SlideShare una empresa de Scribd logo
1 de 18
Hacking a cause
 of cyber crime
Cyber Crime
•   I n S i mp l e w a y w e c a n s a y t h a t c y b e r c r i me i s u n l a w f u l
    a c t s w h e r e i n t h e c o mp u t e r i s e i t h e r a t o o l o r a
    t a r g e t o r b o t h .

•                       CATEGORIES OF CYBER CRIME:
    C o m p u t e r s a n d t h e We b p r o v i d e a n e w e n v i r o n m e n t f o r
    f •r C y d , e r b e z zi l m e e n tc , a n e b t , fb oar s i rc y a l n dy i d d uvs it r i ea d
         a u b e m -c r         e ms          t h f e           g e       , a l     n i        d      l
          It is more tsimpler jto rstop/destroy the: visible
    e s p i o n a g e .
                       i n o 3 ma o                 c a t e g o r i e s
              1. C y b e r -c r i m e s a is a i n s t p e r s o n s .
    C r i enemiesmthen donet who m p unot visible nthat‘s the r e
                                                    g
•          me s c o m i t t e       wi    h c o         t e r s a n d o          t h e We b a
             2.e C a sbt e r i-c g ia n de h a ra dge a i t n sd te t p c t o tp hea rn t s y m i l a r
                   y             r    m s                               r                     .
           reasonemria tt-c e cyber crime m poumore .v e r n m e into
    mo r e d v
           3. C y b
    c r i me s c o m
                        whyn di w i et sh oau g a io n s tt e g e difficult t
                             t r    m            t c
                                                      r
                                                         is           o
                                                                    r s
       control because cyber criminals are not visible.
•   A t h i   e   f    wh o s t e a l s a c r e d i t c a r d g a i n s        a c c e s s t o    a
    mu c h    l   a   r g e r a mo u n t o f mo n e y t h a n t h e t         h i e f wh o s     t o l e
    a wa l    l   e   t i n t h e p a s t wi t h o n l y c a s h . F o        r e g C r i mi     n a l s
    c a n s   t   e   a l , c o mmi t f r a u d , o r d e s t r o y d a t      a f r o m mi l     e s
Types of Cyber Crime

                    Hackers: enjoy intellectual challenges of
Hacking
                       overcoming software limitations and
Denial of Service      how to increase capabilities of systems
Attack              Crackers: illegally break into other people’s
Pornography            secure systems and networks
Phising             Cyber Terrorists: threaten and attack other
Spoofing               people’s computers to further a social
Salami Attack          or political agenda
Forgery
How do people Hack …?
        Motivation for Hackers:-

   The challenge... ‗because it‘s there!‘
   Ego
   Espionage
   Ideology
   Mischief
   Money (extortion or theft)
   Revenge
Hacker Characteristics
 Predominantly male
 Aged from mid-teens to mid-twenties

                           Lacking in social skills

                           Underachiever in other areas
                           who sees computing as a means
                           of being important or powerful
History of Hackers
•   In December of 1947, the transistor was invented.
•   Captain Crunch
•   Steve Jobs
•   Kevin Mitnick
•   AT&T
•   The Worm- Robert Morris
•   Kevin Poulsen (a.k.a. Dark Dante)
•   Tsumomu Shimomura
•   David Smith
•   Jon Johansen (a.k.a. DVD Jon)
21 January 2003 : -
Two years jail for UK virus writer who infected
27,000 PCs

 Simon Vallor, the twenty-two year old web
 designer from North Wales who, in December 2002,
 pleaded guilty to writing and distributing three
 computer viruses, was sentenced at Southwark
 Crown Court, London to a two year custodial
 sentence. His viruses - Gokar, Redesi and Admirer –
 were proven to have infected 27,000 PCs in 42
 countries.
Successful Hackers
• Eric McCarty hacks into USC
  database
• Australian hacker attacks sewage
  control computers
What are ―Hacking‖ 3 phases?

The three phases of hacking are:


 Phase 2—the early years (1960‘s andto the 1990‘s,
        3—beginning from mid-1990‘s with the
        1—the period in thethe 1970‘s 1970‘s), when
 when hacking took on its more
 hackingof the Web and term; negative meanings.
 growth was a positive of e-commerce and the
 participation of a large portion of the general
 public online.
Hacking can take several forms:-
•   Accessing - entering a network which is intended to be private

•   Defacing – changing the content of another person‘s Web site

•   Hijacking – redirecting elsewhere anyone trying to access a particular Web
    site

•   Bombing – overwhelming a site with countless messages to slow down or even
    crash the server

