SlideShare une entreprise Scribd logo
1  sur  22
Cybercrime
Preventive steps & Awareness
Objectives
   To provide a general awareness of
    Cybercrime
   To understand Cybercrime methods
   To identify Internet scams
   To learn how to keep from being a victim
What is Cybercrime?
   Cybercrime is any illegal act committed
    by using a computer network.
       Cybercrime is a subset of computer crime.
Examples of Cybercrime
   Web defacement            Identity theft
   Unauthorized network      Child pornography
    access                    Interception and
   Cyber-Stalking             fabrication of emails
   Internet fraud            Theft of passwords
Who are the perpetrators?
   Not just “hackers.”
       Companies seeking competitor’s trade secrets
       Con-artists
       Pedophiles
       Disgruntled employees
       “Accidental” criminals
   The Internet should be viewed as another
    medium in which criminals can conduct
    illegal acts.
Who are the cyber victims?
   Companies
       No security awareness
       Bottom liners
   Individuals
       The unaware individuals
       The “don’t care” individuals
       The “innocent by-stander” individuals
   Society
Desktop Security
   Many people become victims of a cyber
    attack by what is referred to as “drive by
    hacking.”
   Tools are freely available on the Internet
    to allow for such behavior to occur.
   The latest Microsoft Security flaw is a
    good example of how vulnerable each
    users desktop is to such an attack.
Spyware
   Spyware is used by companies to gather
    the surfing habits of individuals.
   Pop-up ads are usually a result of spyware
    being present on a computer.
   Keyloggers are a form of spyware that
    secretly record keystrokes and have the
    ability to email them back to the intruder.
What can I do?
 Awareness is the first step in protecting
  yourself and your family.
 Invest in Anti-virus, Firewall, and SPAM
  blocking software for your PC.
 Detect secure websites when
  conducting transactions online.
 Do NOT respond or act on emails sent
  from unknown sources.
Detecting Secure Websites




HTTPS instead of HTTP



                    Yellow Lock at bottom right of website
Emails
   SPAM emails are becoming easier to
    detect by the average user. Look for these
    clues to identify SPAM:
       The receiver’s name is the same as the sender’s
       The subject is offering money making deals
       The user is unknown and there are links to what
        appear to be legitimate websites.
Cyber crime: an important note
   The IT Act provides the backbone for e-
    commerce and India’s approach has been
    to look at e-governance and e-commerce
    primarily from the promotional aspects
    looking at the vast opportunities and the
    need to sensitize the population to the
    possibilities of the information age. There is
    the need to take in to consideration the
    security aspects.
Cyber crime: Indian law
   In Indian law, cyber crime has to be voluntary and
    willful, an act or omission that adversely affects a
    person or property. The IT Act provides the
    backbone for e-commerce and India’s approach
    has been to look at e-governance and e-
    commerce primarily from the promotional aspects
    looking at the vast opportunities and the need to
    sensitize the population to the possibilities of the
    information age. There is the need to take in to
    consideration the security aspects.
United Nations’ Definition of
Cybercrime
   a. Cybercrime in a narrow sense (computer crime): Any
    illegal behavior directed by means of electronic operations
    that targets the security of computer systems and the data
    processed by them.

