Acknowledgement
This project is done as a semester project,
as a part of 11th .
I am very thankful to my instructor ,
Mrs. Malvika Sharma of Delhi Public School,
Bopal, for her valuable guidance and
supervision , without which the
accomplishment of this task would have
never been possible. I also thank her for
giving me an opportunity to explore into
the real world and realize the importance of
technology and its application.
I also take up this opportunity to thank all
my friends for their help due to which
completion of the task was possible and
also my family for their support.
Index
SR
NO.
Content Slide No.
(From-To)
1. Overview 5
2. What is Cyber Crime? 6
3. Threats to a Computer System 7
4. History and Crime Evolution Timeline 8
5. Cyber Crime Variants 9-12
6. Types of Cyber Attack (in %) 13
7. Cyber Crime in India 14
8.
Information Technology
Amendment Act (from Year 2008)
15-17
9. How to Tackle the Attack? 18-19
10. Some Documented Cases 20
11. Conclusion 21
Overview
The internet has grown rapidly and still
expands. It has given rise to new opportunities in
every field we can think of be it entertainment,
business, sports or education. But there’re always
two sides to a coin. Internet also has it’s own
disadvantages.
Crime has always been unpleasant and
unavoidable ingredient in our society. And now as
computers and internet have dominated the
society due to the dependence in matters of
communication, banking, finance, examination
and many other.
They have become virtual lockers storing all
our information and secrets. And as it is essential
and important in our lives, crime cannot spare it
too.
Every day criminals evolve new methods to
invade our virtual lockers or even our privacy
created in or via computers.
It is essential for the users now days to stay
cautious and secure their interest, and this project
focuses on some of the common threats to a
computer system.
What is Cyber Crime ?
• Cyber Crime is a term used to broadly describe
criminal activity in which computers or
computer networks are a tool, a target, or a
place of criminal activity and include everything
from electronic cracking to denial of service
attacks. It is also used to include traditional
crimes in which computers or networks are
used to enable the illicit activity.
• Computer crime mainly consists of
unauthorized access to computer systems data
alteration, data destruction, theft of intellectual
property. Cyber crime in the context of national
security may involve hacking, traditional
espionage, or information warfare and related
activities.
• Child pornography, Threatening Email,
Assuming someone's Identity, Sexual
Harassment, Defamation, Spam and Phishing
are some examples where computers are used
to commit crime, whereas Viruses, Worms and
Industrial Espionage, Software Piracy and
Hacking are examples where computers
become target of crime.
Threats to a Computer
System
•Information security often refers to
as CIA (Confidentiality, Integrity and
Authentication), protects our
computer from any unauthorized
access and maintains the system
resources. Precisely,
•Confidentiality:
•Protection of the computer system
from any unauthorized access
•Integrity:
•Information is protected and hasn’t
been altered by unauthorized users
or software
•Authentication:
•Data is accessible to authorized users
and ensures the authenticity of the
authorized user
History
• The first cyber crime ever recorded was in the
year 1820.
• The first spam email took place in 1978 when it
was sent out over the ARPANET (Advanced
Research Projects Agency Network.
• The first virus was installed on an Apple
computer in 1982.
Virus
-1977
Breaking
Web Sites
-1995
Malicious
Code
(Melissa)
-2000
Advanced
Worm
(ILOVEYOU)
-2003-04
Identity
Theft
-2005-06
Cyber Threat evolution
timeline
Cyber Crime Variants
•Hacking
"Hacking" is a crime, which entails cracking
systems and gaining unauthorized access to the data
stored in them. Hacking had witnessed a 37 per cent
increase this year.
•Cyber Squatting
Cyber Squatting is the act of registering a
famous Domain Name and then selling it for a
fortune. This is an issue that has not been tackled in IT
ACT 2000.
•Computer vandalism
Damaging or destroying data rather than
stealing and also transmitting virus.
