CYBER CRIME & SECURITY Presented By: S UNNY  K UMAR  A DITYA 12080088 Seminar Guide: Mr. S UDEEP  E LAYIDOM “ Your compute...
Outline <ul><li>HISTORY </li></ul><ul><li>DEFINITION </li></ul><ul><li>CLASSIFICATION </li></ul><ul><li>DETECTION </li></u...
HISTORY <ul><li>The first recorded cyber crime took place in the year 1820!  </li></ul><ul><li>The loom allowed the repeti...
Introduction   <ul><li>Internet has offered us a much more convenient way to share information across time and place. </li...
CLASSIFICATION OF CYBERCRIME <ul><li>1 .Computer as Target </li></ul><ul><li>2 .Computer as an instrumentality </li></ul><...
COMPUTER AS A TARGET OF A CRIME <ul><li>Physical damage </li></ul><ul><li>Theft or destruction of information (data).  </l...
Computer as an instrumentality .   <ul><li>Crimes were either computers or their contents bare used in furtherance of crim...
Computer as Incidental  <ul><li>With the advent of computer the criminal have started using the technology as an aid for i...
<ul><li>Copyright violation </li></ul><ul><ul><li>Sharing of copyright material – Torrents  </li></ul></ul><ul><li>Softwar...
Types of cyber crime <ul><li>Financial crimes - cheating, credit card frauds, money laundering  Forgery  etc.  </li></ul><...
Types of cyber crime <ul><li>Data Diddling </li></ul><ul><li>Salami attacks </li></ul><ul><ul><ul><li>Email spoofing </li>...
Types of cyber crime <ul><li>Denial of Service attack   </li></ul><ul><li>Virus / worm attacks   </li></ul><ul><li>Logic b...
Email Bombing <ul><li>Sending huge volumes of e-mail </li></ul><ul><li>To an address or server in an attempt to overflow t...
Denial of Service <ul><li>Denial of Service - works by flooding the access routers with bogus traffic. </li></ul><ul><li>D...
 
Data Diddling <ul><li>Changing of data before or during entry into the computer system </li></ul><ul><li>Forging or counte...
 
Salami Attack <ul><li>A series of minor attacks that together results in a larger attack </li></ul><ul><li>Used for financ...
E-mail Spoofing <ul><li>The sender address and other parts of the e-mail header are altered . </li></ul><ul><li>From, Retu...
 
Logic Bomb <ul><li>Is a piece of code intentionally inserted into a software system  </li></ul><ul><li>That will set off a...
H4CK1NG <ul><li>Unauthorized remote computer break-ins via a communication networks such as the Internet </li></ul><ul><li...
What can I do? <ul><li>It is not possible to eliminate cyber crime from the cyber space.  </li></ul><ul><li>It is quite po...
What can I do? <ul><li>Avoiding use of Unauthorized software </li></ul><ul><li>Avoid opening of unknown email. </li></ul><...
 
 
Upcoming SlideShare
Loading in...5
×

Cyber Crime & Security

25,856

Published on

Computer crime, or Cybercrime, refers to any crime that involves a computer and a network, where the computers may or may not have played an instrumental part in the commission of a crime.

The term computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively.

Published in: Technology
8 Comments
13 Likes
Statistics
Notes
No Downloads
Views
Total Views
25,856
On Slideshare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
1,033
Comments
8
Likes
13
Embeds 0
No embeds