   b. Cybercrime in a broader sense (computer-related crime):
    Any illegal behavior committed by means of, or in relation to,
    a computer system or network, including such crimes as
    illegal possession [and] offering or distributing information by
    means of a computer system or network.
Cyber crime: There are more
concrete examples, including
   Unauthorized access
   Damage to computer data or programs
   Computer sabotage
   Unauthorized interception of
    communications
   Computer espionage
What are the basic steps in fortifying the legal
position of an organisation in cases of data theft?
   While passing the IT Act, the government
    has also amended other related legislation,
    such as the Copyright Act or the Law of
    Evidence. Now, an organisation can keep a
    log of how a particular piece of intellectual
    property was built, by documenting the
    steps that led to development of a solution
    or product. This documentation will help
    establish the ownership of the final product.
What about simple information or
databases?
   The same applies to these. Beginning with
    the source of the database or information,
    their build up, fine-tuning and periodical
    revision will establish ownership.
How broad is the scope of protection
under the laws?
   Section 66 of the IT Act has defined hacking as
    (among other things) intentionally destroying,
    deleting or altering any information residing on a
    computer. There is no mention of the word
    copying here. However, the latter part of this
    section refers to "diminishing the value or utility"
    of this information. Copying is covered under this.
    If someone steals information and pastes it on a
    web site available to all, the value of this
    information diminishes.
Are there methods to ensure adherence
to data access norms for employees?
   Each organisation must have a well-defined IT
    use policy. It is important to offer written
    description of the limits each employee needs to
    follow. They should also be told the legal
    consequences of any breach of the access
    norms. There are provisions for imprisonment of
    three to five years and a fine for different offences
    under the IT Act. The law also provides judicial
    custody of up to a week to allow investigation.
    The idea of staying in a lock-up can be a
    deterrent enough for the techie kind, provided
    they are told about it.
Is the redressal process speedier for
those hit by cyber crimes?
   Any incident of data theft can be addressed on both criminal
    and civil tracks of the law. While the criminal proceedings will
    intend to regain the custody of data, the civil proceeding will
    seek compensation for loss caused by such theft. Disposal of
    cases will be handled at par with other cases of either nature.
    However, under the IT Act, the secretary of the information
    technology department of the Central or state government
    has been empowered to adjudicate the civil cases. This
    officer has the powers to order summary investigation and is
    not compelled to follow any legal procedures and will simply
    follow. If he follows the principles of natural justice (such as
    giving the accused an opportunity to be heard) he can
    examine the evidence, impose punishment and order
    compensation.
Conclusion
   The key to protecting yourself is being
    aware.
   Not all cybercriminals are “hackers.”
   There is a whole other world that exists in
    cyberspace…make sure that your
    information travels safely.
Questions

      HR & Administrative Officer
       hr.manager@infoway.us

Contenu connexe

Tendances (20)

Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPT
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

En vedette

Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

En vedette (7)

Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similaire à Cybercrime (20)

Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Cyber law in bangladesh
Cyber law in bangladeshCyber law in bangladesh
Cyber law in bangladesh
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
4.report (cyber crime)
4.report (cyber crime)4.report (cyber crime)
4.report (cyber crime)
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 

