cyber crime

40
CYBER CRIME CONCERN OF MODERN ERA Submitted to, Mrs. Anindita Chaudhary Assosiate Professor Sikkim Manipal Institute of Tec

Upload: jayant-raj

Post on 24-May-2015

212 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Cyber crime

CYBER CRIMECONCERN OF MODERN ERA

Submitted to,Mrs. Anindita ChaudharyAssosiate ProfessorSikkim Manipal Institute of Technology

Page 2: Cyber crime

Presented by,

Kanahaiya Mishra

Prateek Kumar Shivam Kumar

Sahu Rituparna

Shome Yashvardhan Divyanshu

Page 3: Cyber crime

AGENDA INTRODUCTION HISTORY CYBER CRIMINALS CATEGORIES TYPES CYBER SECURITY CYBER LAWS DOS AND DONT’S CONCLUDING REMARKS

Page 4: Cyber crime

INTRODUCTION Offences that are committed against individuals or groups of

individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones.

- Dr. Debarati Halder and Dr. K. Jaishankar

A generalized definition of cyber crime may be “ unlawful acts wherein the computer is either a tool or target or both”.

Page 5: Cyber crime

“Cybercrime is criminal activity done using computers and the Internet.”

-Wikipedia

 “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime” 

-Indian Penal Code

One way of viewing cybercrimes is that they may be digital versions of traditional, real world offenses. They could be considered traditional, or “real world” crimes if not for the incorporated element of virtual or cyberspace

-US Congressional View

Page 6: Cyber crime

Cybercrime is becoming ever more serious. Findings from the 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the

information age .

Cybercrime is becoming ever more serious. Findings from the 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the

information age .

Page 7: Cyber crime
Page 8: Cyber crime

HISTORY OF CYBER CRIME The first recorded cyber crime took place in 1820. That is not surprising considering the fact that the abacus, which is

thought to be the earliest from of a computer, has been around since 3500 B.C.

In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage.

The first spam email took place in 1976 when it was sent out over the ARPANT.

The first virus was invented in 1986 in Pakistan by D Basit and Amjad Farooq Alvi .

Page 9: Cyber crime

CYBER CRIMINALS

Those who are doing crimes by using the computer as an target or object.

i. Children and adolescents between the age group of 6 – 18 years

ii. Dissatisfied employees

iii. Professional hackers / crackers

iv. Organized hackers

Page 10: Cyber crime

CATEGORIESThe Cyber crimes are categorized as the following

Cyber crimes against persons

Cyber crimes against Individual Property

Cyber crimes against government

Under these categorize there are many ways to do crime. Here let we see some ways …

Page 11: Cyber crime

CATEGORIES OF CYBER

CRIME

AGAINST PEOPLE

Via E-maiLCYBER

STALKINGE-mail

spoofing

AGAINST PROPERTIES

Computer vandalism

Transmitting Virus

AGAINST NATION

Cyber Terrorism Cyber War

Page 12: Cyber crime

AGAINST INDIVIDUALi.Harassment via e-mails:

Harassment through e-mails is not a new concept. It is very similar to harassing through letters.

ii. Cyber-stalking :

Cyber stalking involves following a person movements across the Internet by posting messages.

iii. Email spoofing:

A mail which misrepresents its origin. It shows it's origin to be different from which actually it originates.

eg ‘melissa’and ‘lovebug’ virus

Page 13: Cyber crime

AGAINST PROPERTIESi.Computer Vandalism:

Damaging or destroying data rather than stealing or misusing them is called cyber vandalism.

ii.Transmitting virus:

These are programs that attach themselves to a file and then circulate .

They usually affect the data on a computer, either by altering or deleting it.

eg computer vandalism

Page 14: Cyber crime

AGAINST NATIONCyber Terrorism:

Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.

The recent example may be cited of – Osama Bin Laden, the LTTE, and attack on America’s army deployment system during Iraq war. 

eg ‘Al-Qaeda’

Page 15: Cyber crime

Types of cyber crimes

Hacking Frauds Virus Trojan Spam Malware Rootkits IRC Crime Spyware

Page 16: Cyber crime

HackingHacking is the simple term defined as illegal intrusion into a computer or account system without the permission of the ownerH

AC

KER

S WHITE HAT HACKER

GREY HAT HACKER

BLACK HAT HACKER

Page 17: Cyber crime

White Hat Hacker

The good guys who identify the security weakness of the system or network and inform the owner about them.

They are also known as Ethical Hackers.

Page 18: Cyber crime

BBlack Hat HackersL HAT HACKERS

A black hat is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network.

Also known as ‘cracker’.

Page 19: Cyber crime

Grey Hat Hackers

A grey hat, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers

Page 20: Cyber crime

PHISHING• It is technique of pulling out confidential

information from the bank/financial institutional account holders by deceptive account holders means .

• Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients

Page 21: Cyber crime

CREDIT CARD FRAUDS Credit card fraud is a wide-ranging term

for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction. The purpose may be to obtain goods without paying, or to obtain unauthorized funds from an account.

Although incidence of credit card fraud is limited to about 0.1% of all card transactions, this has resulted in huge financial losses as the fraudulent transactions have been large value transactions. In 1999, out of 12 billion transactions made annually, approximately 10 million—or one out of every 1200 transactions—turned out to be fraudulent.

Page 22: Cyber crime

viruses

жComputer virus is a computer program that can replicate itself and spread from one computer to another.

жViruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers.

Page 23: Cyber crime

TROJANS

† Trojan, is a standalone malicious program that does not attempt to infect files unlike a computer virus nor replicate itself with the intent of infecting other computers unlike a computer worm.

† Trojan horses can make copies of themselves, steal information, or harm their host computer systems.

Page 24: Cyber crime

SPYWARE

• Spyware is a type of malware (malicious software) installed on computers that collects information about users without their knowledge.

The presence of spyware is typically hidden from the user and can be difficult to detect.

Page 25: Cyber crime

SPAM§ Spam , also known as junk email or

unsolicited bulk email(UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email.

§ Spammers collect email addresses from chat rooms, websites, customer lists, newsgroups, and viruses which harvest users' address books, and are sold to other spammers.

Page 26: Cyber crime

ROOTKITSѓ It is a set of tools used frequently by

the computer science intruders or crackers that is able to accede illicitly to a computer science system.

ѓ These tools serve to hide the processes and archives that allow the intruder to maintain the access to the system, often with malicious aims.  

Page 27: Cyber crime

MALWARE

o Malware is an abbreviated term used to describe a "malicious software" program.

o Any type of code or program that is used for monitoring and collecting your personal information or disrupting or damaging your computer, may be referred to as malware.

Page 28: Cyber crime

IRC CRIME

“Internet Relay Chat (IRC)” servers have chat rooms in which people from anywhere the world can come together and chat with each other .

Criminals use it for meeting co use it for meeting co-conspirators .

Hackers use it for discussing their exploits / sharing the techniques .

Paedophiles use chat rooms to allure small children .

Cyber Stalking -In order to harass a woman her telephone number  telephone number is given to others as if she wants to befriend males .

Page 29: Cyber crime

NEED FOR CYBER LAW

TACKLING CYBER CRIMES

INTELLECTUAL PROPERTY RIGHTS AND COPYRIGHTS PROTECTION ACT

Page 30: Cyber crime

CYBER LAWS IN INDIAITACT PASSED IN 2000

ITS MAIN POINTS AREInformation Technology Act 2000 Amendment Details

New Cyber Security Infrastructure

Changes in the Cyber Crime Policing

Overview of Changes between ITA 2000 and ITA 2008

Concern for Privacy Rights Vs National Security

Auditing of Documents

Cyber Cafes under ITA 2008

Page 31: Cyber crime

OFFENCES AND LAWS IN CYBER SPACE

TAMPERING WITH COMPUTER DOCUMENTS

HACKING WITH COMPUTER SYSTEM

PUBLISHING OBSCENE MATERIAL ON INTERNET

BREACHING OF CONFIDENTIALITY AND PRIVACY

Page 32: Cyber crime

IT ACT PROVISIONS Email would now be a valid and legal form of communication in our

country that can be duly produced and approved in a court of law.

Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act.

Digital signatures have been given legal validity and sanction in the Act.

 The Act now allows Government to issue notification on the web thus heralding e-governance

statutory remedy in case if anyone breaks into companies computer systems or network and causes damages or copies data

Page 34: Cyber crime

DOS

AND

DON’TS

Page 35: Cyber crime

DosAlways use latest and up date anti virus software to guard against virus attacks.Always keep back up volumes so that one may not suffer data loss in case of virus contamination.Always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children

Page 36: Cyber crime

DON’TAvoid disclosing any information pertaining to one.

Never send your credit card number to any site that is not secured, to guard against frauds.

Always avoid sending any photograph online particularly to strangers.

Avoid visiting sites which compromises your security.

Beware of fraud mails.

Page 37: Cyber crime

Conclusion…

¢ It is not possible to eliminate cyber crime from the cyber space.

¢ It is quite possible to check them.

¢ History is the witness that no legislation has succeeded in totally eliminating crime from the globe.

¢ The only possible step is to make people aware of their rights and duties.

Page 38: Cyber crime

A final word:

“Treat your password like you treat your toothbrush. Never give it to anyone else to use,

and change it every few months.”

Page 39: Cyber crime
Page 40: Cyber crime

BEWARESTAY SAFE...

…THANK YOU