SlideShare uma empresa Scribd logo
1 de 22
Cyber
Crime
Name: Divith Chhajed
Class: XI Section: I
Roll Number: 38
- If we can defeat them sitting at home ...
Who needs to fight with tanks and guns!
Acknowledgement
This project is done as a semester project,
as a part of 11th .
I am very thankful to my instructor ,
Mrs. Malvika Sharma of Delhi Public School,
Bopal, for her valuable guidance and
supervision , without which the
accomplishment of this task would have
never been possible. I also thank her for
giving me an opportunity to explore into
the real world and realize the importance of
technology and its application.
I also take up this opportunity to thank all
my friends for their help due to which
completion of the task was possible and
also my family for their support.
Index
SR
NO.
Content Slide No.
(From-To)
1. Overview 5
2. What is Cyber Crime? 6
3. Threats to a Computer System 7
4. History and Crime Evolution Timeline 8
5. Cyber Crime Variants 9-12
6. Types of Cyber Attack (in %) 13
7. Cyber Crime in India 14
8.
Information Technology
Amendment Act (from Year 2008)
15-17
9. How to Tackle the Attack? 18-19
10. Some Documented Cases 20
11. Conclusion 21
Overview
The internet has grown rapidly and still
expands. It has given rise to new opportunities in
every field we can think of be it entertainment,
business, sports or education. But there’re always
two sides to a coin. Internet also has it’s own
disadvantages.
Crime has always been unpleasant and
unavoidable ingredient in our society. And now as
computers and internet have dominated the
society due to the dependence in matters of
communication, banking, finance, examination
and many other.
They have become virtual lockers storing all
our information and secrets. And as it is essential
and important in our lives, crime cannot spare it
too.
Every day criminals evolve new methods to
invade our virtual lockers or even our privacy
created in or via computers.
It is essential for the users now days to stay
cautious and secure their interest, and this project
focuses on some of the common threats to a
computer system.
What is Cyber Crime ?
• Cyber Crime is a term used to broadly describe
criminal activity in which computers or
computer networks are a tool, a target, or a
place of criminal activity and include everything
from electronic cracking to denial of service
attacks. It is also used to include traditional
crimes in which computers or networks are
used to enable the illicit activity.
• Computer crime mainly consists of
unauthorized access to computer systems data
alteration, data destruction, theft of intellectual
property. Cyber crime in the context of national
security may involve hacking, traditional
espionage, or information warfare and related
activities.
• Child pornography, Threatening Email,
Assuming someone's Identity, Sexual
Harassment, Defamation, Spam and Phishing
are some examples where computers are used
to commit crime, whereas Viruses, Worms and
Industrial Espionage, Software Piracy and
Hacking are examples where computers
become target of crime.
Threats to a Computer
System
•Information security often refers to
as CIA (Confidentiality, Integrity and
Authentication), protects our
computer from any unauthorized
access and maintains the system
resources. Precisely,
•Confidentiality:
•Protection of the computer system
from any unauthorized access
•Integrity:
•Information is protected and hasn’t
been altered by unauthorized users
or software
•Authentication:
•Data is accessible to authorized users
and ensures the authenticity of the
authorized user
History
• The first cyber crime ever recorded was in the
year 1820.
• The first spam email took place in 1978 when it
was sent out over the ARPANET (Advanced
Research Projects Agency Network.
• The first virus was installed on an Apple
computer in 1982.
Virus
-1977
Breaking
Web Sites
-1995
Malicious
Code
(Melissa)
-2000
Advanced
Worm
(ILOVEYOU)
-2003-04
Identity
Theft
-2005-06
Cyber Threat evolution
timeline
Cyber Crime Variants
•Hacking
"Hacking" is a crime, which entails cracking
systems and gaining unauthorized access to the data
stored in them. Hacking had witnessed a 37 per cent
increase this year.
•Cyber Squatting
Cyber Squatting is the act of registering a
famous Domain Name and then selling it for a
fortune. This is an issue that has not been tackled in IT
ACT 2000.
•Computer vandalism
Damaging or destroying data rather than
stealing and also transmitting virus.
•Viruses
Viruses are computer programs developed to
copy themselves and infect other files stored on the
computer. They move from computer to computer by
attaching themselves to files or boot records of disks
