SlideShare une entreprise Scribd logo
1  sur  33
Introduction to Cybercrime
Chapter 1
Introduction
Cybercrime: Definition and Origins of the
Word
Cybercrime and Information Security
Who are Cybercriminals?
Classifications of Cybercrimes
 Internet in India is growing rapidly
 Unrestricted no. of free websites, the Internet has deniably
opened a new exploitation known as cybercrime
 Activates involve the use of computer, Internet, Cyberspace
and WWW
 1st recorded cybercrime took place in the year 1820
 Indian corporate and government sites have been attacked or
defaced more than 780 times between Feb 2002 & Dec 2002
 3,286 Indian websites were hacked in 5months – between
Jan & June 2009
Cyberspace: (by William Gibson in 1984)
• Worldwide n/w of Computer networks that uses
the TCP/IP for communication to facilitate
transmission and exchange of data
Cybersquatting:
• Means registering, selling or using a domain name
with intent of profiting from goodwill of someone
else’s trademark
 Cyberpunk: (by Bruce Bethke, 1980)
• Mean something like “anarchy via machine” or
“machine/computer rebel movement”
 Cyberwarfare:
• Means information warriors unleashing vicious attacks
against an unsuspecting opponent’s computer
networks, wreaking havoc and paralyzing nations.
 Cyberterrorism: (by Barry Collin, 1997)
• Use of disruptive activities, or the threat, against
computers and/or networks, with the intention to cause
harm or further social, ideological, religious, political or
similar objectives or to intimidate any person in
furtherance of such objectives
 “A crime conducted in which a computer was
directly or significantly instrumental”
 “Cybercrime is any illegal behavior, directed
by means of electronic operations, that
targets the security of computer systems and
the data processed by them.”
 Computer related crime, Computer crime,
Internet crime, E-crime, High-tech crime etc.
are synonymous terms
Few definition of Cyber Crime:
• A crime committed using a computer and the
Internet to steal person’s identity
• Crime completed either on or with a computer
• Any illegal activity done through the Internet or on
the computer
• All criminal activities done using the medium of
computers, the Internet, cyberspace and WWW
Types of attack
• Techno-crime:
 A premeditated act against a system or systems with
the intent to copy, steal, corrupt or otherwise deface or
damage part of or the complete computer system
 Possible when computer connected with the Internet 24
X 7
• Techno-vandalism:
 These acts of “brainless” defacement of websites
and/or other activities, such as copying files and
publicizing their contents publicly
Cybersecurity means protecting
information, equipment, devices, computer,
computer resource, communication device
and information stored therein from
unauthorized access, use, disclosure,
disruption, modification or destruction
Categorized in 3 groups:
• Type I: Cybercriminals- hungry for recognition
 Hobby hackers
 IT professionals
 Politically motivated hackers
 Terrorist organizations
• Type II: Cybercriminals- not interested in
recognition
 Psychological perverts
 Financially motivated hackers
 State-sponsored hacking
 Organized criminals
• Type III: cybercriminals- the insiders
 Former employees seeking revenge
 Competing companies using employees to gain
economic advantage through damage and/or theft
1. Cybercrime against individual:
• E-Mail spoofing and other online fraud
• Phishing
• Spamming
• Cyberdefamation
• Cyberstalking and harassment
• Computer sabotage
• Pornographic offenses
2. Cybercrime against property:
• Credit card frauds
• Intellectual property crime
• Internet time theft
3. Cybercrime against organization:
• Unauthorized accessing of computer
• Password sniffing
• Denial-of-service attacks
• Virus
• E-Mail bombing
• Salami attack
• Logic bomb
• Trojan horse
• Data diddling
• Industrial spying
• Crimes emanating from Usenet newsgroup
• Computer network intrusions
• Software piracy
4. Cybercrime against society:
• Forgery
• Cyberterrorism
• Web jacking
5. Crimes emanating from Usenet
newsgroup:
• Usenet group may carry very offensive, harmful,
inaccurate or otherwise inappropriate material or
postings that have been misplaced or are
deceptive in another way
A spoofed email is one in which e-mail
header is forged so that mail appears to
originate from one source but actually has
been sent from another source
Spamming means sending multiple copies
of unsolicited mails or mass e-mails such
as chain letters.
Difficult to control
In context of “search engine spamming”,
spamming is alternation or creation of a
document with the intent to deceive an
electronic catalog or filing system
Cognizable offense
This occurs when defamation takes place
with the help of computers and / or the
Internet.
E.g. someone publishes defamatory matter
about someone on a website or sends e-
mails containing defamatory information.
 The usage of the Internet hours by an
unauthorized person which is actually paid
by another person
Comes under hacking
When negligible amounts are removed &
accumulated in to something larger. These
attacks are used for the commission of
financial crimes.
This kind of an attack involves altering raw
data just before it is processed by a
computer and then changing it back after
the processing is completed.
Currency notes, revenue stamps, mark
sheets etc can be forged using computers
and high quality scanners and printers.
Hackers gain access and control over the
website of another, even they change the
content of website for fulfilling political
objective or for money.
“Spies” can get information about product
finances, research and development and
marketing strategies, an activity known as
Industrial spying.
Every act committed toward breaking into
computer and/or network is hacking
The purpose of hacking Power, publicity,
revenge, adventure, desire to access
forbidden information, destructive mindset
Spoofing website and E-Mail security
alerts, lottery frauds, virus hoax E-Mail
Child pornography means visual depiction
Theft of software through the illegal
copying of genuine programs or the
counterfeiting and distribution of products
intended to pass for the original.
Illegal copying of programs, distribution of
copies of software
The use of the Internet to hinder the
normal functioning of a computer system
through the introduction of worms, viruses
or logical bombs is referred to as computer
sabotage
Sending a large no. of E-Mails to the victim
to crash victim’s E-Mail account or to make
victim’s server crash
Usenet is a popular means of sharing and
distributing information on the web with
respect to specific subjects or topic
Following criminal use Usenet:
• Distribution/sale of pornographic material
• Distribution/sale of pirated software package
• Distribution of hacking software
• Sale of stolen credit card number
• Sale of stolen data/stolen property
Crackers can break into computer systems
from anywhere in the world and steal data,
plant viruses, create backdoors, insert
trojan horse or change username and
passwords
Programs that monitor and record the
name and password of network users as
they login at a site
Introduction to cybercrime
Introduction to cybercrime

