SlideShare a Scribd company logo
1 of 15
C
Y
B
E
R

C
R
I
M
E




    Welcome
          CYBER CRIME | 21/05/2011
C
Y
B



    C
E



        Battle among
R

C
R
I
M
E


    y     hackers
    b    & crackers
    e

                   CYBER CRIME | 21/05/2011
C
Y                        Introduction
B
E
R

C
R
     Cybercrime, refers to any crime that involves a
     computer and a network, where the computers may
I
M
E
     or may not have played an instrumental part in the
     commission of a crime. Net-crime refers, more
     precisely, to criminal exploitation of the Internet.
     Issues surrounding this type of crime have become
  C  high-profile, particularly those surrounding hacking,
  y  copyright infringement, and child grooming. There
     are also problems of privacy when confidential
  b  information is lost or intercepted, lawfully or
  e  otherwise.

C r ime                                                CYBER CRIME | 21/05/2011
C
Y                          Types Of CYBER CRIME
B
E
R

C
R
I
M
E        Financial Claims: This would include cheating, credit card
         frauds, money laundering etc.

          Sale of illegal articles: This would include sale of
         narcotics, weapons and wildlife etc., by posting information on
         websites, bulletin boards or simply by using e-mail
  C      communications.


  y Onlineabroad, thatThereonline gambling. In fact, it ishosted on
      servers
              gambling:
                        offer
                              are millions of websites, all
                                                            believed
  b that many of these websites are actually fronts for money
      laundering.
  e
C r ime                                                                    CYBER CRIME | 21/05/2011
C
Y                         Types Of CYBER CRIME
B
E
R

C
R
I        Forgery: Counterfeit currency notes, postage and revenue stamps,
M
E        mark sheets etc., can be forged using sophisticated computers,
         printers and scanners.

         Cyber Defamation: This occurs when defamation takes place
         with the help of computers and or the Internet e.g. someone
         published defamatory matter about someone on a websites or
  C      sends e-mail containing defamatory information to all of that
         person’s friends.
  y Cyber Stalking: Cyber stalking involves following a person’s
  b movements across the Internetthe victim, entering the chat-rooms
      bulletin boards frequented by
                                    by posting messages on the


  e frequented by the victim.
C r ime                                                                  CYBER CRIME | 21/05/2011
C
Y                          Types Of CYBER CRIME
B
E
R

C        E-Mail spoofing: A spoofed email is one that appears to originate
R
I        from one source but actually has been sent from another source.
M
E        This can also be termed as E-Mail forging.
         Intellectual Property Crimes: These include software
         piracy, copyright infringement, trademarks violations etc.

         Unauthorized access to computer system or network: This
         activity is commonly referred to as hacking. The Indian Law has
  C      however given a different connotation to the term hacking.


  y Theft of information stored in computer hard disks, removable
      includes
               information contained in electronic from: This


  b storage media etc.
  e E-Mail bombing: to the victim. refers to sending a large
      amount of e-mails
                        Email bombing


C r ime                                                                    CYBER CRIME | 21/05/2011
C
Y                           Types Of CYBER CRIME
B
E
R

C         Data diddling: This kind of an attack involves altering the raw
R
I         data just before it is processed by a computer and then changing it
M
E         back after the processing is completed.

          Salami attacks: Those attacks are used for the commission of
          financial crimes. The key here is to make the alteration so
          insignificant that in a single case it would go completely unnoticed
          e.g. A bank employee inserts a program into bank’s servers, that
  C       deducts a small amount from the account of every customer.


  y Denial of Service: than involves flooding computer resources
      with more requests
                         This
                              it can handle. This causes the resources
  b to crash thereby denying authorized users the service offered by
      the resources.
  e
C r ime                                                                    CYBER CRIME | 21/05/2011
C
Y                          Types Of CYBER CRIME
B
E
R

C        Virus/worm: Viruses are programs that attach themselves to a
R
I        computer or a file and then circulate themselves to other files and
M
E        to other computers on a network. They usually affect the data on a
         computer, either by altering or deleting it. Worms, unlike viruses
         don not need the host to attach themselves to.

