cyber crime
TRANSCRIPT
CYBER CRIMECONCERN OF MODERN ERA
Submitted to,Mrs. Anindita ChaudharyAssosiate ProfessorSikkim Manipal Institute of Technology
Presented by,
Kanahaiya Mishra
Prateek Kumar Shivam Kumar
Sahu Rituparna
Shome Yashvardhan Divyanshu
AGENDA INTRODUCTION HISTORY CYBER CRIMINALS CATEGORIES TYPES CYBER SECURITY CYBER LAWS DOS AND DONT’S CONCLUDING REMARKS
INTRODUCTION Offences that are committed against individuals or groups of
individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones.
- Dr. Debarati Halder and Dr. K. Jaishankar
A generalized definition of cyber crime may be “ unlawful acts wherein the computer is either a tool or target or both”.
“Cybercrime is criminal activity done using computers and the Internet.”
-Wikipedia
“Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”
-Indian Penal Code
One way of viewing cybercrimes is that they may be digital versions of traditional, real world offenses. They could be considered traditional, or “real world” crimes if not for the incorporated element of virtual or cyberspace
-US Congressional View
Cybercrime is becoming ever more serious. Findings from the 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the
information age .
Cybercrime is becoming ever more serious. Findings from the 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the
information age .
HISTORY OF CYBER CRIME The first recorded cyber crime took place in 1820. That is not surprising considering the fact that the abacus, which is
thought to be the earliest from of a computer, has been around since 3500 B.C.
In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage.
The first spam email took place in 1976 when it was sent out over the ARPANT.
The first virus was invented in 1986 in Pakistan by D Basit and Amjad Farooq Alvi .
CYBER CRIMINALS
Those who are doing crimes by using the computer as an target or object.
i. Children and adolescents between the age group of 6 – 18 years
ii. Dissatisfied employees
iii. Professional hackers / crackers
iv. Organized hackers
CATEGORIESThe Cyber crimes are categorized as the following
Cyber crimes against persons
Cyber crimes against Individual Property
Cyber crimes against government
Under these categorize there are many ways to do crime. Here let we see some ways …
CATEGORIES OF CYBER
CRIME
AGAINST PEOPLE
Via E-maiLCYBER
STALKINGE-mail
spoofing
AGAINST PROPERTIES
Computer vandalism
Transmitting Virus
AGAINST NATION
Cyber Terrorism Cyber War
AGAINST INDIVIDUALi.Harassment via e-mails:
Harassment through e-mails is not a new concept. It is very similar to harassing through letters.
ii. Cyber-stalking :
Cyber stalking involves following a person movements across the Internet by posting messages.
iii. Email spoofing:
A mail which misrepresents its origin. It shows it's origin to be different from which actually it originates.
eg ‘melissa’and ‘lovebug’ virus
AGAINST PROPERTIESi.Computer Vandalism:
Damaging or destroying data rather than stealing or misusing them is called cyber vandalism.
ii.Transmitting virus:
These are programs that attach themselves to a file and then circulate .
They usually affect the data on a computer, either by altering or deleting it.
eg computer vandalism
AGAINST NATIONCyber Terrorism:
Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.
The recent example may be cited of – Osama Bin Laden, the LTTE, and attack on America’s army deployment system during Iraq war.
eg ‘Al-Qaeda’
Types of cyber crimes
Hacking Frauds Virus Trojan Spam Malware Rootkits IRC Crime Spyware
HackingHacking is the simple term defined as illegal intrusion into a computer or account system without the permission of the ownerH
AC
KER
S WHITE HAT HACKER
GREY HAT HACKER
BLACK HAT HACKER
White Hat Hacker
The good guys who identify the security weakness of the system or network and inform the owner about them.
They are also known as Ethical Hackers.
BBlack Hat HackersL HAT HACKERS
A black hat is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network.
Also known as ‘cracker’.
Grey Hat Hackers
A grey hat, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers
PHISHING• It is technique of pulling out confidential
information from the bank/financial institutional account holders by deceptive account holders means .
• Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients
CREDIT CARD FRAUDS Credit card fraud is a wide-ranging term
for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction. The purpose may be to obtain goods without paying, or to obtain unauthorized funds from an account.