and diskettes
Phishing-Vishing
•Phishing
Phishing is just one of the many frauds
on the Internet, trying to fool people into
parting with their money. Phishing refers to
the receipt of unsolicited emails by customers
of Financial Institutions, requesting them to
enter their Username, Password or other
personal information to access their Account
for some reason.
The fraudster then has access to the
customer's online bank account and to the funds
contained in that account.
•Vishing
Vishing is the criminal practice of using
social engineering and Voice over IP (VoIP) to
gain access to private personal and financial
information from the public for the purpose
of financial reward. The term is a combination
of “Voice" and phishing. Vishing exploits the
public's trust in landline telephone services.
Vishing is typically used to steal credit
card numbers or other information used in
identity theft schemes from individuals.
Cyber Stalking is use of the Internet or other
electronic means to stalk someone. This term is used
interchangeably with online harassment and online
abuse. Stalking generally involves harassing or
threatening behaviour that an individual engages in
repeatedly, such as following a person, appearing at
a person's home or place of business, making
harassing phone calls, leaving written messages or
objects, or vandalizing a person's property.
•Cyber-terrorism
Cyberterrorism in general, can be defined as an
act of terrorism committed through the use of
cyberspace or computer resources (Parker 1983). As
such, a simple propaganda in the Internet, that
there will be bomb attacks during the holidays can
be considered cyberterrorism. As well there are also
hacking activities directed towards individuals,
families, organized by groups within networks,
tending to cause fear among people, demonstrate
power, collecting information relevant for ruining
peoples' lives, robberies, blackmailing etc.
Fraud and financial crimes
•Computer fraud is any dishonest
misrepresentation of fact intended to let
another to do or refrain from doing
something which causes loss. In this
context, the fraud will result in obtaining a
benefit by:
• Altering in an unauthorized way. This requires
little technical expertise and is common form of
theft by employees altering the data before
entry or entering false data, or by entering
unauthorized instructions or using unauthorized
processes;
• Altering, destroying, suppressing, or stealing
output, usually to conceal unauthorized
transactions. This is difficult to detect;
• Altering or deleting stored data;
• Other forms of fraud may be facilitated using
computer systems, including bank
fraud, carding, identity theft, extortion,
and theft of classified information.
• A variety of internet scams, many based
on phishing and social engineering, target
consumers and businesses.
TYPES OF CYBER ATTACK
(in %)
Cyber Attack Percentage
Financial fraud 11%
Sabotage of data/networks 17%
Theft of proprietary information 20%
System penetration from the
outside
25%
Denial of service 27%
Unauthorized access by insiders 71%
Employee abuse of internet
privileges
79%
Viruses 85%
Cyber Crime In India
The majority of cybercrimes are
centered on forgery, fraud and Phishing,
India is the third-most targeted country
for Phishing attacks after the US and the
UK,
Social networks as well as ecommerce
sites are major targets,
6.9 million bot-infected systems in 2010,
14,348 website defacements in 2010,
6,850 .in and 4,150 .com domains were
defaced during 2011,
15,000 sites hacked in 2011,
India is the number 1 country in the
world for generating spam.
Information Technology
Amendment Act, 2008
Section – 43,
Destroys, Deletes or Alters any Information residing in
a computer resource or diminishes its value or utility
or affects it injuriously by any means;
Steals, conceals, destroys or alters or causes any
person to steal, conceal, destroy or alter any
computer source code used for a computer resource
with an intention to cause damage;
“If any person, dishonestly, or fraudulently, does any
act referred to in section 43, he shall be punishable
with imprisonment for a term which may extend to
two three years or with fine which may extend to five
lakh rupees or with both.” [S.66]
S.66A - Punishment for sending offensive
messages through communication service, etc.
Any person who sends, by means of a
computer resource or a communication
device;
Any information that is grossly offensive or
has menacing character; or
Any information which he knows to be
false, but for the purpose of causing
annoyance, inconvenience, danger,
obstruction, insult, injury, criminal
