SlideShare ist ein Scribd-Unternehmen logo
1 von 26
1
2
SOURCES …..4
DEFINING CYBERCRIME …..5
TYPES OF CYBERCRIME …..6
1. IDENTITY THEFT AND INVASION OF PRIVACY …..7
2. INTERNET FRAUD .….8
3. COUNTERFEITING AND FORGERY …..9
4. CHILD PORNOGRAPHY …..11
5. HACKING ..…12
6. COMPUTER VIRUSES …..14
7. DENIAL OF SERVICE ATTACKS …..16
8. SPAM …..18
9. SABOTAGE …..19
TOP 5 CYBERCRIMES …..20
1. TAX-REFUND FRAUD – …..21
2. CORPORATE ACCOUNT TAKEOVER …..22
3. IDENTITY THEFT …..23
4. THEFT OF SENSITIVE DATA …..24
5. THEFT OF INTELLECTUAL PROPERTY …..25
CONCLUSION ….26
1. "cybercrime". Encyclopædia Britannica.
Encyclopædia Britannica Online.
Encyclopædia Britannica Inc., 2015. Web. 18 Jun.
2015
<http://www.britannica.com/topic/cybercrime/C
ounterfeiting-and-forgery>.
2. Moore, R. (2005) "Cyber crime: Investigating
High-Technology Computer Crime," Cleveland,
Mississippi: Anderson Publishing.
3. Warren G. Kruse, Jay G. Heiser (2002). Computer
forensics: incident response essentials. Addison-
Wesley. p. 392. ISBN 0-201-70719-5.
3
Cybercrime, also called computer crime, the use of a computer as
an instrument to further illegal ends, such as committing fraud,
trafficking in child pornography and intellectual property,
stealing identities, or violating privacy.
Cybercrime, especially through the Internet, has grown in importance as the
computer has become central to commerce, entertainment, and government.
Because of the early and widespread adoption of computers and the Internet in
the United States, most of the earliest victims and villains of cybercrime were
Americans.
By the 21st century, though, hardly a hamlet remained anywhere in the world that
had not been touched by cybercrime of one sort or another
4
1. Identity theft and invasion of privacy
2. Internet fraud
3. Counterfeiting and forgery
4. Child pornography
5. Hacking
6. Computer viruses
7. Denial of service attacks
8. Spam
9. Sabotage
5
Identity theft is a form of stealing someone's identity in
which someone pretends to be someone else by assuming
that person's identity, usually as a method to gain access
to resources or obtain credit and other benefits in that
person's name. The victim of identity theft (here meaning
the person whose identity has been assumed by the
identity thief) can suffer adverse consequences if they are
held responsible for the perpetrator's actions. Identity
theft occurs when someone uses another's personally
identifying information, like their name, identifying
number, or credit card number, without their permission, to commit fraud
or other crimes.
6
A crime in which the perpetrator develops a
Scheme using one or more elements of the
Internet to deprive a person of property or any
interest, estate, or right by a false representation
of a matter of fact, whether by providing
misleading information or by concealment of
information.
As increasing numbers of businesses and consumers rely on the internet
and other forms of electronic communication to conduct transactions
; illegal activity using the very same media is similarly on the rise. Fraudulent s
chemes conducted via the internet are generallydifficult to trace and
prosecute, and they cost individuals and businesses millions of dollars each
year.
7
To counterfeit means to imitate something.
Counterfeit products are fake replicas of the real
product. Counterfeit products are often
produced with the intent to take advantage of
the superior value of the imitated product. The
word counterfeit frequently describes both the
forgeries of currency and documents, as well as
the imitations of clothing, handbags, shoes, pharmaceuticals, aviation and
automobile parts, watches, electronics (both parts and finished
products), software, works of art, toys, movies. Counterfeit products tend to have
fake company logos and brands. In the case of goods, it results in patent
infringement or trademark infringement.
8
Counterfeit consumer products have a reputation for being
lower quality (sometimes not working at all) and may even
include toxic elements.
This has resulted in the deaths of hundreds of thousands of
people, due to automobile and aviation accidents, poisoning,
or ceasing to take essential compounds (e.g. in the case a
person takes non-working medicine).
9
Child pornography is pornography that exploits
children for sexual stimulation. It may be produced with
the direct involvement or sexual assault of a child (also
known as child sexual abuse images) or it may be simulated
child pornography. Abuse of the child occurs during the
sexual acts or lascivious exhibitions of genitals or pubic
areas which are recorded in the production of child
pornography. Child pornography may use a variety of
media, including writings, magazines, photos, sculpture,
drawing, cartoon, painting, animation, sound recording, film, video, and video
games.
10
People, not computers, create computer threats.
Computer predators victimize others for their own
gain. Give a predator access to the Internet — and to
your PC — and the threat they pose to your security
increases exponentially. Computer hackers are
unauthorized users who break into computer systems
in order to steal, change or destroy information, often
by installing dangerous malware without your knowledge or consent. Their clever
tactics and detailed technical knowledge help them access information you really
don’t want them to have.
Anyone who uses a computer connected to the Internet is susceptible to the threats
