cyber crime( du presentation for fyup)
DESCRIPTION
TRANSCRIPT
CYBER CRIME
Presented By-Siddharth Anand
ECONOMICS(H)SECTION-A
CONTENTS IntroductionHistory of cyber crimeDefinitionCategories of cyber crimeRole of computer in crimeCyber criminalsPhishingPrevention
source-michielwillens.com
INTRODUCTIONThe internet in India is growing rapidly. It
has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education.
There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.
HISTORY OF CYBER CRIMETHE FIRST RECORDED CYBER CRIME IN THE 1820.
In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
DEFINING CYBER CRIMEIt’s an unlawful act wherein the
computer is either a tool or a target or both.
Acts that are punishable by the Information Technology Act.
Cyber space is a virtual space that has become as important as real space for business, politics, and communities
CATEGORIES OF CIBER CRIME
1.Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against government.
CYBER ATTACKS STATISTICS(2013)
Source-hackmageddon.com
ROLE OF COMPUTER IN CRIME
COMPUTER AS TARGET
COMPUTER AS TOOL
COMPUTER AS APPLIANCE
Source-interaksyon.com
Insider Threats
(employees)
Hackers (teenage thrill-seekers to sophisticated criminals)
Hactivists' (overloads e-mail servers or
hack web sites to send political message)
Virus writers (writes viruses to that
infect systems)
Criminal groups
(attack systems & steal password for financial
gain)
Sensitive intrusions
(sensitive information is obtained via computer
intrusions)
Information warfare
(alternative to military attacks)
Terrorists (who have potential to
disrupt government systems with computer
attacks)
Cyber Warfare (attack by sovereigns ---
Crime or Declaration of war)
CYBER CRIMINALS
Frequently Used Cyber Crimes Unauthorized access to
computer systems or networks. Theft of information contained
in electronic form. Email bombing. Data diddling. Salami attacks. Denial of Service attack.
Virus / worm attacks Logic bombs Trojan attacks Internet time thefts Web jacking Theft of computer system Physically damaging a computer
system
Source:bostinno.streetwise.co
PHISHING(A GROWING PROBLEM)
LINK MANIPULATION
A deception designed to steal valuable personal data, such as
credit card numbers, passwords, account data, or other
information.
Source-pcwordl.com
GLOBAL PHISHING SURVEY 2012
Source-docs.apwg.org
EXAMPLE
WHOIS 210.104.211.21:
Location: Korea, Republic Of
Images from Anti-Phishing Working Group’s Phishing ArchiveSource-hongkiat.com
Source-hongkiat.com
PEREVENTIONUSE STRONG PASSWORDS
SECURE YOUR COMPUTER1) ACTIVATE YOUR FIREWALL
2) USE ANTI-VIRUS
3) BLOCK SPYWARE ATTACKS
BE SOCIAL –MEDIA SAVVY
SECURE YOUR MOBILR DEVICES.
INSTALL LATEST OS.
SECURE WIRELESS NETWORK.
PROTECT YOUR E-IDENTITY
CONCLUSION“BYTES ARE REPLACING BULLETS IN
THE CRIME WORLD”
India needs a good combination of laws and technology, in harmony with the laws of other countries and keeping in mind common
security standards.
THANKYOU