Contenu connexe

Tendances

Tendances (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Computer And The Law
Computer And The LawComputer And The Law
Computer And The Law
 
Unit 1
Unit 1Unit 1
Unit 1
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 
Denial of service
Denial of serviceDenial of service
Denial of service
 

En vedette

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrimepatelripal99
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crimeshubhravrat Deshpande
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research PaperWhitney Bolton
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Projecttsdikshit
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Solve 3 Enterprise Storage Problems Today
Solve 3 Enterprise Storage Problems TodaySolve 3 Enterprise Storage Problems Today
Solve 3 Enterprise Storage Problems TodayStephen Foskett
 
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...Vivastream
 
Renesas RL78 The True Low Power Microcontroller Platform
 Renesas RL78 The True Low Power Microcontroller Platform Renesas RL78 The True Low Power Microcontroller Platform
Renesas RL78 The True Low Power Microcontroller PlatformRenesas Electronics Corporation
 
How to refill canon color cartridge 241
How to refill canon color cartridge 241How to refill canon color cartridge 241
How to refill canon color cartridge 241printerfillingstation
 
An Introduction to Faye
An Introduction to FayeAn Introduction to Faye
An Introduction to FayeDarren Oakley
 
Summary -Fish
Summary -FishSummary -Fish
Summary -FishGMR Group
 

En vedette (20)

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Tools and methods used in cybercrime
Tools and methods used in cybercrimeTools and methods used in cybercrime
Tools and methods used in cybercrime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
 
Cybercrime Research Paper
Cybercrime Research PaperCybercrime Research Paper
Cybercrime Research Paper
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Project
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Solve 3 Enterprise Storage Problems Today
Solve 3 Enterprise Storage Problems TodaySolve 3 Enterprise Storage Problems Today
Solve 3 Enterprise Storage Problems Today
 
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...
 
