You are on page 1of 21

Foundation Of

Information Technology

Presented By:

Fatima Attari
R.N. 19(A)
I.T. Sem-III
CONTENTS
1. Introduction
2. History
3. Forms of Cyber Crime
 Hacking
 Computer Viruses
 Phishing
 Denial of Service Attack
4. Dealing With Cyber Crime
5. The Information Technology Act 2000
6. Precautions
7. Where to go
8. Conclusion
9. Bibliography
INTRODUCTION
 The word cyber and its relative dotcom are the most
common terminologies of the modern era.

 Cyber Crime may be defined as “any crime with the


help of computer and telecommunication
technology”, with the purpose of influencing the
functioning of computer or the computer systems.

 The extent of loss is estimated that about 500 million


people who use the Internet can be affected by the
emergence of cyber crimes.
HISTORY - Where it all began ?
 Cyber crime is an evil having its origin in the growing
dependence on computers in modern life.

 Major cyber crimes in the recent past include the


Citibank rip off. US $ 10 million were fraudulently
transferred out of the bank and into a bank account in
Switzerland.

 A Russian hacker group led by Vladimir Kevin, a


renowned hacker, perpetrated the attack.
FORMS OF CYBER CRIME
 HACKING

 COMPUTER VIRUSES

 PHISHING

 DENIAL OF SERVICE ATTACK


1. HACKING
 The intent to cause wrongful damage to the public or any
person destroys or alters any information residing in a
computer resource or diminishes its value or utility or affects
it injuriously by any means commits hacking".

 A Hacker is a person who breaks in or


trespasses a computer system.

 Hacker, is highly computer literate,


especially in terms of programming.
HACKING
• Black hat hacker, a hacker
who commits criminal
intrusions into
technological systems for
some real or perceived gain

• White hat hacker, those


who attempt to break
into systems or networks
in order to help the
owners of the system by
making them aware of
security flaws, etc.
2. COMPUTER VIRUSES

 Computer viruses are software programs


deliberately designed to
1. interfere with computer operation
2. corrupt, or delete data
3. slowing down the processes
They spread themselves to other computers
and throughout the Internet,
Computer viruses - TYPES

COMPUTER
VIRUSES

FILE INFECTING BOOT SECTOR TROJAN


WORMS
VIRUS VIRUSES VIRUSES
CATEGORIES OF COMPUTER VIRUS
1.File Infecting Viruses 2. Boot-Sector Viruses

 It attaches itself to an  It replace the information in


executable program file by the hard disk's boot sectors
adding its own code to the with its own code.
file .
 The virus code is usually  When a computer is infected
added in such a way that it with a boot-sector virus, the
escapes detection and usually virus' code is read into
have a .COM, .EXE, or .SYS memory before anything else.
extension.
 Once the virus is in memory,
 Damage to data can occur it can replicate itself onto any
when the virus is triggered. other disks that are used in the
. infected computer
CATEGORIES OF COMPUTER VIRUS

3. Trojan Horse disguises itself 4. A Worm is an independent


as a legitimate program such program that replicates itself,
as a game or utility, but once it crawling from machine to
is executed, it can destroy or machine across network
scramble data. connections.

 A Trojan horse program can  It often clogs networks as it


contain viruses, but is not a spreads, often via e-mail.
virus itself.
3. PHISHING
 In computing, Phishing is a form of criminal activity
using social engineering techniques.

 Phishers attempt to fraudulently acquire sensitive


information, such as passwords and credit card details,
by masquerading as a trustworthy person or business in
an electronic communication.

 Phishing is typically carried out using email or an instant


message.
4. DENIAL OF SERVICE ATTACK
 An assault on a network that floods it with so many
additional requests that regular traffic is either slowed or
completely interrupted.

 EXAMPLE : Hackers Caused a Denial of Service


Computers with high-speed connections to the Internet were
hacked and planted with illicit programs that, when
activated, sent out an unending number of requests and
caused a denial of service at Yahoo!, eBay, Amazon.com
and other Web sites during the second week of February
2000.
CYBER CRIME

FINANCIAL ABUSEMENT
COMPUTER VIRUS
FRAUD 8%
4%
PHISHING DENIAL OF SERVICE
7% ATTACK

COMPUTER UNAUTHORISED
ACCESS
VIRUS
UNAUTHORISE PHISHING
48%
D ACCESS
14%
FINANCIAL FRAUD

ABUSEMENT
DENIAL OF
SERVICE
ATTACK
19%
DEALING WITH CYBERCRIME
 Internet firewall is a piece of software or hardware that helps screen
out hackers, viruses, and worms that try to reach your computer
over the Internet

 Antivirus software is a program that helps protect your computer


against most viruses, worms, Trojan horses, and other unwanted
invaders

 Spam filters also help protect users from phishers, because they
reduce the number of phishing-related emails that users receive.

 Anti-phishing software is available that may identify phishing


contents on websites, act as a toolbar that displays the real domain
name for the visited website, or spot phishing attempts in email.
THE INFORMATION TECHNOLOGY ACT 2000

 Section 43 deals with the unauthorised access, unauthorised


downloading, virus attacks or any contaminant, causes damage,
disruption, denial of access, interference with the service availed by
a person.

 Section 65 deals with ‘tampering with computer source documents’


and provides for imprisonment up to 3 years or fine, which may
extend up to 2 years or both.

 Section 66 deals with ‘hacking with computer system’ and provides


for imprisonment up to 3 years or fine, both.

 Further section 67 deals with publication of obscene material and


provides for imprisonment up to a term of 10 years and also with
fine up to Rs. 2 lakhs.
PRECAUTIONS
 Web servers running public sites must be physically
separate protected from internal corporate network.

 Never send your credit card number to any site that is


not secured, to guard against frauds.

 Web Site owners should watch traffic and check any


irregularity on the site. Putting host-based intrusion
detection devices on servers may do this.

 To prevent cyber stalking avoid disclosing any


information pertaining to oneself. This is as good as
disclosing your identity to strangers in public place.
WHERE TO GO?

 www.cybercellmumbai.com
 www.mumbaicyberlab.org/
 cbiccic@bol.net.in
 www.google.com/contact/spamreport
 www.asianlaws.org/fact/index.htm
 www.cyberangels.org
CONCLUSION
 The Cyber World is analogous to the high seas.
No one owns it, yet people of all nationalities use
it.
 Technology should be used for the benefits of
human race not for selfish gains.
 Strict laws should be there to stop such
activities.
 General awareness is the best way to prevent
ourselves from being the victim of cyber crime.
BIBLIOGRAPHY
 www.wikipedia.com

 www.answers.com

 www.google.com

 www.altavista.com
THANK YOU

You might also like