•   Denial of service – running a program which sends thousands of requests to
    a site simultaneously, frequently from more than one source, so that the
    relevant server slows down considerably or preferably (from the point of
    view of the hacker) crashes.
Some facts on hacking
•   The Information Security Advisory Group estimates that world-wide there are now
    some 100,000 hackers or crackers (as they prefer to describe themselves).
•   Hackers have developed a program called ―The Backdoor‖ which provides them
    access to systems running Microsoft Windows.
•   Company computer systems are usually more difficult to hack because they employ
    protective arrangements such as firewalls.
•   The most infamous group of hackers – operating since 1994 – is an American team
    which calls itself ―The Cult of the Dead Cow‖ (CDC).
•   hacking incidents of recent times occurred in February 2000 when distributed
    ‗denial of service‘ attacks brought down the sites of Yahoo!, CNN, eBay, Buy.com,
    Amazon, E*Trade, Datek & ZDNet.
•   hacking into 92 computer networks operated by NASA and the US military
    (including two break-ins at the Pentagon).
•   Western Union closed its web site for five days in September 2001 after a security
    breach saw hackers access 15,000 records containing credit and debit card details.
The Future
                               Hacktivism, or Political Hacking
                               Catching Hackers

•   Hacking by terrorists and by government-sponsored military organizations is likely to increase. The
    governments of the U.S., China, and other countries are using or planning such attacks.
•   The potential for havoc will increase when hackers can control devices, not just for information.



•   Hacktivism is the use of hacking to promote a political cause.



•   A police detective specializing in financial crime and hacking told that 30% of hackers are government
    informers.
•   Law-enforcement and security personnel continue to update their skills and tools as hackers change
    theirs.
•   The Computer Emergency Response Team (CERT), based at Mello University, was established in 1988 in
    response to the Internet Worm.(CERT itself was the victim of a denial-of-service attack in 2001, bogging
    down its Web site for 30 hours.)
What are the Effects of Computer
            Hacking
1. It exposes the sensitive data of the user and risks user privacy.

2. Modification of important data with intent to achieve personal gain is
   another effect of computer hacking.
3. It meant to be an illegal use of someone else's identity for personal use.

4. Several key-logging software have been evolved which are capable of tracking
   and recording key stroke by the user, causing stealing of passwords and
   account details.

5. If the information related to national security, confidential government data,
   information related to national defence and security

6. Hacking can be used to convert computer into zombies.
Cyber Crime and Its Causes…!


           CYBER LAW

•   India has enacted the first I.T.Act, 2000 based on the UNCIRAL model recommended by the general
    assembly of the United Nations.

Offence Section under IT Act
•   Tampering with Computer source documents Sec.65
•   Hacking with Computer systems, Data alteration Sec.66
•   Publishing obscene information Sec.67
•   Un-authoried access to protected system Sec.70
•   Breach of Confidentiality and Privacy Sec.72
•   Publishing false digital signature certificates Sec.73
Partially Updated (9):
  Brazil, Chile, China, C
                            Substantially or Fully
            zech
                               Updated (10):
   Republic, Denmark,
                            Australia, Canada, Es
  Malaysia, Poland, Sp
                                tonia, India,
            ain,
                            Japan, Mauritius, Per
    United Kingdoma
                               u, Philippines,
                            Turkey, United States
  No Updated Laws
         (33):
Albania, Bulgaria, Bu
rundi, Cuba, Dominic
     an Republic,
 Egypt, Ethiopia, Fiji,
 France, Gambia, H…
How can you find out whether
       your computer has been hacked?

• An unexplained decline in computer
  performance,
• An unexpected increase in file size,
• Unexplained modifications to files,
• Sudden changes in network settings of the
  computer
• Frequent disk crashes are some of the warning
  signs of a hacked computer.
What kind of protection is available?

• Cyber Security
     – Cyber security standards are security standards which enables organizations to practice safe security
       techniques to minimize the number of successful cyber security attacks.
     • ADVANTAGES OF CYBER SECURITY
       • It defends us from critical attacks.
       • It helps us browse safe websites.
       • It defends us from hacks and virus

• Prevention
  Small Things
•   Tips to secure your Wireless network
•   Security and Passwords
•   Protect yourself against viruses
•   Install a Firewall
•   Update your Microsoft Systems
CONCLUSION
• The modern thief can steal more with a
  computer than without a gun.
• Tomorrow‘s terrorists may be able to do
  more damage with a keyboard than with a
  bomb.
• Thus hacking is one of the serious cause of
            Thank you
  cyber-crime in todays world.

