cyber crime final (nimra)

Upload: saadia-s-sadiq

Post on 10-Apr-2018

240 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/8/2019 CYBER CRIME FINAL (nimra)

    1/16

    CYBER CRIME

    1. Cyber Crime

    Cyber crime encompasses any criminal act dealing with computers and networks.

    Additionally, cyber crime also includes traditional crimes conducted through the

    Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft,

    and credit card account thefts are considered to be cyber crimes when the illegalactivities are committed through the use of a computer and the Internet.

    Cyber crime is any crime that is related to computer , internet and technology(Cyber

    crime By Bernadette Hlubik Schell, Clemens Martin).

    2.2. TYPES OF CYBER CRIMETYPES OF CYBER CRIME

    HACKINGHacking is the act of gaining access to a computer or computer network without legal

    authorization.The person who uses any network or computer without any authorization is known as a

    hacker.

    Types of hacking

    1. Website hacking

    2. Software hacking3. System hacking

    4. E-mail hacking

    Malware disseminationMalicious software or code that attaches itself to some other software. It is a software

    designed specifically to damage or disrupt a system. For example

    I. VirusII. Worms

    III. Trojans

    IV. Time bombsV. Logic bombs

    VI. Rabbit & Baterium

    Maleware or virus spread like fire. First a file virus attaches itself to a file, usually an

    executable application (e.g. a word processing program or a DOS

    program). It is commonly transmitted through e-mail id.They usually affect the data on a computer, either by altering or deleting it. Worms,

    unlike viruses do not need the host to attach themselves to. They merely make functional

    copies of themselves and do this repeatedly till they eat up all the available space on a

    computer's memory.

    http://www.webopedia.com/TERM/C/cyber.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/network.htmlhttp://www.webopedia.com/TERM/C/Internet.htmlhttp://www.webopedia.com/TERM/C/cyber.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/network.htmlhttp://www.webopedia.com/TERM/C/Internet.html
  • 8/8/2019 CYBER CRIME FINAL (nimra)

    2/16

    CYBER CRIME

    PhishingPhishing is an e-mail fraud method in which the perpetrator sends out legitimate-

    looking email in an attempt to gather personal and financial information from

    recipients. Typically, the messages appear to come from well known and trustworthyWeb sites. Web sites that are frequently spoofed by phishers include PayPal, eBay,

    MSN, Yahoo, BestBuy, and America Online. A phishing expedition, like the fishing

    expedition it's named for, is a speculative venture: the phisher puts the lure hoping tofool at least a few of the prey that encounter the bait.

    Spoofing

    Spoofing is the creation of TCP/IP packets using somebody else's IP addressE-mail spoofing is the forgery of an e-mail header so that the message appears to

    have originated from someone or somewhere other than the actual source.

    Distributors ofspam often use spoofing in an attempt to get recipients to open, andpossibly even respond to,

    Kinds of spoofing

    IP spoofing

    E-mail spoofing

    Content spoofing

    Credit TheftYou simply have to type credit card number into www page off the vendor for online

    transaction. If electronic transactions are not secured the credit card numbers can be

    stolen byte hackers who can misuse this card by impersonating credit card owner the

    credit card owner.

    http://searchsoa.techtarget.com/sDefinition/0,,sid26_gci927888,00.htmlhttp://whatis.techtarget.com/definition/0,,sid9_gci213411,00.htmlhttp://whatis.techtarget.com/definition/0,,sid9_gci213480,00.htmlhttp://whatis.techtarget.com/definition/0,,sid9_gci213480,00.htmlhttp://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci213031,00.htmlhttp://searchsoa.techtarget.com/sDefinition/0,,sid26_gci927888,00.htmlhttp://whatis.techtarget.com/definition/0,,sid9_gci213411,00.htmlhttp://whatis.techtarget.com/definition/0,,sid9_gci213480,00.htmlhttp://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci213031,00.html
  • 8/8/2019 CYBER CRIME FINAL (nimra)

    3/16

    CYBER CRIME

    PornographyPornography means indecent exposure through images or videos( the worst kind ofpornography is child porn).Anybody can view obscene material even children

    Pornography industrys revenues larger than the revenues of technology companies

    combined: Microsoft, Google, Amazon, eBay, Yahoo!, Apple, etc

    2006 Worldwide Pornography Revenues

    Pirated softwarePiracy is unauthorized copying of software.Retail programs are licensed for use at

    just one computer site or for use by only one user at any time.

