cyber crime

35
Cyber crimes Presentation on

Upload: dixitas

Post on 14-May-2015

371 views

Category:

Engineering


0 download

DESCRIPTION

a power point presentation on "cyber crime" including its types, laws against them, safety tips and case study.

TRANSCRIPT

Page 1: Cyber crime

Cyber crimesPresentation on

Page 2: Cyber crime

Introduction to cyber crime...

Page 3: Cyber crime

What is cyber crime ??

Cyber crime is a generic term that refers to all criminal activities done using the medium of computers, the Internet, cyber space and the worldwide web.

Page 4: Cyber crime

Cyber law

• Cyber law is a term used to describe the legal issues related to use of communications technology, particularly “cyberspace”, i.e. the Internet.

• Cyber law is an attempt to apply laws designed for the physical world, to human activity on the Internet.

Page 5: Cyber crime
Page 6: Cyber crime

Categories of Cyber crimes

Page 7: Cyber crime

•e.g. Hacking, Virus/Worm attacks, DOS attack etc.

1. The Computer as a Target :-using

a computer to attack other computers.

•e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.

2. The computer as a weapon :-using a

computer to commit real world

crimes.

We can categorize Cyber crimes in two ways

Page 8: Cyber crime

Another Categorization of Cyber crimes

Page 9: Cyber crime
Page 10: Cyber crime
Page 11: Cyber crime
Page 12: Cyber crime
Page 13: Cyber crime

Various types of cyber crime..

Page 14: Cyber crime

1. Hacking

• Hacking is the unauthorized access to a computer system, programs, data and network resources.

Page 15: Cyber crime

Law & Punishment

• Under Information Technology (Amendment) Act, 2008, Section 43(a) read with section 66 is applicable and Section 379 & 406 of Indian Penal Code, 1860 also are applicable.

• If crime is proved under IT Act, accused shall be punished for imprisonment, which may extend to three years or with fine, which may extend to five lacs rupees or both.

Page 16: Cyber crime

2. Data theft

If any person without permission of the owner or any other person, who is in charge of a computer, computer system of computer network - downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium, then it is data theft.

Page 17: Cyber crime

Law & Punishment

Under Information Technology (Amendment) Act, 2008, Section 43(b) read with Section 66 is applicable and under Section 379, 405 & 420 of Indian Penal Code, 1860 also applicable.

Page 18: Cyber crime

3. Spreading Virus or Worms

• Viruses can do any amount of damage, the creator intends them to do.

• They can send your data to a third party and then delete your data from your computer.

• They can also ruin/mess up your system and render it unusable without a re-installation of the operating system.

• Usually the virus will install files on your system and then will change your system so that virus program is run every time you start your system.

• It will then attempt to replicate itself by sending itself to other potential victims.

Page 19: Cyber crime

Law & Punishment

Under Information Technology (Amendment) Act, 2008, Section 43(c) & 43(e) read with Section 66 is applicable and under Section 268 of Indian Penal Code, 1860 also applicable.

Page 20: Cyber crime

4. Identity Theft

Identity theft is a form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name.

Page 21: Cyber crime

Law & Punishment

• Under Information Technology (Amendment) Act, 2008, Section 66-C and Section 419 of Indian Penal Code, 1860 also applicable.

Page 22: Cyber crime

5. E-Mail Spoofing

• A spoof email is one that appears to originate from one source but actually has been sent from another source.

• Hackers use this method to disguise the actual email address from which phishing and spam messages are sent and often use email spoofing in conjunction with Web page spoofing to trick users into providing personal and confidential information.

Page 23: Cyber crime

Law & Punishment

• Under Information Technology (Amendment) Act, 2008, Section 66-C and Section 419 of Indian Penal Code, 1860 also applicable.

Page 24: Cyber crime

6. Trojan Attack

• The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans.

• The name Trojan Horse is popular.

Page 25: Cyber crime

7. E-mail related crimes1. Email spoofing

Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source. Please Read

2. Email SpammingEmail "spamming" refers to sending email to thousands and thousands of users - similar to a chain letter.

3 Sending malicious codes through emailE-mails are used to send viruses, Trojans etc through emails as an attachment or by sending a link of website which on visiting downloads malicious code.

4. Email bombingE-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address.

Page 26: Cyber crime

8. IPR Violations

IPR stands for intellectual proprietary rights. These include software piracy, copyright infringement, trademarks violations, theft of computer source code, patent violations. etc.

Page 27: Cyber crime

9.Data diddling

• Data diddling involves changing data prior or during input into a computer.

• In other words, information is changed from the way it should be entered by a person typing in the data, a virus that changes data, the programmer of the database or application, or anyone else involved in the process of having information stored in a computer file.

Page 28: Cyber crime

Cyber crime evolution

Page 29: Cyber crime
Page 30: Cyber crime

Cyber crime in different countries

Page 31: Cyber crime
Page 32: Cyber crime

Documented cases• June 2012 LinkedIn and eHarmony had been attacked, compromising 65 million passwords, 30,000

passwords were cracked and 1.5 million EHarmony passwords were posted online.[17]

• December 2012 Wells Fargo website experienced a denial of service attack. Potentially compromising 70 million customers and 8.5 million active viewers. Other banks thought to be compromised: Bank of America, J. P. Morgan U.S. Bank, and PNC Financial Services[18]

• In January 2012 Zappos.com experienced a security breach after as many as 24 million customers' credit card numbers, personal information, billing and shipping addresses had been compromised.[19] On 2 March 2010, Spanish investigators arrested 3[clarification needed] in infection of over 13 million computers around the world. The "botnet" of infected computers included PCs inside more than half of the Fortune 1000 companies and more than 40 major banks, according to investigators.

• In August 2010 the international investigation Operation Delego, operating under the aegis of the Department of Homeland Security, shut down the international pedophile ring Dreamboard. The website had approximately 600 members, and may have distributed up to 123 terabytes of child pornography (roughly equivalent to 16,000 DVDs). To date this is the single largest U.S. prosecution of an international child pornography ring; 52 arrests were made worldwide.[23]

• April 23, 2013 saw the Associated Press' Twitter account's hacking to release a hoax tweet about fictional attacks in the White House that left President Obama injured.[24] This erroneous tweet resulted in a brief plunge of 130 points from the Dow Jones Industrial Average, removal of $136 billion from S&P 500 index,[25] and the temporary suspension of their Twitter account. The Dow Jones later restored its session gains.

Page 33: Cyber crime

Cyber Security“Cyber Security” is defined as protecting information, equipment, devices computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction.

Page 34: Cyber crime

Safety tips

• Use antivirus software• Internet firewalls• Uninstall unnecessary software• Maintain backup• Check security settings• Use good passwords• Individual awareness

Page 35: Cyber crime

Thank you !!