2. 2
SOURCES …..4
DEFINING CYBERCRIME …..5
TYPES OF CYBERCRIME …..6
1. IDENTITY THEFT AND INVASION OF PRIVACY …..7
2. INTERNET FRAUD .….8
3. COUNTERFEITING AND FORGERY …..9
4. CHILD PORNOGRAPHY …..11
5. HACKING ..…12
6. COMPUTER VIRUSES …..14
7. DENIAL OF SERVICE ATTACKS …..16
8. SPAM …..18
9. SABOTAGE …..19
TOP 5 CYBERCRIMES …..20
1. TAX-REFUND FRAUD – …..21
2. CORPORATE ACCOUNT TAKEOVER …..22
3. IDENTITY THEFT …..23
4. THEFT OF SENSITIVE DATA …..24
5. THEFT OF INTELLECTUAL PROPERTY …..25
CONCLUSION ….26
3. 1. "cybercrime". Encyclopædia Britannica.
Encyclopædia Britannica Online.
Encyclopædia Britannica Inc., 2015. Web. 18 Jun.
2015
<http://www.britannica.com/topic/cybercrime/C
ounterfeiting-and-forgery>.
2. Moore, R. (2005) "Cyber crime: Investigating
High-Technology Computer Crime," Cleveland,
Mississippi: Anderson Publishing.
3. Warren G. Kruse, Jay G. Heiser (2002). Computer
forensics: incident response essentials. Addison-
Wesley. p. 392. ISBN 0-201-70719-5.
3
4. Cybercrime, also called computer crime, the use of a computer as
an instrument to further illegal ends, such as committing fraud,
trafficking in child pornography and intellectual property,
stealing identities, or violating privacy.
Cybercrime, especially through the Internet, has grown in importance as the
computer has become central to commerce, entertainment, and government.
Because of the early and widespread adoption of computers and the Internet in
the United States, most of the earliest victims and villains of cybercrime were
Americans.
By the 21st century, though, hardly a hamlet remained anywhere in the world that
had not been touched by cybercrime of one sort or another
4
5. 1. Identity theft and invasion of privacy
2. Internet fraud
3. Counterfeiting and forgery
4. Child pornography
5. Hacking
6. Computer viruses
7. Denial of service attacks
8. Spam
9. Sabotage
5
6. Identity theft is a form of stealing someone's identity in
which someone pretends to be someone else by assuming
that person's identity, usually as a method to gain access
to resources or obtain credit and other benefits in that
person's name. The victim of identity theft (here meaning
the person whose identity has been assumed by the
identity thief) can suffer adverse consequences if they are
held responsible for the perpetrator's actions. Identity
theft occurs when someone uses another's personally
identifying information, like their name, identifying
number, or credit card number, without their permission, to commit fraud
or other crimes.
6
7. A crime in which the perpetrator develops a
Scheme using one or more elements of the
Internet to deprive a person of property or any
interest, estate, or right by a false representation
of a matter of fact, whether by providing
misleading information or by concealment of
information.
As increasing numbers of businesses and consumers rely on the internet
and other forms of electronic communication to conduct transactions
; illegal activity using the very same media is similarly on the rise. Fraudulent s
chemes conducted via the internet are generallydifficult to trace and
prosecute, and they cost individuals and businesses millions of dollars each
year.
7
8. To counterfeit means to imitate something.
Counterfeit products are fake replicas of the real
product. Counterfeit products are often
produced with the intent to take advantage of
the superior value of the imitated product. The
word counterfeit frequently describes both the
forgeries of currency and documents, as well as
the imitations of clothing, handbags, shoes, pharmaceuticals, aviation and
automobile parts, watches, electronics (both parts and finished
products), software, works of art, toys, movies. Counterfeit products tend to have
fake company logos and brands. In the case of goods, it results in patent
infringement or trademark infringement.
8
9. Counterfeit consumer products have a reputation for being
lower quality (sometimes not working at all) and may even
include toxic elements.
This has resulted in the deaths of hundreds of thousands of
people, due to automobile and aviation accidents, poisoning,
or ceasing to take essential compounds (e.g. in the case a
person takes non-working medicine).
9
10. Child pornography is pornography that exploits
children for sexual stimulation. It may be produced with
the direct involvement or sexual assault of a child (also
known as child sexual abuse images) or it may be simulated
child pornography. Abuse of the child occurs during the
sexual acts or lascivious exhibitions of genitals or pubic
areas which are recorded in the production of child
pornography. Child pornography may use a variety of
media, including writings, magazines, photos, sculpture,
drawing, cartoon, painting, animation, sound recording, film, video, and video
games.
