SlideShare ist ein Scribd-Unternehmen logo
1 von 44
CYBER
                        CRIME

By
     T.Harshitha Rao
•   What is cybercrime.
•   Top 20 countries in cybercrime.
•   Types of cyber crime.
•   Some examples of hacked sites.
•   Punishments and cyber acts.
•   Do’s and Don’ts.
What is



 The Invisible Criminals Are Dangerous
 Than The Visible One…
» “Any criminal activity that uses
  a computer either as an
  instrumentality, target or a
  means for perpetuating further
  crimes comes within the ambit
  of cyber crime”.
» A generalized definition of
  cyber crime may be “ unlawful
  acts wherein the computer is
  either a tool or target or both”.
.
   The good guys who identify the security
    weakness of the system or network and
    inform the owner about them
 A black hat is the villain or bad guy, who
  crash into victim’s security to steal
  information and destroy the victims
  security network.
 Also known as ‘cracker’.
 A grey hat, in the hacking community,
 refers to a skilled hacker who is somewhere
 in between white and black hat hackers
۵ The challenge... ‘because
  it’s there!’
۵ Ego
۵ Espionage
۵ Ideology
۵ Mischief
۵ Money (extortion or theft)
۵ Revenge
o   Malware is an abbreviated term
    used to describe a "malicious
    software" program.
o   Any type of code or program
    that is used for monitoring and
    collecting your personal
    information or disrupting or
    damaging your computer, may
    be referred to as malware.
¶ Phishing is an e-mail fraud
  method in which the perpetrator
  sends out legitimate-looking
  email in an attempt to gather
  personal and financial
  information from recipients.
¶ Phishers use a number of
  different social engineering and
  e-mail spoofing ploys to try to
  trick their victims.
ѓ It is a set of tools used
  frequently by the
  computer science intruders
  or crackers that is able to
  accede illicitly to a
  computer science system.
ѓ These tools serve to hide
  the processes and archives
  that allow the intruder to
  maintain the access to the
  system, often with
  malicious aims.
 Spam
 Downloads
 Pop-ups
 Active X
   Window GUI Technology base Forensic Software for
    examination of File systems FAT12, FAT16, FAT32,
    NTFS, LINUX, UNIX, MACINTOSH, CDROM and DVD-
    R.
   It should able to examine and extracting slack space.
   It should be able to create image of the storage media
    e.g. hard disk, Floppy disk.
   It should show emails in developer’s format. (With
    headers and attachments)
   It should open document in language other English
    spouted by Unicode e.g. Arabian language.
   It should show Internet history.
   Forensic Cell phone Seizure kit with write block facility
    and will all required cables and adapters.
   Forensic Hardware: One computer PIV 3.2 GHz with 1
    GB DDR RAM and other required peripheral.
   One hard disk write block device.
§ Spam , also known as junk
  email or unsolicited bulk
  email(UBE), is a subset of
  electronic spam involving nearly
  identical messages sent to
  numerous recipients by email.
§ Spammers collect email
  addresses from chatrooms,
  websites, customer lists,
  newsgroups, and viruses which
  harvest users' address books,
  and are sold to other
  spammers.
∆ Spyware is a type of malware
  (malicious software) installed
  on computers that collects
  information about users
  without their knowledge.
∆ The presence of spyware is
  typically hidden from the
  user and can be difficult to
  detect.
† Trojan, is a standalone
  malicious program that does
  not attempt to infect files
  unlike a computer virus nor
  replicate itself with the
  intent of infecting other
  computers unlike a
  computer worm.
† Trojan horses can make
  copies of themselves, steal
  information, or harm their
  host computer systems.
ж Computer virus is a computer
  program that can replicate
  itself and spread from one
  computer to another.
ж Viruses can increase their
  chances of spreading to other
  computers by infecting files on
  a network file system or a file
  system that is accessed by
  other computers.
 To see how far the virus can
  spread.
 To cause damage and
  destruction to a targeted
  individual or organisation.
 To achieve a feeling of
  superiority/power.
 To leverage some form of
  personal gain.
 To provide a ‘lesson’ in Internet
  security.
 To conduct an experiment.
1 -> i or l   || -> n
3 -> e        |/| -> m
4 -> a        s -> z
7 -> t
              z -> s
9 -> g
              f -> ph
0 -> o
$ -> s        ph -> f
| -> i or l   x -> ck
              ck -> x
Example:

