SlideShare ist ein Scribd-Unternehmen logo
1 von 52
“Your computer is the crime scene”




                               Presented By:
Seminar Guide:                 ANSARI MD. AHMED
Mrs. BUSHRA                    ROLL NO. 12886
The first recorded cyber crime took place in
the year 1820 That is not surprising considering the
fact that the abacus, which is thought to be the
earliest form of a computer, has been around since
3500 B.C.
   Internet has offered us a much more convenient way to
    share information across time and place.

   Cyberspace also opened a new venue for criminal
    activities.

   The anonymity of cyberspace makes identity tracing a
    significant problem which hinders investigations.

   Uninformed and misguided users .
   “Any criminal activity that uses a computer either as
    an instrumentality, target or a means for perpetuating
    further crimes comes within the ambit of cyber
    crime”
    “ unlawful acts wherein the computer is either a
    tool or target or both”
   “Illegal computer-mediated activities that can be
    conducted through global electronic networks”
   It Is A Criminal Activity Committed On The Internet .
   Criminal activity where a computer or computer network is
    source ,tool , target, or place of a crime.
   A Generalized Definition Of Cyber Crime May Be “Unlawful
    Acts Wherein The Computer Is Either A Tool Or Target Or
    Both”.
   Cyber crime offenses against the information technology
    infrastructure.
   The Computer as a Target : using a computer
    to attack other computers.

   The Computer as a Weapon : using a computer
    to commit real world crimes.
   Physical damage

   Theft or destruction of information (data).

   The spread of viruses , Trojans and Worms .

   Software piracy, Hacking etc.
COMPUTER CRIME is any crime where ,

• Computer is a target.

• Computer is a tool of crime.

                    • Computer is incidental to crime.
Because…..
 Everybody is using Computers. From white
  collar criminals to terrorist organizations And
  from Teenagers to Adults
 New generation is growing up with computers
 MOST IMPORTANT – Money transactions
  are moving on to the INTERNET
Hackin
      IRC              g
     Crimes                    Credit
                               Card
                               Fraud

 Web
Jackin                                   Data
  g                                     Diddlin
                     Some                  g
                   Types Of
                    Cyber
                    Crimes
Logic                                    Softwa
Bombs                                      re
                                         Piracy

         Virus /
         Worm                    Email
         Attack       Salami     Bombi
                      Attack      ng
                         s
What is Hacking?

 Unauthorized use of computer and network resources.

 “Hacker” originally meant a very gifted programmer.

 Hacking is a felony in the US and most other countries.

 When it is done by request and under a contract between an ethical
  hacker and an organization, it is OK!

 The difference is that the ethical hacker has authorization to probe the
  target.

 “The number of really gifted hackers in the world is very small, but there
  are lots of wannabes…”(-Dr. Charles C. Palmer, IBM)
o   In December of 1947, the transistor was invented.
o   Captain Crunch
o   Steve Jobs
o   Kevin Mitnick
o   AT&T
o   The Worm- Robert Tappan Morris
o   Kevin Poulsen (a.k.a. Dark Dante)
o   Tsumomu Shimomura
o   David Smith
o   Jon Johansen (A.K.A. DVD Jon)
 System
•   Access confidential information
•   Threaten someone from YOUR computer
•   Broadcast your confidential letters or materials
•   Store illegal or espionage material

 Network
•   Eavesdrop and replay
•   Imposer: server / client
•   Modify data / stream
•   Denial-of-Service
 System Hacking

 Network Hacking

 Software Hacking
Professional hackers
 Black Hats – the Bad Guys
 White Hats – Professional Security Experts

Underemployed Adult Hackers
 Former Script Kiddies
 Can’t get employment in the field
 Want recognition in hacker community

Ideological Hackers
 hack as a mechanism to promote some political or ideological purpose
 Usually coincide with political events

Criminal Hackers
 Real criminals, are in it for whatever they can get no matter who it hurts

Disgruntled Employees
 Most dangerous to an enterprise as they are “insiders”
 Since many companies subcontract their network services a disgruntled vendor could
    be very dangerous to the host enterprise
 Spam

