2. Content
Introduction
History of Cyber Crime
Categories Of Cyber Crime
Types Of Cyber Crime
Cybercrime Threatens National Security
Cyber Security
Advantage of Cyber Security
Safety Tips To Crime
Cyber Law of India
Conclusion
3.
4. Introduction
Cyber Crime is an
activity done using
computer and
internet. We can say
that it is an unlawful
acts wherein the
computer either a
tool or target both.
5. History Of Cyber Crime
The first recorded cyber crime took place in 1820.
That is not surprising considering the fact that the abacus , which is
thought to be earliest from of a computer , has been around since 3500
B.C.
In India, Japan and china the era of modern computer ,however, began
with the analytical engine of Charles Babbage.
The first spam email took place in 1976 when it was sent out over the
APRANT.
The first virus was installed on an Apple computer in 1982 when a high
school student , Rich Skrenta , developed the EIK cloner.
6. Categories Of Cyber Crime
We can categorize cyber crime in two ways.
1) The computer as a Target : - Using a computer to
attack other computer.. E.g. Hacking, Virus/worm
attack, DDOS attack … etc.
2) The computer as a weapon :- Using a computer to
commit real world crime ….. e.g. cyber terrorism,
credit card fraud and pornography etc.
8. Hacking
Hacking is simple term means
an illegal intrusion info a
computer system and/or
network . It is also know as
CREAKING. Government
website are the hot target of the
hacker due to press coverage, it
receives. Hacker enjoy the
media coverage.
Motive bind the crime is called
Hacking greed power, publicity,
revenge,adventure,desire to
access forbidden information
destructive mindset want to sell
n/w security services.
9. DOS ATTACK
DENIAL OF SERVICE ATTACK : -
This is an act by the criminals
who floods the bandwidth if the
victims network or fills his Email
box with spam E-mail depriving
him of the services he is entitled
to access or provide . Many
ddos attack , such as the ping
of death and Tear drop attack.
The largest DDoS attack done
by Anonymous group on BBC
and Donald Trump Website
about 602 gbps.
You can use Ddos attack by loic,
hoic , cmd , anonymous externa
tool.. etc.
11. PHISHING
Phishing is still the most popular
attack vector used for hacking
Facebook accounts. There are
variety methods to carry out
phishing attack. In a simple phishing
attacks a hacker creates a fake log
in page which exactly looks like the
real Facebook page and then asks
the victim to log in. Once the victim
log in through the fake page the,
the victims "Email Address" and
"Password" is stored in to a text file,
and the hacker then downloads the
text file and gets his hands on the
victims credentials.
12. KEYLOGGING
Keylogging is the easiest way
to hack a password.
Keylogging sometimes can be
so dangerous that even a
person with good knowledge
of computers can fall for it. A
Keylogger is basically a small
program which, once is
installed on victim's computer,
will record every thing victim
types on his/her computer.
The logs are then send back
to the attacker by either FTP
or directly to hackers email
address.
13. SESSION HIJACKING
Session Hijacking can be
often very dangerous if you
are accessing
Facebook/Website on a http
(non secure) connection. In
Session Hijacking attack, a
hacker steals the victims
browser cookie which is
used to authenticate the
user on a website, and use it
to access the victims
account. Session hijacking is
widely used on LAN, and
Wi-Fi connections.
14. DNS SPOOFING
If both the victim and
attacker are on the
same network, an
attacker can use a DNS
spoofing attack and
change the original
Facebook page to his
own fake page and
hence can get access to
victims Facebook
account.
15. MAN IN MIDDDLE
ATTACK
If the victim and attacker are
on the same LAN and on a
switch based network, a
hacker can place himself
between the client and the
server, or he could act as a
default gateway and hence
capturing all the traffic in
between.
By Zanti.apk you can easily
attack on Victim Webpage
via android.
16. USB HACKING
If an attacker has
physical access to
your computer, he
could just insert a
USB programmed
with a function to
automatically extract
saved passwords in
the Internet browser.
17. Brute force Attack
All password contain
Minimum Length – 6 characters
Maximum length – 14 characters
Passwords should use three of four of the
following four types of characters:
Lowercase
Uppercase
Numbers
Special characters such as
!@#$%^&*(){}[]. In BF attack hackers
make all possible dictionary by using this.
And developed tool for attack one by
one speedy. For maching the password.
Eg... Ophcrack,Router Brute force …etc
20. SOFTWARE PIRACY
Theft of software through the illegal
copying of genuine programs or
the counterfeiting and distribution
of products intended to pass for the
original.
In India http://www.onhax.net and
http://www.mhktricks.net is most
popular website for software piracy.
Bcz This is illegal it causes
anonymous shut down onhax.net
by ddos attack and not it is offline.
22. Cyber Crimes Threatens National Security
in indian Telecom, Law and Justice minister Sri Ravi Shankar Prasad said that the
rising level of cyber crime is an indication of enormous threat to national security.
On Google social networking site Google+ and facebook have boon perplexing
authorities. Fan club of Underworld Dons like Dawood Ibrahim and Chhota
Shakeel and other wanted terror like ISIS are also doing the round on Facebook
and Google+ . After Anonymous hackers takes down 20,000 ISIS Twitter
accounts they developing own secure social networking site. There is huge
potential for damage to national security through cyber attacks. The internet is a
mean for money bounding and funding terrorist attack is an organized manner.
ISIS is luring Indian hackers with top dollar to hack into government websites and
steal sensitive data. Hackers are also being asked to identify and create a database
of potential recruits from Twitter and Facebook. For each 'job', a hacker would be
paid upwards of $10,000.
24. CYBER SECURITY
Cyber Security involves
protection of sensitive
personal and business
through prevention ,
detection and response
to different online
attack . Cyber security
actually preventing the
attacks, cyber security.
26. UPDATION CHECK
If the seller reduces patches
for the software operating
system your device , Install
them as soon as possible .
Install them will prevent
attackers from being able to
take advantage. Use good
password which will be
difficult for thieves to guess.
Do not choose option that
allows your computer to
remember your password.
27. Disable Remote Tool
Some PDA’s and phones
are equipped with
wireless technologies,
such as Bluetooth , That
can be used to connect
to other devices or
computers. You should
disable these feature
when they are not in
use.
29. ADVANTAGE OF CYBER SECURITY
The Cyber Security will defend us from critical
attacks.
It help us to browse the site, website.
Internet Security process all the incoming and
outgoing data on your computer.
It will defend us from hacks and virus.
Application of cyber security used in our PC needs
update every week.
33. CYBER LAW IN INDIA
Cyber Crime can involve criminal activities that are traditional
in nature , such as thief , fraud , deformation and mischief ,
all of which are subjected to the India panel code . In simple
way we can say that cyber crime is unlawful acts where I n
the computer is either a tool or both.
The abuse of computer has also give birth of new age crime
that are addressed by the IT act , 2000
35. CONCLUSION
Hacking is a crime.
Need Good Security.
Cyber crime Is indeed getting to recognition in deserves.
However , It is not going to restricted that easily. In fact, it is
highly likely that cyber crime and it’s hackers will continue
developing and upgrading to stay ahead of the law.
So, to make us a safer we must need cyber security