1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s
wh3|| 1 h4ck3d 1n



I did not hack this page, it was like this
when I hacked in.
Hackers can leave their ‘graffiti’ on
 other people’s websites. Many
 sites have fallen foul of this
 activity:
 FBI and CIA
 NASA
 British Labour and Conservative
 Parties
 New York Times
Spice girls
website
hacked and
defaced in
1999
Facebook lottery scam
   www.jntu.ac.in was hacked on 7 Nov 2010.
   www.songs.pk was hacked on 15 July 2011.
     Songs.pk




                               JNTU homepage
                               after it was hacked
21 January 2003:Two years jail for UK
 virus writer who infected 27,000 PCs

         Simon Vallor, the twenty-two
year old web designer from North
Wales who, in December 2002,
pleaded guilty to writing and
distributing three computer viruses,
was today sentenced at Southwark
Crown Court, London to a two year
custodial sentence. His viruses -
Gokar, Redesi and Admirer – were
proven to have infected 27,000 PCs in
42 countries.
Section              Offence               Cognizable or Non-   Bailable or Non-Bailable          By what court
                                              cognizable



  65        Tempering with computer           Cognizable             Non-Bailable          Magistrate of the First Class
           source code and documents




  66        Hacking with computer             Cognizable             Non-Bailable          Magistrate of the First Class
                   system



  67       Publishing of information          Cognizable             Non-Bailable               First Conviction
          which is obscene in electronic                                                   Magistrate of the First Class
                     format                                                                    Second Conviction
                                                                                                Court of session




  68       Failure of comply with the         Cognizable             Non-Bailable          Magistrate of the First Class
            directions of Controller




  69      Failure to assist intercepting      Cognizable             Non-Bailable          Magistrate of the First Class
             agency in decrypt-ion
70   Securing Access to a protected      Cognizable     Non-Bailable   Court of Session
                   system


71   Penalty for misrepresentation     Non-Cognizable     Bailable     Any Magistrate



72   Breach of confidentiality and     Non-Cognizable     Bailable     Any Magistrate
                  privacy


73   Penalty for publishing Digital    Non-Cognizable     Bailable     Any Magistrate
             Signature Certificate
                false in certain
                  particulars




74     Publication for fraudulent      Non-Cognizable     Bailable     Any Magistrate
                   purpose


33   Failure to surrender license by   Non-Cognizable     Bailable     Any Magistrate
              Certifying Authority
Always use latest and up date anti
virus software to guard against virus
attacks.
Always keep back up volumes so that
one may not suffer data loss in case of
virus contamination.
Always keep a watch on the sites that
your children are accessing to prevent
any kind of harassment or
depravation in children.
Avoid disclosing any
information pertaining to
one.
Never send your credit card
number to any site that is not
secured, to guard against
frauds.
 Always avoid sending any
photograph online
particularly to strangers .
¢   It is not possible to eliminate cyber
    crime from the cyber space.
¢   It is quite possible to check them.
¢   History is the witness that no
    legislation has succeeded in totally
    eliminating crime from the globe.
¢    The only possible step is to make
    people aware of their rights and
    duties.
A final word:

   Treat your password like
   you treat your toothbrush.
   Never give it to anyone else
   to use, and change it every
   few months.
Cyber Crime

Weitere ähnliche Inhalte

Andere mochten auch

PhD thesis presentation 2012
PhD thesis presentation 2012PhD thesis presentation 2012
PhD thesis presentation 2012vsharma78
 
Lee Clark 7th June 2010
Lee Clark 7th June 2010Lee Clark 7th June 2010
Lee Clark 7th June 2010leewclark
 
