Presented by
Dheeraj Dani
7737401991
Contents:
 Introduction
 What is Cyber Crime?
 History of cyber crime
 Definition
 Categories of cyber crime
 CYBER ...
INTRODUCTION
 The internet in India is growing rapidly. It has given

rise to new opportunities in every field we can thi...
What is Cyber crime???
• Cyber crime is simply defined as crimes that are

directly related
computers.

• An

to

computer...
History of Cyber Crime
• In the early decades of modern information technology (IT),

computer crimes were largely committ...
DEFINING CYBER CRIME
 It’s an unlawful act wherein the computer is

either a tool or a target or both.

 Acts that are p...
CATEGORIES OF CIBER CRIME
1. Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against gover...
CYBER ATTACKS STATISTICS(2013)
CYBER CRIMINALS
Insider
Threats
Virus writers
(writes viruses to that
infect systems)

Information
warfare
(alternative to...
What is IT Law and Cyber Law
 IT Law is a set of legal enactments, currently in

existence in several countries, which go...
PHISHING
 A deception designed to steal valuable
personal data, such as credit card
numbers, passwords, account data, or ...
GLOBAL PHISHING SURVEY 2012
PEREVENTION
USE STRONG PASSWORDS
SECURE YOUR COMPUTER
1)

ACTIVATE YOUR FIREWALL

2)

USE ANTI-VIRUS

3)

BLOCK SPYWARE ...
 BE SOCIAL –MEDIA SAVVY
 SECURE YOUR MOBILR DEVICES.
 INSTALL LATEST OS.
 SECURE WIRELESS NETWORK.

 PROTECT YOUR E-I...
Why India?
A rapidly growing online
user base








121 Million Internet Users
65 Million Active Internet
Users, up...
 The majority of cybercrimes are centered on fraud and








Phishing,
India is the third-most targeted country ...
Botnets
 A network of compromised computers that have

been infected with malicious code, and can be
remotely-controlled ...
Botnet Threat
 Botnets are a major threat to the Internet
because:
 Consist of a large pool of compromised

computers th...
Attacking Behaviors
 Infecting new hosts



Social engineering and distribution of malicious emails or
other electronic...
Communication Protocols
 In most cases botnets use well defined and

accepted Communication Protocols.
Understanding the ...
Conclusion
 Cybercrime

greatly

affects

individuals, businesses, and national security due to
the pervasiveness ofthe

...
It act and cyber crime
It act and cyber crime
It act and cyber crime
Upcoming SlideShare
Loading in...5
×

It act and cyber crime

1,816

Published on

cyber crime ,phishin,botnets

Published in: Education
0 Comments
5 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,816
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
287
Comments
0
Likes
5
Embeds 0
No embeds

