Presented BySiddharth Anand

ECONOMICS(H)
SECTION-A
CONTENTS
 Introduction

 History of cyber crime
 Definition
 Categories of cyber crime
 Role of computer in crime
 C...
INTRODUCTION
The internet in India is growing rapidly. It has
given rise to new opportunities in every field
we can think...
HISTORY OF CYBER CRIME
 THE FIRST RECORDED CYBER CRIME IN THE 1820.

In 1820, Joseph-Marie Jacquard, a textile
manufactur...
DEFINING CYBER CRIME
 It’s an unlawful act wherein the computer is either

a tool or a target or both.

 Acts that are p...
CATEGORIES OF CIBER CRIME
1. Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against gover...
CYBER ATTACKS STATISTICS(2013)

Source-hackmageddon.com
ROLE OF COMPUTER IN CRIME
COMPUTER AS
TARGET

Source-interaksyon.com

COMPUTER AS
TOOL
COMPUTER AS
APPLIANCE
CYBER CRIMINALS
Insider Threats

Hackers

Hactivists'

(employees)

(teenage thrill-seekers to
sophisticated criminals)

(...
Frequently Used Cyber Crimes
 Unauthorized access to computer







systems or networks.
Theft of information conta...
 Virus / worm attacks
 Logic bombs

 Trojan attacks
 Internet time thefts
 Web jacking
 Theft of computer system

So...
PHISHING
(A GROWING PROBLEM)
LINK MANIPULATION

A deception designed to steal valuable
personal data, such as credit card
...
GLOBAL PHISHING SURVEY 2012

Source-docs.apwg.org
EXAMPLE

WHOIS 210.104.211.21:
Location: Korea, Republic Of

Source-hongkiat.com

Images from Anti-Phishing Working Group’...
Source-hongkiat.com
PEREVENTION
USE STRONG PASSWORDS
SECURE YOUR COMPUTER
1)

ACTIVATE YOUR FIREWALL

2)

USE ANTI-VIRUS

3)

BLOCK SPYWARE ...
BE SOCIAL –MEDIA SAVVY

SECURE YOUR MOBILR DEVICES.
INSTALL LATEST OS.
SECURE WIRELESS NETWORK.

PROTECT YOUR E-IDENT...
CONCLUSION
“BYTES ARE REPLACING BULLETS IN
THE CRIME WORLD”
India needs a good combination of laws
and technology, in harm...
THANKYOU
Upcoming SlideShare
Loading in...5
×

CYBER CRIME( DU PRESENTATION FOR FYUP)

7,692

Published on

Published in: Education, Technology
0 Comments
7 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
7,692
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
747
Comments
0
Likes
7
Embeds 0
No embeds

No notes for slide

CYBER CRIME( DU PRESENTATION FOR FYUP)

  1. 1. Presented BySiddharth Anand ECONOMICS(H) SECTION-A
  2. 2. CONTENTS  Introduction  History of cyber crime  Definition  Categories of cyber crime  Role of computer in crime  Cyber criminals  Phishing  Prevention source-michielwillens.com
  3. 3. INTRODUCTION The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.
  4. 4. HISTORY OF CYBER CRIME  THE FIRST RECORDED CYBER CRIME IN THE 1820. In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
  5. 5. DEFINING CYBER CRIME  It’s an unlawful act wherein the computer is either a tool or a target or both.  Acts that are punishable by the Information Technology Act.  Cyber space is a virtual space that has become as important as real space for business, politics, and communities
  6. 6. CATEGORIES OF CIBER CRIME 1. Cyber crimes against persons. 2. Cyber crimes against property. 3. Cyber crimes against government.
  7. 7. CYBER ATTACKS STATISTICS(2013) Source-hackmageddon.com
  8. 8. ROLE OF COMPUTER IN CRIME COMPUTER AS TARGET Source-interaksyon.com COMPUTER AS TOOL COMPUTER AS APPLIANCE
  9. 9. CYBER CRIMINALS Insider Threats Hackers Hactivists' (employees) (teenage thrill-seekers to sophisticated criminals) (overloads e-mail servers or hack web sites to send political message) Virus writers Criminal groups Sensitive intrusions (writes viruses to that infect systems) Information warfare (alternative to military attacks) (attack systems & steal password for financial gain) (sensitive information is obtained via computer intrusions) Terrorists Cyber Warfare (who have potential to disrupt government systems with computer attacks) (attack by sovereigns --- Crime or Declaration of war)
  10. 10. Frequently Used Cyber Crimes  Unauthorized access to computer      systems or networks. Theft of information contained in electronic form. Email bombing. Data diddling. Salami attacks. Denial of Service attack.
  11. 11.  Virus / worm attacks  Logic bombs  Trojan attacks  Internet time thefts  Web jacking  Theft of computer system Source:bostinno.streetwise.co  Physically damaging a computer system
  12. 12. PHISHING (A GROWING PROBLEM) LINK MANIPULATION A deception designed to steal valuable personal data, such as credit card numbers, passwords, account data, or other information. Source-pcwordl.com
  13. 13. GLOBAL PHISHING SURVEY 2012 Source-docs.apwg.org
  14. 14. EXAMPLE WHOIS 210.104.211.21: Location: Korea, Republic Of Source-hongkiat.com Images from Anti-Phishing Working Group’s Phishing Archive
  15. 15. Source-hongkiat.com
  16. 16. PEREVENTION USE STRONG PASSWORDS SECURE YOUR COMPUTER 1) ACTIVATE YOUR FIREWALL 2) USE ANTI-VIRUS 3) BLOCK SPYWARE ATTACKS
  17. 17. BE SOCIAL –MEDIA SAVVY SECURE YOUR MOBILR DEVICES. INSTALL LATEST OS. SECURE WIRELESS NETWORK. PROTECT YOUR E-IDENTITY
  18. 18. CONCLUSION “BYTES ARE REPLACING BULLETS IN THE CRIME WORLD” India needs a good combination of laws and technology, in harmony with the laws of other countries and keeping in mind common security standards.
  19. 19. THANKYOU
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×