SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Computer Crimes And Criminals
Why Learn Cyber Crime

Because –
C Everybody is using COMPUTERS.
n From white collar criminals to terrorist organizations
  And from Teenagers to Adults.
r Conventional crimes like Forgery, extortion,
  kidnapping
  etc. are being committed with the help of computers
c New generation is growing up with computers.
s MOST IMPORTANT – Monetary transactions are
  moving on to the INTERNET.

   Management & Science University                   © FISE
What is Cyber Crime
All crimes performed or resorted to by abuse of
electronic media or otherwise, with the purpose of
influencing the functioning of computer or computer
system.

COMPUTER CRIME is any crime where –
– Computer is a target.
– Computer is a tool of crime
– Computer is incidental to crime


     Management & Science University                  © FISE
Profile of Cyber Criminal
•   Disgruntled employees.
•   Teenagers.
•   Political Hacktivist.
•   Professional Hackers.
•   Business Rival.
•   Ex-Boy Friend.
•   Divorced Husband. etc

        Management & Science University   © FISE
Victims
•   Gullible
•   Desperados and greedy people
•   Unskilled & Inexperienced
•   Unlucky people




        Management & Science University    © FISE
Computer Crimes are Vulnerable
• Because of : -
•    Anonymity,
•    Computer’s storage capacity,
•    Weakness in Operation System,
•    Lack of Awareness of user.




      Management & Science University   © FISE
Types of Cybercrime:
• Unauthorized access by insiders (such as employees)
  U
• System penetration by outsiders (such as hackers)
  S
• Theft of proprietary information (whether a simple user ID
  a
  and password or a trade secret worth millions of dollars)
• Financial fraud using computers
• Sabotage of data or networks
• Disruption of network traffic (e.g., denial of service attacks)
  D




         Management & Science University                            © FISE
Types of Cybercrime, continued:

•   Creation and distribution of computer viruses
•   Software piracy
•   Identity theft
•   Hardware theft (e.g., laptop theft).
•   Terrorists that target critical infrastructures, such as
    the PSTN, power grid, and the air traffic control
    system.



          Management & Science University                      © FISE
HACKING
• Hacking in simple terms means illegal
  intrusion into a computer system without the
  permission of the computer owner/user.




      Management & Science University            © FISE
DENIAL OF SERVICE ATTACK
• This is an act by the criminal, who floods the
  bandwidth of the victim's network or fill's his
  e-mail box with spam mail depriving him of
  the services he is entitled to access or provide




       Management & Science University               © FISE
VIRUS DISSEMINATION
• Malicious software that attaches itself to
  other software..
  (virus, worms, Trojan Horse, Time bomb, Logic
  Bomb, Rabbit and Bacterium are the malicious
  software's)




      Management & Science University             © FISE
SOFTWARE PIRACY
• Theft of software through the illegal copying of
  genuine programs or the counterfeiting and
  distribution of products intended to pass for the
  original.
• Retail revenue losses worldwide are ever increasing
  due to this crime
• Can be done in various ways-
   – End user copying, Hard disk loading, Counterfeiting, Illegal
     downloads from the internet etc..




        Management & Science University                             © FISE
PORNOGRAPHY
• Pornography is the first consistently successful ecommerce
  product.
• Deceptive marketing tactics and mouse trapping technologies
  Pornography encourage customers to access their websites.
• Anybody including children can log on to the internet and
  access websites with pornographic contents with a click of a
  mouse.
• Publishing, transmitting any material in electronic form which
  is lascivious or appeals to the prurient interest is an offence
  under the provisions of section 67 of I.T. Act -2000.




         Management & Science University                            © FISE
IRC CRIME
• Internet Relay Chat (IRC) servers have chat rooms in
  which people from anywhere the world can come
  together and chat with each other
   – Criminals use it for meeting co-conspirators.
   – Hackers use it for discussing their exploits / sharing the
     techniques
   – Paedophiles use chat rooms to allure small children
   – Cyber Stalking - In order to harass a woman her telephone
     number is given to others as if she wants to befriend males




        Management & Science University                        © FISE
CREDIT CARD FRAUD
• You simply have to type credit card number
  into www page off the vendor for online
  transaction
• If electronic transactions are not secured the
  credit card numbers can be stolen by the
  hackers who can misuse this card by
  impersonating the credit card owner


       Management & Science University             © FISE
NET EXTORTION
• Copying the company's confidential data in
  order to extort said company for huge
  amount.




      Management & Science University          © FISE
PHISHING
• It is technique of pulling out confidential
  information from the bank/financial
  institutional account holders by deceptive
  means




       Management & Science University          © FISE
Spoofiing
• Getting one computer on a network to
  pretend to have the identity off another
• computer, usually one with special access
  privileges, so as to obtain access to the other
  computers on the network..




       Management & Science University              © FISE
CYBER STALKING
• The Criminal follows the victim by sending
  emails, entering the chat rooms frequently.




