cyber crime
DESCRIPTION
ppt on Cyber CrimeTRANSCRIPT
Cyber Crime
Introduction
What is Cyber Crime?“Unlawful acts wherein the computer is
either a tool or a target or both”
History
The case of 1820!. Joseph Marie. The Handloom machine Crime
Associated Technologies
Packet Sniffing
Password cracking
Buffer overflow
Basic Technology
Unauthorized Access Viruses E- Mail Crime Torjans
Passwd Torjans
Remote Admin Torjan
Classification
Financial crimes Sale of illegal articles Intellectual Property crimes Email spoofing Forgery
Architecture
ISP ISP
Attack Controller/Master Host
Attacker
Attack Agents
Attack Agents
Attack Agents
Attack Agents
Attack Agents
Victim
Working ModelCYBER SPACE
Main Boss issues the commands to the subordinates
Subordinate gets the information and plan.
And executes the Plan
Utilities
Smart Cards Password Revelers Wireless Technology Biometric Matchers
Application Domains
Email RelatedEmail spoofing Sending malicious codes through email Email bombing Sending threatening emails
Industry Relevance
Packet Sniffing Password Cracking Buffer overflow Viruses
Results:
1980 1985 1990 1995 2000
Self Replicating Code
PasswordGuessing
PasswordCracking
Exploiting Known Vulnerabilities
Disabling Audits
Back Doors
Hijacking Sessions
Sweepers
Sniffers
Packet Spoofing
Satan
Central exploit Repository
Macro Virus
Icmp Tunneling
Back Orifice
Stack overflow
Stealth Diagnostics
email Worms
NMAP
Conclusion
Who is affected by Cyber Crime? How to stop What we can Do?
Future of Cyber crime
Completely un predictable. WIRELESS Crimes Mobiles will become the common tool for
the cyber crime Kids just for fun may hack the whole CBI
architecture.
Thank you…Any queries ??