SlideShare a Scribd company logo
1 of 46
Cyber Crime
Because –
 Everybody is using COMPUTERS
 From white collar criminals to terrorist organizations
 And from Teenagers to Adults
 Conventional crimes like
 Forgery,, extortion, kidnapping etc are being
 committed with the help off computers
 New generation is growing up with computers
 MOST IMPORTANT - Monetary transactions
  are moving on to the IINTERNET
WHAT IS CYBER
Cyber crime is defined as crimes committed on the
internet using the computer as either a tool or a targeted
victim. It is very difficult to classify crimes in general into
distinct groups as many crimes evolve on a daily basis. Even
in the real world, crimes like rape, murder or theft need not
necessarily be separate. However, all cybercrimes involve
both the computer and the person behind it as victims, it
just depends on which of the two is the main target.
Hence, the computer will be looked at as either a target or
tool for simplicity’s sake. For example, hacking involves
attacking the computer’s information and other resources.
It is important to take note that overlapping occurs in
many cases and it is impossible to have a perfect
classification system.
Like traditional crime, cybercrime can take many shapes
 and can occur nearly anytime or anyplace. Criminals
 committing       cybercrime     use      a    number    of
 methods, depending on their skill-set and their goal. This
 should not be surprising: cybercrime is, after all, simply
 'crime' with some sort of 'computer' or 'cyber' aspect.


 Every 3 seconds an identity is stolen**
 Without security, your unprotected PC can
  become infected within four minutes of
  connecting to the internet***
 Cybercrime has surpassed illegal drug trafficking
  as a criminal moneymaker*
The Council of Europe's Cybercrime Treaty uses the term
    'cybercrime' to refer to offenses ranging from criminal activity
    against data to content and copyright infringement
    [Krone, 2005]. However, others [Zeviar-Geese, 1997-98] suggest
    that the definition is broader, including activities such as
    fraud, unauthorized access, child pornography, and cyber
    stalking. The United Nations Manual on the Prevention and
    Control of Computer Related Crime includes fraud, forgery, and
    unauthorized access [United Nations, 1995] in its cybercrime
    definition.

    References
    *“Cybercrime More Profitable Than Drugs”, NineMSN
    **Identity Theft Statistics, Identity Protection Online
    ***“Eliminating Mobile Security Blindfolds”, Tech News World

    Krone, T., 2005. High Tech Crime Brief. Australian Institute of Criminology. Canberra, Australia. ISSN
    1832-3413. 2005.
    Zeviar-Geese, G. 1997-98. The State of the Law on Cyber jurisdiction and Cybercrime on the
    Internet. California Pacific School of Law. Gonzaga Journal of International Law. Volume 1. 1997-1998.
Profile of Cyber Criminal
 Disgruntled employees
 Teenagers
 Political Hacktivist
 Professional Hackers
 Business Rival
 Ex-Boy Friend
 Divorced Husband.etc
VICTIMS
 Gullible
 Desperados and greedy people
 Unskilled & Inexperienced
 Unlucky people
Computer Crimes are Vulnerable
Because off :-
Anonymity
Computer's storage capacity
Weakness in Operating System
Lack off Awareness off user
TYPES OF CYBER CRIME
• HACKING
• DENIAL OF SERVICE ATTACK
• COMPUTER VIRUS
• SOFTWARE PIRACY
• PORNOGRAPHY
• IRC Crime
• CREDIT CARD FRAUD
• SPAMMING