    It can be done in various ways

    Illegal internet downloads

    Hard disk loading

    Counterfeiting

    Softlifting or end-user piracy

    Denial of services attackThis is an act by the criminal,, who Floods the bandwidth of the victims Network or

    fills his e-mail box with Spam mail depriving him of the Services he ibis entitled toaccess or Provide

  • 8/8/2019 CYBER CRIME FINAL (nimra)

    4/16

    CYBER CRIME

    The computer of the victim is flooded with more requests than it can handle which

    cause it to crash. Distributed Denial of Service (DDoS) attack is also a type of denial

    of service attack, in which the offenders are wide in number and widespread.

    Common types of DOS attack

    1. Buffer attack2. SYN Attack

    3. Teardrop Attack

    4. Smurf Attack5. Viruses

    6. Physical Infrastructure Attacks

    Cyber stalkingCyber stalking is almost always characterized by the stalker relentlessly pursuing

    his\her victim online and is much more likely to include some form of offline attack,

    as well. This offline aspect makes it a more serious situation as it can easily lead to

    dangerous physical contact, if the victims location is known. Different methods ofstalking through computer are as follow

    1. E-mail

    2. Instant messaging

    3. IMs posted on a website

    Cyber terrorismCyber terrorism is a use of computing resources to intimidate or coerce others by

    terrorists.OR

    Use of information technology by terrorist groups and individuals to further their

    agenda.

    Cyber terrorism is any "premeditated, politically motivated attack againstinformation, computer systems, computer programs, and data which results inviolence against non-combatant targets by sub-national groups or clandestineagents."

    Cyber defamationIt is an act of imputing any person with intent to lower the person in the estimation of

    the right-thinking members of society generally or to cause him to be shunned or

    avoided or to expose him to hatred, contempt or ridicule. Cyber defamation is notdifferent from conventional defamation except the involvement of a virtual medium

    Identity TheftObtains key pieces of personal information, such as Social Security or driver's license

    numbers, in order to pose as someone else.

  • 8/8/2019 CYBER CRIME FINAL (nimra)

    5/16

    CYBER CRIME

    Salami attacks

    In such crime criminal makes insignificant changes to some sites for example onlineshopping sites in such a manner that such changes would go unnoticed.

    Criminal makes such program that deducts small amount like Rs. 2.50 per month

    from the account of all the customer of the Bank and deposit the same in his account.In this case no account holder will approach the bank for such small amount but

    criminal gains huge amount.

    IRC Crime

    Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere

    the world can come togetherand chat with each other Criminals use it for meeting coconspirators.

    Hackers use it for discussing their exploits / sharing the techniques

    Paedophiles use chat rooms to allure small children

    Cyber Stalking - In order to harass a woman her telephone number is given to others

    as if she wants to befriend males

    Paedophilia

    Paedophilia is the slaughter of innocence . Paedophilia is a sexual attraction to children

    by an adult. Internet or computer allows paedophiles because of the following reasons

    1. Instant access to other predators worldwide;2.Open discussion of their sexual desires; ways to lure victims;

    3. Mutual support of their adult child sex philosophies;

    4. Instant access to potential child victims worldwide;5 Disguised identities for approaching children, even to the point of presenting as a

    member of teen groups;

    6. Ready access to "teen chat rooms" to find out how and why to target as potentialvictims;7. Shared ideas about Means to identify and track down home contact information;

    8. Ability to build a long-term "Internet" relationship with a potential victim, prior to

    attempting to engage the child in physical contact.

  • 8/8/2019 CYBER CRIME FINAL (nimra)

    6/16

    CYBER CRIME

    3. CYBER CRIMINAL

    Cyber criminal is a person who performs or commits crime by the abuse of electronic

    media or influencing the computer or computer devices. The cyber criminal doesnt need

    to be physically at the scene of the crime, it could be somebody operating from anothercomputer .