Linux Installation And Shamba Server
Linux Installation And Shamba ServerLinux Installation And Shamba Server
Linux Installation And Shamba ServerMayur Verma
 
Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...Mikhail Kurnosov
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...Andris Soroka
 
아름다운+이별 김건모
아름다운+이별 김건모아름다운+이별 김건모
아름다운+이별 김건모Soo Jeong Cheong
 
Mac os installation and Hardware Report
Mac os installation and Hardware ReportMac os installation and Hardware Report
Mac os installation and Hardware ReportPratik Vyas
 
Almoços Convívio Cerberus
Almoços Convívio CerberusAlmoços Convívio Cerberus
Almoços Convívio CerberusCerberus Pt
 
An Introduction To Linux Development Environment
An Introduction To Linux Development EnvironmentAn Introduction To Linux Development Environment
An Introduction To Linux Development EnvironmentS. M. Hossein Hamidi
 
Introducción a la administración f08
Introducción a la administración f08Introducción a la administración f08
Introducción a la administración f08Skepper63
 
презентация земноводные и пресмыкающиеся
презентация земноводные и пресмыкающиесяпрезентация земноводные и пресмыкающиеся
презентация земноводные и пресмыкающиесяСветлана Брюховецкая
 

Andere mochten auch (20)

Sp ws1 ulrich teichler
Sp ws1 ulrich teichlerSp ws1 ulrich teichler
Sp ws1 ulrich teichler
 
PhD thesis presentation 2012
PhD thesis presentation 2012PhD thesis presentation 2012
PhD thesis presentation 2012
 
Lee Clark 7th June 2010
Lee Clark 7th June 2010Lee Clark 7th June 2010
Lee Clark 7th June 2010
 
Finding Time to Study for the CIH Exam
Finding Time to Study for the CIH ExamFinding Time to Study for the CIH Exam
Finding Time to Study for the CIH Exam
 
Linux Installation And Shamba Server
Linux Installation And Shamba ServerLinux Installation And Shamba Server
Linux Installation And Shamba Server
 
Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...Пространственно-распределенная мультикластерная вычислительная система: архит...
Пространственно-распределенная мультикластерная вычислительная система: архит...
 
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...DSS ITSEC 2013 Conference 07.11.2013  - Accellion - The Secure File-Sharing P...
DSS ITSEC 2013 Conference 07.11.2013 - Accellion - The Secure File-Sharing P...
 
Jaba sat explorer-710
Jaba sat explorer-710Jaba sat explorer-710
Jaba sat explorer-710
 
아름다운+이별 김건모
아름다운+이별 김건모아름다운+이별 김건모
아름다운+이별 김건모
 
Mac os installation and Hardware Report
Mac os installation and Hardware ReportMac os installation and Hardware Report
Mac os installation and Hardware Report
 
Almoços Convívio Cerberus
Almoços Convívio CerberusAlmoços Convívio Cerberus
Almoços Convívio Cerberus
 
cIHMS
cIHMScIHMS
cIHMS
 
An Introduction To Linux Development Environment
An Introduction To Linux Development EnvironmentAn Introduction To Linux Development Environment
An Introduction To Linux Development Environment
 
Introducción a la administración f08
Introducción a la administración f08Introducción a la administración f08
Introducción a la administración f08
 
Lecture 13
Lecture 13Lecture 13
Lecture 13
 
QIP 2012
QIP 2012QIP 2012
QIP 2012
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Desktop environment
Desktop environmentDesktop environment
Desktop environment
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
презентация земноводные и пресмыкающиеся
презентация земноводные и пресмыкающиесяпрезентация земноводные и пресмыкающиеся
презентация земноводные и пресмыкающиеся
 

Ähnlich wie Cyber Crime

Ähnlich wie Cyber Crime (20)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
hacking
hackinghacking
hacking
 
Hacking (basic)
Hacking (basic)Hacking (basic)
Hacking (basic)
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Unit-2 ICS.ppt
Unit-2 ICS.pptUnit-2 ICS.ppt
Unit-2 ICS.ppt
 
ethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdfethicalhacking-140929012151-phpapp02.pdf
ethicalhacking-140929012151-phpapp02.pdf
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
The Basics of Ethical Hacking
The Basics of Ethical HackingThe Basics of Ethical Hacking
The Basics of Ethical Hacking
 
