SlideShare a Scribd company logo
1 of 16
RUNNING HEAD: Computer Security And Crimes 1
Computer Security and Crimes
CMNS 1910
Tanvi Jindal (BCS 150029)
And
Parwinder Kaur (BCS 150009)
Continental Institute for International Studies
Submitted to: Harsimran Kaur
ComputerSecurityandCrimes 2
Table of Contents
Purpose of the Report…………………………………………………………………………….3
Abstract……………………………………………………………………………………………4
Introduction………………………………………………………………………………………..5
Infrastructures and facilities……………………………………………………………………...5
Advantages and risks……………………………………………………………………………..6
Cyber security and cyber-crime………………………………………………………………….6
Crime statistics……………………………………………………………………………………8
Illegal access……………………………………………………………………………………….9
Top countries having threat of cyber-crime…………………………………………………….12
Types of cyber-crimes……………………………………………………………………………..12
Anti-cybercrime strategies-……………………………………………………………………….13
Conclusions……………………………………………………………………………………......14
Glossary……………………………………………………………………………………………15
References-…………………………………………………………………………………………16
ComputerSecurityandCrimes 3
Purpose of the Report
The purpose of this report is Understanding Computer crime: Phenomena, Challenges and Legal Response are
to assist everyone in understanding the legal aspects of computer security and to help arrange legal frameworks.
The aim of the report is to figure out the national and international implications of growing cyber threats. It
provides a comprehensive overview of the most relevant topics linked to the legal aspects of Cybercrime and
focuses on the demands of developing countries. Due to the transnational dimension of Cybercrime, the legal
instruments are the same for developing and developed countries.
ComputerSecurityandCrimes 4
Abstract
The terms computer crime is more properly restricted to describing criminal activity in which the computer or
network is a necessary part of the crime, these terms are also sometimes used to include traditional crimes, such
as fraud, theft, blackmail, forgery, in which computers or networks are used. As the use of computers has
grown, computer crime has become more important.
Computer crime can broadly be defined as criminal activity involving an information technology infrastructure,
including illegal access (unauthorized access), illegal interception (by technical means of non-public
transmissions of computer data to, from or within a computer system), data interference (unauthorized
damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering
with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering
or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud.
Computer crime issues have become high-profile, particularly those surrounding hacking, copyright
infringement, child pornography, and child grooming. There are also problems of privacy when confidential
information is lost or intercepted, lawfully or otherwise.
Computer security, techniques developed to safeguard information and information systems stored on
computers. A potential threat includes the destruction of the computer hardware and software and the loss,
modification, theft, unauthorised use, observation or disclosure of computer data.
ComputerSecurityandCrimes 5
COMPUTER CRIME AND SECURITY
Introduction
The cyber world is defined as a virtual world, which is different from that of the physical world. The cyber
world though a virtual world is a reality, which interconnects, people, organisations, Government. It transacts
information at the basic level but also conducts the business of governments and private enterprises in a manner
where no other technology could dream of. The cyber space is also a space where various types of crimes are
conserved and the magnitude of such crimes could be unimaginable due its speed, anonymity and destruction
has been amply recorded. The main point is whether the same principles of criminal law can be applied to the
‘cyber world crimes’ as applied to the ‘world of physical crimes’.
Infrastructures and facilities
The Internet is one of the fastest-growing areas of technical infrastructure development. Today,
Information and communication technologies (ICTs) are omnipresent and the trend towards digitization
is growing.
 The demand for Internet and computer connectivity has led to the integration of computer
Technology into products that have usually functioned without it, such as cars and buildings.
 Electricity supply, transportation infrastructure, military services and logistics – virtually all
modern services depend on the use of ICTs.
 Although the development of new technologies is focused mainly on meeting consumer demands
in western countries, developing countries can also benefit from new technologies.
 With the availability of long-distance wireless communication technologies such as WiMAX5
and computer systems that are now available for less than USD 200, many more people in
developing countries should have easier access to the Internet and related products and services.
ComputerSecurityandCrimes 6
 The influence of ICTs on society goes far beyond establishing basic information infrastructure.
The availability of ICTs is a foundation for development in the creation, availability and use of
network-based services.
 E-mails have displaced traditional letter, online web representation is nowadays more important
for businesses than printed publicity materials; and Internet-based communication and phone
services are growing faster than landline communications.
The availability of ICTs and new network-based services offer a number of advantages for
society in general, especially for developing countries.
Advantages and risks
Technical developments have improved daily life – for example, online banking and shopping, the use of
mobile data services and voice over Internet protocol (VoIP) telephony are just some examples of how far the
integration of ICTs into our daily lives has advanced. However, the growth of the information society is
