Top Banner
Welcome to the presentation On : CYBER CRIME
18
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber crime

Welcome to the presentation On :

CYBER CRIME

Page 2: Cyber crime

PRESENTED BY : SUBMITTED TO :

Sonia Grover Mr. Ravi AroraCS -1 CS Dept. VIIIth Sem

Page 3: Cyber crime

What is Cyber Crime ??

Page 4: Cyber crime

How come is it so ??

Increase in number of students in technical arena.

Students are ardent to know of these “easy stair to step up to , to get money “

More cases are of financial dais . It seems easy to cross the line of

morality and ethics in today’s era we are living in.

Page 5: Cyber crime

Lets retrograde to a survey :

Here in which India comes at 11th position .

US at 1st . China at 2nd .

Page 6: Cyber crime
Page 7: Cyber crime

Lets talk about the reason .. Why so ??

In India , 121 million users uses internet. 50 million users shop online E commerce

and shopping sites. 46 + millions are social network users. 346 millions have subscribed to data

packs among all the available networks .

Page 8: Cyber crime

 39 percent of financial services companies got had been hit by cybercrime

compared to 17 percent in other industries, according to the survey by consultancy PwC.

Some 45 percent of financial firms were victims of fraud last year, PwC's 2014 global economic crime survey showed.

The survey, based on responses from 1,330 companies in 79 countries, showed theft was responsible for the highest share of economic crime, followed by cybercrime.

Page 9: Cyber crime

Such crimes leads to financial losses .Do someone can imagine how much does it

costs ??

Page 10: Cyber crime

Here we have a legitimate way :

It is been proven by US corporations , Govt.

Agencies

Page 11: Cyber crime

Cost is in millions

Page 12: Cyber crime

MODES of committing crime :

Unauthorized Access Hacking Any act committed deliberately to break

the computer or network . Use ready-made programs Trojan Attack Program acts like something useful but

are damping.

Page 13: Cyber crime

Virus and worm Attack Infect other programs copies itself illegitimately , are viruses. Multiply like viruses but are spread from

pc to pc. Script Kiddies Gain “root “ access to pc .

Giving same power as an administrator over a system.

Page 14: Cyber crime

Email Spoofing Email appears to have been originated

from one source when it was actually sent from another.

Phishing scams and fraud Phisher uses spoof emails to direct the

user to fraudulent websites . To access sensitive information.

Page 15: Cyber crime

CASE STUDY

• E-bay is the one of the famous shopping site .

• Bhubneshwar : Rourkela busted a racket involving online fraud of Rs. 12.5 lakh.

• Two mca students , Debasis pandit and Rabi Narayan Sahu , were arrested.

• Pandit hacked e-bay site and gathered info of 700 credit holders.

• Fraud came to notice when several purchases were made from Rourkela , while customers

Page 16: Cyber crime

were from Bangalore , Delhi and some are from London .

Complaints have been lodged . Pandit used the address of Sahu for the

delivery of goods . The gang was involved in train, flight and

hotel reservation.

Page 17: Cyber crime

Recommendations

Public should be made aware of such crimes.

More campaigns should be organized. Training of officers to effectively combat

cyber crimes. Effective E- surveillance. Specialized training of forensic

investigators . Active coordination between police and

other law enforcement agencies and authorities is required .

Page 18: Cyber crime

THANK YOUBe Aware