why learn about cyber crime

29
CYBER CRIMES AND FRAUDS, CYBER LAWS, CYBER CRIMES AND FRAUDS, CYBER LAWS, TYPES AND TOOLS OF HACKING TYPES AND TOOLS OF HACKING Submitted to: Submitted to: Submitted by Submitted by : : Prof.Bhavna Sharma Prof.Bhavna Sharma Manish Kaushal Manish Kaushal Rashmi Thakur Rashmi Thakur Roopal Tyagi Roopal Tyagi Abhijeet Pathak Abhijeet Pathak

Upload: ruchi-katare

Post on 08-Apr-2015

267 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Why Learn About CYBER CRIME

CYBER CRIMES AND FRAUDS, CYBER LAWS, CYBER CRIMES AND FRAUDS, CYBER LAWS, TYPES AND TOOLS OF HACKING TYPES AND TOOLS OF HACKING

Submitted to:Submitted to: Submitted bySubmitted by: :

Prof.Bhavna Sharma Manish KaushalProf.Bhavna Sharma Manish Kaushal Rashmi ThakurRashmi Thakur Roopal Tyagi Roopal Tyagi Abhijeet PathakAbhijeet Pathak

Page 2: Why Learn About CYBER CRIME
Page 3: Why Learn About CYBER CRIME

What is computer crime?What is computer crime?

All crimes preformed or resorted to by abuse All crimes preformed or resorted to by abuse of electronic media or otherwise, with the of electronic media or otherwise, with the purpose of influencing the functioning of purpose of influencing the functioning of computer or computer system.computer or computer system.

Computer crime is a crime where:Computer crime is a crime where: Computer is a target.Computer is a target. Computer is a tool of crime.Computer is a tool of crime. Computer is incidental to crime. Computer is incidental to crime.

Page 4: Why Learn About CYBER CRIME

Why learn about CYBERWhy learn about CYBER CRIME?CRIME?

BECAUSE-BECAUSE-

Everybody is using COMPUTERS.Everybody is using COMPUTERS.

From white collar criminals to terrorist From white collar criminals to terrorist organizations organizations and from teenagers to adults.and from teenagers to adults.

Conventions crime like forgery, extortion, Conventions crime like forgery, extortion, kidnapping etc. are being committed with kidnapping etc. are being committed with the help of computers.the help of computers.

MOST IMPORTANT-Monetary transactions MOST IMPORTANT-Monetary transactions are moving on the internet.are moving on the internet.

Page 5: Why Learn About CYBER CRIME

Profile of cyber criminalProfile of cyber criminal

Disgusted employees.Disgusted employees.

TeenagersTeenagers

Political hactivist.Political hactivist.

Professional hackers.Professional hackers.

Business rivals.Business rivals.

Ex-boyfriend/girlfriend.Ex-boyfriend/girlfriend.

Divorced husbands.Divorced husbands.

Page 6: Why Learn About CYBER CRIME

Who are the victims?Who are the victims?

Gullible.Gullible.

Greedy people.Greedy people.

Unskilled and inexperienced.Unskilled and inexperienced.

Unlucky people.Unlucky people.

Page 7: Why Learn About CYBER CRIME

Computers crimes are vulnerableComputers crimes are vulnerable

These are because of:These are because of:

AnonymityAnonymity

Computer’s storage capacity.Computer’s storage capacity.

Weakness in operating system.Weakness in operating system.

Lack of awareness of user.Lack of awareness of user.

Page 8: Why Learn About CYBER CRIME

Types of cyber crimesTypes of cyber crimesHackingHackingDenial of service attack.Denial of service attack.Virus dissemination.Virus dissemination.Software piracy.Software piracy.Pornography.Pornography.IRC crime.IRC crime.Credit card fraud.Credit card fraud.Phishing.Phishing.Spoofing.Spoofing.

Page 9: Why Learn About CYBER CRIME

Cont……Cont……

Net extortion.Net extortion.

Cyber stalking.Cyber stalking.

Cyber defamation.Cyber defamation.

Salami attack.Salami attack.

Threatening.Threatening.

Page 10: Why Learn About CYBER CRIME

1] Hacking1] HackingHacking is a simple term means illegal Hacking is a simple term means illegal intrusion into a computer system without intrusion into a computer system without the permission of the owner/user.the permission of the owner/user.

2] Virus dissemination2] Virus disseminationMalicious software that attaches itself to Malicious software that attaches itself to other software.other software.

