Sunteți pe pagina 1din 26

Seminar

On
Cyber Crime

Submitted To: Submitted By:


Prof. Rakesh Huded Akash Mengji
Content

1. INTRODUCTION
2. WHAT IS CYBER CRIME
2.1 REASONS FOR CYBER CRIME
2.2 WHO ARE CYBER CRIMINALS
2.3 CATEGORIES OF CYBER CRIME
2.4 VARIOUS CATEGORIES OF CYBER CRIME
3. TYPES OF CYBER CRIMES
4. PRECAUTIONS TO PREVENT CYBER CRIME
5. ADVANTAGES AND DISADVANTAGES
6. CONCLUSION
7. REFERENCES
Introduction
• Today an increasing number of companies are connecting to the Internet to
support sales activities or to provide their employees and customers with
faster information and services.
• The virtual world has taken over the real one, E-business and E-commerce,
which are the new mantras and electronic transactions and dominate the
overall business paradigm. In this rapidly evolving e-world that depends on
free flowing information, security is the major problem to be considered.
History
• It is difficult to determine when the first crime involving a computer actually took
place. The computer has been around in some form since the abacus, which is
known to exist in 3500BC in Japan, China, and India.
• In 1801, profit motives encouraged Joseph Jacquard, a textile manufacturer in
France, to design the forerunner of the computer card. This device allowed the
repetition of services of stamps in the weaving of special fabrics.
• However Jacquard’s employees were committed to discourage further use of new
technology.
• The first recorded cyber crime took place in the year 1820.
History
• In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced
the loom. This device allowed the repetition of a series of steps in the weaving
of special fabrics.
• This resulted in a fear amongst Jacquard‘s employees that their traditional
employment and livelihood were being threatened.
• They committed acts of sabotage to discourage Jacquard from further use of
the new technology. This is the first recorded cyber crime.
What is Cybercrime
"Offences that are committed against individuals or groups of individuals with a
criminal motive to intentionally harm the reputation of the victim or cause physical
or mental harm, or loss, to the victim directly or indirectly, using modern
telecommunication networks such as Internet (networks including chat rooms,
emails, notice boards and groups) and mobile phones (SMS/MMS)"
Categories Cyber crimes
• Cyber crimes can be basically divided into 3 major
categories:

1. Cyber crimes against persons.

2. Cyber crimes against property.

3. Cyber crimes against government.


Against Person

• Cybercrimes committed against persons include various crimes like


transmission of child pornography, harassment of any one with the use
of a computer such as email, and cyber stalking.

• The distribution, posting, and dissemination of absence material


including pornography, and child pornography constitutes one of the
most important cybercrimes known today. The potential harm of such a
crime to humanity can hardly be overstated.
Against Property
The second category of cyber crime is that of cybercrimes against all forms of
property. These crimes include unauthorized computer trespassing through
cyberspace, computer vandalism, transmission of harmful programs, and
unauthorized possessions of computerized information.
Against Government
The third category of cybercrimes relate to cybercrimes against government
.cyber terrorism is one distinct kind of crime in this category . The growth of
internet has shown that the medium of cyberspace is being used by individuals
and groups to the international governments also threaten the citizens of a
country. This crime manifests itself into terrorism when an individual “cracks “ into
a government of military maintained website.
Types of Cyber Crime
• Hacking
• Denial OF Service Attack
• Virus Dissemination
• Computer Forgery
• Credit Card Fraud
• Phishing
• Spoofing
• Cyber Stalking
• Threatening
• Salami attack
Hacking
• Hacking involves gaining unauthorized access to a computer and altering the
system in such a way as to permit continued access, along with changing the
configuration, purpose, or operation of the target machine, all without the
knowledge or approval of the systems owners.
Denial of service attack
• A Denial of Service (“DoS”) attack is a rather primitive technique that
overwhelms the resources of the target computer which results in the denial
of server access to other computers. There are several different techniques
that hackers use to “bring down” a server.
Virus Dissemination
• This category of criminal activity involves either direct or search
unauthorized access to computer system by introducing new programs
known as viruses, worms or logic bombs. The unauthorized modification
suppression or erasure of computer data or functions with the Internet to
hinder normal functioning of the system is clearly a criminal activity and is
commonly referred to as computer sabotage.
Computer forgery
• This happens when data is altered which is stored in documents that are in
computerized form. Computers however can also be used as instruments
for committing forgery. A new generation of fraudulent alteration or
duplication emerged when computerized color laser copies became
available.
Credit Card Fraud
• Modern business is quickly replacing cash with deposits transacted on
computer system creating computer fraud. Credit card information as well
as personal and financial information on credit card has been frequently
targeted by organized criminal crimes. Assets represented in data format
often have a considerably higher value than traditionally economic assets
resulting in potentially greater economic class.
Phishing
• Phishing, the mass distribution of “spoofed” e-mail messages, which
appear to come from banks, insurance agencies, retailers or credit card
companies and are designed to fool recipients into divulging personal data
such as account names, passwords, or credit card numbers.
Spoofing
• Getting one computer on a network to pretend to have the identity of
another computer, usually one with special access privileges , so as to
obtain access to the other computers on the network.
Cyber stalking
• Cyber stalking is a new form of internet crime in our society when a person is
pursued or followed online. A cyber stalker doesn’t physically follow his victim;
he does it virtually by following his online activity to harvest information about
the stalk and harass him or her and make threats using verbal intimidation. It’s
an invasion of one’s online privacy.
Threatening
• The criminal sends threatening email or comes in contact in chat rooms with
victim.
Salami attack
• In such crime criminal makes insignificant changes in such a manner that
such changes would go unnoticed.
• Criminal makes such program that deducts small amount like Rs. 2.50 per
month from the account of all the customer of the Bank and deposit the
same in his account. In this case no account holder will approach the bank
for such small amount but criminal gains huge amount.
Prevention of cyber crime
• Avoid disclosing your identity to any strangers.

• Always use latest antivirus software to guard against virus attacks.

• Never send your credit card number to any site which is not secured.

• Use of firewall

• Change passwords frequently

• Uninstall unnecessary software


Advantages and Disadvantages
Advantages:
• Improved security of cyberspace.
• Increase in cyber defense.
• Increase in cyber speed.
• Allows more options to save data.
• Better response time to national crisis.

Disadvantages:
• Improved hacker speed and ability.
• Interconnected computers.
• Improved viruses, malware and worms.
• Increase in “cyber warfare” possibly.
• More anonymity between hackers
Conclusion
The issue of network and Internet security has become increasingly more
important as more and more business and people go on-line. To avoid the
information from hackers we use the passwords secretly and we change
the passwords regularly. We cannot use our names, initials as passwords
that are easily traced. We should not download any executable files from
unknown sources, information from any sources without checking for
virus. We have to use licensed anti-virus software. Also teams like CERT
and FIRST assist in solving hacker attacks and to disseminate information
on security.
Reference
1.Gordon, Sarah (July 25, 2006). "On the definition and classification of
cybercrime" (PDF). Retrieved January 14, 2018.

2.Ammar Yassir, S. N. (2012). "Cybercrime: A threat to Network Security."


International Journal of Computer Science and Network Security

3.Árpád, I. (2013). "A Greater Involvement of Education in Fight Against


Cybercrime." Procedia - Social and Behavioral Sciences

4 ."Distributed Denial of Service Attack". csa.gov.sg. Archived from the original on


6 August 2016. Retrieved 12 November 2014.

5."Identifying Phishing Attempts". Case. Archived from the original on 13


September 2015.
Thank You

S-ar putea să vă placă și