Anúncio
Cyber Crime
Cyber Crime
Cyber Crime
Cyber Crime
Anúncio
Cyber Crime
Cyber Crime
Cyber Crime
Cyber Crime
Cyber Crime
Anúncio
Cyber Crime
Cyber Crime
Cyber Crime
Cyber Crime
Cyber Crime
Anúncio
Cyber Crime
Cyber Crime
Cyber Crime
Cyber Crime
Cyber Crime
Anúncio
Cyber Crime
Cyber Crime
Cyber Crime
Próximos SlideShares
Cyber crime and security pptCyber crime and security ppt
Carregando em ... 3
1 de 22
Anúncio

Mais conteúdo relacionado

Apresentações para você(20)

Anúncio

Cyber Crime

  1. Cyber Crime Name: Divith Chhajed Class: XI Section: I Roll Number: 38 - If we can defeat them sitting at home ... Who needs to fight with tanks and guns!
  2. Acknowledgement This project is done as a semester project, as a part of 11th . I am very thankful to my instructor , Mrs. Malvika Sharma of Delhi Public School, Bopal, for her valuable guidance and supervision , without which the accomplishment of this task would have never been possible. I also thank her for giving me an opportunity to explore into the real world and realize the importance of technology and its application. I also take up this opportunity to thank all my friends for their help due to which completion of the task was possible and also my family for their support.
  3. Index SR NO. Content Slide No. (From-To) 1. Overview 5 2. What is Cyber Crime? 6 3. Threats to a Computer System 7 4. History and Crime Evolution Timeline 8 5. Cyber Crime Variants 9-12 6. Types of Cyber Attack (in %) 13 7. Cyber Crime in India 14 8. Information Technology Amendment Act (from Year 2008) 15-17 9. How to Tackle the Attack? 18-19 10. Some Documented Cases 20 11. Conclusion 21
  4. Overview The internet has grown rapidly and still expands. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education. But there’re always two sides to a coin. Internet also has it’s own disadvantages. Crime has always been unpleasant and unavoidable ingredient in our society. And now as computers and internet have dominated the society due to the dependence in matters of communication, banking, finance, examination and many other. They have become virtual lockers storing all our information and secrets. And as it is essential and important in our lives, crime cannot spare it too. Every day criminals evolve new methods to invade our virtual lockers or even our privacy created in or via computers. It is essential for the users now days to stay cautious and secure their interest, and this project focuses on some of the common threats to a computer system.
  5. What is Cyber Crime ? • Cyber Crime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It is also used to include traditional crimes in which computers or networks are used to enable the illicit activity. • Computer crime mainly consists of unauthorized access to computer systems data alteration, data destruction, theft of intellectual property. Cyber crime in the context of national security may involve hacking, traditional espionage, or information warfare and related activities. • Child pornography, Threatening Email, Assuming someone's Identity, Sexual Harassment, Defamation, Spam and Phishing are some examples where computers are used to commit crime, whereas Viruses, Worms and Industrial Espionage, Software Piracy and Hacking are examples where computers become target of crime.
  6. Threats to a Computer System •Information security often refers to as CIA (Confidentiality, Integrity and Authentication), protects our computer from any unauthorized access and maintains the system resources. Precisely, •Confidentiality: •Protection of the computer system from any unauthorized access •Integrity: •Information is protected and hasn’t been altered by unauthorized users or software •Authentication: •Data is accessible to authorized users and ensures the authenticity of the authorized user
  7. History • The first cyber crime ever recorded was in the year 1820. • The first spam email took place in 1978 when it was sent out over the ARPANET (Advanced Research Projects Agency Network. • The first virus was installed on an Apple computer in 1982. Virus -1977 Breaking Web Sites -1995 Malicious Code (Melissa) -2000 Advanced Worm (ILOVEYOU) -2003-04 Identity Theft -2005-06 Cyber Threat evolution timeline
  8. Cyber Crime Variants •Hacking "Hacking" is a crime, which entails cracking systems and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 per cent increase this year. •Cyber Squatting Cyber Squatting is the act of registering a famous Domain Name and then selling it for a fortune. This is an issue that has not been tackled in IT ACT 2000. •Computer vandalism Damaging or destroying data rather than stealing and also transmitting virus. •Viruses Viruses are computer programs developed to copy themselves and infect other files stored on the computer. They move from computer to computer by attaching themselves to files or boot records of disks and diskettes
  9. Phishing-Vishing •Phishing Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason. The fraudster then has access to the customer's online bank account and to the funds contained in that account. •Vishing Vishing is the criminal practice of using social engineering and Voice over IP (VoIP) to gain access to private personal and financial information from the public for the purpose of financial reward. The term is a combination of “Voice" and phishing. Vishing exploits the public's trust in landline telephone services. Vishing is typically used to steal credit card numbers or other information used in identity theft schemes from individuals.
  10. Cyber Stalking is use of the Internet or other electronic means to stalk someone. This term is used interchangeably with online harassment and online abuse. Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. •Cyber-terrorism Cyberterrorism in general, can be defined as an act of terrorism committed through the use of cyberspace or computer resources (Parker 1983). As such, a simple propaganda in the Internet, that there will be bomb attacks during the holidays can be considered cyberterrorism. As well there are also hacking activities directed towards individuals, families, organized by groups within networks, tending to cause fear among people, demonstrate power, collecting information relevant for ruining peoples' lives, robberies, blackmailing etc.