       Management & Science University          © FISE
CYBER DEFAMATION
• The Criminal sends emails containing
  defamatory matters to all concerned off the
  victim or post the defamatory matters on a
  website.
• (disgruntled employee may do this against
  boss, ex-boys friend against girl, divorced
  husband against wife etc)


      Management & Science University           © FISE
SALAMI ATTACK
• In such crime criminal makes insignificant changes in
  such a manner that such changes would go
  unnoticed.
• Criminal makes such program that deducts small
  amount like Rs. 2.50 per month from the account of
  all the customer of the Bank and deposit the same in
  his account. In this case no account holder will
  approach the bank for such small amount but
  criminal gains huge amount.


        Management & Science University                   © FISE
THREATENING
• The Criminal sends threatening email or
  comes in contact in chat rooms with victims.
• (Any one disgruntled may do this against boss,
  friend or official)




       Management & Science University             © FISE
SALE OF NARCOTICS
• Salle & Purchase through net.
• There are web site which offer sale and
  shipment of contrabands drugs.
• They may use the techniques of stegnography
  for hiding the messages.




      Management & Science University           © FISE

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cyber forensics ppt
Cyber forensics pptCyber forensics ppt
Cyber forensics ppt
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crimes in the digital age
Cyber crimes in the digital ageCyber crimes in the digital age
Cyber crimes in the digital age
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Presentation on cyber crime
Presentation on cyber crimePresentation on cyber crime
Presentation on cyber crime
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 

Andere mochten auch

Andere mochten auch (9)

La internet en la sociedad 5 to-a _nº 23 melany
La internet en la sociedad  5 to-a _nº 23  melanyLa internet en la sociedad  5 to-a _nº 23  melany
La internet en la sociedad 5 to-a _nº 23 melany
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
The role of erp for global businesses
The role of erp for global businessesThe role of erp for global businesses
The role of erp for global businesses
 
Top 5 Computer Crime's
Top 5 Computer Crime'sTop 5 Computer Crime's
Top 5 Computer Crime's
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Disaster management ppt
Disaster management pptDisaster management ppt
Disaster management ppt
 

Ähnlich wie Computer crimes and criminals

Ähnlich wie Computer crimes and criminals (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security By rajeev.pptx
Cyber security By rajeev.pptxCyber security By rajeev.pptx
Cyber security By rajeev.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimes
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)Legal (Types of Cyber Crime)
Legal (Types of Cyber Crime)
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyper crime
Cyper crimeCyper crime
Cyper crime
 
Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 

Mehr von Online

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3Online
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2Online
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1Online
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4Online
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++Online
 
Functions
FunctionsFunctions
FunctionsOnline
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and outputOnline
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selectionOnline
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetitionOnline
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++Online
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission techniqueOnline
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Online
 
Lan technologies
Lan technologiesLan technologies
Lan technologiesOnline
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technologyOnline
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocolsOnline
 
Internet protocol
Internet protocolInternet protocol
Internet protocolOnline
 
Application protocols
Application protocolsApplication protocols
Application protocolsOnline
 
Addressing
AddressingAddressing
AddressingOnline
 
Transport protocols
Transport protocolsTransport protocols
Transport protocolsOnline
 
Leadership
LeadershipLeadership
LeadershipOnline
 

Mehr von Online (20)

Philosophy of early childhood education 3
Philosophy of early childhood education 3Philosophy of early childhood education 3
Philosophy of early childhood education 3
 
Philosophy of early childhood education 2
Philosophy of early childhood education 2Philosophy of early childhood education 2
Philosophy of early childhood education 2
 
Philosophy of early childhood education 1
Philosophy of early childhood education 1Philosophy of early childhood education 1
Philosophy of early childhood education 1
 
Philosophy of early childhood education 4
Philosophy of early childhood education 4Philosophy of early childhood education 4
Philosophy of early childhood education 4
 
Operation and expression in c++
Operation and expression in c++Operation and expression in c++
Operation and expression in c++
 
Functions
FunctionsFunctions
Functions
 
Formatted input and output
Formatted input and outputFormatted input and output
Formatted input and output
 
Control structures selection
Control structures   selectionControl structures   selection
Control structures selection
 
Control structures repetition
Control structures   repetitionControl structures   repetition
Control structures repetition
 
Introduction to problem solving in c++
Introduction to problem solving in c++Introduction to problem solving in c++
Introduction to problem solving in c++
 
Optical transmission technique
Optical transmission techniqueOptical transmission technique
Optical transmission technique
 
Multi protocol label switching (mpls)
Multi protocol label switching (mpls)Multi protocol label switching (mpls)
Multi protocol label switching (mpls)
 
Lan technologies
Lan technologiesLan technologies
Lan technologies
 
Introduction to internet technology
Introduction to internet technologyIntroduction to internet technology
Introduction to internet technology
 
Internet standard routing protocols
Internet standard routing protocolsInternet standard routing protocols
Internet standard routing protocols
 
Internet protocol
Internet protocolInternet protocol
Internet protocol
 
Application protocols
Application protocolsApplication protocols
Application protocols
 