 Downloads

 Pop-ups

 Active X
 Eric McCarty hacks into USC database

 Australian hacker attacks sewage
  control computers
Computer hacking is broadly defined as any action that results in
unauthorized interference with a computer, computer system or network.
Computer hacking includes breaking into a computer with the intent to
steal, damage, modify or monitor data or settings within the system.
Significance
         Computer hacking is considered a crime in all countries; it is also
a crime under federal and international law. Because a computer may be
accessed from anywhere, a person may be charged with computer hacking
on the state, federal and international level.
Types
        Hacking often involves more than just unauthorized access to a
computer. Computer hackers may access a computer in order to: steal
financial information such as credit card access numbers; steal personal
information (identity theft); harass (swatting); vandalize; gain access to
other computers; launch computer attacks; or place malicious software
(malware).
You simply have to type credit card number into
www page off the vendor for online transaction If
electronic transactions are not secured the credit card
numbers can be stolen by the hackers who can misuse this
card by impersonating the credit card owner
 Altering Raw Data just before it is processed by a
  computer and then Changing It Back after the
  processing is completed.

 Electricity Boards in India have been victims to data
  diddling programs inserted when private parties
  were computerizing their systems.
 Theft of software through the illegal copying of genuine
 programs or the counterfeiting and distribution of products
 intended to pass for the original..

 Retail revenue losses worldwide are ever increasing due to
 this crime

 Can be done in various ways:
End user copying,, Hard disk loading,, Counterfeiting, Illegal
 downloads from the internet etc..
Soft lifting:
purchasing a single licensed copy of software and loading it onto
several computers contrary to the license terms. For example,
sharing software with friends, co-workers and others.

Uploading and downloading:
making unauthorized copies of copyrighted software available to
end users connected by modem to online service providers and/or
the Internet.

Software counterfeiting:
illegally duplicating and selling copyrighted software in a form
designed to make it appear legitimate
OEM unbundling:
selling standalone software that was intended to be bundled with
specific accompanying hardware

Hard disk loading:
installing unauthorized copies of software onto the hard disks of
personal computers, often as an incentive for the end user to buy the
hardware from that particular hardware dealer

Renting:
unauthorized selling of software for temporary use, like you would a
video.
 Piracy harms you and your customers.

 Intellectual Property.

 Protection. Increase your sales potential.
Sending huge volumes of e-mail

      To an address or server in an attempt to overflow the
mailbox or overwhelm the server

Zip Bombing

Methods of email bombing
    Mass Mailing
    Link Listing
Refers to sending a large number of emails to the
victim resulting in the victim's

   Email account
   (in case of an individual) or

   Mail servers
   (in case of a company or an email service provider)
   crashing.
 These attacks are used for the commission of financial crimes. A
  bank employee inserts a program into bank’s servers, that deducts
  a small amount from the account of every customer

 Used for the commission of FINANCIAL CRIMES.

 Key here is to make the alteration so insignificant that in a
  single case it would go completely unnoticed.

 E.g. A bank employee inserts a program, into the bank's servers,
  that deducts a small amount of money (say Rs. 5 a month) from
  the account of every customer. No account holder will probably
  notice this unauthorized debit, but the bank employee will make a
  sizable amount of money every month.
A series of minor attacks that together results in a larger
attack

       Used for financial crimes in which criminals steal money or
resources a bit at a time from a system

Prevention:
   Find indications of an attack.
   Random audits.
   Don't ignore what appear to be errors in computer-based
     financial systems.
Definition:

       A computer virus is a computer program that can
replicate itself and spread from one computer to another.
The term "virus" is also commonly, but erroneously, used
to refer to other types of malware, including but not
limited to adware and spyware programs that do not have
a reproductive ability.
Virus Removal:
One possibility on Windows Me, Windows XP, Windows Vista and
Windows 7 is a tool known as System Restore, which restores the
registry and critical system files to a previous checkpoint. Often a virus
will cause a system to hang, and a subsequent hard reboot will render a
system restore point from the same day corrupt. Restore points from
previous days should work provided the virus is not designed to corrupt
the restore files and does not exist in previous restore points. Some viruses
disable System Restore and other important tools such as Task Manager
and Command Prompt An example of a virus that does this is CiaDoor.
Many such viruses can be removed by Rebooting the computer, entering
Windows Safe Mode, and then using system tools.
A COMPUTER WORM is a standalone malware
computer program that replicates itself in order to spread to
other computers. Often, it uses a computer network to
spread itself, relying on security failures on the target
computer to access it. Unlike a computer virus, it does not
need to attach itself to an existing program. Worms almost
always cause at least some harm to the network, even if only
by consuming bandwidth, whereas viruses almost always
corrupt or modify files on a targeted computer.
Beginning with the very first research into worms at
Xerox PARC, there have been attempts to create useful
worms. The Nachi family of worms, for example, tried to
download and install patches from Microsoft's website to fix
vulnerabilities in the host system–by exploiting those same
vulnerabilities. In practice, although this may have made these
systems more secure, it generated considerable network traffic,
rebooted the machine in the course of patching it, and did its
work without the consent of the computer's owner or user.
Regardless of their payload or their writers' intentions, most
security experts regard all worms as malware.
A logic bomb is a piece of code intentionally
inserted into a software system that will set off a
malicious function when specified conditions are met. For
example, a programmer may hide a piece of code that
starts deleting files (such as a salary database trigger),
should they ever be terminated from the company.
 Event dependent programs.

