SlideShare a Scribd company logo
1 of 35
CYBER CRIME
NOISELESS & CLUELESS THEFT
OFFICIAL WEBSITE OF MAHARASTRA
GOVERNMENT HACKED
 MUMBAI, 20 September 2007 — Hon. Deputy Chief
Minister and Home Minister Mr R.R. Patil confirmed
that the Maharashtra government’s official website
http://www.maharashtragovernment.in had been
hacked.
 The website remain closed for the whole day .
 As per the sources the first cyber crime ever recorded
was In France during 1820 with the principle of
Abacus.
COMPUTER CRIME
 Computer is used to
commit a crime
 Forgery, threatening email,
assuming someone’s identity,
sexual harassment, defamation,
spam, phishing,etc.
 Computer as a target of a
crime
 Viruses, worms, industrial
espionage, software piracy,
hacking.
 computer acts as a tool
for crime .
 Criminals simply devise
different ways to
undertake standard
criminal activities using
the new medium such al
LAN, PAN, MAN ,WAN
often involving the
Internet
PC + INTERNET = CYBER CRIME
LEGISLATION
FAR MORE
IMPERATIVE
+ =
PC + INTERNET
MEANWHILE…….
 First civilian bulletin
board system on-line in
Chicago. Some engaged
in darker activities.
 1984- Hacker groups
appear. Legion Of Doom
(LOD), Masters of
deception (MOD), etc.
War started.
 1988- Robert Tappan
Morris released the first
Internet worm.
Robert Tappan – Morris
worm
Chris Goggans (LOD) Mark Abene (MOD)
DIFFERENT TYPES OF CYBER
CRIMES
Cyber crimes
Hacking
Information
Theft
E-mail
bombing
Salami
attacks
Denial of
Service
attacks
Trojan
attacks
Web jacking
HACKING
In simple terms it means illegal intrusion into
a computer system without the permission of
the computer user.
IN THE NEWS…….
 1 out of 5 children received a
sexual solicitation or
approach over the Internet in
a one-year period of time (
www.missingchildren.com)
 California warns of massive
ID theft – personal data
stolen from computers at
University of California,
Berkeley (Oct 21, 2004 IDG
news service)
 Microsoft and Cisco
announced a new initiative to
work together to increase
internet security
(Oct 18, 2004
www.cnetnews.com)
INFORMATION THEFT
 Information theft is a form of stealing another
person's identity in which someone pretends to
be someone else by assuming that person's
identity, typically in order to access resources or
obtain credit and other benefits in that person's
name.
E-MAIL BOMBING
It is characterized by abusers repeatedly sending
an email message to a particular address at a
specific victim site.
FIR NO 76/02 PS PARLIAMENT STREET
was recorded by Mrs. SONIA GANDHI .
She received threatening E-MAILS from:
 missonrevenge84@khalsa.com
 missionrevenge84@hotmail.com
SALAMI ATTACKS
 an aspect of crime known as salami fraud, the
salami technique, or simply, a salami attack.
Though most often associated with electronic
banking and electronic data interchange fraud,
the concept can be applied to other scenarios
with little relation to computing.
DENIAL OF SERVICE ATTACKSDENIAL OF SERVICE ATTACKS
 This is an act by the criminal, who floods the
bandwidth of the victims network or fills his e-mail
box with spam mail depriving him of the services he
is entitled to access or provide
Frequency Of Incidents Of Cyber
Crimes In India
Source: Survey conducted by ASCL
Denial of Service: Section 43
Virus: Section: 66, 43
Data Alteration: Sec. 66
U/A Access: Section 43
Email Abuse: Sec. 67,
500, Other IPC Sections
Data Theft: Sec 66, 65
To talk about a recent example –
The home page of the official website
of the CID,West Bengal was hacked
on 31st
October ,2011 by a suspected
Anti-Indian Organisation calling
itself THE MUSLIM LIBERATON
ARMY .
Recognising the seriousness of cyber threats the CID
West Bengal had developed a cyber crime unit under its
special operation group SOG.
CYBER TERRORISM
TOP CYBER CRIME COUNTRIES
IT ACT ,2000IT ACT ,2000
In May 2000, both the houses of the Indian
Parliament passed the Information Technology
(IT) Bill.
The Bill received the assent of the President
in August 2000 and came to be known as the
Information Technology Act, 2000.
Cyber laws are contained in the IT Act, 2000.
This Act aims to provide the legal
infrastructure for e-commerce in India.
PROVISIONS UNDER ITPROVISIONS UNDER IT
ACT,2000ACT,2000
Offence Under
Relevant
Section IT Act
Tampering with Computer source documents Sec.65
Hacking with Computer systems, Data alteration Sec.66
Publishing obscene information Sec.67
Un-authorized access to protected system Sec.70
Breach of Confidentiality and Privacy Sec.72
Publishing false digital signature certificates Sec.73
COMPUTER RELATED CRIMES