Ambienti di virtualizzazione
Ambienti di virtualizzazioneAmbienti di virtualizzazione
Ambienti di virtualizzazione
 
Renesas RL78 The True Low Power Microcontroller Platform
 Renesas RL78 The True Low Power Microcontroller Platform Renesas RL78 The True Low Power Microcontroller Platform
Renesas RL78 The True Low Power Microcontroller Platform
 
How to refill canon color cartridge 241
How to refill canon color cartridge 241How to refill canon color cartridge 241
How to refill canon color cartridge 241
 
Enterprise TEPPCO Pipeline System Map
Enterprise TEPPCO Pipeline System MapEnterprise TEPPCO Pipeline System Map
Enterprise TEPPCO Pipeline System Map
 
An Introduction to Faye
An Introduction to FayeAn Introduction to Faye
An Introduction to Faye
 
Summary -Fish
Summary -FishSummary -Fish
Summary -Fish
 

Similaire à Introduction to cybercrime

First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptxKoukiGaz
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation Priya Saluja
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Cyber crimes publicspeaking
Cyber crimes publicspeakingCyber crimes publicspeaking
Cyber crimes publicspeakingAdarsh
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfAadil83
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptxAmeyBarbade1
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptxImXaib
 

Similaire à Introduction to cybercrime (20)

First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber crimes publicspeaking
Cyber crimes publicspeakingCyber crimes publicspeaking
Cyber crimes publicspeaking
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdf
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 

Dernier

Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectErbil Polytechnic University
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxachiever3003
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxNiranjanYadav41
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptbibisarnayak0
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 

Dernier (20)

Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Risk Management in Engineering Construction Project
Risk Management in Engineering Construction ProjectRisk Management in Engineering Construction Project
Risk Management in Engineering Construction Project
 
Crystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptxCrystal Structure analysis and detailed information pptx
Crystal Structure analysis and detailed information pptx
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
BSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptxBSNL Internship Training presentation.pptx
BSNL Internship Training presentation.pptx
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Autonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.pptAutonomous emergency braking system (aeb) ppt.ppt
Autonomous emergency braking system (aeb) ppt.ppt
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 

