SlideShare a Scribd company logo
1 of 33
Introduction to Cybercrime
Chapter 1
Introduction
Cybercrime: Definition and Origins of the
Word
Cybercrime and Information Security
Who are Cybercriminals?
Classifications of Cybercrimes
 Internet in India is growing rapidly
 Unrestricted no. of free websites, the Internet has deniably
opened a new exploitation known as cybercrime
 Activates involve the use of computer, Internet, Cyberspace
and WWW
 1st recorded cybercrime took place in the year 1820
 Indian corporate and government sites have been attacked or
defaced more than 780 times between Feb 2002 & Dec 2002
 3,286 Indian websites were hacked in 5months – between
Jan & June 2009
Cyberspace: (by William Gibson in 1984)
• Worldwide n/w of Computer networks that uses
the TCP/IP for communication to facilitate
transmission and exchange of data
Cybersquatting:
• Means registering, selling or using a domain name
with intent of profiting from goodwill of someone
else’s trademark
 Cyberpunk: (by Bruce Bethke, 1980)
• Mean something like “anarchy via machine” or
“machine/computer rebel movement”
 Cyberwarfare:
• Means information warriors unleashing vicious attacks
against an unsuspecting opponent’s computer
networks, wreaking havoc and paralyzing nations.
 Cyberterrorism: (by Barry Collin, 1997)
• Use of disruptive activities, or the threat, against
computers and/or networks, with the intention to cause
harm or further social, ideological, religious, political or
similar objectives or to intimidate any person in
furtherance of such objectives
 “A crime conducted in which a computer was
directly or significantly instrumental”
 “Cybercrime is any illegal behavior, directed
by means of electronic operations, that
targets the security of computer systems and
the data processed by them.”
 Computer related crime, Computer crime,
Internet crime, E-crime, High-tech crime etc.
are synonymous terms
Few definition of Cyber Crime:
• A crime committed using a computer and the
Internet to steal person’s identity
• Crime completed either on or with a computer
• Any illegal activity done through the Internet or on
the computer
• All criminal activities done using the medium of
computers, the Internet, cyberspace and WWW
Types of attack
• Techno-crime:
 A premeditated act against a system or systems with
the intent to copy, steal, corrupt or otherwise deface or
damage part of or the complete computer system
 Possible when computer connected with the Internet 24
X 7
• Techno-vandalism:
 These acts of “brainless” defacement of websites
and/or other activities, such as copying files and
publicizing their contents publicly
Cybersecurity means protecting
information, equipment, devices, computer,
computer resource, communication device
and information stored therein from
unauthorized access, use, disclosure,
disruption, modification or destruction
Categorized in 3 groups:
• Type I: Cybercriminals- hungry for recognition
 Hobby hackers
 IT professionals
 Politically motivated hackers
 Terrorist organizations
• Type II: Cybercriminals- not interested in
recognition
 Psychological perverts
 Financially motivated hackers
 State-sponsored hacking
 Organized criminals
• Type III: cybercriminals- the insiders
 Former employees seeking revenge
 Competing companies using employees to gain
economic advantage through damage and/or theft
1. Cybercrime against individual:
• E-Mail spoofing and other online fraud
• Phishing
• Spamming
• Cyberdefamation
• Cyberstalking and harassment
• Computer sabotage
• Pornographic offenses
2. Cybercrime against property:
• Credit card frauds
• Intellectual property crime
• Internet time theft
3. Cybercrime against organization:
• Unauthorized accessing of computer
• Password sniffing
• Denial-of-service attacks
• Virus
• E-Mail bombing
• Salami attack
• Logic bomb
• Trojan horse
• Data diddling
• Industrial spying
• Crimes emanating from Usenet newsgroup
• Computer network intrusions
• Software piracy
4. Cybercrime against society:
• Forgery
• Cyberterrorism
• Web jacking
5. Crimes emanating from Usenet
newsgroup:
• Usenet group may carry very offensive, harmful,
inaccurate or otherwise inappropriate material or
postings that have been misplaced or are
deceptive in another way
A spoofed email is one in which e-mail
header is forged so that mail appears to
originate from one source but actually has
been sent from another source
Spamming means sending multiple copies
of unsolicited mails or mass e-mails such
as chain letters.
Difficult to control
In context of “search engine spamming”,
spamming is alternation or creation of a
document with the intent to deceive an
electronic catalog or filing system
Cognizable offense
This occurs when defamation takes place
with the help of computers and / or the
Internet.
E.g. someone publishes defamatory matter
about someone on a website or sends e-
mails containing defamatory information.
 The usage of the Internet hours by an
unauthorized person which is actually paid
by another person
Comes under hacking
When negligible amounts are removed &
accumulated in to something larger. These
attacks are used for the commission of
financial crimes.
This kind of an attack involves altering raw
data just before it is processed by a
computer and then changing it back after
the processing is completed.
Currency notes, revenue stamps, mark
sheets etc can be forged using computers
and high quality scanners and printers.
Hackers gain access and control over the
website of another, even they change the
content of website for fulfilling political
objective or for money.
“Spies” can get information about product
finances, research and development and
marketing strategies, an activity known as
Industrial spying.
Every act committed toward breaking into
computer and/or network is hacking
The purpose of hacking Power, publicity,
revenge, adventure, desire to access
forbidden information, destructive mindset
Spoofing website and E-Mail security
alerts, lottery frauds, virus hoax E-Mail
Child pornography means visual depiction
Theft of software through the illegal
copying of genuine programs or the
counterfeiting and distribution of products
intended to pass for the original.
Illegal copying of programs, distribution of
copies of software
The use of the Internet to hinder the
normal functioning of a computer system
through the introduction of worms, viruses
or logical bombs is referred to as computer
sabotage
Sending a large no. of E-Mails to the victim
to crash victim’s E-Mail account or to make
victim’s server crash
Usenet is a popular means of sharing and
distributing information on the web with
respect to specific subjects or topic
Following criminal use Usenet:
• Distribution/sale of pornographic material
• Distribution/sale of pirated software package
• Distribution of hacking software
• Sale of stolen credit card number
• Sale of stolen data/stolen property
Crackers can break into computer systems
from anywhere in the world and steal data,
plant viruses, create backdoors, insert
trojan horse or change username and
passwords
Programs that monitor and record the
name and password of network users as
they login at a site
Introduction to cybercrime
Introduction to cybercrime

