10 -cyber crimes

Upload: shailesh-srivastav

Post on 04-Apr-2018

229 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/29/2019 10 -Cyber Crimes

    1/23

  • 7/29/2019 10 -Cyber Crimes

    2/23

  • 7/29/2019 10 -Cyber Crimes

    3/23

    Federal authorities have rounded upand arrested more than 125individuals on charges includingidentity theft and computerintrusion as part of a nationwidecrackdown on Internet crime.

  • 7/29/2019 10 -Cyber Crimes

    4/23

    FREQUENTLY USED CYBERCRIMES !!!!!!

    HACKING

    VIRUS/WORM ATTACKS

    EMAIL BOMBING

    DATA DIDDLING

    DENIAL OF SERVICE ATTACKS

    SALAMI ATTACKS

  • 7/29/2019 10 -Cyber Crimes

    5/23

    The term "hacker" used tomean computer programmer.Today it is used for persons

    who use computers to commitcrime. Hacking raises severallegal issues and jeopardizesprivacy and security. It alsoraises questions on just howsecure government, business,

    and private computers reallyare. It is argued thatgovernments and businessesare already too dependent oncomputers.

  • 7/29/2019 10 -Cyber Crimes

    6/23

    Virusesare programsthat attachthemselves to acomputer or a file

    and then circulatethemselves to otherfiles and to othercomputers on anetwork. They usuallyaffect the data on acomputer, either byaltering or deletingit.

    Worms, unlike virusesdo not need the hostto attach themselvesto. They merely makefunctional copies ofthemselves and dothis repeatedly tillthey eat up all theavailable space on a

    computer's memory.

    The famous I LOVE

    YOU VIRUS

  • 7/29/2019 10 -Cyber Crimes

    7/23

    E-mail bombing

    Email bombingrefers to sending a large number

    of emails to the victim resulting in thevictim's email account (in case of anindividual) or mail servers (in case of acompany or an email service provider)

    crashing.

  • 7/29/2019 10 -Cyber Crimes

    8/23

    This kind of an attackinvolves altering rawdata just before it isprocessed by a

    computer and thenchanging it back afterthe processing iscompleted. ElectricityBoards in India havebeen victims to data

    diddling programsinserted when privateparties werecomputerizing theirsystems.

  • 7/29/2019 10 -Cyber Crimes

    9/23

    This involves flooding a computer resource with more

    requests than it can handle. This causes the resource

    (e.g. a web server) to crash thereby denying authorizedusers the service offered by the resource. Another

    variation to a typical denial of service attack is known

    as a Distributed Denial of Service (DDoS) attack

    wherein the perpetrators are many and are

    geographically widespread.

  • 7/29/2019 10 -Cyber Crimes

    10/23

  • 7/29/2019 10 -Cyber Crimes

    11/23

    What kind of cyber crimes are mostly prevalent in India?

    Do the Cases of Cyber crime on the rise?

    Are these crimes punishable and if so under what Act?

    What do you mean by cyber murder?

    How terrorists can misuse it?

    How do you smoke out cyber criminals?

    Can this kind of cases be policed?

    Computer related crimes literally have no boundaries.Therefore it is important to answer these questions:

    TABLE:1

  • 7/29/2019 10 -Cyber Crimes

    12/23

    The most common are e-mail based crimes in India. Like one we had inBangalore, in which whenever the marriage of a girl used to get fixed up,the perspective groom family used to get a defamatory e-mail saying thatthe girl is of loose character, resulting in breaking of the marriage of thegirl. Other common in India are :

    Drug dealing: narcotic drugs are sold on auction sites underinnocuous-sounding names. It can be 50 grams of honey for 50 grams

    of cocaine.

    Money laundering: E-gold site where hawala transactions are done

    in broad daylight. You are given tips of how to trade in gold anmake illegal pots of money.

    Forgery sites that teach students how to use high-end drum

    scanners for creating look-alike certificates using Microsoft word!

  • 7/29/2019 10 -Cyber Crimes

    13/23

    Cyber Crimes and Terrorism

    Terrorists can play havoc byusing a technology calledsteganography. Terrorists likeOsama bin Laden routinelycommunicate with their globalcronies by encrypting messagesinto image files, accessible to

    only to those with thepassword. Therefore, that 36-24-36 bimbo you last saw on asite or that picture ofAishwarya Rai you downloadedfrom the net might actuallyhave contained a devastatingmessage in codes. There are

    over 50 sites which give youthe recipe for making RDX

    bombs.

    the

    transmission of

    secret codes

    concealed in

    pictures.