UNDER IPC AND SPECIAL
LAWS
Sending threatening messages by email Sec 503 IPC
Sending defamatory messages by email Sec 499, 500 IPC
Forgery of electronic records Sec 463, 470, 471 IPC
Bogus websites, cyber frauds Sec 420 IPC
Email spoofing Sec 416, 417, 463 IPC
Online sale of Drugs NDPS Act
Web - Jacking Sec. 383 IPC
Online sale of Arms Arms Act
E-MAIL SPOOFING
 Pranab Mitra , former executive of Gujarat Ambuja
Cement posed as a woman, Rita Basu, and created a
fake e-mail ID through which he contacted one V.R.
Ninawe an Abu Dhabi businessmen . After long cyber
relationship and emotional messages Mitra sent an e-
mail that ‘‘she would commit suicide’’ if Ninawe ended
the relationship. He also gave him ‘‘another friend
Ruchira Sengupta’s’’ e-mail ID which was in fact his
second bogus address. When Ninawe mailed at the
other ID he was shocked to learn that Mitra had died
and police is searching Ninawe. Mitra extorted few lacs
Rupees as advocate fees etc. Mitra even sent e-mails as
high court and police officials to extort more money.
Ninawe finally came down to Mumbai to lodge a police
case.
FORGERY
CYBER STALKING
Ritu Kohli (first lady to register
the cyber stalking case) is a victim
A friend of her husband gave her
phone number and name on a chat
site for immoral purposes.
A computer expert, Kohli was able to trace the
culprit. Now, the latter is being tried for "outraging the
modesty of a woman", under Section 509 of IPC.
CYBER DEFAMATION
 It can be understood as the intentional
infringement of another person's right to his good
name.
 Cyber Defamation occurs when defamation takes
place with the help of computers and / or the
Internet. E.g. someone publishes defamatory
matter about someone on a website or sends e-
mails containing defamatory information to all of
that person's friends. Information posted to a
bulletin board can be accessed by anyone.
PHISHING EXAMPLE
COMMON FORMS OF ONLINE
THREATS
 Commercial sites (e.g., offensive content )
 Domain name monetization
(e.g., click-through advertising)
 Unhappy consumer sites
(e.g., xxx-sucks. COM)
 Sale of Counterfeit Goods in Auction Sites
 Logo, Text, and Meta Tag Use in Commercial Sites
 Stopping unauthorized parties from using your trademarks
 Managing partners use of logos and trademarks
 Protecting against “Google bombing”
HOW TO AVOID THIS ?
 Do not give your computer password or credit
password to any one.
 Read the terms of use or End User License
Agreement (EULA) before gaming.
 If got cheated report immediately to the authorities.
 Take immediate concern.
 Don’t visit unwanted or unprotected sites.
 Use internet wisely.
5 WAYS TO WIRELESS
SECURITY
 Use strong encryption - in case they are trying to break
it, make it harder for them.
 Transmit on a different frequency - this is why we
haven’t intercepted the aliens yet.
 Turn off WAP when not in use - do you leave your TV on
running when you are not at home?
 Control the wireless signal - unless you want to power
the whole city, there is no need to use signal amplifiers.
 Change the default admin password - avoid using
‘password’ as the password.
PROTECTION OF PERSONAL
INFO.
 Identifying Purposes:- The purposes for which personal
information is collected shall be identified by the organization at or
before the time the information is collected.
 Openness:- An organization shall make readily available to
individuals specific information about its policies and practices
relating to the management of personal information.
 Safeguards:- Personal information shall be protected by security
safeguards appropriate to the sensitivity of the information.
 Accountability:- An organization is responsible for personal
information under its control and shall designate an individual or
individuals who are accountable for the organization’s compliance.
 Accuracy:- Personal information shall be as accurate, complete,
and up-to-date as is necessary for the purposes for which it is to be
used.
RECOMMENDED CYBER
SAFETY TIPS
 Use antivirus softwares
 Change passwords frequently
 Insert firewalls
 Adopt regular scanning against
spyware
 Install software patches
 Uninstall unnecessary software
 Separate user accounts
 Maintain backup
 Check security settings
 Perform IT audits
A Final Word
Treat your password like
you treat your toothbrush.
Never give it to anyone
else to use, and change it
every few months.
 @9!#)”< (_@#^%@&*
 !)$)_@ $)*&
 )!@#$* &($)!#
 !%@*^%# *^*!@!(
 #^&*!^#% !#%$*/%^*$
 NITIN KANAUJIA
 PRIYA RAJ
 PANKAJ JANGIR
 PRATEEK SINGAL
 SAMEEKSHA SHARMA
Cyber crime
Cyber crime

