SlideShare a Scribd company logo
1 of 21
InformationTechnology
Act
- An overview
By: AKSHAY BHARDWAJ
Branch- I.T(C1)
PRESENTATION ONPRESENTATION ON
CYBER CRIMECYBER CRIME
Cyber Crime – “Is the Internet the
new “Wild Wild West?”
In the News…….
 1 out of 5 children received a sexual solicitation
or approach over the Internet in a one-year
period of time (www.missingchildren.com)
 California warns of massive ID theft – personal
data stolen from computers at University of
California,Berkeley (Oct 21,2004 IDG news
service)
 Microsoft and Cisco announced a new initiative
to work together to increase internet security
(Oct 18,2004 www.cnetnews.com)
The New Wild Wild West
More cyber criminals than
cyber cops
Criminals feel “safe” committing
crimes from the privacy of their
own homes
Brand new challenges facing law
enforcement
Most not trained in the
technologies
Internet crimes span multiple
jurisdictions
Need to retrofit new crimes to
existing laws
Computer Crime
Computer used to commit a
crime
Child porn, threatening email,
assuming someone’s identity,
defamation, spam, phishing
Computer as a target of a crime
 Viruses, worms, industrial
espionage, software piracy, hacking
Computer Forensics
 What is it?
 an autospy of a computer or network to uncover
digital evidence of a crime
 Evidence must be preserved and hold up in a court
of law
 Growing field – Many becoming computer
forensic savvy
 FBI, State and Local Police, IRS, Homeland Security
 Defense attorneys, judges and prosecutors
 Independent security agencies
 White hat or Ethical Hackers
 Programs offered at major universities such as URI
http://homepage.cs.uri.edu/faculty/wolfe/cf
Uncovering Digital Evidence
Smart Criminals don’t use their own
computers
 Floppy disks
 Zip/Jazz disks
 Tapes
 Digital cameras
 Memory sticks
 Printers
 CDs
 PDAs
 Game boxes
 Networks
 Hard drives
Digital Evidence
Criminals Hide Evidence
 Delete their files and emails
 Hide their files by encryption, password
protection, or embedding them in
unrelated files (dll, os etc)
 Use Wi-Fi networks and cyber cafes to
cover their tracks
Forensics Uncover Evidence
 Restore deleted files and emails – they are
still really there!
 Find the hidden files through complex
password, encryption programs, and
searching techniques
 Track them down through the digital trail -
IP addresses to ISPs to the offender
Not obvious…….it’s most likely hidden on purpose
or needs to be unearthed by forensics experts
The Crime Scene
(with Computer Forensics)
 Similar to traditional crime scenes
 Must acquire the evidence while preserving the
integrity of the evidence
 No damage during collection, transportation,
or storage
 Document everything
 Collect everything the first time
 Establish a chain of custody
 But also different…….
 Can perform analysis of evidence on exact
copy!
 Make many copies and investigate them
without touching original
 Can use time stamping/hash code techniques
to prove evidence hasn’t been compromised
Spam
Viruses/Worms
Industrial Espionage and Hackers
Wi-Fi High Jacking
Top Cyber Crimes that Attack
Business
Spam
“Spam accounts for 9 out of every 10 emails in the
United States.”
“We do not object to the use of this slang term to describe
UCE (unsolicited commercial email),although we do
object to the use of the word“spam”as a trademark and
the use of our product image in association with that
term”
Can-Spam Act of 2003
 Controlling the Assault of Non-Solicited Pornography and Marketing Act (Can-
Spam)
 Signed into law by President Bush on Dec 16, 2003
 Took effect Jan 1, 2004
 Unsolicited commercial email must:
 Be labeled
 Include Opt-Out instructions
 No false headers
 FTC is authorized (but not required) to establish a “do-not-email” registry
 www.spamlaws.com –lists all the latest in federal, state, and international laws
Spam is Hostile
 You pay for Spam, not Spammers
 Email costs are paid by email recipients
 Spam can be dangerous
 Never click on the opt-out link!
 May take you to hostile web site where mouse-
over downloads an .exe
 Tells spammers they found a working address
 They won’t take you off the list anyway
 What should you do?
 Filter it out whenever possible
 Keep filters up to date
 If you get it, just delete the email
Viruses and Worms
 Different types of “ailments”
 Viruses
 software that piggybacks on other
software and runs when you run
something else
 Macro in excel, word
 Transmitted through sharing programs
on bulletin boards
 Passing around floppy disks
 An .exe, .com file in your email
 Worms
 software that uses computer networks
to find security holes to get in to your
computer – usually in Microsoft OS!!
But worm for MAC was recently
written
Hackers are Everywhere
 Stealing data
 Industrial Espionage
 Identity theft
 Defamation
 Deleting data for fun
 A lot of bored 16 year olds late at night
 Turning computers into zombies
 To commit crimes
 Take down networks
 Distribute porn
 Harass someone
 Ethical/white hat hackers exist too
 Help break into networks to prevent crimes
Mafia Boy
Wireless Fidelity (Wi-Fi)
Using antennas to create “hot spots”
Hotspots – Internet Access (sometimes free)
Newport Harbor -All the boats in Harbor have internet access
San Francisco Giants Stadium – Surf the web while catching a game
UMass (need to register, but it’s free)
Cambridge, MA
Philadelphia, PA – just announced – entire city by 2006
Wi-Fi High Jacking
60-70% wireless networks are wide open
Why are the Wi-Fi networks unprotected?
Most people say “Our data is boring”
But… criminals look for wireless networks to commit their
crimes
And… the authorities will come knocking on your door…..
Protect your Computers!
 Use anti-virus software and
firewalls - keep them up to date
 Keep your operating system up to
date with critical security updates
and patches
 Don't open emails or attachments
from unknown sources
 Use hard-to-guess passwords.
Don’t use words found in a
dictionary. Remember that
password cracking tools exist
 Back-up your computer data on
disks or CDs often
 Don't share access to your
computers with strangers
 If you have a wi-fi network,
password protect it
 Disconnect from the Internet when
not in use
 Reevaluate your security on a
regular basis
 Make sure your employees and
family members know this info
too!
Web sites of Interest
http://homepage.cs.uri.edu/faculty/wolfe/cf
www.missingchildren.com
www.spamlaws.com
www.netsmartz.org
http://www.ifccfbi.gov - operation web snare – latest cyber
crimes to be aware of
http://www.dcfl.gov/dc3/home.htm
http://www.cops.org/
Thank you!
QUERY !