that computer hackers and predators pose. These online villains typically
use phishing scams, spam email or instant messages and bogus Web sites to deliver
dangerous malware to your computer and compromise your computer security..
11
Computer hackers can also try to access your computer and
private information directly if you are not protected with a
firewall
They may also monitor your chat room conversations or
peruse your personal Web page. Usually disguised with a
bogus identity, predators can lure you into revealing sensitive
personal and financial information, or much worse.
12
A computer virus is a malware program that,
when executed, replicates by inserting copies of
itself (possibly modified) into other computer
programs, data files, or the boot sector of the
hard drive; when this replication succeeds,
the affected areas are then said to be "infected“.
Viruses often perform some type of harmful
activity on infected hosts, such as stealing hard disk space or CPU time, accessing
private information, corrupting data, displaying political or humorous messages
on the user's screen, spamming their contacts, logging their keystrokes, or even
rendering the computer useless. However, not all viruses carry a destructive
payload or attempt to hide themselves—the defining characteristic of viruses is
that they are self-replicating computer programs which install themselves without
user consent.
13
 Virus writers use social engineering and exploit detailed knowledge of security
vulnerabilities to gain access to their hosts' computing resources. The vast
majority of viruses target systems running Microsoft Windows, employing a
variety of mechanisms to infect new hosts, and often using complex anti-
detection/stealth strategies to evade antivirus software.
 Motives for creating viruses can include seeking profit, desire to send a political
message, personal amusement, to demonstrate that a vulnerability exists in
software, for sabotage and denial of service, or simply because they wish to
explore artificial life and evolutionary algorithms.
 Computer viruses currently cause billions of dollars' worth of economic
damage each year, due to causing systems failure, wasting computer resources,
corrupting data, increasing maintenance costs, etc. In response, free, open-
source antivirus tools have been developed, and a multi-billion dollar industry
of antivirus software vendors has cropped up, selling virus protection to users
of various operating systems of which Windows is often the most victimized,
partially due to its extreme popularity.
14
In computing, a denial-of-service (DoS) or
distributed denial-of-service (DDoS) attack is an
attempt to make a machine or network resource
unavailable to its intended users.
A DoS attack generally consists of efforts to
temporarily or indefinitely interrupt or suspend
services of a host connected to the Internet.
As clarification, distributed denial-of-service attacks are sent by two or more people,
or bots, and denial-of-service attacks are sent by one person or system. As of 2014,
the frequency of recognized DDoS attacks had reached an average rate of 28 per
hour.
15
 Perpetrators of DoS attacks typically target sites or services hosted on high-
profile web servers such as banks, credit card payment gateways, and even root
name servers
 Denial-of-service threats are also common in business, and are sometimes
responsible for website attacks.
 This technique has now seen extensive use in certain games, used by server
owners, or disgruntled competitors on games, such as
popular Minecraft multiplayer worlds, known as servers. Increasingly, DoS
attacks have also been used as a form of resistance. Richard Stallman has stated
that DoS is a form of 'Internet Street Protests’. The term is generally used
relating to computer networks, but is not limited to this field; for example, it is
also used in reference to CPU resource management.
16
Electronic spamming is the use of electronic
messaging systems to send unsolicited messages
(spam), especially advertising, as well as sending
messages repeatedly on the same site. While the most
widely recognized form of spam is email spam, the
term is applied to similar abuses in other media:
instant messaging spam, Usenet newsgroup spam,
Web search engine spam, spam in blogs, wiki spam, online classified
ads spam, mobile phone messaging spam, Internet forum spam, junk fax
transmissions, social spam, television advertising and file sharing spam. It is
named after Spam, a luncheon meat, by way of a Monty Python sketch in which
Spam is included in every dish. The food is stereotypically disliked/unwanted, so
the word came to be transferred by analogy.
17
Sabotage is a deliberate action aimed at
weakening a polity or corporation thro1ugh
subversion, obstruction, disruption, or
destruction. In a workplace setting, sabotage is the
conscious withdrawal of efficiency generally
directed at causing some change in workplace
conditions. One who engages in sabotage is a
saboteur. Saboteurs typically try to conceal
their identities because of the consequences
of their actions.Any unexplained adverse condition might be sabotage. Sabotage is
sometimes called tampering, meddling, tinkering, malicious pranks, malicious
hacking, a practical joke or the like to avoid needing to invoke legal and
organizational requirements for addressing sabotage
18
1. TAX-REFUND FRAUD –
2. CORPORATE ACCOUNT TAKEOVER
