Top Banner
CYBERCRIME BY S.RAJASEKHAR(12BME0194) V.A.CHANDAN(12BEC0578)
29
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cybercrime

CYBERCRIME

BY

S.RAJASEKHAR(12BME0194)

V.A.CHANDAN(12BEC0578)

Page 2: Cybercrime

CONTENT

• INTRODUCTION• HISTORY OF CYBER CRIME• TYPES OF CYBER CRIME• CAUSES • CATEGORIES• CYBERCRIMES THREATENS NATIONAL SECURITY• CASE STUDY• LAWS FOLLOWED IN INDIA• EDUCATING ABOUT CYBERCRIME AND ITS USES• CONCLUSION

Page 3: Cybercrime

INTRODUCTION

CYBERCRIME

• Criminal activities carried out by means of computers or the Internet.

Page 4: Cybercrime

HISTORY OF CYBER CRIME

• When computers and networks came into being in the 1990s, hacking was done basically to get more information about the systems. Hackers even competed against one another to win the tag of the best hacker. As a result, many networks were affected; right from the military to commercial organizations.

Page 5: Cybercrime

• Initially, these hacking attempts were brushed off as mere nuisance as they did not pose a long-term threat. However, with malicious software becoming ubiquitous during the same period, hacking started making networks and systems slow. As hackers became more skillful, they started using their knowledge and expertise to gain benefit by exploiting and victimizing others.

Page 6: Cybercrime

TYPES OF CYBER CRIME

• Hacking

• Theft

• Cyber Stalking

• Identity Theft

• Malicious Software

• Child soliciting and Abuse

Page 7: Cybercrime

HACKING

• This is a type of crime where in a person’s computer is broken into so that his personal or sensitive information can be accessed. In the United States, hacking is classified as a felony and punishable as such. This is different from ethical hacking, which many organizations use to check their Internet security protection. In hacking, the criminal uses a variety of software to enter a person’s computer and the person may not be aware that his computer is being accessed from a remote location.

Page 8: Cybercrime

THEFT

• This crime occurs when a person violates copyrights and downloads music, movies, games and software. There are even peer sharing websites which encourage software piracy and many of these websites are now being targeted by the FBI. Today, the justice system is addressing this cyber crime and there are laws that prevent people from illegal downloading.

Page 9: Cybercrime

CYBER STALKING

• This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Typically, these stalkers know their victims and instead of resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not having the desired effect, they begin offline stalking along with cyber stalking to make the victims’ lives more miserable.

Page 10: Cybercrime

IDENTITY THEFT

• This has become a major problem with people using the Internet for cash transactions and banking services. In this cyber crime, a criminal accesses data about a person’s bank account, credit cards, Social Security, debit card and other sensitive information to siphon money or to buy things online in the victim’s name. It can result in major financial losses for the victim and even spoil the victim’s credit history.

Page 11: Cybercrime

MALICIOUS SOFTWARE

• These are Internet-based software or programs that are used to disrupt a network. The software is used to gain access to a system to steal sensitive information or data or causing damage to software present in the system.

Page 12: Cybercrime

CHILD SOLICITING AND ABUSE

• This is also a type of cyber crime wherein criminals solicit minors via chat rooms for the purpose of child pornography. The FBI has been spending a lot of time monitoring chat rooms frequented by children with the hopes of reducing and preventing child abuse and soliciting.

Page 13: Cybercrime

CAUSES OF CYBER CRIME

• Wherever the rate of return on investment is high and the risk is low, you are bound to find people willing to take advantage of the situation. This is exactly what happens in cyber crime. Accessing sensitive information and data and using it means a rich harvest of returns and catching such criminals is difficult. Hence, this has led to a rise in cyber crime across the world.

Page 14: Cybercrime

CATEGORIES

Cyber crimes are broadly categorized into three categories, namely crime against

• Individual

• Property

• Government

Each category can use a variety of methods and the methods used vary from one criminal to another.

