Cyber crime
Upcoming SlideShare
Loading in...5
×
 

Cyber crime

on

  • 446 views

ppt on Cyber Crime

ppt on Cyber Crime

Statistics

Views

Total Views
446
Views on SlideShare
446
Embed Views
0

Actions

Likes
0
Downloads
47
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Cyber crime Cyber crime Presentation Transcript

  • Cyber Crime
  • Introduction What is Cyber Crime? “Unlawful acts wherein the computer is either a tool or a target or both” History The case of 1820!. Joseph Marie. The Handloom machine Crime
  • Associated Technologies  Packet Sniffing  Password cracking  Buffer overflow
  • Basic Technology Unauthorized Access  Viruses  E- Mail Crime  Torjans  Passwd Torjans Remote Admin Torjan
  • Classification  Financial crimes  Sale of illegal articles  Intellectual Property crimes  Email spoofing  Forgery
  • Architecture Attack Controller/Master Host Attacker ISP ISP Attack Agents Attack Agents Attack Agents Victim Attack Agents Attack Agents
  • Working Model CYBER SPACE Subordinate gets the information and plan. Main Boss issues the commands to the subordinates And executes the Plan
  • Utilities Smart Cards  Password Revelers  Wireless Technology  Biometric Matchers 
  • Application Domains  Email Related  Email spoofing  Sending malicious codes through email  Email bombing  Sending threatening emails
  • Industry Relevance Packet Sniffing  Password Cracking  Buffer overflow  Viruses 
  • Results: Stack overflow email Worms Back Orifice Packet Spoofing Central exploit Repository Sniffers NMAP Hijacking Sessions Icmp Tunneling Disabling Audits Password Cracking Satan Macro Virus Sweepers Back Doors Password Guessing Stealth Diagnostics Exploiting Known Vulnerabilities Self Replicating Code 1980 1985 1990 1995 2000
  • Conclusion Who is affected by Cyber Crime?  How to stop  What we can Do? 
  • Future of Cyber crime Completely un predictable.  WIRELESS Crimes  Mobiles will become the common tool for the cyber crime  Kids just for fun may hack the whole CBI architecture. 
  • Thank you… Any queries ??