More Related Content

What's hot

Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxPrinceKumar851167
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and historygururaj lulkarni
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 

What's hot (20)

cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber law
Cyber lawCyber law
Cyber law
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 

Viewers also liked

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrimepatelripal99
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crimeshubhravrat Deshpande
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research PaperWhitney Bolton
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Projecttsdikshit
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Solve 3 Enterprise Storage Problems Today
Solve 3 Enterprise Storage Problems TodaySolve 3 Enterprise Storage Problems Today
Solve 3 Enterprise Storage Problems TodayStephen Foskett
 
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...Vivastream
 
Renesas RL78 The True Low Power Microcontroller Platform
 Renesas RL78 The True Low Power Microcontroller Platform Renesas RL78 The True Low Power Microcontroller Platform
Renesas RL78 The True Low Power Microcontroller PlatformRenesas Electronics Corporation
 
How to refill canon color cartridge 241
How to refill canon color cartridge 241How to refill canon color cartridge 241
How to refill canon color cartridge 241printerfillingstation
 
An Introduction to Faye
An Introduction to FayeAn Introduction to Faye
An Introduction to FayeDarren Oakley
 
Summary -Fish
Summary -FishSummary -Fish
Summary -FishGMR Group
 

Viewers also liked (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Project
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Solve 3 Enterprise Storage Problems Today
Solve 3 Enterprise Storage Problems TodaySolve 3 Enterprise Storage Problems Today
Solve 3 Enterprise Storage Problems Today
 
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...
 
Ambienti di virtualizzazione
Ambienti di virtualizzazioneAmbienti di virtualizzazione
Ambienti di virtualizzazione
 
Renesas RL78 The True Low Power Microcontroller Platform
 Renesas RL78 The True Low Power Microcontroller Platform Renesas RL78 The True Low Power Microcontroller Platform
Renesas RL78 The True Low Power Microcontroller Platform
 
How to refill canon color cartridge 241
How to refill canon color cartridge 241How to refill canon color cartridge 241
How to refill canon color cartridge 241
 
Enterprise TEPPCO Pipeline System Map
Enterprise TEPPCO Pipeline System MapEnterprise TEPPCO Pipeline System Map
Enterprise TEPPCO Pipeline System Map
 
An Introduction to Faye
An Introduction to FayeAn Introduction to Faye
An Introduction to Faye
 
Summary -Fish
Summary -FishSummary -Fish
Summary -Fish
 

Similar to Introduction to cybercrime

Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptxKoukiGaz
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation Priya Saluja
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Cyber crimes publicspeaking
Cyber crimes publicspeakingCyber crimes publicspeaking
Cyber crimes publicspeakingAdarsh
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfAadil83
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptxAmeyBarbade1
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptxImXaib
 

Similar to Introduction to cybercrime (20)

Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber crimes publicspeaking
Cyber crimes publicspeakingCyber crimes publicspeaking
Cyber crimes publicspeaking
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdf
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 

Recently uploaded

Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spaintimesproduction05
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 

Recently uploaded (20)

Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 

Introduction to cybercrime

  • 2. Introduction Cybercrime: Definition and Origins of the Word Cybercrime and Information Security Who are Cybercriminals? Classifications of Cybercrimes
  • 3.  Internet in India is growing rapidly  Unrestricted no. of free websites, the Internet has deniably opened a new exploitation known as cybercrime  Activates involve the use of computer, Internet, Cyberspace and WWW  1st recorded cybercrime took place in the year 1820  Indian corporate and government sites have been attacked or defaced more than 780 times between Feb 2002 & Dec 2002  3,286 Indian websites were hacked in 5months – between Jan & June 2009
  • 4. Cyberspace: (by William Gibson in 1984) • Worldwide n/w of Computer networks that uses the TCP/IP for communication to facilitate transmission and exchange of data Cybersquatting: • Means registering, selling or using a domain name with intent of profiting from goodwill of someone else’s trademark
  • 5.  Cyberpunk: (by Bruce Bethke, 1980) • Mean something like “anarchy via machine” or “machine/computer rebel movement”  Cyberwarfare: • Means information warriors unleashing vicious attacks against an unsuspecting opponent’s computer networks, wreaking havoc and paralyzing nations.  Cyberterrorism: (by Barry Collin, 1997) • Use of disruptive activities, or the threat, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives or to intimidate any person in furtherance of such objectives
  • 6.  “A crime conducted in which a computer was directly or significantly instrumental”  “Cybercrime is any illegal behavior, directed by means of electronic operations, that targets the security of computer systems and the data processed by them.”  Computer related crime, Computer crime, Internet crime, E-crime, High-tech crime etc. are synonymous terms
  • 7. Few definition of Cyber Crime: • A crime committed using a computer and the Internet to steal person’s identity • Crime completed either on or with a computer • Any illegal activity done through the Internet or on the computer • All criminal activities done using the medium of computers, the Internet, cyberspace and WWW
  • 8. Types of attack • Techno-crime:  A premeditated act against a system or systems with the intent to copy, steal, corrupt or otherwise deface or damage part of or the complete computer system  Possible when computer connected with the Internet 24 X 7 • Techno-vandalism:  These acts of “brainless” defacement of websites and/or other activities, such as copying files and publicizing their contents publicly
  • 9. Cybersecurity means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction
  • 10. Categorized in 3 groups: • Type I: Cybercriminals- hungry for recognition  Hobby hackers  IT professionals  Politically motivated hackers  Terrorist organizations • Type II: Cybercriminals- not interested in recognition  Psychological perverts  Financially motivated hackers  State-sponsored hacking  Organized criminals
  • 11. • Type III: cybercriminals- the insiders  Former employees seeking revenge  Competing companies using employees to gain economic advantage through damage and/or theft
  • 12. 1. Cybercrime against individual: • E-Mail spoofing and other online fraud • Phishing • Spamming • Cyberdefamation • Cyberstalking and harassment • Computer sabotage • Pornographic offenses 2. Cybercrime against property: • Credit card frauds • Intellectual property crime • Internet time theft
  • 13. 3. Cybercrime against organization: • Unauthorized accessing of computer • Password sniffing • Denial-of-service attacks • Virus • E-Mail bombing • Salami attack • Logic bomb • Trojan horse • Data diddling • Industrial spying • Crimes emanating from Usenet newsgroup • Computer network intrusions • Software piracy
  • 14. 4. Cybercrime against society: • Forgery • Cyberterrorism • Web jacking 5. Crimes emanating from Usenet newsgroup: • Usenet group may carry very offensive, harmful, inaccurate or otherwise inappropriate material or postings that have been misplaced or are deceptive in another way
  • 15. A spoofed email is one in which e-mail header is forged so that mail appears to originate from one source but actually has been sent from another source
  • 16. Spamming means sending multiple copies of unsolicited mails or mass e-mails such as chain letters. Difficult to control In context of “search engine spamming”, spamming is alternation or creation of a document with the intent to deceive an electronic catalog or filing system
  • 17. Cognizable offense This occurs when defamation takes place with the help of computers and / or the Internet. E.g. someone publishes defamatory matter about someone on a website or sends e- mails containing defamatory information.
  • 18.  The usage of the Internet hours by an unauthorized person which is actually paid by another person Comes under hacking
  • 19. When negligible amounts are removed & accumulated in to something larger. These attacks are used for the commission of financial crimes.
  • 20. This kind of an attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed.
  • 21. Currency notes, revenue stamps, mark sheets etc can be forged using computers and high quality scanners and printers.
  • 22. Hackers gain access and control over the website of another, even they change the content of website for fulfilling political objective or for money.
  • 23. “Spies” can get information about product finances, research and development and marketing strategies, an activity known as Industrial spying.
  • 24. Every act committed toward breaking into computer and/or network is hacking The purpose of hacking Power, publicity, revenge, adventure, desire to access forbidden information, destructive mindset
  • 25. Spoofing website and E-Mail security alerts, lottery frauds, virus hoax E-Mail Child pornography means visual depiction
  • 26. Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. Illegal copying of programs, distribution of copies of software
  • 27. The use of the Internet to hinder the normal functioning of a computer system through the introduction of worms, viruses or logical bombs is referred to as computer sabotage
  • 28. Sending a large no. of E-Mails to the victim to crash victim’s E-Mail account or to make victim’s server crash
  • 29. Usenet is a popular means of sharing and distributing information on the web with respect to specific subjects or topic Following criminal use Usenet: • Distribution/sale of pornographic material • Distribution/sale of pirated software package • Distribution of hacking software • Sale of stolen credit card number • Sale of stolen data/stolen property
  • 30. Crackers can break into computer systems from anywhere in the world and steal data, plant viruses, create backdoors, insert trojan horse or change username and passwords
  • 31. Programs that monitor and record the name and password of network users as they login at a site