10 -cyber crimes
TRANSCRIPT
-
7/29/2019 10 -Cyber Crimes
1/23
-
7/29/2019 10 -Cyber Crimes
2/23
-
7/29/2019 10 -Cyber Crimes
3/23
Federal authorities have rounded upand arrested more than 125individuals on charges includingidentity theft and computerintrusion as part of a nationwidecrackdown on Internet crime.
-
7/29/2019 10 -Cyber Crimes
4/23
FREQUENTLY USED CYBERCRIMES !!!!!!
HACKING
VIRUS/WORM ATTACKS
EMAIL BOMBING
DATA DIDDLING
DENIAL OF SERVICE ATTACKS
SALAMI ATTACKS
-
7/29/2019 10 -Cyber Crimes
5/23
The term "hacker" used tomean computer programmer.Today it is used for persons
who use computers to commitcrime. Hacking raises severallegal issues and jeopardizesprivacy and security. It alsoraises questions on just howsecure government, business,
and private computers reallyare. It is argued thatgovernments and businessesare already too dependent oncomputers.
-
7/29/2019 10 -Cyber Crimes
6/23
Virusesare programsthat attachthemselves to acomputer or a file
and then circulatethemselves to otherfiles and to othercomputers on anetwork. They usuallyaffect the data on acomputer, either byaltering or deletingit.
Worms, unlike virusesdo not need the hostto attach themselvesto. They merely makefunctional copies ofthemselves and dothis repeatedly tillthey eat up all theavailable space on a
computer's memory.
The famous I LOVE
YOU VIRUS
-
7/29/2019 10 -Cyber Crimes
7/23
E-mail bombing
Email bombingrefers to sending a large number
of emails to the victim resulting in thevictim's email account (in case of anindividual) or mail servers (in case of acompany or an email service provider)
crashing.
-
7/29/2019 10 -Cyber Crimes
8/23
This kind of an attackinvolves altering rawdata just before it isprocessed by a
computer and thenchanging it back afterthe processing iscompleted. ElectricityBoards in India havebeen victims to data
diddling programsinserted when privateparties werecomputerizing theirsystems.
-
7/29/2019 10 -Cyber Crimes
9/23
This involves flooding a computer resource with more
requests than it can handle. This causes the resource
(e.g. a web server) to crash thereby denying authorizedusers the service offered by the resource. Another
variation to a typical denial of service attack is known
as a Distributed Denial of Service (DDoS) attack
wherein the perpetrators are many and are
geographically widespread.
-
7/29/2019 10 -Cyber Crimes
10/23
-
7/29/2019 10 -Cyber Crimes
11/23
What kind of cyber crimes are mostly prevalent in India?
Do the Cases of Cyber crime on the rise?
Are these crimes punishable and if so under what Act?
What do you mean by cyber murder?
How terrorists can misuse it?
How do you smoke out cyber criminals?
Can this kind of cases be policed?
Computer related crimes literally have no boundaries.Therefore it is important to answer these questions:
TABLE:1
-
7/29/2019 10 -Cyber Crimes
12/23
The most common are e-mail based crimes in India. Like one we had inBangalore, in which whenever the marriage of a girl used to get fixed up,the perspective groom family used to get a defamatory e-mail saying thatthe girl is of loose character, resulting in breaking of the marriage of thegirl. Other common in India are :
Drug dealing: narcotic drugs are sold on auction sites underinnocuous-sounding names. It can be 50 grams of honey for 50 grams
of cocaine.
Money laundering: E-gold site where hawala transactions are done
in broad daylight. You are given tips of how to trade in gold anmake illegal pots of money.
Forgery sites that teach students how to use high-end drum
scanners for creating look-alike certificates using Microsoft word!
-
7/29/2019 10 -Cyber Crimes
13/23
Cyber Crimes and Terrorism
Terrorists can play havoc byusing a technology calledsteganography. Terrorists likeOsama bin Laden routinelycommunicate with their globalcronies by encrypting messagesinto image files, accessible to
only to those with thepassword. Therefore, that 36-24-36 bimbo you last saw on asite or that picture ofAishwarya Rai you downloadedfrom the net might actuallyhave contained a devastatingmessage in codes. There are
over 50 sites which give youthe recipe for making RDX
bombs.
the
transmission of
secret codes
concealed in
pictures.