(virus, worms, trojan horse, logic bomb, (virus, worms, trojan horse, logic bomb, etc…)etc…)

Page 11: Why Learn About CYBER CRIME

3] Denial of service attack3] Denial of service attack

This is an act by the criminal, who This is an act by the criminal, who floods the bandwidth of the victim’s floods the bandwidth of the victim’s network of fills his e-mail box with network of fills his e-mail box with spam mail depriving him of the spam mail depriving him of the services he is entitled to access or services he is entitled to access or provide.provide.

Page 12: Why Learn About CYBER CRIME

4] Software piracy4] Software piracy

Theft of software through the illegal Theft of software through the illegal copying of genuine programs.copying of genuine programs.

Retail revenue losses worldwide are Retail revenue losses worldwide are ever increasing due to this crime.ever increasing due to this crime.

Can be done in various ways like- Can be done in various ways like- hard disk loading, illegal downloads hard disk loading, illegal downloads from the internet, etc..from the internet, etc..

Page 13: Why Learn About CYBER CRIME

5] Pornography5] PornographyPornography is first successful e-Pornography is first successful e-commerce product.commerce product.Anybody including children can log Anybody including children can log on to the internet and access on to the internet and access websites with pornographic contents websites with pornographic contents with a click of a mouse.with a click of a mouse.Publishing any material in electronic Publishing any material in electronic form which is lascivious is offence form which is lascivious is offence under the provision of section 67 I.T. under the provision of section 67 I.T. Act-2000.Act-2000.

Page 14: Why Learn About CYBER CRIME

6] IRC Crime6] IRC CrimeInternet Relay Chat (IRC) servers have Internet Relay Chat (IRC) servers have chat rooms wherein people from any part chat rooms wherein people from any part of the world can come together and chat of the world can come together and chat with each other.with each other.Hackers use it for discussing their Hackers use it for discussing their techniques.techniques.Cyber stalking- in order to harass a woman Cyber stalking- in order to harass a woman her telephone no. is given to others if she her telephone no. is given to others if she wants to have a boyfriends.wants to have a boyfriends.Paeodohiles use chat rooms to allure small Paeodohiles use chat rooms to allure small children.children.

Page 15: Why Learn About CYBER CRIME

7] Credit card frauds7] Credit card frauds

We simply have to type credit card We simply have to type credit card no. into www page of the vendor for no. into www page of the vendor for online transactions. online transactions.

If electronic transaction are not If electronic transaction are not secured then the credit cards no. can secured then the credit cards no. can be stolen by the hackers who can be stolen by the hackers who can misuse the card.misuse the card.

Page 16: Why Learn About CYBER CRIME

8] Net extortion8] Net extortionCopying the company’s confidential data Copying the company’s confidential data in order to extort company for huge in order to extort company for huge amount.amount.

9] Phishing9] PhishingIt is the technique of pulling out It is the technique of pulling out confidential information from the bank or confidential information from the bank or financial institutional account holder by financial institutional account holder by deceptive means.deceptive means.

Page 17: Why Learn About CYBER CRIME

CYBER LAWSCYBER LAWSo CYBER LAW IS A SYSTEM OF CYBER LAW IS A SYSTEM OF

REGULATIONS FOR THE ELECTRONIC REGULATIONS FOR THE ELECTRONIC USSAGE OF THE INTERNET.USSAGE OF THE INTERNET.

o SIMPLY SPEAKING ELECTRONIC SIMPLY SPEAKING ELECTRONIC CYBER LAW IS A GENERIC TERM CYBER LAW IS A GENERIC TERM WHICH REFERS TO ALL LEGAL & WHICH REFERS TO ALL LEGAL & REGULATORY ASPECTS OF THE REGULATORY ASPECTS OF THE INTERNET , WORLDS TRANSACTION INTERNET , WORLDS TRANSACTION SYSTEM & ELECTRONIC COMMERCE SYSTEM & ELECTRONIC COMMERCE

Page 18: Why Learn About CYBER CRIME
Page 19: Why Learn About CYBER CRIME

THE NEED OF ELECTRONIC THE NEED OF ELECTRONIC CYBER LAWCYBER LAW

DUE TO ANONYMOUS MATURE OF DUE TO ANONYMOUS MATURE OF THE INTERNET, IT IS POSSIBLE TO THE INTERNET, IT IS POSSIBLE TO ENGAGE INTO A VARIETY OF ENGAGE INTO A VARIETY OF CRIMINAL ACTIVITIES GROSSLY CRIMINAL ACTIVITIES GROSSLY MISUSING THIS ASPECT OF THE MISUSING THIS ASPECT OF THE INTERNET TO PERPETUATE CRIME INTERNET TO PERPETUATE CRIME ECSPECIALLY IN E-COMMERCE, SPAM ECSPECIALLY IN E-COMMERCE, SPAM & MONEY TRANSACTION USING THE & MONEY TRANSACTION USING THE ONLINE BANKING SERVICES.ONLINE BANKING SERVICES.

