2. CYBERSPACE :
“cyberspace” does not have a single agreed definition, some things can
be said,
• First, cyberspace is not a physical place, although many elements of
cyberspace are indeed physical,
• Second, cyberspace includes but is not limited to the Internet—
cyberspace also includes computers (some of which are attached to
the Internet and some not) and networks (some of which may be part
of the Internet and some not).
• Third, cyberspace includes many intangibles, such as information and
software and how different elements of cyberspace are connected to
each other.
3. So a rough definition might be that :
• cyberspace consists of objects based on or dependent on computing
and communication technology;
• The information that these objects use, store, handle, or process; and
• The interconnections among these various elements.
5. Crimes are not to be measured
by the issue of events, but by
the bad intensions of men.
6. WHAT IS CYBER CRIME
• Cybercrime is any unlawful activity that involves a computer and
network.
Categorize of Cybercrime
• The Computer as a Target : using a computer to attack other
computers.
• The computer as a weapon : using a computer to commit real world
crimes.
8. TYPES OF CYBER CRIME
• Hacking
• Child Pornography
• Phishing
• Denial of service Attack
• Virus Spreading
• Software Piracy
• Cyber Terrorism
• Cyber Vandalism
9.
10. Why India?
A rapidly growing online user base
121 Million Internet Users
65 Million Active Internet Users, up by
28% from 51 million in 2015
50 Million users shop online on
Ecommerce and Online Shopping Sites
46+ Million Social Network Users
346 million mobile users had
subscribed to Data Packages.
Source: IAMAI; Juxt; wearesocial
Monday, 27 August 2018
12. COST OF CYBER CRIME IN INDIA
• 29.9 million people fell victim to cybercrime,
• $4 billion in direct financial losses,
• $3.6 billion in time spent resolving the crime,
• 4 in 5 online adults (80%) have been a victim of Cybercrime,
• 17% of adults online have experienced cybercrime on their
mobile phone.
Source: Norton Cybercrime Report
13. “The modern thief can steal more with a
computer than with a gun.
Tomorrow’s terrorist may be able to do
more damage with a keyboard than
with a bomb.”
14. WHY CARE ABOUT
CYBERSECURITY?
• We live in an increasingly networked world, from personal banking to
government infrastructure. Protecting those networks is no longer optional.
• Most people in modern society encounter computing and communications
technologies all day, every day .
• Cyber risk is now firmly at the top of the international agenda .
• Cyber crime costs the global economy over US$400 billion per year,
(according to estimates by the Center for Strategic and International Studies).
In 2013, some 3,000 companies in the United States had their systems
compromised by criminals, the Center reports.
• The development of an Internet of Things, which enables communication
between machines, raises the possibility of appliances being manipulated by
hackers.
15. • People’s personal lives involve computing through social networking, home
management, communication with family and friends, and management of
personal affairs.
• Computing will be embedded in countless places and objects; even today,
computing devices are easily transported in pockets or on wrists.
• Your cyber hygiene affects others : Infected devices have a way of infecting
other devices and compromised systems can make everyone vulnerable.
• Nearly everyone (in everyday society, business, government, and the military
services) relies on wireless and wired digital communications systems.
• Given our dependence on cyberspace, we want and need our information
technologies to do what they are supposed to do and only when they are
supposed to do it.
16.
17. SAFETY TIPS TO CYBERCRIME
• Use antivirus software’s
• insert firewalls
• uninstall unnecessary software
• maintain backup
• check security settings
• Stay anonymous - choose a genderless screen name
• Never give your full name or address to strangers
18. Contd…
• Learn ‘Etiquette' - follow it and expect it from others
• Don't respond to harassing or negative messages (flames)
• Get out of uncomfortable or hostile situations quickly
• Update software’s timely
• Cryptography
• Learn more about Internet privacy
20. ADVANTAGES OF CYBER SECURITY
• Defend us from critical attacks.
• Browse the safe website.
• Internet security process all the incoming and outgoing data on our
computer.
• Security will defend from hacks
and virus.
21. CASE STUDIE…
Did you know that e-mails, long considered the most convenient form of
communication, can actually spring some nasty surprises for you?
One financial Institute registered a crime stating that some persons
(“perpetrators”) have done certain acts through misleading emails seemingly
coming from ICICI Bank’s email ID.
Such acts have been done with an intent to defraud the Customers.
The Investigation was carried out with help of those emails received by the
customers of that financial Institute and arrested the suspect, the place of
offence at Vijaywada was searched for the evidence . There one Lap Top and
Mobile Phone was seized which was used for the commission of the crime.
The arrested accused had used open source code email application software
for sending spam emails. After spamming emails to financial Institute customers
he got the response from around 120 customers of which 80 are genuine and
others are not correct because it do not have debit card details as required for
e-banking.
22. The financial Institute customers those who have received his email felt that the email
was originated from the financial Institute bank. When they filled the confidential
information and submitted that time said information was directed to accused. This was
possible because the dynamic link was given in the first page (Home page) of the fake
web site.
The dynamic link was coded by handling the Internet Explorer onclick() event and the
information of the form will be submitted to the web server (Where the fake web site is
hosted). Then server will send the data to configured email address and in this case
email configured was to the accused email.
All the information after Phishing (user name, password, Transaction password, Debit
card Number and PIN, mothers maiden name) which he had received through Wi-Fi
internet connectivity of Reliance.com which was available on his Acer Lap Top.
This crime has been registered u/s U/Sec. 66 of IT Act, sec 419, 420, 465, 468, 471
of I.P.C Sections 51, 63 and 65 of Copyright Act, 1957 which attract the punishment of
3 years imprisonment and fine up to 2 lacs rupees which accused never thought of .