SlideShare une entreprise Scribd logo
1  sur  51
Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                 1
Why learn about Cyber Crime ?
     Because
     • Everybody is using Computers!!
     • New Generation is growing up with
       Computers
     • Most important monitory transaction are
       moving on the Internet.
     • Murder, Extortion, Kidnapping, etc are being
       committed with the help of Computers


Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                 2
Crime
  •   Crime is a social and economic
    phenomenon and is as old as the human
    society. The hallmark of criminality is
    that, it is breach of the criminal law.
  • A crime may be said to be any conduct
    accompanied by act or omission
    prohibited by law and consequential
    breach of which is visited by penal
    consequence
Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                 3
Cyber Crime
 • A generalized definition of cyber crime
   may be “ unlawful acts wherein the
   computer is either a tool or target or both
 • Cyber crime is the latest and perhaps the
   most complicated problem in the cyber
   world.



Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                 4
Computer as a tool to commit crime
    •Child porn, threatening email, sexual
    harassment,
      defamation, spam, phishing, assumin
    g     someone’s identity
  Computer itself becomes target of crime
     hacking

    Viruses, worms, industrial espionage,

      software piracy,
Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                 5
Why Cyber Crimes Increasing?
•
          Connectivity is Global - No boundaries
          Ability to obtain tools, exploits, and
                vulnerabilities via the Web
          Numerous vulnerable targets
          Easy concealment - Anonymous Hacks
          Low equipment costs and access



    Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                     6
Cyber crimes seldom reported !!!
•
                 Embarrassment.
                 Loss of public confidence.
                 False arrest concerns


               56% of crimes are NOT REPORTED


    Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                     7
How it differ from other crimes ?
  Can be committed in a jurisdiction
  without being physically present in it.
  Easy to learn how to commit.
  Requires few resources relative to the
  potential damage caused.




Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                 8
Import Acts against Cyber Crimes
  1.      Information Technology Act 2000
  2.      Indian Penal Code – 1860
  3.      Indian Copyright Act – 1957
 • IT Act Applicable to all states of India
   including Jammu & Kashmir
 • It is applicable to any violation of the
   provisions of this Act done by any person
     anywhere in the world.

Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                 9
• The subject of cyber crime may be
    broadly classified under the following
    three groups. They are-

     1. Against Individuals
     2. Against Organization
     3. Against Society at large


Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                 10
Harassment via e-mails / SMS.
  Cyber-stalking.
  Defamation.
  Email spoofing
  Unauthorized control/access over
   computer system.
  Indecent exposure
   Dissemination of obscene material
    Cheating & Fraud

Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                 11
Computer vandalism.
        Transmitting of virus.
        Unauthorized control/access over
         computer system.
        Intellectual Property crimes
        Internet time thefts
        Cheating & Fraud

Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                 12
Pornography (basically child pornography).
     Polluting the youth through indecent
      exposure.
     Trafficking
     Financial crimes
     Sale of illegal articles
     Online gambling
     Forgery


Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                 13
Hacking

         It is an art of getting into a place and taking
  control over it. Unauthorized access of computer
  ,       computer             resources,               telecommunication
  devices, telecommunication media, etc.                          .




Ph : 0477 -2230804    Email : cybercellalpy@keralapolice.gov.in
                                                                       14
Hacking : - Hacker can be used to denote a
computer expert engaged in solving complex
problems on computers or persons securing
unauthorized access, looks around , collects
information and leaves without a trace. Hacking
done with malicious intention is called cracker.

 Phreaker:- is a person who manipulates and
  disrupts telecomm        systems. Today
  telecommunication systems has also been
  computerized.

Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                 15
Section 66 – Hacking with computer systems.

