2. • Cyber-crime encompasses any criminal act dealing with computers
and networks (called hacking). Additionally, cyber-crime also
includes traditional crimes conducted through the Internet. For
example; hate crimes, telemarketing and Internet fraud, identity
theft, and credit card account thefts are considered to be cyber-
crimes when the illegal activities are committed through the use of a
computer and the Internet.
• Computer crime is when
– Computer is a target.
– Computer is a tool for the crime.
– Computer is incidental to a crime.
3. USUAL
SUSPECTS
► Teenagers
► Political activist
► Professional Hackers
► Business Rival
► Ex wife or husband/BF or GF
Greedy people
Unskilled
Inexperienced
Trusting People
Unlucky people
Usual
Victims
Usual Suspects
5. The act of gaining unauthorized access to a
computer system or network and in some cases
making unauthorized use of this access. Hacking
is also the act by which other forms of cyber-
crime (e.g., fraud, terrorism, etc.) are
committed. Hacking in simple terms means
illegal intrusion into a computer system without
the permission of the computer owner/user.
6.
7. DENIAL OF SERVICE ATTACK
This is an act by the criminal, who floods the band
width of the victim’s network or fills his e-mail box
with spam mail depriving him of the services he is
entitled to access or provide.
8.
9. Malicious software that attaches itself to other
software. Virus, worms, and Trojan horse are the
malicious software’s.
10. SOFTWARE PIRACY
Theft of software through the illegal
copying of genuine programs or the
counterfeiting and distribution of
products intended to pass for the
original. Retail revenue losses
worldwide are ever increasing due to
this crime can be done in various
ways such as end user copying, hard
disk loading, Counterfeiting, Illegal
downloads from the internet etc.
11. PORNOGRAPHY
Pornography is the first consistently successful
ecommerce product. It was a deceptive marketing
tactics and mouse trapping technologies.
Pornography encourage customers to access their
websites. Anybody including children can log on to
the internet and access website with pornography
contents with a click of a mouse.
12. CREDIT CARD FRAUD
You simply have to type credit
card number into www page off
the vendor for online transaction If
electronic transactions are not
secured the credit card numbers
can be stolen by the hackers who
can misuse this card by
impersonating the credit card
owner.
13. NET EXTORTION
Copying the company’s
confidential data in order to
extort said company for huge
amount.
14. It is technique of pulling out confidential information from the
bank/financial institutional account holders by deceptive means.
PHISHING
15. EXAMPLE: OF PHISHING
EMAIL
From: *****Bank [mailto:support@****Bank.com]
Sent: 08 June 2004 03:25
To: India
Subject: Official information from ***** Bank
Dear valued ***** Bank Customer!
For security purposes your account has been
randomly chosen for verification. To verify
your account information we are asking you to
provide us with all the data we are requesting.
Otherwise we will not be able to verify your identity
and access to your account will be denied. Please click
on the link below to get to the bank secure
page and verify your account details. Thank you.
https://infinity.*****bank.co.in/Verify.jsp
****** Bank Limited
16. The Criminal follows the victim by sending
emails, entering the chat rooms frequently.
17. The Criminal sends emails
containing defamatory matters to
all concerned of the victim or post
the defamatory matters on a
website. (Disgruntled employee
may do this against boss, ex-boys
friend against girl, divorced
husband against wife etc.)
18. The Criminal sends threatening email or comes
in contact in chat rooms with victim. (Any one
disgruntled may do this against boss, friend or
official)
19. SALAMI ATTACK
In such crime criminal makes insignificant changes in
such a manner that such changes would go unnoticed.
Criminal makes such program that deducts small amount
like 2.50 per month from the account of all the customer
of the Bank and deposit the same in his account. In this
case no account holder will approach the bank for such
small amount but criminal gains huge amount.
20. A Final Word:
• Treat your password like you
treat your toothbrush. Never
give it to anyone else to use, and
change it every few months.