This document provides an overview of cyber crime, including its history, definitions, types, perpetrators, and prevention. It discusses how cyber crime involves the use of computers and the internet for illegal activities such as hacking, phishing, stalking, and fraud. The document also outlines classifications of cyber crimes like those against individuals, organizations, and society. It provides examples of specific cyber crimes and describes common cyber criminals like hackers, phishers, and hackers. The document concludes with recommendations for preventing cyber crimes through tools like antivirus software, firewalls, and user education.
2. Introduction
History of cyber crime
What is cyber crime?
Classification
Types of cyber crime
Cyber criminals
Prevention
Conclusion
3. Cyber crime is an “unlawful acts wherein the computer
is either a tool or target or both”
The term “cyber crime” was first coined by Barry
Collins in 1980’s.
Criminals simply devise different ways to undertake
standard criminal activities such as fraud theft, blackmail,
forgery using the new medium, often involving the
Internet.
4. The first recorded cyber crime took place in the year
1820!
The first spam email took place in 1978 when it was
sent out over the Arpanet.
The first virus was installed on an Apple computer in
1982.
Denial of Service (DoS) attacks by „Mafia Boy‟ on
eBay, Yahoo! and other popular sites (2000)
FBI's e-mail system is hacked (Feb,2005)
5. “Cybercrime is criminal activity done using computers and the Internet.”
Criminal activity involving
Information technology infrastructure
Illegal access
Data interference
Misuse of devices
Forgery and
Electronic fraud.
12. Hacking in simple terms means an illegal intrusion
into a computer system and/or network .Also called
as cracking!
Hacking means finding out weaknesses in an
established system and exploiting them. A
computer hacker is a person who finds out
weaknesses in the computer and exploits it.
13.
For profit, protest, or challenge.
A large fraction of hacker attacks have been
pranks
Financial Gain
Revenge
Venting anger at a company or organization
Terrorism
14.
15. A deception designed to steal valuable personal data,
such as credit card numbers, passwords, account data,
or other information.
In order for Internet criminals to successfully “phish”
a personal information, they must go from an email to a
website.
16. It is the use of the Internet or other electronic
means to stalk someone.
This term is used interchangeably with online
harassment and online abuse.
17. Attack through which a person can render a system
unusable or significantly slow down the system for
legitimate users by overloading the system so that no
one else can use it.
Act by the criminal, who floods the bandwidth of
the victims network.
18. Malicious software that attaches itself to other
software. (virus, worms, Trojan Horse etc.)
19. Damaging or destroying data rather than stealing.
Transmitting virus
20. Use of Internet based attacks in terrorist activities.
Technology savvy terrorists are using 512-bit
encryption, which is impossible to decrypt.
21. Theft of software through the illegal copying of
genuine programs.
Distribution of products intended to pass for
the original.
22. A spoofed email is one that appears to originate from
one source but actually has been sent from another
source.
23. The program that act like something useful but do
the things that are quiet damping. The programs of
this kind are called as Trojans.
24. Insider Threats
Hackers
Hactivists'
(employees)
(teenage thrill-seekers to
sophisticated criminals)
(overloads e-mail servers or hack
web sites to send political
message)
Virus writers
Criminal
groups
Sensitive
intrusions
(attack systems & steal
password for financial gain)
(sensitive information is
obtained via computer
intrusions)
Terrorists
Cyber Warfare
(who have potential to disrupt
government systems with
computer attacks)
(attack by sovereigns --- Crime
or Declaration of war)
(writes viruses to that infect
systems)
Information
warfare
(alternative to military attacks)
25.
26. Cyber Crime
In
India
The majority of cybercrimes are centered on fraud and Phishing,
India is the third-most targeted country for Phishing attacks after
the US and the UK,
Social networks as well as ecommerce sites are major targets,
6.9 million bot-infected systems in 2010,
14,348 website defacements in 2010,
6,850 .in and 4,150 .com domains were defaced during 2011,
15,000 sites hacked in 2011,
India is the number 1 country in the world for generating spam.
30. History is the witness that no legislation has succeeded in
totally eliminating crime.
We need to bring changes in the Information Technology
Act to make it more effective to combat cyber crime.
User awareness is key to a secure computer/network
Do not open suspicious files/emails
Avoid using P2P programs
Avoid downloading freeware