                             • PHISHING
                             • SPOOFING
                             • CYBER STALKING
                             • CYBER DEFAMATION
                             • THREATENING
                             • SALAMI ATTACK
HACKING
Hacking in simple terms means illegal intrusion into
a computer system without the permission of the
computer owner/user. The most prominent definition of
hacking is the act of gaining access without legal
authorization to a computer or computer network. A
hacker first attacks an easy target, and then uses it to hide
his or her traces for launching attacks at more secure sites.
The goal of an attack is to gain complete control of the
system (so you can edit, delete, install, or execute any file
in any user’s directory), often by gaining access to a "super-
user" account. This will allow both maximum access and
the ability to hide your presence.
COMPUTER VIRUS
A computer virus is a computer program that can copy itself and
infect a computer without permission or knowledge of the user.
The original may modify the copies or the copies may modify
themselves. A virus can only spread from one computer to
another when its host is taken to the uninfected computer, for
instance by a user sending it over a network or carrying it on a
removable medium such as a floppy disk, CD, or USB drive.
Additionally, viruses can spread to other computers by infecting
files on a network file system or a file system that is accessed by
another computer.
The term comes from the term virus in biology. A computer
virus reproduces by making, possibly modified, copies of itself
in the computer's memory, storage, or over a network. This is
similar to the way a biological virus works
SOFTWARE PIRACY

 Theft of software through the illegal copying of genuine
  programs or the counterfeiting and distribution of
  products intended to pass for the original

 Retail revenue losses worldwide are ever increasing due to
  this crime

 Can be done in various ways-
  End user copying,, Hard disk loading,, Counterfeiting,, Illegal
  downloads from the internet etc
PORNOGRAPHY
 Pornography is the first consistently successful ecommerce
  product

 Deceptive    marketing tactics and mouse trapping
  technologies Pornography encourage customers to access
  their websites

 Anybody including children can log on to the internet and
  access websites with pornographic contents with a click of
  a mouse

 Publishing, transmitting any material in electronic form
  which is lascivious or appeals to the prurient interest is an
  offence under the provisions of section 67 of I.T. Act -2000.
IRC CRIME
  Internet Relay Chat (IRC) servers have chat rooms in which
  people from anywhere the world can come together and
  chat with each other

 Criminals use it for meeting coconspirators

 Hackers use it for discussing their exploits / sharing the
  techniques

 Pedophiles use chat rooms to allure small children

 Cyber Stalking - In order to harass a woman her telephone
  number is given to others as if she wants to befriend males
CREDIT CARD FRAUD
You simply have to type credit card number into www
page off the vendor for online transaction.

If electronic transactions are not secured the credit
card numbers can be stolen by the hackers who can
misuse this card by impersonating the credit card
owner
Credit card skimmer
Skimmer
How the credit card skimmer is used
Credit Card Writer
1- ATM machine as usual ?
2- Is there an additional slot ?
3- A monitor and pamphlet holder at the side...nothing wrong
5-False pamphlet box affixed to the ATM cubicle side
6-Inside the “pamphlet box”
SPAMMING
Spamming is the abuse of electronic messaging systems to send
unsolicited bulk messages, which are generally undesired. While the
most widely recognized form of spam is email spam, the term is
applied to similar abuses in other media: instant messaging
spam, Usenet newsgroup spam, Web search engine spam, spam in
blogs, mobile phone messaging spam, internet forum spam and junk
fax transmissions.
Spamming is economically viable because advertisers have no
operating costs beyond the management of their mailing lists, and it is
difficult to hold senders accountable for their mass mailings. Because
the barrier to entry is so low, spammers are numerous, and the volume
of unsolicited mail has become very high. The costs, such as lost
productivity and fraud, are borne by the public and by Internet service
providers, which have been forced to add extra capacity to cope with
the deluge. Spamming is widely reviled, and has been the subject of
legislation in many jurisdictions.
PHISHING
It is technique of pulling out confidential information from
the bank/financial institutional account holders by
deceptive means
In most cases, phishers send out a wave of spam
email, sometimes up to millions of messages. Each email
contains a message that appears to come from a well-
known and trusted company. Usually the message includes
the company's logo and name, and it often tries to evoke an
emotional response to a false crisis. Couched in
urgent, business-like language, the email often makes a
request of the user’s personal information. Sometimes the
email directs the recipient to a spoofed Web site. The Web
site, like the email, appears authentic and in some
instances its URL has been masked so the Web address
looks real.
Spoofing
Getting one computer on a network to pretend to have the
identity off another computer,, usually one with special
access privileges ,, so as to obtain access to the other
computers on the network.
A common misconception is that "IP spoofing" can be used
to hide your IP address while surfing the Internet, chatting
on-line, sending e-mail, and so forth. This is generally not
true. Forging the source IP address causes the responses to
be misdirected, meaning you cannot create a normal
network connection. However, IP spoofing is an integral
part of many network attacks that do not need to see
responses (blind spoofing).
DENIAL OF SERVICE ATTACK
This is an act by the criminal, who floods the
bandwidth of the victim's network or fill's his e-mail
box with spam mail depriving him of the services he
is entitled to access or provide
CYBER STALKING
The Criminal follows the victim by            sending
emails, entering the chat rooms frequently.
CYBER DEFAMATION
The Criminal sends emails containing defamatory
matters to all concerned off the victim or post the
defamatory matters on a website.

