cyber crimes & cyber war

Upload: payara111

Post on 07-Apr-2018

257 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/4/2019 Cyber Crimes & Cyber War

    1/27

    Cyber Crimes & Cyber

    war

  • 8/4/2019 Cyber Crimes & Cyber War

    2/27

    Cyber Crimes

    Any criminal activity that uses a computereither as an instrumentality, target or ameans for perpetuating further crimescomes within the ambit of cyber crime

  • 8/4/2019 Cyber Crimes & Cyber War

    3/27

    Another Definition

    It is a criminal activity committed on theinternet. This is a broad term that describeseverything from electronic cracking to denialof service attacks that cause electronic

    commerce sites to lose money.

  • 8/4/2019 Cyber Crimes & Cyber War

    4/27

    What is Cyber Crime?

    Crimes where a computer is the target of the

    crime,

    Crimes where a computer is a tool of the

    crime, and

    Crimes where a computer is incidental to the

    commission of the crime.

  • 8/4/2019 Cyber Crimes & Cyber War

    5/27

    Characteristics of Cyber Crime

    Silent in NatureGlobal in character

    Non existence of Physical Evidence

    Creates high Impact

    High Potential and Easy to Perpetrate

  • 8/4/2019 Cyber Crimes & Cyber War

    6/27

    Categories of Cyber Crimes

    Cyber crimes against persons.

    Cyber crimes against property.

    Cyber crimes against government.

  • 8/4/2019 Cyber Crimes & Cyber War

    7/27

    CYBER CRIMES ARE

    NEITHER FORWARD..NOR BACKWARD..

    BUT AWKWARD:

  • 8/4/2019 Cyber Crimes & Cyber War

    8/27

    Cybercrimes against persons

    Cybercrimes committed against personsinclude various crimes

    Transmission of pornography Harassment of any one The trafficking, distribution, posting, and

    dissemination of X-rated material Threats to some ones privacy

  • 8/4/2019 Cyber Crimes & Cyber War

    9/27

    Cybercrimes against property

    The second category of Cyber-crimes is thatof Cybercrimes against all forms of property.

    These crimes include computer vandalism(destruction of others' property),transmission of harmful programs.

    Threats to hardware and data

  • 8/4/2019 Cyber Crimes & Cyber War

    10/27

    Cybercrimes againstgovernment

    Cyber terrorism Attack on Govt. web sites

    Attack on Military web sites Cyberspace individuals and groups to threaten the

    international governments "cracks" into a government or military

    maintained website.

  • 8/4/2019 Cyber Crimes & Cyber War

    11/27

    2000 2001 2002 2003 20040

    2

    4

    6

    8

    10

    12

    CYBERCRIME GRAPH

  • 8/4/2019 Cyber Crimes & Cyber War

    12/27

    Cyber War

    Defination

    actions by a nation-state to penetrateanother nation's computers or

    networks for the purposes of causing

    damage or disruption.

  • 8/4/2019 Cyber Crimes & Cyber War

    13/27

    Cyber War

    Pentagon has formally recognizedcyberspace as a new domain in warfare

    critical to military operations as land, sea,air, and space.

    China has plans of winning informationised

    wars by the mid-21st century

  • 8/4/2019 Cyber Crimes & Cyber War

    14/27

    Countries at the top

    countries are likewise organizing for cyberwar, among them are Russia, Israel and

    North Korea

    Iran claims of having the worlds second-largest cyber-army.

    U.S. has a severe shortage of computersecurity specialists

  • 8/4/2019 Cyber Crimes & Cyber War

    15/27

    only about 1,000 qualified people in thecountry

    but needs a force of 20,000 to 30,000skilled experts

    Pakistan ????

  • 8/4/2019 Cyber Crimes & Cyber War

    16/27

    CYBER FORENSICS &TECHNOLOGY

    CYBER FORENSICSCAN BE AN EFFECTIVE TOOL

  • 8/4/2019 Cyber Crimes & Cyber War

    17/27

    CYBER FORENSICS IS

    The unique process of identifying,preserving, analyzing and presentingdigital evidence in a manner that islegally accepted.

  • 8/4/2019 Cyber Crimes & Cyber War

    18/27

    MULTI DIMENSIONALCHALLENGE

    TECHNICAL

    OPERATIONALSOCIAL

    LEGAL

  • 8/4/2019 Cyber Crimes & Cyber War

    19/27

    TECHNICAL

    TECHNOLOGY IS CHANGING RAPIDLY

    CYBER CRIMES ARE ALSO CHANGINGRAPIDLY

    SYSTEMS AND CRIMES EVOLVE MORERAPIDLY THAN THE TOOLS THAT EXAMINE

    THEM

  • 8/4/2019 Cyber Crimes & Cyber War

    20/27

    TECHNOLOGY

    EVOLUTION

    OBSOLESENCE

    NEWERDEVICES

    NEWTOOLS

    NEWMETHODOLOGIES

  • 8/4/2019 Cyber Crimes & Cyber War

    21/27

    OPERATIONAL

    ALL DATA MUST BE GATHERED AND EXAMINEDFOR EVIDENCE

    GIGABYTES OF DATA PROBLEMS OF

    STORAGE ANALYSIS PRESENTATION..

    NO STANDARD SOLUTION AS YET

  • 8/4/2019 Cyber Crimes & Cyber War

    22/27

    SOCIAL

    IT RESULTS IN

    UNCERTAINITIES ABOUT EFFECTIVENESSOF CURRENT INVESTIGATION TECHNIQUES

    SUB OPTIMAL USE OF RESOURCES

    PRIVACY CONCERNS

  • 8/4/2019 Cyber Crimes & Cyber War

    23/27

    LEGAL

    USE & BOUNDS OF DIGITAL EVIDENCE INLEGAL PROCEDURES STILL UNCLEAR

    CURRENT TOOLS & TECHNIQUES NOTRIGOROUSLY USED / CONTESTED INCOURT

  • 8/4/2019 Cyber Crimes & Cyber War

    24/27

  • 8/4/2019 Cyber Crimes & Cyber War

    25/27

    PROTECT YOUR COMPUTERS!

    Use anti-virus software and firewalls - keep them up tofirewalls - keep them up to date

    Keep your operating system up to date with criticalsecurity updates and patches

    Don't open emails or attachments from unknown source

    Don't share access to your computers with strangers

    If you have a Wi-Fi network, password protect it

    Disconnect from the Internet when not in use

  • 8/4/2019 Cyber Crimes & Cyber War

    26/27

    "The modern thief can stealmore with a computer than

    with a gun. Tomorrow'sterrorist may be able to domore damage with a keyboardthan with a bomb".

    National Research Council

  • 8/4/2019 Cyber Crimes & Cyber War

    27/27

    Questions??

    Click to edit Master text stylesSecond level Third level Fourth level Fifth level