Top Banner
CYBER CRIME 1
15

Cyber Crime

Dec 22, 2015

Download

Documents

PraveenBorawat

ppt on latest cyber crime investigation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber Crime

1

CYBER CRIME

Page 2: Cyber Crime

2

CONTENTS :-

Introduction Definition Categories of cyber crime Role of computer in crime Cyber criminals Prevention IT act 2000 IT act 2008 Conclusion

Page 3: Cyber Crime

3

DEFINITION

It’s an unlawful act in which the computer is either a tool or a target or both.

Acts that are punishable by the Information Technology Act.

Cybercrime is an illegal act is committed using a computer network.

Cyber space is a virtual space that has become as important as real space for business, politics, and communities

Page 4: Cyber Crime

4

CATEGORIES OF CYBER CRIME

Cyber crimes against persons

Cyber crimes against property

Cyber crimes against government

Page 5: Cyber Crime

5

CYBER LAWS DEALS WITH

Cyber Crimes

Electronic or Digital Signatures

Intellectual Property

Data Protection and Privacy

Page 6: Cyber Crime

6

CYBER ATTACKS STATISTICS

Page 7: Cyber Crime

7

ROLE OF COMPUTER IN CRIME

COMPUTER AS TARGET

COMPUTER AS TOOL

COMPUTER AS APPLIANCE

Page 8: Cyber Crime

8

CYBER CRIMINALS

Insider Threats(employees)

Hackers(teenage thrill-seekers

to sophisticated criminals)

Hactivists (overloads e-mail

servers or hack websites to send

political message)

Virus Writers(writes viruses to that

infect systems)

Criminal Groups(attack systems & steal password for financial

gain)

Sensitive Intrusions

(sensitive information is obtained via computer

intrusions) Information

Warfare(alternative to military

attacks)

Terrorists(who have potential to

disrupt government systems with computer

attacks)

Cyber Warfare(attack by sovereigns --- Crime or Declaration of

war)

Page 9: Cyber Crime

9

TYPES OF CYBER ATTACKS

1) Viruses 9) Theft

2) Worms 10) Piracy

3) Trojans 11) Break ins

4) Mail bombs 12) Terrorism

5) Threats

6) Harassment

7) DOS

8) Fraud

Page 10: Cyber Crime

10

PREVENTION

Use strong password. Secure your computer

i. Activate your firewall

ii. Use anti-virus

iii. Block software attacks

Secure your mobile devices. Install latest OS. Secure wireless network. Protect your e-identity.

Page 11: Cyber Crime

11

CASE STUDY The Citadel network – a cybercrime ring responsible for stealing

more than $500 million from consumer and business bank account.

It infected more than 5 million PCs located in 90 countries , including the united states , Australia , Hong Kong , India and large part of Western Europe.

Bank affected by the group’s activities included American Express , Bank Of America , HSBC , Wells Fargo , Paypal and Royal Bank Of Canada.

According to Microsoft, the gang behind the Citadel botnets infected PCs in part by selling pirated versions of the Windows XP operating system that they'd pre-infected with the malware.

Page 12: Cyber Crime

12

CASE STUDY

Citadel blocked victims' access to many legitimate anti-virus/anti-malware sites, making it so people may not have been able to easily remove this threat from their computer.

Microsoft and FBI joint operation, they took down over 1,000 Citadel botnets that were being used to control millions of malware-infected PCs.

This Citadel botnet takedown was part of a larger effort , coordinated by the National Cyber Investigative Joint Task Force (NCIJTF) , which is targeting botnet creators and distributors.

Page 13: Cyber Crime

13

IT ACT 2000

The Information Technology Act, 2000 (IT Act), came into force on 17 October

2000.

The primary purpose of the Act is to provide legal recognition to electronic

commerce and to facilitate filing of electronic records with the Government.

Information Technology Act 2000 consisted of 94 sections segregated into 13

chapters.

Page 14: Cyber Crime

14

IT ACT AMENDMENT 2008 ITA-2008, is a new version of IT Act 2000, has been passed by the parliament on

23rd December 2008. It received the assent of President of India on 5th February, 2009.

Provides additional focus on Information Security.

Added several new sections on offences including Cyber Terrorism and Data Protection.

124 sections and 14 chapters.

Page 15: Cyber Crime

15

CONCLUSION

India needs a good combination of laws and technology, in harmony with the laws of other countries and keeping in mind common security standards.