SlideShare uma empresa Scribd logo
1 de 52
“Your computer is the crime scene”




                               Presented By:
Seminar Guide:                 ANSARI MD. AHMED
Mrs. BUSHRA                    ROLL NO. 12886
The first recorded cyber crime took place in
the year 1820 That is not surprising considering the
fact that the abacus, which is thought to be the
earliest form of a computer, has been around since
3500 B.C.
   Internet has offered us a much more convenient way to
    share information across time and place.

   Cyberspace also opened a new venue for criminal
    activities.

   The anonymity of cyberspace makes identity tracing a
    significant problem which hinders investigations.

   Uninformed and misguided users .
   “Any criminal activity that uses a computer either as
    an instrumentality, target or a means for perpetuating
    further crimes comes within the ambit of cyber
    crime”
    “ unlawful acts wherein the computer is either a
    tool or target or both”
   “Illegal computer-mediated activities that can be
    conducted through global electronic networks”
   It Is A Criminal Activity Committed On The Internet .
   Criminal activity where a computer or computer network is
    source ,tool , target, or place of a crime.
   A Generalized Definition Of Cyber Crime May Be “Unlawful
    Acts Wherein The Computer Is Either A Tool Or Target Or
    Both”.
   Cyber crime offenses against the information technology
    infrastructure.
   The Computer as a Target : using a computer
    to attack other computers.

   The Computer as a Weapon : using a computer
    to commit real world crimes.
   Physical damage

   Theft or destruction of information (data).

   The spread of viruses , Trojans and Worms .

   Software piracy, Hacking etc.
COMPUTER CRIME is any crime where ,

• Computer is a target.

• Computer is a tool of crime.

                    • Computer is incidental to crime.
Because…..
 Everybody is using Computers. From white
  collar criminals to terrorist organizations And
  from Teenagers to Adults
 New generation is growing up with computers
 MOST IMPORTANT – Money transactions
  are moving on to the INTERNET
Hackin
      IRC              g
     Crimes                    Credit
                               Card
                               Fraud

 Web
Jackin                                   Data
  g                                     Diddlin
                     Some                  g
                   Types Of
                    Cyber
                    Crimes
Logic                                    Softwa
Bombs                                      re
                                         Piracy

         Virus /
         Worm                    Email
         Attack       Salami     Bombi
                      Attack      ng
                         s
What is Hacking?

 Unauthorized use of computer and network resources.

 “Hacker” originally meant a very gifted programmer.

 Hacking is a felony in the US and most other countries.

 When it is done by request and under a contract between an ethical
  hacker and an organization, it is OK!

 The difference is that the ethical hacker has authorization to probe the
  target.

 “The number of really gifted hackers in the world is very small, but there
  are lots of wannabes…”(-Dr. Charles C. Palmer, IBM)
o   In December of 1947, the transistor was invented.
o   Captain Crunch
o   Steve Jobs
o   Kevin Mitnick
o   AT&T
o   The Worm- Robert Tappan Morris
o   Kevin Poulsen (a.k.a. Dark Dante)
o   Tsumomu Shimomura
o   David Smith
o   Jon Johansen (A.K.A. DVD Jon)
 System
•   Access confidential information
•   Threaten someone from YOUR computer
•   Broadcast your confidential letters or materials
•   Store illegal or espionage material

 Network
•   Eavesdrop and replay
•   Imposer: server / client
•   Modify data / stream
•   Denial-of-Service
 System Hacking

 Network Hacking

 Software Hacking
Professional hackers
 Black Hats – the Bad Guys
 White Hats – Professional Security Experts

Underemployed Adult Hackers
 Former Script Kiddies
 Can’t get employment in the field
 Want recognition in hacker community

Ideological Hackers
 hack as a mechanism to promote some political or ideological purpose
 Usually coincide with political events

Criminal Hackers
 Real criminals, are in it for whatever they can get no matter who it hurts

Disgruntled Employees
 Most dangerous to an enterprise as they are “insiders”
 Since many companies subcontract their network services a disgruntled vendor could
    be very dangerous to the host enterprise
 Spam

