2. Overview
Abstract
Introduction to Cybercrime
Hacking
Hackers
⚪Code crackers
⚪ Viruses, Worms
⚪Trojan horse
⚪E-mail bombing
Data diddling
Intellectual property crimes
Fake credit card creators
Three categories of Cybercrimes
Various types of Cyber fraud
Cyber security and statergies
Conclusion
3. Abstract
Cybercrime are more properly restricted to describing criminal activity.
network is a necessary part of the crime.
include traditional crimes, such as fraud, theft, blackmail, forgery.
Computer crime can broadly be defined as criminal activity involving an information
technology infrastructure, including illegal access (unauthorized access), Code cracking,
Spreading viruses and worms, Data diddling, intellectual property crimes, Hacking, Forgery.
There are also problems of privacy when confidential information is lost or intercepted,
lawfully or otherwise.
4. Introduction to Cybercrime
The purpose of this paper is to understand Cybercrime
And the legal aspects of Cyber security and to help harmorize legal frameworks.
As such, it aims to help better understand the national and international implications of
growing cyber threats.
to assess the requirements of existing national, Regional and international instruments, and to
assist in establishing a sound legal foundation.
It provides a comprehensive overview of the most relevant topics linked to the legal aspects of
Cybercrime.
5. Hacking
The actual word is “Cracking” and not “Hacking”.
Hacking has been defined as "Deliberately gaining unauthorised access to an information
system.“
They help the government to protect national documents.
A cracker is generally someone who breaks into someone else's computer system, often on a
network, bypasses passwords or licenses in computer programs.
A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or
because the challenge is there.
6. Hackers
Criminals Can Operate Anonymously Over the Computer Networks. Hackers
Invade Privacy.
Hackers Destroy "Property" in the Form of Computer Files or Records. Hackers
Injure Other Computer Users by Destroying Information Systems.
Code crackers:
They know computers inside out.
They break into computer systems.
It involves breaking the security on software applications.
They combine their in-depth knowledge of the Internet and the mass
telecommunications system.
7. Contd…
✔Viruses builders
A virus is a programme that mayor may not attach itself to a file an
replicate itself.
It can attack any area: from corrupting the data of the file.
✔Worms
Worms may also invade a computer and steal its resources to replicate
themselves.
"Love bug" is a recent.
8. Contd…
✔Trojan 🐎
Trojan horse is dicey.
It appears to do one thing but does something else. The system may accept it as one
thing.
it may release a virus, worm or logic bomb.
✔
Email bombing refers to sending a large number of emails to the victim resulting in the
victim’s email account (in case of an individual) or mail servers (in case of a company or an email service provider)
crashing.
9. Data diddling
This kind of attack involves altering raw data just before it is processed by a computer and then
changing it back after the processing is completed.
The NDMC Electricity Billing Fraud Case that took place in 1996 is a typical example. The
computer network was used for receipt and accounting of electricity bills by the NDMC, Delhi.
10. Intellectual property crimes
These include software piracy, copyright infringement, trademarks violations, theft of computer
source code etc for e.g Email spoofing.
A spoofed email is one that appears to originate from one source but actually has been sent
from another source.
13. Three categories of Cybercrime
1.Cyber piracy: using cyber-technology in unauthorized ways to:
a. Reproduce copies of proprietary software and proprietary information
b. Distribute proprietary information (in digital form) across a computer network.
2.Cybertrespass : using cyber-technology to gain or to exceed unauthorized access to:
a. An individual's or an organization's computer system
b. A password-protected Web site.
3.Cybervandalism:using cyber-technology to unleash one or more programs that:
a. Disrupt the transmission of electronic information across one or more computer networks, including the
Internet
b. Destroy data resident in a computer or damage a computer system's resources, or both.
14. Various types of fraud
There are several types of cyber crimes that are occurring in the networking world some of these are as written below-
1.Financial fraud
2. Sabotage of data and other networks
3. Theft of proprietery information
4. System penetration from outside
5. Denial of service
6. Unauthorised access by insiders
7. Employee use of internet service privileges
8. Viruses
0
10
20
30
40
50
60
70
80
90
Chart Title
16. Cyber security and statergies
Make sure you have a good anti-virus software which regularly runs scanning programmes for
spy ware, a personal firewall and a spam filter
Never keep passwords stored on your computer, or disclose them to anybody.
If you are accessing banking details from a computer that is used by other people, ensure you do
not click on "save" password, as another user could gain access.
Use Bio-metrics.
18. Conclusion
The cybercrime as a whole refers to Offences that are committed against individuals or groups of individuals.
Such crimes may threaten a nation’s security and financial health. Issues surrounding this type of crime have become
high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming.
A computer can be a source of evidence. Even when a computer is not directly used for criminal purposes,
so the network must be secure as no one can access the information of the computer.