4.16.24 21st Century Movements for Black Lives.pptx
Cyber crimes (By Mohammad Ahmed)
1. “Your computer is the crime scene”
Presented By:
Seminar Guide: ANSARI MD. AHMED
Mrs. BUSHRA ROLL NO. 12886
2. The first recorded cyber crime took place in
the year 1820 That is not surprising considering the
fact that the abacus, which is thought to be the
earliest form of a computer, has been around since
3500 B.C.
3. Internet has offered us a much more convenient way to
share information across time and place.
Cyberspace also opened a new venue for criminal
activities.
The anonymity of cyberspace makes identity tracing a
significant problem which hinders investigations.
Uninformed and misguided users .
4. “Any criminal activity that uses a computer either as
an instrumentality, target or a means for perpetuating
further crimes comes within the ambit of cyber
crime”
“ unlawful acts wherein the computer is either a
tool or target or both”
“Illegal computer-mediated activities that can be
conducted through global electronic networks”
5. It Is A Criminal Activity Committed On The Internet .
Criminal activity where a computer or computer network is
source ,tool , target, or place of a crime.
A Generalized Definition Of Cyber Crime May Be “Unlawful
Acts Wherein The Computer Is Either A Tool Or Target Or
Both”.
Cyber crime offenses against the information technology
infrastructure.
6. The Computer as a Target : using a computer
to attack other computers.
The Computer as a Weapon : using a computer
to commit real world crimes.
7. Physical damage
Theft or destruction of information (data).
The spread of viruses , Trojans and Worms .
Software piracy, Hacking etc.
8. COMPUTER CRIME is any crime where ,
• Computer is a target.
• Computer is a tool of crime.
• Computer is incidental to crime.
9. Because…..
Everybody is using Computers. From white
collar criminals to terrorist organizations And
from Teenagers to Adults
New generation is growing up with computers
MOST IMPORTANT – Money transactions
are moving on to the INTERNET
10. Hackin
IRC g
Crimes Credit
Card
Fraud
Web
Jackin Data
g Diddlin
Some g
Types Of
Cyber
Crimes
Logic Softwa
Bombs re
Piracy
Virus /
Worm Email
Attack Salami Bombi
Attack ng
s
11. What is Hacking?
Unauthorized use of computer and network resources.
“Hacker” originally meant a very gifted programmer.
Hacking is a felony in the US and most other countries.
When it is done by request and under a contract between an ethical
hacker and an organization, it is OK!
The difference is that the ethical hacker has authorization to probe the
target.
“The number of really gifted hackers in the world is very small, but there
are lots of wannabes…”(-Dr. Charles C. Palmer, IBM)
12. o In December of 1947, the transistor was invented.
o Captain Crunch
o Steve Jobs
o Kevin Mitnick
o AT&T
o The Worm- Robert Tappan Morris
o Kevin Poulsen (a.k.a. Dark Dante)
o Tsumomu Shimomura
o David Smith
o Jon Johansen (A.K.A. DVD Jon)
13. System
• Access confidential information
• Threaten someone from YOUR computer
• Broadcast your confidential letters or materials
• Store illegal or espionage material
Network
• Eavesdrop and replay
• Imposer: server / client
• Modify data / stream
• Denial-of-Service
15. Professional hackers
Black Hats – the Bad Guys
White Hats – Professional Security Experts
Underemployed Adult Hackers
Former Script Kiddies
Can’t get employment in the field
Want recognition in hacker community
Ideological Hackers
hack as a mechanism to promote some political or ideological purpose
Usually coincide with political events
Criminal Hackers
Real criminals, are in it for whatever they can get no matter who it hurts
Disgruntled Employees
Most dangerous to an enterprise as they are “insiders”
Since many companies subcontract their network services a disgruntled vendor could
be very dangerous to the host enterprise
17. Eric McCarty hacks into USC database
Australian hacker attacks sewage
control computers
18. Computer hacking is broadly defined as any action that results in
unauthorized interference with a computer, computer system or network.
Computer hacking includes breaking into a computer with the intent to
steal, damage, modify or monitor data or settings within the system.
Significance
Computer hacking is considered a crime in all countries; it is also
a crime under federal and international law. Because a computer may be
accessed from anywhere, a person may be charged with computer hacking
on the state, federal and international level.
Types
Hacking often involves more than just unauthorized access to a
computer. Computer hackers may access a computer in order to: steal
financial information such as credit card access numbers; steal personal
information (identity theft); harass (swatting); vandalize; gain access to
other computers; launch computer attacks; or place malicious software
(malware).