More Related Content

What's hot

Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)rayarren06
 
white collar crime definition extent forms in india
white collar crime definition extent forms in indiawhite collar crime definition extent forms in india
white collar crime definition extent forms in indiaChaitanya Limbachiya
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Elements of Crime and its application in IPC
Elements of Crime and its application in IPCElements of Crime and its application in IPC
Elements of Crime and its application in IPCNishkaPrajapati
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxRahul Bharati
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionJustluk Luk
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000Prateek Sinha
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawTalwant Singh
 
Custodial violence 1
Custodial violence 1Custodial violence 1
Custodial violence 1Rhea Shivan
 

What's hot (20)

Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)Cyberstalking (Computer Crime)
Cyberstalking (Computer Crime)
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
white collar crime definition extent forms in india
white collar crime definition extent forms in indiawhite collar crime definition extent forms in india
white collar crime definition extent forms in india
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cyber law
Cyber lawCyber law
Cyber law
 
Elements of Crime and its application in IPC
Elements of Crime and its application in IPCElements of Crime and its application in IPC
Elements of Crime and its application in IPC
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Information technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptxInformation technology Act with Cyber offences .pptx
Information technology Act with Cyber offences .pptx
 
Analysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detectionAnalysis of-credit-card-fault-detection
Analysis of-credit-card-fault-detection
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Information technology act, 2000
Information technology act, 2000Information technology act, 2000
Information technology act, 2000
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan Law
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Custodial violence 1
Custodial violence 1Custodial violence 1
Custodial violence 1
 

Viewers also liked

Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Futurekaranwayne
 
Network Traffic Analysis at a financial institution with 788 branches for 350...
Network Traffic Analysis at a financial institution with 788 branches for 350...Network Traffic Analysis at a financial institution with 788 branches for 350...
Network Traffic Analysis at a financial institution with 788 branches for 350...ManageEngine, Zoho Corporation
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importanceAditya Shukla
 

Viewers also liked (6)

Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
Network Traffic Analysis at a financial institution with 788 branches for 350...
Network Traffic Analysis at a financial institution with 788 branches for 350...Network Traffic Analysis at a financial institution with 788 branches for 350...
Network Traffic Analysis at a financial institution with 788 branches for 350...
 
What's new in NetFlow Analyzer 12.2
What's new in NetFlow Analyzer 12.2What's new in NetFlow Analyzer 12.2
What's new in NetFlow Analyzer 12.2
 
Cyber law-it-act-2000
Cyber law-it-act-2000Cyber law-it-act-2000
Cyber law-it-act-2000
 
Cyber law In India: its need & importance
Cyber law In India: its need & importanceCyber law In India: its need & importance
Cyber law In India: its need & importance
 
Introduction to Cyber Law
Introduction to Cyber LawIntroduction to Cyber Law
Introduction to Cyber Law
 

Similar to Cyber crime

Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarNeeraj Ahirwar
 
Various cyber crime
Various cyber crimeVarious cyber crime
Various cyber crimeasha mali
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital ageatuljaybhaye
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfKira Dess
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Ambrish Mishra
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02raja jawahar
 
Internet
InternetInternet
InternetJodip
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics sunanditaAnand
 

Similar to Cyber crime (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Various cyber crime
Various cyber crimeVarious cyber crime
Various cyber crime
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Internet
InternetInternet
Internet
 
Unit 1
Unit 1Unit 1
Unit 1
 
Business law
Business lawBusiness law
Business law
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cybercrime And Cyber forensics
Cybercrime And  Cyber forensics Cybercrime And  Cyber forensics
Cybercrime And Cyber forensics
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 

Recently uploaded (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Cyber crime

