45792947 Cyber Crime Ppt

download 45792947 Cyber Crime Ppt

of 37

Transcript of 45792947 Cyber Crime Ppt

  • 7/27/2019 45792947 Cyber Crime Ppt

    1/37

    Cyber Crime

    SVIMS, Batch 2010-11

  • 7/27/2019 45792947 Cyber Crime Ppt

    2/37

    What is Cyber Space?

    Cyber space is a worldwide network of computers and the equipmentthat connect them, which by its very design is free and open to the

    public (the Internet).

    Cyberspace is the electronic medium of computer networks, in whichonline communication takes place.

    Weve become increasingly reliant on the net, and it is being used

    right now to transfer everything from friendly emails to

    hypersensitive data.

  • 7/27/2019 45792947 Cyber Crime Ppt

    3/37

    What is Cybercrime?

    Cybercrime refers to any crime that involves a computer and a

    network, where the computers may or may not have played an

    instrumental part in the commission of a crime.

    Issues surrounding this type of crime have become high-profile,

    particularly those surrounding hacking, copyright infringement, child

    pornography, child grooming, releasing of viruses, identity theft,

    interception, access and manipulation of non public data and systems.

  • 7/27/2019 45792947 Cyber Crime Ppt

    4/37

    What is Cybercrime?

    Cybercrime encompasses a broad range of potentially illegalactivities. Generally, however, it may be divided into one of two

    types of categories:

    Cybercrime

    Crimes that target computernetworks or devices directly

    Crimes facilitated by computer

    networks or devices, theprimary target of which is

    independent of the computernetwork or device

  • 7/27/2019 45792947 Cyber Crime Ppt

    5/37

    Why learn about CYBER CRIME ?

    Everybody is using COMPUTERS. From white collar criminals to terrorist organizations and from

    teenagers to adults.

    Conventional crimes like forgery, extortion, kidnapping etc. arebeing committed with the help off computers.

    New generation is growing up with computers.

    MOST IMPORTANT - monetary transactions are moving on to theINTERNET

  • 7/27/2019 45792947 Cyber Crime Ppt

    6/37

    Types of Cybercrimes

    Hacking

    Denial of service attack

    Virus dissemination

    Software piracy

    Pornography

    IRC crime

    Credit card fraud

    Net extortion

    Phishing

    Spoofing

    Cyber stalking

    Cyber defamation

    Threatening

    Salami attack

    Spam

    Fraud

    Obscene or offensive content

    Drug trafficking

    Cyber terrorism

    Cyber warfare

    Virus/worms

    Forgery

    http://en.wikipedia.org/wiki/Computer_crimehttp://en.wikipedia.org/wiki/Computer_crime
  • 7/27/2019 45792947 Cyber Crime Ppt

    7/37

    Hacking

    The act of gaining unauthorized access to a computer system ornetwork and in some cases making unauthorized use of this access.

    Hacking is also the act by which other forms of cyber-crime (e.g.,

    fraud, terrorism, etc.) are committed. Hacking in simple terms means illegal intrusion into a computer

    system without the permission of the computer owner/user.

  • 7/27/2019 45792947 Cyber Crime Ppt

    8/37

    Denial of service attack

    This is an act by the criminal, who floods the bandwidth of the

    victims network or fills his e-mail box with spam mail depriving him

    of the services he is entitled to access or provide.

    This involves flooding computer resources with more requests than itcan handle. This causes the resources to crash thereby denying

    authorized users the service offered by the resources.

  • 7/27/2019 45792947 Cyber Crime Ppt

    9/37

    Virus dissemination

    Malicious software that attaches itself to other software.

    Eg. - Virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and

    Bacterium are the malicious softwares

  • 7/27/2019 45792947 Cyber Crime Ppt

    10/37

    Software piracy

    Software piracy is theft of software through the illegal copying of

    genuine programs or the counterfeiting and distribution of products

    intended to pass for the original.

    Retail revenue losses worldwide are ever increasing due to this

    crime.

    Piracy can be done in various ways such as end user copying, hard

    disk loading, Counterfeiting, Illegal downloads from the internet etc.

  • 7/27/2019 45792947 Cyber Crime Ppt

    11/37

    Pornography

    Pornography is the first consistently successful e-commerce product.

    Pornography has deceptive marketing tactics and mouse trapping

    technologies which encourages customers to access their websites.

    Anybody including children can log on to the internet and access

    websites with pornographic contents with a click of a mouse.

    Publishing, transmitting any material in electronic form which is

    lascivious or appeals to the prurient interest is an offence under the

    provisions of section 67 of I.T. Act -2000.

