Your SlideShare is downloading. ×
0
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Cyber Crime & Security
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cyber Crime & Security

25,844

Published on

Computer crime, or Cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime. …

Computer crime, or Cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime.

The term computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively.

Published in: Technology
8 Comments
13 Likes
Statistics
Notes
No Downloads
Views
Total Views
25,844
On Slideshare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
1,033
Comments
8
Likes
13
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. CYBER CRIME & SECURITY Presented By: S UNNY K UMAR A DITYA 12080088 Seminar Guide: Mr. S UDEEP E LAYIDOM “ Your computer is the crime scene”
  • 2. Outline <ul><li>HISTORY </li></ul><ul><li>DEFINITION </li></ul><ul><li>CLASSIFICATION </li></ul><ul><li>DETECTION </li></ul><ul><li>PREVENTION </li></ul>
  • 3. HISTORY <ul><li>The first recorded cyber crime took place in the year 1820! </li></ul><ul><li>The loom allowed the repetition of a series of steps in the weaving of special fabrics. </li></ul><ul><li>This resulted in a fear amongst employees that their traditional employment was being threatened. </li></ul><ul><li>They committed acts of sabotage to discourage further use of the new technology. </li></ul><ul><li>  </li></ul><ul><li>  </li></ul>
  • 4. Introduction <ul><li>Internet has offered us a much more convenient way to share information across time and place. </li></ul><ul><li>Cyberspace also opened a new venue for criminal activities. </li></ul><ul><li>The anonymity of cyberspace makes identity tracing a significant problem which hinders investigations. </li></ul><ul><li>Uninformed and misguided users . </li></ul>
  • 5. CLASSIFICATION OF CYBERCRIME <ul><li>1 .Computer as Target </li></ul><ul><li>2 .Computer as an instrumentality </li></ul><ul><li>3 .Computer as an incidental or other crime </li></ul><ul><li>4 .Crime associated with the prevalence of computers. </li></ul>
  • 6. COMPUTER AS A TARGET OF A CRIME <ul><li>Physical damage </li></ul><ul><li>Theft or destruction of information (data). </li></ul><ul><li>The spread of viruses , Trojans and worms . </li></ul><ul><li>Software piracy, hacking etc. </li></ul>
  • 7. Computer as an instrumentality . <ul><li>Crimes were either computers or their contents bare used in furtherance of crime </li></ul><ul><li>Those offences which are committed by manipulating contents of computer systems. </li></ul><ul><li>Include sending e-mails, ransom notes , credit card frauds, telecommunication frauds or theft. </li></ul>
  • 8. Computer as Incidental <ul><li>With the advent of computer the criminal have started using the technology as an aid for its perpetuation. </li></ul><ul><li>They include use of computers as an aid for drug trafficking, money laundering, etc </li></ul><ul><li>Means of coordinating . </li></ul>
  • 9. <ul><li>Copyright violation </li></ul><ul><ul><li>Sharing of copyright material – Torrents </li></ul></ul><ul><li>Software piracy </li></ul><ul><ul><li>Selling material protected by copyrights </li></ul></ul><ul><li>Component theft </li></ul>Crime with Prevalence of computers.
  • 10. Types of cyber crime <ul><li>Financial crimes - cheating, credit card frauds, money laundering Forgery etc. </li></ul><ul><li>Sale of illegal articles: </li></ul><ul><li>Online gambling: </li></ul><ul><li>Intellectual Property crimes </li></ul><ul><li>Theft of information contained in electronic form </li></ul><ul><li>Email bombing </li></ul>
  • 11. Types of cyber crime <ul><li>Data Diddling </li></ul><ul><li>Salami attacks </li></ul><ul><ul><ul><li>Email spoofing </li></ul></ul></ul><ul><ul><ul><li>Cyber Defamation </li></ul></ul></ul><ul><ul><ul><li>Cyber stalking </li></ul></ul></ul><ul><ul><ul><li>Hacking </li></ul></ul></ul>
