2. Because –
Everybody is using COMPUTERS
From white collar criminals to terrorist organizations
And from Teenagers to Adults
Conventional crimes like
Forgery,, extortion, kidnapping etc are being
committed with the help off computers
New generation is growing up with computers
MOST IMPORTANT - Monetary transactions
are moving on to the IINTERNET
3. WHAT IS CYBER
Cyber crime is defined as crimes committed on the
internet using the computer as either a tool or a targeted
victim. It is very difficult to classify crimes in general into
distinct groups as many crimes evolve on a daily basis. Even
in the real world, crimes like rape, murder or theft need not
necessarily be separate. However, all cybercrimes involve
both the computer and the person behind it as victims, it
just depends on which of the two is the main target.
Hence, the computer will be looked at as either a target or
tool for simplicity’s sake. For example, hacking involves
attacking the computer’s information and other resources.
It is important to take note that overlapping occurs in
many cases and it is impossible to have a perfect
classification system.
4. Like traditional crime, cybercrime can take many shapes
and can occur nearly anytime or anyplace. Criminals
committing cybercrime use a number of
methods, depending on their skill-set and their goal. This
should not be surprising: cybercrime is, after all, simply
'crime' with some sort of 'computer' or 'cyber' aspect.
Every 3 seconds an identity is stolen**
Without security, your unprotected PC can
become infected within four minutes of
connecting to the internet***
Cybercrime has surpassed illegal drug trafficking
as a criminal moneymaker*
5. The Council of Europe's Cybercrime Treaty uses the term
'cybercrime' to refer to offenses ranging from criminal activity
against data to content and copyright infringement
[Krone, 2005]. However, others [Zeviar-Geese, 1997-98] suggest
that the definition is broader, including activities such as
fraud, unauthorized access, child pornography, and cyber
stalking. The United Nations Manual on the Prevention and
Control of Computer Related Crime includes fraud, forgery, and
unauthorized access [United Nations, 1995] in its cybercrime
definition.
References
*“Cybercrime More Profitable Than Drugs”, NineMSN
**Identity Theft Statistics, Identity Protection Online
***“Eliminating Mobile Security Blindfolds”, Tech News World
Krone, T., 2005. High Tech Crime Brief. Australian Institute of Criminology. Canberra, Australia. ISSN
1832-3413. 2005.
Zeviar-Geese, G. 1997-98. The State of the Law on Cyber jurisdiction and Cybercrime on the
Internet. California Pacific School of Law. Gonzaga Journal of International Law. Volume 1. 1997-1998.
6. Profile of Cyber Criminal
Disgruntled employees
Teenagers
Political Hacktivist
Professional Hackers
Business Rival
Ex-Boy Friend
Divorced Husband.etc
10. HACKING
Hacking in simple terms means illegal intrusion into
a computer system without the permission of the
computer owner/user. The most prominent definition of
hacking is the act of gaining access without legal
authorization to a computer or computer network. A
hacker first attacks an easy target, and then uses it to hide
his or her traces for launching attacks at more secure sites.
The goal of an attack is to gain complete control of the
system (so you can edit, delete, install, or execute any file
in any user’s directory), often by gaining access to a "super-
user" account. This will allow both maximum access and
the ability to hide your presence.
11. COMPUTER VIRUS
A computer virus is a computer program that can copy itself and
infect a computer without permission or knowledge of the user.
The original may modify the copies or the copies may modify
themselves. A virus can only spread from one computer to
another when its host is taken to the uninfected computer, for
instance by a user sending it over a network or carrying it on a
removable medium such as a floppy disk, CD, or USB drive.
Additionally, viruses can spread to other computers by infecting
files on a network file system or a file system that is accessed by
another computer.
The term comes from the term virus in biology. A computer
virus reproduces by making, possibly modified, copies of itself
in the computer's memory, storage, or over a network. This is
similar to the way a biological virus works
12. SOFTWARE PIRACY
Theft of software through the illegal copying of genuine
programs or the counterfeiting and distribution of
products intended to pass for the original
Retail revenue losses worldwide are ever increasing due to
this crime
Can be done in various ways-
End user copying,, Hard disk loading,, Counterfeiting,, Illegal
downloads from the internet etc
13. PORNOGRAPHY
Pornography is the first consistently successful ecommerce
product
Deceptive marketing tactics and mouse trapping
technologies Pornography encourage customers to access
their websites
Anybody including children can log on to the internet and
access websites with pornographic contents with a click of
a mouse
Publishing, transmitting any material in electronic form
which is lascivious or appeals to the prurient interest is an
offence under the provisions of section 67 of I.T. Act -2000.