    So, we can easily categories cyber criminals in to the following catogeries

    1. Kids & Teenagers (age group 9-16 etc.)2. Disgruntled employees

    3. Political hacktivist4. Professional hackers5. Paedophilies (child predators)

    6. Business rivals

    Kids & Teenagers (age group 9-16 etc.)

    Its hard to believe but according to gallop survey most of the hackers are young children

    and teenagers. Children who have just enter the world of internet are completely unawareof the seriousness of the situation .Their motive or intentions are merely to impress or

    stand out among their friends but its more serious than that because once you have

    entered the world of cyber crime nothings seems wrong and it urge us to know more

    about the tactics other cyber criminals uses .

    Disgruntled employee

    Disgruntled employees can sometime give their bosses a really tough time by seekingrevenge from them through cyber crime . It is easier for disgruntled employees to do

    more harm to their employers by committing computer related crimes, which can bring

    entire systems down.

  • 8/8/2019 CYBER CRIME FINAL (nimra)

    7/16

    CYBER CRIME

    Political hacktivists

    Hacktivists are hackers with a particular (mostly political) motive. In other cases thisreason can be social activism, religious activism, etc. The attacks on approximately

    200 prominent Indian websites by a group of hackers known as Pakistani Cyber

    Warriors are a good example of political hacktivists at work.

    Professional hackers (Corporate espionage)

    The most dangerous of all the cyber criminals are professional hacker whose basic

    motives are to steal personal document , money , personal information, bringcompanies systems down etc.

    Paedophiles

    Other group of cyber criminals arepaedophiles. Paedophiles are those people who

    approach children on internet and tries to built a relationship with them while chatting

    and sometimes they also attempts to engage them in a physical relationship.

    Business rivalBusiness rivals would attempt to steal the companys confidential documents or

    secret by hacking in to the companys computer .

    4. VICTIMSOFCYBERCRIMINALSWe can generalize the victims of cyber crime in to three categories:

    1. Gullible

    2. unskilled , unprofessional people3. desperate and greedy people

    5. HOWISCYBERCRIMEDONE?Cyber crime can be done through various methods but the most commonly used methodsare as follow

    1. Computer hi-jacking

    2. Transmission of virus3. Spywares

    4. Key loggers

    5. Hacking tools

    6. Spam email

    6. MOTIVES OF CYBER CRIMINALS

    The motives behind cyber crime are as follow

    Gathering Trophies (quest to become famous)

    General Mischief

    Financial Gain

    Revenge

    Protest

    Criminal activity

  • 8/8/2019 CYBER CRIME FINAL (nimra)

    8/16

    CYBER CRIME

    Identity Theft

    Forging Documents and Messages

    Use of computer spam server

    porn sever

    hack in to other pcs7. FIRST CYBER CRIME REPORTED

    The first recorded cyber crime took place in the year 1820! That is not surprising

    considering the fact that the abacus, which is thought to be the earliest form of a

    computer, has been around since 3500 B.C. in India, Japan and China. The era of moderncomputers, however, began with the analytical engine of Charles Babbage.

    In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom.

    This device allowed the repetition of a series of steps in the weaving of special fabrics.

    This resulted in a fear amongst Jacquard's employees that their traditional employment

    and livelihood were being threatened. They committed acts of sabotage to discourageJacquard from further use of the new technology. This is the first recorded cyber crime.

    8. DOCUMENTED CASES OF CYBER CRIMEthe documented cases of cyber crime reported and had vast ranging effects are as follow:

    The Yahoo! website was attacked at 10:30 PST on Monday, 7 February2000. The

    attack lasted three hours. Yahoo was pinged at the rate of one gigabyte/second.

    On 3 August 2000, Canadian federal prosecutors charged MafiaBoy with 54

    counts of illegal access to computers, plus a total of ten counts of mischief to data

    for his attacks on Amazon.com, eBay, Dell Computer, Outlaw.net, and Yahoo.MafiaBoy had also attacked other websites, but prosecutors decided that a total of

    66 counts was enough. MafiaBoy pled not guilty.

    About fifty computers at Stanford University, and also computers at the

    University of California at Santa Barbara, were amongst the zombie computers

    sending pings in DoS attacks.

    In 26 March1999, the Melissa worminfected a document on a victim's computer,

    then automatically sent that document and copy of the virus via e-mail to other

    people.

