SlideShare a Scribd company logo
1 of 13
TABLE OF CONTENTS
• Definition of Cybercrime.
• Types of Cybercrime.
• Hacking and its tools.
• DOS attack
• Phishing and its example.
• Incidences of Cyberattacks in India.
• IT Act of India and its features.
• Cyber security Actions.
• Challenges and future Scope.
• Conclusion.
WHAT IS CYBERCRIME?
 Cyber crime is not an old sort of crime to the world. It is defined as any criminal activity
which takes place on or over the medium of computers or internet or other technology
recognized by the Information Technology Act.
 Cybercriminal activity may be carried out by individuals or groups with relatively little
technical skill, Or by highly organized global criminal groups that may include skilled
developers and others with relevant expertise.
TYPES OF CYBER CRIME
1. Cyber Extortion: A crime involving an attack or threat of an attack coupled with a
demand for money to stop the attack. One form of cyberextortion is the ransomware
attack. Here, the attacker gains access to an organization's systems and encrypts its
documents and files -- anything of potential value -- making the data inaccessible until a
ransom is paid.
2. Crypto Jacking: An attack that uses scripts to mine cryptocurrencies within browsers
without the user's consent. Crypto-jacking attacks may involve loading cryptocurrency
mining software to the victim's system. However, many attacks depend on JavaScript
code that does in-browser mining if the user's browser has a tab or window open on the
malicious site.
3. Identify theft : An attack that occurs when an individual accesses a computer to glean
a user's personal information, which they then use to steal that person's identity or access
their valuable accounts, such as banking and credit cards.
4. Credit card fraud : An attack that occurs when hackers infiltrate retailers' systems to
get the credit card and/or banking information of their customers. stolen payment cards
can be bought and sold in bulk on darknet markets, where hacking groups that have
stolen mass quantities of credit cards profit by selling to lower-level cybercriminals who
profit through credit card fraud against individual accounts.
5. Software piracy: an attack that involves the unlawful copying, distribution and use of
software programs with the intention of commercial or personal use. Trademark
violations, copyright infringements and patent violations are often associated with this
type of cybercrime.
HACKING AND ITS TOOLS
 A hacker is a person who is proficient with computers and/or programming to an expert
level where they know all of the in's and out's of a system. There is NO illegality
involved with being a hacker. A cracker is a hacker who uses his proficiency for
personal gains outside of the law. Ex:- stealing data, changing bank accounts. It's then
safe to say that all crackers are hackers, but not all hackers are crackers.
 Hacking tools :-
 Nmap - scans and detects ports.
 Wireshark - it is a sniffer that lets you capture and interactively browse the contents of
network frames.
 LCP – Windows Password Cracker.
 Super Scan - It is great TCP/IP port scanner which is widely used for detecting the
open ports or live hosts in given IP ranges .
DOS ATTACK AND PHISHING
 A denial-of-service attack (DOS attack) is an attempt to make a computer resource
unavailable to its intended users.
 DoS attacks are commonly launched from one or more points on the Internet that are
external to the victim’s own system or network.
 Phishing is a type of social engineering attack where an attacker sends a fraudulent
message designed to trick a person.
 This type of attack earned its name because, like its homophone "fishing" . In a
phishing attack, bait often appears as a compelling email. Attackers go to great lengths
to ensure that their emails appear as legitimate as possible.
 There are two types of phishing: 1)Standard Attack 2)Spear phishing.
HOW IT IS DONE ?
 Fake websites :- A domain name similar to a legitimate site is bought, and molded to
look exactly like the real thing. The phisher then sends out messages, either by e-mail,
instant messaging, Facebook messages, text messages, and so forth to fool a victim into
clicking a link to the fake site. The unsuspecting victim logs in and their credentials
logged.
 Fake Pop-up :- A link was still sent, however, instead of linking to a fake website, it
would link to the actual website. When the real website loads, a pop-up appears asking
for the user's credentials. The victim, seeing the legitimate site in the background would
think the pop-up was from a legitimate source and enter their information. In reality,
the pop-up would be the hacker's tool to phish credentials.
INCIDENCES OF CYBERATTACKS IN INDIA
 In India too, attacks have been happening with increasing frequency.
 India’s national airline Air India has said a cyber-attack on its data servers affected
about 4.5 million customers around the world. The breach was first reported to the
company in February 2021.
 Nearly 1.16 million cases of cyberattacks were reported in 2020, up nearly three times
from 2019 and more than 20 times compared to 2016, according to government data. On
an average, 3,137 cyber security-related issues were reported every day in 2020.
 In 2016, banks had reportedly announced a leak of personal information of 3.2 million
debit cards.
IT ACT OF INDIA
 Information Technology Act, 2000 is India’s mother legislation regulating the use of
computers, computer systems and computer networks as also data and information in
the electronic format. This legislation has touched varied aspects pertaining to electronic
authentication, digital (electronic) signatures, cyber crimes and liability of network
service providers.
 This Act was amended by Information Technology Amendment Bill, 2008 which was
passed in Lok Sabha on 22nd December, 2008 and in Rajya Sabha on 23rd December,
2008. It received the assent of the President on 5th February 2009 and was notified
with effect from 27/10/2009.
FEATURES OF IT ACT.
 Granting legal recognition to all transactions done through electronic data exchange,
other means of electronic communication or e-commerce in place of the earlier paper-based
communication.
 Facilitating the electronic filing of documents with different Government departments
and also agencies.
 Providing legal recognition to digital signatures for the authentication of any
information or matters requiring authentication.
 Facilitating the electronic storage of data.
SOME IMPORTANT CYBER SAFETY ACTIONS
1.Install OS/Software updates.
2.Run antivirus software.
3.Prevent Identity theft.
4.Turn on personal firewalls.
5.Avoid spyware/adware.
6.Protect passwords.

