Combating-cybercrimes-in-India (1)

Embed Size (px)

Citation preview

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    1/29

    Study on Cyber

    CrimeGuided by:

    Dr. Deepak Shrivastava

    Presented by:

    Amit Pandit

    Pranay Gehlot

    Yash Raj Soni

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    2/29

    Introduction to Cyber crime

    Computer Crime, E-Crime, Hi-Tech Crime or Electronic Crimeis where a computer is the

    target of a crime or is themeans adopted to commit acrime.

    Most of these crimes are notnew. Criminals simply devise

    different ways to undertakestandard criminal activitiessuch as fraud, theft, blackmail,forgery, and embezzlementusing the new medium, ofteninvolving the Internet.

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    3/29

    Why is Computer Vulnerable?? Computers store huge amounts of data in small

    spaces

    Ease of access

    Complexity of technology Human error

    One of the key elements that keeps most members ofany society honest is fear of being caught thedeterrence factor. Cyberspace changes two of thoserules. First, it offers the criminal an opportunity of

    attacking his victims from the remoteness of adifferent continent and secondly, the results of thecrime are not immediately apparent.

    Need new laws and upgraded technology to combatcyber crimes

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    4/29

    Computer Viruses

    yVirusesA computer virus is acomputer program that caninfect other computerprograms by modifyingthem in such a way as toinclude a (possibly evolved)copy of it. Note that a

    program does not have toperform outright damage(such as deleting or corrupting files) in order tobe called a "virus".

    Viruses

    File

    infectors

    Boot record

    infectors

    Boot and

    file

    viruses

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    5/29

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    6/29

    Types of Cyber crimes

    Crime against persons

    Crime against Government

    Crime against property

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    7/29

    Cyber crimes

    HackingInformation

    Theft

    E-mail

    bombingSalami

    attacks

    Denial of

    Service

    attacks

    Trojan

    attacksWeb jacking

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    8/29

    Fake Profile casesA fake profile of a woman is created on social

    networking site. The profile displays her

    correct name and contact information (such

    as address, residential phone number, cellphone number etc). Sometimes it even has

    her photograph.

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    9/29

    Email Account Hacking The victims email account password is

    stolen and the account is then misused

    for sending out malicious code.

    The victims email account password is

    stolen and the hacker tries to extort

    money

    from the victim.

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    10/29

    Credit Card Fraud

    The victims credit card information is

    stolen and misused for making onlinepurchases (e.g. airline tickets, software,

    subscription to pornographic websites

    etc).

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    11/29

    Source Code Theft The suspect (usually an employee of

    the victim) steals the source code andsells it to a business rival of the victim.

    The suspect (usually an employee ofthe victim) steals the source code anduses it as a base to make and sell his

    own version of the software.

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    12/29

    Software Piracy

    The software pirate sells the pirated

    software in physical media (usually CD

    ROMs) through a close network ofdealers.

    The software pirate sells the pirated

    software through electronic downloads

    through websites, bulletin boards,

    newsgroups, spam emails etc.

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    13/29

    Music Piracy

    The music pirate sells the pirated music

    in physical media (usually CD ROMs)

    through a close network of dealers.

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    14/29

    Email Scams Criminals are also using emails

    extensively for their illicit activities.

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    15/29

    Phishing

    The victim receives an email that

    appears to have been sent from his

    bank. The email urges the victim toclick on the link in the email. When the

    victim does so, he is taken to a secure

    page on the banks website

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    16/29

    Online Sale ofIllegal

    Articles

    The suspect posts information about

    the illegal sale that he seeks to make.

    Potential customers can contact theseller using the email IDs provided.

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    17/29

    Virus Attacks The virus is a general in the wild virus. This

    means that it is spreading all over the world

    and is not targeted at any specificorganisation.

    The virus targets a particular organisation.

    This type of a virus is not known to anti-virus

    companies as it is a new virus createdspecifically to target a particular organisation

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    18/29

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    19/29

    Computer Crime and Security Survey

    Of the organizations suffering security compromises in the lastyear 95% had Firewalls and 61% had IDSs

    981009896Anti-virus software

    90929389Access Control

    %%%%SECURITY TECHNOLOGIES

    USED

    64626150Encrypted Files

    95789181Firewalls

    61504235Intrusion Detection Systems

    2009200820072006

    False sense of security We already have a Firewall

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    20/29

    What is India incs biggest

    threat?

