34
CYBER CRIME

Cyber crime

Embed Size (px)

DESCRIPTION

If you like this plz share your views Thnxzzz.... :)

Citation preview

Page 1: Cyber crime

CYBER CRIME

my
ymnmnhmnkmgklhmlhkyk,xkjml;klgbuko
Page 2: Cyber crime
Page 3: Cyber crime

WHAT REALLY IS CYBERCRIME?

o “IT IS A CRIMINAL ACTIVITY COMMITED ON THE INTERNET. THIS IS A BROAD TERM THAT DESCRIBES EVERYTHING FROM ELECTRONIS CRACKING TO DENIAL OR SERVICE ATTACKS THAT CAUSES ELECTRONIC COMMERCE

SITES TO LOOSE MONEY.”

Page 4: Cyber crime

TOP 20 COUNTRIES FOUND TO HAVE THE MOST CYBER CRIME

20%

8%

5% 4%

4%4%3%3%3%

31%3%

2%2%2%

2%2%

2% 1% 1% 1%

USA CHINA GERMANY BRITAINBRAZIL SPAIN ITALY FRANCETURKEY POLAND INDIA RUSSIACANADA SOUTH KOREA TAIWAN JAPANMEXICO ARGENTINA AUSTRALIA ISRAEL

Page 5: Cyber crime

Types of CybercrimeThere are 9 types of cyber crime.1. Theft of telecommunications services.2.  Communications in furtherance of criminal

conspiracies.3. Telecommunications piracy.4. Dissemination of offensive materials.5. Electronic money laundering and tax evasion.6. Electronic vandalism, terrorism and extortion.7. Sales and investment fraud.8. Illegal interception of telecommunications.9.  Electronic funds transfer fraud.

Page 6: Cyber crime

Cyber Crime Variants1.) Hacking“Hacking“ is a crime, which entails cracking system and gaining unauthorized access to the data stored in them. Hacking had witnessed a 37 per cent increase this year.

9%9%

46%

36%

Fake documentIdentity TheftSocial EngineeringGet Quick Rich Schemes

Page 7: Cyber crime
Page 8: Cyber crime

HACKING Hacking is done via network programming.

Hackers prepare programs to break network codes and passwords. If you would have tried breaking these codes until a few years ago, you wouldn't have been successful in doing so if you didn't possess enough programming knowledge. However, the hacking methods have evolved over the years and you are no longer required to have extensive knowledge about network programming in order to accomplish this task. With the hacking methods becoming easier and tools getting cheaper, cyber crime is on the rise.

Page 9: Cyber crime

Un-Authorized Hacking

While unauthorized hacking is a threat for the society ethical hacking helps in various ways. The ethical hackers are hired for assistance in investigations. They are also hired to cover up online fraud. For instance there are times when banks need to hire them in order to hide the activities of notorious hackers from the customers. These activities may include stealing someone's ATM or net banking pin. Till the time the bankers sort out the issues they take help from hackers to hide this fact from the customers so as to avoid any kind of panic amongst them. Thus, hacking can be helpful if done for a noble cause

Page 10: Cyber crime

HackingTYPES OF HACKERS PURPOSE OF UNETHICAL

HACKING

White Hat Grey Hat Blue Hat Script Kiddie Black Hat Elite Hat Neophyte Hacktivist

Greed Revenge Greed Adventure  Destruction Access to forbidden

information

Page 11: Cyber crime

Internet fraud The use of Internet services or

software with Internet access to defraud victims or to otherwise take advantage of them, for example by stealing personal information, which can even lead to identity theft. A very common form of Internet fraud is the distribution of rogue security software. Internet services can be used to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.

Internet fraud can occur in chat rooms, email, message boards, or on websites.