         Logic bombs: These are dependent programs. This implies that
         these programs are created to do something only when a certain
  C      event occurs, e.g. some viruses may be termed logic bombs
         because they lie dormant all through the year and become active
  y      only on a particular date.


  b Trojan Horse:program which functions from inside what an to
      unauthorized
                   A Trojan as this program is aptly called, is
                                                                seems
  e be an authorized program, thereby concealing what it is actually
      doing.
C r ime                                                                  CYBER CRIME | 21/05/2011
C
Y                     TypesIntroduction
                            Of CYBER CRIME
B
E
R

C    Internet Time Theft: This connotes the usage by unauthorized
R
I    persons of the Internet hours paid for by another person.
M
E
     Physically damaging a computer system: This crime is
     committed by physically damaging a computer or its peripherals.




  C
  y
  b
  e
C r ime                                                            CYBER CRIME | 21/05/2011
C
Y         Where INDIA Stands
B
E
R

C
R
I
M
E




  C
  y
  b
  e
C r ime                        CYBER CRIME | 21/05/2011
C
Y                                Preventive Steps
B
E
R

C         CHILDREN:
R
I         Children should not give out identifying information such as
M
E         Name, Home address, School Name, Telephone Number or share
          photographs in a chat room.They should not respond to
          messages, which are suggestive, obscene, belligerent or
          threatening, and not to arrange a face-to –face meeting without
          telling parents or guardians. They should remember that people
          online might not be who they seem.
  C PARENTS:
  y Parent should gambling, hate speech, drugs, on PC toetc.
      children from
                    use content filtering software
                                                   alcohol
                                                             protect


  b There is also softwareto see whichtimeitem childrenuse of visited.
      and allowing parents
                           to establish
                                         site
                                              controls for
                                                            have
                                                                  limpets


  e Use this software to keep track of the type of activities of children.
C r ime                                                                CYBER CRIME | 21/05/2011
C
Y                      Preventive Steps
B
E
R

C
R
      ORGANISATIONS AND GOVERNMENT
I
M
E



      i.   PHYSICAL SECURITY:
      ii. ACCESS CONTROL:

  C iii.   PASSWORD:

  y iv.    FINDING THE HOLES IN NETWORK:

  b v.     USING ENCRYPTION

  e vi.    DETECTION

C r ime                                    CYBER CRIME | 21/05/2011
C
Y                               Conclusion
B
E
R

C    Capacity of human mind is unfathomable. It is not possible to
R
I    eliminate cyber crime from the cyber space. It is quite possible to
M
E    check them. History is the witness that no legislation has
     succeeded in totally eliminating crime from the globe. The only
     possible step is to make people aware of their rights and duties (to
     report crime as a collective duty towards the society) and further
     making the application of the laws more stringent to check crime.
     Undoubtedly the Act is a historical step in the cyber world.
  C  Further I all together do not deny that there is a need to bring
     changes in the Information Technology Act to make it more
  y  effective to combat cyber crime. I would conclude with a word of
     caution for the pro-legislation school that it should be kept in
  b  mind that the provisions of the cyber law are not made so
     stringent that it may retard the growth of the industry and prove
  e  to be counter-productive.


