SlideShare a Scribd company logo
CYBER CRIME
EVOLUTIONOF CRIME FROM BULLETS TO BOOLEAN
Prepared By Aritra Ranjan Das, Aparna Roy, Anwesha Paul, Arijit Mukherjee and Arghaneel Bhaumik
CONTENTS
 Modern day Crime-organized crime syndicate
 Definition & First Occurrence of cyber crime
 Categories of Cyber Crime
 Weapons of Cyber Crime
 Cyber Crimes Against Persons
 Cyber Crimes Against Property
 Cyber Crimes Against Government
 Cyber Crimes Against Society
 Cyber Crimes in India
 Cyber Security
 Safety tips to avoid Cyber Crime
 Concluding remarks
MODERN DAY CRIMES- TRANSNATIONAL
CRIME SYNDICATES
What Is organized Crime?
Network of criminals working across the borders to synchronize criminal
activities such as extortion, drug trafficking, Human Trafficking, Smuggling,
cybercrime, etc.
THE RUSSIAN MAFIA - Solntsevskaya Bravta , The brothers Circle, The
Odessa Mafia.
THE ITALIAN MAFIA - Cosa Nostra(Sicily), La Stidda, Camorra (Naples).
THE TRIADS (China)- Dai Huen Jai, 14 K (Hong Kong)
THE YAKUZA (Japan)- Yamaguchi Gumi, Sumiyoshi Kai, Inagawa Kai.
According to FBI Transnational Organized criminal Syndicates are venturing
into the world of cyber crime diverting their attention from the traditional
methods. They are hiring top class hackers from all over the globe. The interpol
suggests that the Russian Mafia are one of the pioneers of the international
Cyber crime industry. Their strength and influence has lead to rise in terror
throughout the cyber world.
DEFINITION OF CYBER CRIME
• Crime committed using a computer and the
internet to steal a person's identity or illegal
imports or malicious programs
• It’s an unlawful act wherein the computer is
either a tool or a target or both.
FIRST OCCURENCE OF CYBER
CRIME
The first spam email took place in 1978 when it was
sent out over the Arpanet (Advanced Research
Projects Agency Network).
The first virus was installed on an Apple computer in
1982 when a high school student, Rich
Skrenta, developed the Elk cloner.
CATEGORIES OF CYBER CRIME
• Cyber crimes against persons.
• Cyber crimes against property.
• Cyber crimes against government.
• Cyber crimes against society.
WEAPONS OF CYBER CRIME
• Hacking:
Unauthorized access to any computer systems or
networks is known as ‘HACKING’. That is accessing the
information of others without proper authorization.
• Data diddling:
This is altering raw data just before a computer
processes it and then changing it back after the
processing is completed.
• Denial of Service attack:
The computer is flooded with more requests than it
can handle which cause it to crash. Distributed
Denial of Service (DDOS) attack is a example.
WEAPONS OF CYBER CRIME
(CONTINUED….)
• Email bombing:
It refers to sending large numbers of mail to the
victim, which may be an individual or a company by
ultimately resulting into crashing.
• Trojan attacks:
This term has its origin in the word ‘Trojan horse’. In
software field this means an unauthorized program, which
passively gains control over another’s computer by
representing itself as an authorized program. The most
common form of installing a Trojan is through e-mail.
• Web jacking:
This term is derived from the term hi jacking. In these
kinds of offences the hacker gains access and control
over the website of another. He may even manipulate or
change the information of the website. This may be done
for fulfilling political objectives or for money.
WEAPONS OF CYBER CRIME
(CONTINUED….)
• Virus/ Worm Attacks:
Viruses are programs that attach themselves to a
computer or a file and then circulate themselves to other
files and to other computers on a network. They usually
affect the data on a computer, either by altering or
deleting it. Worms unlike viruses do not need the host to
attach themselves to. They merely make functional copies
of themselves and do this repeatedly till they eat up all
the available space on the computer’s memory.
• Salami attacks:
This kind of crime is normally prevalent in the financial
institutions or for the purpose of committing financial
crimes. An important feature of this type of offence is
that the alteration is so small that it would normally go
unnoticed.
WEAPONS OF CYBER CRIME
(CONTINUED….)
• Phishing:
Phishing refers to the receipt of unsolicited emails by customers of
Financial Institutions, requesting them to enter their Username,
Password or other personal information to access their Account for
some reason. The fraudster then has access to the customer’s