Introduction to cybercrime

  • 2. Introduction Cybercrime: Definition and Origins of the Word Cybercrime and Information Security Who are Cybercriminals? Classifications of Cybercrimes
  • 3.  Internet in India is growing rapidly  Unrestricted no. of free websites, the Internet has deniably opened a new exploitation known as cybercrime  Activates involve the use of computer, Internet, Cyberspace and WWW  1st recorded cybercrime took place in the year 1820  Indian corporate and government sites have been attacked or defaced more than 780 times between Feb 2002 & Dec 2002  3,286 Indian websites were hacked in 5months – between Jan & June 2009
  • 4. Cyberspace: (by William Gibson in 1984) • Worldwide n/w of Computer networks that uses the TCP/IP for communication to facilitate transmission and exchange of data Cybersquatting: • Means registering, selling or using a domain name with intent of profiting from goodwill of someone else’s trademark
  • 5.  Cyberpunk: (by Bruce Bethke, 1980) • Mean something like “anarchy via machine” or “machine/computer rebel movement”  Cyberwarfare: • Means information warriors unleashing vicious attacks against an unsuspecting opponent’s computer networks, wreaking havoc and paralyzing nations.  Cyberterrorism: (by Barry Collin, 1997) • Use of disruptive activities, or the threat, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives or to intimidate any person in furtherance of such objectives
  • 6.  “A crime conducted in which a computer was directly or significantly instrumental”  “Cybercrime is any illegal behavior, directed by means of electronic operations, that targets the security of computer systems and the data processed by them.”  Computer related crime, Computer crime, Internet crime, E-crime, High-tech crime etc. are synonymous terms
  • 7. Few definition of Cyber Crime: • A crime committed using a computer and the Internet to steal person’s identity • Crime completed either on or with a computer • Any illegal activity done through the Internet or on the computer • All criminal activities done using the medium of computers, the Internet, cyberspace and WWW
  • 8. Types of attack • Techno-crime:  A premeditated act against a system or systems with the intent to copy, steal, corrupt or otherwise deface or damage part of or the complete computer system  Possible when computer connected with the Internet 24 X 7 • Techno-vandalism:  These acts of “brainless” defacement of websites and/or other activities, such as copying files and publicizing their contents publicly
  • 9. Cybersecurity means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction
  • 10. Categorized in 3 groups: • Type I: Cybercriminals- hungry for recognition  Hobby hackers  IT professionals  Politically motivated hackers  Terrorist organizations • Type II: Cybercriminals- not interested in recognition  Psychological perverts  Financially motivated hackers  State-sponsored hacking  Organized criminals
  • 11. • Type III: cybercriminals- the insiders  Former employees seeking revenge  Competing companies using employees to gain economic advantage through damage and/or theft
  • 12. 1. Cybercrime against individual: • E-Mail spoofing and other online fraud • Phishing • Spamming • Cyberdefamation • Cyberstalking and harassment • Computer sabotage • Pornographic offenses 2. Cybercrime against property: • Credit card frauds • Intellectual property crime • Internet time theft
  • 13. 3. Cybercrime against organization: • Unauthorized accessing of computer • Password sniffing • Denial-of-service attacks • Virus • E-Mail bombing • Salami attack • Logic bomb • Trojan horse • Data diddling • Industrial spying • Crimes emanating from Usenet newsgroup • Computer network intrusions • Software piracy
  • 14. 4. Cybercrime against society: • Forgery • Cyberterrorism • Web jacking 5. Crimes emanating from Usenet newsgroup: • Usenet group may carry very offensive, harmful, inaccurate or otherwise inappropriate material or postings that have been misplaced or are deceptive in another way
  • 15. A spoofed email is one in which e-mail header is forged so that mail appears to originate from one source but actually has been sent from another source
  • 16. Spamming means sending multiple copies of unsolicited mails or mass e-mails such as chain letters. Difficult to control In context of “search engine spamming”, spamming is alternation or creation of a document with the intent to deceive an electronic catalog or filing system
  • 17. Cognizable offense This occurs when defamation takes place with the help of computers and / or the Internet. E.g. someone publishes defamatory matter about someone on a website or sends e- mails containing defamatory information.
  • 18.  The usage of the Internet hours by an unauthorized person which is actually paid by another person Comes under hacking
  • 19. When negligible amounts are removed & accumulated in to something larger. These attacks are used for the commission of financial crimes.
  • 20. This kind of an attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed.
  • 21. Currency notes, revenue stamps, mark sheets etc can be forged using computers and high quality scanners and printers.
  • 22. Hackers gain access and control over the website of another, even they change the content of website for fulfilling political objective or for money.
  • 23. “Spies” can get information about product finances, research and development and marketing strategies, an activity known as Industrial spying.
  • 24. Every act committed toward breaking into computer and/or network is hacking The purpose of hacking Power, publicity, revenge, adventure, desire to access forbidden information, destructive mindset
  • 25. Spoofing website and E-Mail security alerts, lottery frauds, virus hoax E-Mail Child pornography means visual depiction
  • 26. Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. Illegal copying of programs, distribution of copies of software
  • 27. The use of the Internet to hinder the normal functioning of a computer system through the introduction of worms, viruses or logical bombs is referred to as computer sabotage
  • 28. Sending a large no. of E-Mails to the victim to crash victim’s E-Mail account or to make victim’s server crash
  • 29. Usenet is a popular means of sharing and distributing information on the web with respect to specific subjects or topic Following criminal use Usenet: • Distribution/sale of pornographic material • Distribution/sale of pirated software package • Distribution of hacking software • Sale of stolen credit card number • Sale of stolen data/stolen property
  • 30. Crackers can break into computer systems from anywhere in the world and steal data, plant viruses, create backdoors, insert trojan horse or change username and passwords
  • 31. Programs that monitor and record the name and password of network users as they login at a site