Cybercrime

  • 2. Objectives  To provide a general awareness of Cybercrime  To understand Cybercrime methods  To identify Internet scams  To learn how to keep from being a victim
  • 3. What is Cybercrime?  Cybercrime is any illegal act committed by using a computer network.  Cybercrime is a subset of computer crime.
  • 4. Examples of Cybercrime  Web defacement  Identity theft  Unauthorized network  Child pornography access  Interception and  Cyber-Stalking fabrication of emails  Internet fraud  Theft of passwords
  • 5. Who are the perpetrators?  Not just “hackers.”  Companies seeking competitor’s trade secrets  Con-artists  Pedophiles  Disgruntled employees  “Accidental” criminals  The Internet should be viewed as another medium in which criminals can conduct illegal acts.
  • 6. Who are the cyber victims?  Companies  No security awareness  Bottom liners  Individuals  The unaware individuals  The “don’t care” individuals  The “innocent by-stander” individuals  Society
  • 7. Desktop Security  Many people become victims of a cyber attack by what is referred to as “drive by hacking.”  Tools are freely available on the Internet to allow for such behavior to occur.  The latest Microsoft Security flaw is a good example of how vulnerable each users desktop is to such an attack.
  • 8. Spyware  Spyware is used by companies to gather the surfing habits of individuals.  Pop-up ads are usually a result of spyware being present on a computer.  Keyloggers are a form of spyware that secretly record keystrokes and have the ability to email them back to the intruder.
  • 9. What can I do?  Awareness is the first step in protecting yourself and your family.  Invest in Anti-virus, Firewall, and SPAM blocking software for your PC.  Detect secure websites when conducting transactions online.  Do NOT respond or act on emails sent from unknown sources.
  • 10. Detecting Secure Websites HTTPS instead of HTTP Yellow Lock at bottom right of website
  • 11. Emails  SPAM emails are becoming easier to detect by the average user. Look for these clues to identify SPAM:  The receiver’s name is the same as the sender’s  The subject is offering money making deals  The user is unknown and there are links to what appear to be legitimate websites.
  • 12. Cyber crime: an important note  The IT Act provides the backbone for e- commerce and India’s approach has been to look at e-governance and e-commerce primarily from the promotional aspects looking at the vast opportunities and the need to sensitize the population to the possibilities of the information age. There is the need to take in to consideration the security aspects.
  • 13. Cyber crime: Indian law  In Indian law, cyber crime has to be voluntary and willful, an act or omission that adversely affects a person or property. The IT Act provides the backbone for e-commerce and India’s approach has been to look at e-governance and e- commerce primarily from the promotional aspects looking at the vast opportunities and the need to sensitize the population to the possibilities of the information age. There is the need to take in to consideration the security aspects.
  • 14. United Nations’ Definition of Cybercrime  a. Cybercrime in a narrow sense (computer crime): Any illegal behavior directed by means of electronic operations that targets the security of computer systems and the data processed by them.  b. Cybercrime in a broader sense (computer-related crime): Any illegal behavior committed by means of, or in relation to, a computer system or network, including such crimes as illegal possession [and] offering or distributing information by means of a computer system or network.
  • 15. Cyber crime: There are more concrete examples, including  Unauthorized access  Damage to computer data or programs  Computer sabotage  Unauthorized interception of communications  Computer espionage
  • 16. What are the basic steps in fortifying the legal position of an organisation in cases of data theft?  While passing the IT Act, the government has also amended other related legislation, such as the Copyright Act or the Law of Evidence. Now, an organisation can keep a log of how a particular piece of intellectual property was built, by documenting the steps that led to development of a solution or product. This documentation will help establish the ownership of the final product.
  • 17. What about simple information or databases?  The same applies to these. Beginning with the source of the database or information, their build up, fine-tuning and periodical revision will establish ownership.
  • 18. How broad is the scope of protection under the laws?  Section 66 of the IT Act has defined hacking as (among other things) intentionally destroying, deleting or altering any information residing on a computer. There is no mention of the word copying here. However, the latter part of this section refers to "diminishing the value or utility" of this information. Copying is covered under this. If someone steals information and pastes it on a web site available to all, the value of this information diminishes.
  • 19. Are there methods to ensure adherence to data access norms for employees?  Each organisation must have a well-defined IT use policy. It is important to offer written description of the limits each employee needs to follow. They should also be told the legal consequences of any breach of the access norms. There are provisions for imprisonment of three to five years and a fine for different offences under the IT Act. The law also provides judicial custody of up to a week to allow investigation. The idea of staying in a lock-up can be a deterrent enough for the techie kind, provided they are told about it.
  • 20. Is the redressal process speedier for those hit by cyber crimes?  Any incident of data theft can be addressed on both criminal and civil tracks of the law. While the criminal proceedings will intend to regain the custody of data, the civil proceeding will seek compensation for loss caused by such theft. Disposal of cases will be handled at par with other cases of either nature. However, under the IT Act, the secretary of the information technology department of the Central or state government has been empowered to adjudicate the civil cases. This officer has the powers to order summary investigation and is not compelled to follow any legal procedures and will simply follow. If he follows the principles of natural justice (such as giving the accused an opportunity to be heard) he can examine the evidence, impose punishment and order compensation.
  • 21. Conclusion  The key to protecting yourself is being aware.  Not all cybercriminals are “hackers.”  There is a whole other world that exists in cyberspace…make sure that your information travels safely.
  • 22. Questions HR & Administrative Officer hr.manager@infoway.us