cyber crime_ss_cse-02

Upload: shalini-sharma

Post on 08-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/7/2019 cyber crime_ss_cse-02

    1/23

    PRESENTED BY:SHALINI SHARMA

    CSE-02GIMT

  • 8/7/2019 cyber crime_ss_cse-02

    2/23

    CONTENTSIntroductionReasons for Cyber CrimeCyber CriminalsModes and Manner of Committing Cyber CrimeTypes of Cyber CrimePreventionDetectionConclusion

  • 8/7/2019 cyber crime_ss_cse-02

    3/23

    INTRODUCTIONComputer crime or cybercrime, refers to anycrime that involves a computer and a network.The computer may have been used in the

    commission of a crime, or it may be the target.COMPUTER CRIME is any crime where Computer is a target.

    Computer is a tool of crimeComputer is incidental to crime

  • 8/7/2019 cyber crime_ss_cse-02

    4/23

  • 8/7/2019 cyber crime_ss_cse-02

    5/23

    CYBER CRIMINALS:The cyber criminals constitute of variousgroups/ category. This division may bejustified on the basis of the object that they

    have in their mind. The following are thecategory of cyber criminals

    1. Children and adolescents between the age

    group of 6 18 years2. Organised hackers3. Professional hackers / crackers

    4. Discontented employees

  • 8/7/2019 cyber crime_ss_cse-02

    6/23

    MODE AND MANNER OF

    COMMITING CYBER CRIME:1. Unauthorized access to computer systems or

    networks / Hacking

    2. Theft of information contained in electronicform-3. Email bombing

    4. Data diddling5. Salami attacks6. Denial of Service attack

  • 8/7/2019 cyber crime_ss_cse-02

    7/23

    MODE AND MANNER OF

    COMMITING CYBER CRIME:7. Virus / worm attacks8. Logic bombs

    9. Trojan attacks10. Internet time thefts11. Web jacking

  • 8/7/2019 cyber crime_ss_cse-02

    8/23

    TYPES OF CYBER CRIME

    Cyber Crime refers to all activities done withcriminal intent in cyberspace. These fall intothree slots. Those against persons. Against Business and Non-business

    organizations. Crime targeting the government

  • 8/7/2019 cyber crime_ss_cse-02

    9/23

    AGAINST INDIVIDUALSi. Harassment via e-mails.ii. Cyber-stalking.iii. Dissemination of obscene material.

    iv. Defamation.v. Unauthorized control/access over computer

    system

    vi. Indecent exposurevii. Email spoofingviii. Cheating & Fraud

  • 8/7/2019 cyber crime_ss_cse-02

    10/23

    AGAINST ORGANIZATION

    i. Unauthorized control/access over computer system

    ii. Possession of unauthorized informationiii. Computer vandalism.iv. Transmitting virus

    v. Distribution of pirated software etc.

  • 8/7/2019 cyber crime_ss_cse-02

    11/23

    Crime targeting the governmentA cyber terrorist is the person who uses the computer system as a means or ends to achieve the followingobjectives

    (1) putting the public or any section of the public in fear (2) affecting adversely the harmony between different

    religious, racial, language or regional groups or castesor communities; or

    (3) coercing or overawing the government establishedby law; or

    (4) endangering the sovereignty and integrity of the

    nation

  • 8/7/2019 cyber crime_ss_cse-02

    12/23

    PREVENTION

    Prevention is always better than cure. It isalways better to take certain precaution whileoperating the net. These may include:Preventive steps for IndividualsPreventive steps for Organizations andGovernment.

  • 8/7/2019 cyber crime_ss_cse-02

    13/23

    PREVENTIVE STEPS FOR

    INDIVIDUALSCHILDREN : Children should not give outidentifying information such as Name, Home address,School Name or Telephone Number in a chat room.PARENTS: Parent should use content filteringsoftware on PC to protect children from gambling,hate speech, emotional blackmail drugs and alcohol.G

    ENERAL INFORMATION: Dont delete harmfulcommunications (emails, chats etc). They willprovide vital information about system and address of the person behind these.

