Cyber crime & security

PRESENTATION BY,
R JAYAPRASANTH
V ARAVINDAN
Illegal activity committed using computer
Cyber crime and security
Overview
Abstract
Introduction to Cybercrime
Hacking
Hackers
⚪Code crackers
⚪ Viruses, Worms
⚪Trojan horse
⚪E-mail bombing
Data diddling
Intellectual property crimes
Fake credit card creators
Three categories of Cybercrimes
Various types of Cyber fraud
Cyber security and statergies
Conclusion
Abstract
Cybercrime are more properly restricted to describing criminal activity.
network is a necessary part of the crime.
include traditional crimes, such as fraud, theft, blackmail, forgery.
Computer crime can broadly be defined as criminal activity involving an information
technology infrastructure, including illegal access (unauthorized access), Code cracking,
Spreading viruses and worms, Data diddling, intellectual property crimes, Hacking, Forgery.
There are also problems of privacy when confidential information is lost or intercepted,
lawfully or otherwise.
Introduction to Cybercrime
The purpose of this paper is to understand Cybercrime
And the legal aspects of Cyber security and to help harmorize legal frameworks.
As such, it aims to help better understand the national and international implications of
growing cyber threats.
to assess the requirements of existing national, Regional and international instruments, and to
assist in establishing a sound legal foundation.
It provides a comprehensive overview of the most relevant topics linked to the legal aspects of
Cybercrime.
Hacking
The actual word is “Cracking” and not “Hacking”.
Hacking has been defined as "Deliberately gaining unauthorised access to an information
system.“
They help the government to protect national documents.
A cracker is generally someone who breaks into someone else's computer system, often on a
network, bypasses passwords or licenses in computer programs.
A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or
because the challenge is there.
Hackers
Criminals Can Operate Anonymously Over the Computer Networks. Hackers
Invade Privacy.
Hackers Destroy "Property" in the Form of Computer Files or Records. Hackers
Injure Other Computer Users by Destroying Information Systems.
Code crackers:
They know computers inside out.
They break into computer systems.
It involves breaking the security on software applications.
They combine their in-depth knowledge of the Internet and the mass
telecommunications system.
Contd…
✔Viruses builders
A virus is a programme that mayor may not attach itself to a file an
replicate itself.
It can attack any area: from corrupting the data of the file.
✔Worms
Worms may also invade a computer and steal its resources to replicate
themselves.
"Love bug" is a recent.
Contd…
✔Trojan 🐎
Trojan horse is dicey.
It appears to do one thing but does something else. The system may accept it as one
thing.
it may release a virus, worm or logic bomb.
✔
Email bombing refers to sending a large number of emails to the victim resulting in the
victim’s email account (in case of an individual) or mail servers (in case of a company or an email service provider)
crashing.
Data diddling
This kind of attack involves altering raw data just before it is processed by a computer and then
changing it back after the processing is completed.
The NDMC Electricity Billing Fraud Case that took place in 1996 is a typical example. The
computer network was used for receipt and accounting of electricity bills by the NDMC, Delhi.
Intellectual property crimes
These include software piracy, copyright infringement, trademarks violations, theft of computer
source code etc for e.g Email spoofing.
A spoofed email is one that appears to originate from one source but actually has been sent
from another source.
Fake credit card creators
Cyber terrorism
Three categories of Cybercrime
1.Cyber piracy: using cyber-technology in unauthorized ways to:
a. Reproduce copies of proprietary software and proprietary information
b. Distribute proprietary information (in digital form) across a computer network.
2.Cybertrespass : using cyber-technology to gain or to exceed unauthorized access to:
a. An individual's or an organization's computer system
b. A password-protected Web site.
3.Cybervandalism:using cyber-technology to unleash one or more programs that:
a. Disrupt the transmission of electronic information across one or more computer networks, including the
Internet
b. Destroy data resident in a computer or damage a computer system's resources, or both.
Various types of fraud
There are several types of cyber crimes that are occurring in the networking world some of these are as written below-
1.Financial fraud
2. Sabotage of data and other networks
3. Theft of proprietery information
4. System penetration from outside
5. Denial of service
6. Unauthorised access by insiders
7. Employee use of internet service privileges
8. Viruses
0
10
20
30
40
50
60
70
80
90
Chart Title
Cyber crime & security
Cyber security and statergies
Make sure you have a good anti-virus software which regularly runs scanning programmes for
spy ware, a personal firewall and a spam filter
Never keep passwords stored on your computer, or disclose them to anybody.
If you are accessing banking details from a computer that is used by other people, ensure you do
not click on "save" password, as another user could gain access.
Use Bio-metrics.
Contd…
Conclusion
The cybercrime as a whole refers to Offences that are committed against individuals or groups of individuals.
Such crimes may threaten a nation’s security and financial health. Issues surrounding this type of crime have become
high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming.
A computer can be a source of evidence. Even when a computer is not directly used for criminal purposes,
so the network must be secure as no one can access the information of the computer.
Cyber crime & security
1 sur 19

