Beruflich Dokumente
Kultur Dokumente
CONTENTS :
Introduction
Definition
Cyber criminals
Prevention
IT act 2000
IT act 2008
Conclusion
DEFINITION
Cyber Crimes
Intellectual Property
COMPUTER AS TOOL
COMPUTER AS APPLIANCE
7
CYBER CRIMINALS
Insider Threats
Hackers
Hactivists
(employees)
(teenage thrill-seekers to
sophisticated criminals)
Virus Writers
Criminal Groups
Sensitive Intrusions
(sensitive information is
obtained via computer
intrusions)
Information Warfare
Terrorists
Cyber Warfare
(alternative to military
attacks)
Viruses
9) Theft
2)
Worms
10) Piracy
3)
Trojans
4)
Mail bombs
5)
Threats
6)
Harassment
7)
DOS
8)
Fraud
12) Terrorism
PREVENTION
ii.
Use anti-virus
iii.
CASE STUDY
The Citadel network a cybercrime ring responsible for stealing more than
$500 million from consumer and business bank account.
According to Microsoft, the gang behind the Citadel botnets infected PCs in
part byselling pirated versionsof the Windows XP operating system that
11
they'd pre-infected with the malware.
CASE STUDY
Microsoft and FBI joint operation, they took down over 1,000 Citadel botnets
that were being used to control millions of malware-infected PCs.
This Citadel botnet takedown was part of a larger effort , coordinated by the
National Cyber Investigative Joint Task Force(NCIJTF) , which is targeting
botnet creators and distributors.
12
IT ACT 2000
The Information Technology Act, 2000 (IT Act), came into force on
17 October 2000.
14
CONCLUSION
15