45792947 Cyber Crime Ppt
-
Upload
rajanityagi23 -
Category
Documents
-
view
229 -
download
1
Transcript of 45792947 Cyber Crime Ppt
-
7/27/2019 45792947 Cyber Crime Ppt
1/37
Cyber Crime
SVIMS, Batch 2010-11
-
7/27/2019 45792947 Cyber Crime Ppt
2/37
What is Cyber Space?
Cyber space is a worldwide network of computers and the equipmentthat connect them, which by its very design is free and open to the
public (the Internet).
Cyberspace is the electronic medium of computer networks, in whichonline communication takes place.
Weve become increasingly reliant on the net, and it is being used
right now to transfer everything from friendly emails to
hypersensitive data.
-
7/27/2019 45792947 Cyber Crime Ppt
3/37
What is Cybercrime?
Cybercrime refers to any crime that involves a computer and a
network, where the computers may or may not have played an
instrumental part in the commission of a crime.
Issues surrounding this type of crime have become high-profile,
particularly those surrounding hacking, copyright infringement, child
pornography, child grooming, releasing of viruses, identity theft,
interception, access and manipulation of non public data and systems.
-
7/27/2019 45792947 Cyber Crime Ppt
4/37
What is Cybercrime?
Cybercrime encompasses a broad range of potentially illegalactivities. Generally, however, it may be divided into one of two
types of categories:
Cybercrime
Crimes that target computernetworks or devices directly
Crimes facilitated by computer
networks or devices, theprimary target of which is
independent of the computernetwork or device
-
7/27/2019 45792947 Cyber Crime Ppt
5/37
Why learn about CYBER CRIME ?
Everybody is using COMPUTERS. From white collar criminals to terrorist organizations and from
teenagers to adults.
Conventional crimes like forgery, extortion, kidnapping etc. arebeing committed with the help off computers.
New generation is growing up with computers.
MOST IMPORTANT - monetary transactions are moving on to theINTERNET
-
7/27/2019 45792947 Cyber Crime Ppt
6/37
Types of Cybercrimes
Hacking
Denial of service attack
Virus dissemination
Software piracy
Pornography
IRC crime
Credit card fraud
Net extortion
Phishing
Spoofing
Cyber stalking
Cyber defamation
Threatening
Salami attack
Spam
Fraud
Obscene or offensive content
Drug trafficking
Cyber terrorism
Cyber warfare
Virus/worms
Forgery
http://en.wikipedia.org/wiki/Computer_crimehttp://en.wikipedia.org/wiki/Computer_crime -
7/27/2019 45792947 Cyber Crime Ppt
7/37
Hacking
The act of gaining unauthorized access to a computer system ornetwork and in some cases making unauthorized use of this access.
Hacking is also the act by which other forms of cyber-crime (e.g.,
fraud, terrorism, etc.) are committed. Hacking in simple terms means illegal intrusion into a computer
system without the permission of the computer owner/user.
-
7/27/2019 45792947 Cyber Crime Ppt
8/37
Denial of service attack
This is an act by the criminal, who floods the bandwidth of the
victims network or fills his e-mail box with spam mail depriving him
of the services he is entitled to access or provide.
This involves flooding computer resources with more requests than itcan handle. This causes the resources to crash thereby denying
authorized users the service offered by the resources.
-
7/27/2019 45792947 Cyber Crime Ppt
9/37
Virus dissemination
Malicious software that attaches itself to other software.
Eg. - Virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and
Bacterium are the malicious softwares
-
7/27/2019 45792947 Cyber Crime Ppt
10/37
Software piracy
Software piracy is theft of software through the illegal copying of
genuine programs or the counterfeiting and distribution of products
intended to pass for the original.
Retail revenue losses worldwide are ever increasing due to this
crime.
Piracy can be done in various ways such as end user copying, hard
disk loading, Counterfeiting, Illegal downloads from the internet etc.
-
7/27/2019 45792947 Cyber Crime Ppt
11/37
Pornography
Pornography is the first consistently successful e-commerce product.
Pornography has deceptive marketing tactics and mouse trapping
technologies which encourages customers to access their websites.
Anybody including children can log on to the internet and access
websites with pornographic contents with a click of a mouse.
Publishing, transmitting any material in electronic form which is
lascivious or appeals to the prurient interest is an offence under the
provisions of section 67 of I.T. Act -2000.