Recommandé

Ppt par
PptPpt
PptGeetu Khanna
1.8K vues18 diapositives
Cyber crime and security par
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
2.5K vues22 diapositives
Cyber Security in Society par
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
5.9K vues23 diapositives
Cyber crime and security par
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
2.9K vues19 diapositives
Cybersecurity Attack Vectors: How to Protect Your Organization par
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
3.7K vues20 diapositives
Cyber Crime And Security par
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
4.9K vues17 diapositives

Contenu connexe

Tendances

Cyber Crime and Security par
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
2.9K vues12 diapositives
Cyber security government ppt By Vishwadeep Badgujar par
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep BadgujarVishwadeep Badgujar
7.8K vues38 diapositives
It act and cyber crime par
It act and cyber crimeIt act and cyber crime
It act and cyber crimeDheeraj Dani
4.6K vues24 diapositives
Cyber security par
Cyber securityCyber security
Cyber securitySiblu28
670.1K vues26 diapositives
Cyber crime presentation par
Cyber crime presentation Cyber crime presentation
Cyber crime presentation Priya Saluja
3.9K vues13 diapositives
Cyber Crime and Security par
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
8.8K vues25 diapositives

Tendances(20)

Cyber security government ppt By Vishwadeep Badgujar par Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
It act and cyber crime par Dheeraj Dani
It act and cyber crimeIt act and cyber crime
It act and cyber crime
Dheeraj Dani4.6K vues
Cyber security par Siblu28
Cyber securityCyber security
Cyber security
Siblu28670.1K vues
Cyber crime presentation par Priya Saluja
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
Priya Saluja3.9K vues
Cyber Crime and Security par Md Nishad
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Md Nishad8.8K vues
Cyber crime and cyber laws par ishmecse13
Cyber crime and cyber lawsCyber crime and cyber laws
Cyber crime and cyber laws
ishmecse133.6K vues
Cyber Crime and Cyber Security par Sazed Salman
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
Sazed Salman3.1K vues
Final cyber crime and security par nikunjandy
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
nikunjandy8K vues

Similaire à Cyber crime & security

Cyber crime and security 1 par
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
10.4K vues39 diapositives
Cyber crime & law par
Cyber crime & lawCyber crime & law
Cyber crime & lawAkshayKumar Kavar
341 vues28 diapositives
CYBER-CRIME PRESENTATION.ppt par
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptPraveen362297
95 vues55 diapositives
Cybercrimes par
CybercrimesCybercrimes
CybercrimesElanthendral Mariappan
459 vues12 diapositives
Cyber Crime and Security par
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security Sanguine_Eva
1.2K vues18 diapositives
Introduction to cybercrime par
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
470 vues43 diapositives

Similaire à Cyber crime & security (20)

Cyber crime and security 1 par indhuchezhian
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
indhuchezhian10.4K vues
Cyber Crime and Security par Sanguine_Eva
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
Sanguine_Eva1.2K vues
Introduction to cybercrime par Anjana Ks
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
Anjana Ks470 vues
Cyber crime & security final tapan par Tapan Khilar
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
Tapan Khilar660 vues
Cyber crimes (By Mohammad Ahmed) par Mohammad Ahmed
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
Mohammad Ahmed1.6K vues
presentation on cyber crime and security par Alisha Korpal
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal35.4K vues
cybersecurityawareness-presentation-170627121043.pdf par ssuserd25aae
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae10 vues
Cybercrime the emerging threat par ANKUR BAROT
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
ANKUR BAROT1.3K vues

Dernier

PORTFOLIO 1 (Bret Michael Pepito).pdf par
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdfbrejess0410
9 vues6 diapositives
WEB 2.O TOOLS: Empowering education.pptx par
WEB 2.O TOOLS: Empowering education.pptxWEB 2.O TOOLS: Empowering education.pptx
WEB 2.O TOOLS: Empowering education.pptxnarmadhamanohar21
16 vues16 diapositives
information par
informationinformation
informationkhelgishekhar
10 vues4 diapositives
The Dark Web : Hidden Services par
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
5 vues24 diapositives
Marketing and Community Building in Web3 par
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3Federico Ast
14 vues64 diapositives
IETF 118: Starlink Protocol Performance par
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol PerformanceAPNIC
394 vues22 diapositives

Dernier(10)

PORTFOLIO 1 (Bret Michael Pepito).pdf par brejess0410
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdf
brejess04109 vues
The Dark Web : Hidden Services par Anshu Singh
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh5 vues
Marketing and Community Building in Web3 par Federico Ast
Marketing and Community Building in Web3Marketing and Community Building in Web3
Marketing and Community Building in Web3
Federico Ast14 vues
IETF 118: Starlink Protocol Performance par APNIC
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol Performance
APNIC394 vues
How to think like a threat actor for Kubernetes.pptx par LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze15 vues
Building trust in our information ecosystem: who do we trust in an emergency par Tina Purnat
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergency
Tina Purnat109 vues