(disgruntled employee may do this against boss,, ex-
boys friend against girl,, divorced husband against wife
etc)
THREATENING
The Criminal sends threatening email or comes in
contact in chat rooms with victim.
(Any one disgruntled may do this against boss,, friend
or official)
SALAMI ATTACK
In such crime criminal makes insignificant changes in
such a manner that such changes would go unnoticed.

Criminal makes such program that deducts small
amount like Rs. 2.50 per month from the account of all
the customer of the Bank and deposit the same in his
account. In this case no account holder will approach
the bank for such small amount but criminal gains
huge amount.
SALE OF NARCOTICS
 Sale & Purchase through net


 There are web site which offset sale and shipment off
 contrabands drugs

 They may use the techniques off stenography for
 hiding the messages
Now in its tenth year, the Internet Crime Complaint Center (IC3) has
become a vital resource for victims of online crime and for law
enforcement investigating and prosecuting offenders.

In 2010, IC3 received the second-highest number of complaints since its
inception. IC3 also reached a major milestone this year when it received
its two-millionth complaint. On average, IC3 receives and processes
25,000 complaints per month.

IC3 is more than a repository for victim complaints. It serves as a conduit
for law enforcement to share information and pursue cases that often
span jurisdictional boundaries. IC3 was founded in 2000 as a joint effort
between the National White Collar Crime Center (NW3C)/Bureau of
Justice Assistance (BJA) and the Federal Bureau of Investigation (FBI).
That                partnership              leveraged                  the
resources necessary to aid law enforcement in every aspect of an
Internet fraud complaint.

The most common victim complaints in 2010 were non-delivery
of payment/merchandise, scams impersonating the FBI
(hereafter “FBI-related scams”) and identity theft. Victims of
these crimes reported losing hundreds of millions of dollars.

Through a number of technological advancements, IC3 has
streamlined the way it processes and refers victim complaints to
law enforcement. In 2004, IC3 developed Automatch, an
automated internal complaint grouping and analytical search
tool. The design of Automatch is based on an assessment of the
IC3 partnership aimed at defining a joint workflow for the
project partners with different service requirements. IC3 IT staff
continually review and update
Automatch to meet the needs of analysts who build cases
for law enforcement worldwide gathering all related
information based on commonalities in the IC3 data. In
2009, NW3C developed the state-of-the-art Internet
Complaint Search and Investigation System (ICSIS), which
fosters seamless collaboration among law enforcement
from multiple jurisdictions.

Expert IC3 analysts also provide key analytical and case
support.

