vardhil cyber security cyber crime1st
Post on 10-Apr-2018
251 Views
Preview:
TRANSCRIPT
8/8/2019 Vardhil Cyber Security Cyber Crime1st
http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 1/12
8/8/2019 Vardhil Cyber Security Cyber Crime1st
http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 2/12
Security is necessary for prevention of crime. Andhence, we first need to know what crime is! So first, we
will learn about the word crime and what does the termcyber crime refer to in detail.
Crime is a social and economic phenomenon and is as oldas the human society. Crime is a legal concept and hasthe sanction of the law. Crime or an offence is ´a legalwrong that can be followed by criminal proceedings whichmay result into punishment.µ
The hallmark of criminality is that, it is breach of thecriminal law. Per Lord Atkin ´the criminal quality of anact cannot be discovered by reference to any standard butone: is the act prohibited with penal consequencesµ.
Vardhil Gandhi - Cyber Security - NewDevelopments in IT
8/8/2019 Vardhil Cyber Security Cyber Crime1st
http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 3/12
Cyber crime is the latest and perhaps the mostcomplicated problem in the cyber world. ´Cyber crimemay be said to be those species, of which, genus is theconventional crime, and where either the computer is an
object or subject of the conduct constituting crimeµ
́Any criminal activity that uses a computer either as aninstrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crimeµ
A generalized definition of cyber crime may be ´ unlawfulacts wherein the computer is either a tool or target or bothµ
Vardhil Gandhi - Cyber Security - NewDevelopments in IT
8/8/2019 Vardhil Cyber Security Cyber Crime1st
http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 4/12
The Computer as a Target :-using a computerto attack other computers.
e.g. Hacking, Virus/Worm attacks, DOS attacketc.
The computer as a weapon :-using a computerto commit real world crimes.
e.g. Cyber Terrorism, IPR violations, Credit cardfrauds, EFT frauds, Pornography etc.
Vardhil Gandhi - Cyber Security - NewDevelopments in IT
8/8/2019 Vardhil Cyber Security Cyber Crime1st
http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 5/12
Technological advancements have created new possibilities
for criminal activity, in particular the criminal misuse of
information technologies in the following ways:
a. Unauthorized access & Hacking
b. Trojan Attack
c. Virus and Worm attack
d. E-mail & IRC related crimes
1. Email spoofing
2. Email Spamming 3. Email bombing
e. Denial of Service attacks
We will now discuss about them in detail.Vardhil Gandhi - Cyber Security - NewDevelopments in IT
8/8/2019 Vardhil Cyber Security Cyber Crime1st
http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 6/12
Access means gaining entry into, instructing or communicatingwith the logical, arithmetical, or memory function resources of acomputer, computer system or computer network.
Unauthorized access would therefore mean any kind of accesswithout the permission of either the rightful owner or the person
in charge of a computer, computer system or computer network.
Every act committed towards breaking into a computer and/ornetwork is hacking. Hackers write or use ready-made computerprograms to attack the target computer. They possess the desireto destruct and they get the kick out of such destruction. Some
hackers hack for personal monetary gains, such as to stealing thecredit card information, transferring money from various bankaccounts to their own account followed by withdrawal of money.
By hacking web server taking control on another persons websitecalled as web hijacking
Vardhil Gandhi - Cyber Security - NewDevelopments in IT
8/8/2019 Vardhil Cyber Security Cyber Crime1st
http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 7/12
The program that acts like something usefulbut does things that are quiet damping. Theprograms of this kind are called as Trojans.
The name Trojan Horse is popular.
Trojans come in two parts, a Client part and aServer part. When the victim (unknowingly)runs the server on its machine, the attacker willthen use the Client to connect to the Server and
start using the trojan. TCP/IP protocol is the usual protocol type
used for communications, but some functionsof the trojans use the UDP protocol as well.
Vardhil Gandhi - Cyber Security - NewDevelopments in IT
8/8/2019 Vardhil Cyber Security Cyber Crime1st
http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 8/12
A program that has capability to infect otherprograms and make copies of itself and
spread into other programs is called virus.
Programs that multiply like viruses but
spread from computer to computer arecalled as worms.
Vardhil Gandhi - Cyber Security - NewDevelopments in IT
8/8/2019 Vardhil Cyber Security Cyber Crime1st
http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 9/12
1. Email spoofing
Email spoofing refers to email that appears to havebeen originated from one source when it wasactually sent from another source.
2. Email Spamming Email "spamming" refers to sending email tothousands and thousands of users - similar to achain letter.
3. Sending malicious codes through emailE-mails are used to send viruses, Trojans etcthrough emails as an attachment or by sending alink of website which on visiting downloadsmalicious code.
Vardhil Gandhi - Cyber Security - NewDevelopments in IT
8/8/2019 Vardhil Cyber Security Cyber Crime1st
http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 10/12
4. Email bombing E-mail "bombing" is characterized byabusers repeatedly sending an identical
email message to a particular address. 5. Sending threatening emails
6. Defamatory emails
7. Email frauds 8. IRC related
Three main ways to attack IRC are: ´verbalµattacks, clone attacks, and flood attacks.
Vardhil Gandhi - Cyber Security - NewDevelopments in IT
8/8/2019 Vardhil Cyber Security Cyber Crime1st
http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 11/12
Flooding a computer resource with
more requests than it can handle.This causes the resource to crashthereby denying access of service to
authorized users.
Vardhil Gandhi - Cyber Security - NewDevelopments in IT
top related