  Punishable with imprisonment up to three
                                        years, or with
  fine which may extend up to two lakh rupees, or with
  both




Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                 16
CYBER CRIME AGAINST
     WOMEN & CHILDREN




Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
BULLYING

   Email
  Spoofing                                                         Cyber Stalking


                     Cyber Crime Against
                           Women

 Morphing                                                           Defamation

                                Pornography

Ph : 0477 -2230804     Email : cybercellalpy@keralapolice.gov.in
Mobile Phone Harassment
    Mobile phone harrassment is also called BULLYING, which
    is a general term to describe any type of unwanted
    telephone     calls    or    messages,       or picture
    messages, intended to cause upset and grief !!!
     Section 509 of IPC . Word, gesture or act intended to insult
     the modesty of a woman

  punished with simple imprisonment for a term which may
  extend to one year, or with fine, or with both.
  66 A of IT Act 2008- Punishment for sending offensive messages
  through communication service, etc



Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
Cyber Stalking
   A person following another especially
   women and continuously harassing through
   online
   Cyber Stalking is generally considered as use of
   the Internet, e-mail or other electronic
   communications device to stalk or harass a person.
   Sec.500,509 IPC
    Punishable with simple imprisonment for a term
   which may extend to two years, or with fine, or with
   both.
   66 A Punishment for sending offensive
   messages through communication service, etc
Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
What motivates a cyber Stalker?
                     •   Sexual Harassment
                     •   Obsession for love
                     •   Revenge & Hate
                     •   Ego & Power Trips
     Their main targets are the mostly
     females, children, emotionally weak or
     unstable, etc. It is believed that Over 75% of
     the victims are female

Ph : 0477 -2230804       Email : cybercellalpy@keralapolice.gov.in
Pornography
   • Publishing sexual activities in the form of
     visuals, audio or through text to raise erotic
     feelings rather than aesthetic.

New concept called as SEXTING
Sending sexually explicit pictures by cell phone or Email




Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                 22
Violation of Privacy & Pornography
     Sec 66 IT Act & See 119 of KP Act
      Whoever, intentionally or knowingly captures, publishes
or transmits the image of a private area of any person without
his or her consent.
            shall be punished with imprisonment which may
extend to 5 years or with fine not exceeding 1 lakh rupees, or
with both
      Section 67 – Publishing of information which is
obscene in electronic form
     shall be punished with imprisonment which may extend
to 5 years or with fine not exceeding 1 lakh rupees, or with
both


Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                 23
Email Spoofing
 “ A spoofed email is one that appears to originate
 from one source but actually has been sent from
 another source “
     Example :

               Priya@yahoo.com                        Noufal@google.com


                     spoofed


            Santhosh@yahoo.com
Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
E-Mail Spoofing
     • Sonia Gandhi threat case in Kochi is the best
       example of spoofing reported in our State.
     • . Forgery of electronic records , Email
       spoofing - Sec 463, 464, 468, 469 IPC
     • shall be punished with imprisonment of
       either description for a term which may
       extend to three years, and shall also be
       liable to fine.

Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
Cyber Defamation
        Publishing statements                               lowering   the
  reputation of persons.
  When someone publishes defamatory matter
  about someone on a website or sends e-mails,
  pictures,     etc.     containing     defamatory
  information to all of that person's friends or on
  the internet
  Defamation is defined as an intentional false
  communication, either published or publicly
  spoken, that injures another’s reputation or good
  name.
Ph : 0477 -2230804
             .        Email : cybercellalpy@keralapolice.gov.in
Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
E-Mail Abuse, Online Defamation - Sec.500, 509

     Whoever, intending to insult the modesty of
any woman, utters any word, makes any sound or
gesture, or exhibits any object, intending that such
word or sound shall be heard, of that such gesture or
object shall be seen, by such woman, or intrudes
upon      the    privacy     of      such     woman

Sec 500 IPC - simple imprisonment for a term which may extend to
two years, or with fine, or with both.