accompanied by new and serious threats. Essential services such as water and electricity supply now rely on
ICTs. Cars, traffic control, elevators, air conditioning and telephones also depend on the smooth functioning of
ICTs.23 Attacks against information infrastructure and Internet services now have the potential to harm society
in new and critical ways. Attacks against information infrastructure and Internet services have already taken
place. Online fraud and hacking attacks are just some examples of computer-related crimes that are committed
on a large scale every day. The financial damage caused by cybercrime is reported to be enormous.
Cyber security and cyber crime
Cybercrime and cyber security are issues that can hardly be separated in an interconnected environment. The
fact is that the 2010 UN General Assembly resolution on cyber security addresses cybercrime as one Major
challenge.
ComputerSecurityandCrimes 7
Cyber security plays an important role in the on-going development of information technology, as well as
Internet services. Enhancing cyber security and protecting critical information infrastructures are essential to
each nation’s security and economic well-being.
Making the Internet safer (and protecting Internet users) has become integral to the development of new
services as well as government policy. To prevent cybercrime is an integral component of a national cyber
security and critical information infrastructure protection strategy. In particular, this includes the adoption of
appropriate legislation against the misuse of ICTs for criminal or other purposes and activities intended to affect
the integrity of national critical infrastructures. At the national level, this is a shared responsibility requiring
coordinated action related to prevention, preparation, response and recovery from incidents on the part of
government authorities, the private sector and citizens.
Now the image gives a particular description of the disrupter timeline-
ComputerSecurityandCrimes 8
At the regional and international level, this involves cooperation and coordination with relevant partners. The
formulation and implementation of a national framework and strategy for cyber security thus requires a
comprehensive approach. Cyber security strategies – for example, the development of technical protection
systems or the education of users to prevent them from becoming victims of cybercrime – can help to reduce the
risk of cybercrime. The development and support of cyber security strategies are a vital element in the fight
against cybercrime.
The legal, technical and institutional challenges posed by the issue of cyber security are global and far-reaching,
and can only be addressed through a systematic strategy taking into account the role of different stakeholders
and existing initiatives, within a Framework of international cooperation.
Crime statistics
The following numbers have been extracted from national crime statistics. As further discussed below, they are
not intended to be representative of either the global development of cybercrime or of the true Extent of
cybercrime at the national level, and are thus presented only to provide an insight into country Information.
• The US Internet Complaint Centre reports a 22.3 per cent increase in complaints submitted Relating to
cybercrime compared with 2008.
ComputerSecurityandCrimes 9
• German Crime Statistics indicate that the overall number of Internet-related crimes increased in 2009 by 23.6
per cent compared with 2008.
It is unclear how representative the statistics are and whether they provide reliable information on the Extent of
crime. There are several difficulties associated with determining the global threat of Cybercrime on the basis of
crime statistics. Statistical information is useful to draw attention to the continuing and growing importance of
the issue, and it is necessary to point out that one of the major challenges related to cybercrime is the lack of
reliable information on the extent of the problem, as well as on arrests, prosecutions and convictions.
As already stated, crime statistics often do not list offences separately, and available statistics on the impact
of cybercrime are in general unable to provide reliable information about the scale or extent of offences at a
level sufficient for policy-makers.
Illegal access
The offence described as “hacking” refers to unlawful access to a computer system191, one of oldest Computer-
related crimes.
Following the development of computer networks (especially the Internet), this crime has become a mass
phenomenon. Famous targets of hacking attacks include the US National Aeronautics and Space Administration
(NASA), the US Air Force, the Pentagon, Yahoo, Google, eBay and the German Government.
Examples of hacking offences include breaking the password of password-protected websites and preventing
password protection on a computer system. But acts related to the term “hacking” also Include preparatory acts
such as the use of faulty hardware or software implementation to illegally obtain a password to enter a computer
system, setting up “prank” websites to make users disclose their Passwords and installing hardware and
software-based key logging methods (e.g. “key loggers”) that Record every keystroke – and consequently any
passwords used on the computer and/or device.
Many analysts recognize a rising number of attempts to illegally access computer systems, with over 250
million incidents recorded worldwide during the month of August 2007 alone. Three main factors have
ComputerSecurityandCrimes 10
supported the increasing number of hacking attacks: inadequate and incomplete protection of computer systems,
development of software tools that automate the attacks, and the growing role of private computers as a target of
hacking attacks.
Statistics of the cyber crime
Inadequate and incomplete protection of computer systems