The 2010 Internet Crime Report demonstrates how
pervasive online crime has become, affecting people in all
demographic groups. The report provides specific details
about various crimes, their victims and the perpetrators. It
also shows how IC3 continually adapts its methods to meet
the needs of the public and law enforcement.
Type Percent
1. Non-delivery Payment/Merchandise 14.4%
2. FBI-Related Scams 13.2%
3. Identity Theft 9.8%
4. Computer Crimes 9.1%
5. Miscellaneous Fraud 8.6%
6. Advance Fee Fraud 7.6%
7. Spam 6.9%
8. Auction Fraud 5.9%
9. Credit Card Fraud 5.3%
10. Overpayment Fraud 5.3%
UN RESOLUTION
 A broad, inclusive focus is necessary to address problems of
  cybercrime, going beyond criminal law, penal procedures and
  law enforcement. The focus should include requirements for the
  secure functioning of a cyber-economy optimizing business
  confidence and individual privacy, as well as strategies to
  promote and protect the innovation and wealth-creating
  potential and opportunities of information and computing
  technologies, including early warning and response mechanisms
  in case of cyber attacks. Behind the prevention and prosecution
  of computer-related crime looms the larger challenge of creating
  a global culture of cyber security, addressing the needs of all
  societies, including developing countries, with their emerging
  and still vulnerable information technology structures.
EU RESOLUTION
The European Commission adopted a proposal for new laws against
cybercrime to harmonies laws that deal with hacking, viruses and
denial of service attacks. All EU Member States are also members of
the Council of Europe which recently agreed a Cybercrime Convention
with the same aim
                                 
The Commission adopted its proposal for a Council Framework
Decision on "Attacks against information systems" seeks to ensure that
Europe's law enforcement and judicial authorities can take action
against crimes for which existing laws were not designed. It also aims to
encourage       and     promote      information   security.     Antonio
Vitorino, European Commissioner for Justice and Home Affairs, said:
"Member States' laws contain some significant gaps which could
hamper the ability of law enforcement and judicial authorities to
respond to crimes against information systems. Given the trans-
national nature of hacking, virus and denial of service attacks, it is
important that the European Union takes action in this area to ensure
effective police and judicial co-operation."
DOs or DONTs
What you should not do
 Expose yourself that you are not available in town or give your details
  about location and itinerary when email auto responder enabled

 Hand over your credit card to any person

 Auto-connect to open Wi-Fi (wireless fidelity) networks

 Get confused, frightened or pressured into divulging information if you
  receive an e-mail purporting to be from your bank or credit card
  provider as criminal use scare tactics

 Keep passwords stored on your computer
 Open email attachment if you are not sure about it.

 Assume a company is legitimate based on
  "appearance" of the website.

 Be wary of investments that offer high returns at little
  or no risk.

 Accept packages that you didn't order.

 Go online without virus protection and a firewall in
  place.
What you should do
 Install and use a firewall, pop-up blocker and spyware detector


 Ensure that your virus definitions are up to date and run anti-virus and
  spyware detectors/cleaners regularly

 Make Backups of Important Files and Folders to protect important files
  and records on your computer if your computer malfunctions or is
  damaged by a successful attacker

 Use strong passwords - Easy to remember and difficult to guess type
  password. Use alphanumeric and special characters in your password.
  The length of password should be as long as possible (More than 8
  characters)
 Use a variety of passwords, not same for all of your accounts

 Be extremely wary of spam legitimate looking email asking for
  confidential information. Never ever click on the link given in the spam
  email.

 Always delete spam emails immediately and empty the trash box to
  prevent accidental clicking on the same link.

 Be wary of websites that require your card details up front before you
  actually place an order.

 Not to believe everything you read online

 Take your time - do not rush into things
Reference
*“Cybercrime More Profitable Than Drugs”, NineMSN
    **Identity Theft Statistics, Identity Protection Online
    ***“Eliminating Mobile Security Blindfolds”, Tech News
    World

    Krone, T., 2005. High Tech Crime Brief. Australian Institute
    of Criminology. Canberra, Australia. ISSN 1832-3413. 2005.
    Zeviar-Geese, G. 1997-98. The State of the Law on Cyber
    jurisdiction and Cybercrime on the Internet. California
    Pacific School of Law. Gonzaga Journal of International
    Law. Volume 1. 1997-1998.

