Cyber Crime


Published on

PPT on cyber crime

Published in: Education
  • Be the first to comment

Cyber Crime

  1. 1. CYBER CRIME EVOLUTIONOF CRIME FROM BULLETS TO BOOLEAN Prepared By Aritra Ranjan Das, Aparna Roy, Anwesha Paul, Arijit Mukherjee and Arghaneel Bhaumik
  2. 2. CONTENTS  Modern day Crime-organized crime syndicate  Definition & First Occurrence of cyber crime  Categories of Cyber Crime  Weapons of Cyber Crime  Cyber Crimes Against Persons  Cyber Crimes Against Property  Cyber Crimes Against Government  Cyber Crimes Against Society  Cyber Crimes in India  Cyber Security  Safety tips to avoid Cyber Crime  Concluding remarks
  3. 3. MODERN DAY CRIMES- TRANSNATIONAL CRIME SYNDICATES What Is organized Crime? Network of criminals working across the borders to synchronize criminal activities such as extortion, drug trafficking, Human Trafficking, Smuggling, cybercrime, etc. THE RUSSIAN MAFIA - Solntsevskaya Bravta , The brothers Circle, The Odessa Mafia. THE ITALIAN MAFIA - Cosa Nostra(Sicily), La Stidda, Camorra (Naples). THE TRIADS (China)- Dai Huen Jai, 14 K (Hong Kong) THE YAKUZA (Japan)- Yamaguchi Gumi, Sumiyoshi Kai, Inagawa Kai. According to FBI Transnational Organized criminal Syndicates are venturing into the world of cyber crime diverting their attention from the traditional methods. They are hiring top class hackers from all over the globe. The interpol suggests that the Russian Mafia are one of the pioneers of the international Cyber crime industry. Their strength and influence has lead to rise in terror throughout the cyber world.
  4. 4. DEFINITION OF CYBER CRIME • Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs • It’s an unlawful act wherein the computer is either a tool or a target or both. FIRST OCCURENCE OF CYBER CRIME The first spam email took place in 1978 when it was sent out over the Arpanet (Advanced Research Projects Agency Network). The first virus was installed on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the Elk cloner.
  5. 5. CATEGORIES OF CYBER CRIME • Cyber crimes against persons. • Cyber crimes against property. • Cyber crimes against government. • Cyber crimes against society.
  6. 6. WEAPONS OF CYBER CRIME • Hacking: Unauthorized access to any computer systems or networks is known as ‘HACKING’. That is accessing the information of others without proper authorization. • Data diddling: This is altering raw data just before a computer processes it and then changing it back after the processing is completed. • Denial of Service attack: The computer is flooded with more requests than it can handle which cause it to crash. Distributed Denial of Service (DDOS) attack is a example.
  7. 7. WEAPONS OF CYBER CRIME (CONTINUED….) • Email bombing: It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing. • Trojan attacks: This term has its origin in the word ‘Trojan horse’. In software field this means an unauthorized program, which passively gains control over another’s computer by representing itself as an authorized program. The most common form of installing a Trojan is through e-mail. • Web jacking: This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the website of another. He may even manipulate or change the information of the website. This may be done for fulfilling political objectives or for money.
  8. 8. WEAPONS OF CYBER CRIME (CONTINUED….) • Virus/ Worm Attacks: Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on the computer’s memory. • Salami attacks: This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed.
  9. 9. WEAPONS OF CYBER CRIME (CONTINUED….) • Phishing: Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason. The fraudster then has access to the customer’s online bank account and to the funds contained in that account. • Spamming: Electronic spamming is the use of electronic messaging systems to send unsolicited bulk messages (spam), especially advertising, indiscriminately. The most widely recognized form of spam is e-mail spam. • Cyber Stalking: Cyber stalking is the use of the internet or other electronic means to stalk someone. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly.
  10. 10. CYBER CRIMES AGAINST PERSONS Harassment via E-Mails Hacking E-Mail / SMS Spoofing Carding Assault by Threat
  11. 11. CYBER CRIMES AGAINST PROPERTY Intellectual Property Crimes Cyber Squatting Cyber Vandalism Transmitting Virus Internet Time Thefts
  12. 12. CYBER CRIMES AGAINST GOVERNMENT Cyber Terrorism: Cyber Terrorism is a phrase used to describe the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. Examples of Cyber Terrorism: • Hacking into computer systems. • Introducing viruses to vulnerable networks. • Website Defacing. • Denial-of-Service(DoS) attacks. • Terroristic threats made via e-mail.
  13. 13. AN INSTANCE OF CYBER TERRORISM  Ahmedabad Bomb Blast(26-07-08) o A mail with id alarbi_gujrat@ was being sent by a group of Terrorists. o Person named Kenneth Haywood’s unsecured WIFI router in his house was being misused by terrorists. o 3 more mails were sent after the blast with the same misuse of unsecured WIFI routers.
  14. 14. CYBER CRIMES AGAINST SOCIETY Pornography Cyber Trafficking Online Gambling Forgery
  16. 16. WHY INDIA? • A rapidly growing online user base: • India has bypassed Japan to become the world’s third largest Internet user after China and the United States • Its users are significantly younger than those of other emerging economies. • India now has nearly 74 million Active Internet users, a 31 per cent increase over March 2012, the report says • 46+ Million Social Network Users • 50 Million users shop online on Ecommerce and Online Shopping Sites • The Telecom Regulatory Authority of India (TRAI) pegged the number of Internet subscribers in India at 164.81 million as of March 31, 2013, with seven out of eight accessing the Internet from their mobile phones.
  17. 17. CYBER CRIMES IN INDIA • The majority of cybercrimes are centered on forgery, fraud and Phishing. • India is the third-most targeted country for Phishing attacks after the US and the UK. • Social networks as well as ecommerce sites are major targets. • 6.9 million bot-infected systems in 2013. • 14,348 websites defacements in 2013. • 15,000 sites hacked in 2013. • India is number 1 country in the world for generating spams. • 29.9 million people fell victim to cyber crime. • 17% of adults online have experienced cybercrime on their mobile phone. Source: Norton Cybercrime Report 2013
  18. 18. CYBER SECURITY DEFINATION :Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. LEGISLATIVE ACTION AGAINST CYBER CRIME: • The Information Technology Act 2000 was passed and enforced on 17th May 2000. • OBJECTIVE: To legalise e-commerce and further amend the Indian Penal Code 1860, the Indian Evidence Act 1872, the Banker’s Book Evidence Act 1891 and the Reserve Bank of India Act 1934. • The Government of India has brought major amendments to ITA-2000 in form of the Information Technology Amendment Act, 2008.
  19. 19. SAFETY TIPS TO AVOID CYBERCRIME • Use antivirus software and firewalls –keep them up to date. • Keep your operating systems up to date with critical security updates and patches. • Don’t open emails or attachments from unknown sources. • Read Privacy policy carefully when you submit the data through internet. • Disable Remote Connectivity. • Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist. • Back-up your computer data on disks or CDs often. 5P mantra for online security Precaution Prevention Protection Preservation Perseverance
  20. 20. CONCLUDING REMARKS • Cybercrime is indeed getting the recognition it deserves. • However, it is not going to restricted that easily. • In fact, it is highly likely that cybercrime and its hackers will continue developing and upgrading to stay ahead of the law. • So, to make us a safer we must need cyber security.