3. IDENTITY THEFT
4. THEFT OF SENSITIVE DATA
5. THEFT OF INTELLECTUAL PROPERTY
19
The U.S. Internal Revenue Service calls the scam its
No. 1 fraud. Identity thieves are using stolen personally
identifiable information to file victims’ tax returns and
then receive their refunds. Here’s how they do it and
ways to combat and prevent it.
Katie Winston, who held an MBA degree from
Harvard University, was a very successful broker for a large firm on Wall Street.
With tax time approaching, she gave her records and receipts to her longtime tax
specialist to ensure she would comply with the income tax code when she filed her
return.
Normally, she would receive a refund. But this time the Internal Revenue Service
(IRS) sent her a notice stating that “More than one tax return for you was filed” and
informing her that it had already issued a refund check in her name. After she spoke
with her tax professional and an IRS agent, she realized that she was the victim of an
identity theft tax refund scam.
20
 "To obtain access to financial accounts, cyber criminals
target employees--often senior executives or
accounting, HR personnel, and business partners and
cause the targeted individual to spread [malware],
which in turn steals their personal information and
log-in credentials," the FBI says in its full report (PDF).
 "Once the account is compromised, the cyber criminal is able to electronically steal
money from business accounts," the report explains. "Cyber criminals also use
various attack methods to exploit check archiving and verification services that
enable them to issue counterfeit checks, impersonate the customer over the phone
to arrange funds transfers, mimic legitimate communication from the financial
institution to verify transactions, create unauthorized wire transfers and ACH
payments, or initiate other changes to the account."
21
Identity theft happens when fraudsters access
enough information about someone’s identity (such
as their name, date of birth, current or previous
addresses) to commit identity fraud. Identity theft
can take place whether the fraud victim is alive or
deceased.
If you’re a victim of identity theft, it can lead to
fraud that can have a direct impact on your personal finances and could also make
it difficult for you to obtain loans, credit cards or a mortgage until the matter is
resolved.
22
It is important to remember that electronic information
is vulnerable to theft by intruders as well as insiders,
whose motivations may include industrial espionage,
extortion, organized crime, vandalism, revenge, or
bragging rights. Data is vulnerable to theft whether at
rest, in transit, or being processed:
 To steal data at rest, attackers can copy it onto removable media, transmit it to
other insecure devices, or compromise host systems and penetrate them when
they are most vulnerable.
 To steal data in transit, intruders can use "man-in-the-middle" tools to intercept
sensitive information such as passwords, customer credit-card information, or
voice conversations.
 To steal data being processed, attackers can use spyware installed surreptitiously
on the desktop to collect information as it is entered
23
Intellectual property is any innovation, commercial
or artistic; any new method or formula with economic
value; or any unique name, symbol, or logo that is
used commercially. Intellectual property is protected
by patents on inventions; trademarks on branded
devices; copyrights on music, videos, patterns, and
other forms of expression; and state and federal laws.
Stealing intellectual property is cheap and easy. All a thief has to do is copy someone
else’s ideas or product. The other person or company—the victim—has done all the
work, but thieves can reap huge profits. Intellectual property theft can cost people
their jobs, damage the reputation of the original maker of the counterfeited
product, cause sickness and bodily harm, deprive governments of desperately
needed tax revenue, and even result in the spread of organized crime and gangs—
which in turn can damage more lives and destroy neighbourhood's.
24
 As someone rightly said that
The growth of cyber crime in India, as all over the world, is on the rise and to
curb its scope and complexity is the pertinent need today. Cyber space offers a
plethora of opportunities for cyber criminals either to cause harm to innocent
people, or to make a fast buck at the expense of unsuspecting citizens. India’s
profile and wealth have risen enormously in the world due to the constructive
use of information technology. At the same time
, according to a report last year by the U.S.-based Internet Crime
Complaint Centre, a partnership between the Federal Bureau of Investigation
and the National White Collar Crime Centre Even under the IT Act,
investigations in India are not easy. This is mainly due to the lack of what is
called “cyber forensics.” We know that forensic evidence is important in normal
criminal investigations. But the collection and presentation of electronic
evidence to prove cyber crimes have posed a challenge to investigation and
prosecution agencies and the judiciary.
To sum up, India needs a good combination of laws and technology, in
harmony with the laws of other countries and keeping in mind common
security standards. In the era of e-governance and e-commerce, a lack of
common security standards can create havoc for global trade as well as military
matters.
25
26