    9. CYBERCRIMETHEFASTGROWINGBUSINESS

    "The modern thief can steal more with a computer than with a gun. Tomorrow's terroristmay be able to do more damage with a keyboard than with a bomb".

    National Research Council, "Computers at Risk", 1991

    http://en.wikipedia.org/wiki/February_7http://en.wikipedia.org/wiki/February_7http://en.wikipedia.org/wiki/2000http://en.wikipedia.org/wiki/2000http://en.wikipedia.org/wiki/August_3http://en.wikipedia.org/wiki/August_3http://en.wikipedia.org/wiki/August_3http://en.wikipedia.org/wiki/2000http://en.wikipedia.org/wiki/2000http://en.wikipedia.org/wiki/MafiaBoyhttp://en.wikipedia.org/wiki/Amazon.comhttp://en.wikipedia.org/wiki/EBayhttp://en.wikipedia.org/wiki/EBayhttp://en.wikipedia.org/wiki/Dell_Computerhttp://en.wikipedia.org/wiki/Dell_Computerhttp://en.wikipedia.org/wiki/Yahoohttp://en.wikipedia.org/wiki/Stanford_Universityhttp://en.wikipedia.org/wiki/Zombie_computerhttp://en.wikipedia.org/wiki/March_26http://en.wikipedia.org/wiki/1999http://en.wikipedia.org/wiki/Melissa_(computer_worm)http://en.wikipedia.org/wiki/Melissa_(computer_worm)http://en.wikipedia.org/wiki/February_7http://en.wikipedia.org/wiki/2000http://en.wikipedia.org/wiki/August_3http://en.wikipedia.org/wiki/2000http://en.wikipedia.org/wiki/MafiaBoyhttp://en.wikipedia.org/wiki/Amazon.comhttp://en.wikipedia.org/wiki/EBayhttp://en.wikipedia.org/wiki/Dell_Computerhttp://en.wikipedia.org/wiki/Yahoohttp://en.wikipedia.org/wiki/Stanford_Universityhttp://en.wikipedia.org/wiki/Zombie_computerhttp://en.wikipedia.org/wiki/March_26http://en.wikipedia.org/wiki/1999http://en.wikipedia.org/wiki/Melissa_(computer_worm)
  • 8/8/2019 CYBER CRIME FINAL (nimra)

    9/16

    CYBER CRIME

    Cyber crime is the fastest growing crime around the world and there are various reasons

    behind it.

    Anonymity of the hacker or cybercriminal

    Its easy to hide your crime and not left any loop holes

    It cannot be detected

    Most of the systems around the world donot have good or no firewalls or securityapplications

    Lack of awareness of the user

    Internet provides anonymity: This is one of the reasons why criminals try to get away

    easily when caught and also give them a chance to commit the crime again. Therefore,

    we users should be careful. We should not disclose any personal information on theinternet or use credit cards and if we find anything suspicious in e-mails or if the system

    is hacked, it should be immediately reported to the Police officials who investigate cyber-

    crimes rather than trying to fix the problem by ourselves.

    Computer crime is a multi-billion dollar problem. Law enforcement must seek ways tokeep the drawbacks from overshadowing the great promise of the computer age.Cybercrime is a menace that has to be tackled effectively not only by the official but also

    by the users by co-operating with the law. The founding fathers of internet wanted it to be

    a boon to the whole world and it is upon us to keep this tool of modernisation as a boon

    and not make it a bane to the society.

    The picture below shows the increasing rate of cyber crime from jan-june 2002

    E-INFOPROMOTINGCYBERCRIMES

  • 8/8/2019 CYBER CRIME FINAL (nimra)

    10/16

    CYBER CRIME

    One of the main reasons why cyber crime is one of the fastest growing business is

    because internet is a medium through which other cyber criminals develops interest in

    the teenagers and other people to learn and use it . It doesnt seem wrong and looks morelike fun when one thinks of doing it . But invading anyones privacy is a crime.

    We can find anything on internet whether it is encrypted music, movies , any kind of data

    , porn all you have to do is search for it and you can get all the information that isrequired .

    There are millions of sites on internet which not only shows how to hack, make virus,

    take over someones computer, even break locks etc is done but also sells the softwareonline.