online bank account and to the funds contained in that account.
• Spamming:
Electronic spamming is the use of electronic messaging systems
to send unsolicited bulk messages (spam), especially
advertising, indiscriminately. The most widely recognized form
of spam is e-mail spam.
• Cyber Stalking:
Cyber stalking is the use of the internet or other electronic
means to stalk someone. Stalking generally involves harassing
or threatening behavior that an individual engages in
repeatedly.
CYBER CRIMES AGAINST
PERSONS
Harassment via E-Mails
Hacking
E-Mail / SMS Spoofing
Carding
Assault by Threat
CYBER CRIMES AGAINST
PROPERTY
Intellectual Property Crimes
Cyber Squatting
Cyber Vandalism
Transmitting Virus
Internet Time Thefts
CYBER CRIMES AGAINST
GOVERNMENT
Cyber Terrorism:
Cyber Terrorism is a phrase used to describe the use of Internet based attacks in
terrorist activities, including acts of deliberate, large-scale disruption of computer
networks, especially of personal computers attached to the Internet, by the means of
tools such as computer viruses.
Examples of Cyber Terrorism:
• Hacking into computer systems.
• Introducing viruses to vulnerable networks.
• Website Defacing.
• Denial-of-Service(DoS) attacks.
• Terroristic threats made via e-mail.
AN INSTANCE OF CYBER TERRORISM
 Ahmedabad Bomb Blast(26-07-08)
o A mail with id alarbi_gujrat@ yahoo.com
was being sent by a group of Terrorists.
o Person named Kenneth Haywood’s
unsecured WIFI router in his house was
being misused by terrorists.
o 3 more mails were sent after the blast
with the same misuse of unsecured WIFI
routers.
CYBER CRIMES AGAINST SOCIETY
Pornography
Cyber Trafficking
Online Gambling
Forgery
CYBER CRIME IN INDIA:
WHY INDIA?
• A rapidly growing online user base:
• India has bypassed Japan to become the world’s
third largest Internet user after China and the
United States
• Its users are significantly younger than those of
other emerging economies.
• India now has nearly 74 million Active Internet
users, a 31 per cent increase over March 2012, the
report says
• 46+ Million Social Network Users
• 50 Million users shop online on Ecommerce and
Online Shopping Sites
• The Telecom Regulatory Authority of India (TRAI)
pegged the number of Internet subscribers in India
at 164.81 million as of March 31, 2013, with seven
out of eight accessing the Internet from their
mobile phones.
CYBER CRIMES IN INDIA
• The majority of cybercrimes are centered on forgery, fraud
and Phishing.
• India is the third-most targeted country for Phishing attacks
after the US and the UK.
• Social networks as well as ecommerce sites are major targets.
• 6.9 million bot-infected systems in 2013.
• 14,348 websites defacements in 2013.
• 15,000 sites hacked in 2013.
• India is number 1 country in the world for generating spams.
• 29.9 million people fell victim to cyber crime.
• 17% of adults online have experienced cybercrime on their
mobile phone.
Source: Norton Cybercrime Report 2013
CYBER SECURITY
DEFINATION :Cyber security standards are security standards which enable
organizations to practice safe security techniques to minimize the number of
successful cyber security attacks.
LEGISLATIVE ACTION AGAINST CYBER CRIME:
• The Information Technology Act 2000 was passed and
enforced on 17th May 2000.
• OBJECTIVE: To legalise e-commerce and further amend
the Indian Penal Code 1860, the Indian Evidence Act
1872, the Banker’s Book Evidence Act 1891 and the
Reserve Bank of India Act 1934.
• The Government of India has brought major
amendments to ITA-2000 in form of the Information
Technology Amendment Act, 2008.
SAFETY TIPS TO AVOID CYBERCRIME
• Use antivirus software and firewalls –keep them up to
date.
• Keep your operating systems up to date with critical
security updates and patches.
• Don’t open emails or attachments from unknown
sources.
• Read Privacy policy carefully when you submit the
data through internet.
• Disable Remote Connectivity.
• Use hard-to-guess passwords. Don’t use words found
in a dictionary. Remember that password cracking
tools exist.
• Back-up your computer data on disks or CDs often.
5P mantra for online
security
Precaution
Prevention
Protection
Preservation
Perseverance
CONCLUDING REMARKS
• Cybercrime is indeed getting the
recognition it deserves.
• However, it is not going to restricted that
easily.
• In fact, it is highly likely that cybercrime
and its hackers will continue developing
and upgrading to stay ahead of the law.
• So, to make us a safer we must need
cyber security.
Cyber Crime