Weitere ähnliche Inhalte

Was ist angesagt?

E0334035040
E0334035040E0334035040
E0334035040theijes
 
Why My E Identity Needs Protection
Why My E Identity Needs ProtectionWhy My E Identity Needs Protection
Why My E Identity Needs Protectionecarrow
 
Social engineering
Social engineeringSocial engineering
Social engineeringBola Oduyale
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008Donald E. Hester
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15haney888
 
Anatomy of an Enterprise Social Cyber Attack
Anatomy of an Enterprise Social Cyber Attack Anatomy of an Enterprise Social Cyber Attack
Anatomy of an Enterprise Social Cyber Attack ZeroFOX
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internetdevashishicai
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Solomon Oho
 
Dyre: Emerging Threat on Financial Fraud Landscape
Dyre: Emerging Threat on Financial Fraud LandscapeDyre: Emerging Threat on Financial Fraud Landscape
Dyre: Emerging Threat on Financial Fraud LandscapeSymantec
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security MotivationSuman Thapaliya
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia WatsonPatricia M Watson
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual ReportLabris Networks
 
Butterfly: Corporate Spies out for Financial Gain
Butterfly: Corporate Spies out for Financial GainButterfly: Corporate Spies out for Financial Gain
Butterfly: Corporate Spies out for Financial GainSymantec
 
Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515lisawhipp
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were assimba35
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question consimba35
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International Scott Mills
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
Data security concepts chapter 2
Data security concepts chapter 2Data security concepts chapter 2
Data security concepts chapter 2Nickkisha Farrell
 

Was ist angesagt? (20)

