SlideShare una empresa de Scribd logo
1 de 13
TABLE OF CONTENTS
• Definition of Cybercrime.
• Types of Cybercrime.
• Hacking and its tools.
• DOS attack
• Phishing and its example.
• Incidences of Cyberattacks in India.
• IT Act of India and its features.
• Cyber security Actions.
• Challenges and future Scope.
• Conclusion.
WHAT IS CYBERCRIME?
 Cyber crime is not an old sort of crime to the world. It is defined as any criminal activity
which takes place on or over the medium of computers or internet or other technology
recognized by the Information Technology Act.
 Cybercriminal activity may be carried out by individuals or groups with relatively little
technical skill, Or by highly organized global criminal groups that may include skilled
developers and others with relevant expertise.
TYPES OF CYBER CRIME
1. Cyber Extortion: A crime involving an attack or threat of an attack coupled with a
demand for money to stop the attack. One form of cyberextortion is the ransomware
attack. Here, the attacker gains access to an organization's systems and encrypts its
documents and files -- anything of potential value -- making the data inaccessible until a
ransom is paid.
2. Crypto Jacking: An attack that uses scripts to mine cryptocurrencies within browsers
without the user's consent. Crypto-jacking attacks may involve loading cryptocurrency
mining software to the victim's system. However, many attacks depend on JavaScript
code that does in-browser mining if the user's browser has a tab or window open on the
malicious site.
3. Identify theft : An attack that occurs when an individual accesses a computer to glean
a user's personal information, which they then use to steal that person's identity or access
their valuable accounts, such as banking and credit cards.
4. Credit card fraud : An attack that occurs when hackers infiltrate retailers' systems to
get the credit card and/or banking information of their customers. stolen payment cards
can be bought and sold in bulk on darknet markets, where hacking groups that have
stolen mass quantities of credit cards profit by selling to lower-level cybercriminals who
profit through credit card fraud against individual accounts.
5. Software piracy: an attack that involves the unlawful copying, distribution and use of
software programs with the intention of commercial or personal use. Trademark
violations, copyright infringements and patent violations are often associated with this
type of cybercrime.
HACKING AND ITS TOOLS
 A hacker is a person who is proficient with computers and/or programming to an expert
level where they know all of the in's and out's of a system. There is NO illegality
involved with being a hacker. A cracker is a hacker who uses his proficiency for
personal gains outside of the law. Ex:- stealing data, changing bank accounts. It's then
safe to say that all crackers are hackers, but not all hackers are crackers.
 Hacking tools :-
 Nmap - scans and detects ports.
 Wireshark - it is a sniffer that lets you capture and interactively browse the contents of
network frames.
 LCP – Windows Password Cracker.
 Super Scan - It is great TCP/IP port scanner which is widely used for detecting the
open ports or live hosts in given IP ranges .
DOS ATTACK AND PHISHING
 A denial-of-service attack (DOS attack) is an attempt to make a computer resource
unavailable to its intended users.
 DoS attacks are commonly launched from one or more points on the Internet that are
external to the victim’s own system or network.
 Phishing is a type of social engineering attack where an attacker sends a fraudulent
message designed to trick a person.
 This type of attack earned its name because, like its homophone "fishing" . In a
phishing attack, bait often appears as a compelling email. Attackers go to great lengths
to ensure that their emails appear as legitimate as possible.
 There are two types of phishing: 1)Standard Attack 2)Spear phishing.
HOW IT IS DONE ?
 Fake websites :- A domain name similar to a legitimate site is bought, and molded to
look exactly like the real thing. The phisher then sends out messages, either by e-mail,
instant messaging, Facebook messages, text messages, and so forth to fool a victim into
clicking a link to the fake site. The unsuspecting victim logs in and their credentials
logged.
 Fake Pop-up :- A link was still sent, however, instead of linking to a fake website, it
would link to the actual website. When the real website loads, a pop-up appears asking
for the user's credentials. The victim, seeing the legitimate site in the background would
think the pop-up was from a legitimate source and enter their information. In reality,
the pop-up would be the hacker's tool to phish credentials.
INCIDENCES OF CYBERATTACKS IN INDIA
 In India too, attacks have been happening with increasing frequency.
 India’s national airline Air India has said a cyber-attack on its data servers affected
about 4.5 million customers around the world. The breach was first reported to the
company in February 2021.
 Nearly 1.16 million cases of cyberattacks were reported in 2020, up nearly three times
from 2019 and more than 20 times compared to 2016, according to government data. On
an average, 3,137 cyber security-related issues were reported every day in 2020.
 In 2016, banks had reportedly announced a leak of personal information of 3.2 million
debit cards.
IT ACT OF INDIA
 Information Technology Act, 2000 is India’s mother legislation regulating the use of
computers, computer systems and computer networks as also data and information in
the electronic format. This legislation has touched varied aspects pertaining to electronic
authentication, digital (electronic) signatures, cyber crimes and liability of network
service providers.
 This Act was amended by Information Technology Amendment Bill, 2008 which was
passed in Lok Sabha on 22nd December, 2008 and in Rajya Sabha on 23rd December,
2008. It received the assent of the President on 5th February 2009 and was notified
with effect from 27/10/2009.
FEATURES OF IT ACT.
 Granting legal recognition to all transactions done through electronic data exchange,
other means of electronic communication or e-commerce in place of the earlier paper-based
communication.
 Facilitating the electronic filing of documents with different Government departments
and also agencies.
 Providing legal recognition to digital signatures for the authentication of any
information or matters requiring authentication.
 Facilitating the electronic storage of data.
SOME IMPORTANT CYBER SAFETY ACTIONS
1.Install OS/Software updates.
2.Run antivirus software.
3.Prevent Identity theft.
4.Turn on personal firewalls.
5.Avoid spyware/adware.
6.Protect passwords.