  • 7/27/2019 45792947 Cyber Crime Ppt

    12/37

    IRC crimes

    Internet Relay Chat (IRC) servers have chat rooms in which people

    from anywhere the world can come together and chat with each other

    Criminals use it for meeting co-conspirators.

    Hackers use it for discussing their exploits / sharing the technique.

    Paedophiles use chat rooms to allure small children.

  • 7/27/2019 45792947 Cyber Crime Ppt

    13/37

    Credit card fraud

    Credit card fraud is a wide-ranging term for theft and fraud

    committed using a credit card or any similar payment mechanism as

    a fraudulent source of funds in a transaction.

    If electronic transactions are not secured the credit card numbers canbe stolen by the hackers who can misuse this card by impersonating

    the credit card owner.

  • 7/27/2019 45792947 Cyber Crime Ppt

    14/37

    Net extortion

    Copying the companys confidential data in order to extort said

    company for huge amount.

  • 7/27/2019 45792947 Cyber Crime Ppt

    15/37

    Phishing

    In computing, phishing is the criminally fraudulent process of

    attempting to acquire sensitive information such as usernames,

    password and credit card details, by masquerading as a trustworthy

    entity in an electronic communication.

  • 7/27/2019 45792947 Cyber Crime Ppt

    16/37

    Spoofing

    The process of deception by which an individual or system alters its

    identity or creates additional identities, thereby causing another

    person or system to act incorrectly.

    Getting one computer on a network to pretend to have the identity of

    another computer, usually one with special access privileges, so as to

    obtain access to the other computers on the network.

  • 7/27/2019 45792947 Cyber Crime Ppt

    17/37

    Cyber stalking

    Stalking in General terms can be referred to as the repeated acts of

    harassment targeting the victim such as following the victim, making

    harassing phone calls, killing the victims pet, vandalizing victims

    property, leaving written messages or objects.

    Cyber Stalking can be defined as the repeated acts of harassment or

    threatening behaviour of the cyber criminal towards the victim by

    using internet services.

  • 7/27/2019 45792947 Cyber Crime Ppt

    18/37

    Cyber defamation

    The Criminal sends emails containing defamatory matters to allconcerned of the victim or post the defamatory matters on a website.

    Eg. - Disgruntled employee may do this against boss, ex-boys friend

    against girl, divorced husband against wife etc.

  • 7/27/2019 45792947 Cyber Crime Ppt

    19/37

    Threatening

    The Criminal sends threatening email or comes in contact in chat

    rooms with victim.

    Any one disgruntled may do this against boss, friend or official.

  • 7/27/2019 45792947 Cyber Crime Ppt

    20/37

    Salami attack

    In such crime criminal makes insignificant changes in such a manner

    that such changes would go unnoticed.

    Criminal makes such program that deducts small amount like $ 2.50

    per month from the account of all the customer of the Bank and

    deposit the same in his account.

    In this case no account holder will approach the bank for such small

    amount but criminal gains huge amount.

  • 7/27/2019 45792947 Cyber Crime Ppt

    21/37

    Spam

    Spam, or the unsolicited sending of bulk email for commercial

    purposes, is unlawful to varying degrees.

    As applied to email, specific anti-spam laws are relatively new,

    however limits on unsolicited electronic communications haveexisted in some forms for some time.

    F d

  • 7/27/2019 45792947 Cyber Crime Ppt

    22/37

    Fraud

    Computer fraud is any dishonest misrepresentation of fact intended

    to let another to do or refrain from doing something which causes

    loss.

    D ffi ki

  • 7/27/2019 45792947 Cyber Crime Ppt

    23/37

    Drug trafficking

    Drug traffickers are increasingly taking advantage of the Internet to

    sell their illegal substances through encrypted e-mail and other

    Internet Technology.

    Some drug traffickers arrange deals at internet cafes, use courier Websites to track illegal packages of pills, and swap recipes for

    amphetamines in restricted-access chat rooms.

    C b t i

  • 7/27/2019 45792947 Cyber Crime Ppt

    24/37

    Cyber terrorism

    Cyber terrorism in general, can be defined as an act of terrorism

    committed through the use of cyberspace or computer resources

    (Parker 1983).

    As such, a simple propaganda in the Internet, that there will be bombattacks during the holidays can be considered cyber terrorism.

    As well there are also hacking activities directed towards individuals,

    families, organized by groups within networks, tending to cause fear

    among people, demonstrate power, collecting information relevant for

    ruining peoples' lives, robberies, blackmailing etc.

    C b f

  • 7/27/2019 45792947 Cyber Crime Ppt

    25/37

    Cyber warfare

    The U.S. Department of Defence (DoD) notes that cyberspace has

    emerged as a national-level concern through several recent events of

    geo-strategic significance.