intimidation, enmity, hatred, or ill will,
persistently makes by making use of such
computer resource or a communication
device;
Any electronic mail or electronic mail
message for the purpose of causing
annoyance or inconvenience or to deceive
or to mislead the addressee or recipient
about the origin of such messages;
Shall be punishable with imprisonment for a term
which may extend to three years and with fine.
S. 66C - Punishment for identity theft
“Whoever, fraudulently or dishonestly
make use of the electronic signature,
password or any other unique identification
feature of any other person, shall be punished
with imprisonment of either description for a
term which may extend to three years and
shall also be liable to fine which may extend
to rupees one lakh”
S. 66D - Punishment for cheating by
personation by using computer resource
“Whoever, by means of any
communication device or computer resource
cheats by personation, shall be punished with
imprisonment of either description for a term
which may extend to three years and shall
also be liable to fine which may extend to one
lakh rupees. “
How to Tackle Such Activities
?
An important question arises that how can these
crimes be prevented. A number of techniques and
solutions have been presented but the problems still
exists and are increasing day by day.
•Antivirus And Anti Spyware Software:
Antivirus software consists of computer
programs that attempt to identify, thwart and
eliminate computer viruses and other malicious
software. Anti spy wares are used to restrict backdoor
program, Trojans and other spy wares to be installed
on the computer.
•Firewalls:
A firewall protects a computer network from
unauthorized access. Network firewalls may be
hardware devices, software programs, or a
combination of the two. A network firewall typically
guards an internal computer network against
malicious access from outside the network.
• Cryptography:
Cryptography is the science of encrypting and
decrypting information. Encryption is like sending a postal
mail to another party with a lock code on the envelope
which is known only to the sender and the recipient. A
number of cryptographic methods have been developed
and some of them are still not cracked.
• Cyber Ethics and Laws:
Cyber ethics and cyber laws are also being
formulated to stop cyber crimes. It is a responsibility of
every individual to follow cyber ethics and cyber laws so
that the increasing cyber crimes shall reduce. Security
Software like Anti Viruses and Anti Spy Wares should be
installed on all computers, in order to remain secure from
Cyber Crimes. Internet Service Providers should also
provide high level of security at their servers in order to
keep their clients secure from all types of viruses and
malicious programs.
• Uninstall unnecessary software ;
• Maintain backup;
• Avoid even browse email sent by some unknown sender;
• Check security settings;
• Stay anonymous - choose a genderless screen name;
• Never give your full name or address to strangers;
• Learn more about Internet privacy.
Documented Cases
• In June 2012 LinkedIn and eHarmony were
attacked, compromising 65 million password
hashes. 30,000 passwords were cracked and 1.5
million EHarmony passwords were posted
online.
• December 2012 Wells Fargo website
experienced a denial of service attack.
Potentially compromising 70 million customers
and 8.5 million active viewers. Other banks
thought to be compromised: Bank of America, J.
P. Morgan U.S. Bank, and PNC Financial Services.
• In January 2012 Zappos.com experienced a
security breach after as many as 24 million
customers' credit card numbers, personal
information, billing and shipping addresses had
been compromised.
• April 23, 2013 saw the Associated Press' Twitter
account's hacking to release a hoax tweet about
fictional attacks in the White House that
left President Obama injured. This erroneous
tweet resulted in a brief plunge of 130 points
from the Dow Jones Industrial Average, removal
of $136 billion from S&P 500 index, and the
temporary suspension of their Twitter account.
The Dow Jones later restored its session gains.
Conclusion
As internet technology advances so does the
threat of cyber crime. In times like these we must
protect ourselves from cyber crime. Anti-virus
software, firewalls and security patches are just
the beginning. Never open suspicious e-mails
and only navigate to trusted sites.”
Technology is destructive only in the
hands of people who do not realize that
they are one and the same process as the
universe.
Thank you!
Project presented as a part of
Information Practices practical
Presented by: Divith Chhajed
Class: XI – I
Roll No.: 38

