3. o
“IT IS A CRIMINAL ACTIVITY
COMMITED ON THE INTERNET. THIS
IS A BROAD TERM THAT DESCRIBES
EVERYTHING FROM ELECTRONIS
CRACKING TO DENIAL OR SERVICE
ATTACKS THAT CAUSES
ELECTRONIC COMMERCE
SITES TO LOOSE MONEY.”
5. There are 9 types of cyber crime.
1. Theft of telecommunications services.
2. Communications in furtherance of criminal
conspiracies.
3. Telecommunications piracy.
4. Dissemination of offensive materials.
5. Electronic money laundering and tax evasion.
6. Electronic vandalism, terrorism and extortion.
7. Sales and investment fraud.
8. Illegal interception of telecommunications.
9. Electronic funds transfer fraud.
6. Cyber Crime
Variants
1.) Hacking
“Hacking“ is a
crime, which
entails cracking
system and
gaining
unauthorized
access to the
data stored in
them. Hacking
had witnessed a
37 per cent
increase this year.
Fake document
Identity Theft
Social Engineering
Get Quick Rich Schemes
36%
9%
9%
46%
7.
8.
Hacking is done via network programming.
Hackers prepare programs to break network codes
and passwords. If you would have tried breaking
these codes until a few years ago, you wouldn't
have been successful in doing so if you didn't
possess enough programming knowledge.
However, the hacking methods have evolved over
the years and you are no longer required to have
extensive knowledge about network programming
in order to accomplish this task. With the hacking
methods becoming easier and tools getting
cheaper, cyber crime is on the rise.
9.
While unauthorized hacking is a threat for the
society ethical hacking helps in various ways. The
ethical hackers are hired for assistance in
investigations. They are also hired to cover up
online fraud. For instance there are times when
banks need to hire them in order to hide the
activities of notorious hackers from the customers.
These activities may include stealing someone's
ATM or net banking pin. Till the time the bankers
sort out the issues they take help from hackers to
hide this fact from the customers so as to avoid any
kind of panic amongst them. Thus, hacking can be
helpful if done for a noble cause
10. TYPES OF HACKERS
White Hat
Grey Hat
Blue Hat
Script Kiddie
Black Hat
Elite Hat
Neophyte
Hacktivist
PURPOSE OF
UNETHICAL HACKING
Greed
Revenge
Greed
Adventure
Destruction
Access to forbidden
information
11.
The use of Internet services or
software with Internet access
to defraud victims or to
otherwise take advantage of
them, for example by stealing
personal information, which
can even lead to identity theft.
A very common form of
Internet fraud is the
distribution of rogue security
software. Internet services can
be used to present fraudulent
solicitations to prospective
victims, to conduct fraudulent
transactions, or to transmit the
proceeds of fraud to financial
institutions or to others
connected with the scheme.
Internet fraud can occur in
chat rooms, email, message
boards, or on websites.
Column1
Current Employee for financial
Gain
Ex-Employee for Financial Gain
Disgruntled Ex- employee
Contracter
Extortion
34%
3%
9%
24%
18%
12%
12.
13.
Lottery frauds are most common online fraud that
happens every day on internet. Every day
Gmail, Yahoo or Hotmail like mailing portal users
receive mails regarding lottery. Such mails comes
with popular brand names saying that "You have
won 50 Million dollars" from CocaCola, Yahoo, Hotmail and other big names. When
you reply to those mails they ask for your bank
details to transfer your lottery money. When you
send them the details asked, then they ask you to
give a processing fee or handling charges. To tell
you the fact, such e mails are always misleading
and money is never transferred and your bank
details are used for other scams or frauds.
14.
Spoof websites and e mails are also a form online fraud
and are resulted by technical expertise. In this, a fake
website is created which looks like an authentic
website, but actually that's a spoof. The purpose of
creating such website is to make the user enter
personal information and details of his account. Then
this information is used to login business and bank
accounts of that user. They get traffic to their spoof by
shooting spam e mails which misleads them to enter
their username and passwords which gets updated to
the hacker's server. And thus commit illegal financial
transaction making the owner go bankrupt. Be careful
to keep yourself away from any such fraud or scam.
15. Phishing
o
o
Phishing is a form cyber crime the employs expertise of
social engineering methods to obtain highly
confidential information such as passwords of online
accounts, pin numbers or codes, account number and
bank details, e mail account information and social
security number, etc. This is actually done by using the
name or identity of any trustworthy person or business
in an online communication via e mail or
chat, phishing experts get the details revealed like
passwords, account & personal information.
For ex: You can get a mail on the name your bank saying that
due to security reasons your required to change your password
for net banking account. Mostly, these mails warn you for
negative consequences if ignored.
16.
Spoofing is also an illegal online activity which involves
intrusion masquerading a genuine user. In this activity a
hacker enters in to a distant computer illegally without any
authorization, using a different identity than his original
one. This is possible when hacker has already obtained
actual password somehow. The hacker then creates a new
user by misguiding computer to think that the hacker is a
genuine person to do that. Thus after that, the hacker
over takes the control of the system and can perform a
number frauds using the fake identity the hacker created.
