2. AGENDA
What is Cyber Crime?
CIA triad
Cyber crimes using Mobile
Cyber crime with computer and internet
Hacking
identity theft
Cyber Stalking
Cyber Defamation
Pornography
Other Important Cyber Crimes
Phishing
Email Spoofing
Cyber Piracy
Cyber Terrorism
Cyber Terrorism
Government Power to Intercept
Online Cheating & Lottery Scam
Cyber warfare
Sunday, August 6, 2017
Suresh Kumar K
3. WHAT IS CYBER
CRIME?
Cyber crime, or computer related crime, is crime that involves a
computer and a network. The computer may have been used in
the commission of a crime, or it may be the target.
Or
Offences that are committed against individuals or groups of
individuals with a criminal motive to intentionally harm the
reputation of the victim or cause physical or mental harm, or loss,
to the victim directly or indirectly, using modern
telecommunication networks such as Internet (networks including
but not limited to Chat rooms, emails, notice boards and groups)
and mobile phones (Bluetooth/SMS/MMS)"
Sunday, August 6, 2017
Suresh Kumar K
4. Sunday, August 6, 2017
Suresh Kumar K
A report (sponsored by McAfee) estimates
that the annual damage to the global
economy is at $445 billion
In 2016, a study by Juniper Research
estimated that the costs of cybercrime
could be as high as 2.1 trillion by 2019.
China
USA
India
Netherlands
Taiwan
Symantec Corps
5. Sunday, August 6, 2017
Suresh Kumar K
Crime in India – 2015(http://ncrb.gov.in/)
7. CYBER CRIMES USING MOBILE
Cyber bullying
Sexting
Privacy violation
Malware
Mobile cyber stalking
Sunday, August 6, 2017
Suresh Kumar K
Your Information Is Your Asset
Tangible
Intangible assets
9. CYBER CRIME WITH COMPUTER
AND INTERNET
Sunday, August 6, 2017
Suresh Kumar K
10. HACKING
Unauthorized access of Computer, Computer Resources,
Computer Network, Telecommunication Devices,
Telecommunication Media, etc. with an intention to take the
control over the information stored in it or transmitting through the
Cyber Space
Section 65 & 66 of IT Act
Sunday, August 6, 2017
Suresh Kumar K
11. IDENTITY THEFT
Whoever, fraudulently or dishonestly make use of the electronic
signature, password or any other unique identification feature of
any other person
Section 66C of IT Act
Sunday, August 6, 2017
Suresh Kumar K
12. CYBER STALKING
Cyber Stalking is generally considered as use of the Internet, e-
mail or other electronic communications device to stalk or harass
a person. A person following another especially women and
continuously harassing through online
Section 66 of IT Act
Sunday, August 6, 2017
Suresh Kumar K
13. CYBER DEFAMATION
Publishing statements lowering the reputation of persons. When
someone publishes defamatory matter about someone on a
website or sends e-mails, pictures, etc. containing defamatory
information to all of that person's friends or on the internet.
66A of IT Act
Sunday, August 6, 2017
Suresh Kumar K
16. PHISHING
phishing is a fraudulent attempt, usually made through emails, SMS,
phone calls, etc. to seeking your personal information. Criminal sends
false links and creates a “mirror” website that looks like a legitimate
website for trapping this crime. The fake website will fool people and
taking into the criminal’s site and collect your valuable information like
your user name and password.
Sec 420, 464 IPC & Sec 66 D of IT Act
Sunday, August 6, 2017
Suresh Kumar K
17. EMAIL SPOOFING
E-mail spoofing is the forgery of an e-mail header so that the
message appears to have originated from someone or somewhere
other than the actual source. A spoofed email is one that appears to
originate from one source but actually has been sent from another
source.
Section 66 D of IT Act
Sunday, August 6, 2017
Suresh Kumar K
https://emkei.cz/
18. CYBER PIRACY
Cyber Piracy is defined as art of making illegal copies of Music,
Movies, Videos, Books, software etc. for the purpose of sale
Sunday, August 6, 2017
Suresh Kumar K
19. CYBER TERRORISM
Whoever uses cyberspace with intent to threaten the unity,
integrity, security or sovereignty of India or to strike terror in the
people. Punishment - Imprisonment which may extent to life
imprisonment
Sec 66 F of IT Act
Sunday, August 6, 2017
Suresh Kumar K
20. GOVERNMENT POWER
TO INTERCEPT
Government to intercept, monitor or decrypt any information
generated through any computer resource if it thinks to do so in
the interest of the sovereignty or integrity of India.
Section 69 of IT Act
Sunday, August 6, 2017
Suresh Kumar K
Pakistan govt website
hacked, Indian national
anthem posted
21. ONLINE CHEATING &
LOTTERY SCAM
Sending group Emails, SMS, etc to people in the form of lottery
prize distribution, Job offers, Charity work, etc. People are
advised to not respond with these SMS or Email and inform the
police, if it is disturbing you. Don’t reply to this SMS or Emails and
don’t share any personal information and money with them.
Sunday, August 6, 2017
Suresh Kumar K
22. CYBER WARFARE
Denial of service attack
(http://map.norsecorp.com/#/)
Stuxnet
Zero Days Documentary 2016
Sunday, August 6, 2017
Suresh Kumar K
23. MALWARE
Virus :
• Melisa virus
Worm :
• I Love You Virus
Botnet :
• 2007 Strom
Sunday, August 6, 2017
Suresh Kumar K
Trojan :
• Spyware
Ransomware:
• Wannacry
• Petya
social engineering
You are the shield