Cyber Crime Ppt
Transcript of Cyber Crime Ppt
What is Cybercrime?What is Cybercrime?
• CybercrimeCybercrime refers to any crime that involves a computer and a refers to any crime that involves a computer and a
network, where the computers may or may not have played an network, where the computers may or may not have played an
instrumental part in the commission of a crime. instrumental part in the commission of a crime.
• Issues surrounding this type of crime have become high-profile, Issues surrounding this type of crime have become high-profile,
particularly those surrounding hacking, copyright infringement, child particularly those surrounding hacking, copyright infringement, child
pornography, child grooming, releasing of viruses, identity theft, pornography, child grooming, releasing of viruses, identity theft,
interception, access and manipulation of non public data and systems. interception, access and manipulation of non public data and systems.
Why learn about CYBER CRIME ?Why learn about CYBER CRIME ?
• Everybody is using COMPUTERS.Everybody is using COMPUTERS.
• From white collar criminals to terrorist organizations and from From white collar criminals to terrorist organizations and from
teenagers to adults.teenagers to adults.
• Conventional crimes like forgery, extortion, kidnapping etc. are Conventional crimes like forgery, extortion, kidnapping etc. are
being committed with the help off computers.being committed with the help off computers.
• New generation is growing up with computers.New generation is growing up with computers.
• MOST IMPORTANT - monetary transactions are moving on to the MOST IMPORTANT - monetary transactions are moving on to the
INTERNETINTERNET
Types of CybercrimesTypes of Cybercrimes
Hacking Hacking
Denial of service attackDenial of service attack
Virus disseminationVirus dissemination
Software piracySoftware piracy
PornographyPornography
IRC crimeIRC crime
Credit card fraudCredit card fraud
Net extortionNet extortion
PhishingPhishing
SpoofingSpoofing
Cyber stalkingCyber stalking
Cyber defamationCyber defamation
ThreateningThreatening
Salami attackSalami attack
SpamSpam
FraudFraud
Obscene or offensive contentObscene or offensive content
Drug traffickingDrug trafficking
Cyber terrorismCyber terrorism
Cyber warfareCyber warfare
Virus/wormsVirus/worms
ForgeryForgery
HackingHacking
• Hacking is also the act by which other forms of cyber-crime (e.g., Hacking is also the act by which other forms of cyber-crime (e.g.,
fraud, terrorism, etc.) are committed. fraud, terrorism, etc.) are committed.
• Hacking in simple terms means illegal intrusion into a computer Hacking in simple terms means illegal intrusion into a computer
system without the permission of the computer owner/user.system without the permission of the computer owner/user.
Virus disseminationVirus dissemination
• Malicious software that attaches itself to other software.Malicious software that attaches itself to other software.
• Eg. - Virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Eg. - Virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and
Bacterium are the malicious software’sBacterium are the malicious software’s
Software piracySoftware piracy
• Software piracy is theft of software through the illegal copying of Software piracy is theft of software through the illegal copying of
genuine programs or the counterfeiting and distribution of products genuine programs or the counterfeiting and distribution of products
intended to pass for the original. intended to pass for the original.
• Piracy can be done in various ways such as end user copying, hard Piracy can be done in various ways such as end user copying, hard
disk loading, Counterfeiting, Illegal downloads from the internet etc.disk loading, Counterfeiting, Illegal downloads from the internet etc.
PornographyPornography
• Pornography is the first consistently successful e-commerce product.Pornography is the first consistently successful e-commerce product.
• Pornography has deceptive marketing tactics and mouse trapping Pornography has deceptive marketing tactics and mouse trapping
technologies which encourages customers to access their websites.technologies which encourages customers to access their websites.
• Anybody including children can log on to the internet and access Anybody including children can log on to the internet and access
websites with pornographic contents with a click of a mouse.websites with pornographic contents with a click of a mouse.
Credit card fraudCredit card fraud
• Credit card fraudCredit card fraud is a wide-ranging term for theft and fraud is a wide-ranging term for theft and fraud
committed using a credit card or any similar payment mechanism as committed using a credit card or any similar payment mechanism as
a fraudulent source of funds in a transaction. a fraudulent source of funds in a transaction.
• If electronic transactions are not secured the credit card numbers can If electronic transactions are not secured the credit card numbers can
be stolen by the hackers who can misuse this card by impersonating be stolen by the hackers who can misuse this card by impersonating
the credit card owner.the credit card owner.
Net extortionNet extortion
• Copying the company’s confidential data in order to extort said Copying the company’s confidential data in order to extort said
company for huge amount.company for huge amount.
PhishingPhishing
• In computing, phishing is the criminally fraudulent process of In computing, phishing is the criminally fraudulent process of
attempting to acquire sensitive information such as usernames, attempting to acquire sensitive information such as usernames,
password and credit card details, by masquerading as a trustworthy password and credit card details, by masquerading as a trustworthy
entity in an electronic communication.entity in an electronic communication.