For ex: You can get a mail on the name your bank saying
that due to security reasons your required to change your
password for net banking account. Mostly, these mails warn
you for negative consequences if ignored.
17. o
All the website providing mailing services like
Gmail, Yahoo or MSN etc update their data
base with the viruses and related mails and put
them in spam when they find it suspicious but
then also the hackers or spammers are very
smart to crack all and thus spread such fake e
mails. So if you get any such suspicious mail
then never ignore and after that check about
such virus on Google or antivirus websites
before taking any action and also do not
forward any spam e mails promising you any
kinds of reward points
18.
19.
Defamation is basically causing injury to the
reputation of a person or a company using false
statements or actions. It can be also described
as an attack on good faith name and reputation
of a person or company by someone who is not
in favor that person or company and thus want
to float some negative message in the society or
market. Defamation is considered to be a crime
in almost all the countries of the world
including India.
20. There are some more words which interpret
almost the same meaning as defamation –
calumny, vilification, traducement, slander and
libel. All these words explain defamation but
there are two major kinds of defamation Libel
& slander. Libel is visual defamation which can
be in the form of fake prints, misleading
pictures or deceptive videos. Libel may be used
for written, broadcasted or published
words, pictures or videos. This may lead
sufferer to hatred, contempt, ridicule and
disgrace by people, which may result in worst
consequences where people may start avoiding
him/her and that can injure the occupation or
business.
21.
Slander is also a form of defamation other than
Libel (visual defamation). This form is related
with the use of transitory statements. It can be
explained as a defamation that some one
hear, does not see. For example- Someone is
talking wrong, spreading rumors and telling
lies about a person or a company. Slander is
basically an oral statement that is said with a
reason to injure the value and respect of the
person or company, which may hamper the
reputation, profession, trade or business.
22.
There are some other critical reasons which
make it important to be aware of defamation
laws. One can always prove defamation in
words alone without any evidence, but it's
always an added advantage when there is a
confirm evidence of it. These evidences can be
any letter, e mail or an eye witnesses
confirming the defamation, etc. One does not
have to prove damages in defamation
cases, once the defamation is proved damages
are presumed. This means one does not have to
undergo tests to prove that the person was
injured mentally somehow or consulted to any
mental doctor or psychiatrist.
23. When any sort of defamation is done using internet
then it is called Cyber Defamation. Cyber
defamation is a crime which is conducted in
cyberspace mostly through the medium of Internet
with an aim to defame a person or a company.
With increasing use of Internet around the
globe, the graph of cyber defamation is increasing
like anything. All countries are incorporating cyber
laws and amending them in order to combat
against this very serious cyber crime called as
Cyber Defamation
Defamation – Section 499 IPC / Section 67 IT Act –
24.
Whoever publishes or transmits or causes to be
published in the electronic form, any material which is
lascivious or appeals to the prurient interest or if its
effect is such as to tend to deprave and corrupt persons
who are likely, having regard to all relevant
circumstances, to read, see or hear the matter contained
or embodied in it, shall be punished on first conviction
with imprisonment of either description for a term
which may extend to five years and with fine which
may extend to one lakh rupees and in the event of a
second or subsequent conviction with imprisonment of
either description for a term which may extend to ten
years and also with fine which may extend to two lakh
rupees.
25.
26.
Identity Theft is another kind of very offensive cyber crime known
across the globe. Identity theft actually is way through which
criminals somehow obtains the personal information of people
who identity they want to use for any illegal purpose. The
criminal gets the key personal information & details like Driving
License Number, Social Security and Pin Codes of ATM and other
cards. Then criminal can use all that information for making
purchases online on the name of victim. The Identity theft can lead
to serious consequences as the criminal can use the information
for immigration or other such important applications. The most
serious consequence is that crime is often done by identity theft
experts who perform their task very meticulously and thus the
charge of crime comes on victim, whose identity has been theft.
There are two broad types of Identity Theft
- Account Takeover
- True Name Theft
27.
28. Account
Takeover
True
Name
Theft
•Account Takeover is a kind of situation where
the criminal uses the information which he has
stolen in order to have the access of victim's
existing accounts.
•Then there may be further misuse using the
existing accounts like changing the address so
that bill does not reach to victim's place and
criminal can enjoy shopping and purchases
online through the credit cards the thief runs
up.
•True Name Theft, the thief by using the
personal information of the victim opens new
accounts. In this the thief can open new credit
card, cellular phones number, check books of
the existing account and may misuse all.
•Online facilities of banking and credit cards
called net baking has made things very easy for
these sort of thefts, where only passwords or
codes are the keys to do anything and real
verification has no role to play as such.
29.
30.
31.
32.
33.
Don’t delete harmful communications ( messages, chat etc.) They will
provide vital information about system and address of the person
behind these.
Try not to panic.
If you feel any immediate physical danger contact your local police.
Avoid getting into huge arguments online during chat and discussion
with other users.
Remember that all other internet users are stranger; you do not know
who you are chatting with. So be careful.
Be extremely careful about how you share personal information
about yourself online.
Choose your chatting nickname carefully so as other.