cyber crime

14

Click here to load reader

Upload: shriram-desai

Post on 14-May-2015

451 views

Category:

Technology


0 download

DESCRIPTION

ppt on Cyber Crime

TRANSCRIPT

Page 1: Cyber crime

Cyber Crime

Page 2: Cyber crime

Introduction

What is Cyber Crime?“Unlawful acts wherein the computer is

either a tool or a target or both”

History

The case of 1820!. Joseph Marie. The Handloom machine Crime

Page 3: Cyber crime

Associated Technologies

Packet Sniffing

Password cracking

Buffer overflow

Page 4: Cyber crime

Basic Technology

Unauthorized Access Viruses E- Mail Crime Torjans

Passwd Torjans

Remote Admin Torjan

Page 5: Cyber crime

Classification

Financial crimes Sale of illegal articles Intellectual Property crimes Email spoofing Forgery

Page 6: Cyber crime

Architecture

ISP ISP

Attack Controller/Master Host

Attacker

Attack Agents

Attack Agents

Attack Agents

Attack Agents

Attack Agents

Victim

Page 7: Cyber crime

Working ModelCYBER SPACE

Main Boss issues the commands to the subordinates

Subordinate gets the information and plan.

And executes the Plan

Page 8: Cyber crime

Utilities

Smart Cards Password Revelers Wireless Technology Biometric Matchers

Page 9: Cyber crime

Application Domains

Email RelatedEmail spoofing Sending malicious codes through email Email bombing Sending threatening emails

Page 10: Cyber crime

Industry Relevance

Packet Sniffing Password Cracking Buffer overflow Viruses

Page 11: Cyber crime

Results:

1980 1985 1990 1995 2000

Self Replicating Code

PasswordGuessing

PasswordCracking

Exploiting Known Vulnerabilities

Disabling Audits

Back Doors

Hijacking Sessions

Sweepers

Sniffers

Packet Spoofing

Satan

Central exploit Repository

Macro Virus

Icmp Tunneling

Back Orifice

Stack overflow

Stealth Diagnostics

email Worms

NMAP

Page 12: Cyber crime

Conclusion

Who is affected by Cyber Crime? How to stop What we can Do?

Page 13: Cyber crime

Future of Cyber crime

Completely un predictable. WIRELESS Crimes Mobiles will become the common tool for

the cyber crime Kids just for fun may hack the whole CBI

architecture.

Page 14: Cyber crime

Thank you…Any queries ??