14. IRC CRIME
Internet Relay Chat (IRC) servers have chat rooms in which
people from anywhere the world can come together and
chat with each other
Criminals use it for meeting coconspirators
Hackers use it for discussing their exploits / sharing the
techniques
Pedophiles use chat rooms to allure small children
Cyber Stalking - In order to harass a woman her telephone
number is given to others as if she wants to befriend males
15. CREDIT CARD FRAUD
You simply have to type credit card number into www
page off the vendor for online transaction.
If electronic transactions are not secured the credit
card numbers can be stolen by the hackers who can
misuse this card by impersonating the credit card
owner
25. SPAMMING
Spamming is the abuse of electronic messaging systems to send
unsolicited bulk messages, which are generally undesired. While the
most widely recognized form of spam is email spam, the term is
applied to similar abuses in other media: instant messaging
spam, Usenet newsgroup spam, Web search engine spam, spam in
blogs, mobile phone messaging spam, internet forum spam and junk
fax transmissions.
Spamming is economically viable because advertisers have no
operating costs beyond the management of their mailing lists, and it is
difficult to hold senders accountable for their mass mailings. Because
the barrier to entry is so low, spammers are numerous, and the volume
of unsolicited mail has become very high. The costs, such as lost
productivity and fraud, are borne by the public and by Internet service
providers, which have been forced to add extra capacity to cope with
the deluge. Spamming is widely reviled, and has been the subject of
legislation in many jurisdictions.
26. PHISHING
It is technique of pulling out confidential information from
the bank/financial institutional account holders by
deceptive means
In most cases, phishers send out a wave of spam
email, sometimes up to millions of messages. Each email
contains a message that appears to come from a well-
known and trusted company. Usually the message includes
the company's logo and name, and it often tries to evoke an
emotional response to a false crisis. Couched in
urgent, business-like language, the email often makes a
request of the user’s personal information. Sometimes the
email directs the recipient to a spoofed Web site. The Web
site, like the email, appears authentic and in some
instances its URL has been masked so the Web address
looks real.
27. Spoofing
Getting one computer on a network to pretend to have the
identity off another computer,, usually one with special
access privileges ,, so as to obtain access to the other
computers on the network.
A common misconception is that "IP spoofing" can be used
to hide your IP address while surfing the Internet, chatting
on-line, sending e-mail, and so forth. This is generally not
true. Forging the source IP address causes the responses to
be misdirected, meaning you cannot create a normal
network connection. However, IP spoofing is an integral
part of many network attacks that do not need to see
responses (blind spoofing).
28. DENIAL OF SERVICE ATTACK
This is an act by the criminal, who floods the
bandwidth of the victim's network or fill's his e-mail
box with spam mail depriving him of the services he
is entitled to access or provide
30. CYBER DEFAMATION
The Criminal sends emails containing defamatory
matters to all concerned off the victim or post the
defamatory matters on a website.
(disgruntled employee may do this against boss,, ex-
boys friend against girl,, divorced husband against wife
etc)
31. THREATENING
The Criminal sends threatening email or comes in
contact in chat rooms with victim.
(Any one disgruntled may do this against boss,, friend
or official)
32. SALAMI ATTACK
In such crime criminal makes insignificant changes in
such a manner that such changes would go unnoticed.
Criminal makes such program that deducts small
amount like Rs. 2.50 per month from the account of all
the customer of the Bank and deposit the same in his
account. In this case no account holder will approach
the bank for such small amount but criminal gains
huge amount.
33. SALE OF NARCOTICS
Sale & Purchase through net
There are web site which offset sale and shipment off
contrabands drugs
They may use the techniques off stenography for
hiding the messages
34. Now in its tenth year, the Internet Crime Complaint Center (IC3) has
become a vital resource for victims of online crime and for law
enforcement investigating and prosecuting offenders.
In 2010, IC3 received the second-highest number of complaints since its
inception. IC3 also reached a major milestone this year when it received
its two-millionth complaint. On average, IC3 receives and processes
25,000 complaints per month.
IC3 is more than a repository for victim complaints. It serves as a conduit
for law enforcement to share information and pursue cases that often
span jurisdictional boundaries. IC3 was founded in 2000 as a joint effort
between the National White Collar Crime Center (NW3C)/Bureau of
Justice Assistance (BJA) and the Federal Bureau of Investigation (FBI).
That partnership leveraged the
35. resources necessary to aid law enforcement in every aspect of an
Internet fraud complaint.
The most common victim complaints in 2010 were non-delivery
of payment/merchandise, scams impersonating the FBI
(hereafter “FBI-related scams”) and identity theft. Victims of
these crimes reported losing hundreds of millions of dollars.
