2. Introduction
Crime committed using a computer and the
internet to steal a person's identity or illegal
imports or malicious programs
Cybercrime is nothing but where the
computer used as an object or subject of
crime.
3. Cont…
The
first spam email took place in 1978 when
it was sent out over the Arpanet (Advanced
Research Projects Agency Network),.
The first virus was installed on an Apple
computer in 1982 when a high school
student, Rich Skrenta, developed the Elk
cloner.
4. Cyber Crime
Definition :
Cybercrime is a term for any illegal
activity that uses a computer as its
primary means of commission. The U.S.
Department of Justice expands the
definition of cybercrime to include any
illegal activity that uses a computer for
the storage of evidence.
5. CYBER CRIMES ARE
MAINLY CLASSIFIED AS:
Those against a person.
Against Properties.
Crime targetting the government.
6. Against a Person
i. Harassment via e-mails:
Harassment through e-mails is not a new concept. It is
very similar to harassing through letters.
ii. Cyber-stalking :
Cyber stalking involves following a person movements
across the Internet by posting messages.
iii. Email spoofing:
A mail which misrepresents its origin. It shows it's origin to
be different from which actually it originates.
7. Against Properties
i.Computer Vandalism:
Damaging or destroying data rather than
stealing or misusing them is called cyber
vandalism.
ii.Transmitting virus:
These are programs that attach themselves
to a file and then circulate .
They usually affect the data on a
computer, either by altering or deleting it.
8. Against Government
Cyber Terrorism:
Terrorist attacks on the Internet is by distributed
denial of service attacks, hate websites and hate
emails, attacks on sensitive computer
networks, etc. Technology savvy terrorists are
using 512-bit encryption, which is impossible to
decrypt.
The recent example may be cited of – Osama Bin
Laden, the LTTE, and attack on America’s army
deployment system during Iraq war.
10. Cyber Criminal
Those who are doing crimes by using the
computer as an target or object.
i. Children and adolescents between the age
group of 6 – 18 years
ii. Dissatisfied employees
iii. Professional hackers / crackers
iv. Organized hackers
11. Modes & Manners of
Committing Cyber Crimes
Unauthorized access to computer systems or
networks:
This is generally
referred
as
‘Hacking’. That is accessing the
information of others without proper
authorization.
Theft of information contained in electronic
form:
This includes theft of information
stored in computer hard disks, removable
storage media etc.
12. Cont…
Data diddling:
This is altering raw data just before a
computer processes it and then changing it
back after the processing is completed.
Denial of Service attack:
The computer is flooded with more requests
than it can handle which cause it to crash.
Distributed Denial of Service (DDOS) attack
is a example.
13. Cont…
Trojan attacks:
It means unauthorized programmer. It gains control over
another’s system by representing itself as an authorized
programmer.
Web jacking:
This term is derived from the term hi jacking. In these
kinds of offences the hacker gains access and control
over the web site of another.
Email bombing:
It refers to sending large numbers of mail to the
victim, which may be an individual or a
company by ultimately resulting into crashing.
14. Hacking
Intrusion into a computer system without
the permission of the computer
owner/user.
E.g : Hacking into Best Western
Database.
15. Types of Cyber Crimes
i. Child Pornography:
The use of computer networks to create, distribute, or
access materials that sexually use underage children.
ii. Cyber Contraband:
Transferring illegal items through the internet (such
as encryption technology) that is barred in some
locations.
iii. Cyber laundering:
Electronic transfer of illegally-obtained money with
the goal of hiding its source and possibly its
destination.
16. Cont ..
iv.
v.
Cyber Stalking:
Threats that creates fear through the use of
computer
technology
such
as
email,
phones,
text
messages, webcams, websites or videos.
Cyber Theft:
Using a computer to steal. This includes
activities
related
to:
breaking
and
entering, unlawful appropriation, identity
theft, fraud, malicious hacking and piracy.
17. Cyber Security
Cyber security involves protection of
sensitive personal and business
information
through
prevention,
detection, and response to different
online attacks.
Cyber security actually protects your
personal information by responding,
detecting and preventing the attacks.
18. Protecting Your Privacy
Privacy policy :
Before submitting your name, email address, or
other personal information on a web site, look for
the site's privacy policy.
Evidence that your information is being
encrypted :
To protect attackers from hijacking your
information, any personal information submitted
online should be encrypted. Many sites use SSL
or secure sockets layer, to encrypt information.
19. How Can We Protect
Keep software up to date:
If the seller releases patches for the software
operating your device, install them as soon as
possible. Installing them will prevent attackers
from being able to take advantage.
Use good passwords:
Select passwords that will be difficult for thieves
to guess. Do not choose options that allow your
computer to remember your passwords.
20. Cont …
Disable remote connectivity:
Some PDA’s and phones are equipped with
wireless technologies, such as Bluetooth, that
can be used to connect to other devices or
computers. You should disable these features
when they are not in use.
21. Extent of Progress on Updating
Cyber Crime Laws
Substantially or Fully Updated (10):
Australia, Canada, Estonia, India,
Japan, Mauritius, Peru, Philippines,
Turkey, United States
Partially Updated (9):
Brazil, Chile, China, Czech
Republic, Denmark,
Malaysia, Poland, Spain,
United Kingdom
No Updated Laws (33):
Albania, Bulgaria, Burundi, Cuba, Dominican Republic,
Egypt, Ethiopia, Fiji, France, Gambia, Hungary, Iceland,
Iran, Italy, Jordan, Kazakhstan, Latvia, Lebanon,
Lesotho, Malta, Moldova, Morocco, New Zealand,
Nicaragua, Nigeria, Norway, Romania, South Africa,
Sudan, Vietnam, Yugoslavia, Zambia, Zimbabwe
22. Cyber Laws in INDIA
India has enacted the first I.T.Act, 2000
based on the UNCIRAL model
recommended by the general assembly of
the United Nations.
Offence under IT Acts
Tampering with Computer source documents
Hacking with Computer systems, Data alteration
Publishing obscene information Un-authorised
access to protected system
Breach of Confidentiality and Privacy
Publishing false digital signature certificates
23. Computer Related Crimes
Covered under IPC & Special
Laws
Sending threatening messages by email
Sending defamatory messages by email
Forgery of electronic records
Bogus websites, cyber frauds
Email spoofing
Web-Jacking
E-Mail Abuse
Online sale of Drugs
Online sale of Arms
24. DRAWBACKS OF PRESENT CYBER
LAWS
Jurisdiction is the highly debatable issue
Due to growing arms of cyber space the
territorial boundaries seem to vanish
Loss of evidence because
data are routinely destroyed
collection of data outside the territorial extent
Cyber Army
Requirement for highly technical staff
High technology crime & investigation
infrastructure
A law regulating the cyber-space
25. Conclusion
Weak penalties limit deterrence
These crimes have large-scale economic
and social effects.
Self-protection remains the first line of
defense for e.g.
Finding the holes in the network
Using intrusion alert programs
Using Encryption
A law regulating the cyber-space
26. Cont …
Co-operation for exchange of material
and evidence of computer crimes
between law enforcement agencies.