Page 20: Why Learn About CYBER CRIME

CYBER LAW IN INDIACYBER LAW IN INDIA

In India the Information Technology In India the Information Technology

Act, 2000 is the Mother Legislation Act, 2000 is the Mother Legislation

that deals with issues related to use that deals with issues related to use

of computers, computer systems , of computers, computer systems ,

computer networks and the Internet.computer networks and the Internet.

Page 21: Why Learn About CYBER CRIME
Page 22: Why Learn About CYBER CRIME

HACKINGHACKINGThere are many definitions of hacking such There are many definitions of hacking such

as:as:

A person who practices hacking is called a A person who practices hacking is called a hacker.hacker.

Hacking can be just to find out how it Hacking can be just to find out how it works without criminal intent.works without criminal intent.

Hacking can be simply to crack a code.Hacking can be simply to crack a code.

A hacker can be breaking into a computers A hacker can be breaking into a computers that is yours, often not wanted, now that is yours, often not wanted, now prohibited by law.prohibited by law.

Page 23: Why Learn About CYBER CRIME

Types of hackingTypes of hacking

Inside jobs.Inside jobs.

Rogue access points.Rogue access points.

Back doors.Back doors.

Viruses and worms.Viruses and worms.

Trojan horses.Trojan horses.

Denial of services.Denial of services.

Anarchists, crackers and kiddies.Anarchists, crackers and kiddies.

Page 24: Why Learn About CYBER CRIME

1] Inside jobs1] Inside jobsThese includes stealing passwords which These includes stealing passwords which hackers then sell or use, causing harm and hackers then sell or use, causing harm and committing simple misuses.committing simple misuses.

2] Rogue access points2] Rogue access points

These are unsecured wireless access These are unsecured wireless access points that outsiders can easily breech. points that outsiders can easily breech. Local hackers often advertise rogue AP’s Local hackers often advertise rogue AP’s to each other. to each other.

Page 25: Why Learn About CYBER CRIME

3] Back door3] Back door

Hackers can gain access to a Hackers can gain access to a network by exploiting back doors network by exploiting back doors through administrative shortcuts, through administrative shortcuts, configuration errors, easily configuration errors, easily deciphered passwords and deciphered passwords and unsecured dial-ups. With the aid of unsecured dial-ups. With the aid of computerized searchers, hackers can computerized searchers, hackers can easily find any weakness in your easily find any weakness in your computer.computer.

Page 26: Why Learn About CYBER CRIME

4] Worms and viruses4] Worms and viruses

These are self replicating programs These are self replicating programs that attach themselves to other that attach themselves to other programs (viruses) and machines programs (viruses) and machines (worms). These viruses and worms (worms). These viruses and worms attempt to shut down network by attempt to shut down network by flooding them with massive amount flooding them with massive amount of bogus traffic, usually through e-of bogus traffic, usually through e-mail.mail.

Page 27: Why Learn About CYBER CRIME

5] Trojan horses5] Trojan horsesThese are the leading cause of all break-These are the leading cause of all break-ins. When a user downloads Trojan horse, ins. When a user downloads Trojan horse, the hacked software kicks off the virus, the hacked software kicks off the virus, passwords which gives the hacker the passwords which gives the hacker the control of the PC.control of the PC.

6] Denial of services6] Denial of servicesThese gives hacker to bring down the These gives hacker to bring down the network without gaining internet access. network without gaining internet access. These attacks from multiple sources. It is These attacks from multiple sources. It is difficult to block because it uses multiple, difficult to block because it uses multiple, changing, source IP addresses. changing, source IP addresses.

Page 28: Why Learn About CYBER CRIME

7] Anarchists, crackers & kiddies7] Anarchists, crackers & kiddies

Anarchists are people who just break Anarchists are people who just break stuff. They usually exploit the any stuff. They usually exploit the any target of opportunity.target of opportunity.

Crackers are professional who break Crackers are professional who break passwords and develop Trojan passwords and develop Trojan horses.horses.

Kiddies are not real hackers. They Kiddies are not real hackers. They are “wanna-be” hackers.are “wanna-be” hackers.

Page 29: Why Learn About CYBER CRIME