Ransomware hostage rescue manual
Ransomware hostage rescue manualRansomware hostage rescue manual
Ransomware hostage rescue manual
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Hacking (cs192 report )
Hacking (cs192 report )Hacking (cs192 report )
Hacking (cs192 report )
 
HACKING
HACKINGHACKING
HACKING
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Kürzlich hochgeladen

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111GangaMaiya1
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17Celine George
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationNeilDeclaro1
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactisticshameyhk98
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfPondicherry University
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 

Kürzlich hochgeladen (20)

Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 

Cyber Crime

  • 1. CYBER CRIME By T.Harshitha Rao
  • 2. What is cybercrime. • Top 20 countries in cybercrime. • Types of cyber crime. • Some examples of hacked sites. • Punishments and cyber acts. • Do’s and Don’ts.
  • 3. What is  The Invisible Criminals Are Dangerous Than The Visible One…
  • 4. » “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”. » A generalized definition of cyber crime may be “ unlawful acts wherein the computer is either a tool or target or both”.
  • 5. .
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. The good guys who identify the security weakness of the system or network and inform the owner about them
  • 11.  A black hat is the villain or bad guy, who crash into victim’s security to steal information and destroy the victims security network.  Also known as ‘cracker’.
  • 12.  A grey hat, in the hacking community, refers to a skilled hacker who is somewhere in between white and black hat hackers
  • 13. ۵ The challenge... ‘because it’s there!’ ۵ Ego ۵ Espionage ۵ Ideology ۵ Mischief ۵ Money (extortion or theft) ۵ Revenge
  • 14. o Malware is an abbreviated term used to describe a "malicious software" program. o Any type of code or program that is used for monitoring and collecting your personal information or disrupting or damaging your computer, may be referred to as malware.
  • 15. ¶ Phishing is an e-mail fraud method in which the perpetrator sends out legitimate-looking email in an attempt to gather personal and financial information from recipients. ¶ Phishers use a number of different social engineering and e-mail spoofing ploys to try to trick their victims.
  • 16. ѓ It is a set of tools used frequently by the computer science intruders or crackers that is able to accede illicitly to a computer science system. ѓ These tools serve to hide the processes and archives that allow the intruder to maintain the access to the system, often with malicious aims.
  • 17.  Spam  Downloads  Pop-ups  Active X
  • 18. Window GUI Technology base Forensic Software for examination of File systems FAT12, FAT16, FAT32, NTFS, LINUX, UNIX, MACINTOSH, CDROM and DVD- R.  It should able to examine and extracting slack space.  It should be able to create image of the storage media e.g. hard disk, Floppy disk.  It should show emails in developer’s format. (With headers and attachments)  It should open document in language other English spouted by Unicode e.g. Arabian language.  It should show Internet history.  Forensic Cell phone Seizure kit with write block facility and will all required cables and adapters.  Forensic Hardware: One computer PIV 3.2 GHz with 1 GB DDR RAM and other required peripheral.  One hard disk write block device.
  • 19. § Spam , also known as junk email or unsolicited bulk email(UBE), is a subset of electronic spam involving nearly identical messages sent to numerous recipients by email. § Spammers collect email addresses from chatrooms, websites, customer lists, newsgroups, and viruses which harvest users' address books, and are sold to other spammers.
  • 20. ∆ Spyware is a type of malware (malicious software) installed on computers that collects information about users without their knowledge. ∆ The presence of spyware is typically hidden from the user and can be difficult to detect.
  • 21. † Trojan, is a standalone malicious program that does not attempt to infect files unlike a computer virus nor replicate itself with the intent of infecting other computers unlike a computer worm. † Trojan horses can make copies of themselves, steal information, or harm their host computer systems.
