32
DEPARTMENT OF BUSINESS & INDUSTRIAL MANAGEMENT VEER NARMAD SOUTH GUJARAT UNIVERSITY SUBMITTED TO: DR. JAYDIP CHAUDHARI

Cyber Crime

Embed Size (px)

Citation preview

Page 1: Cyber Crime

DEPARTMENT OF BUSINESS & INDUSTRIAL MANAGEMENT

VEER NARMAD SOUTH GUJARAT UNIVERSITY

SUBMITTED TO: DR. JAYDIP CHAUDHARI

Page 2: Cyber Crime

CYBER CRIME

SUBMITTED BY:KARAN J.LALWANI-44

RAHUL MERAI-51VISHAL DAVE-18

Page 3: Cyber Crime

CYBER CRIME• Cyber crime refers to any crime that

involves a computer and a network.• The computer may have been used in the

commission of a crime, or it may be the target.

Page 4: Cyber Crime

Crimes that primarily target computer networks or devices include:

• Computer viruses• Denial-of-service attacks• Malware (malicious code)

Page 5: Cyber Crime

Crimes that use computer networks or devices to advance other ends include:

• Cyber stalking• Fraud and identity theft• Information warfare• Phishing scams

Page 6: Cyber Crime

INFORMATION TECHNOLOGY ACT 2000

• The Information Technology Act 2000 is an Act of the Indian Parliament (No 21 of 2000) notified on October 17, 2000.

• IT Act 2000 consisted of 94 sections segregated into 13 chapters.

Page 7: Cyber Crime

Information Technology Act 2000 addressed the following issues:

• Legal Recognition of Electronic Documents

• Legal Recognition of Digital Signatures• Offenses and Contraventions• Justice Dispensation Systems

for Cybercrimes

Page 8: Cyber Crime

HACKING• Hacking in simple terms means an illegal

intrusion into a computer system or network.

• Hackers write or use ready-made computer programs to attack the target computer.

• Government websites are the hot targets of the hackers due to the press coverage, it receives.

Page 9: Cyber Crime

The motives behind the crime are as follows

– Greed– Power– Publicity– Revenge– Adventure– Desire to access forbidden information– Distractive mindset

Page 10: Cyber Crime

PHISHING• Phishing is the act of attempting to acquire

information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.

• A phishing technique was described in detail in 1987.

• the first recorded use of the term "phishing" was made in 1995 by Jason Shannon of AST Computers.

Page 11: Cyber Crime

What Can Be Done About Phishing?

• Never respond to requests for personal information like passwords via e-mail (or phone!).– Legitimate businesses do not request such

information this way.• Visit web sites of companies with which you have

business by manually typing the company URL.– Do not click on links in unexpected e-mails because

they can be spoofed.– Along the same lines, do not call phone numbers

found in those e-mails.

Page 12: Cyber Crime

• Be aware of URLs that do not have the company name directly before the top-level domain.– For example, bankofamerica.com is the

correct URL, bankofamerica.pp.com is questionable.

• Routinely review your credit card and bank statements for unusual activity.

Page 13: Cyber Crime

SPOOFING• SPOOFING is a situation in which one

person or program successfully masquerades as another by falsifying information/data and thereby gaining an illegitimate advantage.

Page 14: Cyber Crime

Types of Spoofing attacks• IP Spoof• Web Spoof• E-mail Spoof• Non Technical Spoof

Page 15: Cyber Crime

IP Spoofing• The creation of IP packets with a forged

source.• The purpose of it is to conceal the identity

of the sender or impersonating another computing system.

Page 16: Cyber Crime

Uses of IP Spoofing• Denial-of-service attack• To defeat networks security

Page 17: Cyber Crime

Email Spoof• E-mail spoofing is the forgery of an e-mail

header so that the message appears to have originated from someone or somewhere other than the actual source.

Page 18: Cyber Crime

Email Spoof Protection• Double check the email you are replying

to, make sure that the letters are what they truly seem. For example, l(lower case L) is not the same as I(upper case i).

• Look at the IP information of the email header. If an email originated from inside your network, the sender should have very similar IP address.

Page 19: Cyber Crime

DATA DIDDLING• Data diddling is the changing of data

before or during entry into the computer system.

• Example includes forging or counterfeiting documents used for data entry and exchanging valid disks and taped with modified replacements.

Page 20: Cyber Crime
Page 21: Cyber Crime

DENIAL OF SERVICE ATTACK

• This is an act by the criminal, who floods the bandwidth of the victim network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.

Page 22: Cyber Crime

CYBER TERRORISM• Cyber terrorism is the use

of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.

Page 23: Cyber Crime

Types of cyber terror capability

• Simple-Unstructured• Advanced-Structured• Complex-Coordinated

Page 24: Cyber Crime

CYBER EXTORTION• Extortion is thriving in cyberspace, with

malicious software denying users access to their computers or files until they pay a ransom. Cyber extortion is a crime involving an attack or threat of attack against an enterprise, coupled with a demand for money to avert or stop the attack.

Page 25: Cyber Crime

• Cyber extortion can take many forms. Originally, denials of service attacks were the most common method.

• Cyber extortion can be lucrative, netting attackers millions of dollars annually.

Page 26: Cyber Crime

CHILD PORNOGRAPHY• The Internet is being highly used by its

abusers to reach and abuse children sexually, worldwide. The internet is very fast becoming a household commodity in India. Its explosion has made the children a viable victim to the cyber crime.

Page 27: Cyber Crime

How do they Operate?• Pedophiles use false identity to trap the

children/teenagers• Pedophiles contact children/teens in various

chat rooms which are used by children/teen to interact with other children/teen.

• Befriend the child/teen.• Extract personal information from the

child/teen by winning his confidence.

Page 28: Cyber Crime

• Gets the e-mail address of the child/teen and starts making contacts on the victim’s e-mail address as well.

• Starts sending pornographic images/text to the victim including child pornographic images in order to help child/teen shed his inhibitions so that a feeling is created in the mind of the victim that what is being fed to him are normal and that everybody does it.

Page 29: Cyber Crime

• Extract personal information from child/teen

• At the end of it, the pedophile set up a meeting with the child/teen out of the house and then drags him into the net to further sexually assault him or to use him as a sex object.

Page 30: Cyber Crime

SOFTWARE PIRACY• Software Piracy is the use of works under

copyright, infringing the copyright holder's exclusive rights, such as the right to reproduce, distribute, display or perform the copyrighted work, or to make derivative works, without permission from the copyright holder, which is typically a publisher or other business representing or assigned by the work's creator.

Page 31: Cyber Crime

Motives for engaging in copyright infringement

• Pricing• Unavailability• Usefulness• Shopping experience• Anonymity

Page 32: Cyber Crime