cyber crime

30
Welcome To My Welcome To My Project Project Cyber Crime Cyber Crime

Upload: zainabtravadi

Post on 14-May-2015

594 views

Category:

Education


1 download

DESCRIPTION

Waiting for ur Comments :) ;)

TRANSCRIPT

Page 1: Cyber Crime

Welcome To MyWelcome To MyProjectProject

Cyber CrimeCyber Crime

Page 2: Cyber Crime

Presented Presented ByBy

Name : Zainab Travadi

Page 3: Cyber Crime
Page 4: Cyber Crime

Why we learn about CYBER CRIME ??Why we learn about CYBER CRIME ??Because  –  – Because  –  – 

 – – – –

Everybody is using COMPUTERS. Everybody is using COMPUTERS. From white collar criminals to terrorist From white collar criminals to terrorist organizations And from Teenagers to organizations And from Teenagers to

Adults . Adults . Conventional crimes like Forgery, Conventional crimes like Forgery,

extortion, kidnapping etc. are being extortion, kidnapping etc. are being committed with the help of computers committed with the help of computers

etc.etc. New generation is growingNew generation is growing up with up with

computers .computers .MOST IMPORTANT-Monetary transactions MOST IMPORTANT-Monetary transactions

are moving on to the INTERNET.are moving on to the INTERNET.    

Page 5: Cyber Crime

• WHAT IS COMPUTER CRIME?WHAT IS COMPUTER CRIME?

•   All crimes performed or resorted to All crimes performed or resorted to by abuse of electronic media or by abuse of electronic media or

otherwise, with the purpose otherwise, with the purpose of influencing the functioning of of influencing the functioning of 

computer or computer system.computer or computer system.

IN SHORTIN SHORT

• Computer is a target.Computer is a target.• Computer is a tool of crime.Computer is a tool of crime.

• Computer is incidental to crimeComputer is incidental to crime

Page 6: Cyber Crime

Profile of Cyber Profile of Cyber CriminalCriminal

•Disgruntled employees. Disgruntled employees.

•TeenagersTeenagers

•Political HacktivistPolitical Hacktivist

•Professional HackersProfessional Hackers

•Business RivalBusiness Rival

Page 7: Cyber Crime

  VICTIMSVICTIMS

•GullibleGullible

•Desperados and Desperados and greedy peoplegreedy people

•Unskilled & Unskilled & InexperiencedInexperienced

•Unlucky peopleUnlucky people

Page 8: Cyber Crime

Computer Crimes are Computer Crimes are VulnerableVulnerable

•Because of : Anonymity,Because of : Anonymity,

• Storage capacity, Storage capacity,

•Weakness in Operating Weakness in Operating System,System,

• Lack of Awareness of Lack of Awareness of user .user .

Page 9: Cyber Crime

•Types of Cyber CrimeTypes of Cyber Crime

Page 10: Cyber Crime

• HACKINGHACKING

• DENIAL OF SERVICEATTACKDENIAL OF SERVICEATTACK

• VIRUS DISSEMINATIONVIRUS DISSEMINATION

• SOFTWARE PIRACYSOFTWARE PIRACY

• IRC CrimeIRC Crime

• CREDIT CARD FRAUDCREDIT CARD FRAUD

• NETEXTORTIONNETEXTORTION

• PHISHINGPHISHING

• SPOOFINGSPOOFING

• CYBER STALKINGCYBER STALKING

• CYBERDEFAMATIONCYBERDEFAMATION

• THREATENINGTHREATENING

• SALAMI ATTACKSALAMI ATTACK

Page 11: Cyber Crime

1) HACKING 1) HACKING 

Hacking in simple terms means Hacking in simple terms means  illegal intrusion into a  illegal intrusion into a

computer system without the computer system without the permission of the computer permission of the computer

owner/user.owner/user.

Page 12: Cyber Crime

2) DENIAL OF SERVICE ATTACK2) DENIAL OF SERVICE ATTACK

This is an act by the criminal, This is an act by the criminal, who floods the bandwidth of the who floods the bandwidth of the

victim’s network or fills his e-victim’s network or fills his e-mail box with spam mail mail box with spam mail

depriving him depriving him services he is entitled to access services he is entitled to access

or provideor provide . .

Page 13: Cyber Crime

3)VIRUS DISSEMINATION 3)VIRUS DISSEMINATION 

•Malicious software that Malicious software that attaches itself to other attaches itself to other

software .software .