19. You simply have to type credit card number into
www page off the vendor for online transaction If
electronic transactions are not secured the credit card
numbers can be stolen by the hackers who can misuse this
card by impersonating the credit card owner
20.
21. Altering Raw Data just before it is processed by a
computer and then Changing It Back after the
processing is completed.
Electricity Boards in India have been victims to data
diddling programs inserted when private parties
were computerizing their systems.
22. Theft of software through the illegal copying of genuine
programs or the counterfeiting and distribution of products
intended to pass for the original..
Retail revenue losses worldwide are ever increasing due to
this crime
Can be done in various ways:
End user copying,, Hard disk loading,, Counterfeiting, Illegal
downloads from the internet etc..
23. Soft lifting:
purchasing a single licensed copy of software and loading it onto
several computers contrary to the license terms. For example,
sharing software with friends, co-workers and others.
Uploading and downloading:
making unauthorized copies of copyrighted software available to
end users connected by modem to online service providers and/or
the Internet.
Software counterfeiting:
illegally duplicating and selling copyrighted software in a form
designed to make it appear legitimate
24. OEM unbundling:
selling standalone software that was intended to be bundled with
specific accompanying hardware
Hard disk loading:
installing unauthorized copies of software onto the hard disks of
personal computers, often as an incentive for the end user to buy the
hardware from that particular hardware dealer
Renting:
unauthorized selling of software for temporary use, like you would a
video.
25. Piracy harms you and your customers.
Intellectual Property.
Protection. Increase your sales potential.
26. Sending huge volumes of e-mail
To an address or server in an attempt to overflow the
mailbox or overwhelm the server
Zip Bombing
Methods of email bombing
Mass Mailing
Link Listing
27. Refers to sending a large number of emails to the
victim resulting in the victim's
Email account
(in case of an individual) or
Mail servers
(in case of a company or an email service provider)
crashing.
28.
29. These attacks are used for the commission of financial crimes. A
bank employee inserts a program into bank’s servers, that deducts
a small amount from the account of every customer
Used for the commission of FINANCIAL CRIMES.
Key here is to make the alteration so insignificant that in a
single case it would go completely unnoticed.
E.g. A bank employee inserts a program, into the bank's servers,
that deducts a small amount of money (say Rs. 5 a month) from
the account of every customer. No account holder will probably
notice this unauthorized debit, but the bank employee will make a
sizable amount of money every month.
30. A series of minor attacks that together results in a larger
attack
Used for financial crimes in which criminals steal money or
resources a bit at a time from a system
Prevention:
Find indications of an attack.
Random audits.
Don't ignore what appear to be errors in computer-based
financial systems.
31. Definition:
A computer virus is a computer program that can
replicate itself and spread from one computer to another.
The term "virus" is also commonly, but erroneously, used
to refer to other types of malware, including but not
limited to adware and spyware programs that do not have
a reproductive ability.
32. Virus Removal:
One possibility on Windows Me, Windows XP, Windows Vista and
Windows 7 is a tool known as System Restore, which restores the
registry and critical system files to a previous checkpoint. Often a virus
will cause a system to hang, and a subsequent hard reboot will render a
system restore point from the same day corrupt. Restore points from
previous days should work provided the virus is not designed to corrupt
the restore files and does not exist in previous restore points. Some viruses
disable System Restore and other important tools such as Task Manager
and Command Prompt An example of a virus that does this is CiaDoor.
Many such viruses can be removed by Rebooting the computer, entering
Windows Safe Mode, and then using system tools.
33. A COMPUTER WORM is a standalone malware
computer program that replicates itself in order to spread to
other computers. Often, it uses a computer network to
spread itself, relying on security failures on the target
computer to access it. Unlike a computer virus, it does not
need to attach itself to an existing program. Worms almost
always cause at least some harm to the network, even if only
by consuming bandwidth, whereas viruses almost always
corrupt or modify files on a targeted computer.
34. Beginning with the very first research into worms at
Xerox PARC, there have been attempts to create useful
worms. The Nachi family of worms, for example, tried to
download and install patches from Microsoft's website to fix
vulnerabilities in the host system–by exploiting those same
vulnerabilities. In practice, although this may have made these
systems more secure, it generated considerable network traffic,
rebooted the machine in the course of patching it, and did its
work without the consent of the computer's owner or user.
Regardless of their payload or their writers' intentions, most
security experts regard all worms as malware.