E0334035040
E0334035040E0334035040
E0334035040
 
Why My E Identity Needs Protection
Why My E Identity Needs ProtectionWhy My E Identity Needs Protection
Why My E Identity Needs Protection
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
ID Theft and Computer Security 2008
ID Theft and Computer Security 2008ID Theft and Computer Security 2008
ID Theft and Computer Security 2008
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15
 
Anatomy of an Enterprise Social Cyber Attack
Anatomy of an Enterprise Social Cyber Attack Anatomy of an Enterprise Social Cyber Attack
Anatomy of an Enterprise Social Cyber Attack
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)Application of computer to legal practice (hacking)
Application of computer to legal practice (hacking)
 
Dyre: Emerging Threat on Financial Fraud Landscape
Dyre: Emerging Threat on Financial Fraud LandscapeDyre: Emerging Threat on Financial Fraud Landscape
Dyre: Emerging Threat on Financial Fraud Landscape
 
Cyber Security Motivation
Cyber Security MotivationCyber Security Motivation
Cyber Security Motivation
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
 
IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
Butterfly: Corporate Spies out for Financial Gain
Butterfly: Corporate Spies out for Financial GainButterfly: Corporate Spies out for Financial Gain
Butterfly: Corporate Spies out for Financial Gain
 
Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515Dark side presentation lwhippedtc515
Dark side presentation lwhippedtc515
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were as
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question con
 
FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International FBI And Cyber Crime | Crime Stoppers International
FBI And Cyber Crime | Crime Stoppers International
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Data security concepts chapter 2
Data security concepts chapter 2Data security concepts chapter 2
Data security concepts chapter 2
 

Ähnlich wie Cybercrime

Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber CrimeGaurav Patel
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubairMuhammad Zubair
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxchrixymae
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar ReportArindam Sarkar
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxbkbk37
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxwrite12
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...IJCSIS Research Publications
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptSukhdev48
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 

Ähnlich wie Cybercrime (20)

Typology of Cyber Crime
Typology of Cyber CrimeTypology of Cyber Crime
Typology of Cyber Crime
 
Cyber crime in pakistan by zubair
Cyber crime in pakistan by zubairCyber crime in pakistan by zubair
Cyber crime in pakistan by zubair
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
THE CYBER WORLD.pptx
THE CYBER WORLD.pptxTHE CYBER WORLD.pptx
THE CYBER WORLD.pptx
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Kürzlich hochgeladen

John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A HistoryJohn Hustaix
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceMichael Cicero
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiBlayneRush1
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一jr6r07mb
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书SD DS
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeMelvinPernez2
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书1k98h0e1
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书SD DS
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一st Las
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 

Kürzlich hochgeladen (20)

John Hustaix - The Legal Profession: A History
John Hustaix - The Legal Profession:  A HistoryJohn Hustaix - The Legal Profession:  A History
John Hustaix - The Legal Profession: A History
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics GuidanceLaw360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
Law360 - How Duty Of Candor Figures In USPTO AI Ethics Guidance
 
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogiAlexis O'Connell Arrest Records Houston Texas lexileeyogi
Alexis O'Connell Arrest Records Houston Texas lexileeyogi
 
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
定制(WMU毕业证书)美国西密歇根大学毕业证成绩单原版一比一
 
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
如何办理(GWU毕业证书)乔治华盛顿大学毕业证学位证书
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
Succession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil CodeSuccession (Articles 774-1116 Civil Code
Succession (Articles 774-1116 Civil Code
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
昆士兰科技大学毕业证学位证成绩单-补办步骤澳洲毕业证书
 
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
如何办理(UNK毕业证书)内布拉斯加大学卡尼尔分校毕业证学位证书
 
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
定制(BU文凭证书)美国波士顿大学毕业证成绩单原版一比一
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 

