Cyber Crime: Presented by
Cyber Crime: Presented by
Presented By:
Dolly Basantani 06
Pooja Madnani 48
Himani Molasi 58
Hitesh Mulchandani 60
What is Cyber Crime?
Bytes are fast replacing whizzing bullets
Cyber crime is an evil having its origin in the growing dependence on computers
in modern life.
Cybercrimes can be basically divided into 3 major categories:
Cyber space is safe to use & unsafe to misuse
• Transmission of child-pornography
• Harassment
Cyber terrorism
cracking government or military maintained website.
Who can be typically expected to indulge in a Cyber Crime?
The modern thief can steal more with a computer than with a gun.
• Insiders - Disgruntled employees and ex-employees, spouses, lovers
•Computer worm
A computer worm is a self-replicating computer program.
•Trojan Horse
A Trojan horse, is a term used to describe malware that appears, to
the user, to perform a desirable function but, in fact, facilitates
unauthorized access to the user's computer system.
Salami Attacks
• Prevalent in financial institutions
• Amount involved is small
• Eg: Intruder siphons off small amounts (a few rupees/paise)
from every account in the bank and transfers it where he can
access it.
Cyber Defamation
• Any derogatory statement, which is designed to injure a
person's business or reputation, constitutes cyber defamation.
Software Piracy
• Unauthorized copying of software for commercial and
personal use.
• Made costly software available for the common people
• Eg: pirated movie, songs,
Credit Card Fraud
• Theft or fraud committed using a credit card or any similar
payment mechanism
• Fake documents are used to create accounts in someone else’s
name
• Information is gathered about the
victim, a false complaint of the credit
being stolen is reported to the
concerned bank and the duplicate
card issued is misused.
Net Extortion
• A company’s confidential data is stolen in order to extort the
company for huge amounts
Are You A Safe Cyber Surfer?
Safety Measures
• Cyber Safety
• Email Safety
• Virus Warning
• Use of Firewall
How Corporates Can make their Business
Safe?
• Setup an e-security program for your business
• Ensure your security program facilitates
confidentiality, integrity and availability
• Establish a security awareness program for all
users.
• Implement security training for technical staff
• User accounts should not be shared
Why should one report on cyber crime?
• Importance of Cyber
law
Solution to growing problems of Cyber crime Information
Information
Technology Act
2000
Essence of the Act
Information Technology Act 2000 addressed the
following issues:
• Legal Recognition of
Electronic Documents.
• Legal Recognition of Digital
Signatures
• Offenses and Contraventions.
• Justice Dispensation System
for Cybercrimes.
Popular Real World Cases
Orkut Fake Profile Cases
Orkut.com is a very popular online community and social networking website
• Not all hackers are bad guys • A hacker found out how to
break into the automated
• Beale Screamer’s FreeMe ApplyYourself application
program allowed Windows system
Media users to strip digital- • Dozens of top business
rights-management security schools, including Harvard
from music and video files and Stanford, saw
applicants exploiting the
hack in order to track their
application statuses
Thank you