You are on page 1of 16

Cyber Crime

By, Shrinidhi K.R.

Joseph Marie. The Handloom machine Crime .Introduction What is Cyber Crime? “Unlawful acts wherein the computer is either a tool or a target or both” History The case of 1820!.

Associated Technologies  Packet Sniffing Password cracking Buffer overflow   .

Mail Crime  Torjans  Passwd Torjans Remote Admin Torjan .Basic Technology Unauthorized Access  Viruses  E.

Classification  Financial crimes  Cyber pornography  Sale of illegal articles  Intellectual Property crimes  Email spoofing  Forgery .

Examples April 2001 Hydrabad case ( Manohar Moss)  Oct 1995 Bombay case ( Stamp paper of 34 crore)  Active hackers Group  LOVE LETTER Virus  .

Architecture Attacker Attack Controller/Master Host ISP Attack Agents Attack Agents Attack Agents Attack Agents Attack Agents Victim .

Working Model CYBER SPACE Subordinate gets the information and plan. Main Boss issues the commands to the subordinates And executes the Plan .

Utilities Smart Cards  Password Revelers  Sniffing Tools  Wireless Technology  Biometric Matchers  .

Application Domains  Email Related  Email spoofing  Sending malicious codes through email  Email bombing  Sending threatening emails  Defamatory emails .

Industry Relevance Packet Sniffing  Password Cracking  Buffer overflow  Viruses  .

CONVERGENCE OF TECHNOLOGY Computer Languages  Password decoders  Sniffing utilities  .

FTP Gopher Email to hostmaster HTTP 2000000 1997 1998 1999 2000 2001 Total On-line Adults (millions) Total On-line Shoppers (millions) 40 51 66 85 99 1800000 1600000 1400000 1200000 1000000 800000 600000 GOV NET ORG EDU COM 10 15 23 34 43 400000 200000 0 Mar-95 Mar-96 Mar-97 Dec-94 Dec-95 Dec-96 Jun-95 Jun-96 Sep-95 Sep-96 Jun-97 Sep-97 Annual Spending per $235 $316 $345 $358 $400 Person .com. especially in .Statistics 1000% 800% 600% 400% 200% 0% WAIS Communication percentage Domain registration has increased rapidly.

Results: Stack overflow email Worms Back Orifice Packet Spoofing Sniffers Hijacking Sessions Disabling Audits PasswordC racking PasswordG uessing Exploiting Known Vulnerabilities Back Doors Satan Icmp Tunneling Macro Virus Central exploit Repository NMAP Sweepers Stealth Diagnostics Self Replicating Code 1980 1985 1990 1995 2000 .

Conclusion Who is affected by Cyber Crime?  How to stop  What we can Do?  .

Future of Cyber crime Completely un predictable.  WIRELESS Crimes  Mobiles will become the common tool for the cyber crime  Kids just for fun may hack the whole CBI architecture.  .