  • 12. Types of cyber crime <ul><li>Denial of Service attack </li></ul><ul><li>Virus / worm attacks </li></ul><ul><li>Logic bombs </li></ul><ul><li>Trojan attacks </li></ul><ul><li>Internet time theft </li></ul><ul><li>Web jacking </li></ul><ul><li>Phishing </li></ul>
  • 13. Email Bombing <ul><li>Sending huge volumes of e-mail </li></ul><ul><li>To an address or server in an attempt to overflow the mailbox or overwhelm the server </li></ul><ul><li>Zip Bombing </li></ul><ul><li>Methods of email bombing </li></ul><ul><ul><ul><li>Mass Mailing </li></ul></ul></ul><ul><ul><ul><li>Link Listing </li></ul></ul></ul>
  • 14. Denial of Service <ul><li>Denial of Service - works by flooding the access routers with bogus traffic. </li></ul><ul><li>Distributed DoSs (DDoS5) : coordinated DoS attacks from multiple sources. </li></ul><ul><li>Difficult to block because it uses multiple, changing, source IP addresses. </li></ul>
  • 15.  
  • 16. Data Diddling <ul><li>Changing of data before or during entry into the computer system </li></ul><ul><li>Forging or counterfeiting documents used for data entry </li></ul><ul><li>Exchanging valid disks and tapes with modified replacements. </li></ul><ul><li>Prevention: </li></ul><ul><ul><li>Regular Audits </li></ul></ul><ul><ul><li>Supervising employees </li></ul></ul>
  • 17.  
  • 18. Salami Attack <ul><li>A series of minor attacks that together results in a larger attack </li></ul><ul><li>Used for financial crimes in which criminals steal money or resources a bit at a time from a system </li></ul><ul><li>Prevention: </li></ul><ul><ul><li>Find indications of an attack </li></ul></ul><ul><ul><li>Random audits </li></ul></ul><ul><ul><li>Don't ignore what appear to be errors in computer-based financial systems. </li></ul></ul>
  • 19. E-mail Spoofing <ul><li>The sender address and other parts of the e-mail header are altered . </li></ul><ul><li>From, Return-Path and Reply-To fields </li></ul><ul><li>Although the e-mail appears to come from the address indicated in the From field it actually comes from another source. </li></ul><ul><li>Prevention </li></ul><ul><ul><ul><li>Antivirus </li></ul></ul></ul><ul><ul><ul><li>Use cryptographic signatures </li></ul></ul></ul>
  • 20.  
  • 21. Logic Bomb <ul><li>Is a piece of code intentionally inserted into a software system </li></ul><ul><li>That will set off a malicious function when specified conditions are met </li></ul><ul><li>Prevention: </li></ul><ul><ul><li>Monitoring system </li></ul></ul><ul><ul><li>Application logs are the keys to identifying unwarranted activity </li></ul></ul>
  • 22. H4CK1NG <ul><li>Unauthorized remote computer break-ins via a communication networks such as the Internet </li></ul><ul><li>Categories of hackers </li></ul><ul><ul><li>White hat or Ethical Hacker </li></ul></ul><ul><ul><li>Grey hat </li></ul></ul><ul><ul><li>Blue hat </li></ul></ul><ul><ul><li>Black hat </li></ul></ul><ul><ul><li>Elite </li></ul></ul><ul><ul><li>Script kiddie </li></ul></ul>
  • 23. What can I do? <ul><li>It is not possible to eliminate cyber crime from the cyber space. </li></ul><ul><li>It is quite possible to check them. </li></ul><ul><li>Awareness is the first step in protecting yourself. </li></ul><ul><li>Invest in Anti-virus, Firewall, and SPAM blocking software for your home PC. </li></ul><ul><li>Passwords </li></ul><ul><ul><li>Change passwords on a regular basis </li></ul></ul><ul><ul><li>Use complex passwords </li></ul></ul><ul><li>Do not automatically check boxes before reading the contents of any agreement etc </li></ul>
  • 24. What can I do? <ul><li>Avoiding use of Unauthorized software </li></ul><ul><li>Avoid opening of unknown email. </li></ul><ul><li>Use internet filtering software. </li></ul><ul><li>Data Level Security </li></ul><ul><ul><li>Using encrypting softwares </li></ul></ul>
  • 25.  
  • 26.  

×