 Programs are created to do something only when a
  certain event (known as a trigger event) occurs.

 E.g. even some viruses may be termed logic bombs because they
  lie dormant all through the year and become active only on a
  particular date (like the Chernobyl virus).
Software that is inherently malicious, such as
viruses and worms, often contain logic bombs that
execute a certain payload at a pre-defined time or when
some other condition is met. This technique can be used
by a virus or worm to gain momentum and spread before
being noticed. Many viruses attack their host systems on
specific dates, such as Friday the 13th or April Fool's
Day. Trojans that activate on certain dates are often called
"Time bombs".
 This article needs additional citations for verification. Please
  help improve this article by adding citations to reliabl
  sources. Unsourced material may be challenged and
  removed. (October 2011)

 In "Moffett's Ghost," an episode of the Airwolf television
  series, Hawk loses control of the onboard computer, which
  was programmed on a timer by Airwolf's creator, Doctor
  Charles Henry Moffett... once activated, Airwolf is set to
  destroy any aircraft in its range.
 Do not need the host to attach themselves to.

 Make functional copies of themselves and do this
  repeatedly till they eat up all the available space on a
  computer's memory.
Internet Relay Chat (IRC) is a form of real-
time Interne Online chat or synchronous conferencing. It is
mainly designed for group communication in discussion
forums called channels, but also allows one-to-one
communication via private message, as well as chat and data
transfers via Direct Client-to-Client.

Internet Relay Chat (IRC)
servers have chat rooms in
which people from anywhere
the world can come together
and chat with each other.
• Criminals use it for meeting coconspirators.

• Hackers use it for discussing their

• exploits / sharing the techniques

• Pedophiles use chat rooms to allure small children

• Cyber Stalking - In order to harass a woman

• her telephone number is given to others as if she wants
  the befriend males
Financial fraud                         11%
Sabotage of data/networks               17%
Theft of proprietary information        20%
System penetration from the outside     25%
Denial of service                       27%
Unauthorized access by insiders         71%
Employee abuse of internet privileges   79%
Viruses                                 85%
   Use antivirus software’s.
   Insert Firewalls.
   Uninstall Unnecessary Software
   Maintain Backup.
   Check Security Settings.
   Stay anonymous - choose a genderless screen name.
   Never give your full name or address to strangers.
   Learn more about Internet privacy.
Internet security is a branch
of       computer        security
specifically     related       to
the Internet.


                                    It's objective is to
                                    establish    rules     and
                                    measure to use against
                                    attacks over the Internet.
   Defend us from critical attacks.

   browse the safe website.

   Internet security process all the incoming and
    outgoing data on our computer.
Malicious
                                              Identity Theft
Virus                 Code
                                                (Phishing)
                    (Melissa)




        Breaking                Advanced Worm /                Organized Crime
        Web Sites                Trojan (I LOVE                Data Theft, DoS /
                                      YOU)                          DDoS




1977    1995         2000         2003-04         2005-06        2007-08
 Use anti-virus software and firewalls - keep them up to date
 Keep your operating system up to date with critical security
  updates and patches
 Don't open emails or attachments from unknown sources
 Use hard-to-guess passwords. Don’t use words found in a
  dictionary. Remember that password cracking tools exist
 Don't share access to your computers with strangers
 Back-up your computer data on disks or CDs often
 If you have a Wi-Fi network, password protect it
 Disconnect from the Internet when not in use
 Reevaluate your security on a regular basis
 Make sure your employees and family members know this info
  too!
 Tampering with computer source documents
 Hacking with computer system
 Publishing of information which is obscene in electronic
  form
 Misrepresentation
 Breach of confidentiality and privacy
 Publishing digital signature false in certain particulars
 Publication of unlawful document for fraudulent purpose
Can be charged up to rupees 1 to 3 Lakhs
             OR
Can get imprisonment for 2 to 10 Years
             OR
Both can be implemented according to the law.
 User awareness is key to a secure computer/network
     Do not open suspicious files/emails
     Verify ActiveX/Java prompts
     Avoid using P2P programs
     Avoid downloading freeware

 If attacked, disconnect the network. Do not turn off the computer

 Without     Careful Attention To These Issues, The Uncontrolled
   Interconnection Of Existing Systems, On Which People And Organizations
   Are Critically Dependent, Will Continue To Create Huge, Ill-defined And
   Defenseless Super - Systems.