C r ime                                                               CYBER CRIME | 21/05/2011
C
Y             Queries
B
E
R

C
R




              ¿?
I
M
E




  C
  y
  b
  e
          ?
               ¿?
C r ime                 CYBER CRIME | 21/05/2011
C
Y
B
E
R

C
R
I
M
E




  C
  y
  b
  e
C r ime   CYBER CRIME | 21/05/2011

More Related Content

What's hot

Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among studentsjune21harsh
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationBenjamin Morley
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Cyber crimes among adolescents
Cyber crimes among adolescentsCyber crimes among adolescents
Cyber crimes among adolescentsTreesa Lobo
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010- Mark - Fullbright
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer SystemEjiro Ndifereke
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace Karnika Seth
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crimehomeworkping8
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)Jermaine Smith
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South AfricaJacqueline Fick
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
Name parul
Name parulName parul
Name parulParul231
 

What's hot (20)

Cyber crime among students
Cyber crime among studentsCyber crime among students
Cyber crime among students
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber safe girl e book
Cyber safe girl e bookCyber safe girl e book
Cyber safe girl e book
 
Stalking2
Stalking2Stalking2
Stalking2
 
Cyber crimes among adolescents
Cyber crimes among adolescentsCyber crimes among adolescents
Cyber crimes among adolescents
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer System
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Cyber law (identity theft)
Cyber law (identity theft)Cyber law (identity theft)
Cyber law (identity theft)
 
English in written
English in writtenEnglish in written
English in written
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101:  The Impact of Cyber Crime on Higher Education in South AfricaCyber Crime 101:  The Impact of Cyber Crime on Higher Education in South Africa
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
 
SEO2India - Cyber crime
SEO2India - Cyber crimeSEO2India - Cyber crime
SEO2India - Cyber crime
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
History of computer crime
History of computer crimeHistory of computer crime
History of computer crime
 
Name parul
Name parulName parul
Name parul
 

Similar to Cyber crime

Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxsainnrg
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)Priyatham Kanigarla
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptxsainnrg
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simonudhaya jeni
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreofficesolomon24
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionTejasvi Bhatia
 

Similar to Cyber crime (20)

Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simon
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime law libreoffice
Cyber crime law libreofficeCyber crime law libreoffice
Cyber crime law libreoffice
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Cyber crime