 Downloads

 Pop-ups

 Active X
 Eric McCarty hacks into USC database

 Australian hacker attacks sewage
  control computers
Computer hacking is broadly defined as any action that results in
unauthorized interference with a computer, computer system or network.
Computer hacking includes breaking into a computer with the intent to
steal, damage, modify or monitor data or settings within the system.
Significance
         Computer hacking is considered a crime in all countries; it is also
a crime under federal and international law. Because a computer may be
accessed from anywhere, a person may be charged with computer hacking
on the state, federal and international level.
Types
        Hacking often involves more than just unauthorized access to a
computer. Computer hackers may access a computer in order to: steal
financial information such as credit card access numbers; steal personal
information (identity theft); harass (swatting); vandalize; gain access to
other computers; launch computer attacks; or place malicious software
(malware).
You simply have to type credit card number into
www page off the vendor for online transaction If
electronic transactions are not secured the credit card
numbers can be stolen by the hackers who can misuse this
card by impersonating the credit card owner
 Altering Raw Data just before it is processed by a
  computer and then Changing It Back after the
  processing is completed.

 Electricity Boards in India have been victims to data
  diddling programs inserted when private parties
  were computerizing their systems.
 Theft of software through the illegal copying of genuine
 programs or the counterfeiting and distribution of products
 intended to pass for the original..

 Retail revenue losses worldwide are ever increasing due to
 this crime

 Can be done in various ways:
End user copying,, Hard disk loading,, Counterfeiting, Illegal
 downloads from the internet etc..
Soft lifting:
purchasing a single licensed copy of software and loading it onto
several computers contrary to the license terms. For example,
sharing software with friends, co-workers and others.

Uploading and downloading:
making unauthorized copies of copyrighted software available to
end users connected by modem to online service providers and/or
the Internet.

Software counterfeiting:
illegally duplicating and selling copyrighted software in a form
designed to make it appear legitimate
OEM unbundling:
selling standalone software that was intended to be bundled with
specific accompanying hardware

Hard disk loading:
installing unauthorized copies of software onto the hard disks of
personal computers, often as an incentive for the end user to buy the
hardware from that particular hardware dealer

Renting:
unauthorized selling of software for temporary use, like you would a
video.
 Piracy harms you and your customers.

 Intellectual Property.

 Protection. Increase your sales potential.
Sending huge volumes of e-mail

      To an address or server in an attempt to overflow the
mailbox or overwhelm the server

Zip Bombing

Methods of email bombing
    Mass Mailing
    Link Listing
Refers to sending a large number of emails to the
victim resulting in the victim's

   Email account
   (in case of an individual) or

   Mail servers
   (in case of a company or an email service provider)
   crashing.
 These attacks are used for the commission of financial crimes. A
  bank employee inserts a program into bank’s servers, that deducts
  a small amount from the account of every customer

 Used for the commission of FINANCIAL CRIMES.

 Key here is to make the alteration so insignificant that in a
  single case it would go completely unnoticed.

 E.g. A bank employee inserts a program, into the bank's servers,
  that deducts a small amount of money (say Rs. 5 a month) from
  the account of every customer. No account holder will probably
  notice this unauthorized debit, but the bank employee will make a
  sizable amount of money every month.
A series of minor attacks that together results in a larger
attack

       Used for financial crimes in which criminals steal money or
resources a bit at a time from a system

Prevention:
   Find indications of an attack.
   Random audits.
   Don't ignore what appear to be errors in computer-based
     financial systems.
Definition:

       A computer virus is a computer program that can
replicate itself and spread from one computer to another.
The term "virus" is also commonly, but erroneously, used
to refer to other types of malware, including but not
limited to adware and spyware programs that do not have
a reproductive ability.
Virus Removal:
One possibility on Windows Me, Windows XP, Windows Vista and
Windows 7 is a tool known as System Restore, which restores the
registry and critical system files to a previous checkpoint. Often a virus
will cause a system to hang, and a subsequent hard reboot will render a
system restore point from the same day corrupt. Restore points from
previous days should work provided the virus is not designed to corrupt
the restore files and does not exist in previous restore points. Some viruses
disable System Restore and other important tools such as Task Manager
and Command Prompt An example of a virus that does this is CiaDoor.
Many such viruses can be removed by Rebooting the computer, entering
Windows Safe Mode, and then using system tools.
A COMPUTER WORM is a standalone malware
computer program that replicates itself in order to spread to
other computers. Often, it uses a computer network to
spread itself, relying on security failures on the target
computer to access it. Unlike a computer virus, it does not
need to attach itself to an existing program. Worms almost
always cause at least some harm to the network, even if only
by consuming bandwidth, whereas viruses almost always
corrupt or modify files on a targeted computer.
Beginning with the very first research into worms at
Xerox PARC, there have been attempts to create useful
worms. The Nachi family of worms, for example, tried to
download and install patches from Microsoft's website to fix
vulnerabilities in the host system–by exploiting those same
vulnerabilities. In practice, although this may have made these
systems more secure, it generated considerable network traffic,
rebooted the machine in the course of patching it, and did its
work without the consent of the computer's owner or user.
Regardless of their payload or their writers' intentions, most
security experts regard all worms as malware.
A logic bomb is a piece of code intentionally
inserted into a software system that will set off a
malicious function when specified conditions are met. For
example, a programmer may hide a piece of code that
starts deleting files (such as a salary database trigger),
should they ever be terminated from the company.
 Event dependent programs.

