Cyber Crime
-
Upload
praveenborawat -
Category
Documents
-
view
213 -
download
0
description
Transcript of Cyber Crime
1
CYBER CRIME
2
CONTENTS :-
Introduction Definition Categories of cyber crime Role of computer in crime Cyber criminals Prevention IT act 2000 IT act 2008 Conclusion
3
DEFINITION
It’s an unlawful act in which the computer is either a tool or a target or both.
Acts that are punishable by the Information Technology Act.
Cybercrime is an illegal act is committed using a computer network.
Cyber space is a virtual space that has become as important as real space for business, politics, and communities
4
CATEGORIES OF CYBER CRIME
Cyber crimes against persons
Cyber crimes against property
Cyber crimes against government
5
CYBER LAWS DEALS WITH
Cyber Crimes
Electronic or Digital Signatures
Intellectual Property
Data Protection and Privacy
6
CYBER ATTACKS STATISTICS
7
ROLE OF COMPUTER IN CRIME
COMPUTER AS TARGET
COMPUTER AS TOOL
COMPUTER AS APPLIANCE
8
CYBER CRIMINALS
Insider Threats(employees)
Hackers(teenage thrill-seekers
to sophisticated criminals)
Hactivists (overloads e-mail
servers or hack websites to send
political message)
Virus Writers(writes viruses to that
infect systems)
Criminal Groups(attack systems & steal password for financial
gain)
Sensitive Intrusions
(sensitive information is obtained via computer
intrusions) Information
Warfare(alternative to military
attacks)
Terrorists(who have potential to
disrupt government systems with computer
attacks)
Cyber Warfare(attack by sovereigns --- Crime or Declaration of
war)
9
TYPES OF CYBER ATTACKS
1) Viruses 9) Theft
2) Worms 10) Piracy
3) Trojans 11) Break ins
4) Mail bombs 12) Terrorism
5) Threats
6) Harassment
7) DOS
8) Fraud
10
PREVENTION
Use strong password. Secure your computer
i. Activate your firewall
ii. Use anti-virus
iii. Block software attacks
Secure your mobile devices. Install latest OS. Secure wireless network. Protect your e-identity.
11
CASE STUDY The Citadel network – a cybercrime ring responsible for stealing
more than $500 million from consumer and business bank account.
It infected more than 5 million PCs located in 90 countries , including the united states , Australia , Hong Kong , India and large part of Western Europe.
Bank affected by the group’s activities included American Express , Bank Of America , HSBC , Wells Fargo , Paypal and Royal Bank Of Canada.
According to Microsoft, the gang behind the Citadel botnets infected PCs in part by selling pirated versions of the Windows XP operating system that they'd pre-infected with the malware.
12
CASE STUDY
Citadel blocked victims' access to many legitimate anti-virus/anti-malware sites, making it so people may not have been able to easily remove this threat from their computer.
Microsoft and FBI joint operation, they took down over 1,000 Citadel botnets that were being used to control millions of malware-infected PCs.
This Citadel botnet takedown was part of a larger effort , coordinated by the National Cyber Investigative Joint Task Force (NCIJTF) , which is targeting botnet creators and distributors.
13
IT ACT 2000
The Information Technology Act, 2000 (IT Act), came into force on 17 October
2000.
The primary purpose of the Act is to provide legal recognition to electronic
commerce and to facilitate filing of electronic records with the Government.
Information Technology Act 2000 consisted of 94 sections segregated into 13
chapters.
14
IT ACT AMENDMENT 2008 ITA-2008, is a new version of IT Act 2000, has been passed by the parliament on
23rd December 2008. It received the assent of President of India on 5th February, 2009.
Provides additional focus on Information Security.
Added several new sections on offences including Cyber Terrorism and Data Protection.
124 sections and 14 chapters.
15
CONCLUSION
India needs a good combination of laws and technology, in harmony with the laws of other countries and keeping in mind common security standards.