-
7/27/2019 45792947 Cyber Crime Ppt
12/37
IRC crimes
Internet Relay Chat (IRC) servers have chat rooms in which people
from anywhere the world can come together and chat with each other
Criminals use it for meeting co-conspirators.
Hackers use it for discussing their exploits / sharing the technique.
Paedophiles use chat rooms to allure small children.
-
7/27/2019 45792947 Cyber Crime Ppt
13/37
Credit card fraud
Credit card fraud is a wide-ranging term for theft and fraud
committed using a credit card or any similar payment mechanism as
a fraudulent source of funds in a transaction.
If electronic transactions are not secured the credit card numbers canbe stolen by the hackers who can misuse this card by impersonating
the credit card owner.
-
7/27/2019 45792947 Cyber Crime Ppt
14/37
Net extortion
Copying the companys confidential data in order to extort said
company for huge amount.
-
7/27/2019 45792947 Cyber Crime Ppt
15/37
Phishing
In computing, phishing is the criminally fraudulent process of
attempting to acquire sensitive information such as usernames,
password and credit card details, by masquerading as a trustworthy
entity in an electronic communication.
-
7/27/2019 45792947 Cyber Crime Ppt
16/37
Spoofing
The process of deception by which an individual or system alters its
identity or creates additional identities, thereby causing another
person or system to act incorrectly.
Getting one computer on a network to pretend to have the identity of
another computer, usually one with special access privileges, so as to
obtain access to the other computers on the network.
-
7/27/2019 45792947 Cyber Crime Ppt
17/37
Cyber stalking
Stalking in General terms can be referred to as the repeated acts of
harassment targeting the victim such as following the victim, making
harassing phone calls, killing the victims pet, vandalizing victims
property, leaving written messages or objects.
Cyber Stalking can be defined as the repeated acts of harassment or
threatening behaviour of the cyber criminal towards the victim by
using internet services.
-
7/27/2019 45792947 Cyber Crime Ppt
18/37
Cyber defamation
The Criminal sends emails containing defamatory matters to allconcerned of the victim or post the defamatory matters on a website.
Eg. - Disgruntled employee may do this against boss, ex-boys friend
against girl, divorced husband against wife etc.
-
7/27/2019 45792947 Cyber Crime Ppt
19/37
Threatening
The Criminal sends threatening email or comes in contact in chat
rooms with victim.
Any one disgruntled may do this against boss, friend or official.
-
7/27/2019 45792947 Cyber Crime Ppt
20/37
Salami attack
In such crime criminal makes insignificant changes in such a manner
that such changes would go unnoticed.
Criminal makes such program that deducts small amount like $ 2.50
per month from the account of all the customer of the Bank and
deposit the same in his account.
In this case no account holder will approach the bank for such small
amount but criminal gains huge amount.
-
7/27/2019 45792947 Cyber Crime Ppt
21/37
Spam
Spam, or the unsolicited sending of bulk email for commercial
purposes, is unlawful to varying degrees.
As applied to email, specific anti-spam laws are relatively new,
however limits on unsolicited electronic communications haveexisted in some forms for some time.
F d
-
7/27/2019 45792947 Cyber Crime Ppt
22/37
Fraud
Computer fraud is any dishonest misrepresentation of fact intended
to let another to do or refrain from doing something which causes
loss.
D ffi ki
-
7/27/2019 45792947 Cyber Crime Ppt
23/37
Drug trafficking
Drug traffickers are increasingly taking advantage of the Internet to
sell their illegal substances through encrypted e-mail and other
Internet Technology.
Some drug traffickers arrange deals at internet cafes, use courier Websites to track illegal packages of pills, and swap recipes for
amphetamines in restricted-access chat rooms.
C b t i
-
7/27/2019 45792947 Cyber Crime Ppt
24/37
Cyber terrorism
Cyber terrorism in general, can be defined as an act of terrorism
committed through the use of cyberspace or computer resources
(Parker 1983).
As such, a simple propaganda in the Internet, that there will be bombattacks during the holidays can be considered cyber terrorism.
As well there are also hacking activities directed towards individuals,
families, organized by groups within networks, tending to cause fear
among people, demonstrate power, collecting information relevant for
ruining peoples' lives, robberies, blackmailing etc.
C b f
-
7/27/2019 45792947 Cyber Crime Ppt
25/37
Cyber warfare
The U.S. Department of Defence (DoD) notes that cyberspace has
emerged as a national-level concern through several recent events of
geo-strategic significance.
