Top Banner
Wednesday, July 02, 2014 Cyber crime CYBER CRIME SCENE CYBER CRIME SCENE CYBER Presented by-: Ashish ojha CREATED BY :- ASHISH OJHA INDORE
22

It presentation cyber crime

Sep 06, 2014

Download

Technology

ojha121

ideal powerpoint presentations for school and college projects.
cyber crime,types,preventive measures,it act,indian law for cyber crime
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: It presentation cyber crime

Wednesday, July 02, 2014

Cyber crime

CYBER CRIME SCENE CYBER CRIME

SCENE CYBER

Presented by-:

Ashish ojha

RCW
IDEAL FOR SCHOOL & COLLEGE PRESENTATIONS.
Page 2: It presentation cyber crime

CYBER CRIME !!Cybercrime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. Cybercrime also includes non-monetary offenses, such as creating and distributing  viruses on other computers or posting confidential business information on the Internet.

Wednesday, July 02, 2014

Page 3: It presentation cyber crime

CREATED BY :- ASHISH OJHA INDORE

HISTORY

FIRST OCCURENCE FOR PRACTICALLY AS LONG AS THERE'S BEEN AN INTERNET, VANDALS, TROUBLEMAKERS AND CRIMINALS HAVE SOUGHT TO EXPLOIT IT. EVEN BEFORE THE ADVENT OF THE PERSONAL COMPUTER, "PHONE PHREAKS" MANIPULATED COMPUTERIZED PHONE SYSTEMS TO MAKE FREE LONG-DISTANCE CALLS.

The first spam email took place in 1978 when it was sent out over the Arpanet (Advanced Research Projects Agency Network).

The first virus was installed on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the Elk cloner.

Wednesday, July 02, 2014

Page 4: It presentation cyber crime

Cyber Crime is a term used to broadly describe criminal activity in which computers or computer networks are a TOOL, a TARGET, or a PLACE OF CRIMINAL ACTIVITY and include everything from electronic cracking to denial of service attacks. It is also used to include traditional crimes in which computers or networks are used to enable the illicit activity.

Wednesday, July 02, 2014

Page 5: It presentation cyber crime

Pornography, Threatening Email, Assuming someone's Identity, Sexual Harassment, Defamation, Spam and Phishing are some examples where computers are used to commit crime, whereas Viruses, Worms and, Software Piracy and Hacking are examples where computers become target of crime.

Computer crime mainly consists of unauthorized access to computer systems data alteration, data destruction, theft of intellectual property. Cyber crime in the context of national security may involve hacking, traditional espionage, or information warfare and related activities.

Wednesday, July 02, 2014

Page 6: It presentation cyber crime

Cyber Crime Variants

Hacking"Hacking" is a crime, which entails cracking systems and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 per cent increase this year. Cyber SquattingCyber Squatting is the act of registering a famous Domain Name and then selling it for a fortune. This is an issue that has not been tackled in IT ACT 2000. 

Wednesday, July 02, 2014

Page 7: It presentation cyber crime

Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason.

The fraudster then has access to the customer's online bank account and to the funds contained in that account.

Wednesday, July 02, 2014

Page 8: It presentation cyber crime

Cyber Stalking is use of the Internet or other electronic means to stalk someone. This term is used interchangeably with online harassment and online abuse. Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. 

Wednesday, July 02, 2014

Page 9: It presentation cyber crime

CREATED BY :- ASHISH OJHA INDORE

Vishing is the criminal practice of using social

engineering and Voice over IP (VoIP) to gain access to

private personal and financial information from the public for the purpose of financial

reward. The term is a combination of “Voice" and

phishing. Vishing exploits the public's trust in landline

telephone services. 

Vishing is typically used to steal credit card numbers or

other information used in identity theft schemes from

individuals.

VISHING

Wednesday, July 02, 2014

Page 10: It presentation cyber crime

CREATED BY :- ASHISH OJHA INDORE

Data diddling: This is altering raw data just before a computer processes it and then changing it back after the processing is completed.

Denial of Service attack:The computer is flooded with more requests than it can handle which cause it to crash. Distributed Denial of Service (DDOS) attack is a example.

Wednesday, July 02, 2014

Page 11: It presentation cyber crime

CREATED BY :- ASHISH OJHA INDORE

SOFTWARE PIRACYAccording to Microsoft, software piracy is

defined “as the copying of a computer software program without the permission of the copyright owner.”20 This may include making unlicensed copies of software and/or under-reporting the number of installed copies in volume-licensing agreements. Recent estimates indicate that more than $7.5 billion worth of American software is illegally copied and distributed around the world each year. In China, 96% of all business software is pirated. Vietnam surpasses that, with over 98% of all business software reported as pirated.

Wednesday, July 02, 2014

Page 12: It presentation cyber crime

CREATED BY :- ASHISH OJHA INDORE

Email bombing:It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing. 

Trojan attacks: This term has its origin in the word ‘Trojan horse’. In software field this means an unauthorized program, which passively gains control over another’s computer by representing itself as an authorized program. The most common form of installing a Trojan is through e-mail.

Web jacking: This term is derived from the term hi

jacking. In these kinds of offences the hacker gains access and control over the website of another. He may even manipulate or change the information of the website. This may be done for fulfilling political objectives or for money.

Wednesday, July 02, 2014

Page 13: It presentation cyber crime

CREATED BY :- ASHISH OJHA INDORE

Virus/ Worm Attacks: Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on the computer’s memory.