Millions of computers are connected to the Internet, and many computer systems are without adequate
protection in place to prevent illegal access. Analysis suggests that an unprotected computer system that is
connected to the Internet is likely to Experience attack within less than a minute. The installation of protective
measures can lower the risk, but successful attacks against well-protected computer systems prove that technical
protection measures can never completely stop attacks.
ComputerSecurityandCrimes 11
Development of software tools that automate the attacks
Recently, software tools are being used to automate attacks. With the help of software and pre-installed attacks,
a single offender can attack thousands of computer systems in a single day using one computer. If the offender
has access to more computers – e.g. through a botnet – he/she can increase the scale still further. Since most of
these software tools use pre-set methods of attacks, not all attacks prove successful.
Users that update their operating systems and software applications on a regular basis reduce their risk of falling
victim to these broad-based attacks, as the companies developing protection software analyse attack tools and
prepare for the standardized hacking attacks. High-profile attacks are often based on individually-designed
attacks.
Illegal data acquisition (data operations)
Sensitive information is often stored in computer systems. If the computer system is connected to the Internet,
offenders can try to access this information via the Internet from almost any place in the world. The Internet is
increasingly used to obtain trade secrets. The value of sensitive information and the ability to access it remotely
makes data operations highly interesting. In the 1980s, a number of German hackers succeeded in entering US
government and military computer systems, obtaining secret information and selling this information to agents
from a different country.
Illegal interception
Offenders can intercept communications between users (such as e-mails) or other forms of data transfers (when
users upload data onto webservers or access web-based external storage media) in order to record the
information exchanged. In this context, offenders can in general target any communication infrastructure (e.g.
fixed lines or wireless) and any Internet service (e.g. e-mail, chat or VoIP communications).
ComputerSecurityandCrimes 12
Top countries having threat of cyber crime
Various types of cyber crimes
There are several types of cybercrimes that are occurring in the networking world some of these are as written
below-
1. Financial fraud
2. Destruction of data and other networks
3. Theft of proprietary information
4. System penetration from outside
5. Denial of service
6. Unauthorised access by insiders
7. Employee use of internet service privileges
8. Viruses
ComputerSecurityandCrimes 13
Here the picture depicts the type of crimes and the threat percentage of these crimes
Anti-cybercrime strategies
Cyber security plays an important role in the on-going development of information technology,
as well as Internet services. Making the Internet safer (and protecting Internet users) has become
integral to the development of new services as well as governmental policy.
Cyber security strategies – for example, the development of technical protection systems or the education of
users to prevent them from becoming victims of cybercrime – can help to reduce the risk of cybercrime.
An anti-cybercrime strategy should be an integral element of a cyber-security strategy.
The ITU Global Cyber security Agenda, as a global framework for dialogue and international cooperation to
coordinate the international response to the growing challenges to cyber security and to enhance confidence and
security in the information society, builds on existing work, initiatives and partnerships with the objective of
proposing global strategies to address these related challenges.
ComputerSecurityandCrimes 14
Conclusions
The cybercrime as a whole refers to Offences that are committed against individuals or groups of individuals
with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the
victim directly or indirectly, by using modern telecommunication networks such as Internet (Chat rooms,
emails, notice boards and groups) and mobile phones (SMS/MMS)". Such crimes may threaten a nation’s
security and financial health. Issues surrounding this type of crime has become high-profile, particularly those
surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems
of privacy when confidential information is lost or intercepted, lawfully or otherwise.
A computer can be a source of evidence. Even when a computer is not directly used for criminal purposes, may
contain records of value to criminal investigators.so the network must be secure as no one can access the
information of the computer.
ComputerSecurityandCrimes 15
Glossary
 Child grooming: When an adult becomes friends with a child, this is sometimes done for a reason. The
reason is to lower the inhibitions of the child and to prepare for sexual abuse.
 Child Pornography is a criminal offense and is defined as any visual depiction involving the use of a
minor, or one appearing to be a minor, engaging in sexually explicit conduct.
 Copyright infringement is the use of works protected by copyright law without permission, infringing
certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display
or perform the protected work, or to make derivative works.
 ICTs - Information and communication technologies
 NASA - National Aeronautics and Space Administration
 VoIP - Voice over Internet protocol
ComputerSecurityandCrimes 16
References-
 Moore, R. (2005) "Cyber-crime: Investigating High-Technology Computer Crime," Cleveland,
Mississippi: Anderson Publishing.
 Susan W. Brenner, Cybercrime: Criminal Threats from Cyberspace, ABC-CLIO, 2010. Also includes
the statistics from the net search and many other sites. IJS