Among those are included the attack on Estonia's infrastructure in2007, allegedly by Russian hackers.
Cyberwarfare has been defined by government security expert
Richard A. Clarke, in his bookCyber War(May 2010), as "actions by a
nation-state to penetrate another nation's computers or networks for
the purposes of causing damage or disruption."
F
-
7/27/2019 45792947 Cyber Crime Ppt
26/37
Forgery
Counterfeit currency notes, postage and revenue stamps, mark sheets
etc., can be forged using sophisticated computers, printers and
scanners.
P i M F I di id l
-
7/27/2019 45792947 Cyber Crime Ppt
27/37
Preventive Measures For Individuals
Preventive measures should be adopted by both children as well as
parents.
For instance children should not reveal any kind of identity while
chatting etc.
Parents should use content filter software on PC.
For any individual, he/she should share any personal information
online to whomsoever it might be.
Preventive measures for Government & other
-
7/27/2019 45792947 Cyber Crime Ppt
28/37
organizations
Physical security
Access control
Password
Finding the holes in network
Using network scanning programs
Using intrusion alert programs
Firewalls
Frequent password changing
Safe surfing
Frequent virus checks
Email filters
Using encryption
Cyber law
-
7/27/2019 45792947 Cyber Crime Ppt
29/37
Cyber law
India has enacted the first I.T.Act,2000 based on the UNCITRAL
model.
Chapter XI of this Act deals with offence/crimes along with certain
other provisions scattered in this Acts.
Offence Section Under IT Act
-
7/27/2019 45792947 Cyber Crime Ppt
30/37
Offence Section Under IT Act
OFFENCE SECTION
Tampering with computer source documents Sec.65
Hacking with computer systems , Data alteration Sec.66
Publishing obscene information Sec.67
Un- authorized access to protected System Sec.70
Breach of Confidentiality & Privacy Sec.72
Publishing false digital signature certificates Sec.73
Computers Related Crimes Covered Under
-
7/27/2019 45792947 Cyber Crime Ppt
31/37
pIPC & Special Laws
OFFENCE SECTIONS
Sending threatening messages by e-mail Sec 503 IPC
Sending defamatory messages by e-mail Sec 499 IPC
Forgery of electronic records Sec 463 IPC
Bogus websites , cyber frauds Sec 420 IPC
E-mail spoofing Sec 463 IPC
Web-Jacking Sec.383 IPC
E-mail Abuse Sec.500 IPC
Online sale of Drugs NDPS Act
Cyber security
-
7/27/2019 45792947 Cyber Crime Ppt
32/37
Cyber security
Cyber security involves protection of sensitive personal and business
information through prevention, detection and response to different
online attack.
Cyber security standards are security standards which enableorganizations to practice safe security techniques to minimize the
number of successful cyber security attacks.
ISO/IEC 27002 BS7799 part I & BS 7799 part II
NIST has also released several publications addressing cyber security.
Advantages of cyber security
-
7/27/2019 45792947 Cyber Crime Ppt
33/37
Advantages of cyber security
It defends us from critical attacks.
It helps us browse safe websites.
It defends us from hacks and virus.
Security developers update their database every week hence new
virus also gets deleted.
Internet security process all the incoming and outgoing data on our
computer.
Case studies
-
7/27/2019 45792947 Cyber Crime Ppt
34/37
Case studies
Pune Citibank emphasis Call Center Fraud
Baazee.com case
Andhra Pradesh Tax Case
Conclusion
-
7/27/2019 45792947 Cyber Crime Ppt
35/37
Conclusion
The modern thief can steal more with a computer
than with a gun. Tomorrow's terrorist may be ableto do more damage with a keyboard than with a
bomb.
Bibliography & Webliography
-
7/27/2019 45792947 Cyber Crime Ppt
36/37
Bibliography & Webliography
Information Technology for Management book
By E Fraim Turban
Dorothy Leiner
Ephraim Mclean
James Wetherbe
www.cyberlawsindia.net
www.iprfirm.com
www.cybercellmumbai.com
www.cybercrime.planetindia.net
www.indiacyberlab.in
www.virtualpune.com
www.brighthub.com
www.cyberlawclinic.org
-
7/27/2019 45792947 Cyber Crime Ppt
37/37
Thank you