    Cyber crime is now a bigger threat to India Incthan physical crime. In a recent survey by IBM, agreater number of companies (44%) listed cybercrime as a bigger threat to their profitability than

    physical crime (31%).

    The cost of cyber crime stems primarily from lossof revenue, loss of market capitalization, damageto the brand, and loss of customers, in that order.

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    21/29

    Civil Wrongs underIT Act ChapterIX ofIT Act, Section 43 Whoever without permission of owner of the

    computer Secures access (mere U/A access)

    Not necessarily through a network

    Downloads, copies, extracts any data

    Introduces or causes to be introduced any viruses orcontaminant

    Damages or causes to be damaged any computer

    resource Destroy, alter, delete, add, modify or rearrange

    Change the format of a file

    Disrupts or causes disruption of any computer resource

    Preventing normal continuance of

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    22/29

    Denies or causes denial of access by any

    means Denial of service attacks

    Assists any person to do any thing above

    Rogue Websites, Search Engines, Insidersproviding vulnerabilities

    Charges the services availed by a person tothe account of another person by tampering ormanipulating any computer resource

    Credit card frauds, Internet time thefts

    Liable to pay damages not exceeding Rs. Onecrore to the affected party

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    23/29

    Section 65: Source Code Most important asset of software

    companies

    Ingredients Concealment, destruction, alteration

    Punishment

    imprisonment up to three years and / or fine up to Rs. 2 lakh

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    24/29

    Section 66: Hacking

    Ingredients

    Destruction, deletion, alteration, diminishing

    value or utility or injuriously affectinginformation residing in a computer resource

    Punishment imprisonment up to three years, and / or

    fine up to Rs. 2 lakh Cognizable, NonBailable,

    Section 66 covers data theft as well as data alterationSection 66 covers data theft as well as data alteration

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    25/29

    Sec 69: Decryption of information

    Ingredients Controller issues order to Government agency to

    intercept any information transmitted through

    any computer resource.

    Order is issued in the interest of the sovereignty or integrity ofIndia,

    the security of the State,

    friendly relations with foreign States,

    public order or

    preventing incitement for commission of a cognizableoffence

    Person in charge of the computer resource fails

    to extend all facilities and technical assistance to

    decrypt the information-punishment upto 7 years.

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    26/29

    Sec 70 Protected System

    Acts covered by this section: Switching computer on / off

    Using installed software / hardware

    Installing software / hardware

    Punishment Imprisonment up to 10 years and fine

    Cognizable, Non-Bailable, Court of Sessions

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    27/29

    Causes of Non-Reporting of

    Cyber Crimes in India

    UNAUTHORISED

    ACCESS 19%

    E-MAIL ABUSE 21%

    DATA THEFT 33%

    Non Reporting-causes

    60% feared negative

    publicity 23% did not know

    police equipped tohandle cyber crimes

    9% feared furthercyber attacks

    8% had no awarenessof cyber laws

    False arrest concerns

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    28/29

    Instuctions

    1) Be cautious about information you share on online communities,especially social sites like myspace, facebook, and twitter. Onlinepredators can use this information to steal your identity, harass you,or stalk you.

    2) Create difficult to guess passwords for all online accounts and pinnumbers. Vary your passwords so that if one of your passwords is ever

    compromised you won't have to worry about all of your accounts.3) Safe keep all of your personal information including your full name,address, phone number, social security number, account numbers, andpasswords. Do not place such personal information on your multi-media devices such as computers, mp3 players, and cell phones. Shred allpaperwork with such personal information on it.

    y4) Check your financial statements monthly to ensure there are no unusual

    transactions.5) When you shop online make sure you are using a secure website, like

    ones with a url address that begins with "https" and/or businesses that havehad their website certificate verified by companies like Verisign

  • 8/7/2019 Combating-cybercrimes-in-India (1)

    29/29

    THANK YOU