10
11. People, not computers, create computer threats.
Computer predators victimize others for their own
gain. Give a predator access to the Internet — and to
your PC — and the threat they pose to your security
increases exponentially. Computer hackers are
unauthorized users who break into computer systems
in order to steal, change or destroy information, often
by installing dangerous malware without your knowledge or consent. Their clever
tactics and detailed technical knowledge help them access information you really
don’t want them to have.
Anyone who uses a computer connected to the Internet is susceptible to the threats
that computer hackers and predators pose. These online villains typically
use phishing scams, spam email or instant messages and bogus Web sites to deliver
dangerous malware to your computer and compromise your computer security..
11
12. Computer hackers can also try to access your computer and
private information directly if you are not protected with a
firewall
They may also monitor your chat room conversations or
peruse your personal Web page. Usually disguised with a
bogus identity, predators can lure you into revealing sensitive
personal and financial information, or much worse.
12
13. A computer virus is a malware program that,
when executed, replicates by inserting copies of
itself (possibly modified) into other computer
programs, data files, or the boot sector of the
hard drive; when this replication succeeds,
the affected areas are then said to be "infected“.
Viruses often perform some type of harmful
activity on infected hosts, such as stealing hard disk space or CPU time, accessing
private information, corrupting data, displaying political or humorous messages
on the user's screen, spamming their contacts, logging their keystrokes, or even
rendering the computer useless. However, not all viruses carry a destructive
payload or attempt to hide themselves—the defining characteristic of viruses is
that they are self-replicating computer programs which install themselves without
user consent.
13
14. Virus writers use social engineering and exploit detailed knowledge of security
vulnerabilities to gain access to their hosts' computing resources. The vast
majority of viruses target systems running Microsoft Windows, employing a
variety of mechanisms to infect new hosts, and often using complex anti-
detection/stealth strategies to evade antivirus software.
Motives for creating viruses can include seeking profit, desire to send a political
message, personal amusement, to demonstrate that a vulnerability exists in
software, for sabotage and denial of service, or simply because they wish to
explore artificial life and evolutionary algorithms.
Computer viruses currently cause billions of dollars' worth of economic
damage each year, due to causing systems failure, wasting computer resources,
corrupting data, increasing maintenance costs, etc. In response, free, open-
source antivirus tools have been developed, and a multi-billion dollar industry
of antivirus software vendors has cropped up, selling virus protection to users
of various operating systems of which Windows is often the most victimized,
partially due to its extreme popularity.
14
15. In computing, a denial-of-service (DoS) or
distributed denial-of-service (DDoS) attack is an
attempt to make a machine or network resource
unavailable to its intended users.
A DoS attack generally consists of efforts to
temporarily or indefinitely interrupt or suspend
services of a host connected to the Internet.
As clarification, distributed denial-of-service attacks are sent by two or more people,
or bots, and denial-of-service attacks are sent by one person or system. As of 2014,
the frequency of recognized DDoS attacks had reached an average rate of 28 per
hour.
15
16. Perpetrators of DoS attacks typically target sites or services hosted on high-
profile web servers such as banks, credit card payment gateways, and even root
name servers
Denial-of-service threats are also common in business, and are sometimes
responsible for website attacks.
This technique has now seen extensive use in certain games, used by server
owners, or disgruntled competitors on games, such as
popular Minecraft multiplayer worlds, known as servers. Increasingly, DoS
attacks have also been used as a form of resistance. Richard Stallman has stated
that DoS is a form of 'Internet Street Protests’. The term is generally used
relating to computer networks, but is not limited to this field; for example, it is
also used in reference to CPU resource management.
16
17. Electronic spamming is the use of electronic
messaging systems to send unsolicited messages
(spam), especially advertising, as well as sending
messages repeatedly on the same site. While the most
widely recognized form of spam is email spam, the
term is applied to similar abuses in other media:
instant messaging spam, Usenet newsgroup spam,
Web search engine spam, spam in blogs, wiki spam, online classified
ads spam, mobile phone messaging spam, Internet forum spam, junk fax
transmissions, social spam, television advertising and file sharing spam. It is
named after Spam, a luncheon meat, by way of a Monty Python sketch in which
Spam is included in every dish. The food is stereotypically disliked/unwanted, so
the word came to be transferred by analogy.
