2. CYBER CRIME
• Cyber crime is the latest and perhaps the most complicated
problem in the cyber world. “Cyber crime may be said to be those
species, of which, genus is the conventional crime, and where
either the computer is an object or subject of the conduct
constituting crime”
• “Any criminal activity that uses a computer either as an
instrumentality, target or a means for perpetuating further crimes
comes within the ambit of cyber crime”
• A generalized definition of cyber crime may be “ unlawful acts
wherein the computer is either a tool or target or both”
3. What is cyber crime?
“He Uses Technology As His Weapon”
It Is A Criminal Activity Committed On The Internet .
A Generalized Definition Of Cyber Crime May Be “Unlawful Acts Wherein
The Computer Is Either A Tool Or Target Or Both”.
Cyber crime offenses against the information technology infrastructure.
Such conducts includes:
• Illegal access
• Illegal interception
• System interference
• Data interference
• Misuse of devices
• Fraud
• Forgery
4. History
• The first spam email took place in 1978 when it was
sent out over the Arpanet (Advanced Research
Projects Agency Network),.
• The first virus was installed on an Apple computer in
1982 when a high school student, Rich Skrenta,
developed the Elk cloner.
5. Types of hackers
• Professional hackers
– Black Hats – the Bad Guys
– White Hats – Professional Security Experts
• Underemployed Adult Hackers
– Former Script Kiddies
• Can’t get employment in the field
• Want recognition in hacker community
• Ideological Hackers
– hack as a mechanism to promote some political or ideological purpose
– Usually coincide with political events
• Criminal Hackers
– Real criminals, are in it for whatever they can get no matter who it hurts
• Disgruntled Employees
– Most dangerous to an enterprise as they are “insiders”
– Since many companies subcontract their network services a disgruntled
vendor could be very dangerous to the host enterprise
6. Modes and manners of cyber
crime
• Unauthorized access & Hacking
• Trojan Attack
• Virus and Worm attack
• E-mail & IRC related crimes
• Email spoofing
• Email Spamming
• Email bombing
• Denial of Service attacks
• Web Jacking
7. hacking
• Hacking in simple terms means an illegal intrusion
into a computer system without permission of
computer owner/user. Hackers write or use ready-
made computer programs to attack the target
computer.
8. Trojan Attack
• The program that acts like something useful but
does things that are quiet damping. The
programs of this kind are called as Trojans.
• The name Trojan Horse is popular.
• Trojans come in two parts, a Client part and a
Server part. When the victim (unknowingly) runs
the server on its machine, the attacker will then
use the Client to connect to the Server and start
using the trojan.
• TCP/IP protocol is the usual protocol type used
for communications, but some functions of the
trojans use the UDP protocol as well.
9. Virus and worm attack
• A program that has capability to infect other
programs and make copies of itself and spread
into other programs is called virus.
• Programs that multiply like viruses but spread
from computer to computer are called as
worms.
10. E-mail and irc related crimes
• 1. Email spoofing
Email spoofing refers to email that appears to have
been originated from one source when it was actually
sent from another source.
• 2. Email Spamming
Email "spamming" refers to sending email to thousands
and thousands of users - similar to a chain letter.
• 3. Sending malicious codes through email
E-mails are used to send viruses, Trojans etc through
emails as an attachment or by sending a link of website
which on visiting downloads malicious code.
contd.
11. E-mail and irc related crimes
• 4. Email bombing
E-mail "bombing" is characterized by abusers
repeatedly sending an identical email message to
a particular address.
• 5. Sending threatening emails
• 6. Defamatory emails
• 7. Email frauds
• 8. IRC related
Three main ways to attack IRC are: “verbal”
attacks, clone attacks, and flood attacks.
12. Denial of service attack
Flooding a computer resource with more
requests than it can handle. This causes the
resource to crash thereby denying access of
service to authorized users.
13. Web jacking
Occurs when someone forcefully takes control
of a website (by cracking the password and
later changing it).
14. Protection
Use anti-virus software and firewalls - keep them up to
date
Keep your operating system up to date with critical
security updates and patches
Don't open emails or attachments from unknown
sources
Use hard-to-guess passwords. Don’t use words found
in a dictionary. Remember that password cracking
tools exist
Don't share access to your computers with strangers
Back-up your computer data on disks or CDs often
If you have a Wi-Fi network, password protect it
Disconnect from the Internet when not in use
Reevaluate your security on a regular basis
Make sure your employees and family members know
this info too!
15. Steps for prevention of cyber
crime
Avoid disclosing any information pertaining to
oneself.
Avoid sending any photograph online
particularly to strangers.
Use latest and up date anti virus software.
Keep back up volumes.
Never send your credit card number to any
site that is not secured.
Use of firewalls may be beneficial.
16. Conclusion
• User awareness is key to a secure computer/network
– Do not open suspicious files/emails
– Verify ActiveX/Java prompts
– Avoid using P2P programs
– Avoid downloading freeware
– If attacked, disconnect the network. Do not turn off the computer
Without Careful Attention To These Issues, The Uncontrolled
Interconnection Of Existing Systems, On Which People And
Organizations Are Critically Dependent, Will Continue To
Create Huge, Ill-defined And Defenseless Super - Systems.
So We Must Pay Attention To All Those Issues And Protect The
World From Cyber Crime.