Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cyber crime presentation By Vaibhav Gaur


Published on

Here the simple & easy ppt on Cyber Crime.....

  • Be the first to comment

  • Be the first to like this

Cyber crime presentation By Vaibhav Gaur

  2. 2. INTRODUCTION  As the use of internet is increasing day by day, traditional concepts & methods of crime have taken new dimensions.  The development in information technology has given rise to more number of cyber attacks like hacking, phishing, data theft etc.  A country like India has seen a growing number of cyber assaults, witnessed the misuse of social media & internet that brought home the threat of CYBER-CRIME.
  3. 3. WHAT IS CYBER-CRIME ??  Cyber-Crime can be defined as the intentional use of computer, networks & public internets to cause destruction & harm for personal objectives.
  4. 4. EXAMPLES OF CYBER-CRIME  Hacking into computer systems.  Introducing viruses to vulnerable networks.  Website Defacing.  Denial-of-Service(DoS) attacks.  Terrorists threats made via e-mail.
  5. 5. CORE CHARACTERISTICS Cyber Crime has some universal characteristics, which are as follows:  It is done to convey a particular destructive or disruptive message to the government.  There are various methods to convey this message, viz., through denial of services, sending threatening emails, defacing of government websites, hacking and cracking of crucial governmental systems or ‘protected systems’, disrupting the civil amenities through destroying the proper working of the digital information systems, etc.  It could affect the computers and the networks as a whole, it could also affect the governing system, and it could affect the population of target area to create threat.  Computer and digital communication technology are used as main tool to achieve extremist purposes.  The whole act could be motivated by religious, social or political ideologies.
  6. 6. COMMERCIAL SECTOR, A KEY TARGET  Communication System: News Organizations Telephony suppliers  Corporations: Component suppliers(boots, foods, radios etc) Civilian consulting companies  Financial Institutions Government funds tied up in commercial banks  Health Care Industry Pharmacies, hospitals, clinics Drug companies(vaccines, antibiotics)
  7. 7. MOST COMMON ATTACKS !!  Hackin With Computer System  Data Theft  Spreading Virus or Worms  Identity Theft
  8. 8. HACKING WITH COMPUTER SYSTEM  Hacking means unauthorized attempts to bypass the security mechanisms of an information system or network. Also, in simple words Hacking is the unauthorized access to a computer system, programs, data and network resources.  LAWS :-Under section 66 of IT ACT 2008 & Section 43(A),IPC Section 379 and 406.  PUNISHMENT:-Imprisonment upto 3 years or fine upto 5 lakh or Both.
  9. 9. DATA THEFT  If any person without permission of the owner or any other person, who is incharge of a computer, computer system of computer network - downloads, copies or extracts any data, computer data base or information from such computer,computer system including information or data held orstored in any removable storage medium.  LAWS :-Under section 43(B) & Section 66 (E),67(C) of IT ACT 2008 & IPC Section 379,405 and 420 &copyright.  PUNISHMENT:-Imprisonment upto 3 years or fine upto 2 lakh or Both.
  10. 10. SPREADING VIRUS OR WORM  Viruses can do any amount of damage, the creator intends them to do. They can send your data to a third party and then delete your data from your computer. They can also ruin/mess up your system and render it unusable without a re-installation of the operating system.  LAWS :-Under section 43(C) & Section 43 (E),66.  PUNISHMENT:- Spreading of Virus offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.
  11. 11. IDENTITY THEFT  Identity theft is a form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name.  LAWS :-Under section 66(C) & IPC Section 419.  PUNISHMENT:- Imprisonment upto 3 years or fine upto 1 lakh or Both.
  12. 12. CASE STUDIES  9/11 attack  Ahmadabad bomb blast  26/11 Mumbai attack
  13. 13. 9/11 TWIN TOWERS ATTACK  Launched by Islamic terrorist group of Al-Qaeda upon the United States in New York city & the Washington D.C. metropolitan area.  4 passengers airlines were hijacked by 19 Al- Qaeda terrorists.  Almost 3000 people died in the attack.
  14. 14. AHMADABAD BOMB BLAST(26-07-08)  A mail with id was being sent by a group of terrorists.  Person named Kenneth Haywood’s unsecured WiFi router in his house was being misused by terrorists.  56 people were killed & over 200 people were injured.
  15. 15. 26/11 MUMBAI ATTACK  By the members of Lashkar-e-Taiba.  Ajmal Kasab, the only attacker who was captured alive, later confessed upon interrogation that the attacks were conducted with the support of Pakistan.  Major places of attacks were: Chhatrapati Shivaji Terminus, the Taj Mahal Palace & tower, the Metro Cinema etc.  257 people were killed & 700 were injured.
  16. 16. WHAT DO WE NEED TO DO ??  Maintain high alert & vigilance  Update OS & applications regularly  Enforce strong passwords  “Lock down” systems  Keep anti-virus software installed & up-to-date  Employ intrusion detection systems & firewalls
  17. 17. CONCLUSION  Cyber-Crime is a scary concept for many reasons. It can do possible serious damage to various aspects of our lives. It is difficult to catch & track & prosecute.  The information ago has brought us many good things, but along with those good things came some bad things too.  All we can do as citizens is to protect ourselves by protecting our information, who we give it to & how much we give it out.