Cyber Crime
Upcoming SlideShare
Loading in...5
×
 

Cyber Crime

on

  • 629 views

Waiting for ur Comments :) ;)

Waiting for ur Comments :) ;)

Statistics

Views

Total Views
629
Views on SlideShare
629
Embed Views
0

Actions

Likes
0
Downloads
114
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Cyber Crime Presentation Transcript

  • 1. Welcome To MyWelcome To My ProjectProject Cyber CrimeCyber Crime
  • 2. PresentedPresented ByBy Name : Zainab Travadi
  • 3. Why we learn about CYBER CRIME ??Why we learn about CYBER CRIME ?? Because  –  – Because  –  –  – – – – Everybody is using COMPUTERS.Everybody is using COMPUTERS. From white collar criminals to terroristFrom white collar criminals to terrorist organizations And from Teenagers toorganizations And from Teenagers to Adults . Adults .  Conventional crimes like Forgery,Conventional crimes like Forgery, extortion, kidnapping etc. are beingextortion, kidnapping etc. are being committed with the help of computers etc.committed with the help of computers etc. New generation is growingNew generation is growing up withup with computers .computers . MOST IMPORTANT-Monetary transactions areMOST IMPORTANT-Monetary transactions are moving on to the INTERNET.moving on to the INTERNET.
  • 4. • WHAT IS COMPUTER CRIME?WHAT IS COMPUTER CRIME? •   All crimes performed or resorted to byAll crimes performed or resorted to by abuse of electronic media or otherwise,abuse of electronic media or otherwise, with the purposewith the purpose of influencing the functioning of of influencing the functioning of  computer or computer system.computer or computer system. IN SHORTIN SHORT • Computer is a target.Computer is a target. • Computer is a tool of crime.Computer is a tool of crime.
  • 5. Profile of Cyber CriminalProfile of Cyber Criminal • Disgruntled employees.Disgruntled employees. • TeenagersTeenagers • Political HacktivistPolitical Hacktivist • Professional HackersProfessional Hackers • Business RivalBusiness Rival
  • 6.   VICTIMSVICTIMS • GullibleGullible • Desperados and greedyDesperados and greedy peoplepeople • Unskilled & InexperiencedUnskilled & Inexperienced • Unlucky peopleUnlucky people
  • 7. Computer Crimes areComputer Crimes are VulnerableVulnerable • Because of : Anonymity,Because of : Anonymity, • Storage capacity,Storage capacity, • Weakness in OperatingWeakness in Operating System,System, • Lack of Awareness of user .Lack of Awareness of user .
  • 8. • Types of Cyber CrimeTypes of Cyber Crime
  • 9. • HACKINGHACKING • DENIAL OF SERVICEATTACKDENIAL OF SERVICEATTACK • VIRUS DISSEMINATIONVIRUS DISSEMINATION • SOFTWARE PIRACYSOFTWARE PIRACY • IRC CrimeIRC Crime • CREDIT CARD FRAUDCREDIT CARD FRAUD • NETEXTORTIONNETEXTORTION • PHISHINGPHISHING • SPOOFINGSPOOFING • CYBER STALKINGCYBER STALKING • CYBERDEFAMATIONCYBERDEFAMATION • THREATENINGTHREATENING • SALAMI ATTACKSALAMI ATTACK
  • 10. 1) HACKING 1) HACKING  Hacking in simple terms means Hacking in simple terms means   illegal intrusion into a computer illegal intrusion into a computer system without the permission ofsystem without the permission of the computer owner/user.the computer owner/user.
  • 11. 2) DENIAL OF SERVICE ATTACK2) DENIAL OF SERVICE ATTACK This is an act by the criminal, whoThis is an act by the criminal, who floods the bandwidth of the victim’sfloods the bandwidth of the victim’s network or fills his e-mail box withnetwork or fills his e-mail box with spam mail depriving himspam mail depriving him services he is entitled to access orservices he is entitled to access or provideprovide ..
  • 12. 3)VIRUS DISSEMINATION 3)VIRUS DISSEMINATION  • Malicious software thatMalicious software that attaches itself to other softwareattaches itself to other software .. (virus, worms, Trojan Horse,(virus, worms, Trojan Horse, Time bomb Bomb, Rabbit andTime bomb Bomb, Rabbit and Bacterium are the maliciousBacterium are the malicious softwares )softwares )
  • 13. 4) SOFTWARE PIRACY4) SOFTWARE PIRACY • Theft of software through the illegal copyingTheft of software through the illegal copying of Theft of software and genuine programs orof Theft of software and genuine programs or the counterfeiting and distribution ofthe counterfeiting and distribution of products intended to pass for the original .products intended to pass for the original . • Retail revenue losses worldwide are everRetail revenue losses worldwide are ever increasing due to this crime increasing dueincreasing due to this crime increasing due to this crime Can be done in various waysto this crime Can be done in various ways • End user copying, Hard disk loading,End user copying, Hard disk loading, Counterfeiting, etc. Illegal downloads fromCounterfeiting, etc. Illegal downloads from the internet etcthe internet etc
