2. “Unlawful acts wherein the
computer is either a tool or
target or both
Tool Target
•CYBER DEFAMATION
•FORGERY
•ONLINE GAMBLING
•INTERNET TIME THEFT
• FINANCIAL CRIMES
•INTELLECTUAL PROPERTY
CRIMES
•SALE OF ILLEGAL ARTICLES
TROJANS AND KEYLOGGERS
•EMAIL BOMBING
•DENIAL OF SERVICE ATTACK
•WEB DEFACEMENT
•SALAMI ATTACK
•LOGIC BOMBS
•CYBER STALKING
•EMAIL SPOOFING
Dr Sapna Deo
3. the Internet
e-mail, or
other electronic
communications devices
to stalk another person
CYBER STALKING
Cyber stalking refers to the use of
Dr Sapna Deo
4. • Stalking generally involves
harassing or threatening
behaviour that an
• individual engages in
repeatedly, such as
following a person,
appearing
• at a person's home or
• place of business,
• making harassing phone
calls,
• leaving written messages or
objects, or vandalizing a
person's property. Dr Sapna Deo
5. • Cyberstalking does not have
any one definition but it can
be defined to mean
threatening, unwarranted
behaviour or advances
directed by one net user to
another user using the
medium of Internet and other
forms of online
communication
Dr Sapna Deo
6. Cyber stalking is a new form of computer related
crime occurring in our society. Cyber stalking is
when a person is followed and pursued online.
Their privacy is invaded, their every move
watched.
It is a form of harassment that can disrupt the
life of the victim and leave them feeling very
afraid and threatened.
Cyber Stalking usually occurs with women, who
are stalked by men, or children who are stalked
by adult predators or pedophiles. Not all stalking
is done by total strangers.
Cyber stalkers need not have to leave their home
to find, or harass their targets, and has no fear of
physical violence since they believe that they
cannot be physically touched in cyberspace
Dr Sapna Deo
7. An honours graduate from the University of San
Diego in USA terrorized five female university
students over the Internet for more than a
year.
The victims received hundreds of violent and
threatening e-mails,
sometimes receiving four or five messages a day.
The student, who pleaded guilty, told the police
that he had committed the crimes because he
thought the women were laughing at him and
causing others to ridicule him.
In reality, the victims had never met him.
Dr Sapna Deo
8. EMAIL SPOOFING
A spoofed email is one that appears to
originate from one source but
actually has been sent from another source:
pooja@yahoo.com
Her ex-boyfriend, Sameer spoofs her e-
mail and sends obscene
messages to all her acquaintances. Since
the e-mails appear to have
originated from Pooja, her friends may take
offence and relationships may be spoiled
for life
Dr Sapna Deo
9. Virus / Worm Attacks
• Computer viruses are small software programs
• A virus might corrupt or delete data on the victim’s
computer
• Use the victim’s e-mail program to spread itself to
other computers
• Even erase everything on the victim’s hard disk.
• Viruses are most easily spread by attachments in e-
mail messages or instant messaging messages.
• Attachments of funny images, greeting cards, or
audio and video files.
Dr Sapna Deo
10. • Viruses can also spread through downloads on
the Internet.
• They can be hidden in illicit software or other
files or programs.
• Worms
• Worms, unlike viruses do not need the host to
attach themselves to.
They merely make functional copies of
themselves and do this repeatedly till they eat
up all the available space on a computer’s
memory
Dr Sapna Deo
11. List of Ten of the Worst
Computer Viruses
1. LoveLetter :targeted users through email, chat clients and peer to peer networks.
2. Melissa:. inserted Simpons's quotes into documents and corrupted or deleted Windows
system files.
3. Chernobyl Virus: It could remain undetected in your computer's memory until the
damage was done, s the fact that once it reached its trigger date, it erased all files on the
user's hard drive and overwrote the system's BIOS.
4. Slammer: didn't affect personal computers, but did wreak havoc with servers. Slammer
overloaded servers and routers, causing outages. Within ten minutes, Slammer had
already infected 75,000 computers.
5. MSBlast:is worm displayed a message on infected machines stating the computer would
shut down in after a few minute
6. MyDoom : is worm displayed a message on infected machines stating the computer
would shut down in after a few minute
7. Sasser:The Remote Procedure Call vulnerability in Windows 2000 and Windows XP was
Sasser's target.
8. Sobig.F:Internet gateways and email servers to crash
9. Code Red:Code Red attacked computers running IIS, or Internet Information Server.
10. Conficker:allows its creators to install software on infected computers
Dr Sapna Deo
12. Data Diddling
• illegal or unauthorized data alteration
• These changes can occur before and during
• data input or before output.
• Data diddling cases have affected
• banks, payrolls, inventory records, credit
records, school transcripts and
• virtually all other forms of data processing
known. Dr Sapna Deo
13. The NDMC Electricity Billing
Fraud Case
• He misappropriated huge amount of funds by
manipulating data files to show less receipt and
bank remittance.
Dr Sapna Deo
14. Keyloggers
• are regularly used were to log all the strokes a
victim makes on the keyboard. This assumes
sinister proportions,
• if a key logger is installed on a computer which is
regularly used for online banking and other
financial transactions. Key-loggers are most
commonly found in public computers such as those
in cyber cafes, hotels etc. Unsuspecting victims
also end up downloading spyware when they click
on “friendly” offers for free software.Dr Sapna Deo