More Related Content

What's hot

Final national cyber security strategy november 2014
Final national cyber security strategy november 2014Final national cyber security strategy november 2014
Final national cyber security strategy november 2014vikawotar
 
Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation finalsunnyjoshi88
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in PakistanAyesha Majid
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazimArazim Sheu
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02Government
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardGokul Alex
 
Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Habib Noroozi
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismMaurice Dawson
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity reportKevin Leffew
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryMD Alauddin
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030Scott Dickson
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...Gamaliel Olayiwola Fasuyi
 

What's hot (20)

ICOCI2013: Keynotes 1
ICOCI2013: Keynotes 1ICOCI2013: Keynotes 1
ICOCI2013: Keynotes 1
 
Final national cyber security strategy november 2014
Final national cyber security strategy november 2014Final national cyber security strategy november 2014
Final national cyber security strategy november 2014
 
It security & crimes
It security & crimesIt security & crimes
It security & crimes
 
Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation final
 
Cyber crime laws in Pakistan
Cyber crime laws in PakistanCyber crime laws in Pakistan
Cyber crime laws in Pakistan
 
Averting the dangers embedded in lack of privacy law in nigeria by arazim
Averting the dangers embedded in lack of privacy law in nigeria  by arazimAverting the dangers embedded in lack of privacy law in nigeria  by arazim
Averting the dangers embedded in lack of privacy law in nigeria by arazim
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Cybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way ForwardCybersecurity Context in African Continent - Way Forward
Cybersecurity Context in African Continent - Way Forward
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Module 5 ig presentation iran 2
Module 5 ig presentation iran 2Module 5 ig presentation iran 2
Module 5 ig presentation iran 2
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
Cyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st centuryCyber Crime; Plague of 21st century
Cyber Crime; Plague of 21st century
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030A US Cybersecurity Strategy for 2030
A US Cybersecurity Strategy for 2030
 
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...Legal deficiency of cybercrime in nigeria   need for urgent legal reform (cha...
Legal deficiency of cybercrime in nigeria need for urgent legal reform (cha...
 

Viewers also liked

экологическое воспитание детей в семье
экологическое воспитание детей в семьеэкологическое воспитание детей в семье
экологическое воспитание детей в семьеvirtualtaganrog
 
Wikimedia commons karol cambronero guzmán
Wikimedia commons   karol cambronero guzmánWikimedia commons   karol cambronero guzmán
Wikimedia commons karol cambronero guzmánKarol Cambronero Guzmán
 
Jasa sewa ambulance murah resmi terpercaya
Jasa sewa ambulance murah resmi terpercayaJasa sewa ambulance murah resmi terpercaya
Jasa sewa ambulance murah resmi terpercayatrans mulia ambulance
 
Construcccion de un histograma y su utilidad. Presentación diseñada por el MT...
Construcccion de un histograma y su utilidad. Presentación diseñada por el MT...Construcccion de un histograma y su utilidad. Presentación diseñada por el MT...
Construcccion de un histograma y su utilidad. Presentación diseñada por el MT...JAVIER SOLIS NOYOLA
 