    Among those are included the attack on Estonia's infrastructure in2007, allegedly by Russian hackers.

    Cyberwarfare has been defined by government security expert

    Richard A. Clarke, in his bookCyber War(May 2010), as "actions by a

    nation-state to penetrate another nation's computers or networks for

    the purposes of causing damage or disruption."

    F

  • 7/27/2019 45792947 Cyber Crime Ppt

    26/37

    Forgery

    Counterfeit currency notes, postage and revenue stamps, mark sheets

    etc., can be forged using sophisticated computers, printers and

    scanners.

    P i M F I di id l

  • 7/27/2019 45792947 Cyber Crime Ppt

    27/37

    Preventive Measures For Individuals

    Preventive measures should be adopted by both children as well as

    parents.

    For instance children should not reveal any kind of identity while

    chatting etc.

    Parents should use content filter software on PC.

    For any individual, he/she should share any personal information

    online to whomsoever it might be.

    Preventive measures for Government & other

  • 7/27/2019 45792947 Cyber Crime Ppt

    28/37

    organizations

    Physical security

    Access control

    Password

    Finding the holes in network

    Using network scanning programs

    Using intrusion alert programs

    Firewalls

    Frequent password changing

    Safe surfing

    Frequent virus checks

    Email filters

    Using encryption

    Cyber law

  • 7/27/2019 45792947 Cyber Crime Ppt

    29/37

    Cyber law

    India has enacted the first I.T.Act,2000 based on the UNCITRAL

    model.

    Chapter XI of this Act deals with offence/crimes along with certain

    other provisions scattered in this Acts.

    Offence Section Under IT Act

  • 7/27/2019 45792947 Cyber Crime Ppt

    30/37

    Offence Section Under IT Act

    OFFENCE SECTION

    Tampering with computer source documents Sec.65

    Hacking with computer systems , Data alteration Sec.66

    Publishing obscene information Sec.67

    Un- authorized access to protected System Sec.70

    Breach of Confidentiality & Privacy Sec.72

    Publishing false digital signature certificates Sec.73

    Computers Related Crimes Covered Under

  • 7/27/2019 45792947 Cyber Crime Ppt

    31/37

    pIPC & Special Laws

    OFFENCE SECTIONS

    Sending threatening messages by e-mail Sec 503 IPC

    Sending defamatory messages by e-mail Sec 499 IPC

    Forgery of electronic records Sec 463 IPC

    Bogus websites , cyber frauds Sec 420 IPC

    E-mail spoofing Sec 463 IPC

    Web-Jacking Sec.383 IPC

    E-mail Abuse Sec.500 IPC

    Online sale of Drugs NDPS Act

    Cyber security

  • 7/27/2019 45792947 Cyber Crime Ppt

    32/37

    Cyber security

    Cyber security involves protection of sensitive personal and business

    information through prevention, detection and response to different

    online attack.

    Cyber security standards are security standards which enableorganizations to practice safe security techniques to minimize the

    number of successful cyber security attacks.

    ISO/IEC 27002 BS7799 part I & BS 7799 part II

    NIST has also released several publications addressing cyber security.

    Advantages of cyber security

  • 7/27/2019 45792947 Cyber Crime Ppt

    33/37

    Advantages of cyber security

    It defends us from critical attacks.

    It helps us browse safe websites.

    It defends us from hacks and virus.

    Security developers update their database every week hence new

    virus also gets deleted.

    Internet security process all the incoming and outgoing data on our

    computer.

    Case studies

  • 7/27/2019 45792947 Cyber Crime Ppt

    34/37

    Case studies

    Pune Citibank emphasis Call Center Fraud

    Baazee.com case

    Andhra Pradesh Tax Case

    Conclusion

  • 7/27/2019 45792947 Cyber Crime Ppt

    35/37

    Conclusion

    The modern thief can steal more with a computer

    than with a gun. Tomorrow's terrorist may be ableto do more damage with a keyboard than with a

    bomb.

    Bibliography & Webliography

  • 7/27/2019 45792947 Cyber Crime Ppt

    36/37

    Bibliography & Webliography

    Information Technology for Management book

    By E Fraim Turban

    Dorothy Leiner

    Ephraim Mclean

    James Wetherbe

    www.cyberlawsindia.net

    www.iprfirm.com

    www.cybercellmumbai.com

    www.cybercrime.planetindia.net

    www.indiacyberlab.in

    www.virtualpune.com

    www.brighthub.com

    www.cyberlawclinic.org

  • 7/27/2019 45792947 Cyber Crime Ppt

    37/37

    Thank you