More Related Content

What's hot

[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet CrimeGerman Teran
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hackingAyush Upadhyay
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer SystemEjiro Ndifereke
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-wowwFloroRaphaell
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its typesDINESH KAMBLE
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp updateyahooteacher
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newDr. Arun Verma
 
Cybercrime
CybercrimeCybercrime
CybercrimeKomal003
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime008_Anuj
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal lawHamza Cheema
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ictcyb1337
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) CrimesElizabeth Hall
 

What's hot (20)

[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer System
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Disadvantages of-i ct-woww
Disadvantages of-i ct-wowwDisadvantages of-i ct-woww
Disadvantages of-i ct-woww
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Cyber crime lecture pp update
Cyber crime lecture pp updateCyber crime lecture pp update
Cyber crime lecture pp update
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
computer misuse n criminal law
computer misuse n criminal lawcomputer misuse n criminal law
computer misuse n criminal law
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
The disadvantages of ict
The disadvantages of ictThe disadvantages of ict
The disadvantages of ict
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) Crimes
 
Ethics piracy
Ethics piracyEthics piracy
Ethics piracy
 

Viewers also liked

Responsive HTML Email for iOS
Responsive HTML Email for iOSResponsive HTML Email for iOS
Responsive HTML Email for iOSSteve Noone
 
Kauri ph presentation 2012 11 22 full
Kauri ph presentation 2012 11 22 fullKauri ph presentation 2012 11 22 full
Kauri ph presentation 2012 11 22 fullNhel Nobleza
 
Healthcare Open House Presentation
Healthcare Open House PresentationHealthcare Open House Presentation
Healthcare Open House Presentationjbyers2
 
Xmed 2015 Lucien Engelen
Xmed 2015 Lucien EngelenXmed 2015 Lucien Engelen
Xmed 2015 Lucien EngelenLucien Engelen
 
Organics recovery mass recycle r3 gogan
Organics recovery mass recycle r3 goganOrganics recovery mass recycle r3 gogan
Organics recovery mass recycle r3 goganMassRecycle
 
The road to the future : how technology is changing the way we consider autom...
The road to the future : how technology is changing the way we consider autom...The road to the future : how technology is changing the way we consider autom...
The road to the future : how technology is changing the way we consider autom...Stéphane Schultz
 
50 images of brassai's works
50 images of brassai's works50 images of brassai's works
50 images of brassai's worksStephanie Mizzi
 
How To Survive The Zombie Apocalypse
How To Survive The Zombie ApocalypseHow To Survive The Zombie Apocalypse
How To Survive The Zombie Apocalypseelbryan108
 
