SlideShare une entreprise Scribd logo
1  sur  33
Introduction to Cybercrime
Chapter 1
Introduction
Cybercrime: Definition and Origins of the
Word
Cybercrime and Information Security
Who are Cybercriminals?
Classifications of Cybercrimes
 Internet in India is growing rapidly
 Unrestricted no. of free websites, the Internet has deniably
opened a new exploitation known as cybercrime
 Activates involve the use of computer, Internet, Cyberspace
and WWW
 1st recorded cybercrime took place in the year 1820
 Indian corporate and government sites have been attacked or
defaced more than 780 times between Feb 2002 & Dec 2002
 3,286 Indian websites were hacked in 5months – between
Jan & June 2009
Cyberspace: (by William Gibson in 1984)
• Worldwide n/w of Computer networks that uses
the TCP/IP for communication to facilitate
transmission and exchange of data
Cybersquatting:
• Means registering, selling or using a domain name
with intent of profiting from goodwill of someone
else’s trademark
 Cyberpunk: (by Bruce Bethke, 1980)
• Mean something like “anarchy via machine” or
“machine/computer rebel movement”
 Cyberwarfare:
• Means information warriors unleashing vicious attacks
against an unsuspecting opponent’s computer
networks, wreaking havoc and paralyzing nations.
 Cyberterrorism: (by Barry Collin, 1997)
• Use of disruptive activities, or the threat, against
computers and/or networks, with the intention to cause
harm or further social, ideological, religious, political or
similar objectives or to intimidate any person in
furtherance of such objectives
 “A crime conducted in which a computer was
directly or significantly instrumental”
 “Cybercrime is any illegal behavior, directed
by means of electronic operations, that
targets the security of computer systems and
the data processed by them.”
 Computer related crime, Computer crime,
Internet crime, E-crime, High-tech crime etc.
are synonymous terms
Few definition of Cyber Crime:
• A crime committed using a computer and the
Internet to steal person’s identity
• Crime completed either on or with a computer
• Any illegal activity done through the Internet or on
the computer
• All criminal activities done using the medium of
computers, the Internet, cyberspace and WWW
Types of attack
• Techno-crime:
 A premeditated act against a system or systems with
the intent to copy, steal, corrupt or otherwise deface or
damage part of or the complete computer system
 Possible when computer connected with the Internet 24
X 7
• Techno-vandalism:
 These acts of “brainless” defacement of websites
and/or other activities, such as copying files and
publicizing their contents publicly
Cybersecurity means protecting
information, equipment, devices, computer,
computer resource, communication device
and information stored therein from
unauthorized access, use, disclosure,
disruption, modification or destruction
Categorized in 3 groups:
• Type I: Cybercriminals- hungry for recognition
 Hobby hackers
 IT professionals
 Politically motivated hackers
 Terrorist organizations
• Type II: Cybercriminals- not interested in
recognition
 Psychological perverts
 Financially motivated hackers
 State-sponsored hacking
 Organized criminals
• Type III: cybercriminals- the insiders
 Former employees seeking revenge
 Competing companies using employees to gain
economic advantage through damage and/or theft
1. Cybercrime against individual:
• E-Mail spoofing and other online fraud
• Phishing
• Spamming
• Cyberdefamation
• Cyberstalking and harassment
• Computer sabotage
• Pornographic offenses
2. Cybercrime against property:
• Credit card frauds
• Intellectual property crime
• Internet time theft
3. Cybercrime against organization:
• Unauthorized accessing of computer
• Password sniffing
• Denial-of-service attacks
• Virus
• E-Mail bombing
• Salami attack
• Logic bomb
• Trojan horse
• Data diddling
• Industrial spying
• Crimes emanating from Usenet newsgroup
• Computer network intrusions
• Software piracy
4. Cybercrime against society:
• Forgery
• Cyberterrorism
• Web jacking
5. Crimes emanating from Usenet
newsgroup:
• Usenet group may carry very offensive, harmful,
inaccurate or otherwise inappropriate material or
postings that have been misplaced or are
deceptive in another way
A spoofed email is one in which e-mail
header is forged so that mail appears to
originate from one source but actually has
been sent from another source
Spamming means sending multiple copies
of unsolicited mails or mass e-mails such
as chain letters.
Difficult to control
In context of “search engine spamming”,
spamming is alternation or creation of a
document with the intent to deceive an
electronic catalog or filing system
Cognizable offense
This occurs when defamation takes place
with the help of computers and / or the
Internet.
E.g. someone publishes defamatory matter
about someone on a website or sends e-
mails containing defamatory information.
 The usage of the Internet hours by an
unauthorized person which is actually paid
by another person
Comes under hacking
When negligible amounts are removed &
accumulated in to something larger. These
attacks are used for the commission of
financial crimes.
This kind of an attack involves altering raw
data just before it is processed by a
computer and then changing it back after
the processing is completed.
Currency notes, revenue stamps, mark
sheets etc can be forged using computers
and high quality scanners and printers.
Hackers gain access and control over the
website of another, even they change the
content of website for fulfilling political
objective or for money.
“Spies” can get information about product
finances, research and development and
marketing strategies, an activity known as
Industrial spying.
Every act committed toward breaking into
computer and/or network is hacking
The purpose of hacking Power, publicity,
revenge, adventure, desire to access
forbidden information, destructive mindset
Spoofing website and E-Mail security
alerts, lottery frauds, virus hoax E-Mail
Child pornography means visual depiction
Theft of software through the illegal
copying of genuine programs or the
counterfeiting and distribution of products
intended to pass for the original.
Illegal copying of programs, distribution of
copies of software
The use of the Internet to hinder the
normal functioning of a computer system
through the introduction of worms, viruses
or logical bombs is referred to as computer
sabotage
Sending a large no. of E-Mails to the victim
to crash victim’s E-Mail account or to make
victim’s server crash
Usenet is a popular means of sharing and
distributing information on the web with
respect to specific subjects or topic
Following criminal use Usenet:
• Distribution/sale of pornographic material
• Distribution/sale of pirated software package
• Distribution of hacking software
• Sale of stolen credit card number
• Sale of stolen data/stolen property
Crackers can break into computer systems
from anywhere in the world and steal data,
plant viruses, create backdoors, insert
trojan horse or change username and
passwords
Programs that monitor and record the
name and password of network users as
they login at a site
Introduction to cybercrime
Introduction to cybercrime

