Top Banner
SEMINAR ON IT_ACTS
32
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cybercrime

SEMINAR ON IT_ACTS

Page 2: Cybercrime

IntroductionHistory of cyber crimeWhat is cyber crime?ClassificationTypes of cyber crimeCyber criminalsPreventionConclusion

CONTENT

Page 3: Cybercrime

INRTODUCTION Cyber crime is an “unlawful acts wherein the computer is either a tool or target or both”

The term “cyber crime” was first coined by Barry Collins in 1980’s.

Criminals simply devise different ways to undertake standard criminal activities such as fraud theft, blackmail, forgery using the new medium, often involving the Internet.

Page 4: Cybercrime

HISTORY OF CYBER CRIME

The first recorded cyber crime took place in the year 1820!

The first spam email took place in 1978 when it was sent out over the Arpanet. The first virus was installed on an Apple computer in 1982.

Denial of Service (DoS) attacks by ‘Mafia Boy’ on eBay, Yahoo! and other popular sites (2000) FBI's e-mail system is hacked (Feb,2005)

Page 5: Cybercrime

WHAT IS CYBER CRIME ?

“Cybercrime is criminal activity done using computers and the Internet.”

Criminal activity involving-

Information technology infrastructure Illegal access Data interference Misuse of devices Forgery and Electronic fraud.

Page 6: Cybercrime

CLASSIFICATION OF CYBER CRIME

Against Individuals

Against Organization

Against Society

Page 7: Cybercrime

AGAINST INDIVIDUALS

Harassment via e-mails

Defamation. Unauthorized control/access over computer system

Email spoofing

Cheating & Fraud

Phishing

Page 8: Cybercrime

Unauthorized control/access over computer system.

Possession of unauthorized information.

Cyber terrorism against the government organization.

Distribution of pirated software etc.

AGAINST ORGANIZATION

Page 9: Cybercrime

AGAINST SOCIETY

Polluting the youth through indecent exposure. Trafficking Financial crimes Sale of illegal articles Online gambling Forgery

Page 10: Cybercrime

TYPES OF CYBER CRIME

Hacking Phishing Cyber Stalking Denial of service

attack Virus Dissemination Computer Vandalism Cyber Terrorism Software Piracy Email spoofing Trojan attacks

Page 11: Cybercrime
Page 12: Cybercrime

HACKING

Hacking in simple terms means an illegal intrusion into a computer system and/or network .Also called as cracking!

Hacking means finding out weaknesses in an established system and exploiting them. A computer hacker is a person who finds out weaknesses in the computer and exploits it.

Page 13: Cybercrime

WHY DO HACKERS ATTACK?

For profit, protest, or challenge. A large fraction of hacker attacks have

been pranks Financial Gain Revenge Venting anger at a company or

organization Terrorism

Page 14: Cybercrime
Page 15: Cybercrime

A deception designed to steal valuable personal data, such as credit card numbers, passwords, account data, or other information.

In order for Internet criminals to successfully “phish” a personal information, they must go from an email to a website.

Page 16: Cybercrime

It is the use of the Internet or other electronic means to stalk someone. This term is used interchangeably with online harassment and online abuse.

Page 17: Cybercrime

DENIAL OF SERVICE ATTACK

Attack through which a person can render a system unusable or significantly slow down the system for legitimate users by overloading the system so that no one else can use it.

Act by the criminal, who floods the bandwidth of the victims network.

Page 18: Cybercrime

VIRUS DISSEMINATION

Malicious software that attaches itself to other software. (virus, worms, Trojan Horse etc.)

Page 19: Cybercrime

COMPUTER VANDALISM

Damaging or destroying data rather than stealing.

Transmitting virus

Page 20: Cybercrime

CYBER TERRORISM

Use of Internet based attacks in terrorist activities.

Technology savvy terrorists are using 512-bit encryption, which is impossible to decrypt.

Page 21: Cybercrime

SOFTWARE PIRACY

Theft of software through the illegal copying of genuine programs.

Distribution of products intended to pass for the original.

Page 22: Cybercrime

EMAIL SPOOFING

A spoofed email is one that appears to originate from one source but actually has been sent from another source.

Page 23: Cybercrime

TROJAN ATTACK

The program that act like something useful but do the things that are quiet damping. The programs of this kind are called as Trojans.

Page 24: Cybercrime

Insider Threats (employees)

Hackers (teenage thrill-seekers to sophisticated criminals)

Hactivists' (overloads e-mail servers or

hack web sites to send political message)

Virus writers (writes viruses to that

infect systems)

Criminal groups

(attack systems & steal password for financial gain)

Sensitive intrusions

(sensitive information is obtained via computer

intrusions)

Information warfare

(alternative to military attacks)

Terrorists (who have potential to

disrupt government systems with computer

attacks)

Cyber Warfare (attack by sovereigns ---

Crime or Declaration of war)

CYBER CRIMINALS

Page 25: Cybercrime

CYBER ATTACKS STATISTICS(2013)

Page 26: Cybercrime

The majority of cybercrimes are centered on fraud and Phishing, India is the third-most targeted country for Phishing attacks after

the US and the UK, Social networks as well as ecommerce sites are major targets, 6.9 million bot-infected systems in 2010, 14,348 website defacements in 2010, 6,850 .in and 4,150 .com domains were defaced during 2011, 15,000 sites hacked in 2011, India is the number 1 country in the world for generating spam.

Cyber Crime In India

Page 27: Cybercrime

PREVENTION Anti-virus software

Firewalls.

Safe surfing.

Frequent virus checks.

Email filters.

Frequent password changing.

Page 28: Cybercrime
Page 29: Cybercrime
Page 30: Cybercrime

History is the witness that no legislation has succeeded in totally eliminating crime.

We need to bring changes in the Information Technology Act to make it more effective to combat cyber crime.

User awareness is key to a secure computer/network Do not open suspicious files/emails Avoid using P2P programs Avoid downloading freeware

Page 31: Cybercrime
Page 32: Cybercrime