cyber terr 2

50
 Cyber Terrorism September 11th 2001 The attack s on World Trade Center’s Twin Towers .

Upload: santu15038847420

Post on 07-Aug-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 1/50

 

Cyber Terrorism

• September 11th2001

• The attacks on

World TradeCenter’s TwinTowers .

Page 2: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 2/50

 

PAY ATTENTION, I’M ONLY DOING IT ONCE

Page 3: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 3/50

 

YB! "#W

$#% &'!'(W)

Page 4: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 4/50

 

Cyber "aw

  Cyber law refers to all the legal andregulatory aspects of Internet and WorldWide Web.

  Any activities in the cyber space which are

  or may turn into a legal issue come within  the purview of the cyber law.

Page 5: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 5/50

 

Cyber crime

Page 6: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 6/50

 

Page 7: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 7/50 

“Cyber Attacks." 

•  “computer-supported crime”

•  Any illegal behavior directed by means of electronicoperations that targets the security of computer

systems and the data processed by them.

CY! C#$!  %

  “ unla&ful acts &herein the computer is either a tool or

a target or both”.

 

Page 8: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 8/50 

(T#"Y

  Arrest of hackers whocompromised homepages of the press

including manufacturers...

Page 9: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 9/50 

SY*%Y+#,ST!#"(#

  A suspect who hacked University

  Hospital‘s medical data was

arrested.

Page 10: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 10/50 

-&!#

  Member of International Hacker Clan!H" and part of the U.# army in $orea

arrested.

Page 11: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 11/50 

(ndia contd..

• alwares/ # "oomin threat toobile hones withot anti 3irs

so4tware.• (ntrodction o4 a bill that amends

the e5istin laws o4 The re3entiono4 oney "anderin #ct 2002.

• School 6olidays spell an (ncrease inWeb 6ackin as smart kids take tocrime.

Page 12: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 12/50 

INDIA

phasis B7"+ ne 8 Secritybreach

Citibank’s Cstomers in the ,S 4ondthat their acconts were tampered withand a sm totalin to ,S9 :;0+000 wastrans4erred to Bank acconts in andarond ne by a 4ew o4 the 4irm’semployees.

Page 13: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 13/50 

Types o4 cyber

crime<• Sale o4 illeal articles.

• (ntellectal ropertycrimes.

• Cyber *e4amation.

• Cyber stalkin.

• *ata diddlin.

• =mail related crimes.

• *enial o4 Ser3ice attack.

• 'irs > Worm attacks.

• "oic bombs.• Tro?an attacks.

• The4t o4 comptersystem.

• 7inancial crimes.

• Cyber pornoraphy.• 6ackin.

• iracy.

Page 14: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 14/50 

Sale of illegal articles

'ale of narcotics( &eapons and )rotected * !ndangered+ildlife etc 

edim/

• &ebsites( auction &ebsites( and bulletin boards

  or by email communication. 

- A website selling cocaine in the name of

‘'honey’ is being prosecuted in Thailand.

Page 15: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 15/50 

Intellectual Property crimes

• 'oft&are piracy(

• Copyright

infringement(

• ,rademarks violations(

• ,heft of computersource code etc.

Page 16: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 16/50 

yber !efamation

• efamation taking place &ith the help of computers

and * or the #nternet.

  5/ blishin o4 de4amatory matter about

someone on a &ebsite or sending e-mails containing

defamatory information to people..

 

Page 17: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 17/50 

yber stal"ing•  stalking - "pursuing stealthily".

#nvolves• /ollo&ing a person0s movements across the #nternet by

posting messages 1sometimes threatening2 on the bulletinboards fre3uented by the victim.

• !ntering the chat-rooms fre3uented by the victim.• Constantly bombarding the victim &ith emails etc.

- #ollywood actress #alle $erry was

 until recently being cyber stal"ed.

Page 18: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 18/50 

Data diddling

• A kind of an attack which involves altering raw data

 just before it is processed by a computer and then

changing it back after the processing is completed.ex: The Electricity Board in India have been a victim to data

diddling programs inserted when private parties were computerizingtheir systems.

- merican wireless company T !T su"ered

a blow o# thousands o# $$ due data diddling.