    Hackers being paid

    Hacking for fun has evolved into hacking for profit, and created a business model that is

    nearly as sophisticated as that of legal software. evolution from hacking and virus writing

    for fun to creating malicious code for profit. Security experts are increasingly pointing to

    the existence of a "black" or "shadow" cyber-economy, where malware services are sold

    online using the same kinds of development methods and guarantees given by legitimatesoftware vendors.

    Cyber Crime is Vulnerable (Reporting Cyber Crime)

    There are a number of reasons why a cyber crime victim may not report the crime to the

    authorities: A feeling that nothing can be done because it

    1. is too late to rectify the harm caused

    A feeling that there is little chance that the police will identify, detain and

    prosecute the offender:2. because the Internet offers relative anonymity and an easy way to shield

    identity3. the police have limited resources and expertise4. to tackle cybercrime so may discourage the victim from pursuing a formal

    complaint as investigation would be too difficult

    5. victims reportthat the police emphasise the futility of making an officialreport or state (wrongly) that the reported conduct is not a criminal offence

    in an attempt to dissuade the victim from pursuing the matter

    6. Given these issues, it is hardly surprising that officialcrime statistics areregarded as representing only the tip of the iceberg of the totality of

    criminal behaviour and that cyber crime, in particular, is massively under-

    reported.

  • 8/8/2019 CYBER CRIME FINAL (nimra)

    11/16

    CYBER CRIME

    10. EFFECTS OF CYBER CRIME ECONOMIC EFFECT

    National Research Council study that shows computer crime is a drag on the nationaleconomy by billions of dollars. Cyber crime needs to be more of a concern because it

    impacts costs that are passed on to consumers. the possibility of criminals gaining access

    to systems critical to sectors such as utilities or the banking industry is a national threat .

    No group -- from home computer users, to corporations to the government is immune tocybercrime. It may be considered a recession, this is an area that should be of concern

    because it affects costs that are passed on to consumers. One national threat, he says, is

    the possibility of criminals getting into systems critical to the Department of Defense,utility companies and the banking industry. Although it doesnt effect the consumer

    directly but it has vast ranging effect that can collapse our economy.

    EFFECTS OF CYBER CRIME ON SOCIETY

    INCONVIENIENCE & DEPRESSION

    Cyber crime has many harmful effects on society as a whole. Its not only ruining oureconomy but also the inconvenience it causes for the computer users. The inconvenience

    and depression the computer users have to go through when their identity is used by

    some other person, or when their computer faces a major shutdown due to virus or by

    some hacker.

    RATIO OF CRIMES

    The fast increase in computer crime is directly affecting the crime rate as it is difficult to

    detect cyber crime more and more people are entering in to this business, causing the

    ratio ofcrime to reach its maximum heights.

    PAEDOPHILES (ON CHILDREN)

    As we have discussed earlier that paedophiles is the slaughter of innocence and its effects

    on minds of young children are vast ranging, base of many psychological diseases.Children suffering from child abuse mostly suffer from mental diseases as lack of

    confidence, different kind of phobias that are ever lasting.

    PORNOGRAPHY

    It should be noted as well that cyber crime is also spreading other vices in our societysuch as porn addiction and is actually polluting the minds of every person around the

  • 8/8/2019 CYBER CRIME FINAL (nimra)

    12/16

    CYBER CRIME

    world. Anyone can access the obscene contents with one click of a mouse including

    children.

    11.HOW TO STOP CYBER CRIMEThe government and other organization should take strict measures to stop and punishcyber criminals and they have to take the laws seriously and treat it as a regular crime.

    Following measures should be brought about by government and police and investigating

    agencies.

    Research Needs For Computer Crime

    Preparation Of Search Warrants For Computer-Related Evidence Excerpts From Computer Search Warrants

    PREVENTION OF CYBER CRIME:

    INDIVIDUALPRECAUTIONS:

    Prevention is always better than cure. It is always better to take certain precaution

    while operating the net. A should make them his part of cyber life A netizen

    should keep in mind the following things-

    1. to prevent cyber stalking avoid disclosing any information

    pertaining to oneself. This is as good as disclosing your identity to strangers in

    public place.