Cybercrime

  • 1. 1
  • 2. 2 SOURCES …..4 DEFINING CYBERCRIME …..5 TYPES OF CYBERCRIME …..6 1. IDENTITY THEFT AND INVASION OF PRIVACY …..7 2. INTERNET FRAUD .….8 3. COUNTERFEITING AND FORGERY …..9 4. CHILD PORNOGRAPHY …..11 5. HACKING ..…12 6. COMPUTER VIRUSES …..14 7. DENIAL OF SERVICE ATTACKS …..16 8. SPAM …..18 9. SABOTAGE …..19 TOP 5 CYBERCRIMES …..20 1. TAX-REFUND FRAUD – …..21 2. CORPORATE ACCOUNT TAKEOVER …..22 3. IDENTITY THEFT …..23 4. THEFT OF SENSITIVE DATA …..24 5. THEFT OF INTELLECTUAL PROPERTY …..25 CONCLUSION ….26
  • 3. 1. "cybercrime". Encyclopædia Britannica. Encyclopædia Britannica Online. Encyclopædia Britannica Inc., 2015. Web. 18 Jun. 2015 <http://www.britannica.com/topic/cybercrime/C ounterfeiting-and-forgery>. 2. Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. 3. Warren G. Kruse, Jay G. Heiser (2002). Computer forensics: incident response essentials. Addison- Wesley. p. 392. ISBN 0-201-70719-5. 3
  • 4. Cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government. Because of the early and widespread adoption of computers and the Internet in the United States, most of the earliest victims and villains of cybercrime were Americans. By the 21st century, though, hardly a hamlet remained anywhere in the world that had not been touched by cybercrime of one sort or another 4
  • 5. 1. Identity theft and invasion of privacy 2. Internet fraud 3. Counterfeiting and forgery 4. Child pornography 5. Hacking 6. Computer viruses 7. Denial of service attacks 8. Spam 9. Sabotage 5
  • 6. Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, usually as a method to gain access to resources or obtain credit and other benefits in that person's name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if they are held responsible for the perpetrator's actions. Identity theft occurs when someone uses another's personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. 6
  • 7. A crime in which the perpetrator develops a Scheme using one or more elements of the Internet to deprive a person of property or any interest, estate, or right by a false representation of a matter of fact, whether by providing misleading information or by concealment of information. As increasing numbers of businesses and consumers rely on the internet and other forms of electronic communication to conduct transactions ; illegal activity using the very same media is similarly on the rise. Fraudulent s chemes conducted via the internet are generallydifficult to trace and prosecute, and they cost individuals and businesses millions of dollars each year. 7
  • 8. To counterfeit means to imitate something. Counterfeit products are fake replicas of the real product. Counterfeit products are often produced with the intent to take advantage of the superior value of the imitated product. The word counterfeit frequently describes both the forgeries of currency and documents, as well as the imitations of clothing, handbags, shoes, pharmaceuticals, aviation and automobile parts, watches, electronics (both parts and finished products), software, works of art, toys, movies. Counterfeit products tend to have fake company logos and brands. In the case of goods, it results in patent infringement or trademark infringement. 8
  • 9. Counterfeit consumer products have a reputation for being lower quality (sometimes not working at all) and may even include toxic elements. This has resulted in the deaths of hundreds of thousands of people, due to automobile and aviation accidents, poisoning, or ceasing to take essential compounds (e.g. in the case a person takes non-working medicine). 9
  • 10. Child pornography is pornography that exploits children for sexual stimulation. It may be produced with the direct involvement or sexual assault of a child (also known as child sexual abuse images) or it may be simulated child pornography. Abuse of the child occurs during the sexual acts or lascivious exhibitions of genitals or pubic areas which are recorded in the production of child pornography. Child pornography may use a variety of media, including writings, magazines, photos, sculpture, drawing, cartoon, painting, animation, sound recording, film, video, and video games. 10
  • 11. People, not computers, create computer threats. Computer predators victimize others for their own gain. Give a predator access to the Internet — and to your PC — and the threat they pose to your security increases exponentially. Computer hackers are unauthorized users who break into computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or consent. Their clever tactics and detailed technical knowledge help them access information you really don’t want them to have. Anyone who uses a computer connected to the Internet is susceptible to the threats that computer hackers and predators pose. These online villains typically use phishing scams, spam email or instant messages and bogus Web sites to deliver dangerous malware to your computer and compromise your computer security.. 11