•Viruses
Viruses are computer programs developed to
copy themselves and infect other files stored on the
computer. They move from computer to computer by
attaching themselves to files or boot records of disks
and diskettes
Phishing-Vishing
•Phishing
Phishing is just one of the many frauds
on the Internet, trying to fool people into
parting with their money. Phishing refers to
the receipt of unsolicited emails by customers
of Financial Institutions, requesting them to
enter their Username, Password or other
personal information to access their Account
for some reason.
The fraudster then has access to the
customer's online bank account and to the funds
contained in that account.
•Vishing
Vishing is the criminal practice of using
social engineering and Voice over IP (VoIP) to
gain access to private personal and financial
information from the public for the purpose
of financial reward. The term is a combination
of “Voice" and phishing. Vishing exploits the
public's trust in landline telephone services.
Vishing is typically used to steal credit
card numbers or other information used in
identity theft schemes from individuals.
Cyber Stalking is use of the Internet or other
electronic means to stalk someone. This term is used
interchangeably with online harassment and online
abuse. Stalking generally involves harassing or
threatening behaviour that an individual engages in
repeatedly, such as following a person, appearing at
a person's home or place of business, making
harassing phone calls, leaving written messages or
objects, or vandalizing a person's property.
•Cyber-terrorism
Cyberterrorism in general, can be defined as an
act of terrorism committed through the use of
cyberspace or computer resources (Parker 1983). As
such, a simple propaganda in the Internet, that
there will be bomb attacks during the holidays can
be considered cyberterrorism. As well there are also
hacking activities directed towards individuals,
families, organized by groups within networks,
tending to cause fear among people, demonstrate
power, collecting information relevant for ruining
peoples' lives, robberies, blackmailing etc.
Fraud and financial crimes
•Computer fraud is any dishonest
misrepresentation of fact intended to let
another to do or refrain from doing
something which causes loss. In this
context, the fraud will result in obtaining a
benefit by:
• Altering in an unauthorized way. This requires
little technical expertise and is common form of
theft by employees altering the data before
entry or entering false data, or by entering
unauthorized instructions or using unauthorized
processes;
• Altering, destroying, suppressing, or stealing
output, usually to conceal unauthorized
transactions. This is difficult to detect;
• Altering or deleting stored data;
• Other forms of fraud may be facilitated using
computer systems, including bank
fraud, carding, identity theft, extortion,
and theft of classified information.
• A variety of internet scams, many based
on phishing and social engineering, target
consumers and businesses.
TYPES OF CYBER ATTACK
(in %)
Cyber Attack Percentage
Financial fraud 11%
Sabotage of data/networks 17%
Theft of proprietary information 20%
System penetration from the
outside
25%
Denial of service 27%
Unauthorized access by insiders 71%
Employee abuse of internet
privileges
79%
Viruses 85%
Cyber Crime In India
The majority of cybercrimes are
centered on forgery, fraud and Phishing,
India is the third-most targeted country
for Phishing attacks after the US and the
UK,
Social networks as well as ecommerce
sites are major targets,
6.9 million bot-infected systems in 2010,
14,348 website defacements in 2010,
6,850 .in and 4,150 .com domains were
defaced during 2011,
15,000 sites hacked in 2011,
India is the number 1 country in the
world for generating spam.
Information Technology
Amendment Act, 2008
Section – 43,
Destroys, Deletes or Alters any Information residing in
a computer resource or diminishes its value or utility
or affects it injuriously by any means;
Steals, conceals, destroys or alters or causes any
person to steal, conceal, destroy or alter any
computer source code used for a computer resource
with an intention to cause damage;
“If any person, dishonestly, or fraudulently, does any
act referred to in section 43, he shall be punishable
with imprisonment for a term which may extend to
two three years or with fine which may extend to five
lakh rupees or with both.” [S.66]
S.66A - Punishment for sending offensive
messages through communication service, etc.
