0% found this document useful (0 votes)
235 views41 pages

Cyber Crime: Presented by

Cyber crime refers to criminal activity involving computers and the internet. The document discusses several types of cyber crimes including hacking, cyber stalking, child pornography, denial of service attacks, phishing, viruses, trojan horses, salami attacks, cyber defamation, software piracy, and credit card fraud. It also discusses common cyber criminals, safety measures, how companies can protect themselves, why cyber crimes should be reported, and cyber ethics and law in India.

Uploaded by

Sharath
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
235 views41 pages

Cyber Crime: Presented by

Cyber crime refers to criminal activity involving computers and the internet. The document discusses several types of cyber crimes including hacking, cyber stalking, child pornography, denial of service attacks, phishing, viruses, trojan horses, salami attacks, cyber defamation, software piracy, and credit card fraud. It also discusses common cyber criminals, safety measures, how companies can protect themselves, why cyber crimes should be reported, and cyber ethics and law in India.

Uploaded by

Sharath
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 41

CYBER CRIME

Invisible criminal is dangerous than Visible

Presented By:
Dolly Basantani 06
Pooja Madnani 48
Himani Molasi 58
Hitesh Mulchandani 60
What is Cyber Crime?
Bytes are fast replacing whizzing bullets

Cybercrime generally refers to criminal (illegal) activity; where a computer or


internet is the target of a crime .

Cyber crime is an evil having its origin in the growing dependence on computers
in modern life.
Cybercrimes can be basically divided into 3 major categories:
Cyber space is safe to use & unsafe to misuse

Cyber crime committed against:

Persons Property Government


Cybercrimes committed against persons:
Examples:

• Transmission of child-pornography
• Harassment

Cybercrimes against all forms of property:


Examples:

• Transmission of Harmful Programs


• Stealing database

Cyber Crimes against Government:


Examples:

Cyber terrorism
cracking government or military maintained website.
Who can be typically expected to indulge in a Cyber Crime?

The modern thief can steal more with a computer than with a gun.
• Insiders - Disgruntled employees and ex-employees, spouses, lovers

• Hackers - Crack into networks with malicious intent


• Virus Writer - Pose serious threats to networks and systems
worldwide

• Foreign Intelligence-Use cyber tools as part of their services


for espionage activities & can pose the biggest threat to the security of
another country
• Terrorists- Use to formulate plans, to raise funds, propaganda.
Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb.
TYPES OF CYBERCRIME
HACKING
• Hacking in simple terms means an illegal intrusion into a
computer system and/or network.
CYBER STALKING
• Cyber Stalking can be defined as the repeated acts of
harassment or threatening behavior of the cyber criminal
towards the victim by using internet services
CHILD PORNOGRAPHY

Child Pornography refers to images or films depicting


sexually explicit activities involving a child as such, child
pornography is a visual record of child sexual abuse
DENIAL OF SERVICE

• A DOS attack is an attempt to make computer resource


unavailable to the user.
Phishing
• Criminally fraudulent process of
attempting to acquire sensitive
information such as usernames,
passwords, credit card details while
posing as a trustworthy entity in an
electronic communication.
• Eg: ICICI bank case
•VIRUS
A computer virus is a computer program that can copy itself and
infect a computer without the permission or knowledge of the owner

•Computer worm
A computer worm is a self-replicating computer program.

•Trojan Horse
A Trojan horse, is a term used to describe malware that appears, to
the user, to perform a desirable function but, in fact, facilitates
unauthorized access to the user's computer system.
Salami Attacks
• Prevalent in financial institutions
• Amount involved is small
• Eg: Intruder siphons off small amounts (a few rupees/paise)
from every account in the bank and transfers it where he can
access it.
Cyber Defamation
• Any derogatory statement, which is designed to injure a
person's business or reputation, constitutes cyber defamation.
Software Piracy
• Unauthorized copying of software for commercial and
personal use.
• Made costly software available for the common people
• Eg: pirated movie, songs,
Credit Card Fraud
• Theft or fraud committed using a credit card or any similar
payment mechanism
• Fake documents are used to create accounts in someone else’s
name
• Information is gathered about the
victim, a false complaint of the credit
being stolen is reported to the
concerned bank and the duplicate
card issued is misused.
Net Extortion
• A company’s confidential data is stolen in order to extort the
company for huge amounts
Are You A Safe Cyber Surfer?
Safety Measures
• Cyber Safety

• Email Safety

• Virus Warning

• Use of Firewall
How Corporates Can make their Business
Safe?
• Setup an e-security program for your business
• Ensure your security program facilitates
confidentiality, integrity and availability
• Establish a security awareness program for all
users.
• Implement security training for technical staff
• User accounts should not be shared
Why should one report on cyber crime?