Addressing
AddressingAddressing
Addressing
 
Transport protocols
Transport protocolsTransport protocols
Transport protocols
 
Leadership
LeadershipLeadership
Leadership
 

Kürzlich hochgeladen

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 

Kürzlich hochgeladen (20)

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

Computer crimes and criminals

  • 2. Why Learn Cyber Crime Because – C Everybody is using COMPUTERS. n From white collar criminals to terrorist organizations And from Teenagers to Adults. r Conventional crimes like Forgery, extortion, kidnapping etc. are being committed with the help of computers c New generation is growing up with computers. s MOST IMPORTANT – Monetary transactions are moving on to the INTERNET. Management & Science University © FISE
  • 3. What is Cyber Crime All crimes performed or resorted to by abuse of electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system. COMPUTER CRIME is any crime where – – Computer is a target. – Computer is a tool of crime – Computer is incidental to crime Management & Science University © FISE
  • 4. Profile of Cyber Criminal • Disgruntled employees. • Teenagers. • Political Hacktivist. • Professional Hackers. • Business Rival. • Ex-Boy Friend. • Divorced Husband. etc Management & Science University © FISE
  • 5. Victims • Gullible • Desperados and greedy people • Unskilled & Inexperienced • Unlucky people Management & Science University © FISE
  • 6. Computer Crimes are Vulnerable • Because of : - • Anonymity, • Computer’s storage capacity, • Weakness in Operation System, • Lack of Awareness of user. Management & Science University © FISE
  • 7. Types of Cybercrime: • Unauthorized access by insiders (such as employees) U • System penetration by outsiders (such as hackers) S • Theft of proprietary information (whether a simple user ID a and password or a trade secret worth millions of dollars) • Financial fraud using computers • Sabotage of data or networks • Disruption of network traffic (e.g., denial of service attacks) D Management & Science University © FISE
  • 8. Types of Cybercrime, continued: • Creation and distribution of computer viruses • Software piracy • Identity theft • Hardware theft (e.g., laptop theft). • Terrorists that target critical infrastructures, such as the PSTN, power grid, and the air traffic control system. Management & Science University © FISE
  • 9. HACKING • Hacking in simple terms means illegal intrusion into a computer system without the permission of the computer owner/user. Management & Science University © FISE
  • 10. DENIAL OF SERVICE ATTACK • This is an act by the criminal, who floods the bandwidth of the victim's network or fill's his e-mail box with spam mail depriving him of the services he is entitled to access or provide Management & Science University © FISE
  • 11. VIRUS DISSEMINATION • Malicious software that attaches itself to other software.. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious software's) Management & Science University © FISE
  • 12. SOFTWARE PIRACY • Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. • Retail revenue losses worldwide are ever increasing due to this crime • Can be done in various ways- – End user copying, Hard disk loading, Counterfeiting, Illegal downloads from the internet etc.. Management & Science University © FISE
  • 13. PORNOGRAPHY • Pornography is the first consistently successful ecommerce product. • Deceptive marketing tactics and mouse trapping technologies Pornography encourage customers to access their websites. • Anybody including children can log on to the internet and access websites with pornographic contents with a click of a mouse. • Publishing, transmitting any material in electronic form which is lascivious or appeals to the prurient interest is an offence under the provisions of section 67 of I.T. Act -2000. Management & Science University © FISE
  • 14. IRC CRIME • Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other – Criminals use it for meeting co-conspirators. – Hackers use it for discussing their exploits / sharing the techniques – Paedophiles use chat rooms to allure small children – Cyber Stalking - In order to harass a woman her telephone number is given to others as if she wants to befriend males Management & Science University © FISE
  • 15. CREDIT CARD FRAUD • You simply have to type credit card number into www page off the vendor for online transaction • If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner Management & Science University © FISE
  • 16. NET EXTORTION • Copying the company's confidential data in order to extort said company for huge amount. Management & Science University © FISE
  • 17. PHISHING • It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means Management & Science University © FISE
  • 18. Spoofiing • Getting one computer on a network to pretend to have the identity off another • computer, usually one with special access privileges, so as to obtain access to the other computers on the network.. Management & Science University © FISE
  • 19. CYBER STALKING • The Criminal follows the victim by sending emails, entering the chat rooms frequently. Management & Science University © FISE
  • 20. CYBER DEFAMATION • The Criminal sends emails containing defamatory matters to all concerned off the victim or post the defamatory matters on a website. • (disgruntled employee may do this against boss, ex-boys friend against girl, divorced husband against wife etc) Management & Science University © FISE
  • 21. SALAMI ATTACK • In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed. • Criminal makes such program that deducts small amount like Rs. 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount. Management & Science University © FISE
  • 22. THREATENING • The Criminal sends threatening email or comes in contact in chat rooms with victims. • (Any one disgruntled may do this against boss, friend or official) Management & Science University © FISE
  • 23. SALE OF NARCOTICS • Salle & Purchase through net. • There are web site which offer sale and shipment of contrabands drugs. • They may use the techniques of stegnography for hiding the messages. Management & Science University © FISE