3. Definition.
History.
Categories of cyber crime.
Types of cyber crime.
IT Act.
Safety tips.
Cyber Security.
Importance of Cyber security.
Agencies involved in Cyber Security.
Be vigilant and follow the tips.
4. Cybercrime or Computer crime is crime that
involves a Computer and a Network .The
computer may have been used in the commission
of a crime, or it may be the target
Crime committed using a computer and the
internet to steal data or information.
5. Professor Debarati Halder and K. Jaishankar define
cybercrimes as: "Offences that are committed against
individuals or groups of individuals with a criminal
motive to intentionally harm the reputation of the victim
or cause physical or mental harm, or loss, to the victim
directly or indirectly, using modern telecommunication
networks
6. The first recorded cyber crime was recorded in the year
1820.
The person involved was JOSEPH-MARIE JACQUARD.
He was a textile manufacture, he made looms.
He invented looms that can store designs.
7. Cyber crimes are broadly categorized into three
categories, namely crime against
INDIVIDUAL (against people)
PROPERTY (against properties)
GOVERNMENT (against nation)
8.
9. INDIVIDUAL:-This type of cyber crime can be in
the form of cyber stalking, distributing
pornography, trafficking and “grooming”
PROPERTY:-In this case, they can steal a person’s
bank details and siphon off money; misuse the
credit card to make numerous purchases online
GOVERNMENT:-crimes against a government are
referred to as cyber terrorism. In this category,
criminals hack government websites, military
websites or circulate propaganda
Categories Of Cyber Crime
10. When any crime is committed over the Internet it
is referred to as a cyber crime. There are many
types of cyber crimes:-
Hacking
Cyber Stalking
cyber bullying
Identity Theft
Malicious Software
Child soliciting and Abuse
11. This is a type of crime wherein a person’s
computer is broken into so that his personal or
sensitive information can be accessed.
The person engaged in hacking
activities is generally referred to
as a HACKER.
Hacker are the person who learn
About the computer system in details. they
write program referred to as hacks.
13. Website Hacking : Hacking a website means
taking control from the website owner to a
person who hacks the website.
Network Hacking: is generally means gathering
information about domain by using tools like
Telnet, Ns look UP, Ping, Tracert, Netstat, etc
over the network.
14. Email hacking:- is illicit access to an email
account or email correspondence
Password Hacking:- Password cracking is the
process of recovering secret passwords from
data that has been stored in or transmitted by a
computer system.
15. Online banking Hacking:- Unauthorized
accessing bank accounts without knowing the
password or without permission of account
holder is known as Online banking hacking.
Computer Hacking:- is when files on your
computer are viewed, created, or edited without
your authorization.
17. This is a kind of online harassment wherein the
victim is subjected to a criticisms of online
messages and emails.
Target victim through chat room, message boards
and emails.
Examples of cyber stalking
Threatening or obscene e-mail
Make fake social network account
Sending unsolicited email.
18. Cyber bullying is defined as electronically
mediated behaviors among peers such as making
fun of ,telling lies ,spreading rumors, threats and
sharing private information or picture without
permission to do so.
Example of cyber bullying
Posting hurtful message on social network .
Spreading rumour online or through texts.
Stealing identity of person.
19. This has become a major problem with people
using the Internet for cash transactions and
banking services. In this cyber crime, a criminal
accesses data about a person’s bank account,
credit cards, Social Security, debit card and other
sensitive information to buy things online in the
victim’s name.
20. Malicious software, commonly known as
MALWARE, is any software that brings harm to
a computer system. Malware can be in the form
of worms, viruses, Trojans, spyware, adware
and root kits, etc. which steal protected data,
delete documents or add software not approved
by a user.
22. Fast Facts: Attaches to an executable file,
requires human action to spread.
A computer virus attach itself to a program or a file
enabling it to spread from one computer to
another. Almost all viruses are attached to an
executable file, which means the virus may exist
on your computer but it actually cannot infect your
computer unless you run or open the malicious
program.