Social Media In Healthcare: Coming of Age
Social Media In Healthcare: Coming of AgeSocial Media In Healthcare: Coming of Age
Social Media In Healthcare: Coming of AgeLee Aase
 

Viewers also liked (11)

Responsive HTML Email for iOS
Responsive HTML Email for iOSResponsive HTML Email for iOS
Responsive HTML Email for iOS
 
Kauri ph presentation 2012 11 22 full
Kauri ph presentation 2012 11 22 fullKauri ph presentation 2012 11 22 full
Kauri ph presentation 2012 11 22 full
 
Healthcare Open House Presentation
Healthcare Open House PresentationHealthcare Open House Presentation
Healthcare Open House Presentation
 
Xmed 2015 Lucien Engelen
Xmed 2015 Lucien EngelenXmed 2015 Lucien Engelen
Xmed 2015 Lucien Engelen
 
Organics recovery mass recycle r3 gogan
Organics recovery mass recycle r3 goganOrganics recovery mass recycle r3 gogan
Organics recovery mass recycle r3 gogan
 
The road to the future : how technology is changing the way we consider autom...
The road to the future : how technology is changing the way we consider autom...The road to the future : how technology is changing the way we consider autom...
The road to the future : how technology is changing the way we consider autom...
 
50 images of brassai's works
50 images of brassai's works50 images of brassai's works
50 images of brassai's works
 
How To Survive The Zombie Apocalypse
How To Survive The Zombie ApocalypseHow To Survive The Zombie Apocalypse
How To Survive The Zombie Apocalypse
 
Bill Gates
Bill GatesBill Gates
Bill Gates
 
Social Media In Healthcare: Coming of Age
Social Media In Healthcare: Coming of AgeSocial Media In Healthcare: Coming of Age
Social Media In Healthcare: Coming of Age
 
Untitled.fr11
Untitled.fr11Untitled.fr11
Untitled.fr11
 

Similar to Cybercrime and IT ACT

Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
Cybercrime (1)
Cybercrime (1)Cybercrime (1)
Cybercrime (1)aw222
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and securityAjay Singh
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrimeravikanthh
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation Ajith Reddy
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacynetapprad
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer JungleJason S
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPTAnandKaGe
 

Similar to Cybercrime and IT ACT (20)

Cybercrimeg
CybercrimegCybercrimeg
Cybercrimeg
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Cybercrime (1)
Cybercrime (1)Cybercrime (1)
Cybercrime (1)
 
Cybercrime (1)
Cybercrime (1)Cybercrime (1)
Cybercrime (1)
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Information security
Information securityInformation security
Information security
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Tech Topic Privacy
Tech Topic PrivacyTech Topic Privacy
Tech Topic Privacy
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Malware from the Consumer Jungle
Malware from the Consumer JungleMalware from the Consumer Jungle
Malware from the Consumer Jungle
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 

