Presented By:
Krishnav Ray Baruah
CONTENTS
 Introduction
 History of cyber crime
 Definition
 Categories of cyber crime
 Role of computer in crime
 Cyber criminals
 Phishing
 Prevention
source-michielwillens.com
INTRODUCTION
The internet in India is growing rapidly. It has
given rise to new opportunities in every field
we can think of – be it entertainment,
business, sports or education.
There are two sides to a coin. Internet also has
its own disadvantages. One of the major
disadvantages is Cyber crime – illegal
activity committed on the internet.
HISTORY OF CYBER CRIME
 THE FIRST RECORDED CYBER CRIME IN THE 1820.
In 1820, Joseph-Marie Jacquard, a textile
manufacturer in France, produced the loom. This
device allowed the repetition of a series of steps in
the weaving of special fabrics. This resulted in a
fear amongst Jacquard's employees that their
traditional employment and livelihood were being
threatened. They committed acts of sabotage to
discourage Jacquard from further use of the new
technology. This is the first recorded cyber crime!
DEFINING CYBER CRIME
It’s an unlawful act wherein the computer is either
a tool or a target or both.
Acts that are punishable by the Information
Technology Act.
Cyber space is a virtual space that has become as
important as real space for business, politics, and
communities
CATEGORIES OF CIBER CRIME
1. Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against government.
CYBER ATTACKS STATISTICS(2013)
Source-hackmageddon.com
ROLE OF COMPUTER IN CRIME
COMPUTER AS
TARGET
COMPUTER AS
TOOL
COMPUTER AS
APPLIANCE
Source-interaksyon.com
Insider Threats
(employees)
Hackers
(teenage thrill-seekers to
sophisticated criminals)
Hactivists'
(overloads e-mail servers or hack
web sites to send political message)
Virus writers
(writes viruses to that infect
systems)
Criminal groups
(attack systems & steal
password for financial gain)
Sensitive
intrusions
(sensitive information is
obtained via computer
intrusions)
Information
warfare
(alternative to military attacks)
Terrorists
(who have potential to disrupt
government systems with
computer attacks)
Cyber Warfare
(attack by sovereigns --- Crime or
Declaration of war)
CYBER CRIMINALS
Frequently Used Cyber Crimes
 Unauthorized access to computer
systems or networks.
 Theft of information contained in
electronic form.
 Email bombing.
 Data diddling.
 Salami attacks.
 Denial of Service attack.
 Virus / worm attacks
 Logic bombs
 Trojan attacks
 Internet time thefts
 Web jacking
 Theft of computer system
 Physically damaging a computer
system
Source:bostinno.streetwise.co
PHISHING
(A GROWING PROBLEM)
LINK MANIPULATION
A deception designed to steal valuable
personal data, such as credit card
numbers, passwords, account data, or
other information.
Source-pcwordl.com
GLOBAL PHISHING SURVEY 2012
Source-docs.apwg.org
EXAMPLE
WHOIS 210.104.211.21:
Location: Korea, Republic Of
Images from Anti-Phishing Working Group’s Phishing ArchiveSource-hongkiat.com
Source-hongkiat.com
PEREVENTION
USE STRONG PASSWORDS
SECURE YOUR COMPUTER
1) ACTIVATE YOUR FIREWALL
2) USE ANTI-VIRUS
3) BLOCK SPYWARE ATTACKS
BE SOCIAL –MEDIA SAVVY
SECURE YOUR MOBILR DEVICES.
INSTALL LATEST OS.
SECURE WIRELESS NETWORK.
PROTECT YOUR E-IDENTITY
CONCLUSION
“BYTES ARE REPLACING BULLETS IN
THE CRIME WORLD”
India needs a good combination of laws
and technology, in harmony with the
laws of other countries and keeping in
mind common security standards.
THANK YOU

Cyber Crime

  • 1.
  • 2.
    CONTENTS  Introduction  Historyof cyber crime  Definition  Categories of cyber crime  Role of computer in crime  Cyber criminals  Phishing  Prevention source-michielwillens.com
  • 3.
    INTRODUCTION The internet inIndia is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.
  • 4.
    HISTORY OF CYBERCRIME  THE FIRST RECORDED CYBER CRIME IN THE 1820. In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
  • 5.
    DEFINING CYBER CRIME It’san unlawful act wherein the computer is either a tool or a target or both. Acts that are punishable by the Information Technology Act. Cyber space is a virtual space that has become as important as real space for business, politics, and communities
  • 6.
    CATEGORIES OF CIBERCRIME 1. Cyber crimes against persons. 2. Cyber crimes against property. 3. Cyber crimes against government.
  • 7.
  • 8.
    ROLE OF COMPUTERIN CRIME COMPUTER AS TARGET COMPUTER AS TOOL COMPUTER AS APPLIANCE Source-interaksyon.com
  • 9.
    Insider Threats (employees) Hackers (teenage thrill-seekersto sophisticated criminals) Hactivists' (overloads e-mail servers or hack web sites to send political message) Virus writers (writes viruses to that infect systems) Criminal groups (attack systems & steal password for financial gain) Sensitive intrusions (sensitive information is obtained via computer intrusions) Information warfare (alternative to military attacks) Terrorists (who have potential to disrupt government systems with computer attacks) Cyber Warfare (attack by sovereigns --- Crime or Declaration of war) CYBER CRIMINALS
  • 10.
    Frequently Used CyberCrimes  Unauthorized access to computer systems or networks.  Theft of information contained in electronic form.  Email bombing.  Data diddling.  Salami attacks.  Denial of Service attack.
  • 11.
     Virus /worm attacks  Logic bombs  Trojan attacks  Internet time thefts  Web jacking  Theft of computer system  Physically damaging a computer system Source:bostinno.streetwise.co
  • 12.
    PHISHING (A GROWING PROBLEM) LINKMANIPULATION A deception designed to steal valuable personal data, such as credit card numbers, passwords, account data, or other information. Source-pcwordl.com
  • 13.
    GLOBAL PHISHING SURVEY2012 Source-docs.apwg.org
  • 14.
    EXAMPLE WHOIS 210.104.211.21: Location: Korea,Republic Of Images from Anti-Phishing Working Group’s Phishing ArchiveSource-hongkiat.com
  • 15.
  • 16.
    PEREVENTION USE STRONG PASSWORDS SECUREYOUR COMPUTER 1) ACTIVATE YOUR FIREWALL 2) USE ANTI-VIRUS 3) BLOCK SPYWARE ATTACKS
  • 17.
    BE SOCIAL –MEDIASAVVY SECURE YOUR MOBILR DEVICES. INSTALL LATEST OS. SECURE WIRELESS NETWORK. PROTECT YOUR E-IDENTITY
  • 18.
    CONCLUSION “BYTES ARE REPLACINGBULLETS IN THE CRIME WORLD” India needs a good combination of laws and technology, in harmony with the laws of other countries and keeping in mind common security standards.
  • 19.