2. CONTENTS
• Introduction
• History of cyber crime
• Manifestation
• Categories of cyber crime
• Types of cyber crime
• Statistics of Cyber crimes
• Cyber Laws
• Prevention of Cyber Crime
• Conclusion
• References
3. INTRODUCTION
• The internet has given rise to new opportunities
in every field we can think of – be it
entertainment, business, sports or education.
• There are two sides to a coin. Internet also has
its own disadvantages. One of the major
disadvantages is Cyber crime – illegal activity
committed on the internet.
4. HISTORY OF CYBER CRIME
• The first recorded cyber crime took place in the year 1820.
• In 1820, Joseph-Marie Jacquard, a textile manufacturer in
France, produced the loom. This device allowed the
repetition of a series of steps in the weaving of special
fabrics. This resulted in a fear amongst Jacquard's
employees that their traditional employment and livelihood
were being threatened. They committed acts of sabotage to
discourage Jacquard from further use of the new
technology. This is the first recorded cyber crime!
5. MANIFESTATION
• Cyber-Crime= Cyber+Crime.
• Cyber- The term cyber was first used in 1982 in a science
fiction story ‘Burning Chrome’ by ‘William Gibson’ where it was
referred to as a computer generated virtual reality. In the
modern era anything associated with the internet and the
diverse internet culture comes under the Cyberspace.
• So cyber crime is crimes committed on cyberspace.
• Though there is no technical definition by any statutory body
for Cyber crime, it is broadly defined by the Computer Crime
Research Center as - “Crimes committed on the internet using
the computer either as a tool or a targeted victim.”
6. CATEGORIES OF CYBER CRIME
• Cyber-Crime Against Persons
• Cyber-Crime Against Property
• Cyber-Crime Against Government
• Cyber-Crime Against Society at large
7. CYBER-CRIME AGAINST PERSONS
• Hacking: It means unauthorized control/access over computer system and
act of hacking completely destroys the whole data as well as computer
programs. Hackers usually hacks telecommunication and mobile network.
• Cross Site Scripting (XSS): Cross-site scripting (XSS) is a
security exploit in which the attacker inserts malicious coding
into a link that appears to be from a trustworthy source. When
someone clicks on the link, the embedded programming is
submitted allowing the attacker to steal information.
• Vishing: The name comes from “voice” and “phishing” Vishing is the act of
using the telephone in an attempt to scam the user.
• DDoS Attack: In computing, a denial-of-service (DoS) or distributed denial-
of-service (DDoS) attack is an attempt to make a machine or network
resource unavailable to its intended users.
8. • Phishing: phishers attempt to steal your personal information. They send
out e-mails that appear to come from legitimate websites such as eBay,
PayPal, or other banking institutions and ask for your account and
passwords. Ex-"http://www.ebay.com" is a valid Web addresse,
but "http://www.ebay.validate-info.com" and "http://ebay.login123.com"
are false addresses, which may be used by phishers.
• Harassment via E-Mails: This is very common type of harassment through
sending letters, attachments of files & folders i.e. via e-mails. At present
harassment is common as usage of social sites i.e. Facebook, Twitter etc.
increasing day by day.
• Defamation: It involves any person with intent to lower down the dignity of
the person by hacking his mail account and sending some mails with using
vulgar language to unknown persons mail account.
• Carding: It means false ATM cards i.e. Debit and Credit cards used by
criminals through withdrawing money from the victim’s bank account. There
is always unauthorized use of ATM cards in this type of cyber crimes.
9. • E-Mail Spoofing: A spoofed e-mail may be said to be one, which misrepresents
its origin. It shows it’s origin to be different from which actually it originates
• SMS Spoofing: Here a offender steals identity of another person in the form of
mobile phone number and sending SMS via internet and receiver gets the SMS
from the mobile phone number of the victim. It is very serious cyber crime
against any individual.
• Child Pornography: In this cyber crime defaulters create, distribute, or access
materials that sexually exploit underage children.
10. CYBER-CRIME AGAINST PROPERTY
• Cyber Trespass: It means to access someone’s computer or network
without the right authorization of the owner and disturb, alter, misuse, or
damage data or system by using wireless internet connection.