3%9%

24%

12%18%

34%

Column1

Current Employee for financial GainEx-Employee for Financial GainDisgruntled Ex- employee Con-tracterExtortionHacking for Financial GainGeneral Hacking

Page 12: Cyber crime
Page 13: Cyber crime

Lottery Fraud

Lottery frauds are most common online fraud that happens every day on internet. Every day Gmail, Yahoo or Hotmail like mailing portal users receive mails regarding lottery. Such mails comes with popular brand names saying that "You have won 50 Million dollars" from Coca-Cola, Yahoo, Hotmail and other big names. When you reply to those mails they ask for your bank details to transfer your lottery money. When you send them the details asked, then they ask you to give a processing fee or handling charges. To tell you the fact, such e mails are always misleading and money is never transferred and your bank details are used for other scams or frauds.

Page 14: Cyber crime

Spoof websites and E mail security alert

Spoof websites and e mails are also a form online fraud and are resulted by technical expertise. In this, a fake website is created which looks like an authentic website, but actually that's a spoof. The purpose of creating such website is to make the user enter personal information and details of his account. Then this information is used to login business and bank accounts of that user. They get traffic to their spoof by shooting spam e mails which misleads them to enter their username and passwords which gets updated to the hacker's server. And thus commit illegal financial transaction making the owner go bankrupt. Be careful to keep yourself away from any such fraud or scam.

Page 15: Cyber crime

Types of Online fraud

Phishingo Phishing is a form cyber crime the employs expertise of

social engineering methods to obtain highly confidential information such as passwords of online accounts, pin numbers or codes, account number and bank details, e mail account information and social security number, etc. This is actually done by using the name or identity of any trustworthy person or business in an online communication via e mail or chat, phishing experts get the details revealed like passwords, account & personal information.

o For ex: You can get a mail on the name your bank saying that due to security reasons your required to change your password for net banking account. Mostly, these mails warn you for negative consequences if ignored.

Page 16: Cyber crime

Spoofing Spoofing is also an illegal online activity which

involves intrusion masquerading a genuine user. In this activity a hacker enters in to a distant computer illegally without any authorization, using a different identity than his original one. This is possible when hacker has already obtained actual password somehow. The hacker then creates a new user by misguiding computer to think that the hacker is a genuine person to do that. Thus after that, the hacker over takes the control of the system and can perform a number frauds using the fake identity the hacker created.For ex: You can get a mail on the name your bank saying that due to security reasons your required to change your password for net banking account. Mostly, these mails warn you for negative consequences if ignored.

Page 17: Cyber crime

Virus Hoax E mails

o All the website providing mailing services like Gmail, Yahoo or MSN etc update their data base with the viruses and related mails and put them in spam when they find it suspicious but then also the hackers or spammers are very smart to crack all and thus spread such fake e mails. So if you get any such suspicious mail then never ignore and after that check about such virus on Google or antivirus websites before taking any action and also do not forward any spam e mails promising you any kinds of reward points

Page 18: Cyber crime
Page 19: Cyber crime

Defamation

Defamation is basically causing injury to the reputation of a person or a company using false statements or actions. It can be also described as an attack on good faith name and reputation of a person or company by someone who is not in favor that person or company and thus want to float some negative message in the society or market. Defamation is considered to be a crime in almost all the countries of the world including India.

Page 20: Cyber crime

There are some more words which interpret almost the same meaning as defamation – calumny, vilification, traducement, slander and libel. All these words explain defamation but there are two major kinds of defamation Libel & slander. Libel is visual defamation which can be in the form of fake prints, misleading pictures or deceptive videos. Libel may be used for written, broadcasted or published words, pictures or videos. This may lead sufferer to hatred, contempt, ridicule and disgrace by people, which may result in worst consequences where people may start avoiding him/her and that can injure the occupation or business.

Page 21: Cyber crime

Slander is also a form of defamation other than Libel (visual defamation). This form is related with the use of transitory statements. It can be explained as a defamation that some one hear, does not see. For example- Someone is talking wrong, spreading rumors and telling lies about a person or a company. Slander is basically an oral statement that is said with a reason to injure the value and respect of the person or company, which may hamper the reputation, profession, trade or business.

Page 22: Cyber crime

There are some other critical reasons which make it important to be aware of defamation laws. One can always prove defamation in words alone without any evidence, but it's always an added advantage when there is a confirm evidence of it. These evidences can be any letter, e mail or an eye witnesses confirming the defamation, etc. One does not have to prove damages in defamation cases, once the defamation is proved damages are presumed. This means one does not have to undergo tests to prove that the person was injured mentally somehow or consulted to any mental doctor or psychiatrist.

