Top Banner
CYBER CRIME EVOLUTION OF CRIME FROM BULLETS TO BOOLEAN Prepared By Aritra Ranjan Das, Aparna Roy, Anwesha Paul, Arijit Mukherjee and Arghaneel Bhaumik
21
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber Crime

CYBER CRIMEEVOLUTION OF CRIME FROM BULLETS TO BOOLEAN

Prepared By Aritra Ranjan Das, Aparna Roy, Anwesha Paul, Arijit Mukherjee and Arghaneel Bhaumik

Page 2: Cyber Crime

CONTENTS Modern day Crime-organized crime syndicate

Definition & First Occurrence of cyber crime

Categories of Cyber Crime

Weapons of Cyber Crime

Cyber Crimes Against Persons

Cyber Crimes Against Property

Cyber Crimes Against Government

Cyber Crimes Against Society Cyber Crimes in India

Cyber Security

Safety tips to avoid Cyber Crime

Concluding remarks

Page 3: Cyber Crime

MODERN DAY CRIMES- TRANSNATIONAL CRIME SYNDICATES

What Is organized Crime?Network of criminals working across the borders to synchronize criminal

activities such as extortion, drug trafficking, Human Trafficking, Smuggling, cybercrime, etc.

THE RUSSIAN MAFIA - Solntsevskaya Bravta , The brothers Circle, The Odessa Mafia.

THE ITALIAN MAFIA - Cosa Nostra(Sicily), La Stidda, Camorra (Naples). THE TRIADS (China)- Dai Huen Jai, 14 K (Hong Kong)THE YAKUZA (Japan)- Yamaguchi Gumi, Sumiyoshi Kai, Inagawa Kai.

According to FBI Transnational Organized criminal Syndicates are venturing into the world of cyber crime diverting their attention from the traditional methods. They are hiring top class hackers from all over the globe. The interpol suggests that the Russian Mafia are one of the pioneers of the international Cyber crime industry. Their strength and influence has lead to rise in terror throughout the cyber world.

Page 4: Cyber Crime

DEFINITION OF CYBER CRIME

• Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs

• It’s an unlawful act wherein the computer is either a tool or a target or both.

FIRST OCCURENCE OF CYBER CRIME

The first spam email took place in 1978 when it was sent out over the Arpanet (Advanced Research Projects Agency Network).The first virus was installed on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the Elk cloner.

Page 5: Cyber Crime

CATEGORIES OF CYBER CRIME

• Cyber crimes against persons.

• Cyber crimes against property.

• Cyber crimes against government.

• Cyber crimes against society.

Page 6: Cyber Crime

WEAPONS OF CYBER CRIME

• Hacking:Unauthorized access to any computer systems or networks is known as ‘HACKING’. That is accessing the information of others without proper authorization.

• Data diddling: This is altering raw data just before a computer processes it and then changing it back after the processing is completed.

• Denial of Service attack:The computer is flooded with more requests than it can handle which cause it to crash. Distributed Denial of Service (DDOS) attack is a example.

Page 7: Cyber Crime

WEAPONS OF CYBER CRIME (CONTINUED….)

• Email bombing:It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing.

• Trojan attacks: This term has its origin in the word ‘Trojan horse’. In software field this means an unauthorized program, which passively gains control over another’s computer by representing itself as an authorized program. The most common form of installing a Trojan is through e-mail.

• Web jacking: This term is derived from the term hi jacking. In these

kinds of offences the hacker gains access and control over the website of another. He may even manipulate or change the information of the website. This may be done for fulfilling political objectives or for money.

Page 8: Cyber Crime

WEAPONS OF CYBER CRIME (CONTINUED….)• Virus/ Worm Attacks:

Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on the computer’s memory.

• Salami attacks: This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed.

Page 9: Cyber Crime

WEAPONS OF CYBER CRIME (CONTINUED….)

• Phishing:Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason. The fraudster then has access to the customer’s online bank account and to the funds contained in that account.

• Spamming:Electronic spamming is the use of electronic messaging systems to send unsolicited bulk messages (spam), especially advertising, indiscriminately. The most widely recognized form of spam is e-mail spam.

