at bay.
5. Delete
Cookies at Browser Exit
You should delete cookies regularly as they’re used by websites, advertisers, and other third-parties to track online.
6. Adjust Your Settings on Google, Facebook, etc.
Big Internet companies such as Facebook and Google usually gives options to opt personalization and tracking. example, you can manage your ads preferences on Facebook while Google allows you to turn off ads personalization from, here.
PASSWORD PROTECTION
Password protection is used in
documents, folders, and other data in computer's user to protect from other
people who might have access to the device. Passwords are used commonly to
gain entry to networks and into various Internet accounts in order to
authenticate the user accessing the website. It
is a security process that protects information accessible via computers that
needs to be protected from certain users.
Password
protection allows only those with an authorized password to gain access to
certain information. Password protection policies
should be in place at organizations so that personnel know how to
create a password, how to store their password and how often to change it. Passwords are a first line of defense against many
internet ills
HOW
TO CREATE A STRONG PASSWORD
1.
Think them, as essentials
2. Use a password manager.
A good password manager creates strong, unique
passwords for all of your accounts. That means, if one of your passwords does
get caught up in a data breach, criminals won't have the keys to the rest of
your online services.
3.
Go long.
Despite what all those prompts for unique
characters and uppercase letters might have you believe, length matters more
than complexity. Once you get into the 12-15 character range, it becomes way
harder for a hacker to brute force, much less guess, your password.
Eg."g0be@r$"
4. Keep them separated.
If you want to deploy special characters against a
password manager lots of input fields will force you to bunch them all together
at the beginning or end. That’s what everyone else does, which means that’s
hackers are looking for. Instead, space them out throughout your password to
make the guesswork extra tricky.
5. Single-serve only.
Don’t reuse
passwords across different accounts.
6. Don’t trust your browser.
Usually we let our browser to remember all those
passwords, or getting a paid password manager.
7. Add two-factor authentication
Two-factor authentication, or 2FA, is a method of verifying
your identity that adds a second layer of security to your account password
like
·
a
PIN number, password, or pattern
·
an
ATM or credit card, mobile phone, or security token. It combines your physical
card and your PIN
·
a
biometric form of authentication, such as your fingerprint, your voice, or your
face
8.
Do
not use personal information
·
Don’t
use your name or names of family members or pets in your passwords.
·
Don’t
use numbers like your address, phone number, or birthdays, either.
9.
Do not use real words
Password
cracking tools help attackers to guess password. These programs can process
every word in the dictionary, plus letter and number combinations, until a
match is found. So don’t use clear, real words from the dictionary or proper
nouns or names. Instead, use special characters by combining uppercase and
lowercase letters with numbers and special characters, such as “&” or “$,”
you can increase the complexity of your password and help decrease the chances
of someone potentially hacking into your account.
10. Don’t
write them down
11. Change
passwords on a regular basis
12. Never
enter your password on another person’s computer.
13. When using your devices on public
Wi-Fi, you should avoid visiting websites that require you to log in to your
account, such as online banking or shopping.
When you’re on an unsecured public
network, your unencrypted data could be intercepted by a nearby hacker. To
protect yourself from these threats, you should always use a virtual private
network (VPN), like Norton Secure VPN, when on a public Wi-Fi connection.
Legal and
Ethical Issues in Computer Security
1. Privacy
2. Digital Ownership
Digital mediums have allowed information to flow more freely than before. Things can be easily copied and pasted online, which makes intellectual property hard to control. Companies in the music and entertainment industries have pushed for greater legal protections for intellectual properties while other activists have sought to provide greater freedoms for the exchange of ideas in the digital realm.
3. Data Gathering by service
providers
4. Security Liability
Security systems for digital networks are computerized in order to protect vital information and important assets. However, this increased security comes with increased surveillance. All security systems have inherent risks
5. Access
Costs
Proponents want the Internet to remain open to everyone while some businesses want to create tiered access for those who are willing to pay. The issue even extends to private Internet usage since the cost of service in some areas may be cost prohibitive. The larger ethical question is whether or not digital exchange is now a universal right. The cost of access can impede business growth, entrepreneurial spirit and individual expression.
The Copyright Act, 1957
The ‘Act’ came into
effect from January 1958. The Act has been amended five times since then, i.e.,
in 1983, 1984, 1992, 1994, 1999 and 2012. The Copyright (Amendment) Act, 2012
is the most substantial.
Meaning of Copyright Section 14 of the Act provides the meaning of copyright in following words: For the purpose of this Act, “copyright” means the exclusive right subject to the provisions of this Act, to do or authorize the doing of any of the following acts in respect of a work or any substantial part thereof, namelya.
a. In the case of a literary, dramatic or musical work not being a computer programmme,- i. to reproduce the work in any material form including the storing of it in any medium by electronic means;
ii. to issue copies of the work to the public not being copies already in circulation;
iii.to perform the work in public, or communicate it to the public;
iv. to make any cinematograph film, or sound recording in respect of the work;
v. to make any translation of the work;
vi. to make any adaptation of the work;
vii. to do in relation to a translation or adaptation of work, any of the acts specified in relation to the work in sub-clause (i) to (iv).
b. In the case
of a computer programme
i. to do any of the acts specified in clause (a);
ii. to sell or give on hire, or offer for sale or hire any copy of the computer programme, regardless of whether such copy has been sold or given on hire on earlier occasions;
Section 51 along with the Section 14 of the Copyright Act, 1957 it becomes clear that reproducing any copyrighted work, issuing copies of the work to the public or communicating the work to the public would amount to the copyright violation under the Act.
Indian Copyright Act, 1957 protects “Databases” as ‘literary works’ under Section 13 (1) (a) of the Act which says that Copyright shall subsists throughout India in original literary, dramatic, musical and artistic works.
The definition of literary works “as defined under Section 2(o) of Copyright Act, 1957 includes computer programmes, tables and compilations including computer data basis.
Section 63B of the Indian Copyright Act provides that any person who knowingly makes use on a computer of an infringing copy of computer program shall be punishable for a minimum period of six months and a maximum of three years in prison.
Section 43 of Information Technology Act, 2000 provides for compensation to the aggrieved party up to One Crore of Rupees from a person, who without the permission of the owner or the person who is in charge of computer, computer system or computer net-work secures, access to the system or down-loads data or down-loads, copies or extracts any data or data base or information from the said computer, computer system or computer network or secures access to the system or down-loads data or down loads, copies or extracts any data or data base or information from the said computer, computer system or computer network which includes the data hold or stored in any removable storage media. It covers instances of cracking the computer codes, computer trespass, digital copying, violation of privacy, data theft etc.
Section 66 of the Act provides for penal liabilities to the person, who with the intent to cause or knowingly that he is likely to cause wrongful or loss or damage to the public or any person, alters or destroys any information residing in the computer resource or diminishes its value or utility or affects it injuriously by any means, the term commonly used for such crimes is ‘hacking’.
CREATIVE COMMONS (CC) LICENSE
Creative Commons (CC) is an internationally active non-profit organisation that provides free licences for creators to use when making their work available to the public. These licences help the creator to give permission for others to use the work in advance under certain conditions. It is used when an author wants to give other people the right to share, use, and build upon a work that they (the author) have created. CC provides an author flexibility (for example, they might choose to allow only non-commercial uses of a given work) and protects the people who use or redistribute an author's work from concerns of copyright infringement as long as they abide by the conditions that are specified in the license by which the author distributes the work. There are several types of Creative Commons licenses. The licenses differ by several combinations that condition the terms of distribution. They were initially released on December 16, 2002 by creative commons, a U.S. non profit corporation founded in 2001. There have also been five versions of the suite of licenses, numbered 1.0 through 4.0. As of December 2018, the 4.0 license suite is the most current Every time a work is created, such as when a journal article is written or a photograph taken, that work is automatically protected by copyright. Copyright protection prevents others from using the work in certain ways, such as copying the work or putting the work online.