  • 1. CYBER CRIME NOISELESS & CLUELESS THEFT
  • 2. OFFICIAL WEBSITE OF MAHARASTRA GOVERNMENT HACKED  MUMBAI, 20 September 2007 — Hon. Deputy Chief Minister and Home Minister Mr R.R. Patil confirmed that the Maharashtra government’s official website http://www.maharashtragovernment.in had been hacked.  The website remain closed for the whole day .  As per the sources the first cyber crime ever recorded was In France during 1820 with the principle of Abacus.
  • 3. COMPUTER CRIME  Computer is used to commit a crime  Forgery, threatening email, assuming someone’s identity, sexual harassment, defamation, spam, phishing,etc.  Computer as a target of a crime  Viruses, worms, industrial espionage, software piracy, hacking.
  • 4.  computer acts as a tool for crime .  Criminals simply devise different ways to undertake standard criminal activities using the new medium such al LAN, PAN, MAN ,WAN often involving the Internet
  • 5. PC + INTERNET = CYBER CRIME LEGISLATION FAR MORE IMPERATIVE + = PC + INTERNET
  • 6. MEANWHILE…….  First civilian bulletin board system on-line in Chicago. Some engaged in darker activities.  1984- Hacker groups appear. Legion Of Doom (LOD), Masters of deception (MOD), etc. War started.  1988- Robert Tappan Morris released the first Internet worm. Robert Tappan – Morris worm Chris Goggans (LOD) Mark Abene (MOD)
  • 7. DIFFERENT TYPES OF CYBER CRIMES Cyber crimes Hacking Information Theft E-mail bombing Salami attacks Denial of Service attacks Trojan attacks Web jacking
  • 8. HACKING In simple terms it means illegal intrusion into a computer system without the permission of the computer user.
  • 9. IN THE NEWS…….  1 out of 5 children received a sexual solicitation or approach over the Internet in a one-year period of time ( www.missingchildren.com)  California warns of massive ID theft – personal data stolen from computers at University of California, Berkeley (Oct 21, 2004 IDG news service)  Microsoft and Cisco announced a new initiative to work together to increase internet security (Oct 18, 2004 www.cnetnews.com)
  • 10. INFORMATION THEFT  Information theft is a form of stealing another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.
  • 11. E-MAIL BOMBING It is characterized by abusers repeatedly sending an email message to a particular address at a specific victim site. FIR NO 76/02 PS PARLIAMENT STREET was recorded by Mrs. SONIA GANDHI . She received threatening E-MAILS from:  missonrevenge84@khalsa.com  missionrevenge84@hotmail.com
  • 12. SALAMI ATTACKS  an aspect of crime known as salami fraud, the salami technique, or simply, a salami attack. Though most often associated with electronic banking and electronic data interchange fraud, the concept can be applied to other scenarios with little relation to computing.
  • 13. DENIAL OF SERVICE ATTACKSDENIAL OF SERVICE ATTACKS  This is an act by the criminal, who floods the bandwidth of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide
  • 14. Frequency Of Incidents Of Cyber Crimes In India Source: Survey conducted by ASCL Denial of Service: Section 43 Virus: Section: 66, 43 Data Alteration: Sec. 66 U/A Access: Section 43 Email Abuse: Sec. 67, 500, Other IPC Sections Data Theft: Sec 66, 65
  • 15. To talk about a recent example – The home page of the official website of the CID,West Bengal was hacked on 31st October ,2011 by a suspected Anti-Indian Organisation calling itself THE MUSLIM LIBERATON ARMY . Recognising the seriousness of cyber threats the CID West Bengal had developed a cyber crime unit under its special operation group SOG. CYBER TERRORISM
  • 16. TOP CYBER CRIME COUNTRIES
  • 17. IT ACT ,2000IT ACT ,2000 In May 2000, both the houses of the Indian Parliament passed the Information Technology (IT) Bill. The Bill received the assent of the President in August 2000 and came to be known as the Information Technology Act, 2000. Cyber laws are contained in the IT Act, 2000. This Act aims to provide the legal infrastructure for e-commerce in India.
  • 18. PROVISIONS UNDER ITPROVISIONS UNDER IT ACT,2000ACT,2000 Offence Under Relevant Section IT Act Tampering with Computer source documents Sec.65 Hacking with Computer systems, Data alteration Sec.66 Publishing obscene information Sec.67 Un-authorized access to protected system Sec.70 Breach of Confidentiality and Privacy Sec.72 Publishing false digital signature certificates Sec.73