23. Dormant phase:- The virus program is idle during
this stage. The virus program has managed to
access the target user's computer or software, but
during this stage, the virus does not take any
action.
Propagation phase:-The virus starts propagating,
that is multiplying and self-replicating itself. The
virus places a copy of itself into other programs or
into certain system areas on the disk. The copy
may not be identical to the propagating version.
24. Triggering phase:- A dormant virus moves into his
phase when it is activated, and will now perform the
function for which it was intended. The triggering phase
can be caused by a variety of system events, including a
count of the number of times that this copy of the virus
has made copies of itself.
Execution phase:- This is the actual work of the virus,
where the "payload" will be released. It can be
destructive such as deleting files on disk, crashing the
system, or corrupting files or relatively harmless such as
popping up humorous or political messages on screen.
25. Boot Viruses
Infect the boot block on a floppy or hard disk
File Viruses
Infect .EXE or .COM files
Multi-partite Viruses
Infect both boot blocks and executable files.
Polymorphic Viruses
Is self-modifying, changes each time it infects a file or
disk.
26. Fast Facts:- Can replicate itself on system, does not
require human action to spread
A worm is similar to a virus by design and is considered
to be a sub-class of a virus. Worms spread from
computer to computer, but unlike a virus, it has the
capability to travel without any human action.
The biggest danger with a worm is its capability to
replicate itself on your system, so rather than your
computer sending out a single worm, it could send out
hundreds or thousands of copies of itself, creating a
huge devastating effect
27. Fast Facts:- Appears useful but damages system,
requires human action to run, do not self-replicate.
The Trojan Horse, at first glance will appear to be
useful software but will actually do damage once
installed or run on your computer. Trojan is
activated on your computer, the results can vary.
Some Trojans are designed to be more annoying
than malicious (like changing your desktop, adding
silly active desktop icons)
28. Lots of popup messages.
The home page in your browser has changed.
Programs start with no reason or interaction
from the user.
Files and folders disappear.
The PC feels slower than usual.
29. Install Anti-Virus/Malware Software.
Keep Your Anti-Virus Software Up to Date.
Run Regularly Scheduled Scans with Your Anti-
Virus Software.
Keep Your Operating System Current.
Secure Your Network.
Keep Your Personal Information Safe.
Don’t Use Open Wi-Fi.
Use Multiple Strong Passwords.
30. This is also a type of cyber crime wherein
criminals solicit minors via chat rooms for the
purpose of child pornography.
Child pornography is one of fastest bussiness
going online.
1 in 5 girls and 1 in 20 boys is victim of child
sexual abuse
31. In order to prevent child abuse you should:
Explian your children the safety rules of the internet.
Keep your home computer out in the open.
Set up an internet protection program on the computers
your children use.
Tell your children not to
give out passwords,
even to a good friend.
32. Spam is unsolicited or bulk electronic message used to
promote material that is often not wanted or applicable to
the recipient
The content of spam can also immoral ,illegal and
offensive
spam is often refered to as unsolicated bulk
mail(ubm),excessive multi posting (emp),unsolicated
commerical mail(uce),spam mail,,bulk mail or junk mail
33. The first spam message
3rd may 1978
Gary thuerk salesman a marketer for the Digital
Equipment Corporation, blasted out his
message Using ARPANET sent to 593
accounts numerous times to restrictions of email
account
34. It's usually sent by a "spammer," a company in
the business of distributing unsolicited email
The cost of spam is far less than postal bulk
mailings.
15 million email addresses can be purchased for
as little as $129
35. Sometimes they may buy your address .
They obtain them by using software programs
known as "harvesters" that pluck names from
websites, newsgroups
36. Don’t give out email addresses to unreliable sources.
Delete spam mail without read them.
Read carefully when filling out online forms requesting
your e-mail address, and exercise your choice.
Use multiple e-mail addresses.
Short e-mail addresses are easy to guess, and may
receive more spam.
37. • Use of internet based attacks in terrorists
activities against computers/networks with the
intension of causing harm.
• Cyber terrorism can also include attacks on
Internet business, but when this is done for
economic motivations rather than ideological.