More Related Content

What's hot

Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
Asma Hossain
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
Hussain777
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Cyber crimeCyber crime
Cyber crime
dixitas
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
Neeraj Ahirwar
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
sanjana mun
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Abhishek Baranwal
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
Kandarp Shah
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Ritesh Thakur
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
bhavya mohindru
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
shaympariyar
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
ANKUR BAROT
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 

What's hot (20)

Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 

Viewers also liked

Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
Likan Patra
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Steve Poole
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
thothakhail
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Aashir Khalil
 
How to Secure Your Organisation Data
How to Secure Your Organisation DataHow to Secure Your Organisation Data
How to Secure Your Organisation DataPhannarith Ou, G-CISO
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
InfinIT - Innovationsnetværket for it
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
S.E. CTS CERT-GOV-MD
 
Integrating info ops in operational level planning (no backup slides)
Integrating info ops in operational level planning (no backup slides)Integrating info ops in operational level planning (no backup slides)
Integrating info ops in operational level planning (no backup slides)
Ulrich Janßen
 
Cyber security vs information assurance
Cyber security vs information assuranceCyber security vs information assurance
Cyber security vs information assurance
Vaughan Olufemi ACIB, AICEN, ANIM
 
How to know you was hacked
How to know you was hackedHow to know you was hacked
How to know you was hacked
Phannarith Ou, G-CISO
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
Karnika Seth
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
mukeshkaran
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 

Viewers also liked (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Seminar on Cyber Crime
Seminar on Cyber CrimeSeminar on Cyber Crime
Seminar on Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
computer ethics slides
computer ethics slidescomputer ethics slides
computer ethics slides
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
How to Secure Your Organisation Data
How to Secure Your Organisation DataHow to Secure Your Organisation Data
How to Secure Your Organisation Data
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
 
Integrating info ops in operational level planning (no backup slides)
Integrating info ops in operational level planning (no backup slides)Integrating info ops in operational level planning (no backup slides)
Integrating info ops in operational level planning (no backup slides)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security vs information assurance
Cyber security vs information assuranceCyber security vs information assurance
Cyber security vs information assurance
 
How to know you was hacked
How to know you was hackedHow to know you was hacked
How to know you was hacked
 
Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000Cybercrime Investigations and IT Act,2000
Cybercrime Investigations and IT Act,2000
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computer crime
 Computer crime Computer crime
Computer crime
 

Similar to Cyber Crime

CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
VipinRawat52
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
Arindam Sarkar
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
Final ppt
Final pptFinal ppt
Final ppt
HEMAL SHAH
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
jyoti_lakhani
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
KoukiGaz
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Debayon Saha
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Internet
InternetInternet
InternetJodip
 