    2. always avoid sending any photograph online particularly tostrangers and chat friends as there have been incidents of misuse of the

    photographs.

    3. always use latest and up date anti virus software to guard against

    virus attacks.

    4. always keep back up volumes so that one may not suffer data lossin case of virus contamination

    5. never send your credit card number to any site that is not secured,

    to guard against frauds.

    6. always keep a watch on the sites that your children are accessing toprevent any kind of harassment or depravation in children.

    http://www.crime-research.org/zip/Comprpt2.ziphttp://www.crime-research.org/zip/Ingraham.ziphttp://www.crime-research.org/zip/Cpu_Sw00.ziphttp://www.crime-research.org/zip/Comprpt2.ziphttp://www.crime-research.org/zip/Ingraham.ziphttp://www.crime-research.org/zip/Cpu_Sw00.zip
  • 8/8/2019 CYBER CRIME FINAL (nimra)

    13/16

    CYBER CRIME

    7. it is better to use a security programme that gives control over the

    cookies and send information back to the site as leaving the cookies unguarded

    might prove fatal.

    8. web site owners should watch traffic and check any irregularity on

    the site. Putting host-based intrusion detection devices on servers may do this.

    9. if you have high-speed (broadband) Internet access in your office,

    think about getting either a hardware or software firewall to protect yourcomputer system.use of firewalls may be beneficial.

    10. web servers running public sites must be physically separate

    protected from internal corporate network.

    11. Refrain from opening e-mail and e-mail attachments from individuals you

    do not know.

    12. Do not execute .EXE or unknown files directly from your e-mail.13. Look at purchasing Anti-virus and security software and have it updated

    on at least a weekly basis.

    GOVERNMENTSROLEINPREVENTIONOFCYBERCRIMELAWS , ACTSANDBILLS

    It also commendable that government has done so much to prevent and stop cyber crime

    although no worthy result was drawn from it . The very first bill passed against cyber

    crime was Privacy protection act of 1980.Below is the short history of laws,bills and acts passed to prevent cyber crime and punish

    cyber criminals.

    Privacy Protection Act Of 1980, Chapter 21a - Privacy ProtectionSubchapter I--First Amendment Privacy Protection

    Communications Privacy Act Of 1986 (Wire And Electronic

    Communications Interception And Interception Of Oral Communications)

    Copyright felony act (3 oct 1992)

    Alabama Computer Crime Act, Computer Crime Statutes, May 1, 1995 -

    Counterfeiting And Forgery

    United States Code, Title 18 - Crimes And Criminal Procedure (Part I -Crimes),January 1, 1998 - Counterfeiting And Forgery

    Federal Guidelines For Searching And Seizing Computers

    Code Of Virginia, Crimes Against Property, Computer Crimes

    2004 CSI/FBI Computer Crime And Security Survey

    2005 CSI/FBI Computer Crime And Security Survey

    Cyber-Crime Act of 2007

    CYBER-CRIME COURTS

    Different Governements have taken this step and introduced a new wing in courts that

    deals with cyber crime case USA and UK are one of the best examples.

    http://www.crime-research.org/zip/Ppa.ziphttp://www.crime-research.org/zip/Ppa.ziphttp://www.crime-research.org/zip/Ecpawire.ziphttp://www.crime-research.org/zip/Ecpawire.ziphttp://www.crime-research.org/zip/Stcclaws.ziphttp://www.crime-research.org/zip/Stcclaws.ziphttp://www.crime-research.org/zip/18usc.ziphttp://www.crime-research.org/zip/18usc.ziphttp://www.crime-research.org/zip/Doj_Gdl.ziphttp://www.crime-research.org/zip/CCAct2000.ziphttp://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2004.pdfhttp://www.gocsi.com/press/20050714.jhtmlhttp://www.crime-research.org/zip/Ppa.ziphttp://www.crime-research.org/zip/Ppa.ziphttp://www.crime-research.org/zip/Ecpawire.ziphttp://www.crime-research.org/zip/Ecpawire.ziphttp://www.crime-research.org/zip/Stcclaws.ziphttp://www.crime-research.org/zip/Stcclaws.ziphttp://www.crime-research.org/zip/18usc.ziphttp://www.crime-research.org/zip/18usc.ziphttp://www.crime-research.org/zip/Doj_Gdl.ziphttp://www.crime-research.org/zip/CCAct2000.ziphttp://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2004.pdfhttp://www.gocsi.com/press/20050714.jhtml
  • 8/8/2019 CYBER CRIME FINAL (nimra)