  11. Fraud and financial crimes •Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss. In this context, the fraud will result in obtaining a benefit by: • Altering in an unauthorized way. This requires little technical expertise and is common form of theft by employees altering the data before entry or entering false data, or by entering unauthorized instructions or using unauthorized processes; • Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions. This is difficult to detect; • Altering or deleting stored data; • Other forms of fraud may be facilitated using computer systems, including bank fraud, carding, identity theft, extortion, and theft of classified information. • A variety of internet scams, many based on phishing and social engineering, target consumers and businesses.
  12. TYPES OF CYBER ATTACK (in %) Cyber Attack Percentage Financial fraud 11% Sabotage of data/networks 17% Theft of proprietary information 20% System penetration from the outside 25% Denial of service 27% Unauthorized access by insiders 71% Employee abuse of internet privileges 79% Viruses 85%
  13. Cyber Crime In India The majority of cybercrimes are centered on forgery, fraud and Phishing, India is the third-most targeted country for Phishing attacks after the US and the UK, Social networks as well as ecommerce sites are major targets, 6.9 million bot-infected systems in 2010, 14,348 website defacements in 2010, 6,850 .in and 4,150 .com domains were defaced during 2011, 15,000 sites hacked in 2011, India is the number 1 country in the world for generating spam.
  14. Information Technology Amendment Act, 2008 Section – 43, Destroys, Deletes or Alters any Information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means; Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage; “If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two three years or with fine which may extend to five lakh rupees or with both.” [S.66]
  15. S.66A - Punishment for sending offensive messages through communication service, etc. Any person who sends, by means of a computer resource or a communication device; Any information that is grossly offensive or has menacing character; or Any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device; Any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages; Shall be punishable with imprisonment for a term which may extend to three years and with fine.
  16. S. 66C - Punishment for identity theft “Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh” S. 66D - Punishment for cheating by personation by using computer resource “Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees. “
  17. How to Tackle Such Activities ? An important question arises that how can these crimes be prevented. A number of techniques and solutions have been presented but the problems still exists and are increasing day by day. •Antivirus And Anti Spyware Software: Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software. Anti spy wares are used to restrict backdoor program, Trojans and other spy wares to be installed on the computer. •Firewalls: A firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices, software programs, or a combination of the two. A network firewall typically guards an internal computer network against malicious access from outside the network.
  18. • Cryptography: Cryptography is the science of encrypting and decrypting information. Encryption is like sending a postal mail to another party with a lock code on the envelope which is known only to the sender and the recipient. A number of cryptographic methods have been developed and some of them are still not cracked. • Cyber Ethics and Laws: Cyber ethics and cyber laws are also being formulated to stop cyber crimes. It is a responsibility of every individual to follow cyber ethics and cyber laws so that the increasing cyber crimes shall reduce. Security Software like Anti Viruses and Anti Spy Wares should be installed on all computers, in order to remain secure from Cyber Crimes. Internet Service Providers should also provide high level of security at their servers in order to keep their clients secure from all types of viruses and malicious programs. • Uninstall unnecessary software ; • Maintain backup; • Avoid even browse email sent by some unknown sender; • Check security settings; • Stay anonymous - choose a genderless screen name; • Never give your full name or address to strangers; • Learn more about Internet privacy.
  19. Documented Cases • In June 2012 LinkedIn and eHarmony were attacked, compromising 65 million password hashes. 30,000 passwords were cracked and 1.5 million EHarmony passwords were posted online. • December 2012 Wells Fargo website experienced a denial of service attack. Potentially compromising 70 million customers and 8.5 million active viewers. Other banks thought to be compromised: Bank of America, J. P. Morgan U.S. Bank, and PNC Financial Services. • In January 2012 Zappos.com experienced a security breach after as many as 24 million customers' credit card numbers, personal information, billing and shipping addresses had been compromised. • April 23, 2013 saw the Associated Press' Twitter account's hacking to release a hoax tweet about fictional attacks in the White House that left President Obama injured. This erroneous tweet resulted in a brief plunge of 130 points from the Dow Jones Industrial Average, removal of $136 billion from S&P 500 index, and the temporary suspension of their Twitter account. The Dow Jones later restored its session gains.
  20. Conclusion As internet technology advances so does the threat of cyber crime. In times like these we must protect ourselves from cyber crime. Anti-virus software, firewalls and security patches are just the beginning. Never open suspicious e-mails and only navigate to trusted sites.” Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.
  21. Thank you! Project presented as a part of Information Practices practical Presented by: Divith Chhajed Class: XI – I Roll No.: 38
Anúncio