• Transmitting Virus: Viruses are programs written by programmers that
attach themselves to a computer or a file and then circulate themselves to
other files and to other computers on a network. They mainly affect the data
on a computer, either by altering or deleting it. Worm attacks plays major
role in affecting the computer system of the individuals.
• Cyber Squatting: It involves two persons claiming for the same Domain
Name either by claiming that they had registered the name first on by right
of using it before the other or using something similar to that previously. For
example two similar names i.e. www.yahoo.com and www.yahhoo.com
11. • Intellectual Property Crimes: Intellectual property consists of a bunch of
rights. The most common type of IPR violation may be said to be software
piracy, violation of copyright, trademark, patents, designs and theft of
computer source code etc.
12. CYBER CRIMES AGAINST GOVERNMENT
• Cyber terrorism is one distinct kind of crime in this category.
The medium of Cyberspace is being used by individuals and
groups to threaten the international governments as also to
threaten the citizens of a country. This crime is called cyber
terrorism when an individual "cracks" into a government or
military maintained website. The Parliament attack in Delhi and
the Mumbai attack fall under this category.
• Every country has its own way of defining cyber crime, which is
odd to its own socio-cultural situations. For instance, in India
defamation is a significant and rampant form of cyber
crime.
13. CYBERCRIMES AGAINST SOCIETY AT LARGE
• Child Pornography: In this act there is use of computer networks to create,
distribute, or access materials that sexually exploit underage children.
• Online Gambling: Online fraud and cheating is one of the most beneficial
businesses that are growing today in the cyber space. In India a lot of betting and
gambling is done on the name of cricket through computer and internet, credit card
crimes, offering jobs, etc.
• Financial Crimes: This type of offence is common as there is huge growth in the
users of networking sites and phone networking where culprit will try to attack by
sending bogus mails or messages through internet. Ex: Using credit cards by
obtaining password illegally.
• Forgery: It means to deceive large number of persons by sending threatening mails
as online business transactions are becoming the habitual need of today’s life style.
14. THE TOP 5 MOST BRUTAL CYBER ATTACKS
OF 2014 SO FAR
• eBay
• Domino’s Pizza
• Montana Health Department
• Evernote and Feedly
• P.F. Chang’s Restaurants
Src-https://www.forbes.com
18. CYBER LAWS:
• There is absolutely no comprehensive law on Cybercrime any where in the world.
This is reason that the investigating agencies like FBI are finding the Cyberspace to
be an extremely difficult terrain.
• India had enacted its first Cyber Law through IT Act 2000. It has been amended and
now in 2008 the revised version is under implementation.
• IT Act 2000
• IT Amendment Bill 2006
• IT Amendment Bill 2008
• According to European Convention, there is no exact definition of cyber crime. Every
country has its own way of defining cyber crime, which is peculiar to its own socio-
cultural situations. For instance, in India defamation is a significant and rampant form
of cyber crime.
19. PREVENTION OF CYBER CRIME
• Sailesh Kumar Zarkar, technical advisor and network security consultant to the
Mumbai Police Cyber crime Cell, advocates the 5P mantra for online security:
Precaution, Prevention, Protection, Preservation and Perseverance.
• One should avoid disclosing any personal information to strangers via e-
mail or while chatting or any social networking site.
• One must avoid sending any photograph to strangers by online as
misusing or modification of photograph incidents increasing day by day.
• An updated Anti-virus software to guard against virus attacks should be
used by all the netizens.
• A person should never send his credit card or debit card number to any
site that is not secured, to guard against frauds.
20. CONCLUSION
• In cyberspace, cyber crime replace the bytes with bullets.
• Hacking is the thing which need more concentration because most of data
need security.
• The key to protecting yourself is being aware.
• Indian Laws are well drafted and are capable of handling all kinds of
challenges as posed by cyber criminals. However, the enforcement agencies
are required to be well versed with the changing technologies and Laws.” In
times like these we must protect ourselves from cyber crime. Anti-virus
software, firewalls and security patches are just the beginning”.
• There is a whole other world that exists in cyberspace… So make sure
that your information travels safely.
21. REFERENCES
• International Journal of Advanced Research in Computer Science and Software
Engineering Volume 3, Issue 5, May 2013.
• International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-
2013.
• International Journal Of Engineering And Computer Science ISSN:2319-7242, Volume2
Issue 8 August, 2013 Page No. 2555-2559
• www.forbes.com