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRACYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
CYBER CRIME PRESENTATION PART 2 BY KRISHNAKNT ARUNKUMAR MISHRA
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 
CYBER CRIME ppt
CYBER CRIME pptCYBER CRIME ppt
CYBER CRIME ppt
 
Cyber Crime and Security Presentation
Cyber Crime and Security PresentationCyber Crime and Security Presentation
Cyber Crime and Security Presentation
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
8 cyber crimes
8 cyber crimes8 cyber crimes
8 cyber crimes
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber Crime - What is it ?
Cyber Crime - What is it ?Cyber Crime - What is it ?
Cyber Crime - What is it ?
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
Computer crimes and criminals
Computer crimes and criminalsComputer crimes and criminals
Computer crimes and criminals
 

Similar a Hacking a cause of cyber crime final (20)

C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
Hackers
HackersHackers
Hackers
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
hacking
hackinghacking
hacking
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Hacking
Hacking Hacking
Hacking
 
Cyber security for engg students and diploma
Cyber security for engg students and diplomaCyber security for engg students and diploma
Cyber security for engg students and diploma
 

Más de Harsha Matta

Más de Harsha Matta (7)

Portfolio management
Portfolio managementPortfolio management
Portfolio management
 
Equity market
Equity marketEquity market
Equity market
 
Credit rating agencies
Credit rating agenciesCredit rating agencies
Credit rating agencies
 
Corruption
CorruptionCorruption
Corruption
 
Online trading
Online tradingOnline trading
Online trading
 
Why fall in rupee
Why fall in rupeeWhy fall in rupee
Why fall in rupee
 
Fast moving consumer goods
Fast moving consumer goodsFast moving consumer goods
Fast moving consumer goods
 