• Cyber Stalking:Cyber stalking is the use of the internet or other electronic means to stalk someone. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly.

Page 10: Cyber Crime

CYBER CRIMES AGAINST PERSONS

Harassment via E-MailsHacking E-Mail / SMS SpoofingCardingAssault by Threat

Page 11: Cyber Crime

CYBER CRIMES AGAINST PROPERTY Intellectual Property CrimesCyber SquattingCyber VandalismTransmitting VirusInternet Time Thefts

Page 12: Cyber Crime

CYBER CRIMES AGAINST GOVERNMENTCyber Terrorism:

Cyber Terrorism is a phrase used to describe the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.

Examples of Cyber Terrorism:• Hacking into computer systems.• Introducing viruses to vulnerable networks.• Website Defacing.• Denial-of-Service(DoS) attacks.• Terroristic threats made via e-mail.

Page 13: Cyber Crime

AN INSTANCE OF CYBER TERRORISM

Ahmedabad Bomb Blast(26-07-08)

o A mail with id alarbi_gujrat@ yahoo.com was being sent by a group of Terrorists.

o Person named Kenneth Haywood’s unsecured WIFI router in his house was being misused by terrorists.

o 3 more mails were sent after the blast with the same misuse of unsecured WIFI routers.

Page 14: Cyber Crime

CYBER CRIMES AGAINST SOCIETY

Pornography

Cyber Trafficking

Online Gambling

Forgery

Page 15: Cyber Crime

CYBER CRIME IN INDIA:

Page 16: Cyber Crime

WHY INDIA?• A rapidly growing online user base:

• India has bypassed Japan to become the world’s third largest Internet user after China and the United States

• Its users are significantly younger than those of other emerging economies.

• India now has nearly 74 million Active Internet users, a 31 per cent increase over March 2012, the report says

• 46+ Million Social Network Users

• 50 Million users shop online on Ecommerce and Online Shopping Sites

• The Telecom Regulatory Authority of India (TRAI) pegged the number of Internet subscribers in India at 164.81 million as of March 31, 2013, with seven out of eight accessing the Internet from their mobile phones.

Page 17: Cyber Crime

CYBER CRIMES IN INDIA• The majority of cybercrimes are centered on forgery, fraud

and Phishing.

• India is the third-most targeted country for Phishing attacks after the US and the UK.

• Social networks as well as ecommerce sites are major targets.

• 6.9 million bot-infected systems in 2013.

• 14,348 websites defacements in 2013.

• 15,000 sites hacked in 2013.

• India is number 1 country in the world for generating spams.

• 29.9 million people fell victim to cyber crime.

• 17% of adults online have experienced cybercrime on their mobile phone.

Source: Norton Cybercrime Report 2013

Page 18: Cyber Crime

CYBER SECURITYDEFINATION :Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks.

LEGISLATIVE ACTION AGAINST CYBER CRIME:• The Information Technology Act 2000 was passed and

enforced on 17th May 2000.• OBJECTIVE: To legalise e-commerce and further amend

the Indian Penal Code 1860, the Indian Evidence Act 1872, the Banker’s Book Evidence Act 1891 and the Reserve Bank of India Act 1934.

• The Government of India has brought major amendments to ITA-2000 in form of the Information Technology Amendment Act, 2008.

Page 19: Cyber Crime

SAFETY TIPS TO AVOID CYBERCRIME• Use antivirus software and firewalls –keep them up to

date.

• Keep your operating systems up to date with critical security updates and patches.

• Don’t open emails or attachments from unknown sources.

• Read Privacy policy carefully when you submit the data through internet.

• Disable Remote Connectivity.

• Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist.

• Back-up your computer data on disks or CDs often.

5P mantra for online securityPrecautionPreventionProtectionPreservation Perseverance

Page 20: Cyber Crime

CONCLUDING REMARKS

• Cybercrime is indeed getting the recognition it deserves.

• However, it is not going to restricted that easily.

• In fact, it is highly likely that cybercrime and its hackers will continue developing and upgrading to stay ahead of the law.

• So, to make us a safer we must need cyber security.

Page 21: Cyber Crime

Thank You