• An unreported crime emboldens the criminal


to commit further such acts.
• early detection of the crime is a must.
• reporting also helps policy makers to know of
the trends and allocate resources to
adequately tackle newer crimes.
• Cyber Ethics is a broad philosophical
concept that goes beyond simple right and
wrong, and looks towards "the good life"
• Encapsulates the legal issues related to use of
communicative, transactional, and distributive
aspects of networked information devices and
technologies.
• Why Cyber law in
India?

• Importance of Cyber
law
Solution to growing problems of Cyber crime Information

Information
Technology Act
2000
Essence of the Act
Information Technology Act 2000 addressed the
following issues:
• Legal Recognition of
Electronic Documents.
• Legal Recognition of Digital
Signatures
• Offenses and Contraventions.
• Justice Dispensation System
for Cybercrimes.
Popular Real World Cases
Orkut Fake Profile Cases
Orkut.com is a very popular online community and social networking website

Scenarios: The Law: The Motive:


1. A fake profile of a 1. Section 67 of 1. Jealousy or
woman is created Information Revenge
2. An online hate Technology Act 2. Desire to cause
community is and section 509 of racial hatred
created the Indian Penal 3. Hatred
3. A fake profile of a Code
man is created 2. Section 153A and
153B of Indian
Penal Code
3. Section 500 of
Indian Penal Code
Source Code Theft
The most important Asset of Software Companies

What is Source Code??

Source code is the programming


instructions that are compiled into the
executable files that are sold by
software development companies
Source Code Theft
The most important Asset of Software Companies

Scenarios: The Law: The Motive:


1. The suspect steals 1. Sections 43, 65 Illegal
the source code and and 66 of the Financial Gain
sells it to a business Information
rival Technology Act,
2. The suspect steals section 63 of the
the source code and Copyright Act
uses it as a base to
make and sell his 2. Same as above
own version of the
software
Email Scams
Fast emerging as one of the most common methods of communication in the modern world

Scenarios: The Law: The Motive:


The suspect Section 420 of Illegal
convinces the Indian Penal Financial Gain
victim that the Code
victim is going to
get a lot of
money
Use of Internet and Computers by Terrorists
Many terrorists are using virtual as well as physical storage media for hiding information and
records of their illicit business. They also use emails and chat rooms to communicate with their
counterparts around the globe.
Scenarios: The Law: The Motive:
1. The suspects carry Terrorists are Keeping
laptops wherein terrorism related
information relating
covered by
to their activities is conventional information
stored in encrypted laws such as confidential.
and password
Indian Penal Secure
protected form
Code and special communication
2. They also create email
accounts using legislation amongst
fictitious details relating to terrorist group
terrorism members
Unsolved Mysteries

• The best criminal hacker is the one


that isn't caught—or even
identified
Ministry of Defense Satellite
The WANK Worm (October 1989) Hacked (February 1999)

• WANK (Worms Against • A small group of hackers


Nuclear Killers) traced to southern England
• The WANK worm hit NASA gained control of a MoD
offices in Greenbelt, Skynet military satellite
Maryland • This was characterized as
• Cleaning up after the crack “enemy attacks by
has been said to have cost disrupting military
NASA up to a half of a communications”
million dollars in time and
resources
CD Universe Credit Card Breach (January Military Source Code Stolen
2000) (December 2000)

• The posting of over 300,000 • A hacker broke into


credit card numbers by government-contracted
hacker Maxim on a Web site Exigent Software
entitled "The Maxus Credit Technology and nabbed
Card Pipeline“ two-thirds of the code for
• He/she then demanded Exigent's OS/COMET
$100,000 from the Web site software
in exchange for destroying • This code is responsible for
the data both missile and satellite
guidance
MBA Apply Yourself Application
Anti-DRM Hack (October 2001) System (March 2006)

• Not all hackers are bad guys • A hacker found out how to
break into the automated
• Beale Screamer’s FreeMe ApplyYourself application
program allowed Windows system
Media users to strip digital- • Dozens of top business
rights-management security schools, including Harvard
from music and video files and Stanford, saw
applicants exploiting the
hack in order to track their
application statuses
Thank you

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy