Your SlideShare is downloading. ×
Cyber crime
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cyber crime

150
views

Published on

If you like this …

If you like this
plz share your views
Thnxzzz.... :)

Published in: Education, Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
150
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. o “IT IS A CRIMINAL ACTIVITY COMMITED ON THE INTERNET. THIS IS A BROAD TERM THAT DESCRIBES EVERYTHING FROM ELECTRONIS CRACKING TO DENIAL OR SERVICE ATTACKS THAT CAUSES ELECTRONIC COMMERCE SITES TO LOOSE MONEY.”
  • 2. USA CHINA GERMANY BRITAIN BRAZIL SPAIN ITALY FRANCE TURKEY POLAND INDIA RUSSIA CANADA SOUTH KOREA TAIWAN JAPAN MEXICO ARGENTINA AUSTRALIA ISRAEL 2% 2% 2% 2% 1% 1% 1% 2% 3% 2% 20% 8% 31% 3% 3% 5% 4% 4%3% 4%
  • 3. There are 9 types of cyber crime. 1. Theft of telecommunications services. 2. Communications in furtherance of criminal conspiracies. 3. Telecommunications piracy. 4. Dissemination of offensive materials. 5. Electronic money laundering and tax evasion. 6. Electronic vandalism, terrorism and extortion. 7. Sales and investment fraud. 8. Illegal interception of telecommunications. 9. Electronic funds transfer fraud.
  • 4. Cyber Crime Variants 1.) Hacking “Hacking“ is a crime, which entails cracking system and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 per cent increase this year. Fake document Identity Theft Social Engineering Get Quick Rich Schemes 36% 9% 9% 46%
  • 5.  Hacking is done via network programming. Hackers prepare programs to break network codes and passwords. If you would have tried breaking these codes until a few years ago, you wouldn't have been successful in doing so if you didn't possess enough programming knowledge. However, the hacking methods have evolved over the years and you are no longer required to have extensive knowledge about network programming in order to accomplish this task. With the hacking methods becoming easier and tools getting cheaper, cyber crime is on the rise.
  • 6.  While unauthorized hacking is a threat for the society ethical hacking helps in various ways. The ethical hackers are hired for assistance in investigations. They are also hired to cover up online fraud. For instance there are times when banks need to hire them in order to hide the activities of notorious hackers from the customers. These activities may include stealing someone's ATM or net banking pin. Till the time the bankers sort out the issues they take help from hackers to hide this fact from the customers so as to avoid any kind of panic amongst them. Thus, hacking can be helpful if done for a noble cause
  • 7. TYPES OF HACKERS         White Hat Grey Hat Blue Hat Script Kiddie Black Hat Elite Hat Neophyte Hacktivist PURPOSE OF UNETHICAL HACKING       Greed Revenge Greed Adventure Destruction Access to forbidden information
  • 8.   The use of Internet services or software with Internet access to defraud victims or to otherwise take advantage of them, for example by stealing personal information, which can even lead to identity theft. A very common form of Internet fraud is the distribution of rogue security software. Internet services can be used to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. Internet fraud can occur in chat rooms, email, message boards, or on websites. Column1 Current Employee for financial Gain Ex-Employee for Financial Gain Disgruntled Ex- employee Contracter Extortion 34% 3% 9% 24% 18% 12%
  • 9.  Lottery frauds are most common online fraud that happens every day on internet. Every day Gmail, Yahoo or Hotmail like mailing portal users receive mails regarding lottery. Such mails comes with popular brand names saying that "You have won 50 Million dollars" from CocaCola, Yahoo, Hotmail and other big names. When you reply to those mails they ask for your bank details to transfer your lottery money. When you send them the details asked, then they ask you to give a processing fee or handling charges. To tell you the fact, such e mails are always misleading and money is never transferred and your bank details are used for other scams or frauds.
  • 10.  Spoof websites and e mails are also a form online fraud and are resulted by technical expertise. In this, a fake website is created which looks like an authentic website, but actually that's a spoof. The purpose of creating such website is to make the user enter personal information and details of his account. Then this information is used to login business and bank accounts of that user. They get traffic to their spoof by shooting spam e mails which misleads them to enter their username and passwords which gets updated to the hacker's server. And thus commit illegal financial transaction making the owner go bankrupt. Be careful to keep yourself away from any such fraud or scam.
  • 11. Phishing o o Phishing is a form cyber crime the employs expertise of social engineering methods to obtain highly confidential information such as passwords of online accounts, pin numbers or codes, account number and bank details, e mail account information and social security number, etc. This is actually done by using the name or identity of any trustworthy person or business in an online communication via e mail or chat, phishing experts get the details revealed like passwords, account & personal information. For ex: You can get a mail on the name your bank saying that due to security reasons your required to change your password for net banking account. Mostly, these mails warn you for negative consequences if ignored.
  • 12.  Spoofing is also an illegal online activity which involves intrusion masquerading a genuine user. In this activity a hacker enters in to a distant computer illegally without any authorization, using a different identity than his original one. This is possible when hacker has already obtained actual password somehow. The hacker then creates a new user by misguiding computer to think that the hacker is a genuine person to do that. Thus after that, the hacker over takes the control of the system and can perform a number frauds using the fake identity the hacker created. For ex: You can get a mail on the name your bank saying that due to security reasons your required to change your password for net banking account. Mostly, these mails warn you for negative consequences if ignored.
  • 13. o All the website providing mailing services like Gmail, Yahoo or MSN etc update their data base with the viruses and related mails and put them in spam when they find it suspicious but then also the hackers or spammers are very smart to crack all and thus spread such fake e mails. So if you get any such suspicious mail then never ignore and after that check about such virus on Google or antivirus websites before taking any action and also do not forward any spam e mails promising you any kinds of reward points
  • 14.  Defamation is basically causing injury to the reputation of a person or a company using false statements or actions. It can be also described as an attack on good faith name and reputation of a person or company by someone who is not in favor that person or company and thus want to float some negative message in the society or market. Defamation is considered to be a crime in almost all the countries of the world including India.
  • 15. There are some more words which interpret almost the same meaning as defamation – calumny, vilification, traducement, slander and libel. All these words explain defamation but there are two major kinds of defamation Libel & slander. Libel is visual defamation which can be in the form of fake prints, misleading pictures or deceptive videos. Libel may be used for written, broadcasted or published words, pictures or videos. This may lead sufferer to hatred, contempt, ridicule and disgrace by people, which may result in worst consequences where people may start avoiding him/her and that can injure the occupation or business.
  • 16.  Slander is also a form of defamation other than Libel (visual defamation). This form is related with the use of transitory statements. It can be explained as a defamation that some one hear, does not see. For example- Someone is talking wrong, spreading rumors and telling lies about a person or a company. Slander is basically an oral statement that is said with a reason to injure the value and respect of the person or company, which may hamper the reputation, profession, trade or business.
  • 17.  There are some other critical reasons which make it important to be aware of defamation laws. One can always prove defamation in words alone without any evidence, but it's always an added advantage when there is a confirm evidence of it. These evidences can be any letter, e mail or an eye witnesses confirming the defamation, etc. One does not have to prove damages in defamation cases, once the defamation is proved damages are presumed. This means one does not have to undergo tests to prove that the person was injured mentally somehow or consulted to any mental doctor or psychiatrist.
  • 18. When any sort of defamation is done using internet then it is called Cyber Defamation. Cyber defamation is a crime which is conducted in cyberspace mostly through the medium of Internet with an aim to defame a person or a company. With increasing use of Internet around the globe, the graph of cyber defamation is increasing like anything. All countries are incorporating cyber laws and amending them in order to combat against this very serious cyber crime called as Cyber Defamation Defamation – Section 499 IPC / Section 67 IT Act –
  • 19.  Whoever publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it, shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to one lakh rupees and in the event of a second or subsequent conviction with imprisonment of either description for a term which may extend to ten years and also with fine which may extend to two lakh rupees.
  • 20.  Identity Theft is another kind of very offensive cyber crime known across the globe. Identity theft actually is way through which criminals somehow obtains the personal information of people who identity they want to use for any illegal purpose. The criminal gets the key personal information & details like Driving License Number, Social Security and Pin Codes of ATM and other cards. Then criminal can use all that information for making purchases online on the name of victim. The Identity theft can lead to serious consequences as the criminal can use the information for immigration or other such important applications. The most serious consequence is that crime is often done by identity theft experts who perform their task very meticulously and thus the charge of crime comes on victim, whose identity has been theft. There are two broad types of Identity Theft - Account Takeover - True Name Theft
  • 21. Account Takeover True Name Theft •Account Takeover is a kind of situation where the criminal uses the information which he has stolen in order to have the access of victim's existing accounts. •Then there may be further misuse using the existing accounts like changing the address so that bill does not reach to victim's place and criminal can enjoy shopping and purchases online through the credit cards the thief runs up. •True Name Theft, the thief by using the personal information of the victim opens new accounts. In this the thief can open new credit card, cellular phones number, check books of the existing account and may misuse all. •Online facilities of banking and credit cards called net baking has made things very easy for these sort of thefts, where only passwords or codes are the keys to do anything and real verification has no role to play as such.
  • 22.        Don’t delete harmful communications ( messages, chat etc.) They will provide vital information about system and address of the person behind these. Try not to panic. If you feel any immediate physical danger contact your local police. Avoid getting into huge arguments online during chat and discussion with other users. Remember that all other internet users are stranger; you do not know who you are chatting with. So be careful. Be extremely careful about how you share personal information about yourself online. Choose your chatting nickname carefully so as other.
  • 23. Indian Crime Scene