CYBER CRIME

CONTENTS
? Why Learn About Cyber Crime ?
? Types Of Cyber Crime.
? Preventive Measures.
? Cyber Laws.
WHAT IS CYBER CRIME ?
“Unlawful acts where in the
computer is either a tool or a
target or both.”
WHY LEARN ABOUT CYBER CRIME ?
? Everyone is using COMPUTER today.
? From white collar criminals to terrorist
organizations and from teenagers to
adults.
? New generation is growing up with
computers.
? MOST IMPORTANT – Monetary
transactions are moving on to the
INTERNET.
COMPUTER CRIME is any Crime where….
? Computer is Tool of Crime.
? Computer is Target.
? Computer is Incidental to Crime.
WHAT ARE GENERAL REASONS FOR
HACKING, BY CYBER CRIMINALS ?
? Gathering Trophies
(quest to become
famous).
? General mischief.
? Financial gain.
? Revenge ? Protest
? Criminal activity
? Identity theft
MAIN TYPES OF CYBER CRIME
? Hacking
? Virus Dissemination
? Software Piracy
? Denial of Service
Attack
? Net extortion
? Phishing
? Spoofing
? Defamation
HACKING
Hacking is unauthorized use of
computer and network resources.
WHAT IS HACKING ?
WHO IS HACKER ?
Hacker is someone who breaks into
computers to gain access of private
emails, documents and other files.
? In the year 2008 alone there was an estimated $1
Trillion dollars worth of intellectual property stolen
due to hackers gaining access to confidential data
stored on enterprise systems worldwide.
? In a recent survey it was reported that 90 % of all
businesses suffered some sort of computer hack over
the past 12 months.
WHAT HACKERS DID TO WORLD….
? Research estimates that every day more than
30000 websites are infected with some type of
malware.
DENIAL OF
SERVICE ATTACK
A Denial of Service Attack (DoS attack)
or Distributed Denial of Service Attack (DDoS
Attack) is an attempt to make a machine or
network resource unavailable to its intended
users.
WHAT IS DENIAL OF SERVICE
ATTACK ?
The Architecture Commonly Used in DDoC -
VIRUS DISSEMINATION
? Malicious software that attaches itself to
other software which destroys the system
of the victim.
? Virus, worms, Trojan Horse, Time bomb,
Logic Bomb, Rabbit and Bacterium are
examples of malicious software.
WHAT IS VIRUS DISSEMINATION ?
SOFTWARE PIRACY
? Theft of software through the illegal copying
of genuine programs or the counterfeiting and
distribution of products intended to pass for
the original is termed as termed as Software
Piracy.
WHAT IS SOFTWARE PIRACY ?
? End User Copying.
? Hard disk loading.
? Counterfeiting. ? Illegal downloads
from the Internet.
Examples :-
NET
Copying the company’s confidential data in
order to extort said company for huge amount.
WHAT IS NET EXTORTION ?
DEFAMATION
? Intention to harm the reputation of a
particular person or reasonably know that
his/her conduct could cause such harm.
? Cyber Defamation when defamation
done with computer as tool.
Examples –
? Divorced husband against his wife,
? Employee against his boss.

WHAT IS DEFAMATION ?
PHISHING
WHAT IS PHISHING ?
Phishing is an E-mail fraud method in which
the perpetrator sends out legitimate-looking
email in an attempt to gather personal and
financial information from recipients.
PHISHING REPORT
HOW TO RECOGNIZE PHISHING E-MAIL
MESSAGES & LINKS ?
? Spelling and bad grammar.
? Beware of links in email.
? Threats.
? Spoofing popular websites or companies.
SPOOFING
WHAT IS SPOOFING ?
The term Spoofing is used for the act of
deceiving someone on the Web, whether that
be through trickery, hoaxes, online identity
theft, or other purely mischievous purposes.
? E-Mail Spoofing can be accomplished by
changing your "FROM" e-mail address.
? E-mail spoofing is an attempt to trick the user
into making a damaging statement or
releasing sensitive information, such as a
password.
? E-Mail Spoofing occurs when the sender of an
e-mail message pretends to be someone else.
WHAT IS E-MAIL SPOOFING ?
PREVENTIVE MEASURES
? Don’t delete harmful information (E-mails,
chat etc.) They will provide vital information
about system and address of the person
behind these.
? Avoid getting into huge arguments during chat
and discussion with other users.
? Be extremely careful about how you share your
personal information about yourself online.
? Save all communication for evidence. Don’t edit
it in any way. Also keep record of your contacts
and inform Law Enforcement Officials.
? Don’t give photographs to anyone on
the net.
? Don’t arrange a face-to-face meeting to
without telling parents or guardians.
? Be extremely cautious about meeting
online introduced person.
? If feel any immediate physical danger,
contact your local police.
Preventive Steps for Organizations
And Government -
? Physical Security
? Use of Passwords
? Finding holes in
Network
? Using Network
Scanning Program
? Using Encryption
? Implement Access
Control Systems
People such as Computer hackers and
pirates who hurt others through Computer
Technologies are not “COOL”..!!
They are breaking the Law…!!
REMEMBER !
CYBER LAW
Cyber Law is a term used to describe the legal
issues related to use of Communications
Technology, particularly “Cyber Space", i.e. the
Internet.
WHAT IS CYBER LAW ?
AMENDMENT ACTS -
? Information Technology Act, 2000
? Information Technology Amendment Bill 2006
? Information Technology Amendment Act 2008
OFFENCES -
? Tampering with computer source documents.
? Hacking with computer systems.
? Publishing obscene information.
? Unauthorized access to protected system.
? Breach of confidentially and piracy.
SOME SECTIONS IN LAW -
Section 43 – If any person without permission
of the owner Access such computer, Download,
Copy or Extract any Data from Computer,
Introduces Computer Virus to Contaminate the
Computer, Damages the Computer.
Punishment – He shall be liable to damages
by the way of compensation not exceeding
ONE CRORE to person so affected.
SOME SECTIONS IN LAW -
Section 66 – If information residing computer
resources get destroyed, Deleted, Altered,
Diminished in value or utility,
Affected Injuriously.
Punishment – 3 yrs or fine up to 3 lakhs for
Hacking.
SOME SECTIONS IN LAW -
Section 65 – Tampering with Computer Source
Document.
Punishment – Imprisonment up to 3 lakhs or
Fine up to 2 lakhs.
Section 72 - Violation of Privacy Policy.
Punishment – Fine up to 5 lakhs, Jail not
Extending 2 yrs.
CONCLUSION -
? Generate Awareness & Orientation about the
Compliance Requirements of Indian Cyber
law.
? The new Amendment Act strengthened the
hands of Nation by increasing the reach of
Powers of the Interception of the Government.
Members -
THANK YOU..!!

doc_468786293.ppt
 

Attachments

Back
Top