приказ 5 2356 от 16 12_2011
приказ 5 2356 от 16 12_2011приказ 5 2356 от 16 12_2011
приказ 5 2356 от 16 12_2011Demanessa
 

Viewers also liked (11)

экологическое воспитание детей в семье
экологическое воспитание детей в семьеэкологическое воспитание детей в семье
экологическое воспитание детей в семье
 
Gihad Gamal CV
Gihad Gamal CVGihad Gamal CV
Gihad Gamal CV
 
Wikimedia commons karol cambronero guzmán
Wikimedia commons   karol cambronero guzmánWikimedia commons   karol cambronero guzmán
Wikimedia commons karol cambronero guzmán
 
Laxmi 5th sem
Laxmi 5th semLaxmi 5th sem
Laxmi 5th sem
 
Ance 25112016 m
Ance 25112016 mAnce 25112016 m
Ance 25112016 m
 
Jasa sewa ambulance murah resmi terpercaya
Jasa sewa ambulance murah resmi terpercayaJasa sewa ambulance murah resmi terpercaya
Jasa sewa ambulance murah resmi terpercaya
 
Seminar LN
Seminar LNSeminar LN
Seminar LN
 
Linkedin2
Linkedin2Linkedin2
Linkedin2
 
Construcccion de un histograma y su utilidad. Presentación diseñada por el MT...
Construcccion de un histograma y su utilidad. Presentación diseñada por el MT...Construcccion de un histograma y su utilidad. Presentación diseñada por el MT...
Construcccion de un histograma y su utilidad. Presentación diseñada por el MT...
 
Instagram
InstagramInstagram
Instagram
 
приказ 5 2356 от 16 12_2011
приказ 5 2356 от 16 12_2011приказ 5 2356 от 16 12_2011
приказ 5 2356 от 16 12_2011
 

Similar to RESEARCH PAPER

IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET Journal
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossierYury Chemerkin
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce securitypolitegcuf
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALijcisjournal
 
Cyber_Security.-project-4th year-cse pdf
Cyber_Security.-project-4th year-cse pdfCyber_Security.-project-4th year-cse pdf
Cyber_Security.-project-4th year-cse pdfmessengerhelper4
 
Cyber_Security+Education_Project_Report.pdf
Cyber_Security+Education_Project_Report.pdfCyber_Security+Education_Project_Report.pdf
Cyber_Security+Education_Project_Report.pdfmessengerhelper4
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabesegughana
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYijcsit
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimesijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...ijtsrd
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAIRJET Journal
 
INFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdfINFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdfEarlvonDeiparine1
 
Input on threat images against information society
Input on threat images against information societyInput on threat images against information society
Input on threat images against information societySomerco Research
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 

Similar to RESEARCH PAPER (20)

IRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the DecadeIRJET- Cybersecurity: The Agenda for the Decade
IRJET- Cybersecurity: The Agenda for the Decade
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Finland s cyber security strategy background dossier
Finland s cyber security strategy   background dossierFinland s cyber security strategy   background dossier
Finland s cyber security strategy background dossier
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
Cyber Readiness Index 2.0
Cyber Readiness Index 2.0Cyber Readiness Index 2.0
Cyber Readiness Index 2.0
 
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSALCYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
CYBER-SECURITY TACTICS IN MITIGATING CYBERCRIMES: A REVIEW AND PROPOSAL
 
Cyber_Security.-project-4th year-cse pdf
Cyber_Security.-project-4th year-cse pdfCyber_Security.-project-4th year-cse pdf
Cyber_Security.-project-4th year-cse pdf
 
Cyber_Security+Education_Project_Report.pdf
Cyber_Security+Education_Project_Report.pdfCyber_Security+Education_Project_Report.pdf
Cyber_Security+Education_Project_Report.pdf
 
CTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
 
The Professionalization of the Hacker Industry
The Professionalization of the Hacker IndustryThe Professionalization of the Hacker Industry
The Professionalization of the Hacker Industry
 
An introduction to digital crimes
An introduction to digital crimesAn introduction to digital crimes
An introduction to digital crimes
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
INFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdfINFORMATION ASSURANCE AND SECURITY 1.pdf
INFORMATION ASSURANCE AND SECURITY 1.pdf
 
