2. C
Y
B
C
E
Battle among
R
C
R
I
M
E
y hackers
b & crackers
e
CYBER CRIME | 21/05/2011
3. C
Y Introduction
B
E
R
C
R
Cybercrime, refers to any crime that involves a
computer and a network, where the computers may
I
M
E
or may not have played an instrumental part in the
commission of a crime. Net-crime refers, more
precisely, to criminal exploitation of the Internet.
Issues surrounding this type of crime have become
C high-profile, particularly those surrounding hacking,
y copyright infringement, and child grooming. There
are also problems of privacy when confidential
b information is lost or intercepted, lawfully or
e otherwise.
C r ime CYBER CRIME | 21/05/2011
4. C
Y Types Of CYBER CRIME
B
E
R
C
R
I
M
E Financial Claims: This would include cheating, credit card
frauds, money laundering etc.
Sale of illegal articles: This would include sale of
narcotics, weapons and wildlife etc., by posting information on
websites, bulletin boards or simply by using e-mail
C communications.
y Onlineabroad, thatThereonline gambling. In fact, it ishosted on
servers
gambling:
offer
are millions of websites, all
believed
b that many of these websites are actually fronts for money
laundering.
e
C r ime CYBER CRIME | 21/05/2011
5. C
Y Types Of CYBER CRIME
B
E
R
C
R
I Forgery: Counterfeit currency notes, postage and revenue stamps,
M
E mark sheets etc., can be forged using sophisticated computers,
printers and scanners.
Cyber Defamation: This occurs when defamation takes place
with the help of computers and or the Internet e.g. someone
published defamatory matter about someone on a websites or
C sends e-mail containing defamatory information to all of that
person’s friends.
y Cyber Stalking: Cyber stalking involves following a person’s
b movements across the Internetthe victim, entering the chat-rooms
bulletin boards frequented by
by posting messages on the
e frequented by the victim.
C r ime CYBER CRIME | 21/05/2011
6. C
Y Types Of CYBER CRIME
B
E
R
C E-Mail spoofing: A spoofed email is one that appears to originate
R
I from one source but actually has been sent from another source.
M
E This can also be termed as E-Mail forging.
Intellectual Property Crimes: These include software
piracy, copyright infringement, trademarks violations etc.
Unauthorized access to computer system or network: This
activity is commonly referred to as hacking. The Indian Law has
C however given a different connotation to the term hacking.
y Theft of information stored in computer hard disks, removable
includes
information contained in electronic from: This
b storage media etc.
e E-Mail bombing: to the victim. refers to sending a large
amount of e-mails
Email bombing
C r ime CYBER CRIME | 21/05/2011
7. C
Y Types Of CYBER CRIME
B
E
R
C Data diddling: This kind of an attack involves altering the raw
R
I data just before it is processed by a computer and then changing it
M
E back after the processing is completed.
Salami attacks: Those attacks are used for the commission of
financial crimes. The key here is to make the alteration so
insignificant that in a single case it would go completely unnoticed
e.g. A bank employee inserts a program into bank’s servers, that
C deducts a small amount from the account of every customer.
y Denial of Service: than involves flooding computer resources
with more requests
This
it can handle. This causes the resources
b to crash thereby denying authorized users the service offered by
the resources.
e
C r ime CYBER CRIME | 21/05/2011
8. C
Y Types Of CYBER CRIME
B
E
R
C Virus/worm: Viruses are programs that attach themselves to a
R
I computer or a file and then circulate themselves to other files and
M
E to other computers on a network. They usually affect the data on a
computer, either by altering or deleting it. Worms, unlike viruses
don not need the host to attach themselves to.
Logic bombs: These are dependent programs. This implies that
these programs are created to do something only when a certain
C event occurs, e.g. some viruses may be termed logic bombs
because they lie dormant all through the year and become active
y only on a particular date.
b Trojan Horse:program which functions from inside what an to
unauthorized
A Trojan as this program is aptly called, is
seems
e be an authorized program, thereby concealing what it is actually
doing.
C r ime CYBER CRIME | 21/05/2011
9. C
Y TypesIntroduction
Of CYBER CRIME
B
E
R
C Internet Time Theft: This connotes the usage by unauthorized
R
I persons of the Internet hours paid for by another person.
M
E
Physically damaging a computer system: This crime is
committed by physically damaging a computer or its peripherals.
C
y
b
e
C r ime CYBER CRIME | 21/05/2011
10. C
Y Where INDIA Stands
B
E
R
C
R
I
M
E
C
y
b
e
C r ime CYBER CRIME | 21/05/2011
11. C
Y Preventive Steps
B
E
R
C CHILDREN:
R
I Children should not give out identifying information such as
M
E Name, Home address, School Name, Telephone Number or share
photographs in a chat room.They should not respond to
messages, which are suggestive, obscene, belligerent or
threatening, and not to arrange a face-to –face meeting without
telling parents or guardians. They should remember that people
online might not be who they seem.
C PARENTS:
y Parent should gambling, hate speech, drugs, on PC toetc.
children from
use content filtering software
alcohol
protect
b There is also softwareto see whichtimeitem childrenuse of visited.
and allowing parents
to establish
site
controls for
have
limpets
e Use this software to keep track of the type of activities of children.
C r ime CYBER CRIME | 21/05/2011
12. C
Y Preventive Steps
B
E
R
C
R
ORGANISATIONS AND GOVERNMENT
I
M
E
i. PHYSICAL SECURITY:
ii. ACCESS CONTROL:
C iii. PASSWORD:
y iv. FINDING THE HOLES IN NETWORK:
b v. USING ENCRYPTION
e vi. DETECTION
C r ime CYBER CRIME | 21/05/2011
13. C
Y Conclusion
B
E
R
C Capacity of human mind is unfathomable. It is not possible to
R
I eliminate cyber crime from the cyber space. It is quite possible to
M
E check them. History is the witness that no legislation has
succeeded in totally eliminating crime from the globe. The only
possible step is to make people aware of their rights and duties (to
report crime as a collective duty towards the society) and further
making the application of the laws more stringent to check crime.
Undoubtedly the Act is a historical step in the cyber world.
C Further I all together do not deny that there is a need to bring
changes in the Information Technology Act to make it more
y effective to combat cyber crime. I would conclude with a word of
caution for the pro-legislation school that it should be kept in
b mind that the provisions of the cyber law are not made so
stringent that it may retard the growth of the industry and prove
e to be counter-productive.
C r ime CYBER CRIME | 21/05/2011
14. C
Y Queries
B
E
R
C
R
¿?
I
M
E
C
y
b
e
?
¿?
C r ime CYBER CRIME | 21/05/2011