Cyber crime
Upcoming SlideShare
Loading in...5
×
 

Cyber crime

on

  • 6,197 views

Down load this file and and give your opinions

Down load this file and and give your opinions

Statistics

Views

Total Views
6,197
Views on SlideShare
6,197
Embed Views
0

Actions

Likes
8
Downloads
576
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Cyber crime Cyber crime Presentation Transcript

  • GHOST ARE THEY REAL CYBER CRIMES
  • GHOST ARE THEY REAL CYBER CRIMES
  • • M. ARSLAN MAQBOOL(10-ARID-210)• DANYAL SHOUKAT(11-ARID-688)• TABRAIZ IQBAL(11-ARID-774)• FURQAN RASHID (11-ARID-724)• UMAIR KHAN(11-ARID-758)GROUP MEMBERS
  •  Introduction of Cyber crime Types of cyber crime Computer Viruses Types of viruses Cyber Threats Cyber Threat Evolution New Internet Threats Security Policies Government PoliciesAgenda
  • Introduction to Cyber Crime Computer Crime, E-Crime, Hi-Tech Crime or Electronic Crime is where a computer is the target of a crime or is the means adopted to commit a crime. Most of these crimes are not new. Criminals simply devise different ways to undertake standard criminal activities such as fraud theft, blackmail, forgery, and embezzlement using the new medium, often involving the Internet
  • Cyber crimes Web jacking Denial of Trojan Information E-mail Salami ServiceHacking Theft attacks attacks bombing attacksDifferent Types of Cybercrimes
  • TYPES OF CYBER CRIMESE-Mail Bombing: Email bombing refers to sending a large amount of e-mails tothe victim resulting in interruption in the victims’ e-mail account or mail servers.Data Diddling: This kind of an attack involves altering the raw data just before itis processed by a computer and then changing it back after the processing iscompleted.Salami Attacks: These attacks are used for the commission of financial crimes.A bank employee inserts a program into bank’s servers, that deducts a small amountfrom the account of every customer Denial of Service: This involves flooding computer resources with morerequests than it can handle. This causes the resources to crash thereby denyingauthorized users the service offered by the resources.
  • Types of Cyber crimes(Contd.) Credit card frauds Sale of illegal articles-narcotics, weapons, wildlife Crime against Government Online gambling Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, Crime against property theft of computer source code Email bombing Cyber terrorism Crime against persons
  •  CARDING:- Carding is a serious threat to India, as it does not require a high degree of sophistication and is considered particularly pernicious by international financial institutions and e-commerce providers. BOTS:- Bots, compromised servers that may be launching cyber attacks or sending Spam.Cyber Crime Data In Regional Context
  •  What does Computer Virus mean ? A computer virus is an executable program depend on the nature of a virus. It may cause damage of your hard disk contents or interfere normal operation at your computer. A computer virus is a program that can copy itself and infect a computer without permission or knowledge of the user.Computer Viruses
  •  To distribute political message. To attack the products of specific companies. Some consider their creations to be works of art, and see as a creative hobby. Financial gain from identity theftWhy Do people Create These Viruses?
  • Types of viruses Boot sector file virus Macro virus virusTypes of Viruses
  • Cyber Threats Cyber threats to a control system refer to persons who attempt unauthorized access to a control system device and network using a data communications pathway. Main threats to cyber crime is Hacking. Hacking involves gaining unauthorized access to a computer.Cyber Threats
  • Cyber Threat Evolution Malicious Identity TheftVirus Code (Phishing) (Melissa) Breaking Advanced Worm / Organised Crime Web Sites Trojan (I LOVE Data Theft, DoS / YOU) DDoS1977 1995 2000 2003-04 2005-06 2007-08
  •  All computers need internet security Home users can lose valuable personal data with one click to the wrong website. Children trading games also exchange viruses unknowingly. You receive an email requesting an update to your payment details, and a hacker gains access to your bank account. A backdoor is installed on your machine, and your PC becomes a zombie, spewing out spam. New technologies - new anti-malware solutions As cyber threats have evolved, so has software to deflect such threats. Sophisticated antispyware and antivirus solutions capable of detecting the most complex new viruses are now available.New Internet Threats
  • 16CAN ANYTHING BE DONE?
  • 17There is no one solution,be it technological orotherwise, to addresscyber crime. It exists for amultitude of reasons andrequires a multifacetedapproach to fight against
  • 18A FEW WORDS ABOUT SECURITY POLICIES
  • 19•INDUSTRY POLICIESShould address acceptableusage, minimum securitystandards, andcommitments byorganisation to educateand support users
  • 20•GOVERNMENT POLICIESIdentify short and midterm security objectives,support to key players,investments in securitytechnology and training,and awareness initiatives
  • QUESTIONS 21
  • THANK YOU