  • 8/7/2019 cyber crime_ss_cse-02

    14/23

    PREVENTIVE STEPS FOR

    ORGANISATIONS & GOVT.PHYSICAL SECURITY: Physical security is mostsensitive component, as prevention from cyber crimeComputer network should be protected from the access

    of unauthorized personsACCESS CONTROL: Access Control system isgenerally implemented using firewallsPASSWORD: The use of passwords in the mostcommon security for network system including servers,routers and firewallsFINDING THE HOLES IN NETWORK: System managersshould track down the holes before the intruders do.

  • 8/7/2019 cyber crime_ss_cse-02

    15/23

    PREVENTIVE STEPS FOR ORGANISATIONS & GOVT.

    USIN G NETWORK SCANNIN G PRO G RAMS:This utility scans and gathers information about anyhost on a network, regardless of which operating

    system or services the hosts were running.USIN G INTRUSION ALERT PRO G RAMS: Thereare some intrusion programs, which identify suspiciousactivity and report so that necessary action is taken.USIN G ENCRYPTION: Encryption allows sendingconfidential documents by E-mail or save confidentialinformation on laptop computers without having to fear that if someone steals it the data will become public.

  • 8/7/2019 cyber crime_ss_cse-02

    16/23

    DETECTIONSome of the Cyber Crimes like network Intrusion aredifficult to detect and investigation even though mostof crimes against individual like cyber stalking, cyber defamation can be detected and investigated throughfollowing steps:

    After receiving such type of mail :(1) Give command to computer to show full header of

    mail.(2) In full header find out the IP number and time of

    delivery of number and this IP number alwaysdifferent for every mail.

  • 8/7/2019 cyber crime_ss_cse-02

    17/23

    DETECTION

    From this IP number we can know who was theInternet service provider for that system from whichthe mail had come.

    (3) To know about Internet Service Provider from IPnumber take the service of search engine likenic.com, macffvisualroute.com, apnic.com, arin.com.

    (4) After opening the website of any of abovementioned search engine, feed the IP number andafter some time name of ISP can be obtained.

  • 8/7/2019 cyber crime_ss_cse-02

    18/23

    DETECTION

    (5) After getting the name of ISP we can get theinformation about the sender from the ISP bygiving them the IP number, date and time of sender.

    (6) ISP will provide the address and phonenumber of the system, which was used to sendthe mail with bad intention.

  • 8/7/2019 cyber crime_ss_cse-02

    19/23

    OTHER PREVENTIVE MEASURES1. Avoid disclosing any information pertaining

    to oneself. This is as good as disclosing your identity to strangers in public place.

    2. always avoid sending any photograph onlineparticularly to strangers and chat friends

    3. always use latest and up date anti virus

    software.4. always keep back up volumes5. never send your credit card number to any

    site that is not secured

  • 8/7/2019 cyber crime_ss_cse-02

    20/23

    OTHER PREVENTIVE MEASURES

    6. always keep a watch on the sites that your children are accessing.

    7. it is better to use a security programme that gives

    control over the cookies and send informationback to the site8. web site owners should watch traffic and check

    any irregularity on the site.

    9. use of firewalls may be beneficial.10.web servers running public sites must bephysically separate protected from internalcorporate network.

  • 8/7/2019 cyber crime_ss_cse-02

    21/23

    CONCLUSIONCyber crime is a multi-billion dollar problem.It is criminals activity committed on internet.This is a broad term that describes everything from

    electronic cracking to denial of service attacks thatcause electronic commerce sites to loss moneyIt is not possible to eliminate cyber crime from the

    cyber space. But it is quite possible to check them

    The possible step is to make people aware of their rights and duties and further making the applicationof the laws more stringent to check crime.

  • 8/7/2019 cyber crime_ss_cse-02

    22/23

    ANY QUERY

  • 8/7/2019 cyber crime_ss_cse-02

    23/23