 So We Must Pay Attention To All Those Issues And Protect The World
   From Cyber Crime.
Cyber crimes (By Mohammad Ahmed)

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ppt
PptPpt
Ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Hacking
HackingHacking
Hacking
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Ähnlich wie Cyber crimes (By Mohammad Ahmed)

Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report Shishupal Nagar
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Name parul
Name parulName parul
Name parulParul231
 
Name parul
Name parulName parul
Name parulParul231
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptJatinRajput67
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesVivekanandaGN1
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptPraveen362297
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourssuser24dae7
 

Ähnlich wie Cyber crimes (By Mohammad Ahmed) (20)

Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime final report
Cyber crime final report Cyber crime final report
Cyber crime final report
 
Cyber Crime Types & Tips
Cyber Crime Types & TipsCyber Crime Types & Tips
Cyber Crime Types & Tips
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Name parul
Name parulName parul
Name parul
 
Name parul
Name parulName parul
Name parul
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
Unit 1
Unit 1Unit 1
Unit 1
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 

Kürzlich hochgeladen

How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 

Kürzlich hochgeladen (20)

How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 

Cyber crimes (By Mohammad Ahmed)

  • 1. “Your computer is the crime scene” Presented By: Seminar Guide: ANSARI MD. AHMED Mrs. BUSHRA ROLL NO. 12886
  • 2. The first recorded cyber crime took place in the year 1820 That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C.
  • 3. Internet has offered us a much more convenient way to share information across time and place.  Cyberspace also opened a new venue for criminal activities.  The anonymity of cyberspace makes identity tracing a significant problem which hinders investigations.  Uninformed and misguided users .
  • 4. “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”  “ unlawful acts wherein the computer is either a tool or target or both”  “Illegal computer-mediated activities that can be conducted through global electronic networks”
  • 5. It Is A Criminal Activity Committed On The Internet .  Criminal activity where a computer or computer network is source ,tool , target, or place of a crime.  A Generalized Definition Of Cyber Crime May Be “Unlawful Acts Wherein The Computer Is Either A Tool Or Target Or Both”.  Cyber crime offenses against the information technology infrastructure.
  • 6. The Computer as a Target : using a computer to attack other computers.  The Computer as a Weapon : using a computer to commit real world crimes.
  • 7. Physical damage  Theft or destruction of information (data).  The spread of viruses , Trojans and Worms .  Software piracy, Hacking etc.
  • 8. COMPUTER CRIME is any crime where , • Computer is a target. • Computer is a tool of crime. • Computer is incidental to crime.
  • 9. Because…..  Everybody is using Computers. From white collar criminals to terrorist organizations And from Teenagers to Adults  New generation is growing up with computers  MOST IMPORTANT – Money transactions are moving on to the INTERNET
  • 10. Hackin IRC g Crimes Credit Card Fraud Web Jackin Data g Diddlin Some g Types Of Cyber Crimes Logic Softwa Bombs re Piracy Virus / Worm Email Attack Salami Bombi Attack ng s
  • 11. What is Hacking?  Unauthorized use of computer and network resources.  “Hacker” originally meant a very gifted programmer.  Hacking is a felony in the US and most other countries.  When it is done by request and under a contract between an ethical hacker and an organization, it is OK!  The difference is that the ethical hacker has authorization to probe the target.  “The number of really gifted hackers in the world is very small, but there are lots of wannabes…”(-Dr. Charles C. Palmer, IBM)
  • 12. o In December of 1947, the transistor was invented. o Captain Crunch o Steve Jobs o Kevin Mitnick o AT&T o The Worm- Robert Tappan Morris o Kevin Poulsen (a.k.a. Dark Dante) o Tsumomu Shimomura o David Smith o Jon Johansen (A.K.A. DVD Jon)
  • 13.  System • Access confidential information • Threaten someone from YOUR computer • Broadcast your confidential letters or materials • Store illegal or espionage material  Network • Eavesdrop and replay • Imposer: server / client • Modify data / stream • Denial-of-Service
  • 14.  System Hacking  Network Hacking  Software Hacking
  • 15. Professional hackers  Black Hats – the Bad Guys  White Hats – Professional Security Experts Underemployed Adult Hackers  Former Script Kiddies  Can’t get employment in the field  Want recognition in hacker community Ideological Hackers  hack as a mechanism to promote some political or ideological purpose  Usually coincide with political events Criminal Hackers  Real criminals, are in it for whatever they can get no matter who it hurts Disgruntled Employees  Most dangerous to an enterprise as they are “insiders”  Since many companies subcontract their network services a disgruntled vendor could be very dangerous to the host enterprise