More Related Content

What's hot (20)

Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 

Similar to Cyber crime

Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation Priya Saluja
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptxsakshiyad2611
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
Name parul
Name parulName parul
Name parulParul231
 
Name parul
Name parulName parul
Name parulParul231
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 

Similar to Cyber crime (20)

Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber crime presentation
Cyber crime presentation Cyber crime presentation
Cyber crime presentation
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
My presentation
My presentationMy presentation
My presentation
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Computer crime
Computer crimeComputer crime
Computer crime
 

More from Md. Atiqur Rahman

PCA Based Face Recognition System
PCA Based Face Recognition SystemPCA Based Face Recognition System
PCA Based Face Recognition SystemMd. Atiqur Rahman
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal PresentationMd. Atiqur Rahman
 
Optical Fiber Communication & Bangladesh
Optical Fiber Communication & BangladeshOptical Fiber Communication & Bangladesh
Optical Fiber Communication & BangladeshMd. Atiqur Rahman
 
Switchgear Equipment in a Substation
Switchgear Equipment in a SubstationSwitchgear Equipment in a Substation
Switchgear Equipment in a SubstationMd. Atiqur Rahman
 
Function of commercial banks in bangladesh
Function of commercial banks in bangladeshFunction of commercial banks in bangladesh
Function of commercial banks in bangladeshMd. Atiqur Rahman
 
Power genaration in bangladesh
Power genaration in bangladeshPower genaration in bangladesh
Power genaration in bangladeshMd. Atiqur Rahman
 

More from Md. Atiqur Rahman (8)

PCA Based Face Recognition System
PCA Based Face Recognition SystemPCA Based Face Recognition System
PCA Based Face Recognition System
 
Face Recognition Proposal Presentation
Face Recognition Proposal PresentationFace Recognition Proposal Presentation
Face Recognition Proposal Presentation
 
Aminoglycosides
AminoglycosidesAminoglycosides
Aminoglycosides
 
Optical Fiber Communication & Bangladesh
Optical Fiber Communication & BangladeshOptical Fiber Communication & Bangladesh
Optical Fiber Communication & Bangladesh
 
Collective bargaining
Collective bargainingCollective bargaining
Collective bargaining
 
Switchgear Equipment in a Substation
Switchgear Equipment in a SubstationSwitchgear Equipment in a Substation
Switchgear Equipment in a Substation
 
Function of commercial banks in bangladesh
Function of commercial banks in bangladeshFunction of commercial banks in bangladesh
Function of commercial banks in bangladesh
 
Power genaration in bangladesh
Power genaration in bangladeshPower genaration in bangladesh
Power genaration in bangladesh
 

