Professional Documents
Culture Documents
Cyber Crime - MIS Presentation
Cyber Crime - MIS Presentation
They committed
acts of sabotage
This device allowed the to discourage
repetition of a series of
steps in the weaving of Jacquard from
special fabrics, thus further use of the
In 1820, Joseph-Marie threatening to end new technology –
traditional
Jacquard, a textile
employment and the
FIRST cyber
manufacturer in France,
produced the ‘loom.’ livelihood of many crime.
employees.
CLASSIFICATION OF CYBER CRIMES
●
● Computer as a target of crime
One
●
● Computer as an instrumentality
Two
●
● Computer as an incidental or other crime
Three
●
● Crime associated with the prevalence of
computers
Four
CLASSIFICATION OF CYBER CRIMES
Crime
Source: http://www.reportcybercrime.com/classification.php
CLASSIFICATION OF CYBER CRIMES
Computer as an instrumentality
Examples: Sending
Or offences are e-mails, manipulating
Computers or their
committed by computer contents
contents are used
manipulating the for credit card frauds
in furtherance of or
contents of
a crime telecommunication
computer systems.
frauds
Source: http://www.reportcybercrime.com/classification.php
CLASSIFICATION OF CYBER CRIMES
Source: http://www.reportcybercrime.com/classification.php
CLASSIFICATION OF CYBER CRIMES
Include…
●
Copyright violation
One
●
Software piracy
Two
●
Component theft
Three
Source: http://www.reportcybercrime.com/classification.php
Reasons for cyber crime
Source: http://www.naavi.org/pati/pati_cybercrimes_dec03.htm
REASONS FOR CYBER CRIME
●
● Computers are easy to access for those can steal
●
● Secretly implanted logic bomb, key loggers that can steal
Two
access codes, advanced voice recorders;
●
● Retina imagers etc. that can fool biometric systems and
bypass firewalls can be utilized to get past many a security
system.
Source: http://www.naavi.org/pati/pati_cybercrimes_dec03.htm
REASONS FOR CYBER CRIME
Three
●
●
Four
●
●Negligence is a part of human conduct
●
●Negligence in protecting computer systems gives
criminals an easy access.
Source: http://www.naavi.org/pati/pati_cybercrimes_dec03.htm
Classification of Cyber Criminals
Category 1
●
Children and adolescents between the age group of 6 to 18 years
●
Due to the inquisitiveness to know and explore the things.
●
To prove themselves to be outstanding amongst other children in their group.
Category 2
●
Organized hackers
●
These are organized together to fulfill certain objective.
●
The reason may be to fulfill their political bias, fundamentalism etc.
●
Recent hacking of Indian Government sites by hackers from Pakistan.
●
NASA and Microsoft sites are constantly under attack by the hackers.
Source: http://www.naavi.org/pati/pati_cybercrimes_dec03.htm
Classification of Cyber Criminals
Category 3
●
Professional hackers / crackers
●
Their work is motivated by the colour of money.
●
These kinds of hackers are mostly employed to hack the site of the rivals and get credible, reliable and valuable information.
●
They may even be employed to crack the system of the employer , basically as a measure to make it safer by detecting the loopholes.
Category 4
●
Discontented employees
●
who have been either sacked by their employer or are dissatisfied with their employer.
●
Revenge is their only motive
Source: http://www.naavi.org/pati/pati_cybercrimes_dec03.htm
Characteristics of Cyber Crime
Silent in Nature
●
Computer crime could be committed in privacy without reaching to scene of crime physically i.e. no eye
witnesses. There is no signs of physical violence or struggle.
Global in character
●
No national borders. By sitting comfortably far away from the country the entire economy of the country
could be destroyed. As digital evidences are fragile in nature one has to respond quickly.
●
No physical evidence to indicate that crime has been committed. Only on a closer look the trained person
could find out the evidences which are not in the traditional format but are in digital format.
Source: http://us.norton.com/cybercrime/definition.jsp
Characteristics of Cyber Crime
●
Impact is severe and may be long term. It can damage the victim system
permanently. Loss of good will.
●
A software developer who did not get enough money or good job would turn to criminal world for their
survival. Therefore, the computer crimes have a potential to increase. Hence organized mafia may enter
into this sector.
Source: http://us.norton.com/cybercrime/definition.jsp
Types of Cyber Crime
●
● Harassment via e-mails
●
● Bombarding with threatening e-mails
11
●
● Cyber stalking
●
● Posting messages on the bulletin boards frequented by the victim, or entering the chat-
rooms frequented by the victim, constantly bombarding the victim with emails etc.
22
●
● Dissemination of obscene material
●
● Pornography is one of the biggest industries
33
●
● Defamation
4 ●
●
●
●
Growing tool in brand wars
Example: Blogging negatively about someone
Source: http://www.cybercellmumbai.com/cyber-crimes/
Types of Cyber Crime
●
● Hacking
●
● Unauthorized access
55
●
● E-mail spoofing
●
● A spoofed e-mail may be said to be one, which misrepresents its origin.
6
6
●
● Computer vandalism
7
●
● Deliberately destroying or damaging property of another
7
●
● Distribution of pirated software
8 ●
● No explanation required!
Source: http://www.cybercellmumbai.com/cyber-crimes/
Types of Cyber Crime
●
● Cyber terrorism
●
● premeditated use of disruptive activities, in cyber space, with the intention to
further social, ideological, religious, political or similar objectives, or to
9 intimidate any person in furtherance of such objectives
●
● Trafficking
●
● A spoofed e-mail may be said to be one, which
10 misrepresents its origin
●
● Fraud and Cheating
●
● Deliberately destroying or damaging property of another.
11
Source: http://www.cybercellmumbai.com/cyber-crimes/
Cyber Law in India
India enacted its first IT Act in 2000.
Source: www.legalserviceindia.com/cyber/cyber.htm
Cyber Law in India
(2) Computer Related Crimes Covered under IPC (Indian Penal Code) and Special Laws
Source: www.legalserviceindia.com/cyber/cyber.htm
Vital question
5 P mantra for
Online
Security
Prevention steps for government and other
organizations
PHYSICAL SECURITY
ACCESS CONTROL
Firewalls allow only authorized communications between the internal and external network.
PASSWORD PROTECTION
USING ENCRYPTION
Encryption is able to transform data into a form that makes it almost impossible to read it without the right key.
Prevention steps for government and other
organizations
System managers should track down the holes before the intruders do.
So organization should work hard to discover security holes, bugs and weaknesses and report their findings as they
are confirmed.
Network tool, UNIX, scans and gathers information about any host on a network, regardless of which operating
system or services the hosts were running.
It checks the known vulnerabilities include bugs, security weakness, inadequate password protection and so on.
There is another product available called COPS (Computer Oracle and Password System). It scans for poor passwords
and dangerous file permissions
Need to put some watchdogs into service. There are some intrusion programs, which identify suspicious activity and
report so that necessary action is taken. They need to be operating constantly so that all unusual behaviour on
network is caught immediately.
A final wrap…
http://www.naavi.org/pati/pati_cybercrimes_dec03.htm
http://www.basearticles.com/Art/180332/288/POPULAR-CYBER-CRIME-C
ASES-OF-INDIA.html
http://www.cyberlawsindia.net/cases.html
http://us.norton.com/cybercrime/definition.jsp
Thank you