  • 16.  Spam  Downloads  Pop-ups  Active X
  • 17.  Eric McCarty hacks into USC database  Australian hacker attacks sewage control computers
  • 18. Computer hacking is broadly defined as any action that results in unauthorized interference with a computer, computer system or network. Computer hacking includes breaking into a computer with the intent to steal, damage, modify or monitor data or settings within the system. Significance Computer hacking is considered a crime in all countries; it is also a crime under federal and international law. Because a computer may be accessed from anywhere, a person may be charged with computer hacking on the state, federal and international level. Types Hacking often involves more than just unauthorized access to a computer. Computer hackers may access a computer in order to: steal financial information such as credit card access numbers; steal personal information (identity theft); harass (swatting); vandalize; gain access to other computers; launch computer attacks; or place malicious software (malware).
  • 19. You simply have to type credit card number into www page off the vendor for online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner
  • 20.
  • 21.  Altering Raw Data just before it is processed by a computer and then Changing It Back after the processing is completed.  Electricity Boards in India have been victims to data diddling programs inserted when private parties were computerizing their systems.
  • 22.  Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original..  Retail revenue losses worldwide are ever increasing due to this crime Can be done in various ways: End user copying,, Hard disk loading,, Counterfeiting, Illegal downloads from the internet etc..
  • 23. Soft lifting: purchasing a single licensed copy of software and loading it onto several computers contrary to the license terms. For example, sharing software with friends, co-workers and others. Uploading and downloading: making unauthorized copies of copyrighted software available to end users connected by modem to online service providers and/or the Internet. Software counterfeiting: illegally duplicating and selling copyrighted software in a form designed to make it appear legitimate
  • 24. OEM unbundling: selling standalone software that was intended to be bundled with specific accompanying hardware Hard disk loading: installing unauthorized copies of software onto the hard disks of personal computers, often as an incentive for the end user to buy the hardware from that particular hardware dealer Renting: unauthorized selling of software for temporary use, like you would a video.
  • 25.  Piracy harms you and your customers.  Intellectual Property.  Protection. Increase your sales potential.
  • 26. Sending huge volumes of e-mail To an address or server in an attempt to overflow the mailbox or overwhelm the server Zip Bombing Methods of email bombing  Mass Mailing  Link Listing
  • 27. Refers to sending a large number of emails to the victim resulting in the victim's Email account (in case of an individual) or Mail servers (in case of a company or an email service provider) crashing.
  • 28.
  • 29.  These attacks are used for the commission of financial crimes. A bank employee inserts a program into bank’s servers, that deducts a small amount from the account of every customer  Used for the commission of FINANCIAL CRIMES.  Key here is to make the alteration so insignificant that in a single case it would go completely unnoticed.  E.g. A bank employee inserts a program, into the bank's servers, that deducts a small amount of money (say Rs. 5 a month) from the account of every customer. No account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month.
  • 30. A series of minor attacks that together results in a larger attack Used for financial crimes in which criminals steal money or resources a bit at a time from a system Prevention:  Find indications of an attack.  Random audits.  Don't ignore what appear to be errors in computer-based financial systems.
  • 31. Definition: A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously, used to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.
  • 32. Virus Removal: One possibility on Windows Me, Windows XP, Windows Vista and Windows 7 is a tool known as System Restore, which restores the registry and critical system files to a previous checkpoint. Often a virus will cause a system to hang, and a subsequent hard reboot will render a system restore point from the same day corrupt. Restore points from previous days should work provided the virus is not designed to corrupt the restore files and does not exist in previous restore points. Some viruses disable System Restore and other important tools such as Task Manager and Command Prompt An example of a virus that does this is CiaDoor. Many such viruses can be removed by Rebooting the computer, entering Windows Safe Mode, and then using system tools.
  • 33. A COMPUTER WORM is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