Input on threat images against information society
Input on threat images against information societyInput on threat images against information society
Input on threat images against information society
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 

RESEARCH PAPER

  • 1. RUNNING HEAD: Computer Security And Crimes 1 Computer Security and Crimes CMNS 1910 Tanvi Jindal (BCS 150029) And Parwinder Kaur (BCS 150009) Continental Institute for International Studies Submitted to: Harsimran Kaur
  • 2. ComputerSecurityandCrimes 2 Table of Contents Purpose of the Report…………………………………………………………………………….3 Abstract……………………………………………………………………………………………4 Introduction………………………………………………………………………………………..5 Infrastructures and facilities……………………………………………………………………...5 Advantages and risks……………………………………………………………………………..6 Cyber security and cyber-crime………………………………………………………………….6 Crime statistics……………………………………………………………………………………8 Illegal access……………………………………………………………………………………….9 Top countries having threat of cyber-crime…………………………………………………….12 Types of cyber-crimes……………………………………………………………………………..12 Anti-cybercrime strategies-……………………………………………………………………….13 Conclusions……………………………………………………………………………………......14 Glossary……………………………………………………………………………………………15 References-…………………………………………………………………………………………16
  • 3. ComputerSecurityandCrimes 3 Purpose of the Report The purpose of this report is Understanding Computer crime: Phenomena, Challenges and Legal Response are to assist everyone in understanding the legal aspects of computer security and to help arrange legal frameworks. The aim of the report is to figure out the national and international implications of growing cyber threats. It provides a comprehensive overview of the most relevant topics linked to the legal aspects of Cybercrime and focuses on the demands of developing countries. Due to the transnational dimension of Cybercrime, the legal instruments are the same for developing and developed countries.
  • 4. ComputerSecurityandCrimes 4 Abstract The terms computer crime is more properly restricted to describing criminal activity in which the computer or network is a necessary part of the crime, these terms are also sometimes used to include traditional crimes, such as fraud, theft, blackmail, forgery, in which computers or networks are used. As the use of computers has grown, computer crime has become more important. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud. Computer crime issues have become high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. Computer security, techniques developed to safeguard information and information systems stored on computers. A potential threat includes the destruction of the computer hardware and software and the loss, modification, theft, unauthorised use, observation or disclosure of computer data.
  • 5. ComputerSecurityandCrimes 5 COMPUTER CRIME AND SECURITY Introduction The cyber world is defined as a virtual world, which is different from that of the physical world. The cyber world though a virtual world is a reality, which interconnects, people, organisations, Government. It transacts information at the basic level but also conducts the business of governments and private enterprises in a manner where no other technology could dream of. The cyber space is also a space where various types of crimes are conserved and the magnitude of such crimes could be unimaginable due its speed, anonymity and destruction has been amply recorded. The main point is whether the same principles of criminal law can be applied to the ‘cyber world crimes’ as applied to the ‘world of physical crimes’. Infrastructures and facilities The Internet is one of the fastest-growing areas of technical infrastructure development. Today, Information and communication technologies (ICTs) are omnipresent and the trend towards digitization is growing.  The demand for Internet and computer connectivity has led to the integration of computer Technology into products that have usually functioned without it, such as cars and buildings.  Electricity supply, transportation infrastructure, military services and logistics – virtually all modern services depend on the use of ICTs.  Although the development of new technologies is focused mainly on meeting consumer demands in western countries, developing countries can also benefit from new technologies.  With the availability of long-distance wireless communication technologies such as WiMAX5 and computer systems that are now available for less than USD 200, many more people in developing countries should have easier access to the Internet and related products and services.
  • 6. ComputerSecurityandCrimes 6  The influence of ICTs on society goes far beyond establishing basic information infrastructure. The availability of ICTs is a foundation for development in the creation, availability and use of network-based services.  E-mails have displaced traditional letter, online web representation is nowadays more important for businesses than printed publicity materials; and Internet-based communication and phone services are growing faster than landline communications. The availability of ICTs and new network-based services offer a number of advantages for society in general, especially for developing countries. Advantages and risks Technical developments have improved daily life – for example, online banking and shopping, the use of mobile data services and voice over Internet protocol (VoIP) telephony are just some examples of how far the integration of ICTs into our daily lives has advanced. However, the growth of the information society is accompanied by new and serious threats. Essential services such as water and electricity supply now rely on ICTs. Cars, traffic control, elevators, air conditioning and telephones also depend on the smooth functioning of ICTs.23 Attacks against information infrastructure and Internet services now have the potential to harm society in new and critical ways. Attacks against information infrastructure and Internet services have already taken place. Online fraud and hacking attacks are just some examples of computer-related crimes that are committed on a large scale every day. The financial damage caused by cybercrime is reported to be enormous. Cyber security and cyber crime Cybercrime and cyber security are issues that can hardly be separated in an interconnected environment. The fact is that the 2010 UN General Assembly resolution on cyber security addresses cybercrime as one Major challenge.