Mais conteúdo relacionado

Mais procurados

To find the refractive indexes of (a) water,(b) oil using a plane mirror, an ...
To find the refractive indexes of (a) water,(b) oil using a plane mirror, an ...To find the refractive indexes of (a) water,(b) oil using a plane mirror, an ...
To find the refractive indexes of (a) water,(b) oil using a plane mirror, an ...
AnkitSharma1903
 
Computer Science Investigatory Project Class 12
Computer Science Investigatory Project Class 12Computer Science Investigatory Project Class 12
Computer Science Investigatory Project Class 12
Self-employed
 

Mais procurados (20)

Project on Digital India Class 12
Project on Digital India Class 12Project on Digital India Class 12
Project on Digital India Class 12
 
Class 12 Biology Investigatory Project CBSE
Class 12 Biology Investigatory Project CBSEClass 12 Biology Investigatory Project CBSE
Class 12 Biology Investigatory Project CBSE
 
Physics Practical File - with Readings | Class 12 CBSE
Physics Practical File - with Readings | Class 12 CBSEPhysics Practical File - with Readings | Class 12 CBSE
Physics Practical File - with Readings | Class 12 CBSE
 
To find the refractive indexes of (a) water,(b) oil using a plane mirror, an ...
To find the refractive indexes of (a) water,(b) oil using a plane mirror, an ...To find the refractive indexes of (a) water,(b) oil using a plane mirror, an ...
To find the refractive indexes of (a) water,(b) oil using a plane mirror, an ...
 
computer science with python project for class 12 cbse
computer science with python project for class 12 cbsecomputer science with python project for class 12 cbse
computer science with python project for class 12 cbse
 
chemistry project on detection of caffeine in tea
chemistry project on detection of caffeine in teachemistry project on detection of caffeine in tea
chemistry project on detection of caffeine in tea
 
Child labour in india m com project
Child labour in india m com project Child labour in india m com project
Child labour in india m com project
 
Informatics Practices/ Information Practices Project (IP Project Class 12)
Informatics Practices/ Information Practices Project (IP Project Class 12)Informatics Practices/ Information Practices Project (IP Project Class 12)
Informatics Practices/ Information Practices Project (IP Project Class 12)
 
Computer Project for class 12 CBSE on school management
Computer Project for class 12 CBSE on school managementComputer Project for class 12 CBSE on school management
Computer Project for class 12 CBSE on school management
 
Factors on which the internal resistance/emf of a cell depends
Factors on which the internal resistance/emf of a cell dependsFactors on which the internal resistance/emf of a cell depends
Factors on which the internal resistance/emf of a cell depends
 
Library Management Python, MySQL
Library Management Python, MySQLLibrary Management Python, MySQL
Library Management Python, MySQL
 
English project
English projectEnglish project
English project
 
Chemistry project for Class 12
Chemistry project for Class 12Chemistry project for Class 12
Chemistry project for Class 12
 
Economics Class 12 CBSE project on GST (Goods and Services Tax)
Economics Class 12 CBSE project on GST (Goods and Services Tax)Economics Class 12 CBSE project on GST (Goods and Services Tax)
Economics Class 12 CBSE project on GST (Goods and Services Tax)
 
Study of common food adulterants in fat, oil, butter, sugar, turmeric power...
Study  of common food adulterants in fat, oil, butter,  sugar, turmeric power...Study  of common food adulterants in fat, oil, butter,  sugar, turmeric power...
Study of common food adulterants in fat, oil, butter, sugar, turmeric power...
 
