Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Presented by:-Niraj Solanke
AGENDA •Introduction •What Is Cyber Crime? •Computer Forensics •Digital Evidence •Top Cyber Crimes •How To Protect Your Co...
INTRODUCTION•Computer crime refers to any crime that involves a computer anda network.• The computer may have been used in...
WHAT IS CYBER CRIME?•Offences that are committed againstindividuals or groups of individuals witha criminal motive to inte...
COMPUTER FORENSICS•Computer forensics is a branchof digital forensic science.•Forensics is the process of usingscientific ...
DIGITAL EVIDENCE•Digital evidence isany probative information storedin digital form that a party toa court case may use at...
DIGITAL EVIDENCECriminals Hide Evidence            Forensics Uncover EvidenceDelete their files and emails      Restore de...
TOP CYBER CRIMES •Spam •Computer Virus •Worm •Hacking •Wi-Fi Hijacking
SPAM•Spam is the use of electronicmessaging systems to send unsolicited bulkmessages indiscriminately.•There are various t...
VIRUSES AND WORMS•Virus : A true virus is capable of selfreplication on a machine. It mayspread between files or disks, bu...
HACKING•Hacking is the process of modifying the features of a system.•Hacking is the act of gaining access without legal a...
WI-FI HIJACKING•Wi-Fi high jacking is mainly defined as unauthorized accessingthe Wi-Fi network of the victim.•Accesing so...
HOW TO PROTECT YOUR COMPUTERS? •Use anti-virus software and        •Dont share password of firewalls - keep them up to    ...
CONCLUSION •Much work is needed to increase the security of the Internet and its connected computers and to make the envir...
REFERENCES •http://homepage.cs.uri.edu/faculty/wolfe/cf •www.spamlaws.com •www.netsmartz.org •http://www.ifccfbi.gov -late...
Cyber crime
Upcoming SlideShare
Loading in …5
×

Cyber crime

1,279 views

Published on

This is a presentation created by me for the paper presentation competition.

Published in: Technology, News & Politics
  • Be the first to comment

  • Be the first to like this

Cyber crime

  1. 1. Presented by:-Niraj Solanke
  2. 2. AGENDA •Introduction •What Is Cyber Crime? •Computer Forensics •Digital Evidence •Top Cyber Crimes •How To Protect Your Computer? •Conclusion
  3. 3. INTRODUCTION•Computer crime refers to any crime that involves a computer anda network.• The computer may have been used in the commission of a crime, or itmay be the target.•Cyber crime is an evil having its origin in the growing dependence oncomputers in modern life.•Computer crime can involve criminal activities such as theft, fraud whichare subject to the criminal lawsuit .
  4. 4. WHAT IS CYBER CRIME?•Offences that are committed againstindividuals or groups of individuals witha criminal motive to intentionally harmthe reputation of the victim.•Cyber crime can be divided into twocategories: 1.Crimes that primarily targetcomputer networks or devices. 2.Crimes that use computernetworks or devices to advance otherends.
  5. 5. COMPUTER FORENSICS•Computer forensics is a branchof digital forensic science.•Forensics is the process of usingscientific knowledge for collecting,analyzing, and presenting evidenceto the courts.•The goal of computer forensics is toexamine digital media in aforensically sound manner.•Computer forensics will help you ensure the overall integrityand survivability of your network infrastructure.•An autopsy of a computer or network to uncover digitalevidence of a crime
  6. 6. DIGITAL EVIDENCE•Digital evidence isany probative information storedin digital form that a party toa court case may use at trial.•The use of digital evidence hasincreased in the past fewdecades.•Digital evidence tends to moredifficult to destroy, easilymodified, easilyduplicated, potentially moreexpressive, and more readilyavailable.• Evidence must be preserved and hold up in a court of law.
  7. 7. DIGITAL EVIDENCECriminals Hide Evidence Forensics Uncover EvidenceDelete their files and emails Restore deleted files and emails – they are still really there!Hide their files by Find the hidden files throughencryption, password complex password, encryptionprotection, or embedding programs, and searchingthem in unrelated files (dll, os techniquesetc)Use Wi-Fi networks and cyber Track them down through thecafes to cover their tracks digital trail - IP addresses to ISPs to the offender
  8. 8. TOP CYBER CRIMES •Spam •Computer Virus •Worm •Hacking •Wi-Fi Hijacking
  9. 9. SPAM•Spam is the use of electronicmessaging systems to send unsolicited bulkmessages indiscriminately.•There are various types of spam:- •E-mail spam •Instant messaging spam •Web search engine spam •Spam in blogs •Social networking spam•Spammer is the person who creates spam.•E-mail spam today is sent viazombie networks.
  10. 10. VIRUSES AND WORMS•Virus : A true virus is capable of selfreplication on a machine. It mayspread between files or disks, but thedefining character is that it canrecreate itself on it’s own with outtraveling to a new host.•Worms :Worm is a small piece ofsoftware that uses computernetworks and security holes toreplicate itself. They are oftendesigned to exploit the filetransmission capabilities found onmany computers.
  11. 11. HACKING•Hacking is the process of modifying the features of a system.•Hacking is the act of gaining access without legal authorization toa computer or computer network.•The person who is consistently engaging in hacking activities, andhas accepted hacking as a lifestyle and philosophy of theirchoice, is called a hacker.•A determined hacker can easily hack anyones computer at homeor at work which are protected or not.
  12. 12. WI-FI HIJACKING•Wi-Fi high jacking is mainly defined as unauthorized accessingthe Wi-Fi network of the victim.•Accesing someones wireless connection without his permission isknown as wifi highjacking.•These are the softwares used for hacking the network:- •Kismet – a wireless network detector •Airodump – captures packets from a wireless route •Aireplay – forges ARP requests •Aircrack – decrypts the WEP keys
  13. 13. HOW TO PROTECT YOUR COMPUTERS? •Use anti-virus software and •Dont share password of firewalls - keep them up to your computers with date strangers •Keep your operating system •If you have a Wi-Fi up to date with critical security network, password protect updates and patches it •Dont open emails or •Disconnect from the attachments from unknown Internet when not in use sources •Back-up your computer data •Reevaluate your security on disks or CDs often. on a regular basis
  14. 14. CONCLUSION •Much work is needed to increase the security of the Internet and its connected computers and to make the environment more reliable for everyone. •Security is a mesh of actions and features and mechanisms. •No one thing makes you secure.
  15. 15. REFERENCES •http://homepage.cs.uri.edu/faculty/wolfe/cf •www.spamlaws.com •www.netsmartz.org •http://www.ifccfbi.gov -latest cyber crimes to be aware of •http://www.dcfl.gov/dc3/home.htm •http://www.cops.org/

×