CC licences allow the creator of the work to select how they want others to use the work. When a creator releases their work under a CC licence, members of the public know what they can and can’t do with the work. This means that they only need to seek the creator’s permission when they want to use the work in a way not permitted by the licence. The great thing is that all CC licences allow works to be used for educational purposes. As a result, teachers and students can freely copy, share and sometimes modify and remix a CC work without having seeking the permission of the creator.
Every CC licence allows you to
- Copy the work (eg. download,
upload, photocopy and scan the work);
- Distribute the work (eg. provide
copies of the work to teachers, students, parents and the community);
- Display or perform the work (eg.
play a sound recording or film in class, or stage a play to parents);
- Communicate the work (eg. make the
work available online on the school intranet, learning management system
or on a class blog); and
- Format shift verbatim copies of the
work (eg copy a MP3 version of music onto a CD or an MP4 version of a film
onto a DVD to play in class).
- always attribute the creator of the
work
- get permission from the creator to
do anything that goes beyond the terms of the licence (e.g. making a
commercial use of the work or creating a derivative work where the licence
does not permit this);
- keep any copyright notice attached
to the work intact on all copies of the work;
- indicate and link to the licence
from any copies of the work; and
·
where you make changes to the work,
acknowledge the original work and indicate that changes have been made
In addition, when you use any CC material, you must not:
· alter the terms of the licence;
·
use the work in any way that is
prejudicial to the reputation of the creator of the work;
·
imply that the creator is endorsing or
sponsoring you or your work; or
·
add any technologies (such as digital
rights management) to the work that restrict other people from using it under
the terms of the licence.
Why should
Schools use CC?
· Teachers
can copy an entire work without limitation;
· There
is a lot of CC material that teachers can modify and remix;
· Parents
and the community can freely access the work; and
· CC
material is available for free and not subject to licence fees.
PLAGIARISM
Plagiarism is copying
another's work or borrowing someone else's original ideas.
According to the Merriam-Webster
online dictionary, to "plagiarize" mean
- to
steal and pass off (the ideas or words of another) as one's own
- to use (another's production) without crediting
the source
- to commit literary theft
- to present as new and original an idea or
product derived from an existing source
- turning in someone else's work as your own
- copying words or ideas from someone else
without giving credit
- failing to put a quotation in quotation marks
- giving incorrect information about the source
of a quotation
- changing words but copying the sentence
structure of a source without giving credit
- copying so many words or ideas from a source
that it makes up the majority of your work, whether you give credit or not
(see our section on "fair use" rules)
HACKING
Hacking refers to activities that seek to compromise digital devices, such as computers, smart phones, tablets, and even entire networks. It is also identifying weakness in computer systems or networks to exploit its weaknesses to gain access. Hacking means using computers to commit fraudulent acts such as fraud, privacy invasion, stealing corporate/personal data, etc.
Example of Hacking: Using password cracking algorithm to gain access to a system
A Hacker is a person who finds and exploits the weakness in
computer systems and/or networks to gain access. Hackers are usually skilled
computer programmers with knowledge of computer security.
·
Ethical Hacker (White hat): A
hacker who gains access to systems with a view to fix the identified
weaknesses. They may also perform penetration testing and vulnerability
assessments.
·
Cracker (Black hat): A
hacker who gains unauthorized access to computer systems for personal gain. The
intent is usually to steal corporate data, violate privacy rights, transfer
funds from bank accounts etc.
·
Grey hat: A hacker who is in
between ethical and black hat hackers. He/she breaks into computer systems
without authority with a view to identify weaknesses and reveal them to the
system owner.
·
Script kiddies: A non-skilled
person who gains access to computer systems using already made tools.