Más contenido relacionado

Similar a cyber crime.pptx

Similar a cyber crime.pptx (20)

CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 

Último

Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 

Último (20)

Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 

cyber crime.pptx

  • 1.
  • 2. TABLE OF CONTENTS • Definition of Cybercrime. • Types of Cybercrime. • Hacking and its tools. • DOS attack • Phishing and its example. • Incidences of Cyberattacks in India. • IT Act of India and its features. • Cyber security Actions. • Challenges and future Scope. • Conclusion.
  • 3. WHAT IS CYBERCRIME?  Cyber crime is not an old sort of crime to the world. It is defined as any criminal activity which takes place on or over the medium of computers or internet or other technology recognized by the Information Technology Act.  Cybercriminal activity may be carried out by individuals or groups with relatively little technical skill, Or by highly organized global criminal groups that may include skilled developers and others with relevant expertise.
  • 4. TYPES OF CYBER CRIME 1. Cyber Extortion: A crime involving an attack or threat of an attack coupled with a demand for money to stop the attack. One form of cyberextortion is the ransomware attack. Here, the attacker gains access to an organization's systems and encrypts its documents and files -- anything of potential value -- making the data inaccessible until a ransom is paid. 2. Crypto Jacking: An attack that uses scripts to mine cryptocurrencies within browsers without the user's consent. Crypto-jacking attacks may involve loading cryptocurrency mining software to the victim's system. However, many attacks depend on JavaScript code that does in-browser mining if the user's browser has a tab or window open on the malicious site.
  • 5. 3. Identify theft : An attack that occurs when an individual accesses a computer to glean a user's personal information, which they then use to steal that person's identity or access their valuable accounts, such as banking and credit cards. 4. Credit card fraud : An attack that occurs when hackers infiltrate retailers' systems to get the credit card and/or banking information of their customers. stolen payment cards can be bought and sold in bulk on darknet markets, where hacking groups that have stolen mass quantities of credit cards profit by selling to lower-level cybercriminals who profit through credit card fraud against individual accounts. 5. Software piracy: an attack that involves the unlawful copying, distribution and use of software programs with the intention of commercial or personal use. Trademark violations, copyright infringements and patent violations are often associated with this type of cybercrime.
  • 6. HACKING AND ITS TOOLS  A hacker is a person who is proficient with computers and/or programming to an expert level where they know all of the in's and out's of a system. There is NO illegality involved with being a hacker. A cracker is a hacker who uses his proficiency for personal gains outside of the law. Ex:- stealing data, changing bank accounts. It's then safe to say that all crackers are hackers, but not all hackers are crackers.  Hacking tools :-  Nmap - scans and detects ports.  Wireshark - it is a sniffer that lets you capture and interactively browse the contents of network frames.  LCP – Windows Password Cracker.  Super Scan - It is great TCP/IP port scanner which is widely used for detecting the open ports or live hosts in given IP ranges .
