SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Seminar on
CYBER-CRIME
Presented By:
Vaibhav Gaur
B.Tech IV Year/VIII Sem/CSE
CHARTERED INSTITUTE OF TECHNOLOGY
TRANSFORMING EDUCATION WITH GENERATION
JOIN ME ON :https://www.facebook.com/vaibh.gaur
INTRODUCTION
 As the use of internet is increasing day by day,
traditional concepts & methods of crime have
taken new dimensions.
 The development in information technology has
given rise to more number of cyber attacks like
hacking, phishing, data theft etc.
 A country like India has seen a growing number
of cyber assaults, witnessed the misuse of social
media & internet that brought home the threat of
CYBER-CRIME.
WHAT IS CYBER-CRIME ??
 Cyber-Crime can be defined as the intentional
use of computer, networks & public internets to
cause destruction & harm for personal objectives.
EXAMPLES OF CYBER-CRIME
 Hacking into computer systems.
 Introducing viruses to vulnerable networks.
 Website Defacing.
 Denial-of-Service(DoS) attacks.
 Terrorists threats made via e-mail.
CORE CHARACTERISTICS
Cyber Crime has some universal characteristics, which are as follows:
 It is done to convey a particular destructive or disruptive message to
the government.
 There are various methods to convey this message, viz., through
denial of services, sending threatening emails, defacing of
government websites, hacking and cracking of crucial governmental
systems or ‘protected systems’, disrupting the civil amenities through
destroying the proper working of the digital information systems, etc.
 It could affect the computers and the networks as a whole, it could
also affect the governing system, and it could affect the population of
target area to create threat.
 Computer and digital communication technology are used as main
tool to achieve extremist purposes.
 The whole act could be motivated by religious, social or political
ideologies.
COMMERCIAL SECTOR, A KEY TARGET
 Communication System:
News Organizations
Telephony suppliers
 Corporations:
Component suppliers(boots, foods, radios etc)
Civilian consulting companies
 Financial Institutions
Government funds tied up in commercial banks
 Health Care Industry
Pharmacies, hospitals, clinics
Drug companies(vaccines, antibiotics)
MOST COMMON ATTACKS !!
 Hackin With Computer System
 Data Theft
 Spreading Virus or Worms
 Identity Theft
HACKING WITH COMPUTER
SYSTEM
 Hacking means unauthorized attempts to bypass the security mechanisms
of an information system or network. Also, in simple words Hacking is the
unauthorized access to a computer system, programs, data and network
resources.
 LAWS :-Under section 66 of IT ACT 2008 & Section 43(A),IPC Section
379 and 406.
 PUNISHMENT:-Imprisonment upto 3 years or fine upto 5 lakh or
Both.
DATA THEFT
 If any person without permission of the owner or any other person, who is
incharge of a computer, computer system of computer network -
downloads, copies or extracts any data, computer data base or information
from such computer,computer system including information or data held
orstored in any removable storage medium.
 LAWS :-Under section 43(B) & Section 66 (E),67(C) of IT ACT 2008 &
IPC Section 379,405 and 420 &copyright.
 PUNISHMENT:-Imprisonment upto 3 years or fine upto 2 lakh or
Both.
SPREADING VIRUS OR WORM
 Viruses can do any amount of damage, the creator intends them to
do. They can send your data to a third party and then delete your
data from your computer. They can also ruin/mess up your system
and render it unusable without a re-installation of the operating
system.
 LAWS :-Under section 43(C) & Section 43 (E),66.
 PUNISHMENT:- Spreading of Virus offence is cognizable, bailable,
compoundable with permission of the court before which the prosecution
of such offence is pending and triable by any magistrate.
IDENTITY THEFT
 Identity theft is a form of fraud or cheating of another person’s identity in
which someone pretends to be someone else by assuming that person’s
identity, typically in order to access resources or obtain credit and other
benefits in that person’s name.
 LAWS :-Under section 66(C) & IPC Section 419.
 PUNISHMENT:- Imprisonment upto 3 years or fine upto 1 lakh or
Both.
CASE STUDIES
 9/11 attack
 Ahmadabad bomb blast
 26/11 Mumbai attack
9/11 TWIN TOWERS ATTACK
 Launched by Islamic terrorist group of Al-Qaeda
upon the United States in New York city & the
Washington D.C. metropolitan area.
 4 passengers airlines were hijacked by 19 Al-
Qaeda terrorists.
 Almost 3000 people died in the attack.
AHMADABAD BOMB BLAST(26-07-08)
 A mail with id alarbi_gujrat@yahoo.com was
being sent by a group of terrorists.
 Person named Kenneth Haywood’s unsecured
WiFi router in his house was being misused by
terrorists.
 56 people were killed & over 200 people were
injured.
26/11 MUMBAI ATTACK
 By the members of Lashkar-e-Taiba.
 Ajmal Kasab, the only attacker who was captured
alive, later confessed upon interrogation that the
attacks were conducted with the support of Pakistan.
 Major places of attacks were: Chhatrapati Shivaji
Terminus, the Taj Mahal Palace & tower, the Metro
Cinema etc.
 257 people were killed & 700 were injured.
WHAT DO WE NEED TO DO ??
 Maintain high alert & vigilance
 Update OS & applications regularly
 Enforce strong passwords
 “Lock down” systems
 Keep anti-virus software installed & up-to-date
 Employ intrusion detection systems & firewalls
CONCLUSION
 Cyber-Crime is a scary concept for many reasons.
It can do possible serious damage to various
aspects of our lives. It is difficult to catch & track
& prosecute.
 The information ago has brought us many good
things, but along with those good things came
some bad things too.
 All we can do as citizens is to protect ourselves by
protecting our information, who we give it to &
how much we give it out.
Cyber crime presentation By Vaibhav Gaur