Contenu connexe

Tendances

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionTejasvi Bhatia
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityMohammed Adam
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hackingGeorgekutty Francis
 
Cyberspace
CyberspaceCyberspace
CyberspaceUtchi
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptxANIKETKUMARSHARMA3
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPTNitesh Dubey
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Dr. Kapil Gupta
 

Tendances (20)

Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Web Security
Web SecurityWeb Security
Web Security
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...Hacking,History Of Hacking,Types of Hacking,Types  Of Hackers,Cyber Laws for ...
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
 
Physical Security.ppt
Physical Security.pptPhysical Security.ppt
Physical Security.ppt
 
Web Hacking
Web HackingWeb Hacking
Web Hacking
 
Full seminar report on ethical hacking
Full seminar report on ethical hackingFull seminar report on ethical hacking
Full seminar report on ethical hacking
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
Cia security model
Cia security modelCia security model
Cia security model
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPT
 
Computer security
Computer securityComputer security
Computer security
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 

En vedette

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrimepatelripal99
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crimeshubhravrat Deshpande
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research PaperWhitney Bolton
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Projecttsdikshit
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Solve 3 Enterprise Storage Problems Today
Solve 3 Enterprise Storage Problems TodaySolve 3 Enterprise Storage Problems Today
Solve 3 Enterprise Storage Problems TodayStephen Foskett
 
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...Vivastream
 
Renesas RL78 The True Low Power Microcontroller Platform
 Renesas RL78 The True Low Power Microcontroller Platform Renesas RL78 The True Low Power Microcontroller Platform
Renesas RL78 The True Low Power Microcontroller PlatformRenesas Electronics Corporation
 