Section 509 - simple imprisonment for a term which may extend to
one year, or with fine, or with both

Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
NEW TRENDS & CHALLENGES IN
                    CYBER CRIME

         Online Lottery Scam
         Online Job Offers
         ATM Fraud
         Phishing
         Russian Wife Scam


Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
Appointment Letter




            Ph : 0477 -2230804
26 January 2013
                                 Email : cybercellalpy@keralapolice.gov.in
Microsoft Award




                                                                              HI
                                                                             TEC
                                                                              H
                                                                             CRI
                                                                              ME
                                                                             ENQ
            Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in   UIRY
26 January 2013
                                                                             CEL
VISA




                                                                              HI
                                                                             TEC
                                                                              H
                                                                             CRI
                                                                              ME
                                                                             ENQ
            Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in   UIRY
26 January 2013
                                                                             CEL
Residence permit




                                                                              HI
                                                                             TEC
                                                                              H
                                                                             CRI
                                                                              ME
                                                                             ENQ
            Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in   UIRY
26 January 2013
                                                                             CEL
Online Cheating
Section 468. Forgery for purpose of cheating
       Whoever commits forgery, intending that the
document or Electronic Record forged shall be used for the
purpose of cheating, shall be punished with imprisonment
of either description for a term which may extend to seven
years, and shall also be liable to fine
Section 420. Cheating and dishonestly inducing
delivery of property
       shall be punished with imprisonment of either
description for a term which may extend to seven
years,    and   shall  also   be    liable  to fine.

Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
Cyber Piracy
  Cyber Piracy is defined as art of making illegal copies
 of Music, Books, software etc for the purpose of sale.


 The major form of piracy on the net is violation of
copyrights and trade marks. A part of this piracy had also
been cyber squatting of domain names.


Shall be punishable under section. 51, 63, 63B
           of Indian Copyright act

Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
The Indian Situation- Piracy
• Where we stand
     – Twentieth in top 20 pirating countries
     – At 73%, behind China (92%), Vietnam (92%), Indonesia
       (88%) and Russia (87%)
     – Losses at $367 million
• Benefits of piracy control
     – Reduction of piracy by 10% will
          •   Promote innovation
          •   Add $1.2 billion to GDP
          •   Create 48,000 jobs
          •   Add $92 million to tax revenues
Ph : 0477 -2230804      Email : cybercellalpy@keralapolice.gov.in
Salami Attacks
 Debiting small amount of assets etc from a large source.“
This attack involves making alteration so insignificant that
in a single case it would go completely unnoticed. Attacks
are used for commission of financial crimes “
                                             Deducts a small amount
            Bank’s Server
                                             from every customer’s a/c

                     Inserts a program
                                                                    Feeds it into



           Bank employee Arun                                    Arun’s a/c
                                       accesses


Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
Salami Attacks
Sec 65. Tampering with Computer Source
document
Whoever knowingly or intentionally conceals, destroys or
alters or intentionally or knowingly causes another to
conceal, destroy or alter any computer source code used
for a computer, computer program, computer system or
computer network, when the computer source code is
required to be kept or maintained by law for the time being
in force, shall be punishable with imprisonment up to three
years, or with fine which may extend up to two lakh
rupees, or with both.

Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
Launching of virus
    Virus, worms and Trojans are software programme
    designed to cause damage to the contents of a
    computer-data, memory etc. The effects of
    computer differs.
    For eg: if infected by ping pong the image of a
    bouncing ball appear across the computer screen,
    If infected by Michael Angelo ,or Friday 13,the
    entire files will be destroyed.
    In US vs Moris, a student, as a practical joke created
    a worm which replicated itself and within hours
    6000 computers were affected.

Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                 40
Code Red Spreads
     2001 July 19, Midnight – 159 hosts infected




Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
Code Red Spreads
   2001 July 19, 11:40 am – 4,920 hosts infected




                                 2001




Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
Code Red Spreads
    July 20, Midnight – 341,015 hosts infected




Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
Cyber squatting
   Using the reputed            domain names to deceive
   persons.eg:- instead of philips.com using phillips.com
   - by doubling “l” letter the person confuses the public.