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2Scott Sutherland
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesLearningwithRayYT
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hackingmsaksida
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defensefantaghost
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3Shawn Croswell
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Umesh Mahawar
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testingAbu Sadat Mohammed Yasin
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 

Was ist angesagt? (20)

CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
WTF is Penetration Testing v.2
WTF is Penetration Testing v.2WTF is Penetration Testing v.2
WTF is Penetration Testing v.2
 
Social Engineering Attacks & Principles
Social Engineering Attacks & PrinciplesSocial Engineering Attacks & Principles
Social Engineering Attacks & Principles
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Malware
MalwareMalware
Malware
 
Metasploit framwork
Metasploit framworkMetasploit framwork
Metasploit framwork
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 

Andere mochten auch

Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and IntegrityZaid Shabbir
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full pptShahbaz Khan
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityJisc Scotland
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 

Andere mochten auch (8)

Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Data security and Integrity
Data security and IntegrityData security and Integrity
Data security and Integrity
 
Software Security
Software SecuritySoftware Security
Software Security
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
System security
System securitySystem security
System security
 

Ähnlich wie Cyber crime presentation By Vaibhav Gaur

Ähnlich wie Cyber crime presentation By Vaibhav Gaur (20)

CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cybersecurity2021
Cybersecurity2021Cybersecurity2021
Cybersecurity2021
 
1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx1-140701132137-phpapp01 (2).pptx
1-140701132137-phpapp01 (2).pptx
 
Cyber crime (2018 )updated
Cyber crime (2018 )updatedCyber crime (2018 )updated
Cyber crime (2018 )updated
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
CYBER.pptx
CYBER.pptxCYBER.pptx
CYBER.pptx
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Types of Cyber Crimes
Types of Cyber CrimesTypes of Cyber Crimes
Types of Cyber Crimes
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 

Kürzlich hochgeladen

Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfisabel213075
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Coursebim.edu.pl
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfNainaShrivastava14
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 

Kürzlich hochgeladen (20)

Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
List of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdfList of Accredited Concrete Batching Plant.pdf
List of Accredited Concrete Batching Plant.pdf
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
Katarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School CourseKatarzyna Lipka-Sidor - BIM School Course
Katarzyna Lipka-Sidor - BIM School Course
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 