-
7/29/2019 10 -Cyber Crimes
14/23
MOSTCOMMON COMPUTER CRIMES ANDSECURITY BREACHES :2003-2006(%)
-
7/29/2019 10 -Cyber Crimes
15/23
With the cyber crimes raising its ugly head in the
state, Goa Police have constituted Cyber Crime cell
in Panaji to deal with the hi-tech crimes.
The Cell is relying on the expertise of Pune based
for technical support.
-
7/29/2019 10 -Cyber Crimes
16/23
The Indian cyber
crimes are punishableunder the InformationTechnology Act, 2000with 10 years in prisonfor hacking and fines ofcrore of rupees for
passing viruses.
Given the unrestricted number of free Web
sites, the Internet is undeniably open to
exploitation. Known as cyber crimes.
While the worldwide scenario on cyber crime
looks bleak, the situation in India isn't any
better in india.Indian corporate and government sites have
been attacked or defaced more than 780 times
between February 2000 and December 2002.
-
7/29/2019 10 -Cyber Crimes
17/23
How do the cops smokeout cyber criminals?
There was this case in the U.S.where the police had closed in on acyber criminal they arrested,confiscated his computer system andtaken both to the police station. Whenthey set up the system in the stationto check out the files, it was all-blank.What they did not realise was he had
set up magnetic coils in his doorwayand once the computer was takenthrough this strong magnetic field, ithad erased all the files in his system.There was no proof of what he hadcommitted and he went scot-free.Interestingly, if you want to wipe anincriminating floppy clean, all youneed do is place it close to a cellularphone or even a hot cup of coffee.Chances are that the strong magneticfields they create will interfere withthe floppy and corrupt it. A CD, ofcourse, is more robust customer.
-
7/29/2019 10 -Cyber Crimes
18/23
Indias first exclusive cyber police station in some cities is all setto hire some ethical hackers to crack cyber crimes involvingtechno-literate offenders.
Who better than a burglar to help you master the art of burglary? So thinkour police too, when it comes to learning about cyber policing.
Once the name of a ethical hacker or expert
is registered, their assistance would besought whenever the need arises. Dependingon the services they provide, rewards up toa maximum of Rs 50,000 per case is givenThere are two type of hackers: White Hat
Hackers or ethical hackers, who helpcompanies adopt safety measures to preventhacking. Black Hat Hackers, who tamper or
steal information.
-
7/29/2019 10 -Cyber Crimes
19/23
Author ! Author !
ANKIT FADIA, when he was a 14yr-old school boy,student ofDelhi public school (R.K PuramDelhi) had written a bookcalled THE UNOFFICIALGUIDE TO ETHICAL HACKINGwhich was published byMacmillan Publishers.Fadia isthe youngest author to bepublished by Macmillan in their110-year history. Hereportedly wrote the sixhundred odd pages in just 15days and is at present working
on two sequels. The ideablossomed following thesuccess of his website calledHACKING TRUTHS.Fadiastrongly believes that hackersare GOOD GUYS who usetheir expertise to ferret outevidence of electronicwrongdoing.
Indias first exclusive cyber police
station in some cities is all set to hiresome ethical hackers to crack
cyber crimes involving techno-literateoffenders.The department also plans to maintaina register at cyber crime policestation, whereby theethical hackersor experts willing to help the police
could register their names.
C h f !!!!
-
7/29/2019 10 -Cyber Crimes
20/23
Catch me if you can !!!!
Cyber space is fast emerging as an alternate way of living for thegrowing generation today.
The typical cyber criminal today is the youth, who spends most ofhis time on the net, who is technology savvy and who either
believes that he is invisible to law enforcement and the victim orwho likes to play the game of catch me if you can with the lawenforcement.
There is a need to create better systems and traditions ofpolicing in the cyber space ,for the future. There is a felt need
for the agencies to team up with the IT industry and propagatethe dos and don'ts of the cyber space usage by school and collegeyoungsters.
In todays situation in India, there is a large generation gapbetween cyberspace users and non-users.
-
7/29/2019 10 -Cyber Crimes
21/23
youngstersLack of:
-
7/29/2019 10 -Cyber Crimes
22/23
The 5P mantra to
ONLINE SECURITY
Precaution,Prevention,Protection,
PreservationandPerseverance.
"TAKESECURITY
SERIOUSLY"
-
7/29/2019 10 -Cyber Crimes
23/23
THE END