cyber crime

25

Upload: yazad-dumasia

Post on 21-Apr-2017

108 views

Category:

Engineering


0 download

TRANSCRIPT

Page 1: Cyber crime
Page 2: Cyber crime

2Presenting by :

Dumasia Yazad 140420107015

Gajjar Karan140420107016

Computer (Shift-1) 3rd year

Semester 5th

Page 3: Cyber crime

3Crimes are not to be measured by the issue of events, but by the bad

intensions of person.

The greatest crimes do not arise from a want of feeling for others but from an over sensibility for

ourselves and an over indulgence in our own desires.

Page 4: Cyber crime

Why Should we know about Cyber-Crime?

In this Tech-savvy world of 21st Century every one is engaged with internet, through WhatsApp, twitter, Facebook, net-banking & lots of other platforms are there.

And some criminal minded persons commit crimes here, which is included under cyber-crime.

So we should be aware about crimes happening around in the cyber-space.

4

Page 5: Cyber crime

5

A combining form meaning “computer,” “computer network,” or “virtual reality,” used in the formation of compound words (cyber-talk; cyber-art; cyberspace) and by extension meaning “expressing visions of the future” (cyber-fashion).

Meaning of cyber

Origin of cyber word : CyberneticsThe study of human control functions and of mechanical and electronic systems designed to replace them, involving the application of statistical mechanics to communication engineering.

Page 6: Cyber crime

Cyber Crime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It is also used to include traditional crimes in which computers or networks are used to enable the illicit activity.

Computer crime mainly consists of unauthorized access to computer systems data alteration, data destruction, theft of intellectual property. Cyber crime in the context of national security may involve hacking, traditional espionage, or information warfare and related activities.

Threatening Email, Assuming someone's Identity, Sexual Harassment, Defamation, Spam and Phishing are some examples where computers are used to commit crime, whereas Viruses, Worms and Industrial Espionage, Software Piracy and Hacking are examples where computers become target of crime.

What is cyber crime? 6

Page 7: Cyber crime

7History The first recorded cyber crime took place in the year 1820 That is not

surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C.

Then era begin from1903 Magician and inventor Nevil Maskelyne disrupts John Ambrose Fleming's public demonstration of Guglielmo Marconi's purportedly secure wireless telegraphy technology, sending insulting Morse code messages through the auditorium's projector.

Rest is history after 9/11 attack best cyber attack against American military defense.

ISIS biggest issue who use internet as weapon to increase there strength.

Page 8: Cyber crime

8Types of Cyber attacks are juggernaut by percentage

(source- FBI)

Financial fraud: 11% Sabotage of data/networks: 17% Theft of proprietary information: 20% System penetration from the outside: 25% Denial of service: 27% Unauthorized access by insiders: 71% Employee abuse of internet privileges 79% Viruses: 85%

Page 9: Cyber crime

“ If you experienced computer system intrusions by someone from outside your organization, indicate the type of activity performed by the intruder.”Manipulate data integrity 6.8%Installed a sniffer

6.6%Stole password files

5.6%Proving/scanning systems 14.6%Trojan logons

5.8%IP spoofing

4.8%Introduced virus

10.6%Denied use of services 6.3%

9

Page 10: Cyber crime

Indian Crime Scene

The major Cyber Crimes reported, in India, are Denial of Services, Defacement of Websites, Spam, Computer Virus and Worms, Pornography, Cyber Squatting, Cyber Stalking and Phishing.

Given the fact that nearly $ 120 million worth of Mobiles are being lost or stolen in the country every year, the users have to protect Information, Contact details and Telephone numbers as these could be misused. Nearly 69 per cent of information theft is carried out by current and ex-employees and 31 per cent by hackers. India has to go a long way in protecting the vital information.

[3 The Hindu, Saturday, Oct 27, 2007].

10

Page 11: Cyber crime

11Cyber Crime Variants

Hacking

"Hacking" is a crime, which entails cracking systems and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 percent increase this year. 

Cyber Squatting

Cyber Squatting is the act of registering a famous Domain Name and then selling it for a fortune. This is an issue that has not been tackled in IT ACT 2000.

11

Page 12: Cyber crime

DENIAL OF SERVICE ATTACK DENIAL OF SERVICE ATTACKS : This is an act by the

criminals who floods the bandwidth of the victims network or fills his E-mail box with spam mail depriving him of the service he is entitled to access or provide. Many DOS attacks, such as the ping of death and Tear drop attacks.

Afterward

12

Page 13: Cyber crime

Malicious software that attaches itself to other software or computer system and then propagates itself to other computers via networks or disks. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.

13VIRUS DISSEMINITION

Page 14: Cyber crime

COMPUTER VANDALISMDamaging or destroying data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate.

Lead to hackers

14

Page 15: Cyber crime

Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason.

The fraudster then has access to the customer's online bank account and to the funds contained in that account.a

15

Page 16: Cyber crime

VishingVishing is the criminal practice of using social engineering and Voice over IP (VoIP) to gain access to private personal and financial information from the public for the purpose of financial reward. The term is a combination of “Voice" and phishing. Vishing exploits the public's trust in landline telephone services. Vishing is typically used to steal credit card numbers or other information used in identity theft schemes from individuals.

16

Page 17: Cyber crime

CYBER TERRORISM

Terrorist attacks on the Internet is by distributed denial of service attacks, hate websites and hate emails, attacks on sensitive computer networks, etc. Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.

17

Page 18: Cyber crime

18

Page 19: Cyber crime

India stands 11th in the ranking for Cyber Crime in the World, constituting 3% of the Global Cyber Crime at

2012 data analysis by FBI

19

Page 20: Cyber crime

Why India?

A rapidly growing online user base 121 Million Internet Users 65 Million Active Internet Users, up by 28% from

51 million in 2010 50 Million users shop online on Ecommerce and

Online Shopping Sites 46+ Million Social Network Users 346 million mobile users had subscribed to Data

Packages.

20

Page 21: Cyber crime

Cyber Crime In India

► The majority of cybercrimes are centered on forgery, fraud and Phishing,

► India is the third-most targeted country for Phishing attacks after the US and the UK,

► Social networks as well as ecommerce sites are major targets,► 6.9 million bot-infected systems in 2010,► 14,348 website defacements in 2010,► 6,850 .in and 4,150 .com domains were defaced during 2011,► 15,000 sites hacked in 2011,► India is the number 1 country in the world for generating spam.

21

Page 22: Cyber crime

Again, this is growing trend and it is surprising that authorities have not taken stern actions to curb the growth of these cyber-crimes.

► The police have recorded 3,038 cases but made only 2,700 arrests in 3 years (between 2007 and 2010)

► India registered only 1,350 cases under the IT Act and IPC in 2010

► 50% of cybercrimes are not even reported.

22

Page 23: Cyber crime

Geographic breakdown of cases reported:

o 153 from Karnataka,o 148 from Kerala o 142 from Maharashtra o 105 Andhra Pradesh o 52 Rajasthan o 52 Punjab

233 persons were arrested in 201033% of the cases registered were related

to hacking

Source: National Crime Records Bureau

23

Page 24: Cyber crime

Conclusion…“Indian Laws are well drafted and are capable of handling all kinds of challenges as posed by cyber criminals. However, the enforcement agencies are required to be well versed with the changing technologies and Laws.”

"As internet technology advances so does the threat of cyber crime. In times like these we must protect ourselves from cyber crime. Anti-virus software, firewalls and security patches are just the beginning. Never open suspicious e-mails and only navigate to trusted sites.”

24

Page 25: Cyber crime

THANK YOU!!

AGAINST CYBER CRIME,FIGHT AGAINST THEM