META TAGGING ON WEBSITES
    Using a reputed trade mark in a domain name
    deceiving the public. Eg playboy and playmate are
    registered trade mark of US.
    A person creates a site as follows.
     playboyxxx.com and playmatelive.com


Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                 44
Phishing
 Phishing has been called “The Perfect Cyber
  Crime”
 Growing faster than any other online threat
 Difficult to catch the criminals
 People who receive Phishing attacks are three
  times as likely to become victims.
 E-bay hijacking becoming more common



Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
How is phishing done?
     – Criminal creates a “mirror” website that looks
       like a legitimate website
     – They fool people into going to that site, which
       transmits your username or password to the
       them
     – Using pop-up windows to conceal the real
       address in the victim’s address bar
     – “Pharming” victim redirected to a scam
       website when the victim types in the real
       address
Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
Actual Login Page




Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
Deceptive Login Page




Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
•A Word On Passwords
     •Chatting with strangers
     •Rules of the Road on the Internet
     •Don’t while Surfing
     •Cyber Security Tips


Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                 49
A Word On Passwords

    The worst passwords to use are the ones that come to
   mind first -- name, spouse's name, maiden
   name, pets, children's name, even street addresses, etc.

    The best passwords mix numbers with upper and
   lowercase letters.

    A password that is not found in the dictionary is even
   better. There are programs that will try every word in the
   dictionary in an effort to crack your security.

    Changing passwords regularly
Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                 50
Ph : 0477 -2230804   Email : cybercellalpy@keralapolice.gov.in
                                                                 51

Contenu connexe

Tendances (20)

Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
cyber crime - slideshare by jayed hossain jibon
cyber crime - slideshare  by  jayed hossain jiboncyber crime - slideshare  by  jayed hossain jibon
cyber crime - slideshare by jayed hossain jibon
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crimes among adolescents
Cyber crimes among adolescentsCyber crimes among adolescents
Cyber crimes among adolescents
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and cyber laws
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 

Similaire à Understanding Cyber Crimes (35 characters

Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime AwarenessSibesh Singh
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber CrimesDINESH KAMBLE
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxFroilan Cantillo
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxAalbert Albert
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.pptMohaiUDin
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Fahad Saleem
 
Cyber Sexual Violence and Understanding
Cyber Sexual Violence and UnderstandingCyber Sexual Violence and Understanding
Cyber Sexual Violence and Understandingssusere22fb9
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptxTheMuslimLady
 
Cyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesCyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesJayakumar PP
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 

Similaire à Understanding Cyber Crimes (35 characters (20)

Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Prekaj Cybercrime By the Italian Team
Prekaj Cybercrime  By the Italian TeamPrekaj Cybercrime  By the Italian Team
Prekaj Cybercrime By the Italian Team
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Living in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptxLiving in the IT Era - Lesson 5.pptx
Living in the IT Era - Lesson 5.pptx
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
cybercrime.pptx
cybercrime.pptxcybercrime.pptx
cybercrime.pptx
 
cyber-laws.ppt
cyber-laws.pptcyber-laws.ppt
cyber-laws.ppt
 
Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues Brief Discussion of Cyber Crime issues
Brief Discussion of Cyber Crime issues
 
Cyber Sexual Violence and Understanding
Cyber Sexual Violence and UnderstandingCyber Sexual Violence and Understanding
Cyber Sexual Violence and Understanding
 
cyber laws in pakistan.pptx
cyber laws in pakistan.pptxcyber laws in pakistan.pptx
cyber laws in pakistan.pptx
 
Cyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesCyber Space Threats and Opportunities
Cyber Space Threats and Opportunities
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Plus de Jayakumar PP

Financial Crime and Investigation- Finacial Frauds
Financial Crime and Investigation- Finacial FraudsFinancial Crime and Investigation- Finacial Frauds
Financial Crime and Investigation- Finacial FraudsJayakumar PP
 
Blockchain technology and logistics management
Blockchain technology and logistics managementBlockchain technology and logistics management
Blockchain technology and logistics managementJayakumar PP
 
Akshaya Banking Kiosk
Akshaya Banking KioskAkshaya Banking Kiosk
Akshaya Banking KioskJayakumar PP
 
Akshaya Project of Government of Kerala
Akshaya Project of Government of KeralaAkshaya Project of Government of Kerala
Akshaya Project of Government of KeralaJayakumar PP
 
Akshaya down the years
Akshaya down the yearsAkshaya down the years
Akshaya down the yearsJayakumar PP
 
IT to IOT Evolution
IT to IOT EvolutionIT to IOT Evolution
IT to IOT EvolutionJayakumar PP
 