 Programs are created to do something only when a
  certain event (known as a trigger event) occurs.

 E.g. even some viruses may be termed logic bombs because they
  lie dormant all through the year and become active only on a
  particular date (like the Chernobyl virus).
Software that is inherently malicious, such as
viruses and worms, often contain logic bombs that
execute a certain payload at a pre-defined time or when
some other condition is met. This technique can be used
by a virus or worm to gain momentum and spread before
being noticed. Many viruses attack their host systems on
specific dates, such as Friday the 13th or April Fool's
Day. Trojans that activate on certain dates are often called
"Time bombs".
 This article needs additional citations for verification. Please
  help improve this article by adding citations to reliabl
  sources. Unsourced material may be challenged and
  removed. (October 2011)

 In "Moffett's Ghost," an episode of the Airwolf television
  series, Hawk loses control of the onboard computer, which
  was programmed on a timer by Airwolf's creator, Doctor
  Charles Henry Moffett... once activated, Airwolf is set to
  destroy any aircraft in its range.
 Do not need the host to attach themselves to.

 Make functional copies of themselves and do this
  repeatedly till they eat up all the available space on a
  computer's memory.
Internet Relay Chat (IRC) is a form of real-
time Interne Online chat or synchronous conferencing. It is
mainly designed for group communication in discussion
forums called channels, but also allows one-to-one
communication via private message, as well as chat and data
transfers via Direct Client-to-Client.

Internet Relay Chat (IRC)
servers have chat rooms in
which people from anywhere
the world can come together
and chat with each other.
• Criminals use it for meeting coconspirators.

• Hackers use it for discussing their

• exploits / sharing the techniques

• Pedophiles use chat rooms to allure small children

• Cyber Stalking - In order to harass a woman

• her telephone number is given to others as if she wants
  the befriend males
Financial fraud                         11%
Sabotage of data/networks               17%
Theft of proprietary information        20%
System penetration from the outside     25%
Denial of service                       27%
Unauthorized access by insiders         71%
Employee abuse of internet privileges   79%
Viruses                                 85%
   Use antivirus software’s.
   Insert Firewalls.
   Uninstall Unnecessary Software
   Maintain Backup.
   Check Security Settings.
   Stay anonymous - choose a genderless screen name.
   Never give your full name or address to strangers.
   Learn more about Internet privacy.
Internet security is a branch
of       computer        security
specifically     related       to
the Internet.


                                    It's objective is to
                                    establish    rules     and
                                    measure to use against
                                    attacks over the Internet.
   Defend us from critical attacks.

   browse the safe website.

   Internet security process all the incoming and
    outgoing data on our computer.
Malicious
                                              Identity Theft
Virus                 Code
                                                (Phishing)
                    (Melissa)




        Breaking                Advanced Worm /                Organized Crime
        Web Sites                Trojan (I LOVE                Data Theft, DoS /
                                      YOU)                          DDoS




1977    1995         2000         2003-04         2005-06        2007-08
 Use anti-virus software and firewalls - keep them up to date
 Keep your operating system up to date with critical security
  updates and patches
 Don't open emails or attachments from unknown sources
 Use hard-to-guess passwords. Don’t use words found in a
  dictionary. Remember that password cracking tools exist
 Don't share access to your computers with strangers
 Back-up your computer data on disks or CDs often
 If you have a Wi-Fi network, password protect it
 Disconnect from the Internet when not in use
 Reevaluate your security on a regular basis
 Make sure your employees and family members know this info
  too!
 Tampering with computer source documents
 Hacking with computer system
 Publishing of information which is obscene in electronic
  form
 Misrepresentation
 Breach of confidentiality and privacy
 Publishing digital signature false in certain particulars
 Publication of unlawful document for fraudulent purpose
Can be charged up to rupees 1 to 3 Lakhs
             OR
Can get imprisonment for 2 to 10 Years
             OR
Both can be implemented according to the law.
 User awareness is key to a secure computer/network
     Do not open suspicious files/emails
     Verify ActiveX/Java prompts
     Avoid using P2P programs
     Avoid downloading freeware

 If attacked, disconnect the network. Do not turn off the computer

 Without     Careful Attention To These Issues, The Uncontrolled
   Interconnection Of Existing Systems, On Which People And Organizations
   Are Critically Dependent, Will Continue To Create Huge, Ill-defined And
   Defenseless Super - Systems.