Page 19: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 19/50 

=mail related crimes

mail bombin/

sendin lare nmber o4 emails to a person

or company or an email ser3ice pro3iderresltin in the email accont or mail ser3ercrash. 

mail spoo4in /• Sendin malicios codes throh email.

• Sendin threatenin emails

Page 20: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 20/50 

*enial o4 Ser3ice attack/

7loodin a web ser3er with morere@ests than it can handle+ and

crashin it. This denies athoriAedsers the ser3ice o44ered by theresorce.

Page 21: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 21/50

 

'irs > wormattacks/ 

'irses/

#44ect the data on a compter+ either byalterin or deletin it.

Worms/  

erely make 4nctional copies o4themsel3es and do this repeatedly tillthey eat p all the a3ailable space on acompters memory.

Page 22: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 22/50

 

• "oic bombs

  3ent dependent prorams i.e. these proramsare created to do somethin only when acertain e3ent occrs.

• Tro?an attacks

,nathoriAed proram which 4nctions 4rom

inside like an athoriAed proram+ therebyconcealin its actions.

Page 23: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 23/50

 

• The4t o4 compter system

Casin physical damae to a compter or

its peripherals.

• 7inancial crimes

This incldes cheatin+ credit card 4rads.

.. #lphonso manoes Case

Page 24: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 24/50

 

Cyber pornoraphy/• #ir 7orce Balbharati School case

• Swiss cople 4ilmin slm children+ inmbai

Salami attacks

,sed 4or 4inancial crimes. The key here is tomake the alteration so insini4icant that in asinle case it wold o completely nnoticed.

 

Page 25: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 25/50

 

We both tried to hack the same bankaccont+*deD

Page 26: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 26/50

 

6acki

n

“nauthori!ed access"  to computer

systems or net&orks( means any person&ho secures access or attempts to secure

access to a protected system.

Page 27: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 27/50

 

6ackin<

• 6acker / # hacker is someone who breaks intocompters sometimes to read pri3ate e=mails andother 4iles.

• 6ackers delete or alter 4iles.

• 6ackers (n?re &ther Compter ,sers by destroyin

(n4ormation Systems.• 6ackers steal telephone and compter time and

share nathoriAed access codes and passwords.

Page 28: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 28/50

 

Think be4ore yo hack/

• 6ackin is an o44ence nder section FF o4the (T #ct. 6ackin attracts seriospenalties which inclde a ?ail term o4 :years+ a 4ine o4 !s. 2 "akh or both.

Page 29: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 29/50

 

%&I'E T(T ))E%T* &E+,E,+ED %*T* &E+ /B*.

Page 30: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 30/50

 

Page 31: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 31/50

 

Did u 0now 1

% More than $12,000,000,000 is lost due to piracy each year.

% 40% of all software used is pirated.

% In the .!. alone, one out of four pieces of software is pirated.

% !oftware theft ro"s the .!. econo#y of #ore than11,000 o"s, $&.' "illion in wa(es and #ore than$1.& "illion in ta) re*enue each year.

Page 32: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 32/50

 

The (ndian

scenario..

Page 33: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 33/50

 

There is a lot at stake..

Page 34: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 34/50

 

Cyber 4rad<.

Page 35: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 35/50

 

• Credit card fraud.• 4ictims include Citibank( American ank( 5nion ank( Askari

ank( the $uslim Commercial ank.• /orgery.• istance selling• 6nline auction frauds• “)hishing”( a form of deceit &here cyber-criminals build e7act

copies of &eb sites from kno&n and trusted companies.

%& American $an" of Te(as ).Awww.abtexasna.com 

and www.abtexasna.net

Page 36: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 36/50

 

enaltiesand #d?dications

Page 37: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 37/50

 

enalty 4or

damae tocompter+compter system+etc. $Sec G:) 

• #ccessin orsecrin access

• *ownload copy ore5tract data

• (ntrodcescomptercontaminant

Compensation/ 

The person who is

4o2nd 02ilty o4

contra3enin0 this

section is liable topay dama0es by

way o4

compensation not

e5ceedin0 one

crore r2pees to the

person a44ected.