  • 12. Computer hackers can also try to access your computer and private information directly if you are not protected with a firewall They may also monitor your chat room conversations or peruse your personal Web page. Usually disguised with a bogus identity, predators can lure you into revealing sensitive personal and financial information, or much worse. 12
  • 13. A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected“. Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, logging their keystrokes, or even rendering the computer useless. However, not all viruses carry a destructive payload or attempt to hide themselves—the defining characteristic of viruses is that they are self-replicating computer programs which install themselves without user consent. 13
  • 14.  Virus writers use social engineering and exploit detailed knowledge of security vulnerabilities to gain access to their hosts' computing resources. The vast majority of viruses target systems running Microsoft Windows, employing a variety of mechanisms to infect new hosts, and often using complex anti- detection/stealth strategies to evade antivirus software.  Motives for creating viruses can include seeking profit, desire to send a political message, personal amusement, to demonstrate that a vulnerability exists in software, for sabotage and denial of service, or simply because they wish to explore artificial life and evolutionary algorithms.  Computer viruses currently cause billions of dollars' worth of economic damage each year, due to causing systems failure, wasting computer resources, corrupting data, increasing maintenance costs, etc. In response, free, open- source antivirus tools have been developed, and a multi-billion dollar industry of antivirus software vendors has cropped up, selling virus protection to users of various operating systems of which Windows is often the most victimized, partially due to its extreme popularity. 14
  • 15. In computing, a denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users. A DoS attack generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. As clarification, distributed denial-of-service attacks are sent by two or more people, or bots, and denial-of-service attacks are sent by one person or system. As of 2014, the frequency of recognized DDoS attacks had reached an average rate of 28 per hour. 15
  • 16.  Perpetrators of DoS attacks typically target sites or services hosted on high- profile web servers such as banks, credit card payment gateways, and even root name servers  Denial-of-service threats are also common in business, and are sometimes responsible for website attacks.  This technique has now seen extensive use in certain games, used by server owners, or disgruntled competitors on games, such as popular Minecraft multiplayer worlds, known as servers. Increasingly, DoS attacks have also been used as a form of resistance. Richard Stallman has stated that DoS is a form of 'Internet Street Protests’. The term is generally used relating to computer networks, but is not limited to this field; for example, it is also used in reference to CPU resource management. 16
  • 17. Electronic spamming is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising, as well as sending messages repeatedly on the same site. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social spam, television advertising and file sharing spam. It is named after Spam, a luncheon meat, by way of a Monty Python sketch in which Spam is included in every dish. The food is stereotypically disliked/unwanted, so the word came to be transferred by analogy. 17
  • 18. Sabotage is a deliberate action aimed at weakening a polity or corporation thro1ugh subversion, obstruction, disruption, or destruction. In a workplace setting, sabotage is the conscious withdrawal of efficiency generally directed at causing some change in workplace conditions. One who engages in sabotage is a saboteur. Saboteurs typically try to conceal their identities because of the consequences of their actions.Any unexplained adverse condition might be sabotage. Sabotage is sometimes called tampering, meddling, tinkering, malicious pranks, malicious hacking, a practical joke or the like to avoid needing to invoke legal and organizational requirements for addressing sabotage 18
  • 19. 1. TAX-REFUND FRAUD – 2. CORPORATE ACCOUNT TAKEOVER 3. IDENTITY THEFT 4. THEFT OF SENSITIVE DATA 5. THEFT OF INTELLECTUAL PROPERTY 19