 So We Must Pay Attention To All Those Issues And Protect The World
   From Cyber Crime.
Cyber crimes (By Mohammad Ahmed)

Mais conteúdo relacionado

Mais procurados

Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and SecurityHussain777
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & SecurityShreeraj Nair
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔hubbysoni
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 

Mais procurados (20)

Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
cyber security
cyber security cyber security
cyber security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 

Semelhante a Cyber crimes (By Mohammad Ahmed)

Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Name parul
Name parulName parul
Name parulParul231
 
Name parul
Name parulName parul
Name parulParul231
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptJatinRajput67
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptPraveen362297
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourssuser24dae7
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesVivekanandaGN1
 

Semelhante a Cyber crimes (By Mohammad Ahmed) (20)

Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
Unit 1
Unit 1Unit 1
Unit 1
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Último

AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 

Último (20)

AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 

Cyber crimes (By Mohammad Ahmed)

  • 1. “Your computer is the crime scene” Presented By: Seminar Guide: ANSARI MD. AHMED Mrs. BUSHRA ROLL NO. 12886
  • 2. The first recorded cyber crime took place in the year 1820 That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C.
  • 3. Internet has offered us a much more convenient way to share information across time and place.  Cyberspace also opened a new venue for criminal activities.  The anonymity of cyberspace makes identity tracing a significant problem which hinders investigations.  Uninformed and misguided users .
  • 4. “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”  “ unlawful acts wherein the computer is either a tool or target or both”  “Illegal computer-mediated activities that can be conducted through global electronic networks”
  • 5. It Is A Criminal Activity Committed On The Internet .  Criminal activity where a computer or computer network is source ,tool , target, or place of a crime.  A Generalized Definition Of Cyber Crime May Be “Unlawful Acts Wherein The Computer Is Either A Tool Or Target Or Both”.  Cyber crime offenses against the information technology infrastructure.
  • 6. The Computer as a Target : using a computer to attack other computers.  The Computer as a Weapon : using a computer to commit real world crimes.
  • 7. Physical damage  Theft or destruction of information (data).  The spread of viruses , Trojans and Worms .  Software piracy, Hacking etc.
  • 8. COMPUTER CRIME is any crime where , • Computer is a target. • Computer is a tool of crime. • Computer is incidental to crime.
  • 9. Because…..  Everybody is using Computers. From white collar criminals to terrorist organizations And from Teenagers to Adults  New generation is growing up with computers  MOST IMPORTANT – Money transactions are moving on to the INTERNET
  • 10. Hackin IRC g Crimes Credit Card Fraud Web Jackin Data g Diddlin Some g Types Of Cyber Crimes Logic Softwa Bombs re Piracy Virus / Worm Email Attack Salami Bombi Attack ng s
  • 11. What is Hacking?  Unauthorized use of computer and network resources.  “Hacker” originally meant a very gifted programmer.  Hacking is a felony in the US and most other countries.  When it is done by request and under a contract between an ethical hacker and an organization, it is OK!  The difference is that the ethical hacker has authorization to probe the target.  “The number of really gifted hackers in the world is very small, but there are lots of wannabes…”(-Dr. Charles C. Palmer, IBM)
  • 12. o In December of 1947, the transistor was invented. o Captain Crunch o Steve Jobs o Kevin Mitnick o AT&T o The Worm- Robert Tappan Morris o Kevin Poulsen (a.k.a. Dark Dante) o Tsumomu Shimomura o David Smith o Jon Johansen (A.K.A. DVD Jon)
  • 13.  System • Access confidential information • Threaten someone from YOUR computer • Broadcast your confidential letters or materials • Store illegal or espionage material  Network • Eavesdrop and replay • Imposer: server / client • Modify data / stream • Denial-of-Service
  • 14.  System Hacking  Network Hacking  Software Hacking
  • 15. Professional hackers  Black Hats – the Bad Guys  White Hats – Professional Security Experts Underemployed Adult Hackers  Former Script Kiddies  Can’t get employment in the field  Want recognition in hacker community Ideological Hackers  hack as a mechanism to promote some political or ideological purpose  Usually coincide with political events Criminal Hackers  Real criminals, are in it for whatever they can get no matter who it hurts Disgruntled Employees  Most dangerous to an enterprise as they are “insiders”  Since many companies subcontract their network services a disgruntled vendor could be very dangerous to the host enterprise