(virus, worms, Trojan Horse, (virus, worms, Trojan Horse, Time bomb Bomb, Rabbit and Time bomb Bomb, Rabbit and Bacterium are the malicious Bacterium are the malicious

softwares )softwares )

Page 14: Cyber Crime

4) SOFTWARE PIRACY4) SOFTWARE PIRACY• Theft of software through the illegal Theft of software through the illegal

copying of Theft of software copying of Theft of software and genuine programs or the and genuine programs or the

counterfeiting and distribution of counterfeiting and distribution of products intended to pass for the products intended to pass for the

original .original .• Retail revenue losses worldwide are Retail revenue losses worldwide are

ever increasing due to this crime ever increasing due to this crime increasing due to this crime Can be increasing due to this crime Can be

done in various ways done in various ways • End user copying, Hard disk loading, End user copying, Hard disk loading,

Counterfeiting, etc. Illegal Counterfeiting, etc. Illegal downloads from the internet etcdownloads from the internet etc

Page 15: Cyber Crime

7) CREDIT CARD FRAUD7) CREDIT CARD FRAUD

You simply have types of credit You simply have types of credit card number into www page of card number into www page of

the vendor for online the vendor for online transaction .transaction .

If electronic transaction are not If electronic transaction are not in the credit card numbers can in the credit card numbers can be stolen the hackers who can be stolen the hackers who can misuse this card impersonating misuse this card impersonating

the credit card owner .the credit card owner .

Page 16: Cyber Crime

6)IRC CRIME6)IRC CRIME• Internet Relay Chat (IRC) servers have Internet Relay Chat (IRC) servers have

chat rooms in which people from chat rooms in which people from anywhere the world can come together anywhere the world can come together

and chat with each other .and chat with each other .• Criminals use it for meeting co use it for Criminals use it for meeting co use it for

meeting co-conspirators .meeting co-conspirators .• Hackers use it for discussing their Hackers use it for discussing their

exploits / sharing the techniques .exploits / sharing the techniques .• Paedophiles use chat rooms to allure Paedophiles use chat rooms to allure

small children .small children .• Cyber Stalking -In order to harass a Cyber Stalking -In order to harass a

woman her telephone number woman her telephone number  telephone number is given to others as if  telephone number is given to others as if 

she wants to befriend males .she wants to befriend males .

Page 17: Cyber Crime

Credit card skimmerCredit card skimmer

Page 18: Cyber Crime

SkimmerSkimmer

Page 19: Cyber Crime

How the credit card skimmer is How the credit card skimmer is usedused

Page 20: Cyber Crime

• 8) NET EXTORATION8) NET EXTORATION

• Copying the company’s confidential Copying the company’s confidential data in order to extort said company data in order to extort said company

for huge amount .for huge amount .

Page 21: Cyber Crime

• 9) PHISHING9) PHISHING

• It is technique of pulling out It is technique of pulling out confidential information from the confidential information from the

bank/financial institutional bank/financial institutional account holders by deceptive account holders by deceptive

account holders means .account holders means .

Page 22: Cyber Crime

10)Spoofing10)Spoofing

• Getting one computer on a Getting one computer on a network to to pretend to have network to to pretend to have the identity of another the identity of another computer, usually one with, computer, usually one with, usually one with special access usually one with special access privileges , so as to obtain privileges , so as to obtain access to the other computers access to the other computers on the network. on the network.

Page 23: Cyber Crime

11) CYBER STALKING11) CYBER STALKING

• The Criminal follows the victim The Criminal follows the victim by sending emails, entering the by sending emails, entering the chat rooms sending frequently.chat rooms sending frequently.

Page 24: Cyber Crime

12) CYBER DEFAMATION12) CYBER DEFAMATION

• The Criminal sends emails The Criminal sends emails containing defamatory matters containing defamatory matters

to all concerned of  the victim or to all concerned of  the victim or post the defamatory matters son post the defamatory matters son

a website on disgruntled a website on disgruntled employee may do this employee may do this

against  boss, ex boss, against against  boss, ex boss, against girl, divorced husband against girl, divorced husband against

wife etc  wife etc  

Page 25: Cyber Crime

13)THREATENING13)THREATENING

• The Criminal sends threatening The Criminal sends threatening email or comes in contact in email or comes in contact in

chat rooms with victim. chat rooms with victim.

• (Any one disgruntled may do this (Any one disgruntled may do this against boss, friend or official)against boss, friend or official)

Page 26: Cyber Crime

14)SALAMI ATTACK 14)SALAMI ATTACK 

• In such crime criminal makes In such crime criminal makes insignificant changes in such a insignificant changes in such a

manner that such changes would go manner that such changes would go unnoticed. Criminal makes such unnoticed. Criminal makes such

program that deducts small amount program that deducts small amount like Rs. 2.50 per month from the like Rs. 2.50 per month from the

account of all the customer of the account of all the customer of the Bank and deposit the same in his Bank and deposit the same in his account. In this case no account account. In this case no account holder will approach the bank for holder will approach the bank for

such small amount but criminal gains such small amount but criminal gains huge amount.huge amount.

Page 27: Cyber Crime

15) SALE OF NARCOTICS15) SALE OF NARCOTICS

• Sale & Purchase through net. Sale & Purchase through net.

• There are web site which offer sale There are web site which offer sale and shipment of contrabands drugs. and shipment of contrabands drugs.

•   They may use the techniques They may use the techniques of stegnography for hiding of stegnography for hiding

the messages. the messages.

Page 28: Cyber Crime
Page 29: Cyber Crime
Page 30: Cyber Crime