  • 7. ComputerSecurityandCrimes 7 Cyber security plays an important role in the on-going development of information technology, as well as Internet services. Enhancing cyber security and protecting critical information infrastructures are essential to each nation’s security and economic well-being. Making the Internet safer (and protecting Internet users) has become integral to the development of new services as well as government policy. To prevent cybercrime is an integral component of a national cyber security and critical information infrastructure protection strategy. In particular, this includes the adoption of appropriate legislation against the misuse of ICTs for criminal or other purposes and activities intended to affect the integrity of national critical infrastructures. At the national level, this is a shared responsibility requiring coordinated action related to prevention, preparation, response and recovery from incidents on the part of government authorities, the private sector and citizens. Now the image gives a particular description of the disrupter timeline-
  • 8. ComputerSecurityandCrimes 8 At the regional and international level, this involves cooperation and coordination with relevant partners. The formulation and implementation of a national framework and strategy for cyber security thus requires a comprehensive approach. Cyber security strategies – for example, the development of technical protection systems or the education of users to prevent them from becoming victims of cybercrime – can help to reduce the risk of cybercrime. The development and support of cyber security strategies are a vital element in the fight against cybercrime. The legal, technical and institutional challenges posed by the issue of cyber security are global and far-reaching, and can only be addressed through a systematic strategy taking into account the role of different stakeholders and existing initiatives, within a Framework of international cooperation. Crime statistics The following numbers have been extracted from national crime statistics. As further discussed below, they are not intended to be representative of either the global development of cybercrime or of the true Extent of cybercrime at the national level, and are thus presented only to provide an insight into country Information. • The US Internet Complaint Centre reports a 22.3 per cent increase in complaints submitted Relating to cybercrime compared with 2008.
  • 9. ComputerSecurityandCrimes 9 • German Crime Statistics indicate that the overall number of Internet-related crimes increased in 2009 by 23.6 per cent compared with 2008. It is unclear how representative the statistics are and whether they provide reliable information on the Extent of crime. There are several difficulties associated with determining the global threat of Cybercrime on the basis of crime statistics. Statistical information is useful to draw attention to the continuing and growing importance of the issue, and it is necessary to point out that one of the major challenges related to cybercrime is the lack of reliable information on the extent of the problem, as well as on arrests, prosecutions and convictions. As already stated, crime statistics often do not list offences separately, and available statistics on the impact of cybercrime are in general unable to provide reliable information about the scale or extent of offences at a level sufficient for policy-makers. Illegal access The offence described as “hacking” refers to unlawful access to a computer system191, one of oldest Computer- related crimes. Following the development of computer networks (especially the Internet), this crime has become a mass phenomenon. Famous targets of hacking attacks include the US National Aeronautics and Space Administration (NASA), the US Air Force, the Pentagon, Yahoo, Google, eBay and the German Government. Examples of hacking offences include breaking the password of password-protected websites and preventing password protection on a computer system. But acts related to the term “hacking” also Include preparatory acts such as the use of faulty hardware or software implementation to illegally obtain a password to enter a computer system, setting up “prank” websites to make users disclose their Passwords and installing hardware and software-based key logging methods (e.g. “key loggers”) that Record every keystroke – and consequently any passwords used on the computer and/or device. Many analysts recognize a rising number of attempts to illegally access computer systems, with over 250 million incidents recorded worldwide during the month of August 2007 alone. Three main factors have