38. Software piracy is the unauthorized or illegal copying,
distribution, or use of software. It is such a profitable
“Business" that it has caught the attention of organized
crime groups in a number of countries.
39.
40. o Use Anti-virus software.
o Insert Firewall.
o Uninstall unnecessary software.
o Maintain Backup.
o Check security settings.
o Stay Anonymous - choose a genderless screen
name.
o Never give your full name or address to
strangers.
o Learn more about Internet Privacy.
41.
42. Cyber security denotes the technologies and
procedures intended to safeguard computers,
networks, and data from unlawful admittance,
weaknesses, and attacks transported through the
Internet
Cyber security standards are security standards
which enable organizations to practice safe
security techniques to minimize the number of
successful cyber security attacks.
43. Governments, military, corporations, financial
institutions, hospitals and other businesses collect,
process and store a great deal of confidential
information on computers and transmit that data
across networks to other computers. With the
growing volume and sophistication of cyber
attacks, ongoing attention is required to protect
sensitive business and personal information, as
well as safeguard national security.
44. ISO 27001 is the international Cybersecurity
Standard that delivers a model for creating,
applying, functioning, monitoring, reviewing,
preserving, and improving an Information Security
Management System.
The Ministry of Communication and Information
Technology under the government of India
provides a strategy outline called the National
Cybersecurity Policy. The purpose of this
government body is to protect the public and
private infrastructure from cyber-attacks.
45. Mission:-
To safeguard information and information infrastructure in
cyberspace.
To build capabilities to prevent and respond to cyber
threats.
To reduce vulnerabilities and minimize damage from
cyber incidents through a combination of institutional
structures, people, processes, technology, and
cooperation
Vision:- To build a secure and resilient cyberspace for
citizens, businesses, and Government.
46. Protects system against viruses, worms,
spyware and other unwanted programs.
Protection against data from theft.
Protects the computer from being hacked.
Protect it from criminal attack.
Application of cyber security used in our
computer need to be update every week.
47. National Cyber Security Awareness Month is
designed to engage and educate public and
private sector partners through events and
initiatives with the goal of raising awareness about
cyber security and increasing the resiliency of the
nation in the event of a cyber incident.
October 2014 marks the 11th Annual National
Cyber Security Awareness Month
48. CERT-In(Computer Emergency Response Team India)
NCIIPC(National Critical Information Infrastructure
Protection Center)
CS&C(Office Of Cyber Security & Communication)
NCCIC(National Cyber Security & Communication
Integration Center)
NCCC(National Cyber Coordination Center)
49. Be vigilant and follow the tips given below while you
participate in online activities:
Filter the visibility of personal information in social sites.
Do not keep the "remember password" button active for
any email address and passwords
Make sure your online banking platform is secure.
Keep a watchful eye while shopping online.
Do not save passwords on mobile devices.
Secure the login details for mobile devices and
computers, etc.
50. To tackle the issue of cybercrimes, CIDs (Criminal
Investigation Departments) of various cities opened up
Cyber Crime Cells in different cities.
Process--
Step 1- For Cyber Crime Complaint First of all write an
application in the name head of cyber crime cell.
Step 2- Provide the following things with the application-
Name
Address
Email address
Telephone no.
Step 3- For required documents there are two cases.
a) In case of vulgar emails, abusive email etc the following
details is required cyber crime compliant-
The header of email which is offending you.
The email address of offending sender.
51. b) In case of Hacking the following details is required for
cyber crime complaint-
Logs of the server.
A hard copy and soft copy of the defected page.
If the data of the defected site is compromised then you will
need a soft copy of original data as well as compromised
data.
Control mechanism details of access in which you have to tell
who has access the computer.
If you have any doubt or your feeling suspicious about
anyone then you have to provide the list of these suspicions.
Step 4- You can file the complaint from any cyber cell of any
of the cities and also send direct email on below given email
of Cyber Cell Police Station.
52. Technology is destructive only in the hands of
people who do not realize that they are one
And the same process as the universe.