Through a number of technological advancements, IC3 has
streamlined the way it processes and refers victim complaints to
law enforcement. In 2004, IC3 developed Automatch, an
automated internal complaint grouping and analytical search
tool. The design of Automatch is based on an assessment of the
IC3 partnership aimed at defining a joint workflow for the
project partners with different service requirements. IC3 IT staff
continually review and update
36. Automatch to meet the needs of analysts who build cases
for law enforcement worldwide gathering all related
information based on commonalities in the IC3 data. In
2009, NW3C developed the state-of-the-art Internet
Complaint Search and Investigation System (ICSIS), which
fosters seamless collaboration among law enforcement
from multiple jurisdictions.
Expert IC3 analysts also provide key analytical and case
support.
The 2010 Internet Crime Report demonstrates how
pervasive online crime has become, affecting people in all
demographic groups. The report provides specific details
about various crimes, their victims and the perpetrators. It
also shows how IC3 continually adapts its methods to meet
the needs of the public and law enforcement.
40. UN RESOLUTION
A broad, inclusive focus is necessary to address problems of
cybercrime, going beyond criminal law, penal procedures and
law enforcement. The focus should include requirements for the
secure functioning of a cyber-economy optimizing business
confidence and individual privacy, as well as strategies to
promote and protect the innovation and wealth-creating
potential and opportunities of information and computing
technologies, including early warning and response mechanisms
in case of cyber attacks. Behind the prevention and prosecution
of computer-related crime looms the larger challenge of creating
a global culture of cyber security, addressing the needs of all
societies, including developing countries, with their emerging
and still vulnerable information technology structures.
41. EU RESOLUTION
The European Commission adopted a proposal for new laws against
cybercrime to harmonies laws that deal with hacking, viruses and
denial of service attacks. All EU Member States are also members of
the Council of Europe which recently agreed a Cybercrime Convention
with the same aim
The Commission adopted its proposal for a Council Framework
Decision on "Attacks against information systems" seeks to ensure that
Europe's law enforcement and judicial authorities can take action
against crimes for which existing laws were not designed. It also aims to
encourage and promote information security. Antonio
Vitorino, European Commissioner for Justice and Home Affairs, said:
"Member States' laws contain some significant gaps which could
hamper the ability of law enforcement and judicial authorities to
respond to crimes against information systems. Given the trans-
national nature of hacking, virus and denial of service attacks, it is
important that the European Union takes action in this area to ensure
effective police and judicial co-operation."
42. DOs or DONTs
What you should not do
Expose yourself that you are not available in town or give your details
about location and itinerary when email auto responder enabled
Hand over your credit card to any person
Auto-connect to open Wi-Fi (wireless fidelity) networks
Get confused, frightened or pressured into divulging information if you
receive an e-mail purporting to be from your bank or credit card
provider as criminal use scare tactics
Keep passwords stored on your computer
43. Open email attachment if you are not sure about it.
Assume a company is legitimate based on
"appearance" of the website.
Be wary of investments that offer high returns at little
or no risk.
Accept packages that you didn't order.
Go online without virus protection and a firewall in
place.
44. What you should do
Install and use a firewall, pop-up blocker and spyware detector
Ensure that your virus definitions are up to date and run anti-virus and
spyware detectors/cleaners regularly
Make Backups of Important Files and Folders to protect important files
and records on your computer if your computer malfunctions or is
damaged by a successful attacker
Use strong passwords - Easy to remember and difficult to guess type
password. Use alphanumeric and special characters in your password.
The length of password should be as long as possible (More than 8
characters)
45. Use a variety of passwords, not same for all of your accounts
Be extremely wary of spam legitimate looking email asking for
confidential information. Never ever click on the link given in the spam
email.
Always delete spam emails immediately and empty the trash box to
prevent accidental clicking on the same link.
Be wary of websites that require your card details up front before you
actually place an order.
Not to believe everything you read online
Take your time - do not rush into things
46. Reference
*“Cybercrime More Profitable Than Drugs”, NineMSN
**Identity Theft Statistics, Identity Protection Online
***“Eliminating Mobile Security Blindfolds”, Tech News
World
Krone, T., 2005. High Tech Crime Brief. Australian Institute
of Criminology. Canberra, Australia. ISSN 1832-3413. 2005.
Zeviar-Geese, G. 1997-98. The State of the Law on Cyber
jurisdiction and Cybercrime on the Internet. California
Pacific School of Law. Gonzaga Journal of International
Law. Volume 1. 1997-1998.