Salami attacks: This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed.

Wednesday, July 02, 2014

Page 14: It presentation cyber crime

CREATED BY :- ASHISH OJHA INDORE

INDIA STANDS 11TH IN THE RANKING FOR CYBER CRIME IN

THE WORLD, CONSTITUTING 3% OF THE GLOBAL CYBER CRIME.

Wednesday, July 02, 2014

Page 15: It presentation cyber crime

CREATED BY :- ASHISH OJHA INDORE

WHY INDIA?A rapidly growing online

user base: India has bypassed Japan to

become the world’s third largest Internet user after China and the US.

India now has nearly 74 million Active Internet users, a 31 per cent increase over March 2012.

86+ Million Social Network Users 50 Million users shop online on

Ecommerce and Online Shopping Sites

The Telecom Regulatory Authority of India (TRAI) pegged the number of Internet subscribers in India at 164.81 million as of March 31, 2013, with seven out of eight accessing the Internet from their mobile phones.Wednesday, July 02, 2014

Page 16: It presentation cyber crime

CREATED BY :- ASHISH OJHA INDORE

CYBER CRIMES IN INDIAThe majority of cybercrimes are

centered on forgery, fraud and Phishing.

India is the third-most targeted country for Phishing attacks after the US and the UK.

Social networks as well as ecommerce sites are major targets.

6.9 million bot-infected systems in 2013.

14,348 websites defacements in 2013.

15,000 sites hacked in 2013. India is number 1 country in the

world for generating spams.29.9 million people fell victim to

cyber crime.17% of adults online have

experienced cybercrime on their mobile phone.

Source: Norton Cybercrime Report 2013

Wednesday, July 02, 2014

Page 17: It presentation cyber crime

CREATED BY :- ASHISH OJHA INDORE

Cyber Laws in IndiaUnder The Information Technology Act, 2000

CHAPTER XI – OFFENCES – 66. Hacking with computer system.

(1)Whoever with the Intent to cause or knowing that he is likely to cause Wrongful Loss or Damage to the public or any person Destroys or Deletes or Alters any Information Residing in a Computer Resource or diminishes its value or utility or affects it injuriously by any means, commits hack.

(2) Whoever commits hacking shall be punished with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both.

Wednesday, July 02, 2014

Page 18: It presentation cyber crime

CREATED BY :- ASHISH OJHA INDORE

Whoever without permission of the owner of the computer :

Secures Access; Downloads, Copies or extracts any data, computer database or any information; Introduce or causes to be introduce any Virus or Contaminant; Disrupts or causes disruption; Denies or causes denial of access to any

person; Provides any assistance to any person to

facilitate access Charges the services availed of by a person to

the account of another person by Tampering with or Manipulating any Computer, Computer System, or Computer Network;

Shall be liable to pay damages by way of compensation not exceeding one crore rupees to the person so affected.Wednesday, July 02, 2014

Page 19: It presentation cyber crime

CREATED BY :- ASHISH OJHA INDORE

How to Tackle Such Activities?

An important question arises that how can these crimes be prevented. A number of techniques and solutions have been presented but the problems still exists and are increasing day by day.

Antivirus And Anti Spyware Software:Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software. Anti spy wares are used to restrict backdoor program, Trojans and other spy wares to be installed on the computer.

Firewalls:A firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices, software programs, or a combination of the two. A network firewall typically guards an internal computer network against malicious access from outside the network.

Wednesday, July 02, 2014

Page 20: It presentation cyber crime

CREATED BY :- ASHISH OJHA INDORE

Cryptography:Cryptography is the science of encrypting and decrypting information. Encryption is like sending a postal mail to another party with a lock code on the envelope which is known only to the sender and the recipient. A number of cryptographic methods have been developed and some of them are still not cracked.

Cyber Ethics and Laws:Cyber ethics and cyber laws are also being formulated to stop cyber crimes. It is a responsibility of every individual to follow cyber ethics and cyber laws so that the increasing cyber crimes shall reduce. Security Software like Anti Viruses and Anti Spy Wares should be installed on all computers, in order to remain secure from Cyber Crimes. Internet Service Providers should also provide high level of security at their servers in order to keep their clients secure from all types of viruses and malicious programs.

Wednesday, July 02, 2014

Page 21: It presentation cyber crime

CREATED BY :- ASHISH OJHA INDORE

Safety Tips to avoid cybercrimeUse antivirus software and

firewalls –keep them up to date.Keep your operating systems up to

date with critical security updates and patches.

Don’t open emails or attachments from unknown sources.

Read Privacy policy carefully when you submit the data through internet.

Disable Remote Connectivity.Use hard-to-guess passwords.

Don’t use words found in a dictionary. Remember that password cracking tools exist.

Back-up your computer data on disks or CDs often.

Wednesday, July 02, 2014

Page 22: It presentation cyber crime

CREATED BY :- ASHISH OJHA INDORE

Conclusion…

“Indian Laws are well drafted and are capable of handling all kinds of challenges as posed by cyber criminals. However, the enforcement agencies are required to be well versed with the changing technologies and Laws.”

"As internet technology advances so does the threat of cyber crime. In times like these we must protect ourselves from cyber crime. Anti-virus software, firewalls and security patches are just the beginning. Never open suspicious e-mails and only navigate to trusted sites.”

Wednesday, July 02, 2014