More Related Content

Similar to cyber crime.pptx

Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
Shishupal Nagar
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
Alexander Decker
 

Similar to cyber crime.pptx (20)

Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

Recently uploaded

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
meharikiros2
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 

cyber crime.pptx

  • 1.
  • 2. TABLE OF CONTENTS • Definition of Cybercrime. • Types of Cybercrime. • Hacking and its tools. • DOS attack • Phishing and its example. • Incidences of Cyberattacks in India. • IT Act of India and its features. • Cyber security Actions. • Challenges and future Scope. • Conclusion.
  • 3. WHAT IS CYBERCRIME?  Cyber crime is not an old sort of crime to the world. It is defined as any criminal activity which takes place on or over the medium of computers or internet or other technology recognized by the Information Technology Act.  Cybercriminal activity may be carried out by individuals or groups with relatively little technical skill, Or by highly organized global criminal groups that may include skilled developers and others with relevant expertise.
  • 4. TYPES OF CYBER CRIME 1. Cyber Extortion: A crime involving an attack or threat of an attack coupled with a demand for money to stop the attack. One form of cyberextortion is the ransomware attack. Here, the attacker gains access to an organization's systems and encrypts its documents and files -- anything of potential value -- making the data inaccessible until a ransom is paid. 2. Crypto Jacking: An attack that uses scripts to mine cryptocurrencies within browsers without the user's consent. Crypto-jacking attacks may involve loading cryptocurrency mining software to the victim's system. However, many attacks depend on JavaScript code that does in-browser mining if the user's browser has a tab or window open on the malicious site.
  • 5. 3. Identify theft : An attack that occurs when an individual accesses a computer to glean a user's personal information, which they then use to steal that person's identity or access their valuable accounts, such as banking and credit cards. 4. Credit card fraud : An attack that occurs when hackers infiltrate retailers' systems to get the credit card and/or banking information of their customers. stolen payment cards can be bought and sold in bulk on darknet markets, where hacking groups that have stolen mass quantities of credit cards profit by selling to lower-level cybercriminals who profit through credit card fraud against individual accounts. 5. Software piracy: an attack that involves the unlawful copying, distribution and use of software programs with the intention of commercial or personal use. Trademark violations, copyright infringements and patent violations are often associated with this type of cybercrime.
  • 6. HACKING AND ITS TOOLS  A hacker is a person who is proficient with computers and/or programming to an expert level where they know all of the in's and out's of a system. There is NO illegality involved with being a hacker. A cracker is a hacker who uses his proficiency for personal gains outside of the law. Ex:- stealing data, changing bank accounts. It's then safe to say that all crackers are hackers, but not all hackers are crackers.  Hacking tools :-  Nmap - scans and detects ports.  Wireshark - it is a sniffer that lets you capture and interactively browse the contents of network frames.  LCP – Windows Password Cracker.  Super Scan - It is great TCP/IP port scanner which is widely used for detecting the open ports or live hosts in given IP ranges .