Planning in Software Projects
Planning in Software ProjectsPlanning in Software Projects
Planning in Software ProjectsJayakumar PP
 

Plus de Jayakumar PP (8)

Financial Crime and Investigation- Finacial Frauds
Financial Crime and Investigation- Finacial FraudsFinancial Crime and Investigation- Finacial Frauds
Financial Crime and Investigation- Finacial Frauds
 
Blockchain technology and logistics management
Blockchain technology and logistics managementBlockchain technology and logistics management
Blockchain technology and logistics management
 
Akshaya Banking Kiosk
Akshaya Banking KioskAkshaya Banking Kiosk
Akshaya Banking Kiosk
 
Akshaya Project of Government of Kerala
Akshaya Project of Government of KeralaAkshaya Project of Government of Kerala
Akshaya Project of Government of Kerala
 
Akshaya down the years
Akshaya down the yearsAkshaya down the years
Akshaya down the years
 
IT to IOT Evolution
IT to IOT EvolutionIT to IOT Evolution
IT to IOT Evolution
 
CCTNS
CCTNS CCTNS
CCTNS
 
Planning in Software Projects
Planning in Software ProjectsPlanning in Software Projects
Planning in Software Projects
 

Understanding Cyber Crimes (35 characters

  • 1. Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 1
  • 2. Why learn about Cyber Crime ? Because • Everybody is using Computers!! • New Generation is growing up with Computers • Most important monitory transaction are moving on the Internet. • Murder, Extortion, Kidnapping, etc are being committed with the help of Computers Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 2
  • 3. Crime • Crime is a social and economic phenomenon and is as old as the human society. The hallmark of criminality is that, it is breach of the criminal law. • A crime may be said to be any conduct accompanied by act or omission prohibited by law and consequential breach of which is visited by penal consequence Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 3
  • 4. Cyber Crime • A generalized definition of cyber crime may be “ unlawful acts wherein the computer is either a tool or target or both • Cyber crime is the latest and perhaps the most complicated problem in the cyber world. Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 4
  • 5. Computer as a tool to commit crime •Child porn, threatening email, sexual harassment, defamation, spam, phishing, assumin g someone’s identity Computer itself becomes target of crime  hacking Viruses, worms, industrial espionage, software piracy, Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 5
  • 6. Why Cyber Crimes Increasing? • Connectivity is Global - No boundaries Ability to obtain tools, exploits, and vulnerabilities via the Web Numerous vulnerable targets Easy concealment - Anonymous Hacks Low equipment costs and access Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 6
  • 7. Cyber crimes seldom reported !!! • Embarrassment. Loss of public confidence. False arrest concerns 56% of crimes are NOT REPORTED Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 7
  • 8. How it differ from other crimes ? Can be committed in a jurisdiction without being physically present in it. Easy to learn how to commit. Requires few resources relative to the potential damage caused. Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 8
  • 9. Import Acts against Cyber Crimes 1. Information Technology Act 2000 2. Indian Penal Code – 1860 3. Indian Copyright Act – 1957 • IT Act Applicable to all states of India including Jammu & Kashmir • It is applicable to any violation of the provisions of this Act done by any person anywhere in the world. Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 9
  • 10. • The subject of cyber crime may be broadly classified under the following three groups. They are- 1. Against Individuals 2. Against Organization 3. Against Society at large Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 10
  • 11. Harassment via e-mails / SMS. Cyber-stalking. Defamation. Email spoofing Unauthorized control/access over computer system. Indecent exposure  Dissemination of obscene material Cheating & Fraud Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 11
  • 12. Computer vandalism. Transmitting of virus. Unauthorized control/access over computer system. Intellectual Property crimes Internet time thefts Cheating & Fraud Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 12
  • 13. Pornography (basically child pornography). Polluting the youth through indecent exposure. Trafficking Financial crimes Sale of illegal articles Online gambling Forgery Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 13
  • 14. Hacking It is an art of getting into a place and taking control over it. Unauthorized access of computer , computer resources, telecommunication devices, telecommunication media, etc. . Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 14
  • 15. Hacking : - Hacker can be used to denote a computer expert engaged in solving complex problems on computers or persons securing unauthorized access, looks around , collects information and leaves without a trace. Hacking done with malicious intention is called cracker. Phreaker:- is a person who manipulates and disrupts telecomm systems. Today telecommunication systems has also been computerized. Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 15