  • 7. DOS ATTACK AND PHISHING  A denial-of-service attack (DOS attack) is an attempt to make a computer resource unavailable to its intended users.  DoS attacks are commonly launched from one or more points on the Internet that are external to the victim’s own system or network.  Phishing is a type of social engineering attack where an attacker sends a fraudulent message designed to trick a person.  This type of attack earned its name because, like its homophone "fishing" . In a phishing attack, bait often appears as a compelling email. Attackers go to great lengths to ensure that their emails appear as legitimate as possible.  There are two types of phishing: 1)Standard Attack 2)Spear phishing.
  • 8.
  • 9. HOW IT IS DONE ?  Fake websites :- A domain name similar to a legitimate site is bought, and molded to look exactly like the real thing. The phisher then sends out messages, either by e-mail, instant messaging, Facebook messages, text messages, and so forth to fool a victim into clicking a link to the fake site. The unsuspecting victim logs in and their credentials logged.  Fake Pop-up :- A link was still sent, however, instead of linking to a fake website, it would link to the actual website. When the real website loads, a pop-up appears asking for the user's credentials. The victim, seeing the legitimate site in the background would think the pop-up was from a legitimate source and enter their information. In reality, the pop-up would be the hacker's tool to phish credentials.
  • 10. INCIDENCES OF CYBERATTACKS IN INDIA  In India too, attacks have been happening with increasing frequency.  India’s national airline Air India has said a cyber-attack on its data servers affected about 4.5 million customers around the world. The breach was first reported to the company in February 2021.  Nearly 1.16 million cases of cyberattacks were reported in 2020, up nearly three times from 2019 and more than 20 times compared to 2016, according to government data. On an average, 3,137 cyber security-related issues were reported every day in 2020.  In 2016, banks had reportedly announced a leak of personal information of 3.2 million debit cards.
  • 11. IT ACT OF INDIA  Information Technology Act, 2000 is India’s mother legislation regulating the use of computers, computer systems and computer networks as also data and information in the electronic format. This legislation has touched varied aspects pertaining to electronic authentication, digital (electronic) signatures, cyber crimes and liability of network service providers.  This Act was amended by Information Technology Amendment Bill, 2008 which was passed in Lok Sabha on 22nd December, 2008 and in Rajya Sabha on 23rd December, 2008. It received the assent of the President on 5th February 2009 and was notified with effect from 27/10/2009.
  • 12. FEATURES OF IT ACT.  Granting legal recognition to all transactions done through electronic data exchange, other means of electronic communication or e-commerce in place of the earlier paper-based communication.  Facilitating the electronic filing of documents with different Government departments and also agencies.  Providing legal recognition to digital signatures for the authentication of any information or matters requiring authentication.  Facilitating the electronic storage of data.
  • 13. SOME IMPORTANT CYBER SAFETY ACTIONS 1.Install OS/Software updates. 2.Run antivirus software. 3.Prevent Identity theft. 4.Turn on personal firewalls. 5.Avoid spyware/adware. 6.Protect passwords.