Page 38: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 38/50

 

enalty 4or 4ailre to4rnish in4ormation+

retrn+ etc. $Sec GG) • 7ailin to 4rnish any

docment or reportor retrn to thecontrollinathorities

• 7rnish or 4ile anyin4ormation withinthe speci4ied time

• aintain books o4acconts or records

Compensation/ 

1ay penalty 2p toone lakh and 4i4ty

tho2sand r2pees 4or

each s2ch 4ail2re.

"iable to a penalty

not e5ceedin0 4i3e

tho2sand r2pees 4or

e3eryday d2rin0

which s2ch 4ail2re

contin2es

Page 39: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 39/50

 

!esidary penalty

$Sec G;) 

• Whoe3ercontra3enes anyrles or relationsmade nder this#ct+ 4or the

contra3ention.

Compensation 

1enalty o4 an

amo2nt not

e5ceedin0

twenty=4i3e

tho2sand r2pees. 

Page 40: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 40/50

 

&W! T& #*H,*(C#T$Sec

GF) 

• #ppointed by the central Io3ernment.

• To hold an en@iry as per the mannerprescribed by the Central Io3ernment.

• #ll proceedins be4ore it shall be deemed

to be ?dicial proceedins.

• *eemed to be a Ci3il Cort.

Page 41: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 41/50

 

7actors to be taken intoaccont by the ad?dicatin

o44icer..$Sec GJ) 

  The @antm o4 compensation is decided withreard to..

• The amont o4 ain o4 n4air ad3antae+where3er @anti4iable+ made as a reslt o4 thede4alt.

• The amont o4 loss cased to any person as areslt o4 the de4alt.

• The repetiti3e natre o4 the de4alt.

Page 42: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 42/50

 

Cyber olice

Page 43: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 43/50

 

7#CTS<

• (ndia’s 4irst e5clsi3e cyber crimes policestation.

• # Cyber Crime Cell was started at Corps o4*etecti3es = 6ead Karters+ Banalore todeal with Cyber Crime with Io3ernment%oti4ication in 1LLL.

• The Cyber Crime Cell was declared as CyberCrime olice Station in 2001 as perIo3ernment %oti4ication.

Page 44: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 44/50

 

CYB! &"(C = (%*(#

Cyber Crime olice Stationhas reistered only :M cases4rom September 2001 to%o3ember 200G.!eistered crimes inclde/• Tamperin o4 sorce code$:)• 6ackin $2:)• &bscene e=mails $10)• Copy !iht #ct 1L;J $2)

ost o4 the complaints are4rom Banalore.

Page 45: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 45/50

 

!e4erenceswww.cybercrime.planetindia.com

www.Glaw.co.il

www.bookdi00er.com

• www.crimeresearch.or0

www.cyber02ard.or0

lectronic crimes in the news.com

• T7 WBS(T

• www.4bi.0o3

• news.bbc.co.2k

• 1layitc2bersa4e.com

• www.cyberpoliceban0alore.nic.in

• www.deccanherald.com

• www.wipo.int

• www. cyberlawindia.com

• ana0ement (n4ormation Systems 8Hames # &’Brien

Page 46: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 46/50

 

Page 47: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 47/50

 

T6#%- Y&,

 

Page 48: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 48/50

 

Cyber "aw and (S

6eihtened concerns abot cyberterrorism and the increasin need to openinternal networks to otside access are

pshin corporations to bolster networkand data center secrity

• *e4endin aainst 6acker attacks and

'irs #ttacks.• T' %etworks=n4orcer 

• 7irst CitiAens Banks=ntercept

Page 49: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 49/50

 

• (ntellectal roperty !ihts.

• roportionality o4 Iood and Bad.

• (n4ormed Consent o4 those those a44ected.• inimiAed !isk and nsred Hstice.

• mployee !esponsibility.

• Cost sa3in=manpower and time.

• lectronic 4ilin o4 records and the retention o4

in4ormation in electronic 4ormat+ will help insa3in costs+ time and manpower 4or theCorporate.

Cyber #aws and $I%

Page 50: Cyber Terr 2

8/21/2019 Cyber Terr 2

http://slidepdf.com/reader/full/cyber-terr-2 50/50

&!..

• Cstomer ri3acy and mployee

ri3acy.

• Spplementin traditional network

protection with newer intrsionmonitors+access control tools andtoher (T sae policies