This document discusses cybercrime and provides definitions and examples. It defines cybercrime as unlawful acts where a computer is used as a tool or target. It describes different types of cyber attackers like black hats and grey hats. Common types of cybercrimes discussed include malware, phishing, hacking tools, and spam. Examples are given of hacked websites. The document also outlines cybercrime laws and penalties in India and provides tips on how to help prevent cybercrimes.
2. • What is cybercrime.
• Top 20 countries in cybercrime.
• Types of cyber crime.
• Some examples of hacked sites.
• Punishments and cyber acts.
• Do’s and Don’ts.
3. What is
The Invisible Criminals Are Dangerous
Than The Visible One…
4. » “Any criminal activity that uses
a computer either as an
instrumentality, target or a
means for perpetuating further
crimes comes within the ambit
of cyber crime”.
» A generalized definition of
cyber crime may be “ unlawful
acts wherein the computer is
either a tool or target or both”.
10. The good guys who identify the security
weakness of the system or network and
inform the owner about them
11. A black hat is the villain or bad guy, who
crash into victim’s security to steal
information and destroy the victims
security network.
Also known as ‘cracker’.
12. A grey hat, in the hacking community,
refers to a skilled hacker who is somewhere
in between white and black hat hackers
13. ۵ The challenge... ‘because
it’s there!’
۵ Ego
۵ Espionage
۵ Ideology
۵ Mischief
۵ Money (extortion or theft)
۵ Revenge
14. o Malware is an abbreviated term
used to describe a "malicious
software" program.
o Any type of code or program
that is used for monitoring and
collecting your personal
information or disrupting or
damaging your computer, may
be referred to as malware.
15. ¶ Phishing is an e-mail fraud
method in which the perpetrator
sends out legitimate-looking
email in an attempt to gather
personal and financial
information from recipients.
¶ Phishers use a number of
different social engineering and
e-mail spoofing ploys to try to
trick their victims.
16. ѓ It is a set of tools used
frequently by the
computer science intruders
or crackers that is able to
accede illicitly to a
computer science system.
ѓ These tools serve to hide
the processes and archives
that allow the intruder to
maintain the access to the
system, often with
malicious aims.
18. Window GUI Technology base Forensic Software for
examination of File systems FAT12, FAT16, FAT32,
NTFS, LINUX, UNIX, MACINTOSH, CDROM and DVD-
R.
It should able to examine and extracting slack space.
It should be able to create image of the storage media
e.g. hard disk, Floppy disk.
It should show emails in developer’s format. (With
headers and attachments)
It should open document in language other English
spouted by Unicode e.g. Arabian language.
It should show Internet history.
Forensic Cell phone Seizure kit with write block facility
and will all required cables and adapters.
Forensic Hardware: One computer PIV 3.2 GHz with 1
GB DDR RAM and other required peripheral.
One hard disk write block device.
19. § Spam , also known as junk
email or unsolicited bulk
email(UBE), is a subset of
electronic spam involving nearly
identical messages sent to
numerous recipients by email.
§ Spammers collect email
addresses from chatrooms,
websites, customer lists,
newsgroups, and viruses which
harvest users' address books,
and are sold to other
spammers.
20. ∆ Spyware is a type of malware
(malicious software) installed
on computers that collects
information about users
without their knowledge.
∆ The presence of spyware is
typically hidden from the
user and can be difficult to
detect.
21. † Trojan, is a standalone
malicious program that does
not attempt to infect files
unlike a computer virus nor
replicate itself with the
intent of infecting other
computers unlike a
computer worm.
† Trojan horses can make
copies of themselves, steal
information, or harm their
host computer systems.
22. ж Computer virus is a computer
program that can replicate
itself and spread from one
computer to another.
ж Viruses can increase their
chances of spreading to other
computers by infecting files on
a network file system or a file
system that is accessed by
other computers.
23.
24. To see how far the virus can
spread.
To cause damage and
destruction to a targeted
individual or organisation.
To achieve a feeling of
superiority/power.