35. A logic bomb is a piece of code intentionally
inserted into a software system that will set off a
malicious function when specified conditions are met. For
example, a programmer may hide a piece of code that
starts deleting files (such as a salary database trigger),
should they ever be terminated from the company.
36. Event dependent programs.
Programs are created to do something only when a
certain event (known as a trigger event) occurs.
E.g. even some viruses may be termed logic bombs because they
lie dormant all through the year and become active only on a
particular date (like the Chernobyl virus).
37. Software that is inherently malicious, such as
viruses and worms, often contain logic bombs that
execute a certain payload at a pre-defined time or when
some other condition is met. This technique can be used
by a virus or worm to gain momentum and spread before
being noticed. Many viruses attack their host systems on
specific dates, such as Friday the 13th or April Fool's
Day. Trojans that activate on certain dates are often called
"Time bombs".
38. This article needs additional citations for verification. Please
help improve this article by adding citations to reliabl
sources. Unsourced material may be challenged and
removed. (October 2011)
In "Moffett's Ghost," an episode of the Airwolf television
series, Hawk loses control of the onboard computer, which
was programmed on a timer by Airwolf's creator, Doctor
Charles Henry Moffett... once activated, Airwolf is set to
destroy any aircraft in its range.
39. Do not need the host to attach themselves to.
Make functional copies of themselves and do this
repeatedly till they eat up all the available space on a
computer's memory.
40. Internet Relay Chat (IRC) is a form of real-
time Interne Online chat or synchronous conferencing. It is
mainly designed for group communication in discussion
forums called channels, but also allows one-to-one
communication via private message, as well as chat and data
transfers via Direct Client-to-Client.
Internet Relay Chat (IRC)
servers have chat rooms in
which people from anywhere
the world can come together
and chat with each other.
41. • Criminals use it for meeting coconspirators.
• Hackers use it for discussing their
• exploits / sharing the techniques
• Pedophiles use chat rooms to allure small children
• Cyber Stalking - In order to harass a woman
• her telephone number is given to others as if she wants
the befriend males
42.
43. Financial fraud 11%
Sabotage of data/networks 17%
Theft of proprietary information 20%
System penetration from the outside 25%
Denial of service 27%
Unauthorized access by insiders 71%
Employee abuse of internet privileges 79%
Viruses 85%
44. Use antivirus software’s.
Insert Firewalls.
Uninstall Unnecessary Software
Maintain Backup.
Check Security Settings.
Stay anonymous - choose a genderless screen name.
Never give your full name or address to strangers.
Learn more about Internet privacy.
45. Internet security is a branch
of computer security
specifically related to
the Internet.
It's objective is to
establish rules and
measure to use against
attacks over the Internet.
46. Defend us from critical attacks.
browse the safe website.
Internet security process all the incoming and
outgoing data on our computer.
47. Malicious
Identity Theft
Virus Code
(Phishing)
(Melissa)
Breaking Advanced Worm / Organized Crime
Web Sites Trojan (I LOVE Data Theft, DoS /
YOU) DDoS
1977 1995 2000 2003-04 2005-06 2007-08
48.
49. Use anti-virus software and firewalls - keep them up to date
Keep your operating system up to date with critical security
updates and patches
Don't open emails or attachments from unknown sources
Use hard-to-guess passwords. Don’t use words found in a
dictionary. Remember that password cracking tools exist
Don't share access to your computers with strangers
Back-up your computer data on disks or CDs often
If you have a Wi-Fi network, password protect it
Disconnect from the Internet when not in use
Reevaluate your security on a regular basis
Make sure your employees and family members know this info
too!
50. Tampering with computer source documents
Hacking with computer system
Publishing of information which is obscene in electronic
form
Misrepresentation
Breach of confidentiality and privacy
Publishing digital signature false in certain particulars
Publication of unlawful document for fraudulent purpose
Can be charged up to rupees 1 to 3 Lakhs
OR
Can get imprisonment for 2 to 10 Years
OR
Both can be implemented according to the law.
51. User awareness is key to a secure computer/network
Do not open suspicious files/emails
Verify ActiveX/Java prompts
Avoid using P2P programs
Avoid downloading freeware
If attacked, disconnect the network. Do not turn off the computer
Without Careful Attention To These Issues, The Uncontrolled
Interconnection Of Existing Systems, On Which People And Organizations
Are Critically Dependent, Will Continue To Create Huge, Ill-defined And
Defenseless Super - Systems.
So We Must Pay Attention To All Those Issues And Protect The World
From Cyber Crime.