  • 16.  Spam  Downloads  Pop-ups  Active X
  • 17.  Eric McCarty hacks into USC database  Australian hacker attacks sewage control computers
  • 18. Computer hacking is broadly defined as any action that results in unauthorized interference with a computer, computer system or network. Computer hacking includes breaking into a computer with the intent to steal, damage, modify or monitor data or settings within the system. Significance Computer hacking is considered a crime in all countries; it is also a crime under federal and international law. Because a computer may be accessed from anywhere, a person may be charged with computer hacking on the state, federal and international level. Types Hacking often involves more than just unauthorized access to a computer. Computer hackers may access a computer in order to: steal financial information such as credit card access numbers; steal personal information (identity theft); harass (swatting); vandalize; gain access to other computers; launch computer attacks; or place malicious software (malware).
  • 19. You simply have to type credit card number into www page off the vendor for online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner
  • 20.
  • 21.  Altering Raw Data just before it is processed by a computer and then Changing It Back after the processing is completed.  Electricity Boards in India have been victims to data diddling programs inserted when private parties were computerizing their systems.
  • 22.  Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original..  Retail revenue losses worldwide are ever increasing due to this crime Can be done in various ways: End user copying,, Hard disk loading,, Counterfeiting, Illegal downloads from the internet etc..
  • 23. Soft lifting: purchasing a single licensed copy of software and loading it onto several computers contrary to the license terms. For example, sharing software with friends, co-workers and others. Uploading and downloading: making unauthorized copies of copyrighted software available to end users connected by modem to online service providers and/or the Internet. Software counterfeiting: illegally duplicating and selling copyrighted software in a form designed to make it appear legitimate
  • 24. OEM unbundling: selling standalone software that was intended to be bundled with specific accompanying hardware Hard disk loading: installing unauthorized copies of software onto the hard disks of personal computers, often as an incentive for the end user to buy the hardware from that particular hardware dealer Renting: unauthorized selling of software for temporary use, like you would a video.
  • 25.  Piracy harms you and your customers.  Intellectual Property.  Protection. Increase your sales potential.
  • 26. Sending huge volumes of e-mail To an address or server in an attempt to overflow the mailbox or overwhelm the server Zip Bombing Methods of email bombing  Mass Mailing  Link Listing
  • 27. Refers to sending a large number of emails to the victim resulting in the victim's Email account (in case of an individual) or Mail servers (in case of a company or an email service provider) crashing.
  • 28.
  • 29.  These attacks are used for the commission of financial crimes. A bank employee inserts a program into bank’s servers, that deducts a small amount from the account of every customer  Used for the commission of FINANCIAL CRIMES.  Key here is to make the alteration so insignificant that in a single case it would go completely unnoticed.  E.g. A bank employee inserts a program, into the bank's servers, that deducts a small amount of money (say Rs. 5 a month) from the account of every customer. No account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month.
  • 30. A series of minor attacks that together results in a larger attack Used for financial crimes in which criminals steal money or resources a bit at a time from a system Prevention:  Find indications of an attack.  Random audits.  Don't ignore what appear to be errors in computer-based financial systems.
  • 31. Definition: A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
  • 32. Virus Removal: One possibility on Windows Me, Windows XP, Windows Vista and Windows 7 is a tool known as System Restore, which restores the registry and critical system files to a previous checkpoint. Often a virus will cause a system to hang, and a subsequent hard reboot will render a system restore point from the same day corrupt. Restore points from previous days should work provided the virus is not designed to corrupt the restore files and does not exist in previous restore points. Some viruses disable System Restore and other important tools such as Task Manager and Command Prompt An example of a virus that does this is CiaDoor. Many such viruses can be removed by Rebooting the computer, entering Windows Safe Mode, and then using system tools.
  • 33. A COMPUTER WORM is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