To leverage some form of
personal gain.
To provide a ‘lesson’ in Internet
security.
To conduct an experiment.
25. 1 -> i or l || -> n
3 -> e |/| -> m
4 -> a s -> z
7 -> t
z -> s
9 -> g
f -> ph
0 -> o
$ -> s ph -> f
| -> i or l x -> ck
ck -> x
26. Example:
1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s
wh3|| 1 h4ck3d 1n
I did not hack this page, it was like this
when I hacked in.
27. Hackers can leave their ‘graffiti’ on
other people’s websites. Many
sites have fallen foul of this
activity:
FBI and CIA
NASA
British Labour and Conservative
Parties
New York Times
35. www.jntu.ac.in was hacked on 7 Nov 2010.
www.songs.pk was hacked on 15 July 2011.
Songs.pk
JNTU homepage
after it was hacked
36. 21 January 2003:Two years jail for UK
virus writer who infected 27,000 PCs
Simon Vallor, the twenty-two
year old web designer from North
Wales who, in December 2002,
pleaded guilty to writing and
distributing three computer viruses,
was today sentenced at Southwark
Crown Court, London to a two year
custodial sentence. His viruses -
Gokar, Redesi and Admirer – were
proven to have infected 27,000 PCs in
42 countries.
37. Section Offence Cognizable or Non- Bailable or Non-Bailable By what court
cognizable
65 Tempering with computer Cognizable Non-Bailable Magistrate of the First Class
source code and documents
66 Hacking with computer Cognizable Non-Bailable Magistrate of the First Class
system
67 Publishing of information Cognizable Non-Bailable First Conviction
which is obscene in electronic Magistrate of the First Class
format Second Conviction
Court of session
68 Failure of comply with the Cognizable Non-Bailable Magistrate of the First Class
directions of Controller
69 Failure to assist intercepting Cognizable Non-Bailable Magistrate of the First Class
agency in decrypt-ion
38. 70 Securing Access to a protected Cognizable Non-Bailable Court of Session
system
71 Penalty for misrepresentation Non-Cognizable Bailable Any Magistrate
72 Breach of confidentiality and Non-Cognizable Bailable Any Magistrate
privacy
73 Penalty for publishing Digital Non-Cognizable Bailable Any Magistrate
Signature Certificate
false in certain
particulars
74 Publication for fraudulent Non-Cognizable Bailable Any Magistrate
purpose
33 Failure to surrender license by Non-Cognizable Bailable Any Magistrate
Certifying Authority
39.
40. Always use latest and up date anti
virus software to guard against virus
attacks.
Always keep back up volumes so that
one may not suffer data loss in case of
virus contamination.
Always keep a watch on the sites that
your children are accessing to prevent
any kind of harassment or
depravation in children.
41. Avoid disclosing any
information pertaining to
one.
Never send your credit card
number to any site that is not
secured, to guard against
frauds.
Always avoid sending any
photograph online
particularly to strangers .
42. ¢ It is not possible to eliminate cyber
crime from the cyber space.
¢ It is quite possible to check them.
¢ History is the witness that no
legislation has succeeded in totally
eliminating crime from the globe.
¢ The only possible step is to make
people aware of their rights and
duties.
43. A final word:
Treat your password like
you treat your toothbrush.
Never give it to anyone else
to use, and change it every
few months.
Hinweis der Redaktion
Hackers use eye catching messages such as “You have won $1,000,000” to get the readers attention. These e-mails can deceive you into giving away important information about yourself. These spam e-mails are also used by hackers to get you to go to a dangerous website or worse to get you to download a program that gives the hacker total control of your computer.Many downloads contain spyware, adware, and viruses that can infect your computer and put you at risk for more serious consequences.Pop-ups, just like spam, are a tool that hackers use to get the reader to infect their own computer. By clicking on pop-ups a virus or spyware can be downloaded. It is another way to get you to put your personal information at risk.Hackers use Active X to gain entrance into your computer and steal important information.