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
Michele Thomas
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
PrabhatChoudhary11
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
PrabhatChoudhary11
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
Shareb Ismaeel
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
OmprakashRaut
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
MrunalBakshi
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
RishabhJain916
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Muhammad Hamza
 

Similar to Cyber Crime (20)

CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
CLE-Cyber crimes.pptx
CLE-Cyber crimes.pptxCLE-Cyber crimes.pptx
CLE-Cyber crimes.pptx
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Final ppt
Final pptFinal ppt
Final ppt
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Internet
InternetInternet
Internet
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Recently uploaded

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 

Recently uploaded (20)

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 

Cyber Crime

  • 1. CYBER CRIME EVOLUTIONOF CRIME FROM BULLETS TO BOOLEAN Prepared By Aritra Ranjan Das, Aparna Roy, Anwesha Paul, Arijit Mukherjee and Arghaneel Bhaumik
  • 2. CONTENTS  Modern day Crime-organized crime syndicate  Definition & First Occurrence of cyber crime  Categories of Cyber Crime  Weapons of Cyber Crime  Cyber Crimes Against Persons  Cyber Crimes Against Property  Cyber Crimes Against Government  Cyber Crimes Against Society  Cyber Crimes in India  Cyber Security  Safety tips to avoid Cyber Crime  Concluding remarks
  • 3. MODERN DAY CRIMES- TRANSNATIONAL CRIME SYNDICATES What Is organized Crime? Network of criminals working across the borders to synchronize criminal activities such as extortion, drug trafficking, Human Trafficking, Smuggling, cybercrime, etc. THE RUSSIAN MAFIA - Solntsevskaya Bravta , The brothers Circle, The Odessa Mafia. THE ITALIAN MAFIA - Cosa Nostra(Sicily), La Stidda, Camorra (Naples). THE TRIADS (China)- Dai Huen Jai, 14 K (Hong Kong) THE YAKUZA (Japan)- Yamaguchi Gumi, Sumiyoshi Kai, Inagawa Kai. According to FBI Transnational Organized criminal Syndicates are venturing into the world of cyber crime diverting their attention from the traditional methods. They are hiring top class hackers from all over the globe. The interpol suggests that the Russian Mafia are one of the pioneers of the international Cyber crime industry. Their strength and influence has lead to rise in terror throughout the cyber world.
  • 4. DEFINITION OF CYBER CRIME • Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs • It’s an unlawful act wherein the computer is either a tool or a target or both. FIRST OCCURENCE OF CYBER CRIME The first spam email took place in 1978 when it was sent out over the Arpanet (Advanced Research Projects Agency Network). The first virus was installed on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the Elk cloner.
  • 5. CATEGORIES OF CYBER CRIME • Cyber crimes against persons. • Cyber crimes against property. • Cyber crimes against government. • Cyber crimes against society.
  • 6. WEAPONS OF CYBER CRIME • Hacking: Unauthorized access to any computer systems or networks is known as ‘HACKING’. That is accessing the information of others without proper authorization. • Data diddling: This is altering raw data just before a computer processes it and then changing it back after the processing is completed. • Denial of Service attack: The computer is flooded with more requests than it can handle which cause it to crash. Distributed Denial of Service (DDOS) attack is a example.
  • 7. WEAPONS OF CYBER CRIME (CONTINUED….) • Email bombing: It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing. • Trojan attacks: This term has its origin in the word ‘Trojan horse’. In software field this means an unauthorized program, which passively gains control over another’s computer by representing itself as an authorized program. The most common form of installing a Trojan is through e-mail. • Web jacking: This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the website of another. He may even manipulate or change the information of the website. This may be done for fulfilling political objectives or for money.
  • 8. WEAPONS OF CYBER CRIME (CONTINUED….) • Virus/ Worm Attacks: Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on the computer’s memory. • Salami attacks: This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed.