  • 34. Beginning with the very first research into worms at Xerox PARC, there have been attempts to create useful worms. The Nachi family of worms, for example, tried to download and install patches from Microsoft's website to fix vulnerabilities in the host system–by exploiting those same vulnerabilities. In practice, although this may have made these systems more secure, it generated considerable network traffic, rebooted the machine in the course of patching it, and did its work without the consent of the computer's owner or user. Regardless of their payload or their writers' intentions, most security experts regard all worms as malware.
  • 35. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files (such as a salary database trigger), should they ever be terminated from the company.
  • 36.  Event dependent programs.  Programs are created to do something only when a certain event (known as a trigger event) occurs.  E.g. even some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date (like the Chernobyl virus).
  • 37. Software that is inherently malicious, such as viruses and worms, often contain logic bombs that execute a certain payload at a pre-defined time or when some other condition is met. This technique can be used by a virus or worm to gain momentum and spread before being noticed. Many viruses attack their host systems on specific dates, such as Friday the 13th or April Fool's Day. Trojans that activate on certain dates are often called "Time bombs".
  • 38.  This article needs additional citations for verification. Please help improve this article by adding citations to reliabl sources. Unsourced material may be challenged and removed. (October 2011)  In "Moffett's Ghost," an episode of the Airwolf television series, Hawk loses control of the onboard computer, which was programmed on a timer by Airwolf's creator, Doctor Charles Henry Moffett... once activated, Airwolf is set to destroy any aircraft in its range.
  • 39.  Do not need the host to attach themselves to.  Make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory.
  • 40. Internet Relay Chat (IRC) is a form of real- time Interne Online chat or synchronous conferencing. It is mainly designed for group communication in discussion forums called channels, but also allows one-to-one communication via private message, as well as chat and data transfers via Direct Client-to-Client. Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other.
  • 41. • Criminals use it for meeting coconspirators. • Hackers use it for discussing their • exploits / sharing the techniques • Pedophiles use chat rooms to allure small children • Cyber Stalking - In order to harass a woman • her telephone number is given to others as if she wants the befriend males
  • 42.
  • 43. Financial fraud 11% Sabotage of data/networks 17% Theft of proprietary information 20% System penetration from the outside 25% Denial of service 27% Unauthorized access by insiders 71% Employee abuse of internet privileges 79% Viruses 85%
  • 44. Use antivirus software’s.  Insert Firewalls.  Uninstall Unnecessary Software  Maintain Backup.  Check Security Settings.  Stay anonymous - choose a genderless screen name.  Never give your full name or address to strangers.  Learn more about Internet privacy.
  • 45. Internet security is a branch of computer security specifically related to the Internet. It's objective is to establish rules and measure to use against attacks over the Internet.
  • 46. Defend us from critical attacks.  browse the safe website.  Internet security process all the incoming and outgoing data on our computer.
  • 47. Malicious Identity Theft Virus Code (Phishing) (Melissa) Breaking Advanced Worm / Organized Crime Web Sites Trojan (I LOVE Data Theft, DoS / YOU) DDoS 1977 1995 2000 2003-04 2005-06 2007-08
  • 48.
  • 49.  Use anti-virus software and firewalls - keep them up to date  Keep your operating system up to date with critical security updates and patches  Don't open emails or attachments from unknown sources  Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist  Don't share access to your computers with strangers  Back-up your computer data on disks or CDs often  If you have a Wi-Fi network, password protect it  Disconnect from the Internet when not in use  Reevaluate your security on a regular basis  Make sure your employees and family members know this info too!
  • 50.  Tampering with computer source documents  Hacking with computer system  Publishing of information which is obscene in electronic form  Misrepresentation  Breach of confidentiality and privacy  Publishing digital signature false in certain particulars  Publication of unlawful document for fraudulent purpose Can be charged up to rupees 1 to 3 Lakhs OR Can get imprisonment for 2 to 10 Years OR Both can be implemented according to the law.
  • 51.  User awareness is key to a secure computer/network  Do not open suspicious files/emails  Verify ActiveX/Java prompts  Avoid using P2P programs  Avoid downloading freeware  If attacked, disconnect the network. Do not turn off the computer  Without Careful Attention To These Issues, The Uncontrolled Interconnection Of Existing Systems, On Which People And Organizations Are Critically Dependent, Will Continue To Create Huge, Ill-defined And Defenseless Super - Systems.  So We Must Pay Attention To All Those Issues And Protect The World From Cyber Crime.