No notes for slide

It act and cyber crime

  1. 1. Presented by Dheeraj Dani 7737401991
  2. 2. Contents:  Introduction  What is Cyber Crime?  History of cyber crime  Definition  Categories of cyber crime  CYBER ATTACKS STATISTICS 2013  Cyber criminals  What is IT Law and Cyber Law  Phishing  Botnet  conclusion
  3. 3. INTRODUCTION  The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education.  There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.
  4. 4. What is Cyber crime??? • Cyber crime is simply defined as crimes that are directly related computers. • An to computers and using increasing number of domestic and international criminal activities are using the Internet. Computers and other electronic devices can be tools to commit crime or are targeted by criminals. A personal computer connected to the Internet without protection may be infected with malicious software in under a minute.
  5. 5. History of Cyber Crime • In the early decades of modern information technology (IT), computer crimes were largely committed disgruntled and dishonest employees. by individual • Physical damage to computer systems was a prominent threat until the 1980s. • Criminals often used unauthorized access to subvert security systems as they modified data for financial gain or destroyed data for revenge. • As telecommunications technology spread throughout the IT world, programmers began writing malicious software, including self-replicating programs, to interfere with personal computers.
  6. 6. DEFINING CYBER CRIME  It’s an unlawful act wherein the computer is either a tool or a target or both.  Acts that are punishable by the Information Technology Act.  Cyber space is a virtual space that has become as important as real space for business, politics, and communities
  7. 7. CATEGORIES OF CIBER CRIME 1. Cyber crimes against persons. 2. Cyber crimes against property. 3. Cyber crimes against government
  8. 8. CYBER ATTACKS STATISTICS(2013)
  9. 9. CYBER CRIMINALS Insider Threats Virus writers (writes viruses to that infect systems) Information warfare (alternative to military attacks) Hactivists' (teenage thrill-seekers to sophisticated criminals) (overloads e-mail servers or hack web sites to send political message) Criminal groups Sensitive intrusions (attack systems & steal password for financial gain) (employees) Hackers (sensitive information is obtained via computer intrusions) Terrorists Cyber Warfare (attack by (who have potential to disrupt government systems with computer attacks) sovereigns --- Crime or Declaration of war)
  10. 10. What is IT Law and Cyber Law  IT Law is a set of legal enactments, currently in existence in several countries, which governs the digital dissemination of both (digitalized) information and software.  Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet. It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many areas of law and regulation. Some leading topics include internet access and usage, privacy, freedom of expression.
  11. 11. PHISHING  A deception designed to steal valuable personal data, such as credit card numbers, passwords, account data, or other information.
  12. 12. GLOBAL PHISHING SURVEY 2012
  13. 13. PEREVENTION USE STRONG PASSWORDS SECURE YOUR COMPUTER 1) ACTIVATE YOUR FIREWALL 2) USE ANTI-VIRUS 3) BLOCK SPYWARE ATTACKS
  14. 14.  BE SOCIAL –MEDIA SAVVY  SECURE YOUR MOBILR DEVICES.  INSTALL LATEST OS.  SECURE WIRELESS NETWORK.  PROTECT YOUR E-IDENTITY
  15. 15. Why India? A rapidly growing online user base      121 Million Internet Users 65 Million Active Internet Users, up by 28% from 51 million in 2010 50 Million users shop online on Ecommerce and Online Shopping Sites 46+ Million Social Network Users 346 million mobile users had subscribed to Data Packages.
  16. 16.  The majority of cybercrimes are centered on fraud and        Phishing, India is the third-most targeted country for Phishing attacks after the US and the UK, Social networks as well as ecommerce sites are major targets, 6.9 million bot-infected systems in 2010, 14,348 website defacements in 2010, 6,850 .in and 4,150 .com domains were defaced during 2011, 15,000 sites hacked in 2011, India is the number 1 country in the world for generating spam.
  17. 17. Botnets  A network of compromised computers that have been infected with malicious code, and can be remotely-controlled through commands sent via the Internet by a botmaster  Used for making money! Who pays:  Internet Advertising companies for downloading adware onto vulnerable PCs  Companies who send spam, viruses and other malware  Google (unintentionally, see Clickbot.A summary)  Used for the heck of it
  18. 18. Botnet Threat  Botnets are a major threat to the Internet because:  Consist of a large pool of compromised computers that are organized by a master.  a.k.a., Zombie Armies  Carry out sophisticated attacks to disrupt, gather sensitive data, or increase armies  Armies are in the 1000’s to aggregate computing power  Communication network allows bots to evolve on compromised hosts
  19. 19. Attacking Behaviors  Infecting new hosts   Social engineering and distribution of malicious emails or other electronic communications (i.e. Instant Messaging) Example - Email sent with botnet diguised as a harmless attachment.  Stealing personal information  Keylogger and Network sniffer technology used on compromised systems to spy on users and compile personal information  Phishing and spam proxy  Aggregated computing power and proxy capability make allow spammers to impact larger groups without being traced.  Distributed Denial of Service (DDoS)  Impair or eliminate availability of a network to extort or disrupt business
  20. 20. Communication Protocols  In most cases botnets use well defined and accepted Communication Protocols. Understanding the communication protocols used helps to: Determine the origins of a botnet attack and the software being used  Allow researchers to decode conversations happening between the bots and the masters   There are two main Communication Protocols used for bot attacks:   IRC HTTP
  21. 21. Conclusion  Cybercrime greatly affects individuals, businesses, and national security due to the pervasiveness ofthe Internet Different countries should work together and use legal, organizational, and technological approaches to combat cybercrime • To reduce the damage to critical infrastructures • To protect the Internet from being abused
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×