Cyber Crime<br />Akash Dolas<br />
“The infectiousness of crime is like that of the plague”.                             Napoleon Bonaparte <br />
 Agenda<br /><ul><li>  Why learn about cyber crime?
What is cyber crime?
History.
  Profile of cyber criminal.
Victims.
  General Reasons for cyber crime.
Computer crimes are vulnerable.
  Types of cyber crime.
Impact.
  Uncovering Digital Evidence.
  Countries where cyber crime happens.
  Life Cycle of cyber attack.
 How to prevent them.
Data
 Future</li></li></ul><li>     Why learn about Cyber Crime !<br />because –<br />everybody uses computers. <br />and most ...
What is cyber crime ?<br />“All crimes performed or resorted to by abuse of<br />electronic media or otherwise, with the p...
Upcoming SlideShare
Loading in...5
×

Cyber Crime

13,308

Published on

26 Comments
36 Likes
Statistics
Notes
No Downloads
Views
Total Views
13,308
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
0
Comments
26
Likes
36
Embeds 0
No embeds

No notes for slide

Cyber Crime

  1. 1. Cyber Crime<br />Akash Dolas<br />
  2. 2. “The infectiousness of crime is like that of the plague”. Napoleon Bonaparte <br />
  3. 3. Agenda<br /><ul><li> Why learn about cyber crime?
  4. 4. What is cyber crime?
  5. 5. History.
  6. 6. Profile of cyber criminal.
  7. 7. Victims.
  8. 8. General Reasons for cyber crime.
  9. 9. Computer crimes are vulnerable.
  10. 10. Types of cyber crime.
  11. 11. Impact.
  12. 12. Uncovering Digital Evidence.
  13. 13. Countries where cyber crime happens.
  14. 14. Life Cycle of cyber attack.
  15. 15. How to prevent them.
  16. 16. Data
  17. 17. Future</li></li></ul><li> Why learn about Cyber Crime !<br />because –<br />everybody uses computers. <br />and most important<br />financial transactions are carried out on Internet.<br />remember this is wired world.<br />
  18. 18. What is cyber crime ?<br />“All crimes performed or resorted to by abuse of<br />electronic media or otherwise, with the purpose<br />of influencing the functioning of computer or<br />computer system “.<br />
  19. 19. History<br />What is cyber crime ?<br />In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!<br />“All crimes performed or resorted to by abuse of<br />electronic media or otherwise, with the purpose<br />of influencing the functioning of computer or<br />computer system “.<br />http://cybercrime.planetindia.net/intro.htm<br />
  20. 20. Profile of Cyber Criminal<br /> could be –<br /><ul><li> Disgruntled employees.
  21. 21. Teenagers.
  22. 22. Professional hackers.
  23. 23. Business rival.
  24. 24. Divorced husband.
  25. 25. Ex-Boyfriend.</li></ul>Eye-opener :- It is clear then that the next few decades will see more and more people deviating from the “right” path and immersing themselves in the world of cybercrime which offers them so much more. <br />http://library.thinkquest.org/04oct/00460/future.html<br />
  26. 26. Victims<br /> could be –<br /><ul><li> Gullible.
  27. 27. Desperados and greedy people.
  28. 28. Unlucky people.
  29. 29. Unskilled and Inexperienced.</li></li></ul><li>General Reasons for Cyber Crime<br /><ul><li> Gathering trophies (quest to become famous).
  30. 30. General mischief.
  31. 31. Financial gain.
  32. 32. Revenge.
  33. 33. Protest.
  34. 34. Criminal activity.
  35. 35. Identity theft.
  36. 36. Forging Documents and Messages.</li></li></ul><li>Computer crimes are vulnerable<br /> because of - <br /><ul><li> Anonymity.
  37. 37. Computer’s storage capacity.
  38. 38. Weakness in operating system.
  39. 39. Lack of user awareness.</li></li></ul><li>Computer Crimes are vulnerable<br />Types of cyber crime<br /><ul><li> Hacking.
  40. 40. Phishing.
  41. 41. Software Piracy.
  42. 42. Pornography.
  43. 43. Credit Card Fraud.
  44. 44. Spoofing.
  45. 45. Threatening.
  46. 46. Salami Attack.
  47. 47. Cyber Stalking.
  48. 48. Net Extortion.
  49. 49. Cyber Defamation.
  50. 50. IRC Crime.
  51. 51. Virus Dissemination. </li></li></ul><li>Impact<br /><ul><li> Loss of revenue.
  52. 52. Wasted time.
  53. 53. Damaged reputations.
  54. 54. Reduced productivity.</li></li></ul><li>Uncovering Digital Evidence<br />Smart Criminals don’t use their own computers<br /><ul><li>Floppy disks.
  55. 55. Zip/Jazz disks.
  56. 56. Tapes.
  57. 57. Digital cameras.
  58. 58. Memory sticks.
  59. 59. Printers.
  60. 60. CDs.
  61. 61. PDAs.
  62. 62. Game boxes.
  63. 63. Networks.
  64. 64. Hard drives.</li></ul>E-Commerce Network - Suzanne Mello <br />
  65. 65. Top 10 countries where cyber crime happens<br />
  66. 66. Life Cycle of Cyber Attack<br />There are five general stages to develop and deploy a cyber “weapon”<br />
  67. 67. How to prevent Cyber crime.<br /><ul><li> Spam blocker.
  68. 68. Anti-virus software.
  69. 69. Firewall protection .
  70. 70. Encryption software .
  71. 71. Caution in providing personal information.
  72. 72. Secure shopping .
  73. 73. Avoidance of scams .
  74. 74. Monitoring of your child's computer activities. </li></li></ul><li> Data<br />IC3 2009 Annual Report on Internet Crime Released<br />http://www.ic3.gov/media/2010/100312.aspx<br />
  75. 75. Future of Cyber Crime<br />One of the biggest mistakes anyone could possibly make is assume that things will not get worse .<br /><ul><li> Wireless malware - Future malware attacks may be carried out wirelessly, hence making the air infected with deadly, computer viruses, just like their biological cousins.
  76. 76. Deadly combination - It is a possibility that in the future, viruses and worms can from a deadly pair. While the worms traverse across networks of computers, the viruses will dislodge themselves from the worms and launch individual attacks on the computer.
  77. 77. Adeadly payload - In the future, as virus-writing toolkits become more sophisticated, viruses could cause permanent damage to computers, making it impossible to recover files and programs lost because of the attack
  78. 78. Intelligent malware - Next generation intelligent malware will have the capacity to spread across multiple platforms, such as personal computers, servers and mobile devices. These intelligent malware will be able to coordinate with each other to launch massive Denial of Service (DoS) attacks.</li></ul>http://library.thinkquest.org/04oct/00460/future.html<br />

×