You are on page 1of 27

Cyber Crime

The downside of our own


landmark inventions

An MIS term-II presentation by:

AKARSH SHARMA (10DM-009) DHARA JAIN (10DM-042)

DEEPTI GUPTA (10DM-041) AMIT KUMAR AGARWAL (10FN-011)


DEFINITION

“Any criminal activity that uses a computer either as


an instrumentality, target or a means for
perpetuating further crimes comes within the ambit
of cyber crime”

“Illegal computer-mediated activities that can be


conducted through global electronic networks”
HISTORY – first ever occurrence
The first recorded cyber crime took place in the year 1820.

They committed
acts of sabotage
This device allowed the to discourage
repetition of a series of
steps in the weaving of Jacquard from
special fabrics, thus further use of the
In 1820, Joseph-Marie threatening to end new technology –
traditional
Jacquard, a textile
employment and the
FIRST cyber
manufacturer in France,
produced the ‘loom.’ livelihood of many crime.
employees.
CLASSIFICATION OF CYBER CRIMES


● Computer as a target of crime
One


● Computer as an instrumentality
Two


● Computer as an incidental or other crime
Three


● Crime associated with the prevalence of
computers
Four
CLASSIFICATION OF CYBER CRIMES

Computer as a target of a crime

Crime

Source: http://www.reportcybercrime.com/classification.php
CLASSIFICATION OF CYBER CRIMES

Computer as an instrumentality

Examples: Sending
Or offences are e-mails, manipulating
Computers or their
committed by computer contents
contents are used
manipulating the for credit card frauds
in furtherance of or
contents of
a crime telecommunication
computer systems.
frauds

Source: http://www.reportcybercrime.com/classification.php
CLASSIFICATION OF CYBER CRIMES

Computer as an incidental for other crimes

With the advent of These include use of


computers, the criminals computers as an aid for
have started using the crimes such as drug
technology as an aid for trafficking, money
perpetuation of laundering, child
conventional crimes. pornography etc.

Source: http://www.reportcybercrime.com/classification.php
CLASSIFICATION OF CYBER CRIMES

Crime associated with the prevalence of computers

Include…

Copyright violation
One


Software piracy
Two


Component theft
Three

Source: http://www.reportcybercrime.com/classification.php
Reasons for cyber crime

“Human beings are vulnerable so the rule of


law is required to protect them”
– a quote from ‘The Concept of Law’ by H.L.A Hart, a legal
philosopher

In drawing similarity, we may say that computers are


vulnerable so rule of law is required to protect and safeguard
them against cyber crime.

Source: http://www.naavi.org/pati/pati_cybercrimes_dec03.htm
REASONS FOR CYBER CRIME

The vulnerability of technology



● The capacity to store data in
comparatively small space.
One ●
● Easier to obtain large information in one
go


● Computers are easy to access for those can steal

● Secretly implanted logic bomb, key loggers that can steal

Two
access codes, advanced voice recorders;

● Retina imagers etc. that can fool biometric systems and
bypass firewalls can be utilized to get past many a security
system.

Source: http://www.naavi.org/pati/pati_cybercrimes_dec03.htm
REASONS FOR CYBER CRIME

The vulnerability of technology


Complexity causes human errors

Three

●Human mind is fallible and it is not possible that there


might not be a lapse at any stage.

Four

●Negligence is a part of human conduct

●Negligence in protecting computer systems gives
criminals an easy access.

Five Loss of evidence



●Easy to destroy any evidence through deletion of data


Source: http://www.naavi.org/pati/pati_cybercrimes_dec03.htm
Classification of Cyber Criminals

Category 1


Children and adolescents between the age group of 6 to 18 years

Due to the inquisitiveness to know and explore the things.

 To prove themselves to be outstanding amongst other children in their group.

Category 2


Organized hackers

These are organized together to fulfill certain objective.

The reason may be to fulfill their political bias, fundamentalism etc.

Recent hacking of Indian Government sites by hackers from Pakistan.

NASA and Microsoft sites are constantly under attack by the hackers.

Source: http://www.naavi.org/pati/pati_cybercrimes_dec03.htm
Classification of Cyber Criminals

Category 3


Professional hackers / crackers

Their work is motivated by the colour of money.

These kinds of hackers are mostly employed to hack the site of the rivals and get credible, reliable and valuable information.

They may even be employed to crack the system of the employer , basically as a measure to make it safer by detecting the loopholes.

Category 4


Discontented employees

who have been either sacked by their employer or are dissatisfied with their employer.

Revenge is their only motive

Source: http://www.naavi.org/pati/pati_cybercrimes_dec03.htm
Characteristics of Cyber Crime
Silent in Nature


Computer crime could be committed in privacy without reaching to scene of crime physically i.e. no eye
witnesses. There is no signs of physical violence or struggle.

Global in character


No national borders. By sitting comfortably far away from the country the entire economy of the country
could be destroyed. As digital evidences are fragile in nature one has to respond quickly.

Non existence of Physical Evidence


No physical evidence to indicate that crime has been committed. Only on a closer look the trained person
could find out the evidences which are not in the traditional format but are in digital format.