·
Hacktivist: A hacker who use
hacking to send social, religious, and political, etc. messages. This is
usually done by hijacking websites and leaving the message on the hijacked
website.
·
Phreaker: A
hacker who identifies and exploits weaknesses in telephones instead of
computers.
Ethical Hacking
Ethical Hacking is
identifying weakness in computer systems and/or computer networks and coming
with countermeasures that protect the weaknesses. Ethical hackers must abide by
the following rules. Information is one of the most valuable assets of an
organization. Keeping information secure can protect an organization’s image and
save an organization a lot of money. Hacking can lead to loss of business for
organizations that deal in finance such as PayPal. Ethical hacking puts them a
step ahead of the cyber criminals who would otherwise lead to loss of business.
- Get written permission from
the owner of the computer system and/or computer network before hacking.
- Protect the privacy of the organization been
hacked.
- Transparently report all the
identified weaknesses in the computer system to the organization.
- Inform hardware and software
vendors of the identified weaknesses.
Variety of techniques for hacking
- Vulnerability scanner: checks computers on
networks for known weaknesses
- Password cracking: the process of recovering
passwords from data stored or transmitted by computer systems
- Packet sniffer: applications that capture data packets in order
to view data and passwords in transit over networks
- Spoofing attack: involves websites which falsify data by mimicking
legitimate sites, and they are therefore treated as trusted sites by users
or other programs
- Root kit: represents a set of programs which work to
subvert control of an operating system from legitimate operators
- Trojan horse: serves as a back door in a computer system to
allow an intruder to gain access to the system later
- Viruses: self-replicating programs that spread by
inserting copies of themselves into other executable code files or
documents
· Key loggers: tools designed to record every keystroke on the affected machine for later retry
NETIQUETTE
Netiquette is short for "Internet etiquette." It
represents the importance of proper manners and behavior online. Just like etiquette is a code of polite
behavior in society, netiquette is a code of good behavior on the Internet. This includes several aspects of
the Internet, such as email, social
media,
online chat, web
forums,
website comments, multiplayer gaming, and other types of online communication.
While there is no official list of netiquette rules or guidelines, the general
idea is to respect others online.
Below are ten examples of rules to follow for good
netiquette:
ü Avoid posting inflammatory or
offensive comments online
ü Respect others' privacy
ü Never spam others by sending large
amounts of unsolicited email.
ü Show good sportsmanship when playing
online games, whether you win or lose.
ü Don't troll people in web forums or
website
ü Stick to the topic when posting in
online forums or when commenting on photos or videos, such as YouTube or Facebook comments.
ü Don't swear or use offensive
language.
ü Avoid replying to negative comments
with more negative comments. Instead, break the cycle with a positive post.
ü If someone asks a question and you
know the answer, offer to help.
ü Thank others who help you online.
PHISHING
Phishing is a homophone of fishing, and is so named because phishing scams use lures to catch unsuspecting victims, or fish. It is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
The information is then used to access
important accounts and can result in identity theft and financial loss.
Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels. The attacker uses phishing emails to distribute malicious links or attachments that can perform a variety of functions, including the extraction of login credentials or account information from victims. Phishing is popular with cybercriminals. Phishing attacks email or other electronic communication methods, including direct messages sent over social networks, SMS text messages and other instant messaging modes. It includes social networks like LinkedIn, Facebook and Twitter, to gather background information about the victim's personal and work history, his interests, and his activities. The victim receives a message that appears to have been sent by a known contact or organization. The attack is carried out either through a malicious file attachment that contains phishing software, or through links connecting to malicious websites. In either case, the objective is to install malware on the user's device or direct the victim to a malicious website set up to trick them into divulging personal and financial information. Other than email and website phishing, there’s also 'vishing' (voice phishing), 'smishing' (SMS Phishing) and several other phishing techniques cybercriminals are constantly coming up with
Several clues that can indicate that a message is a phishing attempt.
These include:
- The use of sub domains, misspelled
URLs or otherwise suspicious URLs.