  • 7/29/2019 10 -Cyber Crimes

    14/23

    MOSTCOMMON COMPUTER CRIMES ANDSECURITY BREACHES :2003-2006(%)

  • 7/29/2019 10 -Cyber Crimes

    15/23

    With the cyber crimes raising its ugly head in the

    state, Goa Police have constituted Cyber Crime cell

    in Panaji to deal with the hi-tech crimes.

    The Cell is relying on the expertise of Pune based

    for technical support.

  • 7/29/2019 10 -Cyber Crimes

    16/23

    The Indian cyber

    crimes are punishableunder the InformationTechnology Act, 2000with 10 years in prisonfor hacking and fines ofcrore of rupees for

    passing viruses.

    Given the unrestricted number of free Web

    sites, the Internet is undeniably open to

    exploitation. Known as cyber crimes.

    While the worldwide scenario on cyber crime

    looks bleak, the situation in India isn't any

    better in india.Indian corporate and government sites have

    been attacked or defaced more than 780 times

    between February 2000 and December 2002.

  • 7/29/2019 10 -Cyber Crimes

    17/23

    How do the cops smokeout cyber criminals?

    There was this case in the U.S.where the police had closed in on acyber criminal they arrested,confiscated his computer system andtaken both to the police station. Whenthey set up the system in the stationto check out the files, it was all-blank.What they did not realise was he had

    set up magnetic coils in his doorwayand once the computer was takenthrough this strong magnetic field, ithad erased all the files in his system.There was no proof of what he hadcommitted and he went scot-free.Interestingly, if you want to wipe anincriminating floppy clean, all youneed do is place it close to a cellularphone or even a hot cup of coffee.Chances are that the strong magneticfields they create will interfere withthe floppy and corrupt it. A CD, ofcourse, is more robust customer.

  • 7/29/2019 10 -Cyber Crimes

    18/23

    Indias first exclusive cyber police station in some cities is all setto hire some ethical hackers to crack cyber crimes involvingtechno-literate offenders.

    Who better than a burglar to help you master the art of burglary? So thinkour police too, when it comes to learning about cyber policing.

    Once the name of a ethical hacker or expert

    is registered, their assistance would besought whenever the need arises. Dependingon the services they provide, rewards up toa maximum of Rs 50,000 per case is givenThere are two type of hackers: White Hat

    Hackers or ethical hackers, who helpcompanies adopt safety measures to preventhacking. Black Hat Hackers, who tamper or

    steal information.

  • 7/29/2019 10 -Cyber Crimes

    19/23

    Author ! Author !

    ANKIT FADIA, when he was a 14yr-old school boy,student ofDelhi public school (R.K PuramDelhi) had written a bookcalled THE UNOFFICIALGUIDE TO ETHICAL HACKINGwhich was published byMacmillan Publishers.Fadia isthe youngest author to bepublished by Macmillan in their110-year history. Hereportedly wrote the sixhundred odd pages in just 15days and is at present working

    on two sequels. The ideablossomed following thesuccess of his website calledHACKING TRUTHS.Fadiastrongly believes that hackersare GOOD GUYS who usetheir expertise to ferret outevidence of electronicwrongdoing.

    Indias first exclusive cyber police

    station in some cities is all set to hiresome ethical hackers to crack

    cyber crimes involving techno-literateoffenders.The department also plans to maintaina register at cyber crime policestation, whereby theethical hackersor experts willing to help the police

    could register their names.

    C h f !!!!

  • 7/29/2019 10 -Cyber Crimes

    20/23

    Catch me if you can !!!!

    Cyber space is fast emerging as an alternate way of living for thegrowing generation today.

    The typical cyber criminal today is the youth, who spends most ofhis time on the net, who is technology savvy and who either

    believes that he is invisible to law enforcement and the victim orwho likes to play the game of catch me if you can with the lawenforcement.

    There is a need to create better systems and traditions ofpolicing in the cyber space ,for the future. There is a felt need

    for the agencies to team up with the IT industry and propagatethe dos and don'ts of the cyber space usage by school and collegeyoungsters.

    In todays situation in India, there is a large generation gapbetween cyberspace users and non-users.

  • 7/29/2019 10 -Cyber Crimes

    21/23

    youngstersLack of:

  • 7/29/2019 10 -Cyber Crimes

    22/23

    The 5P mantra to

    ONLINE SECURITY

    Precaution,Prevention,Protection,

    PreservationandPerseverance.

    "TAKESECURITY

    SERIOUSLY"

  • 7/29/2019 10 -Cyber Crimes

    23/23

    THE END