Cyber crime & security

  • 1. PRESENTATION BY, R JAYAPRASANTH V ARAVINDAN Illegal activity committed using computer Cyber crime and security
  • 2. Overview Abstract Introduction to Cybercrime Hacking Hackers ⚪Code crackers ⚪ Viruses, Worms ⚪Trojan horse ⚪E-mail bombing Data diddling Intellectual property crimes Fake credit card creators Three categories of Cybercrimes Various types of Cyber fraud Cyber security and statergies Conclusion
  • 3. Abstract Cybercrime are more properly restricted to describing criminal activity. network is a necessary part of the crime. include traditional crimes, such as fraud, theft, blackmail, forgery. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, including illegal access (unauthorized access), Code cracking, Spreading viruses and worms, Data diddling, intellectual property crimes, Hacking, Forgery. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
  • 4. Introduction to Cybercrime The purpose of this paper is to understand Cybercrime And the legal aspects of Cyber security and to help harmorize legal frameworks. As such, it aims to help better understand the national and international implications of growing cyber threats. to assess the requirements of existing national, Regional and international instruments, and to assist in establishing a sound legal foundation. It provides a comprehensive overview of the most relevant topics linked to the legal aspects of Cybercrime.
  • 5. Hacking The actual word is “Cracking” and not “Hacking”. Hacking has been defined as "Deliberately gaining unauthorised access to an information system.“ They help the government to protect national documents. A cracker is generally someone who breaks into someone else's computer system, often on a network, bypasses passwords or licenses in computer programs. A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there.
  • 6. Hackers Criminals Can Operate Anonymously Over the Computer Networks. Hackers Invade Privacy. Hackers Destroy "Property" in the Form of Computer Files or Records. Hackers Injure Other Computer Users by Destroying Information Systems. Code crackers: They know computers inside out. They break into computer systems. It involves breaking the security on software applications. They combine their in-depth knowledge of the Internet and the mass telecommunications system.
  • 7. Contd… ✔Viruses builders A virus is a programme that mayor may not attach itself to a file an replicate itself. It can attack any area: from corrupting the data of the file. ✔Worms Worms may also invade a computer and steal its resources to replicate themselves. "Love bug" is a recent.
  • 8. Contd… ✔Trojan 🐎 Trojan horse is dicey. It appears to do one thing but does something else. The system may accept it as one thing. it may release a virus, worm or logic bomb. ✔ Email bombing refers to sending a large number of emails to the victim resulting in the victim’s email account (in case of an individual) or mail servers (in case of a company or an email service provider) crashing.
  • 9. Data diddling This kind of attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed. The NDMC Electricity Billing Fraud Case that took place in 1996 is a typical example. The computer network was used for receipt and accounting of electricity bills by the NDMC, Delhi.
  • 10. Intellectual property crimes These include software piracy, copyright infringement, trademarks violations, theft of computer source code etc for e.g Email spoofing. A spoofed email is one that appears to originate from one source but actually has been sent from another source.
  • 11. Fake credit card creators
  • 13. Three categories of Cybercrime 1.Cyber piracy: using cyber-technology in unauthorized ways to: a. Reproduce copies of proprietary software and proprietary information b. Distribute proprietary information (in digital form) across a computer network. 2.Cybertrespass : using cyber-technology to gain or to exceed unauthorized access to: a. An individual's or an organization's computer system b. A password-protected Web site. 3.Cybervandalism:using cyber-technology to unleash one or more programs that: a. Disrupt the transmission of electronic information across one or more computer networks, including the Internet b. Destroy data resident in a computer or damage a computer system's resources, or both.
  • 14. Various types of fraud There are several types of cyber crimes that are occurring in the networking world some of these are as written below- 1.Financial fraud 2. Sabotage of data and other networks 3. Theft of proprietery information 4. System penetration from outside 5. Denial of service 6. Unauthorised access by insiders 7. Employee use of internet service privileges 8. Viruses 0 10 20 30 40 50 60 70 80 90 Chart Title
  • 16. Cyber security and statergies Make sure you have a good anti-virus software which regularly runs scanning programmes for spy ware, a personal firewall and a spam filter Never keep passwords stored on your computer, or disclose them to anybody. If you are accessing banking details from a computer that is used by other people, ensure you do not click on "save" password, as another user could gain access. Use Bio-metrics.
  • 18. Conclusion The cybercrime as a whole refers to Offences that are committed against individuals or groups of individuals. Such crimes may threaten a nation’s security and financial health. Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. A computer can be a source of evidence. Even when a computer is not directly used for criminal purposes, so the network must be secure as no one can access the information of the computer.