Recently uploaded

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Cyber crime

  • 2. Because –  Everybody is using COMPUTERS  From white collar criminals to terrorist organizations And from Teenagers to Adults  Conventional crimes like Forgery,, extortion, kidnapping etc are being committed with the help off computers  New generation is growing up with computers  MOST IMPORTANT - Monetary transactions are moving on to the IINTERNET
  • 3. WHAT IS CYBER Cyber crime is defined as crimes committed on the internet using the computer as either a tool or a targeted victim. It is very difficult to classify crimes in general into distinct groups as many crimes evolve on a daily basis. Even in the real world, crimes like rape, murder or theft need not necessarily be separate. However, all cybercrimes involve both the computer and the person behind it as victims, it just depends on which of the two is the main target. Hence, the computer will be looked at as either a target or tool for simplicity’s sake. For example, hacking involves attacking the computer’s information and other resources. It is important to take note that overlapping occurs in many cases and it is impossible to have a perfect classification system.
  • 4. Like traditional crime, cybercrime can take many shapes and can occur nearly anytime or anyplace. Criminals committing cybercrime use a number of methods, depending on their skill-set and their goal. This should not be surprising: cybercrime is, after all, simply 'crime' with some sort of 'computer' or 'cyber' aspect.  Every 3 seconds an identity is stolen**  Without security, your unprotected PC can become infected within four minutes of connecting to the internet***  Cybercrime has surpassed illegal drug trafficking as a criminal moneymaker*
  • 5. The Council of Europe's Cybercrime Treaty uses the term 'cybercrime' to refer to offenses ranging from criminal activity against data to content and copyright infringement [Krone, 2005]. However, others [Zeviar-Geese, 1997-98] suggest that the definition is broader, including activities such as fraud, unauthorized access, child pornography, and cyber stalking. The United Nations Manual on the Prevention and Control of Computer Related Crime includes fraud, forgery, and unauthorized access [United Nations, 1995] in its cybercrime definition. References *“Cybercrime More Profitable Than Drugs”, NineMSN **Identity Theft Statistics, Identity Protection Online ***“Eliminating Mobile Security Blindfolds”, Tech News World  Krone, T., 2005. High Tech Crime Brief. Australian Institute of Criminology. Canberra, Australia. ISSN 1832-3413. 2005. Zeviar-Geese, G. 1997-98. The State of the Law on Cyber jurisdiction and Cybercrime on the Internet. California Pacific School of Law. Gonzaga Journal of International Law. Volume 1. 1997-1998.
  • 6. Profile of Cyber Criminal  Disgruntled employees  Teenagers  Political Hacktivist  Professional Hackers  Business Rival  Ex-Boy Friend  Divorced Husband.etc
  • 7. VICTIMS  Gullible  Desperados and greedy people  Unskilled & Inexperienced  Unlucky people
  • 8. Computer Crimes are Vulnerable Because off :- Anonymity Computer's storage capacity Weakness in Operating System Lack off Awareness off user
  • 9. TYPES OF CYBER CRIME • HACKING • DENIAL OF SERVICE ATTACK • COMPUTER VIRUS • SOFTWARE PIRACY • PORNOGRAPHY • IRC Crime • CREDIT CARD FRAUD • SPAMMING • PHISHING • SPOOFING • CYBER STALKING • CYBER DEFAMATION • THREATENING • SALAMI ATTACK
  • 10. HACKING Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user. The most prominent definition of hacking is the act of gaining access without legal authorization to a computer or computer network. A hacker first attacks an easy target, and then uses it to hide his or her traces for launching attacks at more secure sites. The goal of an attack is to gain complete control of the system (so you can edit, delete, install, or execute any file in any user’s directory), often by gaining access to a "super- user" account. This will allow both maximum access and the ability to hide your presence.
  • 11. COMPUTER VIRUS A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. The original may modify the copies or the copies may modify themselves. A virus can only spread from one computer to another when its host is taken to the uninfected computer, for instance by a user sending it over a network or carrying it on a removable medium such as a floppy disk, CD, or USB drive. Additionally, viruses can spread to other computers by infecting files on a network file system or a file system that is accessed by another computer. The term comes from the term virus in biology. A computer virus reproduces by making, possibly modified, copies of itself in the computer's memory, storage, or over a network. This is similar to the way a biological virus works
  • 12. SOFTWARE PIRACY  Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original  Retail revenue losses worldwide are ever increasing due to this crime  Can be done in various ways- End user copying,, Hard disk loading,, Counterfeiting,, Illegal downloads from the internet etc
  • 13. PORNOGRAPHY  Pornography is the first consistently successful ecommerce product  Deceptive marketing tactics and mouse trapping technologies Pornography encourage customers to access their websites  Anybody including children can log on to the internet and access websites with pornographic contents with a click of a mouse  Publishing, transmitting any material in electronic form which is lascivious or appeals to the prurient interest is an offence under the provisions of section 67 of I.T. Act -2000.
