cyber crimes and its security

47
presentation topic : cyber crimes and security By ashwini awatare

Upload: ashwini-awatare

Post on 10-May-2015

5.536 views

Category:

Documents


7 download

TRANSCRIPT

Page 1: Cyber crimes and its security

presentation topic : cyber crimes and

securityBy ashwini awatare

Page 2: Cyber crimes and its security
Page 3: Cyber crimes and its security

Contents :-

•Introduction to cyber crimes•History of cyber crimes•Categories of cyber crimes•Types •Impact of cyber crimes •Cyber security •Cyber laws•Prevention •Conclusion

Page 4: Cyber crimes and its security

Introduction :-

The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of— be it entertainment, business, sports or education.

There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime — illegal activity committed on the internet.

Page 5: Cyber crimes and its security

What is cyber crime ?

•Using the Internet to commit a crime.▫Identity Theft▫Hacking▫Viruses

•Facilitation of traditional criminal activity▫Stalking▫Stealing information▫Child Pornography

Page 6: Cyber crimes and its security

Cyber Crimes :-• Defining Cyber Crime :->

• It’s an unlawful act wherein the computer is either a tool or a target or both.

• Cyber space is a virtual space that has become

as important as real space for business, politics, and communities

Page 7: Cyber crimes and its security
Page 8: Cyber crimes and its security

History of Cyber Crime

• The first recorded cyber crime took place in the year 1820

• In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard’s - employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!

Page 9: Cyber crimes and its security

History of cyber crimes :-

The first recorded cyber crime took place in 1820.

That is not surprising considenng the fact that the abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.c.

In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage.

Page 10: Cyber crimes and its security

The first spam email took place in 1976 when it was sent out over the AR PANT.

The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the ElK Cloner.

Page 11: Cyber crimes and its security

Incident due to cyber crimes

Page 12: Cyber crimes and its security

Cybercrime Components

•Computers

•Cell Phones

•PDA’s

•Game Consoles

Page 13: Cyber crimes and its security

CATEGORIES OF CYBER CRIME:

We can categorize cyber crime in two ways.

The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc.

The computer as a weapon :- using a

computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.

Page 14: Cyber crimes and its security

CATEGORIES OF CYBER CRIME:

Cyber crimes can be basically divided into 3 major categories: 1. Cyber crimes against persons.

2. Cyber crimes against property.

3. Cyber crimes against government.

Page 15: Cyber crimes and its security

FIRST CATEGORY

Cyber crimes against persons

Cyber harassment is a distinct Cyber crime. Various kinds of harassment can and do occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious, or other.

Page 16: Cyber crimes and its security

SECOND CATEGORY

Cyber crimes against property

These crimes include computer vandalism .

(Destruction of others’ property), Transmission of harmful programs, Unauthorized trespassing through cyber space, Unauthorized possession of computer information.

Page 17: Cyber crimes and its security

THIRD CATEGORY

Cyber crimes against government

Cyber terrorism is one distinct kind of crime in this category.

The growth of Internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.

Page 18: Cyber crimes and its security
Page 19: Cyber crimes and its security

STATISTICS AND THEIR IMPACTS

Page 20: Cyber crimes and its security
Page 21: Cyber crimes and its security
Page 22: Cyber crimes and its security
Page 23: Cyber crimes and its security

Types Of Cyber Crime

Modification of a conventional crime by using computers.

Frequently Used Cyber Crimes.

Page 24: Cyber crimes and its security

Modification of a conventional crime by using computers.

•Financial crimes

•Cyber pornography

• Sale of illegal articles

•Online gambling

Page 25: Cyber crimes and its security

• Intellectual Property crime

• Email spoofing

• Forgery

• Cyber Defamation • Cyber stalking

• — .

• .

• . —

• .

• .

• .

Page 26: Cyber crimes and its security

Frequently Used Cyber Crimes.

• Unauthorized access to computer systems or networks

• Theft of information contained in electronic form

• Email bombing

• Data diddling

• Salami attacks

• Denial of Service attack

Page 27: Cyber crimes and its security

• Virus / worm attacks

• Logic bombs

• Internet time thefts

• Web jacking

• Theft of computer system

• Physically damaging a computer system

Page 28: Cyber crimes and its security

Cyber Criminals•Kids (age group 9-16 etc.)

•Organized hacktivists

•Disgruntled employees

•Professional hackers (corporate espionage)

Page 29: Cyber crimes and its security
Page 30: Cyber crimes and its security

Computer SecurityConfidentiality

Only those authorized to view information.

IntegrityInformation is correct and hasn’t been

altered by unauthorized users or software.

AvailabilityData is accessible to authorized users.

Page 31: Cyber crimes and its security

Computer Security

Page 32: Cyber crimes and its security

Computer Security - Threats Malware

Software that has a malicious purpose Viruses Trojan horse Spyware

Page 33: Cyber crimes and its security
Page 34: Cyber crimes and its security

Computer Security - Threats

Intrusions▫Any attempt to gain unauthorized access to

a system▫Cracking▫Hacking▫Social Engineering▫War-driving

Page 35: Cyber crimes and its security

Computer Security - Threats

Page 36: Cyber crimes and its security

Computer Security - Terminology

People▫Hackers

White Hat – Good guys. Report hacks/vulnerabilities to appropriate people.

Black Hat – Only interested in personal goals, regardless of impact.

Gray Hat – Somewhere in between.

Page 37: Cyber crimes and its security

Computer Security - Terminology

Script Kiddies▫Someone that calls themselves a ‘hacker’

but really isn’t.

Ethical Hacker▫Someone hired to hack a system to find

vulnerabilities and report on them.▫Also called a ‘sneaker’ .

Page 38: Cyber crimes and its security

Computer Security - Terminology

Security Devices▫ Firewall

Barrier between network and the outside world.

▫Proxy server Sits between users and server. Two main

functions are to improve performance and filter requests.

▫Intrusion Detection Systems (IDS) Monitors network traffic for suspicious

activity.

Page 39: Cyber crimes and its security
Page 40: Cyber crimes and its security

Cyber Laws :-

• Law governing cyber space • Cyber law encompasses laws relating to: — Cyber Crimes Electronic and Digital Signatures — Intellectual Property — Data Protection and Privacy

Page 41: Cyber crimes and its security

•Cyber crime: it refers to criminal exploitation of the internet

•Electronic and Digital signatures : it refers to mathematical scheme for demonstrating the authenticity of digital message or documents

Page 42: Cyber crimes and its security

Intellectual property: it refers to legal concept which refers to creations of the mind for which exclusive rights are recognized.

Data protection and privacy: it refers to effective legislation helps minimize monitoring by governments , regulate surveillance by information is properly protected.

Page 43: Cyber crimes and its security

NEED OF CYBER LAW

Cybercriminals ÷ computer technology = difficulties to apply the law.

Not only real-world crimes by using computers..

Page 44: Cyber crimes and its security

PREVENTION Disable and log off a specific user account to

prevent access. Disable and log off a group of user accounts which

access a particular service that is being attacked.

Disable and dismount specific (network) devices, for instance disk devices that are being swamped.

Page 45: Cyber crimes and its security

Disable specific applications, for example, an e-mail system subjected to a SPAM attack.

Close down an entire system, and divert processing to an alternative or backup service on a secondary network.

Page 46: Cyber crimes and its security

conclusion• Within the law enforcement agencies, a set of

rules must be developed to address the various categories of computer crime.

• As such, investigators will know what and which materials to search and seize, the electronic evidence to recover, and the chain of custody to maintain.

Page 47: Cyber crimes and its security