- The recipient uses a Gmail or other
public email address rather than a corporate email address.
- The message is written to invoke
fear or a sense of urgency.
- The message includes a request to
verify personal information, such as financial details or a password.
- The message is poorly written and
has spelling and grammatical errors.
The first phishing
lawsuit was
filed in 2004 against a Californian teenager who created the imitation of the
website “America Online”. With this fake website, he was able to gain
sensitive information from users and access the credit card details to withdraw
money from their accounts.
SOFTWARE PIRACY
Software
piracy is the stealing of legally protected software. Software piracy penalties
apply to users that illegally reproduce copyrighted works and /or users who are
knowingly in possession of illegally reproduced works. Unknowingly accepting
pirated software is another scenario, provided it can be proven. End users may
notice red flags, which indicate pirated software, especially if the acquired
digital media is encased in inconspicuous or generic containers, such as CD
sleeves or unnamed disk packaging.
Types of Software
Piracy
There are five main types of software piracy
1.
Softlifting
Softlifting is when someone purchases one version of the software and downloads it onto multiple computers, even though the software license states it should only be downloaded once. This often occurs in business or school environments and is usually done to save money. Softlifting is the most common type of software piracy.
2.
Client-server
overuse
Client-server overuse is when too many people on a network use one main copy of the program at the same time. This often happens when businesses are on a local area network and download the software for all employees to use. This becomes a type of software piracy if the license doesn’t entitle you to use it multiple times.
3.
Hard
disk loading
Hard disk loading is a type of commercial software piracy in which someone buys a legal version of the software and then reproduces, copies or installs it onto computer hard disks. The person then sells the product. This often happens at PC resale shops and buyers aren’t always aware that the additional software they are buying is illegal.
4.
Counterfeiting
Counterfeiting occurs when software programs are illegally duplicated and sold with the appearance of authenticity. Counterfeit software is usually sold at a discounted price in comparison to the legitimate software.
5.
Online
Piracy
Online piracy, also known as Internet piracy, is when illegal software is sold, shared or acquired by means of the Internet. This is usually done through a peer-to-peer (P2P) file sharing system, which is usually found in the form of online auction sites and blogs.
Consequences of software piracy
- Increased chances that the
software will malfunction or fail
- Forfeited access to support for
the program such as training, upgrades, customer support and bug fixes
- No warranty and the software
can’t be updated
- Increased risk of infecting
your PC with malware, viruses or adware
- Slowed down PC
- Legal repercussions due to
copyright infringement
Type of Cybercrime
- The following list presents
the common types of cybercrimes:
- Computer Fraud: Intentional
deception for personal gain via the use of computer systems.
- Privacy violation: Exposing
personal information such as email addresses, phone number, account
details, etc. on social media, websites, etc.
- Identity Theft: Stealing
personal information from somebody and impersonating that person.
- Sharing copyrighted files/information: This
involves distributing copyright protected files such as eBooks and
computer programs etc.
- Electronic funds transfer: This
involves gaining an un-authorized access to bank computer networks and
making illegal fund transfers.
- Electronic money laundering: This
involves the use of the computer to launder money.
- ATM Fraud: This
involves intercepting ATM card details such as account number and PIN
numbers. These details are then used to withdraw funds from the
intercepted accounts.
- Denial of Service Attacks: This
involves the use of computers in multiple locations to attack servers with
a view of shutting them down.
- Spam: Sending
unauthorized emails. These emails usually contain advertisements.
Cyber law- IT Act 2000, IT Act 2008
THE
INFORMATION TECHNOLOGY ACT, 2000
In May 2000, both the houses of the
Indian Parliament passed the Information Technology Bill. The Bill received the
assent of the President in August 2000 and came to be known as the Information
Technology Act, 2000. It provides legal recognition to the transaction
done via electronic exchange of data and other electronic means of communication or
electronic commerce transactions. This also involves the use of alternatives to
a paper-based method of communication and
information storage to facilitate the electronic filing of documents with
the Government agencies. Further, this act amended the Indian Penal Code 1860,
the Indian Evidence Act 1872, the Bankers’ Books Evidence Act 1891, and
the Reserve Bank of India Act 1934.