  • 34. Beginning with the very first research into worms at Xerox PARC, there have been attempts to create useful worms. The Nachi family of worms, for example, tried to download and install patches from Microsoft's website to fix vulnerabilities in the host system–by exploiting those same vulnerabilities. In practice, although this may have made these systems more secure, it generated considerable network traffic, rebooted the machine in the course of patching it, and did its work without the consent of the computer's owner or user. Regardless of their payload or their writers' intentions, most security experts regard all worms as malware.
  • 35. A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files (such as a salary database trigger), should they ever be terminated from the company.
  • 36.  Event dependent programs.  Programs are created to do something only when a certain event (known as a trigger event) occurs.  E.g. even some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date (like the Chernobyl virus).
  • 37. Software that is inherently malicious, such as viruses and worms, often contain logic bombs that execute a certain payload at a pre-defined time or when some other condition is met. This technique can be used by a virus or worm to gain momentum and spread before being noticed. Many viruses attack their host systems on specific dates, such as Friday the 13th or April Fool's Day. Trojans that activate on certain dates are often called "Time bombs".
  • 38.  This article needs additional citations for verification. Please help improve this article by adding citations to reliabl sources. Unsourced material may be challenged and removed. (October 2011)  In "Moffett's Ghost," an episode of the Airwolf television series, Hawk loses control of the onboard computer, which was programmed on a timer by Airwolf's creator, Doctor Charles Henry Moffett... once activated, Airwolf is set to destroy any aircraft in its range.
  • 39.  Do not need the host to attach themselves to.  Make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory.
  • 40. Internet Relay Chat (IRC) is a form of real- time Interne Online chat or synchronous conferencing. It is mainly designed for group communication in discussion forums called channels, but also allows one-to-one communication via private message, as well as chat and data transfers via Direct Client-to-Client. Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other.
  • 41. • Criminals use it for meeting coconspirators. • Hackers use it for discussing their • exploits / sharing the techniques • Pedophiles use chat rooms to allure small children • Cyber Stalking - In order to harass a woman • her telephone number is given to others as if she wants the befriend males
  • 42.
  • 43. Financial fraud 11% Sabotage of data/networks 17% Theft of proprietary information 20% System penetration from the outside 25% Denial of service 27% Unauthorized access by insiders 71% Employee abuse of internet privileges 79% Viruses 85%
  • 44. Use antivirus software’s.  Insert Firewalls.  Uninstall Unnecessary Software  Maintain Backup.  Check Security Settings.  Stay anonymous - choose a genderless screen name.  Never give your full name or address to strangers.  Learn more about Internet privacy.
  • 45. Internet security is a branch of computer security specifically related to the Internet. It's objective is to establish rules and measure to use against attacks over the Internet.
  • 46. Defend us from critical attacks.  browse the safe website.  Internet security process all the incoming and outgoing data on our computer.
  • 47. Malicious Identity Theft Virus Code (Phishing) (Melissa) Breaking Advanced Worm / Organized Crime Web Sites Trojan (I LOVE Data Theft, DoS / YOU) DDoS 1977 1995 2000 2003-04 2005-06 2007-08
  • 48.
  • 49.  Use anti-virus software and firewalls - keep them up to date  Keep your operating system up to date with critical security updates and patches  Don't open emails or attachments from unknown sources  Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist  Don't share access to your computers with strangers  Back-up your computer data on disks or CDs often  If you have a Wi-Fi network, password protect it  Disconnect from the Internet when not in use  Reevaluate your security on a regular basis  Make sure your employees and family members know this info too!
  • 50.  Tampering with computer source documents  Hacking with computer system  Publishing of information which is obscene in electronic form  Misrepresentation  Breach of confidentiality and privacy  Publishing digital signature false in certain particulars  Publication of unlawful document for fraudulent purpose Can be charged up to rupees 1 to 3 Lakhs OR Can get imprisonment for 2 to 10 Years OR Both can be implemented according to the law.
  • 51.  User awareness is key to a secure computer/network  Do not open suspicious files/emails  Verify ActiveX/Java prompts  Avoid using P2P programs  Avoid downloading freeware  If attacked, disconnect the network. Do not turn off the computer  Without Careful Attention To These Issues, The Uncontrolled Interconnection Of Existing Systems, On Which People And Organizations Are Critically Dependent, Will Continue To Create Huge, Ill-defined And Defenseless Super - Systems.  So We Must Pay Attention To All Those Issues And Protect The World From Cyber Crime.