chemistry investigatory project on food adulteration
chemistry investigatory project on food adulterationchemistry investigatory project on food adulteration
chemistry investigatory project on food adulteration
 
Physics activity file Class 12 - Saksham
Physics activity file Class 12 - SakshamPhysics activity file Class 12 - Saksham
Physics activity file Class 12 - Saksham
 
Computer Science Investigatory Project Class 12
Computer Science Investigatory Project Class 12Computer Science Investigatory Project Class 12
Computer Science Investigatory Project Class 12
 
English Project work.pdf
English Project work.pdfEnglish Project work.pdf
English Project work.pdf
 
Physics Investigatory - Electromagnetic Induction. CLASS XII
Physics Investigatory - Electromagnetic Induction.    CLASS XIIPhysics Investigatory - Electromagnetic Induction.    CLASS XII
Physics Investigatory - Electromagnetic Induction. CLASS XII
 

Semelhante a Cyber Crime

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 

Semelhante a Cyber Crime (20)

cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj AhirwarCyber Crime and Security ppt by Neeraj Ahirwar
Cyber Crime and Security ppt by Neeraj Ahirwar
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 

Último

一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
F
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
AS
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
F
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
F
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 

Último (20)

一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Leading-edge AI Image Generators of 2024
Leading-edge AI Image Generators of 2024Leading-edge AI Image Generators of 2024
Leading-edge AI Image Generators of 2024
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
 
PIC Microcontroller Structure & Assembly Language.ppsx
PIC Microcontroller Structure & Assembly Language.ppsxPIC Microcontroller Structure & Assembly Language.ppsx
PIC Microcontroller Structure & Assembly Language.ppsx
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 