The objectives of the Act are as follows:
- Grant legal
recognition to all transactions done via electronic exchange of data or
other electronic means of communication or e-commerce, in place of the earlier paper-based method of communication.
- Give legal
recognition to digital signatures for the authentication of any
information or matters requiring legal authentication
- Facilitate
the electronic filing of documents with Government agencies and also
departments
- Facilitate
the electronic storage of data
- Give legal
sanction and also facilitate the electronic transfer of funds
between banks and
financial institutions
- Grant legal
recognition to bankers under the Evidence Act, 1891 and the Reserve Bank of India Act, 1934, for keeping the books of accounts in
electronic form.
Features of the Information Technology Act, 2000
a)
All electronic
contracts made through secure electronic channels are legally valid.
b)
Legal recognition
for digital signatures.
c)
Security measures
for electronic records and also digital signatures are in place
d)
A procedure for
the appointment of adjudicating officers for holding inquiries under the Act is
finalized
e)
Provision for
establishing a Cyber Regulatory Appellant Tribunal under the Act. Further, this
tribunal will handle all appeals made against the order of the Controller or
Adjudicating Officer.
f)
An appeal against
the order of the Cyber Appellant Tribunal is possible only in the High Court
g)
Digital Signatures will
use an asymmetric cryptosystem and also a hash function
h)
Provision for the
appointment of the Controller of Certifying Authorities (CCA) to license and
regulate the working of Certifying Authorities. The Controller to act as a
repository of all digital signatures.
i)
The Act applies to
offences or contraventions committed outside India
j)
Senior police
officers and other officers can enter any public place and search and arrest
without warrant
k)
Provisions for the
constitution of a Cyber Regulations Advisory Committee to advise the Central
Government and Controller.
Applicability of the Act
According to Section 1
(2),
a. the Act extends to the entire country, which also
includes Jammu and Kashmir.
b. to any offence or contravention committed
outside India as well. If the conduct of person constituting the offence
involves a computer or a computerized system or network located in India, then
irrespective of his/her nationality, the person is punishable under the Act.
c. Lack of international cooperation is the only
limitation of this provision.
Advantages
of Cyber Laws
·
The
IT Act 2000 attempts to change outdated laws and provides ways to deal with
cyber crimes.
·
offers
the much-needed legal framework so that information is not denied legal effect,
validity or enforceability, solely on the ground that it is in the form of
electronic records.
·
empower
government departments to accept filing, creating and retention of official
documents in the digital format.
·
proposed
a legal framework for the authentication and origin of electronic records /
communications through digital signature.
·
allows
Government to issue notification on the web thus heralding e-governance.
·
enables
the companies to file any form, application or any other document with any
office, authority, body or agency owned or controlled by the appropriate
Government in electronic form by means of such electronic form as may be
prescribed by the appropriate Government.
·
addresses
the important issues of security, which are so critical to the success of
electronic transactions.
·
possible
for corporates to have a statutory remedy in case if anyone breaks into their
computer systems or network and causes damages or copies data. The remedy
provided by the Act is in the form of monetary damages, not exceeding Rs. 1
crore.
IT AMENDMENT ACT (ITA-2008)
The Information Technology Amendment Act, 2008 (IT Act 2008)
is a substantial addition to India's Information Technology Act (ITA-2000) by
the Indian Parliament in October 2008 and came into force a year later. The Act
is administered by the Indian Computer Emergency Response Team The
original Act was developed to promote the IT industry, regulate e-commerce,
facilitate e-governance and prevent cybercrime. The Act also sought to foster
security practices within India that would serve the country in a global
context. The Amendment was created to address issues that the original bill
failed to cover and to accommodate further development of IT and related
security concerns since the original law was passed.