  • 14. IRC CRIME Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other  Criminals use it for meeting coconspirators  Hackers use it for discussing their exploits / sharing the techniques  Pedophiles use chat rooms to allure small children  Cyber Stalking - In order to harass a woman her telephone number is given to others as if she wants to befriend males
  • 15. CREDIT CARD FRAUD You simply have to type credit card number into www page off the vendor for online transaction. If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner
  • 18. How the credit card skimmer is used
  • 20. 1- ATM machine as usual ?
  • 21. 2- Is there an additional slot ?
  • 22. 3- A monitor and pamphlet holder at the side...nothing wrong
  • 23. 5-False pamphlet box affixed to the ATM cubicle side
  • 25. SPAMMING Spamming is the abuse of electronic messaging systems to send unsolicited bulk messages, which are generally undesired. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, mobile phone messaging spam, internet forum spam and junk fax transmissions. Spamming is economically viable because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming is widely reviled, and has been the subject of legislation in many jurisdictions.
  • 26. PHISHING It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means In most cases, phishers send out a wave of spam email, sometimes up to millions of messages. Each email contains a message that appears to come from a well- known and trusted company. Usually the message includes the company's logo and name, and it often tries to evoke an emotional response to a false crisis. Couched in urgent, business-like language, the email often makes a request of the user’s personal information. Sometimes the email directs the recipient to a spoofed Web site. The Web site, like the email, appears authentic and in some instances its URL has been masked so the Web address looks real.
  • 27. Spoofing Getting one computer on a network to pretend to have the identity off another computer,, usually one with special access privileges ,, so as to obtain access to the other computers on the network. A common misconception is that "IP spoofing" can be used to hide your IP address while surfing the Internet, chatting on-line, sending e-mail, and so forth. This is generally not true. Forging the source IP address causes the responses to be misdirected, meaning you cannot create a normal network connection. However, IP spoofing is an integral part of many network attacks that do not need to see responses (blind spoofing).
  • 28. DENIAL OF SERVICE ATTACK This is an act by the criminal, who floods the bandwidth of the victim's network or fill's his e-mail box with spam mail depriving him of the services he is entitled to access or provide
  • 29. CYBER STALKING The Criminal follows the victim by sending emails, entering the chat rooms frequently.
  • 30. CYBER DEFAMATION The Criminal sends emails containing defamatory matters to all concerned off the victim or post the defamatory matters on a website. (disgruntled employee may do this against boss,, ex- boys friend against girl,, divorced husband against wife etc)
  • 31. THREATENING The Criminal sends threatening email or comes in contact in chat rooms with victim. (Any one disgruntled may do this against boss,, friend or official)
  • 32. SALAMI ATTACK In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed. Criminal makes such program that deducts small amount like Rs. 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.
  • 33. SALE OF NARCOTICS  Sale & Purchase through net  There are web site which offset sale and shipment off contrabands drugs  They may use the techniques off stenography for hiding the messages
  • 34. Now in its tenth year, the Internet Crime Complaint Center (IC3) has become a vital resource for victims of online crime and for law enforcement investigating and prosecuting offenders. In 2010, IC3 received the second-highest number of complaints since its inception. IC3 also reached a major milestone this year when it received its two-millionth complaint. On average, IC3 receives and processes 25,000 complaints per month. IC3 is more than a repository for victim complaints. It serves as a conduit for law enforcement to share information and pursue cases that often span jurisdictional boundaries. IC3 was founded in 2000 as a joint effort between the National White Collar Crime Center (NW3C)/Bureau of Justice Assistance (BJA) and the Federal Bureau of Investigation (FBI). That partnership leveraged the
  • 35. resources necessary to aid law enforcement in every aspect of an Internet fraud complaint. The most common victim complaints in 2010 were non-delivery of payment/merchandise, scams impersonating the FBI (hereafter “FBI-related scams”) and identity theft. Victims of these crimes reported losing hundreds of millions of dollars. Through a number of technological advancements, IC3 has streamlined the way it processes and refers victim complaints to law enforcement. In 2004, IC3 developed Automatch, an automated internal complaint grouping and analytical search tool. The design of Automatch is based on an assessment of the IC3 partnership aimed at defining a joint workflow for the project partners with different service requirements. IC3 IT staff continually review and update