  • 20. The U.S. Internal Revenue Service calls the scam its No. 1 fraud. Identity thieves are using stolen personally identifiable information to file victims’ tax returns and then receive their refunds. Here’s how they do it and ways to combat and prevent it. Katie Winston, who held an MBA degree from Harvard University, was a very successful broker for a large firm on Wall Street. With tax time approaching, she gave her records and receipts to her longtime tax specialist to ensure she would comply with the income tax code when she filed her return. Normally, she would receive a refund. But this time the Internal Revenue Service (IRS) sent her a notice stating that “More than one tax return for you was filed” and informing her that it had already issued a refund check in her name. After she spoke with her tax professional and an IRS agent, she realized that she was the victim of an identity theft tax refund scam. 20
  • 21.  "To obtain access to financial accounts, cyber criminals target employees--often senior executives or accounting, HR personnel, and business partners and cause the targeted individual to spread [malware], which in turn steals their personal information and log-in credentials," the FBI says in its full report (PDF).  "Once the account is compromised, the cyber criminal is able to electronically steal money from business accounts," the report explains. "Cyber criminals also use various attack methods to exploit check archiving and verification services that enable them to issue counterfeit checks, impersonate the customer over the phone to arrange funds transfers, mimic legitimate communication from the financial institution to verify transactions, create unauthorized wire transfers and ACH payments, or initiate other changes to the account." 21
  • 22. Identity theft happens when fraudsters access enough information about someone’s identity (such as their name, date of birth, current or previous addresses) to commit identity fraud. Identity theft can take place whether the fraud victim is alive or deceased. If you’re a victim of identity theft, it can lead to fraud that can have a direct impact on your personal finances and could also make it difficult for you to obtain loans, credit cards or a mortgage until the matter is resolved. 22
  • 23. It is important to remember that electronic information is vulnerable to theft by intruders as well as insiders, whose motivations may include industrial espionage, extortion, organized crime, vandalism, revenge, or bragging rights. Data is vulnerable to theft whether at rest, in transit, or being processed:  To steal data at rest, attackers can copy it onto removable media, transmit it to other insecure devices, or compromise host systems and penetrate them when they are most vulnerable.  To steal data in transit, intruders can use "man-in-the-middle" tools to intercept sensitive information such as passwords, customer credit-card information, or voice conversations.  To steal data being processed, attackers can use spyware installed surreptitiously on the desktop to collect information as it is entered 23
  • 24. Intellectual property is any innovation, commercial or artistic; any new method or formula with economic value; or any unique name, symbol, or logo that is used commercially. Intellectual property is protected by patents on inventions; trademarks on branded devices; copyrights on music, videos, patterns, and other forms of expression; and state and federal laws. Stealing intellectual property is cheap and easy. All a thief has to do is copy someone else’s ideas or product. The other person or company—the victim—has done all the work, but thieves can reap huge profits. Intellectual property theft can cost people their jobs, damage the reputation of the original maker of the counterfeited product, cause sickness and bodily harm, deprive governments of desperately needed tax revenue, and even result in the spread of organized crime and gangs— which in turn can damage more lives and destroy neighbourhood's. 24
  • 25.  As someone rightly said that The growth of cyber crime in India, as all over the world, is on the rise and to curb its scope and complexity is the pertinent need today. Cyber space offers a plethora of opportunities for cyber criminals either to cause harm to innocent people, or to make a fast buck at the expense of unsuspecting citizens. India’s profile and wealth have risen enormously in the world due to the constructive use of information technology. At the same time , according to a report last year by the U.S.-based Internet Crime Complaint Centre, a partnership between the Federal Bureau of Investigation and the National White Collar Crime Centre Even under the IT Act, investigations in India are not easy. This is mainly due to the lack of what is called “cyber forensics.” We know that forensic evidence is important in normal criminal investigations. But the collection and presentation of electronic evidence to prove cyber crimes have posed a challenge to investigation and prosecution agencies and the judiciary. To sum up, India needs a good combination of laws and technology, in harmony with the laws of other countries and keeping in mind common security standards. In the era of e-governance and e-commerce, a lack of common security standards can create havoc for global trade as well as military matters. 25
  • 26. 26