Recently uploaded

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 

Recently uploaded (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 

Cybercrime and IT ACT

  • 1. InformationTechnology Act - An overview By: AKSHAY BHARDWAJ Branch- I.T(C1) PRESENTATION ONPRESENTATION ON CYBER CRIMECYBER CRIME
  • 2. Cyber Crime – “Is the Internet the new “Wild Wild West?”
  • 3. In the News…….  1 out of 5 children received a sexual solicitation or approach over the Internet in a one-year period of time (www.missingchildren.com)  California warns of massive ID theft – personal data stolen from computers at University of California,Berkeley (Oct 21,2004 IDG news service)  Microsoft and Cisco announced a new initiative to work together to increase internet security (Oct 18,2004 www.cnetnews.com)
  • 4. The New Wild Wild West More cyber criminals than cyber cops Criminals feel “safe” committing crimes from the privacy of their own homes Brand new challenges facing law enforcement Most not trained in the technologies Internet crimes span multiple jurisdictions Need to retrofit new crimes to existing laws
  • 5. Computer Crime Computer used to commit a crime Child porn, threatening email, assuming someone’s identity, defamation, spam, phishing Computer as a target of a crime  Viruses, worms, industrial espionage, software piracy, hacking
  • 6. Computer Forensics  What is it?  an autospy of a computer or network to uncover digital evidence of a crime  Evidence must be preserved and hold up in a court of law  Growing field – Many becoming computer forensic savvy  FBI, State and Local Police, IRS, Homeland Security  Defense attorneys, judges and prosecutors  Independent security agencies  White hat or Ethical Hackers  Programs offered at major universities such as URI http://homepage.cs.uri.edu/faculty/wolfe/cf
  • 7. Uncovering Digital Evidence Smart Criminals don’t use their own computers  Floppy disks  Zip/Jazz disks  Tapes  Digital cameras  Memory sticks  Printers  CDs  PDAs  Game boxes  Networks  Hard drives
  • 8. Digital Evidence Criminals Hide Evidence  Delete their files and emails  Hide their files by encryption, password protection, or embedding them in unrelated files (dll, os etc)  Use Wi-Fi networks and cyber cafes to cover their tracks Forensics Uncover Evidence  Restore deleted files and emails – they are still really there!  Find the hidden files through complex password, encryption programs, and searching techniques  Track them down through the digital trail - IP addresses to ISPs to the offender Not obvious…….it’s most likely hidden on purpose or needs to be unearthed by forensics experts
  • 9. The Crime Scene (with Computer Forensics)  Similar to traditional crime scenes  Must acquire the evidence while preserving the integrity of the evidence  No damage during collection, transportation, or storage  Document everything  Collect everything the first time  Establish a chain of custody  But also different…….  Can perform analysis of evidence on exact copy!  Make many copies and investigate them without touching original  Can use time stamping/hash code techniques to prove evidence hasn’t been compromised
  • 10. Spam Viruses/Worms Industrial Espionage and Hackers Wi-Fi High Jacking Top Cyber Crimes that Attack Business
  • 11. Spam “Spam accounts for 9 out of every 10 emails in the United States.” “We do not object to the use of this slang term to describe UCE (unsolicited commercial email),although we do object to the use of the word“spam”as a trademark and the use of our product image in association with that term”
  • 12. Can-Spam Act of 2003  Controlling the Assault of Non-Solicited Pornography and Marketing Act (Can- Spam)  Signed into law by President Bush on Dec 16, 2003  Took effect Jan 1, 2004  Unsolicited commercial email must:  Be labeled  Include Opt-Out instructions  No false headers  FTC is authorized (but not required) to establish a “do-not-email” registry  www.spamlaws.com –lists all the latest in federal, state, and international laws
  • 13. Spam is Hostile  You pay for Spam, not Spammers  Email costs are paid by email recipients  Spam can be dangerous  Never click on the opt-out link!  May take you to hostile web site where mouse- over downloads an .exe  Tells spammers they found a working address  They won’t take you off the list anyway  What should you do?  Filter it out whenever possible  Keep filters up to date  If you get it, just delete the email
  • 14. Viruses and Worms  Different types of “ailments”  Viruses  software that piggybacks on other software and runs when you run something else  Macro in excel, word  Transmitted through sharing programs on bulletin boards  Passing around floppy disks  An .exe, .com file in your email  Worms  software that uses computer networks to find security holes to get in to your computer – usually in Microsoft OS!! But worm for MAC was recently written
  • 15. Hackers are Everywhere  Stealing data  Industrial Espionage  Identity theft  Defamation  Deleting data for fun  A lot of bored 16 year olds late at night  Turning computers into zombies  To commit crimes  Take down networks  Distribute porn  Harass someone  Ethical/white hat hackers exist too  Help break into networks to prevent crimes Mafia Boy
  • 16. Wireless Fidelity (Wi-Fi) Using antennas to create “hot spots” Hotspots – Internet Access (sometimes free) Newport Harbor -All the boats in Harbor have internet access San Francisco Giants Stadium – Surf the web while catching a game UMass (need to register, but it’s free) Cambridge, MA Philadelphia, PA – just announced – entire city by 2006
  • 17. Wi-Fi High Jacking 60-70% wireless networks are wide open Why are the Wi-Fi networks unprotected? Most people say “Our data is boring” But… criminals look for wireless networks to commit their crimes And… the authorities will come knocking on your door…..
  • 18. Protect your Computers!  Use anti-virus software and firewalls - keep them up to date  Keep your operating system up to date with critical security updates and patches  Don't open emails or attachments from unknown sources  Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist  Back-up your computer data on disks or CDs often  Don't share access to your computers with strangers  If you have a wi-fi network, password protect it  Disconnect from the Internet when not in use  Reevaluate your security on a regular basis  Make sure your employees and family members know this info too!
  • 19. Web sites of Interest http://homepage.cs.uri.edu/faculty/wolfe/cf www.missingchildren.com www.spamlaws.com www.netsmartz.org http://www.ifccfbi.gov - operation web snare – latest cyber crimes to be aware of http://www.dcfl.gov/dc3/home.htm http://www.cops.org/