Cyber crimes and its security

6,100 views
5,882 views

Published on

0 Comments
7 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
6,100
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
683
Comments
0
Likes
7
Embeds 0
No embeds

No notes for slide

Cyber crimes and its security

  1. 1. presentation topic : cyber crimes and security By ashwini awatare
  2. 2. Contents :- • Introduction to cyber crimes • History of cyber crimes • Categories of cyber crimes • Types • Impact of cyber crimes • Cyber security • Cyber laws • Prevention • Conclusion
  3. 3. Introduction :- The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of— be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime — illegal activity committed on the internet.
  4. 4. What is cyber crime ? • Using the Internet to commit a crime. ▫ Identity Theft ▫ Hacking ▫ Viruses • Facilitation of traditional criminal activity ▫ Stalking ▫ Stealing information ▫ Child Pornography
  5. 5. Cyber Crimes :- • Defining Cyber Crime :-> • It’s an unlawful act wherein the computer is either a tool or a target or both. • Cyber space is a virtual space that has become as important as real space for business, politics, and communities
  6. 6. History of Cyber Crime • The first recorded cyber crime took place in the year 1820 • In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard’s - employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
  7. 7. History of cyber crimes :-  The first recorded cyber crime took place in 1820.  That is not surprising considenng the fact that the abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.c.  In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage.
  8. 8.  The first spam email took place in 1976 when it was sent out over the AR PANT.  The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the ElK Cloner.
  9. 9. Incident due to cyber crimes
  10. 10. Cybercrime Components • Computers • Cell Phones • PDA’s • Game Consoles
  11. 11. CATEGORIES OF CYBER CRIME: We can categorize cyber crime in two ways.  The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc.  The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.
  12. 12. CATEGORIES OF CYBER CRIME: Cyber crimes can be basically divided into 3 major categories: 1. Cyber crimes against persons. 2. Cyber crimes against property. 3. Cyber crimes against government.
  13. 13. FIRST CATEGORY Cyber crimes against persons Cyber harassment is a distinct Cyber crime. Various kinds of harassment can and do occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious, or other.
  14. 14. SECOND CATEGORY Cyber crimes against property These crimes include computer vandalism . (Destruction of others’ property), Transmission of harmful programs, Unauthorized trespassing through cyber space, Unauthorized possession of computer information.
  15. 15. THIRD CATEGORY Cyber crimes against government  Cyber terrorism is one distinct kind of crime in this category.  The growth of Internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.
  16. 16. Types Of Cyber Crime Modification of a conventional crime by using computers. Frequently Used Cyber Crimes.
  17. 17. Modification of a conventional crime by using computers. • Financial crimes • Cyber pornography • Sale of illegal articles • Online gambling
  18. 18. • Intellectual Property crime • Email spoofing • Forgery • Cyber Defamation • Cyber stalking
  19. 19. Frequently Used Cyber Crimes. • Unauthorized access to computer systems or networks • Theft of information contained in electronic form • Email bombing • Data diddling • Salami attacks • Denial of Service attack
  20. 20. • Virus / worm attacks • Logic bombs • Internet time thefts • Web jacking • Theft of computer system • Physically damaging a computer system
  21. 21. Cyber Criminals • Kids (age group 9-16 etc.) • Organized hacktivists • Disgruntled employees • Professional hackers (corporate espionage)
  22. 22. Computer Security Confidentiality Only those authorized to view information. Integrity Information is correct and hasn’t been altered by unauthorized users or software. Availability Data is accessible to authorized users.
  23. 23. Computer Security
  24. 24. Computer Security - Threats  Malware Software that has a malicious purpose  Viruses  Trojan horse  Spyware
  25. 25. Computer Security - Threats  Intrusions ▫ Any attempt to gain unauthorized access to a system ▫ Cracking ▫ Hacking ▫ Social Engineering ▫ War-driving
  26. 26. Computer Security - Threats
  27. 27. Computer Security - Terminology People ▫ Hackers  White Hat – Good guys. Report hacks/vulnerabilities to appropriate people.  Black Hat – Only interested in personal goals, regardless of impact.  Gray Hat – Somewhere in between.
  28. 28. Computer Security - Terminology Script Kiddies ▫ Someone that calls themselves a ‘hacker’ but really isn’t. Ethical Hacker ▫ Someone hired to hack a system to find vulnerabilities and report on them. ▫ Also called a ‘sneaker’ .
  29. 29. Computer Security - Terminology Security Devices ▫ Firewall  Barrier between network and the outside world. ▫ Proxy server  Sits between users and server. Two main functions are to improve performance and filter requests. ▫ Intrusion Detection Systems (IDS)  Monitors network traffic for suspicious activity.
  30. 30. Cyber Laws :- • Law governing cyber space • Cyber law encompasses laws relating to: — Cyber Crimes Electronic and Digital Signatures — Intellectual Property — Data Protection and Privacy
  31. 31. • Cyber crime: it refers to criminal exploitation of the internet • Electronic and Digital signatures : it refers to mathematical scheme for demonstrating the authenticity of digital message or documents
  32. 32. Intellectual property: it refers to legal concept which refers to creations of the mind for which exclusive rights are recognized. Data protection and privacy: it refers to effective legislation helps minimize monitoring by governments , regulate surveillance by information is properly protected.
  33. 33. NEED OF CYBER LAW Cybercriminals ÷ computer technology = difficulties to apply the law. Not only real-world crimes by using computers..
  34. 34. PREVENTION  Disable and log off a specific user account to prevent access. Disable and log off a group of user accounts which access a particular service that is being attacked. Disable and dismount specific (network) devices, for instance disk devices that are being swamped.
  35. 35.  Disable specific applications, for example, an e-mail system subjected to a SPAM attack.  Close down an entire system, and divert processing to an alternative or backup service on a secondary network.
  36. 36. conclusion • Within the law enforcement agencies, a set of rules must be developed to address the various categories of computer crime. • As such, investigators will know what and which materials to search and seize, the electronic evidence to recover, and the chain of custody to maintain.

×