Cyber

Crime

( Unethical Practices )

Cyberspace
Cyberspace is like a big city. There are libraries, universities, museums, places to have fun, and plenty of opportunities to meet wonderful people. But, like any community, there are also some people and areas that you need to avoid and others that you should approach with caution.

Characteristics of Cyber Crime:
Silent in Nature Global in character Non existence of Physical Evidence Creates high Impact High Potential and Easy to Perpetrate

Three Generic categories of computer crime
Computer Assisted Crime Computer specific or Targeted crime Incidental Crime

Tools of Cybercrime
Software piracy Cyber terrorism Hacking Child Pornography Cyber Stalking/Harassment Attacks Using Virus, Worms & Spam Phishing Credit Card Fraud Unauthorized Access

Hacking Or Cracking
A hacker as an "expert or enthusiast of any kind." Note that a hacker need not be a computer enthusiast.
Cracking in simple terms means an illegal intrusion into a computer

e.g., someone can be an astronomy hacker

system and/or network. Every act committed towards breaking into a computer and/or network is Cracking.

“White hat hackers" refers to "innocent" or nonmalicious forms of hacking, while "black hat hackers" refers roughly to what we

KEVIN MITNICK
Kevin David Mitnick is a controversial computer cracker and convicted criminal in the United States. Mitnick broke into his first computer network in 1979 at age 16. Mitnick was convicted in the late 1990s of illegally gaining access to computer networks and stealing intellectual property. Mitnick served five years in prison

Mitnick now runs Mitnick Security Consulting, a computer security consultancy

Child Pornography
The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide crackdowns may catch some offenders ,but there are still ways to acquire images of children in varying stages off dress and performing a variety of sexual acts.

Cyber Stalking/Harassment
Cyber stalking, the term is used to refer to the use of the Internet, e-mail, or other electronic communications devices to stalk another person. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person’s home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person’s property

Contd..
Ritu Kohli (first lady to register the cyber stalking case) is a victim of cyber-stalking. A friend of her husband gave her phone number and name on a chat site for immoral purposes. A computer expert, Kohli was able to trace the culprit. Now, the latter is being tried for "outraging the modesty of a woman", under Section 509 of IPC

Attacks Using Virus, Worms & Spam
Virus is a program that attach it selves to a computer or a file and then circulate it selves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms, unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory.

Phishing
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has

Software Piracy
Theft of software through the illegal copying of genuine programs and distribution of products intended to pass for the original. These copies works as a well as the originals, and sell for significantly less money.

Cyber terrorism
Government officials and IT security specialists have documented a significant increase in Internet probes and server scans since early 2001. A cyber terrorist is someone who intimidates or coerces a government or organization to advance his or her political or social objectives

"The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb".
– National Research Council

Credit Card Fraud
The unauthorized and illegal use of a credit card to purchase property. Unauthorized use of a credit/debit card, or card number, to fraudulently obtain money or property is considered credit card fraud. Credit/debit card numbers can be stolen from unsecured websites, or can be obtained in an identity theft scheme.

Credit Card Skimmer & Writer

ATM machine as usual

Facts and Figures
 Estimated 20 million computers are in control of

hackers
 16% of people who receive fraudulent lottery

emails open them, 10% reply, and 3% lose money
 50% of drugs sold online are counterfeit  Total amount of money lost due to cybercrime…?

Guidelines..
1. Do not give out personal information.
Address Phone number School name or location Credit card number Pictures

Guidelines..
2 .Do not agree to get together with someone you meet online.

Chat rooms are the most dangerous area on the Internet.

You never know for certain if they are who they say they are.

Discuss it with your parents and meet in a public place with your parents

Guidelines..
3. Do not download or install from Internet or open e-mail attachments.

Don’t open e-mail if you don’t know who sent it to you, you could spread a virus. It would be best to delete the message.

It is possible to get a virus from someone you know. It is best to purchase a virus scanning software program.

Guidelines..
4. or inappropriate messages or pictures.
 

Do not send or display offensive

Harassment is illegal. Respect others.

Computer Related Crimes under IPC and Special Laws
Sending threatening messages by email Sending defamatory messages by email Forgery of electronic records Bogus websites, cyber frauds Email spoofing Online sale of Drugs Web - Jacking Online sale of Arms Sec 503 IPC

Sec 499, 500 IPC

Sec 463, 470, 471 IPC Sec 420 IPC Sec 416, 417, 463 IPC NDPS Act Sec. 383 IPC Arms Act

Reporting Internet Crime
Call your Internet provider. Call local law enforcement. Go to www.cybertipline.com Call 1-800-843-5678

References :-

http://en.wikipedia.org www.crime-research.org www.uspto.gov http://cybercrime.planetindia.net/intro.h http://www.cyberkeralam.in:8888/berke

Thank You

Dasvidanya

Sign up to vote on this title
UsefulNot useful