Salient features
of the Information Technology (Amendment) Act, 2008
· The term 'digital signature' has been replaced with 'electronic signature' to make the Act more technology neutral.
· A new section has been inserted to define 'communication device' to mean cell phones, personal digital assistance or combination of both or any other device used to communicate, send or transmit any text video, audio or image.
· A new section has been added to define cyber cafe as any facility from where the access to the internet is offered by any person in the ordinary course of business to the members of the public.
· A new definition has been inserted for intermediary.
· A new section 10A has been inserted to the effect that contracts concluded electronically shall not be deemed to be unenforceable solely on the ground that electronic form or means was used.
· The damages of Rs. One Crore prescribed under section 43 of the earlier Act of 2000 for damage to computer, computer system etc. has been deleted and the relevant parts of the section have been substituted by the words, 'he shall be liable to pay damages by way of compensation to the person so affected'.
· A new section 43A has been inserted to protect sensitive personal data or information possessed, dealt or handled by a body corporate in a computer resource which such body corporate owns, controls or operates.
· Sections 66A to 66F has been added to Section 66 prescribing punishment for offences such as obscene electronic message transmissions, identity theft, cheating by impersonation using computer resource, violation of privacy and cyber terrorism.
· Section 67 of the IT Act, 2000 has been amended to reduce the term of imprisonment for publishing or transmitting obscene material in electronic form to three years from five years and increase the fine thereof from Rs.100,000 to Rs. 500,000. Sections 67A to 67C have also been inserted. While Sections 67A and B deals with penal provisions in respect of offences of publishing or transmitting of material containing sexually explicit act and child pornography in electronic form, Section 67C deals with the obligation of an intermediary to preserve and retain such information as may be specified for such duration and in such manner and format as the central government may prescribe.
· section 69 giving power to the state to issue directions for interception or monitoring of decryption of any information through any computer resource. Further, sections 69A and B, two new sections, grant power to the state to issue directions for blocking for public access of any information through any computer resource and to authorize to monitor and collect traffic data or information through any computer resource for cyber security.
· Section 79 of the Act which exempted intermediaries has been modified to the effect that an intermediary shall not be liable for any third party information data or communication link made available or hosted by him
Role of teacher in conscientizing about
v Child
abuse over the net
v Misuse
of internet (morphing, pornography)
v Health
hazards of using computer
Over
usage of Computer
Many
children use home computers for recreation rather than for homework or other
productive research. Parents and teachers must understand the risks and
pitfalls in order to ensure that students maximize their computer time. Some of
the effects are
- Physical
Development
Students can develop
- repetitive
strain injuries if their computer stations are incorrectly designed or
sized for them.
- staring at
a computer screen for excessive amounts of time can harm children’s
eyesight.
- Students
who spend too much time on a computer may not get enough exercise, so can
lead to obesity.
- There is
little doubt that computers and the Internet provide numerous advantages
to students.
- Socialization
- may become
isolated.
- may
experience less social involvement.
- Internet relationships that are not
followed up with face-to-face meetings are weaker and shallower than
traditional relationships. In most cases, this is because participants in
chat rooms and other online venues rarely reveal their true selves. As a
result, students who rely only on online relationships can feel lonely,
which can lead to depression.
- Virtual
communities can also be unsafe or emotionally harmful for students.
- Some show
self-injury and eating disorders.
- Online
teens can also be easy prey for those who mean to harm them.
- Cyberbullying
·
when someone repeatedly harasses, mistreats
or makes fun of another person online or with other electronic devices it affects more and more young people each
year.
·
Victims of cyberbullying feel depressed, sad,
angry and frustrated. Some are afraid or embarrassed to attend school.
·
Cyberbullying also causes a loss of
self-esteem, academic problems, increases in school violence, behavior
difficulties and poor family relations.
·
Victims may feel suicidal, and tragically,
some have acted on these feelings.