    14/16

    CYBER CRIME

    Awareness about cyber crimeThrough books

    There have been different books published to aware users of the cyber crime and how

    they can save themselves from being a victim of cyber crime for e.gCyber crime: how to protect yourself from cyber criminals by Laura.E

    Web Stalkers by Stephen andert, Donald k BruelsonPhishing exposed: by Lance James, Joe Stewart, Walter Joseph Stewart

    Online Sites

    Different organizations government and voluntary are also trying to bring awareness inpeople thorough online sites where you can learn about how to protect yourself from

    identity, credit theft and various kind of malaware. You can also report cases of cyber

    crime and download or purchase software that protects your identity.

    Online Videos and DocumentariesWe can also update ourselves and get guidance from online videos. These videosencourages people to purchase or download anti viruses and report cyber crime cases.

    FACTS AND FIGURES 1 in 8 adults are victims of identity theft. ( FTC) 10 million in 2005 i.e 1 every 3

    seconds.

    40 million cases of credit card abuse - Master Card

    7 in 10 odds of becoming victim of computer security breach (NCSA)

    172,000 PCs lose control to hackers every year.

    100% of computers are infected

    91% with dangerous spyware

    19 million known cyber hackers, more than all of the armies in the world coming.

    National Research Council study that shows computer crime is a drag on the

    national economy by billions of dollars

    US is the largest mass producer of cyber attacks, according to security expert

    Riptech, with Israel producing the most attacks per capita.

    12. CONCLUSION

    Computer crime is a multi-billion dollar problem. Law enforcement must seekways to keep the drawbacks from overshadowing the great promise of thecomputer age. Cyber crime is a menace that has to be tackled effectively notonly by the official but also by the users by co-operating with the law. The

  • 8/8/2019 CYBER CRIME FINAL (nimra)

    15/16

    CYBER CRIME

    founding fathers of internet wanted it to be a boon to the whole world and it isupon us to keep this tool of modernization as a boon and not make it a bane tothe society.

    BIBLIOGRAPHY

    Sites

    http://www.webopedia.com

    http://www.bitpipe.com/tlist/http://www.crime-research.org/analytics/702/

    http://www.cybercitizenship.org/crime/crime.html

    http://www.vnunet.com/vnunet/news/http://cybercrime.planetindia.net/intro.htm

    http://www.legalserviceindia.com/article/l262-Cyber-Crimes-and-General-

    Principles.html

    http://books.google.com.pk/books?id=vz0AAAACAAJ&dq=cyber+crime

    BooksCyber crime By Bernadette Hlubik Schell, Clemens Martin

    http://www.webopedia.com/http://www.bitpipe.com/tlist/http://www.crime-research.org/analytics/702/http://www.cybercitizenship.org/crime/crime.htmlhttp://www.vnunet.com/vnunet/news/http://cybercrime.planetindia.net/intro.htmhttp://www.legalserviceindia.com/article/l262-Cyber-Crimes-and-General-Principles.htmlhttp://www.legalserviceindia.com/article/l262-Cyber-Crimes-and-General-Principles.htmlhttp://books.google.com.pk/books?id=v-z0AAAACAAJ&dq=cyber+crimehttp://www.webopedia.com/http://www.bitpipe.com/tlist/http://www.crime-research.org/analytics/702/http://www.cybercitizenship.org/crime/crime.htmlhttp://www.vnunet.com/vnunet/news/http://cybercrime.planetindia.net/intro.htmhttp://www.legalserviceindia.com/article/l262-Cyber-Crimes-and-General-Principles.htmlhttp://www.legalserviceindia.com/article/l262-Cyber-Crimes-and-General-Principles.htmlhttp://books.google.com.pk/books?id=v-z0AAAACAAJ&dq=cyber+crime
  • 8/8/2019 CYBER CRIME FINAL (nimra)

    16/16

    CYBER CRIME