  • 16. Section 66 – Hacking with computer systems. Punishable with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 16
  • 17. CYBER CRIME AGAINST WOMEN & CHILDREN Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 18. BULLYING Email Spoofing Cyber Stalking Cyber Crime Against Women Morphing Defamation Pornography Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 19. Mobile Phone Harassment Mobile phone harrassment is also called BULLYING, which is a general term to describe any type of unwanted telephone calls or messages, or picture messages, intended to cause upset and grief !!! Section 509 of IPC . Word, gesture or act intended to insult the modesty of a woman punished with simple imprisonment for a term which may extend to one year, or with fine, or with both. 66 A of IT Act 2008- Punishment for sending offensive messages through communication service, etc Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 20. Cyber Stalking A person following another especially women and continuously harassing through online Cyber Stalking is generally considered as use of the Internet, e-mail or other electronic communications device to stalk or harass a person. Sec.500,509 IPC Punishable with simple imprisonment for a term which may extend to two years, or with fine, or with both. 66 A Punishment for sending offensive messages through communication service, etc Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 21. What motivates a cyber Stalker? • Sexual Harassment • Obsession for love • Revenge & Hate • Ego & Power Trips Their main targets are the mostly females, children, emotionally weak or unstable, etc. It is believed that Over 75% of the victims are female Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 22. Pornography • Publishing sexual activities in the form of visuals, audio or through text to raise erotic feelings rather than aesthetic. New concept called as SEXTING Sending sexually explicit pictures by cell phone or Email Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 22
  • 23. Violation of Privacy & Pornography Sec 66 IT Act & See 119 of KP Act Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent. shall be punished with imprisonment which may extend to 5 years or with fine not exceeding 1 lakh rupees, or with both Section 67 – Publishing of information which is obscene in electronic form shall be punished with imprisonment which may extend to 5 years or with fine not exceeding 1 lakh rupees, or with both Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 23
  • 24. Email Spoofing “ A spoofed email is one that appears to originate from one source but actually has been sent from another source “ Example : Priya@yahoo.com Noufal@google.com spoofed Santhosh@yahoo.com Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 25. E-Mail Spoofing • Sonia Gandhi threat case in Kochi is the best example of spoofing reported in our State. • . Forgery of electronic records , Email spoofing - Sec 463, 464, 468, 469 IPC • shall be punished with imprisonment of either description for a term which may extend to three years, and shall also be liable to fine. Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 26. Cyber Defamation Publishing statements lowering the reputation of persons. When someone publishes defamatory matter about someone on a website or sends e-mails, pictures, etc. containing defamatory information to all of that person's friends or on the internet Defamation is defined as an intentional false communication, either published or publicly spoken, that injures another’s reputation or good name. Ph : 0477 -2230804 . Email : cybercellalpy@keralapolice.gov.in
  • 27. Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 28. Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 29. E-Mail Abuse, Online Defamation - Sec.500, 509 Whoever, intending to insult the modesty of any woman, utters any word, makes any sound or gesture, or exhibits any object, intending that such word or sound shall be heard, of that such gesture or object shall be seen, by such woman, or intrudes upon the privacy of such woman Sec 500 IPC - simple imprisonment for a term which may extend to two years, or with fine, or with both. Section 509 - simple imprisonment for a term which may extend to one year, or with fine, or with both Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 30. NEW TRENDS & CHALLENGES IN CYBER CRIME  Online Lottery Scam  Online Job Offers  ATM Fraud  Phishing  Russian Wife Scam Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 31. Appointment Letter Ph : 0477 -2230804 26 January 2013 Email : cybercellalpy@keralapolice.gov.in
  • 32. Microsoft Award HI TEC H CRI ME ENQ Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in UIRY 26 January 2013 CEL
  • 33. VISA HI TEC H CRI ME ENQ Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in UIRY 26 January 2013 CEL
  • 34. Residence permit HI TEC H CRI ME ENQ Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in UIRY 26 January 2013 CEL