  • 9. WEAPONS OF CYBER CRIME (CONTINUED….) • Phishing: Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason. The fraudster then has access to the customer’s online bank account and to the funds contained in that account. • Spamming: Electronic spamming is the use of electronic messaging systems to send unsolicited bulk messages (spam), especially advertising, indiscriminately. The most widely recognized form of spam is e-mail spam. • Cyber Stalking: Cyber stalking is the use of the internet or other electronic means to stalk someone. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly.
  • 10. CYBER CRIMES AGAINST PERSONS Harassment via E-Mails Hacking E-Mail / SMS Spoofing Carding Assault by Threat
  • 11. CYBER CRIMES AGAINST PROPERTY Intellectual Property Crimes Cyber Squatting Cyber Vandalism Transmitting Virus Internet Time Thefts
  • 12. CYBER CRIMES AGAINST GOVERNMENT Cyber Terrorism: Cyber Terrorism is a phrase used to describe the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. Examples of Cyber Terrorism: • Hacking into computer systems. • Introducing viruses to vulnerable networks. • Website Defacing. • Denial-of-Service(DoS) attacks. • Terroristic threats made via e-mail.
  • 13. AN INSTANCE OF CYBER TERRORISM  Ahmedabad Bomb Blast(26-07-08) o A mail with id alarbi_gujrat@ yahoo.com was being sent by a group of Terrorists. o Person named Kenneth Haywood’s unsecured WIFI router in his house was being misused by terrorists. o 3 more mails were sent after the blast with the same misuse of unsecured WIFI routers.
  • 14. CYBER CRIMES AGAINST SOCIETY Pornography Cyber Trafficking Online Gambling Forgery
  • 15. CYBER CRIME IN INDIA:
  • 16. WHY INDIA? • A rapidly growing online user base: • India has bypassed Japan to become the world’s third largest Internet user after China and the United States • Its users are significantly younger than those of other emerging economies. • India now has nearly 74 million Active Internet users, a 31 per cent increase over March 2012, the report says • 46+ Million Social Network Users • 50 Million users shop online on Ecommerce and Online Shopping Sites • The Telecom Regulatory Authority of India (TRAI) pegged the number of Internet subscribers in India at 164.81 million as of March 31, 2013, with seven out of eight accessing the Internet from their mobile phones.
  • 17. CYBER CRIMES IN INDIA • The majority of cybercrimes are centered on forgery, fraud and Phishing. • India is the third-most targeted country for Phishing attacks after the US and the UK. • Social networks as well as ecommerce sites are major targets. • 6.9 million bot-infected systems in 2013. • 14,348 websites defacements in 2013. • 15,000 sites hacked in 2013. • India is number 1 country in the world for generating spams. • 29.9 million people fell victim to cyber crime. • 17% of adults online have experienced cybercrime on their mobile phone. Source: Norton Cybercrime Report 2013
  • 18. CYBER SECURITY DEFINATION :Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. LEGISLATIVE ACTION AGAINST CYBER CRIME: • The Information Technology Act 2000 was passed and enforced on 17th May 2000. • OBJECTIVE: To legalise e-commerce and further amend the Indian Penal Code 1860, the Indian Evidence Act 1872, the Banker’s Book Evidence Act 1891 and the Reserve Bank of India Act 1934. • The Government of India has brought major amendments to ITA-2000 in form of the Information Technology Amendment Act, 2008.
  • 19. SAFETY TIPS TO AVOID CYBERCRIME • Use antivirus software and firewalls –keep them up to date. • Keep your operating systems up to date with critical security updates and patches. • Don’t open emails or attachments from unknown sources. • Read Privacy policy carefully when you submit the data through internet. • Disable Remote Connectivity. • Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist. • Back-up your computer data on disks or CDs often. 5P mantra for online security Precaution Prevention Protection Preservation Perseverance
  • 20. CONCLUDING REMARKS • Cybercrime is indeed getting the recognition it deserves. • However, it is not going to restricted that easily. • In fact, it is highly likely that cybercrime and its hackers will continue developing and upgrading to stay ahead of the law. • So, to make us a safer we must need cyber security.