Último

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 

Último (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 

Hacking a cause of cyber crime final

  • 1. Hacking a cause of cyber crime
  • 2. Cyber Crime • I n S i mp l e w a y w e c a n s a y t h a t c y b e r c r i me i s u n l a w f u l a c t s w h e r e i n t h e c o mp u t e r i s e i t h e r a t o o l o r a t a r g e t o r b o t h . • CATEGORIES OF CYBER CRIME: C o m p u t e r s a n d t h e We b p r o v i d e a n e w e n v i r o n m e n t f o r f •r C y d , e r b e z zi l m e e n tc , a n e b t , fb oar s i rc y a l n dy i d d uvs it r i ea d a u b e m -c r e ms t h f e g e , a l n i d l It is more tsimpler jto rstop/destroy the: visible e s p i o n a g e . i n o 3 ma o c a t e g o r i e s 1. C y b e r -c r i m e s a is a i n s t p e r s o n s . C r i enemiesmthen donet who m p unot visible nthat‘s the r e g • me s c o m i t t e wi h c o t e r s a n d o t h e We b a 2.e C a sbt e r i-c g ia n de h a ra dge a i t n sd te t p c t o tp hea rn t s y m i l a r y r m s r . reasonemria tt-c e cyber crime m poumore .v e r n m e into mo r e d v 3. C y b c r i me s c o m whyn di w i et sh oau g a io n s tt e g e difficult t t r m t c r is o r s control because cyber criminals are not visible. • A t h i e f wh o s t e a l s a c r e d i t c a r d g a i n s a c c e s s t o a mu c h l a r g e r a mo u n t o f mo n e y t h a n t h e t h i e f wh o s t o l e a wa l l e t i n t h e p a s t wi t h o n l y c a s h . F o r e g C r i mi n a l s c a n s t e a l , c o mmi t f r a u d , o r d e s t r o y d a t a f r o m mi l e s
  • 3. Types of Cyber Crime Hackers: enjoy intellectual challenges of Hacking overcoming software limitations and Denial of Service how to increase capabilities of systems Attack Crackers: illegally break into other people’s Pornography secure systems and networks Phising Cyber Terrorists: threaten and attack other Spoofing people’s computers to further a social Salami Attack or political agenda Forgery
  • 4. How do people Hack …? Motivation for Hackers:-  The challenge... ‗because it‘s there!‘  Ego  Espionage  Ideology  Mischief  Money (extortion or theft)  Revenge
  • 5. Hacker Characteristics  Predominantly male  Aged from mid-teens to mid-twenties Lacking in social skills Underachiever in other areas who sees computing as a means of being important or powerful
  • 6. History of Hackers • In December of 1947, the transistor was invented. • Captain Crunch • Steve Jobs • Kevin Mitnick • AT&T • The Worm- Robert Morris • Kevin Poulsen (a.k.a. Dark Dante) • Tsumomu Shimomura • David Smith • Jon Johansen (a.k.a. DVD Jon)
  • 7. 21 January 2003 : - Two years jail for UK virus writer who infected 27,000 PCs Simon Vallor, the twenty-two year old web designer from North Wales who, in December 2002, pleaded guilty to writing and distributing three computer viruses, was sentenced at Southwark Crown Court, London to a two year custodial sentence. His viruses - Gokar, Redesi and Admirer – were proven to have infected 27,000 PCs in 42 countries.
  • 8. Successful Hackers • Eric McCarty hacks into USC database • Australian hacker attacks sewage control computers
  • 9. What are ―Hacking‖ 3 phases? The three phases of hacking are: Phase 2—the early years (1960‘s andto the 1990‘s, 3—beginning from mid-1990‘s with the 1—the period in thethe 1970‘s 1970‘s), when when hacking took on its more hackingof the Web and term; negative meanings. growth was a positive of e-commerce and the participation of a large portion of the general public online.
  • 10. Hacking can take several forms:- • Accessing - entering a network which is intended to be private • Defacing – changing the content of another person‘s Web site • Hijacking – redirecting elsewhere anyone trying to access a particular Web site • Bombing – overwhelming a site with countless messages to slow down or even crash the server • Denial of service – running a program which sends thousands of requests to a site simultaneously, frequently from more than one source, so that the relevant server slows down considerably or preferably (from the point of view of the hacker) crashes.
  • 11. Some facts on hacking • The Information Security Advisory Group estimates that world-wide there are now some 100,000 hackers or crackers (as they prefer to describe themselves). • Hackers have developed a program called ―The Backdoor‖ which provides them access to systems running Microsoft Windows. • Company computer systems are usually more difficult to hack because they employ protective arrangements such as firewalls. • The most infamous group of hackers – operating since 1994 – is an American team which calls itself ―The Cult of the Dead Cow‖ (CDC). • hacking incidents of recent times occurred in February 2000 when distributed ‗denial of service‘ attacks brought down the sites of Yahoo!, CNN, eBay, Buy.com, Amazon, E*Trade, Datek & ZDNet. • hacking into 92 computer networks operated by NASA and the US military (including two break-ins at the Pentagon). • Western Union closed its web site for five days in September 2001 after a security breach saw hackers access 15,000 records containing credit and debit card details.
  • 12. The Future Hacktivism, or Political Hacking Catching Hackers • Hacking by terrorists and by government-sponsored military organizations is likely to increase. The governments of the U.S., China, and other countries are using or planning such attacks. • The potential for havoc will increase when hackers can control devices, not just for information. • Hacktivism is the use of hacking to promote a political cause. • A police detective specializing in financial crime and hacking told that 30% of hackers are government informers. • Law-enforcement and security personnel continue to update their skills and tools as hackers change theirs. • The Computer Emergency Response Team (CERT), based at Mello University, was established in 1988 in response to the Internet Worm.(CERT itself was the victim of a denial-of-service attack in 2001, bogging down its Web site for 30 hours.)
  • 13. What are the Effects of Computer Hacking 1. It exposes the sensitive data of the user and risks user privacy. 2. Modification of important data with intent to achieve personal gain is another effect of computer hacking. 3. It meant to be an illegal use of someone else's identity for personal use. 4. Several key-logging software have been evolved which are capable of tracking and recording key stroke by the user, causing stealing of passwords and account details. 5. If the information related to national security, confidential government data, information related to national defence and security 6. Hacking can be used to convert computer into zombies.
  • 14. Cyber Crime and Its Causes…! CYBER LAW • India has enacted the first I.T.Act, 2000 based on the UNCIRAL model recommended by the general assembly of the United Nations. Offence Section under IT Act • Tampering with Computer source documents Sec.65 • Hacking with Computer systems, Data alteration Sec.66 • Publishing obscene information Sec.67 • Un-authoried access to protected system Sec.70 • Breach of Confidentiality and Privacy Sec.72 • Publishing false digital signature certificates Sec.73
  • 15. Partially Updated (9): Brazil, Chile, China, C Substantially or Fully zech Updated (10): Republic, Denmark, Australia, Canada, Es Malaysia, Poland, Sp tonia, India, ain, Japan, Mauritius, Per United Kingdoma u, Philippines, Turkey, United States No Updated Laws (33): Albania, Bulgaria, Bu rundi, Cuba, Dominic an Republic, Egypt, Ethiopia, Fiji, France, Gambia, H…
  • 16. How can you find out whether your computer has been hacked? • An unexplained decline in computer performance, • An unexpected increase in file size, • Unexplained modifications to files, • Sudden changes in network settings of the computer • Frequent disk crashes are some of the warning signs of a hacked computer.
  • 17. What kind of protection is available? • Cyber Security – Cyber security standards are security standards which enables organizations to practice safe security techniques to minimize the number of successful cyber security attacks. • ADVANTAGES OF CYBER SECURITY • It defends us from critical attacks. • It helps us browse safe websites. • It defends us from hacks and virus • Prevention Small Things • Tips to secure your Wireless network • Security and Passwords • Protect yourself against viruses • Install a Firewall • Update your Microsoft Systems
  • 18. CONCLUSION • The modern thief can steal more with a computer than without a gun. • Tomorrow‘s terrorists may be able to do more damage with a keyboard than with a bomb. • Thus hacking is one of the serious cause of Thank you cyber-crime in todays world.