  • 7. DOS ATTACK AND PHISHING  A denial-of-service attack (DOS attack) is an attempt to make a computer resource unavailable to its intended users.  DoS attacks are commonly launched from one or more points on the Internet that are external to the victim’s own system or network.  Phishing is a type of social engineering attack where an attacker sends a fraudulent message designed to trick a person.  This type of attack earned its name because, like its homophone "fishing" . In a phishing attack, bait often appears as a compelling email. Attackers go to great lengths to ensure that their emails appear as legitimate as possible.  There are two types of phishing: 1)Standard Attack 2)Spear phishing.
  • 8.
  • 9. HOW IT IS DONE ?  Fake websites :- A domain name similar to a legitimate site is bought, and molded to look exactly like the real thing. The phisher then sends out messages, either by e-mail, instant messaging, Facebook messages, text messages, and so forth to fool a victim into clicking a link to the fake site. The unsuspecting victim logs in and their credentials logged.  Fake Pop-up :- A link was still sent, however, instead of linking to a fake website, it would link to the actual website. When the real website loads, a pop-up appears asking for the user's credentials. The victim, seeing the legitimate site in the background would think the pop-up was from a legitimate source and enter their information. In reality, the pop-up would be the hacker's tool to phish credentials.
  • 10. INCIDENCES OF CYBERATTACKS IN INDIA  In India too, attacks have been happening with increasing frequency.  India’s national airline Air India has said a cyber-attack on its data servers affected about 4.5 million customers around the world. The breach was first reported to the company in February 2021.  Nearly 1.16 million cases of cyberattacks were reported in 2020, up nearly three times from 2019 and more than 20 times compared to 2016, according to government data. On an average, 3,137 cyber security-related issues were reported every day in 2020.  In 2016, banks had reportedly announced a leak of personal information of 3.2 million debit cards.
  • 11. IT ACT OF INDIA  Information Technology Act, 2000 is India’s mother legislation regulating the use of computers, computer systems and computer networks as also data and information in the electronic format. This legislation has touched varied aspects pertaining to electronic authentication, digital (electronic) signatures, cyber crimes and liability of network service providers.  This Act was amended by Information Technology Amendment Bill, 2008 which was passed in Lok Sabha on 22nd December, 2008 and in Rajya Sabha on 23rd December, 2008. It received the assent of the President on 5th February 2009 and was notified with effect from 27/10/2009.
  • 12. FEATURES OF IT ACT.  Granting legal recognition to all transactions done through electronic data exchange, other means of electronic communication or e-commerce in place of the earlier paper-based communication.  Facilitating the electronic filing of documents with different Government departments and also agencies.  Providing legal recognition to digital signatures for the authentication of any information or matters requiring authentication.  Facilitating the electronic storage of data.
  • 13. SOME IMPORTANT CYBER SAFETY ACTIONS 1.Install OS/Software updates. 2.Run antivirus software. 3.Prevent Identity theft. 4.Turn on personal firewalls. 5.Avoid spyware/adware. 6.Protect passwords.