Cyber crime presentation By Vaibhav Gaur

  • 1. Seminar on CYBER-CRIME Presented By: Vaibhav Gaur B.Tech IV Year/VIII Sem/CSE CHARTERED INSTITUTE OF TECHNOLOGY TRANSFORMING EDUCATION WITH GENERATION JOIN ME ON :https://www.facebook.com/vaibh.gaur
  • 2. INTRODUCTION  As the use of internet is increasing day by day, traditional concepts & methods of crime have taken new dimensions.  The development in information technology has given rise to more number of cyber attacks like hacking, phishing, data theft etc.  A country like India has seen a growing number of cyber assaults, witnessed the misuse of social media & internet that brought home the threat of CYBER-CRIME.
  • 3. WHAT IS CYBER-CRIME ??  Cyber-Crime can be defined as the intentional use of computer, networks & public internets to cause destruction & harm for personal objectives.
  • 4. EXAMPLES OF CYBER-CRIME  Hacking into computer systems.  Introducing viruses to vulnerable networks.  Website Defacing.  Denial-of-Service(DoS) attacks.  Terrorists threats made via e-mail.
  • 5. CORE CHARACTERISTICS Cyber Crime has some universal characteristics, which are as follows:  It is done to convey a particular destructive or disruptive message to the government.  There are various methods to convey this message, viz., through denial of services, sending threatening emails, defacing of government websites, hacking and cracking of crucial governmental systems or ‘protected systems’, disrupting the civil amenities through destroying the proper working of the digital information systems, etc.  It could affect the computers and the networks as a whole, it could also affect the governing system, and it could affect the population of target area to create threat.  Computer and digital communication technology are used as main tool to achieve extremist purposes.  The whole act could be motivated by religious, social or political ideologies.
  • 6. COMMERCIAL SECTOR, A KEY TARGET  Communication System: News Organizations Telephony suppliers  Corporations: Component suppliers(boots, foods, radios etc) Civilian consulting companies  Financial Institutions Government funds tied up in commercial banks  Health Care Industry Pharmacies, hospitals, clinics Drug companies(vaccines, antibiotics)
  • 7. MOST COMMON ATTACKS !!  Hackin With Computer System  Data Theft  Spreading Virus or Worms  Identity Theft
  • 8. HACKING WITH COMPUTER SYSTEM  Hacking means unauthorized attempts to bypass the security mechanisms of an information system or network. Also, in simple words Hacking is the unauthorized access to a computer system, programs, data and network resources.  LAWS :-Under section 66 of IT ACT 2008 & Section 43(A),IPC Section 379 and 406.  PUNISHMENT:-Imprisonment upto 3 years or fine upto 5 lakh or Both.
  • 9. DATA THEFT  If any person without permission of the owner or any other person, who is incharge of a computer, computer system of computer network - downloads, copies or extracts any data, computer data base or information from such computer,computer system including information or data held orstored in any removable storage medium.  LAWS :-Under section 43(B) & Section 66 (E),67(C) of IT ACT 2008 & IPC Section 379,405 and 420 &copyright.  PUNISHMENT:-Imprisonment upto 3 years or fine upto 2 lakh or Both.
  • 10. SPREADING VIRUS OR WORM  Viruses can do any amount of damage, the creator intends them to do. They can send your data to a third party and then delete your data from your computer. They can also ruin/mess up your system and render it unusable without a re-installation of the operating system.  LAWS :-Under section 43(C) & Section 43 (E),66.  PUNISHMENT:- Spreading of Virus offence is cognizable, bailable, compoundable with permission of the court before which the prosecution of such offence is pending and triable by any magistrate.
  • 11. IDENTITY THEFT  Identity theft is a form of fraud or cheating of another person’s identity in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name.  LAWS :-Under section 66(C) & IPC Section 419.  PUNISHMENT:- Imprisonment upto 3 years or fine upto 1 lakh or Both.
  • 12. CASE STUDIES  9/11 attack  Ahmadabad bomb blast  26/11 Mumbai attack
  • 13. 9/11 TWIN TOWERS ATTACK  Launched by Islamic terrorist group of Al-Qaeda upon the United States in New York city & the Washington D.C. metropolitan area.  4 passengers airlines were hijacked by 19 Al- Qaeda terrorists.  Almost 3000 people died in the attack.
  • 14. AHMADABAD BOMB BLAST(26-07-08)  A mail with id alarbi_gujrat@yahoo.com was being sent by a group of terrorists.  Person named Kenneth Haywood’s unsecured WiFi router in his house was being misused by terrorists.  56 people were killed & over 200 people were injured.
  • 15. 26/11 MUMBAI ATTACK  By the members of Lashkar-e-Taiba.  Ajmal Kasab, the only attacker who was captured alive, later confessed upon interrogation that the attacks were conducted with the support of Pakistan.  Major places of attacks were: Chhatrapati Shivaji Terminus, the Taj Mahal Palace & tower, the Metro Cinema etc.  257 people were killed & 700 were injured.
  • 16. WHAT DO WE NEED TO DO ??  Maintain high alert & vigilance  Update OS & applications regularly  Enforce strong passwords  “Lock down” systems  Keep anti-virus software installed & up-to-date  Employ intrusion detection systems & firewalls
  • 17. CONCLUSION  Cyber-Crime is a scary concept for many reasons. It can do possible serious damage to various aspects of our lives. It is difficult to catch & track & prosecute.  The information ago has brought us many good things, but along with those good things came some bad things too.  All we can do as citizens is to protect ourselves by protecting our information, who we give it to & how much we give it out.