How to refill canon color cartridge 241
How to refill canon color cartridge 241How to refill canon color cartridge 241
How to refill canon color cartridge 241printerfillingstation
 
An Introduction to Faye
An Introduction to FayeAn Introduction to Faye
An Introduction to FayeDarren Oakley
 
Summary -Fish
Summary -FishSummary -Fish
Summary -FishGMR Group
 
Intermediate Colors
Intermediate ColorsIntermediate Colors
Intermediate Colorsartoutman
 

En vedette (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Project
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Solve 3 Enterprise Storage Problems Today
Solve 3 Enterprise Storage Problems TodaySolve 3 Enterprise Storage Problems Today
Solve 3 Enterprise Storage Problems Today
 
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...
 
Ambienti di virtualizzazione
Ambienti di virtualizzazioneAmbienti di virtualizzazione
Ambienti di virtualizzazione
 
Renesas RL78 The True Low Power Microcontroller Platform
 Renesas RL78 The True Low Power Microcontroller Platform Renesas RL78 The True Low Power Microcontroller Platform
Renesas RL78 The True Low Power Microcontroller Platform
 
How to refill canon color cartridge 241
How to refill canon color cartridge 241How to refill canon color cartridge 241
How to refill canon color cartridge 241
 
Enterprise TEPPCO Pipeline System Map
Enterprise TEPPCO Pipeline System MapEnterprise TEPPCO Pipeline System Map
Enterprise TEPPCO Pipeline System Map
 
An Introduction to Faye
An Introduction to FayeAn Introduction to Faye
An Introduction to Faye
 
Summary -Fish
Summary -FishSummary -Fish
Summary -Fish
 
Intermediate Colors
Intermediate ColorsIntermediate Colors
Intermediate Colors
 

Similaire à Introduction to cybercrime

Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptxKoukiGaz
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation Priya Saluja
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Cyber crimes publicspeaking
Cyber crimes publicspeakingCyber crimes publicspeaking
Cyber crimes publicspeakingAdarsh
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfAadil83
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptxAmeyBarbade1
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptxImXaib
 

Similaire à Introduction to cybercrime (20)

Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber crimes publicspeaking
Cyber crimes publicspeakingCyber crimes publicspeaking
Cyber crimes publicspeaking
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdf
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 

Dernier

INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 

Dernier (20)

INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 

Introduction to cybercrime

  • 2. Introduction Cybercrime: Definition and Origins of the Word Cybercrime and Information Security Who are Cybercriminals? Classifications of Cybercrimes
  • 3.  Internet in India is growing rapidly  Unrestricted no. of free websites, the Internet has deniably opened a new exploitation known as cybercrime  Activates involve the use of computer, Internet, Cyberspace and WWW  1st recorded cybercrime took place in the year 1820  Indian corporate and government sites have been attacked or defaced more than 780 times between Feb 2002 & Dec 2002  3,286 Indian websites were hacked in 5months – between Jan & June 2009
  • 4. Cyberspace: (by William Gibson in 1984) • Worldwide n/w of Computer networks that uses the TCP/IP for communication to facilitate transmission and exchange of data Cybersquatting: • Means registering, selling or using a domain name with intent of profiting from goodwill of someone else’s trademark
  • 5.  Cyberpunk: (by Bruce Bethke, 1980) • Mean something like “anarchy via machine” or “machine/computer rebel movement”  Cyberwarfare: • Means information warriors unleashing vicious attacks against an unsuspecting opponent’s computer networks, wreaking havoc and paralyzing nations.  Cyberterrorism: (by Barry Collin, 1997) • Use of disruptive activities, or the threat, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives or to intimidate any person in furtherance of such objectives
  • 6.  “A crime conducted in which a computer was directly or significantly instrumental”  “Cybercrime is any illegal behavior, directed by means of electronic operations, that targets the security of computer systems and the data processed by them.”  Computer related crime, Computer crime, Internet crime, E-crime, High-tech crime etc. are synonymous terms
  • 7. Few definition of Cyber Crime: • A crime committed using a computer and the Internet to steal person’s identity • Crime completed either on or with a computer • Any illegal activity done through the Internet or on the computer • All criminal activities done using the medium of computers, the Internet, cyberspace and WWW
  • 8. Types of attack • Techno-crime:  A premeditated act against a system or systems with the intent to copy, steal, corrupt or otherwise deface or damage part of or the complete computer system  Possible when computer connected with the Internet 24 X 7 • Techno-vandalism:  These acts of “brainless” defacement of websites and/or other activities, such as copying files and publicizing their contents publicly
  • 9. Cybersecurity means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction
  • 10. Categorized in 3 groups: • Type I: Cybercriminals- hungry for recognition  Hobby hackers  IT professionals  Politically motivated hackers  Terrorist organizations • Type II: Cybercriminals- not interested in recognition  Psychological perverts  Financially motivated hackers  State-sponsored hacking  Organized criminals
  • 11. • Type III: cybercriminals- the insiders  Former employees seeking revenge  Competing companies using employees to gain economic advantage through damage and/or theft
  • 12. 1. Cybercrime against individual: • E-Mail spoofing and other online fraud • Phishing • Spamming • Cyberdefamation • Cyberstalking and harassment • Computer sabotage • Pornographic offenses 2. Cybercrime against property: • Credit card frauds • Intellectual property crime • Internet time theft
  • 13. 3. Cybercrime against organization: • Unauthorized accessing of computer • Password sniffing • Denial-of-service attacks • Virus • E-Mail bombing • Salami attack • Logic bomb • Trojan horse • Data diddling • Industrial spying • Crimes emanating from Usenet newsgroup • Computer network intrusions • Software piracy
  • 14. 4. Cybercrime against society: • Forgery • Cyberterrorism • Web jacking 5. Crimes emanating from Usenet newsgroup: • Usenet group may carry very offensive, harmful, inaccurate or otherwise inappropriate material or postings that have been misplaced or are deceptive in another way
  • 15. A spoofed email is one in which e-mail header is forged so that mail appears to originate from one source but actually has been sent from another source
  • 16. Spamming means sending multiple copies of unsolicited mails or mass e-mails such as chain letters. Difficult to control In context of “search engine spamming”, spamming is alternation or creation of a document with the intent to deceive an electronic catalog or filing system
  • 17. Cognizable offense This occurs when defamation takes place with the help of computers and / or the Internet. E.g. someone publishes defamatory matter about someone on a website or sends e- mails containing defamatory information.
  • 18.  The usage of the Internet hours by an unauthorized person which is actually paid by another person Comes under hacking
  • 19. When negligible amounts are removed & accumulated in to something larger. These attacks are used for the commission of financial crimes.
  • 20. This kind of an attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed.
  • 21. Currency notes, revenue stamps, mark sheets etc can be forged using computers and high quality scanners and printers.
  • 22. Hackers gain access and control over the website of another, even they change the content of website for fulfilling political objective or for money.
  • 23. “Spies” can get information about product finances, research and development and marketing strategies, an activity known as Industrial spying.
  • 24. Every act committed toward breaking into computer and/or network is hacking The purpose of hacking Power, publicity, revenge, adventure, desire to access forbidden information, destructive mindset
  • 25. Spoofing website and E-Mail security alerts, lottery frauds, virus hoax E-Mail Child pornography means visual depiction
  • 26. Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. Illegal copying of programs, distribution of copies of software
  • 27. The use of the Internet to hinder the normal functioning of a computer system through the introduction of worms, viruses or logical bombs is referred to as computer sabotage
  • 28. Sending a large no. of E-Mails to the victim to crash victim’s E-Mail account or to make victim’s server crash
  • 29. Usenet is a popular means of sharing and distributing information on the web with respect to specific subjects or topic Following criminal use Usenet: • Distribution/sale of pornographic material • Distribution/sale of pirated software package • Distribution of hacking software • Sale of stolen credit card number • Sale of stolen data/stolen property
  • 30. Crackers can break into computer systems from anywhere in the world and steal data, plant viruses, create backdoors, insert trojan horse or change username and passwords
  • 31. Programs that monitor and record the name and password of network users as they login at a site