  • 35. Online Cheating Section 468. Forgery for purpose of cheating Whoever commits forgery, intending that the document or Electronic Record forged shall be used for the purpose of cheating, shall be punished with imprisonment of either description for a term which may extend to seven years, and shall also be liable to fine Section 420. Cheating and dishonestly inducing delivery of property shall be punished with imprisonment of either description for a term which may extend to seven years, and shall also be liable to fine. Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 36. Cyber Piracy  Cyber Piracy is defined as art of making illegal copies of Music, Books, software etc for the purpose of sale.  The major form of piracy on the net is violation of copyrights and trade marks. A part of this piracy had also been cyber squatting of domain names. Shall be punishable under section. 51, 63, 63B of Indian Copyright act Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 37. The Indian Situation- Piracy • Where we stand – Twentieth in top 20 pirating countries – At 73%, behind China (92%), Vietnam (92%), Indonesia (88%) and Russia (87%) – Losses at $367 million • Benefits of piracy control – Reduction of piracy by 10% will • Promote innovation • Add $1.2 billion to GDP • Create 48,000 jobs • Add $92 million to tax revenues Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 38. Salami Attacks Debiting small amount of assets etc from a large source.“ This attack involves making alteration so insignificant that in a single case it would go completely unnoticed. Attacks are used for commission of financial crimes “ Deducts a small amount Bank’s Server from every customer’s a/c Inserts a program Feeds it into Bank employee Arun Arun’s a/c accesses Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 39. Salami Attacks Sec 65. Tampering with Computer Source document Whoever knowingly or intentionally conceals, destroys or alters or intentionally or knowingly causes another to conceal, destroy or alter any computer source code used for a computer, computer program, computer system or computer network, when the computer source code is required to be kept or maintained by law for the time being in force, shall be punishable with imprisonment up to three years, or with fine which may extend up to two lakh rupees, or with both. Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 40. Launching of virus Virus, worms and Trojans are software programme designed to cause damage to the contents of a computer-data, memory etc. The effects of computer differs. For eg: if infected by ping pong the image of a bouncing ball appear across the computer screen, If infected by Michael Angelo ,or Friday 13,the entire files will be destroyed. In US vs Moris, a student, as a practical joke created a worm which replicated itself and within hours 6000 computers were affected. Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 40
  • 41. Code Red Spreads 2001 July 19, Midnight – 159 hosts infected Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 42. Code Red Spreads 2001 July 19, 11:40 am – 4,920 hosts infected 2001 Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 43. Code Red Spreads July 20, Midnight – 341,015 hosts infected Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 44. Cyber squatting Using the reputed domain names to deceive persons.eg:- instead of philips.com using phillips.com - by doubling “l” letter the person confuses the public. META TAGGING ON WEBSITES Using a reputed trade mark in a domain name deceiving the public. Eg playboy and playmate are registered trade mark of US. A person creates a site as follows. playboyxxx.com and playmatelive.com Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 44
  • 45. Phishing Phishing has been called “The Perfect Cyber Crime” Growing faster than any other online threat Difficult to catch the criminals People who receive Phishing attacks are three times as likely to become victims. E-bay hijacking becoming more common Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 46. How is phishing done? – Criminal creates a “mirror” website that looks like a legitimate website – They fool people into going to that site, which transmits your username or password to the them – Using pop-up windows to conceal the real address in the victim’s address bar – “Pharming” victim redirected to a scam website when the victim types in the real address Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 47. Actual Login Page Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 48. Deceptive Login Page Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in
  • 49. •A Word On Passwords •Chatting with strangers •Rules of the Road on the Internet •Don’t while Surfing •Cyber Security Tips Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 49
  • 50. A Word On Passwords  The worst passwords to use are the ones that come to mind first -- name, spouse's name, maiden name, pets, children's name, even street addresses, etc.  The best passwords mix numbers with upper and lowercase letters.  A password that is not found in the dictionary is even better. There are programs that will try every word in the dictionary in an effort to crack your security.  Changing passwords regularly Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 50
  • 51. Ph : 0477 -2230804 Email : cybercellalpy@keralapolice.gov.in 51