B.Tech IV Year/VIII Sem/CSE
CHARTERED INSTITUTE OF TECHNOLOGY
TRANSFORMING EDUCATION WITH GENERATION
JOIN ME ON :https://www.facebook.com/vaibh.gaur
As the use of internet is increasing day by day,
traditional concepts & methods of crime have
taken new dimensions.
The development in information technology has
given rise to more number of cyber attacks like
hacking, phishing, data theft etc.
A country like India has seen a growing number
of cyber assaults, witnessed the misuse of social
media & internet that brought home the threat of
WHAT IS CYBER-CRIME ??
Cyber-Crime can be defined as the intentional
use of computer, networks & public internets to
cause destruction & harm for personal objectives.
EXAMPLES OF CYBER-CRIME
Hacking into computer systems.
Introducing viruses to vulnerable networks.
Terrorists threats made via e-mail.
Cyber Crime has some universal characteristics, which are as follows:
It is done to convey a particular destructive or disruptive message to
There are various methods to convey this message, viz., through
denial of services, sending threatening emails, defacing of
government websites, hacking and cracking of crucial governmental
systems or ‘protected systems’, disrupting the civil amenities through
destroying the proper working of the digital information systems, etc.
It could affect the computers and the networks as a whole, it could
also affect the governing system, and it could affect the population of
target area to create threat.
Computer and digital communication technology are used as main
tool to achieve extremist purposes.
The whole act could be motivated by religious, social or political
COMMERCIAL SECTOR, A KEY TARGET
Component suppliers(boots, foods, radios etc)
Civilian consulting companies
Government funds tied up in commercial banks
Health Care Industry
Pharmacies, hospitals, clinics
Drug companies(vaccines, antibiotics)
MOST COMMON ATTACKS !!
Hackin With Computer System
Spreading Virus or Worms
HACKING WITH COMPUTER
Hacking means unauthorized attempts to bypass the security mechanisms
of an information system or network. Also, in simple words Hacking is the
unauthorized access to a computer system, programs, data and network
LAWS :-Under section 66 of IT ACT 2008 & Section 43(A),IPC Section
379 and 406.
PUNISHMENT:-Imprisonment upto 3 years or fine upto 5 lakh or
SPREADING VIRUS OR WORM
Viruses can do any amount of damage, the creator intends them to
do. They can send your data to a third party and then delete your
data from your computer. They can also ruin/mess up your system
and render it unusable without a re-installation of the operating
LAWS :-Under section 43(C) & Section 43 (E),66.
PUNISHMENT:- Spreading of Virus offence is cognizable, bailable,
compoundable with permission of the court before which the prosecution
of such offence is pending and triable by any magistrate.
Identity theft is a form of fraud or cheating of another person’s identity in
which someone pretends to be someone else by assuming that person’s
identity, typically in order to access resources or obtain credit and other
benefits in that person’s name.
LAWS :-Under section 66(C) & IPC Section 419.
PUNISHMENT:- Imprisonment upto 3 years or fine upto 1 lakh or
9/11 TWIN TOWERS ATTACK
Launched by Islamic terrorist group of Al-Qaeda
upon the United States in New York city & the
Washington D.C. metropolitan area.
4 passengers airlines were hijacked by 19 Al-
Almost 3000 people died in the attack.
AHMADABAD BOMB BLAST(26-07-08)
A mail with id firstname.lastname@example.org was
being sent by a group of terrorists.
Person named Kenneth Haywood’s unsecured
WiFi router in his house was being misused by
56 people were killed & over 200 people were
26/11 MUMBAI ATTACK
By the members of Lashkar-e-Taiba.
Ajmal Kasab, the only attacker who was captured
alive, later confessed upon interrogation that the
attacks were conducted with the support of Pakistan.
Major places of attacks were: Chhatrapati Shivaji
Terminus, the Taj Mahal Palace & tower, the Metro
257 people were killed & 700 were injured.
WHAT DO WE NEED TO DO ??
Maintain high alert & vigilance
Update OS & applications regularly
Enforce strong passwords
“Lock down” systems
Keep anti-virus software installed & up-to-date
Employ intrusion detection systems & firewalls
Cyber-Crime is a scary concept for many reasons.
It can do possible serious damage to various
aspects of our lives. It is difficult to catch & track
The information ago has brought us many good
things, but along with those good things came
some bad things too.
All we can do as citizens is to protect ourselves by
protecting our information, who we give it to &
how much we give it out.