Although incidence of credit card fraud is limited to about 0.1% of all card transactions, this has resulted in huge financial losses as the fraudulent transactions have been large value transactions. In 1999, out of 12 billion transactions made annually, approximately 10 million—or one out of every 1200 transactions—turned out to be fraudulent.
viruses
жComputer virus is a computer program that can replicate itself and spread from one computer to another.
жViruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers.
TROJANS
† Trojan, is a standalone malicious program that does not attempt to infect files unlike a computer virus nor replicate itself with the intent of infecting other computers unlike a computer worm.
† Trojan horses can make copies of themselves, steal information, or harm their host computer systems.
SPYWARE
• Spyware is a type of malware (malicious software) installed on computers that collects information about users without their knowledge.
The presence of spyware is typically hidden from the user and can be difficult to detect.
SPAM§ Spam , also known as junk email or
unsolicited bulk email(UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email.
§ Spammers collect email addresses from chat rooms, websites, customer lists, newsgroups, and viruses which harvest users' address books, and are sold to other spammers.
ROOTKITSѓ It is a set of tools used frequently by
the computer science intruders or crackers that is able to accede illicitly to a computer science system.
ѓ These tools serve to hide the processes and archives that allow the intruder to maintain the access to the system, often with malicious aims.
MALWARE
o Malware is an abbreviated term used to describe a "malicious software" program.
o Any type of code or program that is used for monitoring and collecting your personal information or disrupting or damaging your computer, may be referred to as malware.
IRC CRIME
“Internet Relay Chat (IRC)” servers have chat rooms in which people from anywhere the world can come together and chat with each other .
Criminals use it for meeting co use it for meeting co-conspirators .
Hackers use it for discussing their exploits / sharing the techniques .
Paedophiles use chat rooms to allure small children .
Cyber Stalking -In order to harass a woman her telephone number telephone number is given to others as if she wants to befriend males .
NEED FOR CYBER LAW
TACKLING CYBER CRIMES
INTELLECTUAL PROPERTY RIGHTS AND COPYRIGHTS PROTECTION ACT
CYBER LAWS IN INDIAITACT PASSED IN 2000
ITS MAIN POINTS AREInformation Technology Act 2000 Amendment Details
New Cyber Security Infrastructure
Changes in the Cyber Crime Policing
Overview of Changes between ITA 2000 and ITA 2008
Concern for Privacy Rights Vs National Security
Auditing of Documents
Cyber Cafes under ITA 2008
OFFENCES AND LAWS IN CYBER SPACE
TAMPERING WITH COMPUTER DOCUMENTS
HACKING WITH COMPUTER SYSTEM
PUBLISHING OBSCENE MATERIAL ON INTERNET
BREACHING OF CONFIDENTIALITY AND PRIVACY
IT ACT PROVISIONS Email would now be a valid and legal form of communication in our
country that can be duly produced and approved in a court of law.
Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act.
Digital signatures have been given legal validity and sanction in the Act.
The Act now allows Government to issue notification on the web thus heralding e-governance
statutory remedy in case if anyone breaks into companies computer systems or network and causes damages or copies data
RECENT INSTANCES OF CYBERCRIME
Koushambi ,24-year old software professional working for TCS was brutally killed by Manish Thakur, in a hotel room at Andheri.
V V S Laxman , the famous indian cricketer, whose account was hacked by Izathul sheikh through the help of net banking, and was robbed off Rs 110LAKHS.
DOS
AND
DON’TS
DosAlways use latest and up date anti virus software to guard against virus attacks.Always keep back up volumes so that one may not suffer data loss in case of virus contamination.Always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children
DON’TAvoid disclosing any information pertaining to one.
Never send your credit card number to any site that is not secured, to guard against frauds.
Always avoid sending any photograph online particularly to strangers.
Avoid visiting sites which compromises your security.
Beware of fraud mails.
Conclusion…
¢ It is not possible to eliminate cyber crime from the cyber space.
¢ It is quite possible to check them.
¢ History is the witness that no legislation has succeeded in totally eliminating crime from the globe.
¢ The only possible step is to make people aware of their rights and duties.
A final word:
“Treat your password like you treat your toothbrush. Never give it to anyone else to use,
and change it every few months.”
BEWARESTAY SAFE...
…THANK YOU