cyber crime - akr

15
CYBER CRIME Arun Kumar Rajput

Upload: arun

Post on 18-Jan-2016

19 views

Category:

Documents


3 download

DESCRIPTION

Cyber crime

TRANSCRIPT

Page 1: Cyber Crime - AKR

CYBER CRIME Arun Kumar Rajput

Page 2: Cyber Crime - AKR
Page 3: Cyber Crime - AKR

Definition

• Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs

• It’s an unlawful act wherein the computer is either a tool or a target

or both.

Page 4: Cyber Crime - AKR

First occurrence

•The first spam email took place in 1978 when it was sent out over the Arpanet (Advanced Research Projects Agency Network).

•The first virus was installed on an Apple computer in 1982 when a high school student, Rich Skrenta, developed the Elk cloner.

Page 5: Cyber Crime - AKR

Categories

•Cyber crimes against persons.

•Cyber crimes against property.

•Cyber crimes against government.

• Cyber crimes against society.

Page 6: Cyber Crime - AKR

Weapons

•Hacking:

•Unauthorized access to any computer systems or networks is known as ‘HACKING’. That is accessing the information of others without proper authorization.

•Data diddling:

•This is altering raw data just before a computer processes it and then changing it back after the processing is completed.

•Denial of Service attack:

•The computer is flooded with more requests than it can handle which cause it to crash. Distributed Denial of Service (DDOS) attack is a example.

Conti…

Page 7: Cyber Crime - AKR

Weapons •Email bombing:

•It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately

resulting into crashing.

•Trojan attacks:

•This term has its origin in the word ‘Trojan horse’. In software field this means an unauthorized program, which passively gains control over another’s computer by representing itself as an authorized program. The most common form of installing a Trojan is through e-mail.

•Web jacking:

• This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the website of another. He may even manipulate or change the information of the website. This may be done for fulfilling political objectives or for money.

Conti…

Page 8: Cyber Crime - AKR

Weapons

•Virus/ Worm Attacks:

•Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on the computer’s memory.

•Salami attacks:

•This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed.

Conti…

Page 9: Cyber Crime - AKR

Weapons

•Phishing:

•Phishing refers to the receipt of unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason. The fraudster then has access to the customer’s online bank account and to the funds contained in that account.

•Spamming:

•Electronic spamming is the use of electronic messaging systems to send unsolicited bulk messages (spam), especially advertising, indiscriminately. The most widely recognized form of spam is e-mail spam.

•Cyber Stalking:

•Cyber stalking is the use of the internet or other electronic means to stalk someone. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly.

Page 10: Cyber Crime - AKR

Cyber crimes against persons

•Harassment via E-Mails

•Hacking

•E-Mail / SMS Spoofing

•Carding

•Assault by Threat

Page 11: Cyber Crime - AKR

Cyber crimes against property

•Intellectual Property Crimes

•Cyber Squatting

•Cyber Vandalism

•Transmitting Virus

•Internet Time Thefts

Page 12: Cyber Crime - AKR

Cyber crimes against government •Cyber Terrorism:

Cyber Terrorism is a phrase used to describe the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.

Examples • Hacking into computer systems. • Introducing viruses to vulnerable networks. • Website Defacing. • Denial-of-Service(DoS) attacks. • Terroristic threats made via e-mail.

Page 13: Cyber Crime - AKR

Cyber crimes Against Society

•Cyber Trafficking

•Online Gambling

•Forgery

Page 14: Cyber Crime - AKR

Safety Tips to avoid •Use antivirus software and firewalls –keep them up to date.

•Keep your operating systems up to date with critical security updates and patches.

•Don’t open emails or attachments from unknown sources.

•Read Privacy policy carefully when you submit the data through internet.

•Disable Remote Connectivity.

•Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist.

•Back-up your computer data on disks or CDs often.

Page 15: Cyber Crime - AKR

Thank you!!!