Cyber Crime

  • 1. Cyber Crime Name: Divith Chhajed Class: XI Section: I Roll Number: 38 - If we can defeat them sitting at home ... Who needs to fight with tanks and guns!
  • 2.
  • 3. Acknowledgement This project is done as a semester project, as a part of 11th . I am very thankful to my instructor , Mrs. Malvika Sharma of Delhi Public School, Bopal, for her valuable guidance and supervision , without which the accomplishment of this task would have never been possible. I also thank her for giving me an opportunity to explore into the real world and realize the importance of technology and its application. I also take up this opportunity to thank all my friends for their help due to which completion of the task was possible and also my family for their support.
  • 4. Index SR NO. Content Slide No. (From-To) 1. Overview 5 2. What is Cyber Crime? 6 3. Threats to a Computer System 7 4. History and Crime Evolution Timeline 8 5. Cyber Crime Variants 9-12 6. Types of Cyber Attack (in %) 13 7. Cyber Crime in India 14 8. Information Technology Amendment Act (from Year 2008) 15-17 9. How to Tackle the Attack? 18-19 10. Some Documented Cases 20 11. Conclusion 21
  • 5. Overview The internet has grown rapidly and still expands. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education. But there’re always two sides to a coin. Internet also has it’s own disadvantages. Crime has always been unpleasant and unavoidable ingredient in our society. And now as computers and internet have dominated the society due to the dependence in matters of communication, banking, finance, examination and many other. They have become virtual lockers storing all our information and secrets. And as it is essential and important in our lives, crime cannot spare it too. Every day criminals evolve new methods to invade our virtual lockers or even our privacy created in or via computers. It is essential for the users now days to stay cautious and secure their interest, and this project focuses on some of the common threats to a computer system.
  • 6. What is Cyber Crime ? • Cyber Crime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It is also used to include traditional crimes in which computers or networks are used to enable the illicit activity. • Computer crime mainly consists of unauthorized access to computer systems data alteration, data destruction, theft of intellectual property. Cyber crime in the context of national security may involve hacking, traditional espionage, or information warfare and related activities. • Child pornography, Threatening Email, Assuming someone's Identity, Sexual Harassment, Defamation, Spam and Phishing are some examples where computers are used to commit crime, whereas Viruses, Worms and Industrial Espionage, Software Piracy and Hacking are examples where computers become target of crime.
  • 7. Threats to a Computer System •Information security often refers to as CIA (Confidentiality, Integrity and Authentication), protects our computer from any unauthorized access and maintains the system resources. Precisely, •Confidentiality: •Protection of the computer system from any unauthorized access •Integrity: •Information is protected and hasn’t been altered by unauthorized users or software •Authentication: •Data is accessible to authorized users and ensures the authenticity of the authorized user
  • 8. History • The first cyber crime ever recorded was in the year 1820. • The first spam email took place in 1978 when it was sent out over the ARPANET (Advanced Research Projects Agency Network. • The first virus was installed on an Apple computer in 1982. Virus -1977 Breaking Web Sites -1995 Malicious Code (Melissa) -2000 Advanced Worm (ILOVEYOU) -2003-04 Identity Theft -2005-06 Cyber Threat evolution timeline
  • 9. Cyber Crime Variants •Hacking "Hacking" is a crime, which entails cracking systems and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 per cent increase this year. •Cyber Squatting Cyber Squatting is the act of registering a famous Domain Name and then selling it for a fortune. This is an issue that has not been tackled in IT ACT 2000. •Computer vandalism Damaging or destroying data rather than stealing and also transmitting virus. •Viruses Viruses are computer programs developed to copy themselves and infect other files stored on the computer. They move from computer to computer by attaching themselves to files or boot records of disks and diskettes
  • 10. Phishing-Vishing •Phishing Phishing is just one of the many frauds on the Internet, trying to fool people into parting with their money. Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason. The fraudster then has access to the customer's online bank account and to the funds contained in that account. •Vishing Vishing is the criminal practice of using social engineering and Voice over IP (VoIP) to gain access to private personal and financial information from the public for the purpose of financial reward. The term is a combination of “Voice" and phishing. Vishing exploits the public's trust in landline telephone services. Vishing is typically used to steal credit card numbers or other information used in identity theft schemes from individuals.
  • 11. Cyber Stalking is use of the Internet or other electronic means to stalk someone. This term is used interchangeably with online harassment and online abuse. Stalking generally involves harassing or threatening behaviour that an individual engages in repeatedly, such as following a person, appearing at a person's home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person's property. •Cyber-terrorism Cyberterrorism in general, can be defined as an act of terrorism committed through the use of cyberspace or computer resources (Parker 1983). As such, a simple propaganda in the Internet, that there will be bomb attacks during the holidays can be considered cyberterrorism. As well there are also hacking activities directed towards individuals, families, organized by groups within networks, tending to cause fear among people, demonstrate power, collecting information relevant for ruining peoples' lives, robberies, blackmailing etc.
