“The infectiousness of crime is like that of the plague”. Napoleon Bonaparte
Why learn about cyber crime?
What is cyber crime?
Profile of cyber criminal.
General Reasons for cyber crime.
Computer crimes are vulnerable.
Types of cyber crime.
Uncovering Digital Evidence.
Countries where cyber crime happens.
Life Cycle of cyber attack.
How to prevent them.
Why learn about Cyber Crime ! because – everybody uses computers. and most important financial transactions are carried out on Internet. remember this is wired world.
What is cyber crime ? “All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system “.
History What is cyber crime ? In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime! “All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system “. http://cybercrime.planetindia.net/intro.htm
Profile of Cyber Criminal could be –
Eye-opener :- It is clear then that the next few decades will see more and more people deviating from the “right” path and immersing themselves in the world of cybercrime which offers them so much more. http://library.thinkquest.org/04oct/00460/future.html
Victims could be –
Desperados and greedy people.
Unskilled and Inexperienced.
General Reasons for Cyber Crime
Gathering trophies (quest to become famous).
Forging Documents and Messages.
Computer crimes are vulnerable because of -
Computer’s storage capacity.
Weakness in operating system.
Lack of user awareness.
Computer Crimes are vulnerable Types of cyber crime
Credit Card Fraud.
Loss of revenue.
Uncovering Digital Evidence Smart Criminals don’t use their own computers
E-Commerce Network - Suzanne Mello
Top 10 countries where cyber crime happens
Life Cycle of Cyber Attack There are five general stages to develop and deploy a cyber “weapon”
How to prevent Cyber crime.
Firewall protection .
Encryption software .
Caution in providing personal information.
Secure shopping .
Avoidance of scams .
Monitoring of your child's computer activities.
Data IC3 2009 Annual Report on Internet Crime Released http://www.ic3.gov/media/2010/100312.aspx
Future of Cyber Crime One of the biggest mistakes anyone could possibly make is assume that things will not get worse .
Wireless malware - Future malware attacks may be carried out wirelessly, hence making the air infected with deadly, computer viruses, just like their biological cousins.
Deadly combination - It is a possibility that in the future, viruses and worms can from a deadly pair. While the worms traverse across networks of computers, the viruses will dislodge themselves from the worms and launch individual attacks on the computer.
Adeadly payload - In the future, as virus-writing toolkits become more sophisticated, viruses could cause permanent damage to computers, making it impossible to recover files and programs lost because of the attack
Intelligent malware - Next generation intelligent malware will have the capacity to spread across multiple platforms, such as personal computers, servers and mobile devices. These intelligent malware will be able to coordinate with each other to launch massive Denial of Service (DoS) attacks.