Cyber stalkingCyber stalking
•Cyber Stalking can be defined as the repeated acts of harassment or Cyber Stalking can be defined as the repeated acts of harassment or
threatening behaviour of the cyber criminal towards the victim by using threatening behaviour of the cyber criminal towards the victim by using
internet services. Killing the victims pet, leaving messages or internet services. Killing the victims pet, leaving messages or
documents.documents.
ThreateningThreatening
• The Criminal sends threatening email or comes in contact in chat The Criminal sends threatening email or comes in contact in chat
rooms with victim. rooms with victim.
• Eg. - Disgruntled employee may do this against boss, ex-boys friend Eg. - Disgruntled employee may do this against boss, ex-boys friend
against girl, divorced husband against wife etc.against girl, divorced husband against wife etc.
FraudFraud
• Computer fraud is any dishonest misrepresentation of fact intended Computer fraud is any dishonest misrepresentation of fact intended
to let another to do or refrain from doing something which causes to let another to do or refrain from doing something which causes
loss.loss.
Cyber terrorismCyber terrorism
• Cyber terrorism in general, can be defined as an act of terrorism Cyber terrorism in general, can be defined as an act of terrorism
committed through the use of cyberspace or computer resources committed through the use of cyberspace or computer resources
(Parker 1983).(Parker 1983).
• As such, a simple propaganda in the Internet, that there will be bomb As such, a simple propaganda in the Internet, that there will be bomb
attacks during the holidays can be considered cyber terrorism. attacks during the holidays can be considered cyber terrorism.
Preventive Measures For IndividualsPreventive Measures For Individuals
• Preventive measures should be adopted by both children as well as Preventive measures should be adopted by both children as well as
parents.parents.
• For instance children should not reveal any kind of identity while For instance children should not reveal any kind of identity while
chatting etc.chatting etc.
• Parents should use content filter software on PC.Parents should use content filter software on PC.
Preventive measures for Government & other Preventive measures for Government & other organizationsorganizations
• Physical security Physical security
• Access controlAccess control
• Password Password
• Finding the holes in network Finding the holes in network
• Using network scanning programs Using network scanning programs
• Using intrusion alert programsUsing intrusion alert programs
• FirewallsFirewalls
• Frequent password changing Frequent password changing
• Safe surfing Safe surfing
• Frequent virus checksFrequent virus checks
• Email filtersEmail filters
• Using encryptionUsing encryption
Cyber lawCyber law
• India has enacted the first I.T.Act,2000 based on the UNCITRAL India has enacted the first I.T.Act,2000 based on the UNCITRAL
model. model.
• Chapter XI of this Act deals with offence/crimes along with certain Chapter XI of this Act deals with offence/crimes along with certain
other provisions scattered in this Acts.other provisions scattered in this Acts.
Computers Related Crimes Covered Under Computers Related Crimes Covered Under IPC & Special LawsIPC & Special Laws
OFFENCEOFFENCE SECTIONSSECTIONS
Sending threatening messages by e-mailSending threatening messages by e-mail Sec 503 IPCSec 503 IPC
Sending defamatory messages by e-mailSending defamatory messages by e-mail Sec 499 IPCSec 499 IPC
Forgery of electronic recordsForgery of electronic records Sec 463 IPCSec 463 IPC
Bogus websites , cyber fraudsBogus websites , cyber frauds Sec 420 IPCSec 420 IPC
E-mail spoofingE-mail spoofing Sec 463 IPCSec 463 IPC
Web-JackingWeb-Jacking Sec.383 IPCSec.383 IPC
E-mail AbuseE-mail Abuse Sec.500 IPC Sec.500 IPC
Online sale of DrugsOnline sale of Drugs NDPS ActNDPS Act
Cyber security Cyber security
• Cyber security involves protection of sensitive personal and business Cyber security involves protection of sensitive personal and business
information through prevention, detection and response to different information through prevention, detection and response to different
online attack. online attack.
• Cyber security standards are security standards which enable Cyber security standards are security standards which enable
organizations to practice safe security techniques to minimize the organizations to practice safe security techniques to minimize the
number of successful cyber security attacks. number of successful cyber security attacks.
• ISO/IEC 27002ISO/IEC 27002
• BS7799 part I & BS 7799 part IIBS7799 part I & BS 7799 part II
• NIST has also released several publications addressing cyber security.NIST has also released several publications addressing cyber security.
Advantages of cyber securityAdvantages of cyber security
• It defends us from critical attacks.It defends us from critical attacks.
• It helps us browse safe websites.It helps us browse safe websites.
• It defends us from hacks and virus.It defends us from hacks and virus.
• Security developers update their database every week hence new Security developers update their database every week hence new
virus also gets deleted.virus also gets deleted.
• Internet security process all the incoming and outgoing data on our Internet security process all the incoming and outgoing data on our
computercomputer..
ConclusionConclusion
The Modern Thief Can Steal More With A Computer The Modern Thief Can Steal More With A Computer Than With A Gun. Tomorrow's Terrorist May Be Than With A Gun. Tomorrow's Terrorist May Be Able To Do More Damage With A Keyboard Than Able To Do More Damage With A Keyboard Than
With A Bomb.With A Bomb.