This document provides an overview of cyber crime. It begins with an introduction to the growth of internet usage in India and the corresponding rise of cyber crime. It then defines cyber crime and discusses the history and categories of cyber crime. Specific cyber crimes discussed include phishing and botnets. The document also examines cyber criminals, IT and cyber law, cyber attack statistics, and prevention techniques. It concludes by noting the impact of cyber crime and need for international cooperation to combat it.
2. Contents:
Introduction
What is Cyber Crime?
History of cyber crime
Definition
Categories of cyber crime
CYBER ATTACKS STATISTICS 2013
Cyber criminals
What is IT Law and Cyber Law
Phishing
Botnet
conclusion
3. INTRODUCTION
The internet in India is growing rapidly. It has given
rise to new opportunities in every field we can think
of – be it entertainment, business, sports or
education.
There are two sides to a coin. Internet also has its
own disadvantages. One of the major disadvantages
is Cyber crime – illegal activity committed on the
internet.
4. What is Cyber crime???
• Cyber crime is simply defined as crimes that are
directly related
computers.
• An
to
computers
and
using
increasing number of domestic and
international criminal activities are using the
Internet. Computers and other electronic
devices can be tools to commit crime or are
targeted by criminals. A personal computer
connected to the Internet without protection
may be infected with malicious software in
under a minute.
5. History of Cyber Crime
• In the early decades of modern information technology (IT),
computer crimes were largely committed
disgruntled and dishonest employees.
by
individual
• Physical damage to computer systems was a prominent threat
until the 1980s.
• Criminals often used unauthorized access to subvert security
systems as they modified data for financial gain or destroyed
data for revenge.
• As telecommunications technology spread throughout the IT
world, programmers began writing malicious software,
including self-replicating programs, to interfere with personal
computers.
6. DEFINING CYBER CRIME
It’s an unlawful act wherein the computer is
either a tool or a target or both.
Acts that are punishable by the Information
Technology Act.
Cyber space is a virtual space that has become
as important as real space for business, politics,
and communities
7. CATEGORIES OF CIBER CRIME
1. Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against government
9. CYBER CRIMINALS
Insider
Threats
Virus writers
(writes viruses to that
infect systems)
Information
warfare
(alternative to military
attacks)
Hactivists'
(teenage thrill-seekers to
sophisticated criminals)
(overloads e-mail servers
or hack web sites to send
political message)
Criminal
groups
Sensitive
intrusions
(attack systems &
steal password for
financial gain)
(employees)
Hackers
(sensitive information
is obtained via
computer intrusions)
Terrorists
Cyber
Warfare (attack by
(who have potential to
disrupt government
systems with computer
attacks)
sovereigns --- Crime or
Declaration of war)
10. What is IT Law and Cyber Law
IT Law is a set of legal enactments, currently in
existence in several countries, which governs
the digital dissemination of both (digitalized)
information and software.
Cyber law or Internet law is a term that
encapsulates the legal issues related to use of
the Internet. It is less a distinct field of law than
intellectual property or contract law, as it is a
domain covering many areas of law and
regulation. Some leading topics include internet
access and usage, privacy, freedom of
expression.
11. PHISHING
A deception designed to steal valuable
personal data, such as credit card
numbers, passwords, account data, or other
information.
15. BE SOCIAL –MEDIA SAVVY
SECURE YOUR MOBILR DEVICES.
INSTALL LATEST OS.
SECURE WIRELESS NETWORK.
PROTECT YOUR E-IDENTITY
16. Why India?
A rapidly growing online
user base
121 Million Internet Users
65 Million Active Internet
Users, up by 28% from
51 million in 2010
50 Million users shop
online on Ecommerce and
Online Shopping Sites
46+ Million Social
Network Users
346 million mobile users
had subscribed to Data
Packages.
17. The majority of cybercrimes are centered on fraud and
Phishing,
India is the third-most targeted country for Phishing attacks
after the US and the UK,
Social networks as well as ecommerce sites are major targets,
6.9 million bot-infected systems in 2010,
14,348 website defacements in 2010,
6,850 .in and 4,150 .com domains were defaced during 2011,
15,000 sites hacked in 2011,
India is the number 1 country in the world for generating
spam.
18. Botnets
A network of compromised computers that have
been infected with malicious code, and can be
remotely-controlled through commands sent
via the Internet by a botmaster
Used for making money! Who pays:
Internet Advertising companies for downloading
adware onto vulnerable PCs
Companies who send spam, viruses and other
malware
Google (unintentionally, see Clickbot.A summary)
Used for the heck of it
19. Botnet Threat
Botnets are a major threat to the Internet
because:
Consist of a large pool of compromised
computers that are organized by a master.
a.k.a., Zombie Armies
Carry out sophisticated attacks to disrupt, gather
sensitive data, or increase armies
Armies are in the 1000’s to aggregate computing
power
Communication network allows bots to evolve on
compromised hosts
20. Attacking Behaviors
Infecting new hosts
Social engineering and distribution of malicious emails or
other electronic communications (i.e. Instant Messaging)
Example - Email sent with botnet diguised as a harmless
attachment.
Stealing personal information
Keylogger and Network sniffer technology used on
compromised systems to spy on users and compile personal
information
Phishing and spam proxy
Aggregated computing power and proxy capability make
allow spammers to impact larger groups without being
traced.
Distributed Denial of Service (DDoS)
Impair or eliminate availability of a network to extort or
disrupt business
21. Communication Protocols
In most cases botnets use well defined and
accepted Communication Protocols.
Understanding the communication protocols
used helps to:
Determine the origins of a botnet attack and the
software being used
Allow researchers to decode conversations
happening between the bots and the masters
There are two main Communication Protocols
used for bot attacks:
IRC
HTTP
22. Conclusion
Cybercrime
greatly
affects
individuals, businesses, and national security due to
the pervasiveness ofthe
Internet
Different countries should work together and use
legal, organizational, and technological approaches
to combat cybercrime
• To reduce the damage to critical infrastructures
• To protect the Internet from being abused