  • 22. ж Computer virus is a computer program that can replicate itself and spread from one computer to another. ж Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers.
  • 23.
  • 24.  To see how far the virus can spread.  To cause damage and destruction to a targeted individual or organisation.  To achieve a feeling of superiority/power.  To leverage some form of personal gain.  To provide a ‘lesson’ in Internet security.  To conduct an experiment.
  • 25. 1 -> i or l || -> n 3 -> e |/| -> m 4 -> a s -> z 7 -> t z -> s 9 -> g f -> ph 0 -> o $ -> s ph -> f | -> i or l x -> ck ck -> x
  • 26. Example: 1 d1d n0t h4ck th1s p4g3, 1t w4s l1k3 th1s wh3|| 1 h4ck3d 1n I did not hack this page, it was like this when I hacked in.
  • 27. Hackers can leave their ‘graffiti’ on other people’s websites. Many sites have fallen foul of this activity: FBI and CIA NASA British Labour and Conservative Parties New York Times
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 35. www.jntu.ac.in was hacked on 7 Nov 2010.  www.songs.pk was hacked on 15 July 2011. Songs.pk JNTU homepage after it was hacked
  • 36. 21 January 2003:Two years jail for UK virus writer who infected 27,000 PCs Simon Vallor, the twenty-two year old web designer from North Wales who, in December 2002, pleaded guilty to writing and distributing three computer viruses, was today sentenced at Southwark Crown Court, London to a two year custodial sentence. His viruses - Gokar, Redesi and Admirer – were proven to have infected 27,000 PCs in 42 countries.
  • 37. Section Offence Cognizable or Non- Bailable or Non-Bailable By what court cognizable 65 Tempering with computer Cognizable Non-Bailable Magistrate of the First Class source code and documents 66 Hacking with computer Cognizable Non-Bailable Magistrate of the First Class system 67 Publishing of information Cognizable Non-Bailable First Conviction which is obscene in electronic Magistrate of the First Class format Second Conviction Court of session 68 Failure of comply with the Cognizable Non-Bailable Magistrate of the First Class directions of Controller 69 Failure to assist intercepting Cognizable Non-Bailable Magistrate of the First Class agency in decrypt-ion
  • 38. 70 Securing Access to a protected Cognizable Non-Bailable Court of Session system 71 Penalty for misrepresentation Non-Cognizable Bailable Any Magistrate 72 Breach of confidentiality and Non-Cognizable Bailable Any Magistrate privacy 73 Penalty for publishing Digital Non-Cognizable Bailable Any Magistrate Signature Certificate false in certain particulars 74 Publication for fraudulent Non-Cognizable Bailable Any Magistrate purpose 33 Failure to surrender license by Non-Cognizable Bailable Any Magistrate Certifying Authority
  • 39.
  • 40. Always use latest and up date anti virus software to guard against virus attacks. Always keep back up volumes so that one may not suffer data loss in case of virus contamination. Always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children.
  • 41. Avoid disclosing any information pertaining to one. Never send your credit card number to any site that is not secured, to guard against frauds. Always avoid sending any photograph online particularly to strangers .
  • 42. ¢ It is not possible to eliminate cyber crime from the cyber space. ¢ It is quite possible to check them. ¢ History is the witness that no legislation has succeeded in totally eliminating crime from the globe. ¢ The only possible step is to make people aware of their rights and duties.
  • 43. A final word: Treat your password like you treat your toothbrush. Never give it to anyone else to use, and change it every few months.

Hinweis der Redaktion

  1. Hackers use eye catching messages such as “You have won $1,000,000” to get the readers attention. These e-mails can deceive you into giving away important information about yourself. These spam e-mails are also used by hackers to get you to go to a dangerous website or worse to get you to download a program that gives the hacker total control of your computer.Many downloads contain spyware, adware, and viruses that can infect your computer and put you at risk for more serious consequences.Pop-ups, just like spam, are a tool that hackers use to get the reader to infect their own computer. By clicking on pop-ups a virus or spyware can be downloaded. It is another way to get you to put your personal information at risk.Hackers use Active X to gain entrance into your computer and steal important information.