Beruflich Dokumente
Kultur Dokumente
Expanation
Harmful
network
Illegal
both
Unlawful acts wherein the computer is either a tool or target or Online or Internet-based illegal acts
History
The first recorded cybercrime took place in the year 1820 In 1820, Joseph-Marie Jacquard, a textile manufacturer
France, produced the loom weaving of special fabrics
in
The employees committed acts of sabotage to discourage The first spam email took place in 1978 when it was sent
over the Arpanet
HACKING VIRUS DISSEMINATION CYBER THEFT SOFTWARE PIRACY E-MAIL BOMBS LOGIC BOMBS INTERNET FRAUD CYBER TERRORISM PASSWORD TRAFFICKING IDENTITY THEFT CRADIT CARD FRAUD HACKING
Activity
is commonly referred as unauthorized access to computer systems or network without the permission of the computer owner/user write or use ready-made computer programs to attack the target computer intent to steal, damage, modify or monitor data or settings within the system VIRUS ATTACKS
Hackers
Computer hacking includes breaking into a computer with the Malicious software that attaches itself to other software Circulate themselves to other files and to other computers on
a network
CYBER THEFT
Criminals makes such program thatdeducts small amount like Rs. 2.50 per month from the account of all the customer of the bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount SOFTWARE PIRACY of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original and using computer programs in violation of copyrights and trade secret laws revenue losses worldwide are ever increasing due to this crime E-MAIL BOMBS may be an individual or a company by ultimately resulting into crashing.
Theft
Copying Retail
Programs
system
Secretly attaches another program to a companys computer Even some viruses may be termed logic bombs because they
lie dormant all through the year and become active only on a
are created to do something only when a certain event (known as a trigger event) occurs
uses the Internet or network to destroy or damage computers Cyber terrorist could hack
for political reasons into a pharmaceutical companys computers, changing the formula of some essential medication and causing thousands to die PASSWORD TRAFFICKING or
Misuse and illegal selling of other peoples passwords Break a companys password and misuse the password
sale that password to another company or an individual IDENTITY THEFT
You simply have to type credit card number into www page of
the vendor for online transaction
If electronic transaction are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner Characteristics of Computer Crime
Silent in Nature Global in character Nonexistence of Physical Evidence Creates high Impact Gain Benefit Computer
Silent in Nature
crime could be committed in privacy without reaching to scene of crime physically i.e. no eye witnesses. There is no signs of physical violence or struggle Global in character country the entire economy of the country could be destroyed. As digital evidences are fragile in nature one has to respond quickly Nonexistence of Physical Evidence
No
physical evidence to indicate that crime has been committed. Only on a closer look the trained person could find out the evidences which are not in the traditional format but are in digital format Creates high Impact damage the victim system permanently. Loss of good will
Gain Benefit
Computer as Target
which compromise the confidentiality of a system, resulting in theft of services or the release of viruses computer virus is a self-replicating computer program written to alter the way a computer operates, without the permission or knowledge of the user
Example:
card
frauds
Hackers
is a term that is currently used to identify individuals who break into computers
Hackers can be any age, creed or nationality Hackers have gained a negative image due to their exploits in
the past few years
There has been an increase in the number of females that have acquired the skills to break into computer systems Cyber Crime Methodology process is based on their experience acquired through attempting to break into, and subsequently breaking into computer systems this provides law enforcement is a Modus Operandi (MO) with patterns that prosecutors and police can use to build their case
The
What
This is done to make it difficult for law enforcement to identify the perpetrator of the cyber crime
Hackers will initially conduct intelligence gathering during the They want to learn network range, extranet connections, etc Hackers next conduct network discovery to identify the
number and operating systems of the target victims computer network vulnerabilities that exist of the system computers vulnerabilities will then be exploited by the criminal criminals will also install password crackers on the network. These crackers will allow them to break the passwords of the authorized users
Cyber
Once the network has been compromised, cyber criminals will Hackers
usually install sniffers that allow them to capture user id/passwords and other sensitive information may use steganography in order to hide important data from law enforcement personnel
Computer Forensics
Computer
forensic data recovery is the basis for seizure of evidence in all computer-based investigations Why we use Computer Forensics
Imagine the following You didnt recognize critical evidence or information You could not locate vital data You could not use any documents or records You accidentally destroyed evidence You now needed to resolve an allegation or an issue
Where is the Evidence?
Removable Media: Floppy Disk; Zip Disk Hard Drive: IDE; SCSI CDROM Magnetic Tape Electronic Organizers
Examination of Evidence
Reliability of evidence Adherence to accepted protocols and practices Use of proven / accepted software Ability to testify as to methods and results of analysis Trained and certified computer forensics examiners Proper training is crucial for testimonial purposes
Exploitation of Evidence Requires
Separating pertinent evidence from non-pertinent There then must be an evaluation of the evidence for criticality
and usability in judicial environment
the examiner Cyber Crime Legal Approaches have passed a variety of laws to address the increase of computer crimes
The first computer crime statutes were passed in 1986 Local and regional areas have also passed laws to address
cyber crime at their level
The Computer Misuse Act (1990) The Data Protection Act (1998) Information Technology Act, 2000
Protect your P. C.
Use the latest version of anti-virus Use the latest version of the operating system Dont open e-mail attachments unless you know the source Confirm the site you are doing business with Create passwords containing atleast 8 digits Use different passwords for different websites Send credit card information only to secure sites Use a security program that gives you control over "Cookies"
that send information back to websites Safety Tips to Cyber Crime
Use antivirus softwares insert firewalls uninstall unnecessary software maintain backup check security settings Stay anonymous - choose a genderless screen name Never give your full name or address to strangers Learn inetiquette' - follow it and expect it from others Don't respond to harassing or negative messages (flames)
Get out of uncomfortable or hostile situations quickly Save offending messages Learn more about Internet privacy
Prevent Cyber Crime
Spam Blocker Anti-Virus Software Firewall Protection Caution in providing personal information Secure shoping Avoidence of Scam Avast Free Antivirus AVG Free Antivirus Avira AntiVir Personal Kaspersky Antivirus Mcafee Antivirus Symantec Norton Antivirus Quick Heal Antivirus
SEMINAR REPORT ON
What constitutes a cyber-crime in the country? By Jitendra Katara 10EUDCS043
A SEMINAR REPORT ON
What constitutes a cyber-crime in the country?
Submitted in Partial Fulfillment for the Award of the Degree of Bachelor of Technology IN Computer Engineering
Session: 2013-14 Submitted To: Asst.Prof. Shritosh Kumar Submitted By: Jitendra Katara VIII & CS-A
Department of Computer Science and Engineering JECRC UDML College of Engineering Opp. Hotel Shiv Vilas, Achrol 10 km Milestone, Kukas Jaipur-Delhi Road, Jaipur-302028