Page 15: Cybercrime

INDIVIDUAL

• This type of cyber crime can be in the form of cyber stalking, distributing pornography, trafficking and “grooming”. Today, law enforcement agencies are taking this category of cyber crime very seriously and are joining forces internationally to reach and arrest the perpetrators.

Page 16: Cybercrime

PROPERTY• Just like in the real world where a criminal can

steal and rob, even in the cyber world criminals resort to stealing and robbing. In this case, they can steal a person’s bank details and misuse the credit card to make numerous purchases online; use malicious software to gain access to an organization’s website or disrupt the systems of the organization. The malicious software can also damage software and hardware

Page 17: Cybercrime

GOVERNMENT

• Although not as common as the other two categories, crimes against a government are referred to as cyber terrorism. If successful, this category can wreak havoc and cause panic amongst the civilian population. In this category, criminals hack government websites, military websites or circulate propaganda. The perpetrators can be terrorist outfits or unfriendly governments of other nations.

Page 18: Cybercrime

NATIONAL SECURITY

Page 19: Cybercrime

• Cyber crimes are on the rise in India. In fact, India ranks eleventh among countries most affected by rising cyber crime, reveals a survey conducted by Security and Defense Agenda (SDA) and McAfee

Page 20: Cybercrime

CASE STUDY

• Worm Attack: The Robert Tappan Morris well Known as First Hacker, Son of former National Security Agency Scientist Robert Morris, was the first person to be prosecuted under the ‘Computer and Fraud Act, 1986’. He has created worm while at Cornell as student claiming that he intended to use the worm to check how large the internet was that time.

Page 21: Cybercrime

• The worm was uncontrollable due to which around 6000 computer machines were destroyed and many computers were shut down until they had completely malfunctioned. He was ultimately sentenced to three years probation, 400 hours of community service and assessed a fine of $10500. So there must be strict laws to punish the criminals who are involved in cyber crime activities.

Page 22: Cybercrime

• Hacker Attack: Fred Cohen, a Ph.D. student at the University of Southern California wrote a short program in the year 1983, as an experiment, that could “infect” computers, make copies of itself, and spread from one machine to another. It was beginning & it was hidden inside a larger, legitimate program, which was loaded into a computer on a floppy disk and many computers were sold which can be accommodate at present too.

Page 23: Cybercrime

• Other computer scientists had warned that computer viruses were possible, but Cohen’s was the first to be documented. A professor of his suggested the name “virus”. Cohen now runs a computer security firm.

Page 24: Cybercrime

• Internet Hacker: Wang Qun, who was known by the nickname of “playgirl”, was arrested by chinese police in the Hubei province first ever arrest of an internet hacker in China. He was a 19 year old computing student, arrested in connection with the alleged posting of pornographic material on the homepages of several government-run web sites. Wang had openly boasted in internet chat rooms that he had also hacked over 30 other web sites too.

Page 25: Cybercrime

LAWS FOLLOWED IN INDIA

• Sec 65.Tampering with Computer Source Documents.

• Sec 66. Computer Related Offences

• Sec 66 A Punishment for sending offensive messages through communication service, etc

• Sec 66 B. Punishment for dishonestly receiving stolen computer resource or communication device

Page 26: Cybercrime

• Sec .66C Punishment for identity theft

• Sec .66D Punishment for cheating by personation by using computer resource.

• Sec.66E Punishment for violation of privacy

• The above sec are addressed by Information Technology Act 2000.

Page 27: Cybercrime

EDUCATING ABOUT CYBERCRIME AND ITS USES

• Every student should be educated in hacking in ethical way.

• He or she should have an grip on cyber related problems .

• USES:

• This will help every one to be aware of cybercrime . This can be an prevention act than a cure.

Page 28: Cybercrime

CONCLUSION

• Since users of computer system and internet are increasing worldwide, where it is easy to access any information easily within a few seconds by using internet which is the medium for huge information and a large base of communications around the world. Certain precautionary measures should be taken by netizens while using the internet which will assist in challenging this major threat Cyber Crime.

Page 29: Cybercrime

THANK YOU