  • 14. 7) CREDIT CARD FRAUD7) CREDIT CARD FRAUD You simply have types of creditYou simply have types of credit card number into www page ofcard number into www page of the vendor for onlinethe vendor for online transaction .transaction . If electronic transaction are notIf electronic transaction are not in the credit card numbers canin the credit card numbers can be stolen the hackers whobe stolen the hackers who can misuse this cardcan misuse this card
  • 15. 6)IRC CRIME6)IRC CRIME • Internet Relay Chat (IRC) servers have chatInternet Relay Chat (IRC) servers have chat rooms in which people from anywhere the worldrooms in which people from anywhere the world can come together and chat with each other .can come together and chat with each other . • Criminals use it for meeting co use it for meetingCriminals use it for meeting co use it for meeting co-conspirators .co-conspirators . • Hackers use it for discussing theirHackers use it for discussing their exploits / sharing the techniques .exploits / sharing the techniques . • Paedophiles use chat rooms to allure smallPaedophiles use chat rooms to allure small children .children . • Cyber Stalking -In order to harass a womanCyber Stalking -In order to harass a woman her telephone numberher telephone number  telephone number is given to others as if she telephone number is given to others as if she wants to befriend males .wants to befriend males .
  • 16. Credit card skimmerCredit card skimmer
  • 17. SkimmerSkimmer
  • 18. How the credit card skimmer is usedHow the credit card skimmer is used
  • 19. • 8) NET EXTORATION8) NET EXTORATION • Copying the company’s confidential dataCopying the company’s confidential data in order to extort said company for hugein order to extort said company for huge amount .amount .
  • 20. • 9) PHISHING9) PHISHING • It is technique of pulling outIt is technique of pulling out confidential information from theconfidential information from the bank/financial institutional accountbank/financial institutional account holders by deceptive accountholders by deceptive account holders means .holders means .
  • 21. 10)Spoofing10)Spoofing • Getting one computer on a networkGetting one computer on a network to to pretend to have the identity ofto to pretend to have the identity of another computer, usually one with,another computer, usually one with, usually one with special accessusually one with special access privileges , so as to obtain accessprivileges , so as to obtain access to the other computers on theto the other computers on the network.network.
  • 22. 11) CYBER STALKING11) CYBER STALKING • The Criminal follows the victim byThe Criminal follows the victim by sending emails, entering the chatsending emails, entering the chat rooms sending frequently.rooms sending frequently.
  • 23. 12) CYBER DEFAMATION12) CYBER DEFAMATION • The Criminal sends emailsThe Criminal sends emails containing defamatory matters to allcontaining defamatory matters to all concerned of  the victim or post theconcerned of  the victim or post the defamatory matters son a websitedefamatory matters son a website on disgruntled employee may doon disgruntled employee may do this against  boss, ex boss, againstthis against  boss, ex boss, against girl, divorced husband against wifegirl, divorced husband against wife etc  etc  
  • 24. 13)THREATENING13)THREATENING • The Criminal sends threateningThe Criminal sends threatening email or comes in contact in chatemail or comes in contact in chat rooms with victim.rooms with victim. • (Any one disgruntled may do this(Any one disgruntled may do this against boss, friend or official)against boss, friend or official)
  • 25. 14)SALAMI ATTACK 14)SALAMI ATTACK  • In such crime criminal makesIn such crime criminal makes insignificant changes in such a mannerinsignificant changes in such a manner that such changes would go unnoticed.that such changes would go unnoticed. Criminal makes such program thatCriminal makes such program that deducts small amount like Rs. 2.50 perdeducts small amount like Rs. 2.50 per month from the account of all themonth from the account of all the customer of the Bank and deposit thecustomer of the Bank and deposit the same in his account. In this case nosame in his account. In this case no account holder will approach the bank foraccount holder will approach the bank for such small amount but criminal gainssuch small amount but criminal gains huge amount.huge amount.
  • 26. 15) SALE OF NARCOTICS15) SALE OF NARCOTICS • Sale & Purchase through net.Sale & Purchase through net. • There are web site which offer sale andThere are web site which offer sale and shipment of contrabands drugs.shipment of contrabands drugs. •   They may use the techniquesThey may use the techniques of stegnography for hidingof stegnography for hiding the messages.the messages.