Page 23: Cyber crime

Cyber Defamation

When any sort of defamation is done using internet then it is called Cyber Defamation. Cyber defamation is a crime which is conducted in cyberspace mostly through the medium of Internet with an aim to defame a person or a company. With increasing use of Internet around the globe, the graph of cyber defamation is increasing like anything. All countries are incorporating cyber laws and amending them in order to combat against this very serious cyber crime called as Cyber Defamation

Defamation – Section 499 IPC / Section 67 IT Act –

Page 24: Cyber crime

Publishing of information which is obscene in electronic form

Whoever publishes or transmits or causes to be published in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it, shall be punished on first conviction with imprisonment of either description for a term which may extend to five years and with fine which may extend to one lakh rupees and in the event of a second or subsequent conviction with imprisonment of either description for a term which may extend to ten years and also with fine which may extend to two lakh rupees.

Page 25: Cyber crime
Page 26: Cyber crime

Identity Theft Identity Theft is another kind of very offensive cyber crime

known across the globe. Identity theft actually is way through which criminals somehow obtains the personal information of people who identity they want to use for any illegal purpose. The criminal gets the key personal information & details like Driving License Number, Social Security and Pin Codes of ATM and other cards. Then criminal can use all that information for making purchases online on the name of victim. The Identity theft can lead to serious consequences as the criminal can use the information for immigration or other such important applications. The most serious consequence is that crime is often done by identity theft experts who perform their task very meticulously and thus the charge of crime comes on victim, whose identity has been theft. There are two broad types of Identity Theft- Account Takeover- True Name Theft

Page 27: Cyber crime
Page 28: Cyber crime

Account Takeove

r

• Account Takeover is a kind of situation where the criminal uses the information which he has stolen in order to have the access of victim's existing accounts.

• Then there may be further misuse using the existing accounts like changing the address so that bill does not reach to victim's place and criminal can enjoy shopping and purchases online through the credit cards the thief runs up.

True Name Theft

•True Name Theft, the thief by using the personal information of the victim opens new accounts. In this the thief can open new credit card, cellular phones number, check books of the existing account and may misuse all.•Online facilities of banking and credit cards called net baking has made things very easy for these sort of thefts, where only passwords or codes are the keys to do anything and real verification has no role to play as such.

Page 29: Cyber crime
Page 30: Cyber crime

Cyber LawIndia has enacted

the first I.T. Act,2000

recommended by the

general assembly of

the United Nations.

Chapter IX of this Act

deals with offences/

crimes along with

certain other provisions scattered

in this Acts. The

various offences

Page 31: Cyber crime

The biggest drawback in the CYBER LAW of Cyber Crime is the absence of comprehensive law any

where in the world.

Page 32: Cyber crime

PREVENTION

Preventive steps for individualso CHILDREN:

Children should not give out identifying information such as Name, home address, School address, Telephone number in the Chat room. They should not respond to any messages, which are suggestive, obscene, belligerent or threatening, and not to arrange face-to-face meetings, without telling parents and guardians. They should remember that people might not be who they seem.

o PARENTS:Parent should use content filtering software on PC to protect

children from pornography, gambling, hate speech, drug and alcohol. There is also a software to establish time control for use of limpets( for example blocking usage after a particular time) allowing parents to see which site item children have visited. Use this software to keep track of the type of activities of children.

Page 33: Cyber crime

GENERAL INFORMATION

Don’t delete harmful communications ( messages, chat etc.) They will provide vital information about system and address of the person behind these.

Try not to panic. If you feel any immediate physical danger contact your local

police. Avoid getting into huge arguments online during chat and

discussion with other users. Remember that all other internet users are stranger; you do

not know who you are chatting with. So be careful. Be extremely careful about how you share personal

information about yourself online.

Choose your chatting nickname carefully so as other.

Page 34: Cyber crime

Indian Crime Scene