Cyber Crime


Published on

  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Hackers use eye catching messages such as “You have won $1,000,000” to get the readers attention. These e-mails can deceive you into giving away important information about yourself. These spam e-mails are also used by hackers to get you to go to a dangerous website or worse to get you to download a program that gives the hacker total control of your computer.Many downloads contain spyware, adware, and viruses that can infect your computer and put you at risk for more serious consequences.Pop-ups, just like spam, are a tool that hackers use to get the reader to infect their own computer. By clicking on pop-ups a virus or spyware can be downloaded. It is another way to get you to put your personal information at risk.Hackers use Active X to gain entrance into your computer and steal important information.
  • Cyber Crime

    1. 1. CYBER CRIMEBy T.Harshitha Rao
    2. 2. • What is cybercrime.• Top 20 countries in cybercrime.• Types of cyber crime.• Some examples of hacked sites.• Punishments and cyber acts.• Do’s and Don’ts.
    3. 3. What is The Invisible Criminals Are Dangerous Than The Visible One…
    4. 4. » “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”.» A generalized definition of cyber crime may be “ unlawful acts wherein the computer is either a tool or target or both”.
    5. 5. .
    6. 6.  The good guys who identify the security weakness of the system or network and inform the owner about them
    7. 7.  A black hat is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network. Also known as ‘cracker’.
    8. 8.  A grey hat, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers
    9. 9. ۵ The challenge... ‘because it’s there!’۵ Ego۵ Espionage۵ Ideology۵ Mischief۵ Money (extortion or theft)۵ Revenge
    10. 10. o Malware is an abbreviated term used to describe a "malicious software" program.o Any type of code or program that is used for monitoring and collecting your personal information or disrupting or damaging your computer, may be referred to as malware.
    11. 11. ¶ Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients.¶ Phishers use a number of different social engineering and e-mail spoofing ploys to try to trick their victims.
    12. 12. ѓ It is a set of tools used frequently by the computer science intruders or crackers that is able to accede illicitly to a computer science system.ѓ These tools serve to hide the processes and archives that allow the intruder to maintain the access to the system, often with malicious aims.
    13. 13.  Spam Downloads Pop-ups Active X
    14. 14.  Window GUI Technology base Forensic Software for examination of File systems FAT12, FAT16, FAT32, NTFS, LINUX, UNIX, MACINTOSH, CDROM and DVD- R. It should able to examine and extracting slack space. It should be able to create image of the storage media e.g. hard disk, Floppy disk. It should show emails in developer’s format. (With headers and attachments) It should open document in language other English spouted by Unicode e.g. Arabian language. It should show Internet history. Forensic Cell phone Seizure kit with write block facility and will all required cables and adapters. Forensic Hardware: One computer PIV 3.2 GHz with 1 GB DDR RAM and other required peripheral. One hard disk write block device.
    15. 15. § Spam , also known as junk email or unsolicited bulk email(UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email.§ Spammers collect email addresses from chatrooms, websites, customer lists, newsgroups, and viruses which harvest users address books, and are sold to other spammers.
    16. 16. ∆ Spyware is a type of malware (malicious software) installed on computers that collects information about users without their knowledge.∆ The presence of spyware is typically hidden from the user and can be difficult to detect.
    17. 17. † Trojan, is a standalone malicious program that does not attempt to infect files unlike a computer virus nor replicate itself with the intent of infecting other computers unlike a computer worm.† Trojan horses can make copies of themselves, steal information, or harm their host computer systems.
    18. 18. ж Computer virus is a computer program that can replicate itself and spread from one computer to another.ж Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers.
    19. 19.  To see how far the virus can spread. To cause damage and destruction to a targeted individual or organisation. To achieve a feeling of superiority/power. To leverage some form of personal gain. To provide a ‘lesson’ in Internet security. To conduct an experiment.
    20. 20. 1 -> i or l || -> n3 -> e |/| -> m4 -> a s -> z7 -> t z -> s9 -> g f -> ph0 -> o$ -> s ph -> f| -> i or l x -> ck ck -> x
    21. 21. Example:1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1swh3|| 1 h4ck3d 1nI did not hack this page, it was like thiswhen I hacked in.
    22. 22. Hackers can leave their ‘graffiti’ on other people’s websites. Many sites have fallen foul of this activity: FBI and CIA NASA British Labour and Conservative Parties New York Times
    23. 23. Spice girlswebsitehacked anddefaced in1999
    24. 24. Facebook lottery scam
    25. 25.  was hacked on 7 Nov 2010. was hacked on 15 July 2011. JNTU homepage after it was hacked
    26. 26. 21 January 2003:Two years jail for UK virus writer who infected 27,000 PCs Simon Vallor, the twenty-twoyear old web designer from NorthWales who, in December 2002,pleaded guilty to writing anddistributing three computer viruses,was today sentenced at SouthwarkCrown Court, London to a two yearcustodial sentence. His viruses -Gokar, Redesi and Admirer – wereproven to have infected 27,000 PCs in42 countries.
    27. 27. Section Offence Cognizable or Non- Bailable or Non-Bailable By what court cognizable 65 Tempering with computer Cognizable Non-Bailable Magistrate of the First Class source code and documents 66 Hacking with computer Cognizable Non-Bailable Magistrate of the First Class system 67 Publishing of information Cognizable Non-Bailable First Conviction which is obscene in electronic Magistrate of the First Class format Second Conviction Court of session 68 Failure of comply with the Cognizable Non-Bailable Magistrate of the First Class directions of Controller 69 Failure to assist intercepting Cognizable Non-Bailable Magistrate of the First Class agency in decrypt-ion
    28. 28. 70 Securing Access to a protected Cognizable Non-Bailable Court of Session system71 Penalty for misrepresentation Non-Cognizable Bailable Any Magistrate72 Breach of confidentiality and Non-Cognizable Bailable Any Magistrate privacy73 Penalty for publishing Digital Non-Cognizable Bailable Any Magistrate Signature Certificate false in certain particulars74 Publication for fraudulent Non-Cognizable Bailable Any Magistrate purpose33 Failure to surrender license by Non-Cognizable Bailable Any Magistrate Certifying Authority
    29. 29. Always use latest and up date antivirus software to guard against virusattacks.Always keep back up volumes so thatone may not suffer data loss in case ofvirus contamination.Always keep a watch on the sites thatyour children are accessing to preventany kind of harassment ordepravation in children.
    30. 30. Avoid disclosing anyinformation pertaining toone.Never send your credit cardnumber to any site that is notsecured, to guard againstfrauds. Always avoid sending anyphotograph onlineparticularly to strangers .
    31. 31. ¢ It is not possible to eliminate cyber crime from the cyber space.¢ It is quite possible to check them.¢ History is the witness that no legislation has succeeded in totally eliminating crime from the globe.¢ The only possible step is to make people aware of their rights and duties.
    32. 32. A final word: Treat your password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months.