No notes for slide

Cyber Crime & Security

  1. 1. CYBER CRIME & SECURITY Presented By: S UNNY K UMAR A DITYA 12080088 Seminar Guide: Mr. S UDEEP E LAYIDOM “ Your computer is the crime scene”
  2. 2. Outline <ul><li>HISTORY </li></ul><ul><li>DEFINITION </li></ul><ul><li>CLASSIFICATION </li></ul><ul><li>DETECTION </li></ul><ul><li>PREVENTION </li></ul>
  3. 3. HISTORY <ul><li>The first recorded cyber crime took place in the year 1820! </li></ul><ul><li>The loom allowed the repetition of a series of steps in the weaving of special fabrics. </li></ul><ul><li>This resulted in a fear amongst employees that their traditional employment was being threatened. </li></ul><ul><li>They committed acts of sabotage to discourage further use of the new technology. </li></ul><ul><li>  </li></ul><ul><li>  </li></ul>
  4. 4. Introduction <ul><li>Internet has offered us a much more convenient way to share information across time and place. </li></ul><ul><li>Cyberspace also opened a new venue for criminal activities. </li></ul><ul><li>The anonymity of cyberspace makes identity tracing a significant problem which hinders investigations. </li></ul><ul><li>Uninformed and misguided users . </li></ul>
  5. 5. CLASSIFICATION OF CYBERCRIME <ul><li>1 .Computer as Target </li></ul><ul><li>2 .Computer as an instrumentality </li></ul><ul><li>3 .Computer as an incidental or other crime </li></ul><ul><li>4 .Crime associated with the prevalence of computers. </li></ul>
  6. 6. COMPUTER AS A TARGET OF A CRIME <ul><li>Physical damage </li></ul><ul><li>Theft or destruction of information (data). </li></ul><ul><li>The spread of viruses , Trojans and worms . </li></ul><ul><li>Software piracy, hacking etc. </li></ul>
  7. 7. Computer as an instrumentality . <ul><li>Crimes were either computers or their contents bare used in furtherance of crime </li></ul><ul><li>Those offences which are committed by manipulating contents of computer systems. </li></ul><ul><li>Include sending e-mails, ransom notes , credit card frauds, telecommunication frauds or theft. </li></ul>
  8. 8. Computer as Incidental <ul><li>With the advent of computer the criminal have started using the technology as an aid for its perpetuation. </li></ul><ul><li>They include use of computers as an aid for drug trafficking, money laundering, etc </li></ul><ul><li>Means of coordinating . </li></ul>
  9. 9. <ul><li>Copyright violation </li></ul><ul><ul><li>Sharing of copyright material – Torrents </li></ul></ul><ul><li>Software piracy </li></ul><ul><ul><li>Selling material protected by copyrights </li></ul></ul><ul><li>Component theft </li></ul>Crime with Prevalence of computers.
  10. 10. Types of cyber crime <ul><li>Financial crimes - cheating, credit card frauds, money laundering Forgery etc. </li></ul><ul><li>Sale of illegal articles: </li></ul><ul><li>Online gambling: </li></ul><ul><li>Intellectual Property crimes </li></ul><ul><li>Theft of information contained in electronic form </li></ul><ul><li>Email bombing </li></ul>
  11. 11. Types of cyber crime <ul><li>Data Diddling </li></ul><ul><li>Salami attacks </li></ul><ul><ul><ul><li>Email spoofing </li></ul></ul></ul><ul><ul><ul><li>Cyber Defamation </li></ul></ul></ul><ul><ul><ul><li>Cyber stalking </li></ul></ul></ul><ul><ul><ul><li>Hacking </li></ul></ul></ul>
  12. 12. Types of cyber crime <ul><li>Denial of Service attack </li></ul><ul><li>Virus / worm attacks </li></ul><ul><li>Logic bombs </li></ul><ul><li>Trojan attacks </li></ul><ul><li>Internet time theft </li></ul><ul><li>Web jacking </li></ul><ul><li>Phishing </li></ul>
  13. 13. Email Bombing <ul><li>Sending huge volumes of e-mail </li></ul><ul><li>To an address or server in an attempt to overflow the mailbox or overwhelm the server </li></ul><ul><li>Zip Bombing </li></ul><ul><li>Methods of email bombing </li></ul><ul><ul><ul><li>Mass Mailing </li></ul></ul></ul><ul><ul><ul><li>Link Listing </li></ul></ul></ul>
  14. 14. Denial of Service <ul><li>Denial of Service - works by flooding the access routers with bogus traffic. </li></ul><ul><li>Distributed DoSs (DDoS5) : coordinated DoS attacks from multiple sources. </li></ul><ul><li>Difficult to block because it uses multiple, changing, source IP addresses. </li></ul>
  15. 16. Data Diddling <ul><li>Changing of data before or during entry into the computer system </li></ul><ul><li>Forging or counterfeiting documents used for data entry </li></ul><ul><li>Exchanging valid disks and tapes with modified replacements. </li></ul><ul><li>Prevention: </li></ul><ul><ul><li>Regular Audits </li></ul></ul><ul><ul><li>Supervising employees </li></ul></ul>
  16. 18. Salami Attack <ul><li>A series of minor attacks that together results in a larger attack </li></ul><ul><li>Used for financial crimes in which criminals steal money or resources a bit at a time from a system </li></ul><ul><li>Prevention: </li></ul><ul><ul><li>Find indications of an attack </li></ul></ul><ul><ul><li>Random audits </li></ul></ul><ul><ul><li>Don't ignore what appear to be errors in computer-based financial systems. </li></ul></ul>
  17. 19. E-mail Spoofing <ul><li>The sender address and other parts of the e-mail header are altered . </li></ul><ul><li>From, Return-Path and Reply-To fields </li></ul><ul><li>Although the e-mail appears to come from the address indicated in the From field it actually comes from another source. </li></ul><ul><li>Prevention </li></ul><ul><ul><ul><li>Antivirus </li></ul></ul></ul><ul><ul><ul><li>Use cryptographic signatures </li></ul></ul></ul>
  18. 21. Logic Bomb <ul><li>Is a piece of code intentionally inserted into a software system </li></ul><ul><li>That will set off a malicious function when specified conditions are met </li></ul><ul><li>Prevention: </li></ul><ul><ul><li>Monitoring system </li></ul></ul><ul><ul><li>Application logs are the keys to identifying unwarranted activity </li></ul></ul>
  19. 22. H4CK1NG <ul><li>Unauthorized remote computer break-ins via a communication networks such as the Internet </li></ul><ul><li>Categories of hackers </li></ul><ul><ul><li>White hat or Ethical Hacker </li></ul></ul><ul><ul><li>Grey hat </li></ul></ul><ul><ul><li>Blue hat </li></ul></ul><ul><ul><li>Black hat </li></ul></ul><ul><ul><li>Elite </li></ul></ul><ul><ul><li>Script kiddie </li></ul></ul>
  20. 23. What can I do? <ul><li>It is not possible to eliminate cyber crime from the cyber space. </li></ul><ul><li>It is quite possible to check them. </li></ul><ul><li>Awareness is the first step in protecting yourself. </li></ul><ul><li>Invest in Anti-virus, Firewall, and SPAM blocking software for your home PC. </li></ul><ul><li>Passwords </li></ul><ul><ul><li>Change passwords on a regular basis </li></ul></ul><ul><ul><li>Use complex passwords </li></ul></ul><ul><li>Do not automatically check boxes before reading the contents of any agreement etc </li></ul>
  21. 24. What can I do? <ul><li>Avoiding use of Unauthorized software </li></ul><ul><li>Avoid opening of unknown email. </li></ul><ul><li>Use internet filtering software. </li></ul><ul><li>Data Level Security </li></ul><ul><ul><li>Using encrypting softwares </li></ul></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×