  • 10. ComputerSecurityandCrimes 10 supported the increasing number of hacking attacks: inadequate and incomplete protection of computer systems, development of software tools that automate the attacks, and the growing role of private computers as a target of hacking attacks. Statistics of the cyber crime Inadequate and incomplete protection of computer systems Millions of computers are connected to the Internet, and many computer systems are without adequate protection in place to prevent illegal access. Analysis suggests that an unprotected computer system that is connected to the Internet is likely to Experience attack within less than a minute. The installation of protective measures can lower the risk, but successful attacks against well-protected computer systems prove that technical protection measures can never completely stop attacks.
  • 11. ComputerSecurityandCrimes 11 Development of software tools that automate the attacks Recently, software tools are being used to automate attacks. With the help of software and pre-installed attacks, a single offender can attack thousands of computer systems in a single day using one computer. If the offender has access to more computers – e.g. through a botnet – he/she can increase the scale still further. Since most of these software tools use pre-set methods of attacks, not all attacks prove successful. Users that update their operating systems and software applications on a regular basis reduce their risk of falling victim to these broad-based attacks, as the companies developing protection software analyse attack tools and prepare for the standardized hacking attacks. High-profile attacks are often based on individually-designed attacks. Illegal data acquisition (data operations) Sensitive information is often stored in computer systems. If the computer system is connected to the Internet, offenders can try to access this information via the Internet from almost any place in the world. The Internet is increasingly used to obtain trade secrets. The value of sensitive information and the ability to access it remotely makes data operations highly interesting. In the 1980s, a number of German hackers succeeded in entering US government and military computer systems, obtaining secret information and selling this information to agents from a different country. Illegal interception Offenders can intercept communications between users (such as e-mails) or other forms of data transfers (when users upload data onto webservers or access web-based external storage media) in order to record the information exchanged. In this context, offenders can in general target any communication infrastructure (e.g. fixed lines or wireless) and any Internet service (e.g. e-mail, chat or VoIP communications).
  • 12. ComputerSecurityandCrimes 12 Top countries having threat of cyber crime Various types of cyber crimes There are several types of cybercrimes that are occurring in the networking world some of these are as written below- 1. Financial fraud 2. Destruction of data and other networks 3. Theft of proprietary information 4. System penetration from outside 5. Denial of service 6. Unauthorised access by insiders 7. Employee use of internet service privileges 8. Viruses
  • 13. ComputerSecurityandCrimes 13 Here the picture depicts the type of crimes and the threat percentage of these crimes Anti-cybercrime strategies Cyber security plays an important role in the on-going development of information technology, as well as Internet services. Making the Internet safer (and protecting Internet users) has become integral to the development of new services as well as governmental policy. Cyber security strategies – for example, the development of technical protection systems or the education of users to prevent them from becoming victims of cybercrime – can help to reduce the risk of cybercrime. An anti-cybercrime strategy should be an integral element of a cyber-security strategy. The ITU Global Cyber security Agenda, as a global framework for dialogue and international cooperation to coordinate the international response to the growing challenges to cyber security and to enhance confidence and security in the information society, builds on existing work, initiatives and partnerships with the objective of proposing global strategies to address these related challenges.
  • 14. ComputerSecurityandCrimes 14 Conclusions The cybercrime as a whole refers to Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, by using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". Such crimes may threaten a nation’s security and financial health. Issues surrounding this type of crime has become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. A computer can be a source of evidence. Even when a computer is not directly used for criminal purposes, may contain records of value to criminal investigators.so the network must be secure as no one can access the information of the computer.
  • 15. ComputerSecurityandCrimes 15 Glossary  Child grooming: When an adult becomes friends with a child, this is sometimes done for a reason. The reason is to lower the inhibitions of the child and to prepare for sexual abuse.  Child Pornography is a criminal offense and is defined as any visual depiction involving the use of a minor, or one appearing to be a minor, engaging in sexually explicit conduct.  Copyright infringement is the use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works.  ICTs - Information and communication technologies  NASA - National Aeronautics and Space Administration  VoIP - Voice over Internet protocol
  • 16. ComputerSecurityandCrimes 16 References-  Moore, R. (2005) "Cyber-crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing.  Susan W. Brenner, Cybercrime: Criminal Threats from Cyberspace, ABC-CLIO, 2010. Also includes the statistics from the net search and many other sites. IJS