Source: http://us.norton.com/cybercrime/definition.jsp
Characteristics of Cyber Crime

Creates high Impact


Impact is severe and may be long term. It can damage the victim system
permanently. Loss of good will.

High Potential and Easy to Perpetrate


A software developer who did not get enough money or good job would turn to criminal world for their
survival. Therefore, the computer crimes have a potential to increase. Hence organized mafia may enter
into this sector.

Source: http://us.norton.com/cybercrime/definition.jsp
Types of Cyber Crime

● Harassment via e-mails

● Bombarding with threatening e-mails
11


● Cyber stalking

● Posting messages on the bulletin boards frequented by the victim, or entering the chat-
rooms frequented by the victim, constantly bombarding the victim with emails etc.
22


● Dissemination of obscene material

● Pornography is one of the biggest industries
33


● Defamation
4 ●



Growing tool in brand wars
Example: Blogging negatively about someone

Source: http://www.cybercellmumbai.com/cyber-crimes/
Types of Cyber Crime

● Hacking

● Unauthorized access
55


● E-mail spoofing

● A spoofed e-mail may be said to be one, which misrepresents its origin.
6
6


● Computer vandalism
7

● Deliberately destroying or damaging property of another
7


● Distribution of pirated software
8 ●
● No explanation required!

Source: http://www.cybercellmumbai.com/cyber-crimes/
Types of Cyber Crime

● Cyber terrorism

● premeditated use of disruptive activities, in cyber space, with the intention to
further social, ideological, religious, political or similar objectives, or to
9 intimidate any person in furtherance of such objectives


● Trafficking

● A spoofed e-mail may be said to be one, which
10 misrepresents its origin


● Fraud and Cheating

● Deliberately destroying or damaging property of another.
11
Source: http://www.cybercellmumbai.com/cyber-crimes/
Cyber Law in India
India enacted its first IT Act in 2000.

The following provisions were provided under the act:

(1) Offence Section under IT Act

 Tampering with Computer source documents Sec.65

 Hacking with Computer systems, Data alteration Sec.66

 Publishing obscene information Sec.67

 Un-authorised access to protected system Sec.70

 Breach of Confidentiality and Privacy Sec.72

 Publishing false digital signature certificates Sec.73

Source: www.legalserviceindia.com/cyber/cyber.htm
Cyber Law in India
(2) Computer Related Crimes Covered under IPC (Indian Penal Code) and Special Laws

 Sending threatening messages by email Sec 503 IPC

 Sending defamatory messages by email Sec 499 IPC

 Forgery of electronic records Sec 463 IPC

 Bogus websites, cyber frauds Sec 420 IPC

 Email spoofing Sec 463 IPC

 Web-Jacking Sec. 383 IPC

 E-Mail Abuse Sec.500 IPC

 Online sale of Drugs NDPS Act

 Online sale of Arms Arms Act

Source: www.legalserviceindia.com/cyber/cyber.htm
Vital question

WHAT STEPS DO BUSINESS


FIRMS NEED TO TAKE TO
PREVENT CYBER CRIME?
Prevention of Cyber Crime

5 P mantra for
Online
Security
Prevention steps for government and other
organizations

 PHYSICAL SECURITY

Computer network should be protected from the access of unauthorized persons.

 ACCESS CONTROL

Firewalls allow only authorized communications between the internal and external network.

 PASSWORD PROTECTION

Proof of identity is an essential component to identify intruder.


The use of passwords in the most common security for network system including servers, routers and firewalls.
Password should be charged with regular interval of time and it should be alpha numeric and should be difficult
to judge.

 USING ENCRYPTION

Encryption is able to transform data into a form that makes it almost impossible to read it without the right key.
Prevention steps for government and other
organizations

 FINDING THE HOLES IN NETWORK

System managers should track down the holes before the intruders do.

So organization should work hard to discover security holes, bugs and weaknesses and report their findings as they
are confirmed.

 USING NETWORK SCANNING PROGRAMS

Network tool, UNIX, scans and gathers information about any host on a network, regardless of which operating
system or services the hosts were running.

It checks the known vulnerabilities include bugs, security weakness, inadequate password protection and so on.

There is another product available called COPS (Computer Oracle and Password System). It scans for poor passwords
and dangerous file permissions

 USING INTRUSION ALERT PROGRAMS:

Need to put some watchdogs into service. There are some intrusion programs, which identify suspicious activity and
report so that necessary action is taken. They need to be operating constantly so that all unusual behaviour on
network is caught immediately.
A final wrap…

Cyber crime is a multi-billion dollar problem.

It is not possible to eliminate cyber crime from the cyber space. It is


only possible to check it.

History is the witness that no legislation has succeeded in totally eliminating


crime from the globe but, Law enforcement must seek ways to keep the
drawbacks from overshadowing the great promise of the computer age.

At present, the only possible step is to make people aware of their


rights and duties. Hopefully, WE DID!
Sources of information
 http://www.crime-research.org/analytics/702/2

 http://www.naavi.org/pati/pati_cybercrimes_dec03.htm

 http://www.basearticles.com/Art/180332/288/POPULAR-CYBER-CRIME-C
ASES-OF-INDIA.html

 http://www.cyberlawsindia.net/cases.html

 http://us.norton.com/cybercrime/definition.jsp
Thank you

You might also like