17
18. Sabotage is a deliberate action aimed at
weakening a polity or corporation thro1ugh
subversion, obstruction, disruption, or
destruction. In a workplace setting, sabotage is the
conscious withdrawal of efficiency generally
directed at causing some change in workplace
conditions. One who engages in sabotage is a
saboteur. Saboteurs typically try to conceal
their identities because of the consequences
of their actions.Any unexplained adverse condition might be sabotage. Sabotage is
sometimes called tampering, meddling, tinkering, malicious pranks, malicious
hacking, a practical joke or the like to avoid needing to invoke legal and
organizational requirements for addressing sabotage
18
19. 1. TAX-REFUND FRAUD –
2. CORPORATE ACCOUNT TAKEOVER
3. IDENTITY THEFT
4. THEFT OF SENSITIVE DATA
5. THEFT OF INTELLECTUAL PROPERTY
19
20. The U.S. Internal Revenue Service calls the scam its
No. 1 fraud. Identity thieves are using stolen personally
identifiable information to file victims’ tax returns and
then receive their refunds. Here’s how they do it and
ways to combat and prevent it.
Katie Winston, who held an MBA degree from
Harvard University, was a very successful broker for a large firm on Wall Street.
With tax time approaching, she gave her records and receipts to her longtime tax
specialist to ensure she would comply with the income tax code when she filed her
return.
Normally, she would receive a refund. But this time the Internal Revenue Service
(IRS) sent her a notice stating that “More than one tax return for you was filed” and
informing her that it had already issued a refund check in her name. After she spoke
with her tax professional and an IRS agent, she realized that she was the victim of an
identity theft tax refund scam.
20
21. "To obtain access to financial accounts, cyber criminals
target employees--often senior executives or
accounting, HR personnel, and business partners and
cause the targeted individual to spread [malware],
which in turn steals their personal information and
log-in credentials," the FBI says in its full report (PDF).
"Once the account is compromised, the cyber criminal is able to electronically steal
money from business accounts," the report explains. "Cyber criminals also use
various attack methods to exploit check archiving and verification services that
enable them to issue counterfeit checks, impersonate the customer over the phone
to arrange funds transfers, mimic legitimate communication from the financial
institution to verify transactions, create unauthorized wire transfers and ACH
payments, or initiate other changes to the account."
21
22. Identity theft happens when fraudsters access
enough information about someone’s identity (such
as their name, date of birth, current or previous
addresses) to commit identity fraud. Identity theft
can take place whether the fraud victim is alive or
deceased.
If you’re a victim of identity theft, it can lead to
fraud that can have a direct impact on your personal finances and could also make
it difficult for you to obtain loans, credit cards or a mortgage until the matter is
resolved.
22
23. It is important to remember that electronic information
is vulnerable to theft by intruders as well as insiders,
whose motivations may include industrial espionage,
extortion, organized crime, vandalism, revenge, or
bragging rights. Data is vulnerable to theft whether at
rest, in transit, or being processed:
To steal data at rest, attackers can copy it onto removable media, transmit it to
other insecure devices, or compromise host systems and penetrate them when
they are most vulnerable.
To steal data in transit, intruders can use "man-in-the-middle" tools to intercept
sensitive information such as passwords, customer credit-card information, or
voice conversations.
To steal data being processed, attackers can use spyware installed surreptitiously
on the desktop to collect information as it is entered
23
24. Intellectual property is any innovation, commercial
or artistic; any new method or formula with economic
value; or any unique name, symbol, or logo that is
used commercially. Intellectual property is protected
by patents on inventions; trademarks on branded
devices; copyrights on music, videos, patterns, and
other forms of expression; and state and federal laws.
Stealing intellectual property is cheap and easy. All a thief has to do is copy someone
else’s ideas or product. The other person or company—the victim—has done all the
work, but thieves can reap huge profits. Intellectual property theft can cost people
their jobs, damage the reputation of the original maker of the counterfeited
product, cause sickness and bodily harm, deprive governments of desperately
needed tax revenue, and even result in the spread of organized crime and gangs—
which in turn can damage more lives and destroy neighbourhood's.
24
25. As someone rightly said that
The growth of cyber crime in India, as all over the world, is on the rise and to
curb its scope and complexity is the pertinent need today. Cyber space offers a
plethora of opportunities for cyber criminals either to cause harm to innocent
people, or to make a fast buck at the expense of unsuspecting citizens. India’s
profile and wealth have risen enormously in the world due to the constructive
use of information technology. At the same time
, according to a report last year by the U.S.-based Internet Crime
Complaint Centre, a partnership between the Federal Bureau of Investigation
and the National White Collar Crime Centre Even under the IT Act,
investigations in India are not easy. This is mainly due to the lack of what is
called “cyber forensics.” We know that forensic evidence is important in normal
criminal investigations. But the collection and presentation of electronic
evidence to prove cyber crimes have posed a challenge to investigation and
prosecution agencies and the judiciary.
To sum up, India needs a good combination of laws and technology, in
harmony with the laws of other countries and keeping in mind common
security standards. In the era of e-governance and e-commerce, a lack of
common security standards can create havoc for global trade as well as military
matters.
25