  • 36. Automatch to meet the needs of analysts who build cases for law enforcement worldwide gathering all related information based on commonalities in the IC3 data. In 2009, NW3C developed the state-of-the-art Internet Complaint Search and Investigation System (ICSIS), which fosters seamless collaboration among law enforcement from multiple jurisdictions. Expert IC3 analysts also provide key analytical and case support. The 2010 Internet Crime Report demonstrates how pervasive online crime has become, affecting people in all demographic groups. The report provides specific details about various crimes, their victims and the perpetrators. It also shows how IC3 continually adapts its methods to meet the needs of the public and law enforcement.
  • 37. Type Percent 1. Non-delivery Payment/Merchandise 14.4% 2. FBI-Related Scams 13.2% 3. Identity Theft 9.8% 4. Computer Crimes 9.1% 5. Miscellaneous Fraud 8.6% 6. Advance Fee Fraud 7.6% 7. Spam 6.9% 8. Auction Fraud 5.9% 9. Credit Card Fraud 5.3% 10. Overpayment Fraud 5.3%
  • 38.
  • 39.
  • 40. UN RESOLUTION  A broad, inclusive focus is necessary to address problems of cybercrime, going beyond criminal law, penal procedures and law enforcement. The focus should include requirements for the secure functioning of a cyber-economy optimizing business confidence and individual privacy, as well as strategies to promote and protect the innovation and wealth-creating potential and opportunities of information and computing technologies, including early warning and response mechanisms in case of cyber attacks. Behind the prevention and prosecution of computer-related crime looms the larger challenge of creating a global culture of cyber security, addressing the needs of all societies, including developing countries, with their emerging and still vulnerable information technology structures.
  • 41. EU RESOLUTION The European Commission adopted a proposal for new laws against cybercrime to harmonies laws that deal with hacking, viruses and denial of service attacks. All EU Member States are also members of the Council of Europe which recently agreed a Cybercrime Convention with the same aim  The Commission adopted its proposal for a Council Framework Decision on "Attacks against information systems" seeks to ensure that Europe's law enforcement and judicial authorities can take action against crimes for which existing laws were not designed. It also aims to encourage and promote information security. Antonio Vitorino, European Commissioner for Justice and Home Affairs, said: "Member States' laws contain some significant gaps which could hamper the ability of law enforcement and judicial authorities to respond to crimes against information systems. Given the trans- national nature of hacking, virus and denial of service attacks, it is important that the European Union takes action in this area to ensure effective police and judicial co-operation."
  • 42. DOs or DONTs What you should not do  Expose yourself that you are not available in town or give your details about location and itinerary when email auto responder enabled  Hand over your credit card to any person  Auto-connect to open Wi-Fi (wireless fidelity) networks  Get confused, frightened or pressured into divulging information if you receive an e-mail purporting to be from your bank or credit card provider as criminal use scare tactics  Keep passwords stored on your computer
  • 43.  Open email attachment if you are not sure about it.  Assume a company is legitimate based on "appearance" of the website.  Be wary of investments that offer high returns at little or no risk.  Accept packages that you didn't order.  Go online without virus protection and a firewall in place.
  • 44. What you should do  Install and use a firewall, pop-up blocker and spyware detector  Ensure that your virus definitions are up to date and run anti-virus and spyware detectors/cleaners regularly  Make Backups of Important Files and Folders to protect important files and records on your computer if your computer malfunctions or is damaged by a successful attacker  Use strong passwords - Easy to remember and difficult to guess type password. Use alphanumeric and special characters in your password. The length of password should be as long as possible (More than 8 characters)
  • 45.  Use a variety of passwords, not same for all of your accounts  Be extremely wary of spam legitimate looking email asking for confidential information. Never ever click on the link given in the spam email.  Always delete spam emails immediately and empty the trash box to prevent accidental clicking on the same link.  Be wary of websites that require your card details up front before you actually place an order.  Not to believe everything you read online  Take your time - do not rush into things
  • 46. Reference *“Cybercrime More Profitable Than Drugs”, NineMSN **Identity Theft Statistics, Identity Protection Online ***“Eliminating Mobile Security Blindfolds”, Tech News World  Krone, T., 2005. High Tech Crime Brief. Australian Institute of Criminology. Canberra, Australia. ISSN 1832-3413. 2005. Zeviar-Geese, G. 1997-98. The State of the Law on Cyber jurisdiction and Cybercrime on the Internet. California Pacific School of Law. Gonzaga Journal of International Law. Volume 1. 1997-1998.