cyber crime
DESCRIPTION
a power point presentation on "cyber crime" including its types, laws against them, safety tips and case study.TRANSCRIPT
Cyber crimesPresentation on
Introduction to cyber crime...
What is cyber crime ??
Cyber crime is a generic term that refers to all criminal activities done using the medium of computers, the Internet, cyber space and the worldwide web.
Cyber law
• Cyber law is a term used to describe the legal issues related to use of communications technology, particularly “cyberspace”, i.e. the Internet.
• Cyber law is an attempt to apply laws designed for the physical world, to human activity on the Internet.
Categories of Cyber crimes
•e.g. Hacking, Virus/Worm attacks, DOS attack etc.
1. The Computer as a Target :-using
a computer to attack other computers.
•e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.
2. The computer as a weapon :-using a
computer to commit real world
crimes.
We can categorize Cyber crimes in two ways
Another Categorization of Cyber crimes
Various types of cyber crime..
1. Hacking
• Hacking is the unauthorized access to a computer system, programs, data and network resources.
Law & Punishment
• Under Information Technology (Amendment) Act, 2008, Section 43(a) read with section 66 is applicable and Section 379 & 406 of Indian Penal Code, 1860 also are applicable.
• If crime is proved under IT Act, accused shall be punished for imprisonment, which may extend to three years or with fine, which may extend to five lacs rupees or both.
2. Data theft
If any person without permission of the owner or any other person, who is in charge of a computer, computer system of computer network - downloads, copies or extracts any data, computer data base or information from such computer, computer system or computer network including information or data held or stored in any removable storage medium, then it is data theft.
Law & Punishment
Under Information Technology (Amendment) Act, 2008, Section 43(b) read with Section 66 is applicable and under Section 379, 405 & 420 of Indian Penal Code, 1860 also applicable.
3. Spreading Virus or Worms
• Viruses can do any amount of damage, the creator intends them to do.
• They can send your data to a third party and then delete your data from your computer.
• They can also ruin/mess up your system and render it unusable without a re-installation of the operating system.
• Usually the virus will install files on your system and then will change your system so that virus program is run every time you start your system.
• It will then attempt to replicate itself by sending itself to other potential victims.
Law & Punishment
Under Information Technology (Amendment) Act, 2008, Section 43(c) & 43(e) read with Section 66 is applicable and under Section 268 of Indian Penal Code, 1860 also applicable.
4. Identity Theft
Identity theft is a form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name.
Law & Punishment
• Under Information Technology (Amendment) Act, 2008, Section 66-C and Section 419 of Indian Penal Code, 1860 also applicable.
5. E-Mail Spoofing
• A spoof email is one that appears to originate from one source but actually has been sent from another source.
• Hackers use this method to disguise the actual email address from which phishing and spam messages are sent and often use email spoofing in conjunction with Web page spoofing to trick users into providing personal and confidential information.
Law & Punishment
• Under Information Technology (Amendment) Act, 2008, Section 66-C and Section 419 of Indian Penal Code, 1860 also applicable.
6. Trojan Attack
• The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans.
• The name Trojan Horse is popular.
7. E-mail related crimes1. Email spoofing
Email spoofing refers to email that appears to have been originated from one source when it was actually sent from another source. Please Read
2. Email SpammingEmail "spamming" refers to sending email to thousands and thousands of users - similar to a chain letter.
3 Sending malicious codes through emailE-mails are used to send viruses, Trojans etc through emails as an attachment or by sending a link of website which on visiting downloads malicious code.
4. Email bombingE-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address.
8. IPR Violations
IPR stands for intellectual proprietary rights. These include software piracy, copyright infringement, trademarks violations, theft of computer source code, patent violations. etc.
9.Data diddling
• Data diddling involves changing data prior or during input into a computer.
• In other words, information is changed from the way it should be entered by a person typing in the data, a virus that changes data, the programmer of the database or application, or anyone else involved in the process of having information stored in a computer file.
Cyber crime evolution
Cyber crime in different countries
Documented cases• June 2012 LinkedIn and eHarmony had been attacked, compromising 65 million passwords, 30,000
passwords were cracked and 1.5 million EHarmony passwords were posted online.[17]
• December 2012 Wells Fargo website experienced a denial of service attack. Potentially compromising 70 million customers and 8.5 million active viewers. Other banks thought to be compromised: Bank of America, J. P. Morgan U.S. Bank, and PNC Financial Services[18]
• In January 2012 Zappos.com experienced a security breach after as many as 24 million customers' credit card numbers, personal information, billing and shipping addresses had been compromised.[19] On 2 March 2010, Spanish investigators arrested 3[clarification needed] in infection of over 13 million computers around the world. The "botnet" of infected computers included PCs inside more than half of the Fortune 1000 companies and more than 40 major banks, according to investigators.
• In August 2010 the international investigation Operation Delego, operating under the aegis of the Department of Homeland Security, shut down the international pedophile ring Dreamboard. The website had approximately 600 members, and may have distributed up to 123 terabytes of child pornography (roughly equivalent to 16,000 DVDs). To date this is the single largest U.S. prosecution of an international child pornography ring; 52 arrests were made worldwide.[23]
• April 23, 2013 saw the Associated Press' Twitter account's hacking to release a hoax tweet about fictional attacks in the White House that left President Obama injured.[24] This erroneous tweet resulted in a brief plunge of 130 points from the Dow Jones Industrial Average, removal of $136 billion from S&P 500 index,[25] and the temporary suspension of their Twitter account. The Dow Jones later restored its session gains.
Cyber Security“Cyber Security” is defined as protecting information, equipment, devices computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction.
Safety tips
• Use antivirus software• Internet firewalls• Uninstall unnecessary software• Maintain backup• Check security settings• Use good passwords• Individual awareness
Thank you !!