Any person who sends, by means of a
computer resource or a communication
device;
Any information that is grossly offensive or
has menacing character; or
Any information which he knows to be
false, but for the purpose of causing
annoyance, inconvenience, danger,
obstruction, insult, injury, criminal
intimidation, enmity, hatred, or ill will,
persistently makes by making use of such
computer resource or a communication
device;
Any electronic mail or electronic mail
message for the purpose of causing
annoyance or inconvenience or to deceive
or to mislead the addressee or recipient
about the origin of such messages;
Shall be punishable with imprisonment for a term
which may extend to three years and with fine.
S. 66C - Punishment for identity theft
“Whoever, fraudulently or dishonestly
make use of the electronic signature,
password or any other unique identification
feature of any other person, shall be punished
with imprisonment of either description for a
term which may extend to three years and
shall also be liable to fine which may extend
to rupees one lakh”
S. 66D - Punishment for cheating by
personation by using computer resource
“Whoever, by means of any
communication device or computer resource
cheats by personation, shall be punished with
imprisonment of either description for a term
which may extend to three years and shall
also be liable to fine which may extend to one
lakh rupees. “
How to Tackle Such Activities
?
An important question arises that how can these
crimes be prevented. A number of techniques and
solutions have been presented but the problems still
exists and are increasing day by day.
•Antivirus And Anti Spyware Software:
Antivirus software consists of computer
programs that attempt to identify, thwart and
eliminate computer viruses and other malicious
software. Anti spy wares are used to restrict backdoor
program, Trojans and other spy wares to be installed
on the computer.
•Firewalls:
A firewall protects a computer network from
unauthorized access. Network firewalls may be
hardware devices, software programs, or a
combination of the two. A network firewall typically
guards an internal computer network against
malicious access from outside the network.
• Cryptography:
Cryptography is the science of encrypting and
decrypting information. Encryption is like sending a postal
mail to another party with a lock code on the envelope
which is known only to the sender and the recipient. A
number of cryptographic methods have been developed
and some of them are still not cracked.
• Cyber Ethics and Laws:
Cyber ethics and cyber laws are also being
formulated to stop cyber crimes. It is a responsibility of
every individual to follow cyber ethics and cyber laws so
that the increasing cyber crimes shall reduce. Security
Software like Anti Viruses and Anti Spy Wares should be
installed on all computers, in order to remain secure from
Cyber Crimes. Internet Service Providers should also
provide high level of security at their servers in order to
keep their clients secure from all types of viruses and
malicious programs.
• Uninstall unnecessary software ;
• Maintain backup;
• Avoid even browse email sent by some unknown sender;
• Check security settings;
• Stay anonymous - choose a genderless screen name;
• Never give your full name or address to strangers;
• Learn more about Internet privacy.
Documented Cases
• In June 2012 LinkedIn and eHarmony were
attacked, compromising 65 million password
hashes. 30,000 passwords were cracked and 1.5
million EHarmony passwords were posted
online.
• December 2012 Wells Fargo website
experienced a denial of service attack.
Potentially compromising 70 million customers
and 8.5 million active viewers. Other banks
thought to be compromised: Bank of America, J.
P. Morgan U.S. Bank, and PNC Financial Services.
• In January 2012 Zappos.com experienced a
security breach after as many as 24 million
customers' credit card numbers, personal
information, billing and shipping addresses had
been compromised.
• April 23, 2013 saw the Associated Press' Twitter
account's hacking to release a hoax tweet about
fictional attacks in the White House that
left President Obama injured. This erroneous
tweet resulted in a brief plunge of 130 points
from the Dow Jones Industrial Average, removal
of $136 billion from S&P 500 index, and the
temporary suspension of their Twitter account.
The Dow Jones later restored its session gains.
Conclusion
As internet technology advances so does the
threat of cyber crime. In times like these we must
protect ourselves from cyber crime. Anti-virus
software, firewalls and security patches are just
the beginning. Never open suspicious e-mails
and only navigate to trusted sites.”
Technology is destructive only in the
hands of people who do not realize that
they are one and the same process as the
universe.
Thank you!
Project presented as a part of
Information Practices practical
Presented by: Divith Chhajed
Class: XI – I
Roll No.: 38