Cyber crime
Upcoming SlideShare
Loading in...5
×
 

Cyber crime

on

  • 2,151 views

 

Statistics

Views

Total Views
2,151
Views on SlideShare
2,151
Embed Views
0

Actions

Likes
3
Downloads
166
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Cyber crime Cyber crime Presentation Transcript

  • CYBERCRIME Welcome CYBER CRIME | 21/05/2011
  • CYB CE Battle amongRCRIME y hackers b & crackers e CYBER CRIME | 21/05/2011
  • CY IntroductionBERCR Cybercrime, refers to any crime that involves a computer and a network, where the computers mayIME or may not have played an instrumental part in the commission of a crime. Net-crime refers, more precisely, to criminal exploitation of the Internet. Issues surrounding this type of crime have become C high-profile, particularly those surrounding hacking, y copyright infringement, and child grooming. There are also problems of privacy when confidential b information is lost or intercepted, lawfully or e otherwise.C r ime CYBER CRIME | 21/05/2011
  • CY Types Of CYBER CRIMEBERCRIME Financial Claims: This would include cheating, credit card frauds, money laundering etc. Sale of illegal articles: This would include sale of narcotics, weapons and wildlife etc., by posting information on websites, bulletin boards or simply by using e-mail C communications. y Onlineabroad, thatThereonline gambling. In fact, it ishosted on servers gambling: offer are millions of websites, all believed b that many of these websites are actually fronts for money laundering. eC r ime CYBER CRIME | 21/05/2011
  • CY Types Of CYBER CRIMEBERCRI Forgery: Counterfeit currency notes, postage and revenue stamps,ME mark sheets etc., can be forged using sophisticated computers, printers and scanners. Cyber Defamation: This occurs when defamation takes place with the help of computers and or the Internet e.g. someone published defamatory matter about someone on a websites or C sends e-mail containing defamatory information to all of that person’s friends. y Cyber Stalking: Cyber stalking involves following a person’s b movements across the Internetthe victim, entering the chat-rooms bulletin boards frequented by by posting messages on the e frequented by the victim.C r ime CYBER CRIME | 21/05/2011
  • CY Types Of CYBER CRIMEBERC E-Mail spoofing: A spoofed email is one that appears to originateRI from one source but actually has been sent from another source.ME This can also be termed as E-Mail forging. Intellectual Property Crimes: These include software piracy, copyright infringement, trademarks violations etc. Unauthorized access to computer system or network: This activity is commonly referred to as hacking. The Indian Law has C however given a different connotation to the term hacking. y Theft of information stored in computer hard disks, removable includes information contained in electronic from: This b storage media etc. e E-Mail bombing: to the victim. refers to sending a large amount of e-mails Email bombingC r ime CYBER CRIME | 21/05/2011
  • CY Types Of CYBER CRIMEBERC Data diddling: This kind of an attack involves altering the rawRI data just before it is processed by a computer and then changing itME back after the processing is completed. Salami attacks: Those attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed e.g. A bank employee inserts a program into bank’s servers, that C deducts a small amount from the account of every customer. y Denial of Service: than involves flooding computer resources with more requests This it can handle. This causes the resources b to crash thereby denying authorized users the service offered by the resources. eC r ime CYBER CRIME | 21/05/2011
  • CY Types Of CYBER CRIMEBERC Virus/worm: Viruses are programs that attach themselves to aRI computer or a file and then circulate themselves to other files andME to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms, unlike viruses don not need the host to attach themselves to. Logic bombs: These are dependent programs. This implies that these programs are created to do something only when a certain C event occurs, e.g. some viruses may be termed logic bombs because they lie dormant all through the year and become active y only on a particular date. b Trojan Horse:program which functions from inside what an to unauthorized A Trojan as this program is aptly called, is seems e be an authorized program, thereby concealing what it is actually doing.C r ime CYBER CRIME | 21/05/2011
  • CY TypesIntroduction Of CYBER CRIMEBERC Internet Time Theft: This connotes the usage by unauthorizedRI persons of the Internet hours paid for by another person.ME Physically damaging a computer system: This crime is committed by physically damaging a computer or its peripherals. C y b eC r ime CYBER CRIME | 21/05/2011
  • CY Where INDIA StandsBERCRIME C y b eC r ime CYBER CRIME | 21/05/2011
  • CY Preventive StepsBERC CHILDREN:RI Children should not give out identifying information such asME Name, Home address, School Name, Telephone Number or share photographs in a chat room.They should not respond to messages, which are suggestive, obscene, belligerent or threatening, and not to arrange a face-to –face meeting without telling parents or guardians. They should remember that people online might not be who they seem. C PARENTS: y Parent should gambling, hate speech, drugs, on PC toetc. children from use content filtering software alcohol protect b There is also softwareto see whichtimeitem childrenuse of visited. and allowing parents to establish site controls for have limpets e Use this software to keep track of the type of activities of children.C r ime CYBER CRIME | 21/05/2011
  • CY Preventive StepsBERCR ORGANISATIONS AND GOVERNMENTIME i. PHYSICAL SECURITY: ii. ACCESS CONTROL: C iii. PASSWORD: y iv. FINDING THE HOLES IN NETWORK: b v. USING ENCRYPTION e vi. DETECTIONC r ime CYBER CRIME | 21/05/2011
  • CY ConclusionBERC Capacity of human mind is unfathomable. It is not possible toRI eliminate cyber crime from the cyber space. It is quite possible toME check them. History is the witness that no legislation has succeeded in totally eliminating crime from the globe. The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime. Undoubtedly the Act is a historical step in the cyber world. C Further I all together do not deny that there is a need to bring changes in the Information Technology Act to make it more y effective to combat cyber crime. I would conclude with a word of caution for the pro-legislation school that it should be kept in b mind that the provisions of the cyber law are not made so stringent that it may retard the growth of the industry and prove e to be counter-productive.C r ime CYBER CRIME | 21/05/2011
  • CY QueriesBERCR ¿?IME C y b e ? ¿?C r ime CYBER CRIME | 21/05/2011
  • CYBERCRIME C y b eC r ime CYBER CRIME | 21/05/2011