  • 12. Fraud and financial crimes •Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss. In this context, the fraud will result in obtaining a benefit by: • Altering in an unauthorized way. This requires little technical expertise and is common form of theft by employees altering the data before entry or entering false data, or by entering unauthorized instructions or using unauthorized processes; • Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions. This is difficult to detect; • Altering or deleting stored data; • Other forms of fraud may be facilitated using computer systems, including bank fraud, carding, identity theft, extortion, and theft of classified information. • A variety of internet scams, many based on phishing and social engineering, target consumers and businesses.
  • 13. TYPES OF CYBER ATTACK (in %) Cyber Attack Percentage Financial fraud 11% Sabotage of data/networks 17% Theft of proprietary information 20% System penetration from the outside 25% Denial of service 27% Unauthorized access by insiders 71% Employee abuse of internet privileges 79% Viruses 85%
  • 14. Cyber Crime In India The majority of cybercrimes are centered on forgery, fraud and Phishing, India is the third-most targeted country for Phishing attacks after the US and the UK, Social networks as well as ecommerce sites are major targets, 6.9 million bot-infected systems in 2010, 14,348 website defacements in 2010, 6,850 .in and 4,150 .com domains were defaced during 2011, 15,000 sites hacked in 2011, India is the number 1 country in the world for generating spam.
  • 15. Information Technology Amendment Act, 2008 Section – 43, Destroys, Deletes or Alters any Information residing in a computer resource or diminishes its value or utility or affects it injuriously by any means; Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any computer source code used for a computer resource with an intention to cause damage; “If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend to two three years or with fine which may extend to five lakh rupees or with both.” [S.66]
  • 16. S.66A - Punishment for sending offensive messages through communication service, etc. Any person who sends, by means of a computer resource or a communication device; Any information that is grossly offensive or has menacing character; or Any information which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by making use of such computer resource or a communication device; Any electronic mail or electronic mail message for the purpose of causing annoyance or inconvenience or to deceive or to mislead the addressee or recipient about the origin of such messages; Shall be punishable with imprisonment for a term which may extend to three years and with fine.
  • 17. S. 66C - Punishment for identity theft “Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one lakh” S. 66D - Punishment for cheating by personation by using computer resource “Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to one lakh rupees. “
  • 18. How to Tackle Such Activities ? An important question arises that how can these crimes be prevented. A number of techniques and solutions have been presented but the problems still exists and are increasing day by day. •Antivirus And Anti Spyware Software: Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software. Anti spy wares are used to restrict backdoor program, Trojans and other spy wares to be installed on the computer. •Firewalls: A firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices, software programs, or a combination of the two. A network firewall typically guards an internal computer network against malicious access from outside the network.
  • 19. • Cryptography: Cryptography is the science of encrypting and decrypting information. Encryption is like sending a postal mail to another party with a lock code on the envelope which is known only to the sender and the recipient. A number of cryptographic methods have been developed and some of them are still not cracked. • Cyber Ethics and Laws: Cyber ethics and cyber laws are also being formulated to stop cyber crimes. It is a responsibility of every individual to follow cyber ethics and cyber laws so that the increasing cyber crimes shall reduce. Security Software like Anti Viruses and Anti Spy Wares should be installed on all computers, in order to remain secure from Cyber Crimes. Internet Service Providers should also provide high level of security at their servers in order to keep their clients secure from all types of viruses and malicious programs. • Uninstall unnecessary software ; • Maintain backup; • Avoid even browse email sent by some unknown sender; • Check security settings; • Stay anonymous - choose a genderless screen name; • Never give your full name or address to strangers; • Learn more about Internet privacy.
  • 20. Documented Cases • In June 2012 LinkedIn and eHarmony were attacked, compromising 65 million password hashes. 30,000 passwords were cracked and 1.5 million EHarmony passwords were posted online. • December 2012 Wells Fargo website experienced a denial of service attack. Potentially compromising 70 million customers and 8.5 million active viewers. Other banks thought to be compromised: Bank of America, J. P. Morgan U.S. Bank, and PNC Financial Services. • In January 2012 Zappos.com experienced a security breach after as many as 24 million customers' credit card numbers, personal information, billing and shipping addresses had been compromised. • April 23, 2013 saw the Associated Press' Twitter account's hacking to release a hoax tweet about fictional attacks in the White House that left President Obama injured. This erroneous tweet resulted in a brief plunge of 130 points from the Dow Jones Industrial Average, removal of $136 billion from S&P 500 index, and the temporary suspension of their Twitter account. The Dow Jones later restored its session gains.
  • 21. Conclusion As internet technology advances so does the threat of cyber crime. In times like these we must protect ourselves from cyber crime. Anti-virus software, firewalls and security patches are just the beginning. Never open suspicious e-mails and only navigate to trusted sites.” Technology is destructive only in the hands of people who do not realize that they are one and the same process as the universe.
  • 22. Thank you! Project presented as a part of Information Practices practical Presented by: Divith Chhajed Class: XI – I Roll No.: 38