Documente Academic
Documente Profesional
Documente Cultură
Presented by-
Group – 6
INTRODUCTION-Cyber Crime
Any criminal activity that uses a computer either as an
instrument, target or a means for perpetuating
further crimes comes within the ambit of cyber
crime.
The difference between a cyber crime &conventional
crime is that there should be an involvement, at any
stage, of the virtual cyber medium in cyber crime.
MAJOR EVENTS
Origin-The first recorded cyber crime took place in the
year 1820
1978- 1st spam e-mail sent
1980-Rookits emerges as a malware threat
1982-The elk virus spreads via floppy disk
1983-Fbi nabs high profile computer intruder
1988-Morris worm spreads via arp net
1996-Phishing tricks spawn serties by new web based
scams
1999-Large scale attacks on bank and gambling sites
2006-Criminal target penny stocks in pump and dump of
ear 1820
CYBER CRIMINALS
Children and adolescents between the age group of 6
–years
Organised hackers
Professional hackers / crackers
Discontented employees
REASONS FOR CYBER CRIME:
Capacity to store data in comparatively small space
Easy to access
Complex
Negligence
Loss of evidence
MODE OF CYBER CRIME
Hacking
Theft of information contained in electronic form
Email bombing
Virus
Denial of Service attack
Salami attacks
Data diddling
Trojan attacks
HACKING
Hacking is the practice of modifying computer
hardware and software to accomplish a goal outside
of the creator’s original purpose.
The impact of computer hacking varies from being
simply invasive and annoying to illegal.
Started with AT&T
1999, security software such as Symantec went
mainstream.
Methods Of Hacking
• NetBIOS
• ICMP Ping
• FTP
• rpc.statd
• HTTP
Prevention
Implement a firewall
Install anti-virus software
Keep operating systems up to date
Don't run unnecessary network services
Keep informed about network security
SOFTWARE CRACKING
It is the process of bypassing the registration and
payment options on a software product to remove
copy protection safeguards or to turn a demo
version of software into a fully functional version
without paying for it.
PASSWORD CRACKING
Prevention
ensure that attackers cannot get access even to the
encrypted password
constantly shifting password
DENIAL-OF-SERVICE ATTACK
DoS Attack
Is an attempt to make a computer resource
unavailable to its intended users.
Common method of attack involves saturating the
target machine with external communications
requests, such that it cannot respond to legitimate
traffic, or responds so slowly as to be rendered
effectively unavailable.
Means Of DoS Attack
Surviving attacks
Firewalls
IPS based prevention
Prevention via proactive testing
VIRAL ATTACKS
A computer virus is a computer program that can
copy itself and infect a computer without the
permission or knowledge of the owner.
Viruses can be divided into two types based on their
behavior when they are executed.
ØNonresident viruses
ØResident viruses
Contd…
Vulnerability of operating systems to viruses
:-
ØThe users of Microsoft software (especially
networking software such as Microsoft Outlook
and Internet Explorer) are especially vulnerable to
the spread of viruses.
preventive measures:-
Øanti-virus software
Øcommon methods that an anti-virus software
application uses to detect viruses:
- Using virus signature definitions
- use a heuristic algorithm
-
Contd…
ØOne may also minimize the damage done by viruses
by making regular backups of data
Øuse different operating systems on different file
systems.
Virus removal-
ØSystem Restore in Windows Me, Windows XP and
Windows Vista restores the registry and critical
system files to a previous checkpoint
Contd…
Operating system reinstallation -
simply reformatting the OS partition and installing
the OS from its original media, or imaging the
partition with a clean backup image.
Benefits-
Øsimple to do
Øfaster than running multiple antivirus scans
ØGuarantees to remove any malwar
WEBSITE DEFACEMENT
Website defacement is an attack on a website that
changes the visual appearance of the site.
In defacement incidents, the major goal of the hacker
is to gain publicity by demonstrating the weakness
of the existing security measures.
Damage can range from loss of customer trust to loss
of revenue.
How a hacker defaces web page?
by obtaining usernames and passwords
to retrieve this information, hackers use the
following:
Øinformation-gathering techniques e.g. read Web
pages such as 'global.asa'
Ømaking use of publicly available information e.g.
domain registration records
Øusing 'social engineering' tactics e.g. calling an
employee and posing as a system administrator.
ØIf the hacker has a username, he can try to guess the
password by going through a list of popular or
default choices, or by using intelligent guessing.
Authenticated access to the system
Internet Fraud
Purchase Scams
Counterfeit Postal Money Orders
Virtual Robberies
Online Automotive Fraud
Re Shippers
Call Tag Scam
Business Opportunity / Work-at-home Schemes
Money Transfers Frauds
Dating Scams
Virtual Robberies
Click Fraud
Internet marketing and retail fraud
Internet Ticket Fraud
Paypal Fraud
Stock market manipulation schemes
Avoiding Internet investment scams
Sexual Harassment
Types Of Stalkers
Internet Hate Speech
What is it?
How it operates?
How to prevent it?
CYBER LAWS
Contd…
Uniform law
Lack of awareness
Jurisdiction issues
Extra territorial application
Raising a cyber army
Cyber savvy bench
Dynamic form of cyber crime
Hesitation to report offences
PREVENTION
Prevention is better than cure.
5P mantra for online security: Precaution,
Prevention, Protection, Preservation and
Perseverance.
A netizen should keep in mind the following things:-
to prevent cyber stalking avoid disclosing any
information pertaining to oneself.
Contd…
always avoid sending any photograph online
particularly to strangers and chat friends
use latest and up date anti virus software
always keep back up volumes so that one may not
suffer data loss in case of virus contamination
Contd…
always keep a watch on the sites that children are
accessing to prevent any kind of harassment or
depravation in children.
never send your credit card number to any site that is
not secured, to guard against frauds.
Contd…
web site owners should watch traffic and check any
irregularity on the site. Putting host-based intrusion
detection devices on servers may do this.
Use of firewalls may be beneficial.
web servers running public sites must be physically
separate protected from internal corporate network.
CONCLUSION
Capacity of human mind unfathomable.
Make people aware of their rights and duties.
Need to bring changes in Information Technology Act.
Provisions of cyber law should not be made so
stringent that it may retard the growth of the
industry.
Thank you!