  • 19. COMPUTER RELATED CRIMES UNDER IPC AND SPECIAL LAWS Sending threatening messages by email Sec 503 IPC Sending defamatory messages by email Sec 499, 500 IPC Forgery of electronic records Sec 463, 470, 471 IPC Bogus websites, cyber frauds Sec 420 IPC Email spoofing Sec 416, 417, 463 IPC Online sale of Drugs NDPS Act Web - Jacking Sec. 383 IPC Online sale of Arms Arms Act
  • 20. E-MAIL SPOOFING  Pranab Mitra , former executive of Gujarat Ambuja Cement posed as a woman, Rita Basu, and created a fake e-mail ID through which he contacted one V.R. Ninawe an Abu Dhabi businessmen . After long cyber relationship and emotional messages Mitra sent an e- mail that ‘‘she would commit suicide’’ if Ninawe ended the relationship. He also gave him ‘‘another friend Ruchira Sengupta’s’’ e-mail ID which was in fact his second bogus address. When Ninawe mailed at the other ID he was shocked to learn that Mitra had died and police is searching Ninawe. Mitra extorted few lacs Rupees as advocate fees etc. Mitra even sent e-mails as high court and police officials to extort more money. Ninawe finally came down to Mumbai to lodge a police case.
  • 21.
  • 23. CYBER STALKING Ritu Kohli (first lady to register the cyber stalking case) is a victim A friend of her husband gave her phone number and name on a chat site for immoral purposes. A computer expert, Kohli was able to trace the culprit. Now, the latter is being tried for "outraging the modesty of a woman", under Section 509 of IPC.
  • 24. CYBER DEFAMATION  It can be understood as the intentional infringement of another person's right to his good name.  Cyber Defamation occurs when defamation takes place with the help of computers and / or the Internet. E.g. someone publishes defamatory matter about someone on a website or sends e- mails containing defamatory information to all of that person's friends. Information posted to a bulletin board can be accessed by anyone.
  • 26. COMMON FORMS OF ONLINE THREATS  Commercial sites (e.g., offensive content )  Domain name monetization (e.g., click-through advertising)  Unhappy consumer sites (e.g., xxx-sucks. COM)  Sale of Counterfeit Goods in Auction Sites  Logo, Text, and Meta Tag Use in Commercial Sites  Stopping unauthorized parties from using your trademarks  Managing partners use of logos and trademarks  Protecting against “Google bombing”
  • 27. HOW TO AVOID THIS ?  Do not give your computer password or credit password to any one.  Read the terms of use or End User License Agreement (EULA) before gaming.  If got cheated report immediately to the authorities.  Take immediate concern.  Don’t visit unwanted or unprotected sites.  Use internet wisely.
  • 28. 5 WAYS TO WIRELESS SECURITY  Use strong encryption - in case they are trying to break it, make it harder for them.  Transmit on a different frequency - this is why we haven’t intercepted the aliens yet.  Turn off WAP when not in use - do you leave your TV on running when you are not at home?  Control the wireless signal - unless you want to power the whole city, there is no need to use signal amplifiers.  Change the default admin password - avoid using ‘password’ as the password.
  • 29. PROTECTION OF PERSONAL INFO.  Identifying Purposes:- The purposes for which personal information is collected shall be identified by the organization at or before the time the information is collected.  Openness:- An organization shall make readily available to individuals specific information about its policies and practices relating to the management of personal information.  Safeguards:- Personal information shall be protected by security safeguards appropriate to the sensitivity of the information.  Accountability:- An organization is responsible for personal information under its control and shall designate an individual or individuals who are accountable for the organization’s compliance.  Accuracy:- Personal information shall be as accurate, complete, and up-to-date as is necessary for the purposes for which it is to be used.
  • 30. RECOMMENDED CYBER SAFETY TIPS  Use antivirus softwares  Change passwords frequently  Insert firewalls  Adopt regular scanning against spyware  Install software patches  Uninstall unnecessary software  Separate user accounts  Maintain backup  Check security settings  Perform IT audits
  • 31. A Final Word Treat your password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months.
  • 32.  @9!#)”< (_@#^%@&*  !)$)_@ $)*&  )!@#$* &($)!#  !%@*^%# *^*!@!(  #^&*!^#% !#%$*/%^*$
  • 33.  NITIN KANAUJIA  PRIYA RAJ  PANKAJ JANGIR  PRATEEK SINGAL  SAMEEKSHA SHARMA