  • 1. C Y B E R C R I M E Welcome CYBER CRIME | 21/05/2011
  • 2. C Y B C E Battle among R C R I M E y hackers b & crackers e CYBER CRIME | 21/05/2011
  • 3. C Y Introduction B E R C R Cybercrime, refers to any crime that involves a computer and a network, where the computers may I M E or may not have played an instrumental part in the commission of a crime. Net-crime refers, more precisely, to criminal exploitation of the Internet. Issues surrounding this type of crime have become C high-profile, particularly those surrounding hacking, y copyright infringement, and child grooming. There are also problems of privacy when confidential b information is lost or intercepted, lawfully or e otherwise. C r ime CYBER CRIME | 21/05/2011
  • 4. C Y Types Of CYBER CRIME B E R C R I M E Financial Claims: This would include cheating, credit card frauds, money laundering etc. Sale of illegal articles: This would include sale of narcotics, weapons and wildlife etc., by posting information on websites, bulletin boards or simply by using e-mail C communications. y Onlineabroad, thatThereonline gambling. In fact, it ishosted on servers gambling: offer are millions of websites, all believed b that many of these websites are actually fronts for money laundering. e C r ime CYBER CRIME | 21/05/2011
  • 5. C Y Types Of CYBER CRIME B E R C R I Forgery: Counterfeit currency notes, postage and revenue stamps, M E mark sheets etc., can be forged using sophisticated computers, printers and scanners. Cyber Defamation: This occurs when defamation takes place with the help of computers and or the Internet e.g. someone published defamatory matter about someone on a websites or C sends e-mail containing defamatory information to all of that person’s friends. y Cyber Stalking: Cyber stalking involves following a person’s b movements across the Internetthe victim, entering the chat-rooms bulletin boards frequented by by posting messages on the e frequented by the victim. C r ime CYBER CRIME | 21/05/2011
  • 6. C Y Types Of CYBER CRIME B E R C E-Mail spoofing: A spoofed email is one that appears to originate R I from one source but actually has been sent from another source. M E This can also be termed as E-Mail forging. Intellectual Property Crimes: These include software piracy, copyright infringement, trademarks violations etc. Unauthorized access to computer system or network: This activity is commonly referred to as hacking. The Indian Law has C however given a different connotation to the term hacking. y Theft of information stored in computer hard disks, removable includes information contained in electronic from: This b storage media etc. e E-Mail bombing: to the victim. refers to sending a large amount of e-mails Email bombing C r ime CYBER CRIME | 21/05/2011
  • 7. C Y Types Of CYBER CRIME B E R C Data diddling: This kind of an attack involves altering the raw R I data just before it is processed by a computer and then changing it M E back after the processing is completed. Salami attacks: Those attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed e.g. A bank employee inserts a program into bank’s servers, that C deducts a small amount from the account of every customer. y Denial of Service: than involves flooding computer resources with more requests This it can handle. This causes the resources b to crash thereby denying authorized users the service offered by the resources. e C r ime CYBER CRIME | 21/05/2011
  • 8. C Y Types Of CYBER CRIME B E R C Virus/worm: Viruses are programs that attach themselves to a R I computer or a file and then circulate themselves to other files and M E to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms, unlike viruses don not need the host to attach themselves to. Logic bombs: These are dependent programs. This implies that these programs are created to do something only when a certain C event occurs, e.g. some viruses may be termed logic bombs because they lie dormant all through the year and become active y only on a particular date. b Trojan Horse:program which functions from inside what an to unauthorized A Trojan as this program is aptly called, is seems e be an authorized program, thereby concealing what it is actually doing. C r ime CYBER CRIME | 21/05/2011
  • 9. C Y TypesIntroduction Of CYBER CRIME B E R C Internet Time Theft: This connotes the usage by unauthorized R I persons of the Internet hours paid for by another person. M E Physically damaging a computer system: This crime is committed by physically damaging a computer or its peripherals. C y b e C r ime CYBER CRIME | 21/05/2011
  • 10. C Y Where INDIA Stands B E R C R I M E C y b e C r ime CYBER CRIME | 21/05/2011
  • 11. C Y Preventive Steps B E R C CHILDREN: R I Children should not give out identifying information such as M E Name, Home address, School Name, Telephone Number or share photographs in a chat room.They should not respond to messages, which are suggestive, obscene, belligerent or threatening, and not to arrange a face-to –face meeting without telling parents or guardians. They should remember that people online might not be who they seem. C PARENTS: y Parent should gambling, hate speech, drugs, on PC toetc. children from use content filtering software alcohol protect b There is also softwareto see whichtimeitem childrenuse of visited. and allowing parents to establish site controls for have limpets e Use this software to keep track of the type of activities of children. C r ime CYBER CRIME | 21/05/2011
  • 12. C Y Preventive Steps B E R C R ORGANISATIONS AND GOVERNMENT I M E i. PHYSICAL SECURITY: ii. ACCESS CONTROL: C iii. PASSWORD: y iv. FINDING THE HOLES IN NETWORK: b v. USING ENCRYPTION e vi. DETECTION C r ime CYBER CRIME | 21/05/2011
  • 13. C Y Conclusion B E R C Capacity of human mind is unfathomable. It is not possible to R I eliminate cyber crime from the cyber space. It is quite possible to M E check them. History is the witness that no legislation has succeeded in totally eliminating crime from the globe. The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime. Undoubtedly the Act is a historical step in the cyber world. C Further I all together do not deny that there is a need to bring changes in the Information Technology Act to make it more y effective to combat cyber crime. I would conclude with a word of caution for the pro-legislation school that it should be kept in b mind that the provisions of the cyber law are not made so stringent that it may retard the growth of the industry and prove e to be counter-productive. C r ime CYBER CRIME | 21/05/2011
  • 14. C Y Queries B E R C R ¿? I M E C y b e ? ¿? C r ime CYBER CRIME | 21/05/2011
  • 15. C Y B E R C R I M E C y b e C r ime CYBER CRIME | 21/05/2011