Sunteți pe pagina 1din 16

CYBER CRIME

INTRODUCTION TO CYBER CRIME


Crime, E-crime, Hi-tech Crime Or Electronic Crime Is Where A Computer Is The Target Of A Crime Or Is The Means Adopted To Commit A Crime.

Most of these Crimes are not new. Criminals simply devise different ways to undertakeStandard Criminal Activities such as Fraud, Theft, Blackmail, Forgery and Embezzlement using the New Medium, Often Involving the Internet.

TYPES OF CYBER CRIMES


Credit card frauds Cyber pornography

Sale of illegal articles-narcotics, weapons, wildlife Online gambling , Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code

Email spoofing Forgery

Defamation
Cyber stalking (section 509 IPC) Phishing Cyber terrorism

CYBER THREAT EVOLUTION


Virus
Malicious Code (Melissa)
Identity Theft (Phishing)

Breaking Web Sites

Advanced Worm / Trojan (I LOVE YOU)

Organised Crime Data Theft, DoS / DDoS

1977

1995

2000

2003-04

2005-06

2007-08

CYBER CRIME IN INDIA

Frequency of incidents of Cyber crimes in India


Denial of Service: Section 43 Virus: Section: 66, 43 Data Alteration: Sec. 66 U/A Access : Section 43 Email Abuse Sec. 67, : 500, Other IPC Sections Data Theft : Sec 66, 65

NO. OF INDIAN WEB-SITES DEFACED

8000 7000 6000 5000 4000 3000 2000 1000 0 1998 1999 2000 441 1002 2219

7039

2001

NUMBER OF INDIAN SITES HACKED

25 20 15 10 6 5 0 0 1998

25

12

1999

2000

2001

What is India incs biggest threat?


Cyber crime is now a bigger threat to India Inc than physical crime. In a recent survey by IBM, a greater number of companies (44%) listed cyber crime as a bigger threat to their profitability than physical crime (31%). The cost of cyber crime stems primarily from loss of revenue, loss of market capitalisation, damage to the brand, and loss of customers, in that order. About 67% local Chief Information Officers (CIOs) who took part in the survey perceived cyber crime as more costly, compared to the global benchmark of 50%.

REPORTED CASES
State versus Amit Pasari and Kapil Juneja Delhi Police
M/s Softweb Solutions Website www.go2nextjob.com hosted Complaint of hacking by web hosting service

State versus Joseph Jose


Delhi Police
Hoax Email - Purported planting of 6 bombs in Connaught Place

State versus Aneesh Chopra Delhi Police


Three company websites hacked Accused: An ex -employee State versus K R Vijayakumar
Bangalore Cyber Crime Police Station, 2001

Criminal intimidation of employers and crashing the companys server Phoenix Global solutions

Combating Cyber crime-Indian legal framework

Security Policy, Compliance and Assurance Legal Framework


IT Act, 2000 IT (Amendment) Bill, 2006 Data Protection & Computer crimes Best Practice ISO 27001 Security Assurance Framework- IT/ITES/BPO Companies

Security Incident Early Warning & Response CERT-In National Cyber Alert System

Information Exchange with international CERTs Skill & Competence development Training of law enforcement agencies and judicial officials in the collection and analysis of digital evidence Training in the area of implementing information security in collaboration with Specialised Organisations in US Domain Specific training Cyber Forensics Network Monitoring Biometric Authentication Network Security

Capacity building

Setting up Digital Forensics Centres

Research and Development


International Collaboration

Challenges faced by Law Enforcement


Awareness: Technology is changing very rapidly. So does the increase in Cyber crimes, No proper awareness shared with regard to crime and latest tools. People are so ignorant that makes it effortless for cyber criminals to attack. People fear to report crimes and some crimes are not properly recorded. The reason behind this is that the victim is either scared of police harassment or wrong media publicity. For minority and marginalised groups who already bear the brunt of media bias, reporting online harassment to the police may simply draw further unwanted attention. The public is not aware of the resources and services that law enforcement could provide them if being a victim of crime or witness. Technical Issues: Large amount of storage space required for storing the imaged evidences and also for storing retrieved evidence after analysis. Retrieved evidence might contain documents, pictures, videos and audio files which takes up a lot of space. Technical issues can further be categorised into software and hardware issues.

Global Issues: Most of the IP addresses retrieved during investigation leads to servers or computers located abroad which have no identity, hence further investigations are blocked and closed. Correspondence with bodies such as Google, Yahoo, Hotmail is quite time consuming and prolong the investigations.
Recently China has been manufacturing mobile phones that have cloned IME numbers which is a current challenge faced in Mobile forensics. Wireless or Wi-Fi, Bluetooth, Infrared Issues: Latest wireless technologies which provide internet connections causes exploitation especially when it is not secured. This is the present technology terrorists and radical activists exploit. This is another vulnerability that law enforcement faces.

Current and Emerging Cyber Forensic Tools of Law Enforcement

Think bef

Think before you click!!!

THANK YOU

QUERIES!!!!!!!

S-ar putea să vă placă și