1. A
PRESENTATION ON
“CYBER CRIMES”
21-11-2014 Guided by: Riya Malkani Ma’am
2. INTRODUCTION
• Computer crime, or Cybercrime, refers to any crime that involves
a computer and a network. The computer may have been used in the
commission of a crime, or it may be the target.
• Cybercrime is nothing but: "Offences that are committed against individuals or
groups of individuals with a criminal motive to intentionally harm the reputation of
the victim or cause physical or mental harm to the victim directly or indirectly,
using modern telecommunication networks such as Internet".
• Such crimes may threaten a nation’s security and financial health. Issues
surrounding these types of crimes have become high-profile, particularly those
surrounding cracking, copyright infringement. There are also problems
of privacy when confidential information is lost or intercepted, lawfully or
otherwise.
3. CLASSIFICATION
Computer crime encompasses a broad range of activities:
• Computer viruses
• Cyber stalking
• Information warfare
• Malware(malicious code)
• Identity theft
• Phishing scams
4. COMPUTER VIRUSES
• A computer virus is
a malware program that, when
executed, replicates by inserting
copies of itself (possibly modified) into
other computer programs, data files, or
the boot sector of the hard drive; when
this replication succeeds, the affected
areas are then said to be "infected“
• Viruses often perform some type of
harmful activity on infected hosts, such
as stealing hard disk space
or CPU time, accessing private
information, corrupting data, displaying
political messages on the user's
screen, spamming their contacts,
or logging their keystrokes.
5. CYBER STALKING
• Cyberstalking is often accompanied by
real-time or offline stalking. Both are
criminal offenses. Both are motivated by
a desire to control, intimidate or influence
a victim. A stalker may be an online
stranger or a person whom the target
knows. He may be anonymous and solicit
involvement of other people online who
do not even know the target.
• Cyberstalking is a criminal offense under
various state anti-stalking,
slander and harassment laws. A
conviction can result in a restraining
order, probation, or criminal penalties
against the assailant, including jail.
6. INFORMATION WARFARE
• Information warfare may involve collection of tactical
information, assurances that one's own information is valid,
spreading of propaganda or disinformation to demoralize or
manipulate the enemy and the public, undermining the quality of
opposing force information and denial of information-collection
opportunities to opposing forces. Information warfare is closely
linked to psychological warfare.
- Overview
- Information warfare can take many forms:
• Television and radio transmissions can be jammed.
• Television and radio transmissions can be hijacked for
a disinformation campaign.
• Logistics networks can be disabled.
• Enemy communications networks can be disabled or spoofed.
• Stock exchange transactions can be sabotaged, either with
electronic intervention, by leaking sensitive information or by
7. MALWARE(MALICIOUS CODE)
• Malware, short for malicious software, is any software
used to disrupt computer operation, gather sensitive
information, or gain access to private computer systems.
It can appear in the form of executable code, scripts,
active content, and other software.
• 'Malware' is a general term used to refer to a variety of
forms of hostile or intrusive software. Malware
includes computer viruses, worms, trojan
horses, ransomware, spyware, adware, scareware, and
other malicious programs.
• Spyware or other malware is sometimes found embedded
in programs supplied officially by companies, e.g.,
downloadable from websites, that appear useful or
attractive, but may have, for example, additional hidden
tracking functionality that gathers marketing statistics.
8. IDENTITY THEFT
• Identity theft is a form of stealing
someone's identity in which someone pretends
to be someone else by assuming that person's
identity.
• The victim of identity theft can suffer adverse
consequences if they are held responsible for
the perpetrator's actions.
• Identity theft occurs when someone uses
another's personally identifying information,
without their permission, to commit fraud or
other crimes.
9. PHISHING SCAMS
• Phishing is the attempt to acquire sensitive
information such as usernames, passwords, by
masquerading as a trustworthy entity in
an electronic communication.
• Phishing is typically carried out by email
spoofing or instant messaging.
• Phishing is a continual threat that keeps growing
to this day. The risk grows even larger in social
media such as Facebook, Twitter, etc.
10. PRECAUTIONS
• Secure your computer: Activate your firewall, Use anti-virus/malware
software, Block spyware attacks.
• Install the latest operating system updates: Keep your applications and
operating system (e.g. Windows, Mac, Linux) current with the latest system
updates. Turn on automatic updates to prevent potential attacks on older
software.
• Secure your wireless network: Wi-Fi (wireless) networks at home are
vulnerable to intrusion if they are not properly secured. Avoid conducting
financial or corporate transactions on these networks.
• Avoid being scammed: Always think before you click on a link or file of
unknown origin. Don’t feel pressured by any emails. Check the source of the
message. When in doubt, verify the source. Never reply to emails that ask
you to verify your information or confirm your user ID or password.