cyber crime in world

15
CYBER CYBER CRIME CRIME

Upload: avasyu-gupta

Post on 29-Jun-2015

992 views

Category:

Education


0 download

DESCRIPTION

info about all types of crime and how to prevent it

TRANSCRIPT

Page 1: Cyber crime in WORLD

CYBER CYBER CRIMECRIME

Page 2: Cyber crime in WORLD

WHAT IS CYBER CRIMEWHAT IS CYBER CRIME COMPUTER CRIME COMPUTER CRIME

refers to any refers to any crime that involves crime that involves a computer and a a computer and a network where the network where the computers may or computers may or may not have may not have played an played an instrumental part instrumental part in the commission in the commission of a crime.of a crime.

Page 3: Cyber crime in WORLD

DEFINITION(CONT)DEFINITION(CONT) A computer can be a source of A computer can be a source of

evidence. Even though the computer evidence. Even though the computer is not directly used for criminal is not directly used for criminal purposes. It is an excellent device purposes. It is an excellent device for record keeping , and can be of for record keeping , and can be of great value to criminal great value to criminal investigations investigations Technological advancements have Technological advancements have created new possibilities for criminal created new possibilities for criminal activity in particular the criminal activity in particular the criminal misuse of information technologies.misuse of information technologies.

Page 4: Cyber crime in WORLD

TYPES OF CRIMETYPES OF CRIME1. Unauthorized access and hacking1. Unauthorized access and hacking It means any kind of access without the It means any kind of access without the

permission of either the rightful owner or the permission of either the rightful owner or the person in charge of a computer , computer person in charge of a computer , computer

system , computer network.system , computer network.

2. Trojan attack2. Trojan attack The program that act like something useful The program that act like something useful

but do the things that are quiet damaging . but do the things that are quiet damaging . The programs of this kind are called as The programs of this kind are called as TrojansTrojans

the name Trojan is very popularthe name Trojan is very popular

Page 5: Cyber crime in WORLD

TYPES (CONT.)TYPES (CONT.)3. 3. Virus and worm attackVirus and worm attack

A program that has A program that has capability to inject other programs and make capability to inject other programs and make copies of itself and spread into other programs copies of itself and spread into other programs is called virus.is called virus.

4. 4. E-mail and IRL related crimes E-mail and IRL related crimes (i) Email spoofing (i) Email spoofing It refers to email that It refers to email that appears to have been originated from one appears to have been originated from one source when it was actually sent from another source when it was actually sent from another

sourcesource

Page 6: Cyber crime in WORLD

TYPES (CONT.)TYPES (CONT.)

(ii) Email spamming (ii) Email spamming It refers to sending email to thousands and thousands of It refers to sending email to thousands and thousands of

users similar to a chain letterusers similar to a chain letter (iii) Sending malicious order through email (iii) Sending malicious order through email

Emails are used to send virus Trojan etc through emails Emails are used to send virus Trojan etc through emails as an attachment as an attachment

Email bombing Email bombing

(iv) (iv) It is characterized by abuses repeatedly sending an It is characterized by abuses repeatedly sending an

identical email message to a particular addressidentical email message to a particular address

Page 7: Cyber crime in WORLD

TYPES (CONTD)TYPES (CONTD)(v) (v) Sending threatening emailsSending threatening emails

(vi) Defamatory emails(vi) Defamatory emails

(vii) Email frauds(vii) Email frauds

(viii) IRC related(viii) IRC related

5. Denial of service attack 5. Denial of service attack flooding a computer resource flooding a computer resource

with more requestswith more requests than it can handle. than it can handle.

This causes the resourceThis causes the resource to crash to crash thereby denying access of service to thereby denying access of service to

authorized users.authorized users.

Page 8: Cyber crime in WORLD

TYPES(CONT)TYPES(CONT)6. 6. Forgery Forgery

Counterfeit currency notes Counterfeit currency notes postage and revenue stamps mark sheets postage and revenue stamps mark sheets etc can be forged using sophisticated etc can be forged using sophisticated computers printers and scanners computers printers and scanners

7. 7. IPR violationsIPR violations These include software piracy These include software piracy copyright infringement trademark violation copyright infringement trademark violation theft of computer source code etc.theft of computer source code etc.

Page 9: Cyber crime in WORLD

TYPES (CONT)TYPES (CONT)8. Cyber terrorism 8. Cyber terrorism

Targeted attacks on military installations, Targeted attacks on military installations, power plants, air traffic control, banks, power plants, air traffic control, banks, telecommunications networks are the most telecommunications networks are the most likely targets.likely targets.

99. . Banking/Credit card related crimesBanking/Credit card related crimes Use of stolen card information or Use of stolen card information or fake credit/debit cards are common.fake credit/debit cards are common.

1010. . Theft of Internet hours Theft of Internet hours Unauthorized use of internet Unauthorized use of internet hours paid for by another person.hours paid for by another person.

Page 10: Cyber crime in WORLD

TYPES (CONT)TYPES (CONT)11. Defamation 11. Defamation

When someone publishes defamatory matter about When someone publishes defamatory matter about someone on a website or sends e-mails containing someone on a website or sends e-mails containing defamatory information to all of that persons friends.defamatory information to all of that persons friends.

12. Cyber stalking 12. Cyber stalking It involves following a persons movement across the It involves following a persons movement across the internet by posting messages on the bulletins board internet by posting messages on the bulletins board frequented by the victim , constantly bombarding the frequented by the victim , constantly bombarding the

victim with emails etcvictim with emails etc

13. Identity theft 13. Identity theft It occurs when someone appropriates another’s It occurs when someone appropriates another’s personal information without their knowledge to commit personal information without their knowledge to commit

theft.theft.

Page 11: Cyber crime in WORLD

IT ACT OF INDIA 2000IT ACT OF INDIA 2000 In May 2000 both the houses of the Indian In May 2000 both the houses of the Indian

Parliament passed the Information Technology Parliament passed the Information Technology Bill. This act deals Bill. This act deals with the various cyber crimes in Chapter IX and with the various cyber crimes in Chapter IX and XI, Sections 43 in particular deals with the XI, Sections 43 in particular deals with the unauthorized access, unauthorized downloading, unauthorized access, unauthorized downloading, virus attacks, denial of access, distributions. This virus attacks, denial of access, distributions. This section provide for a fine up to Rs. one crore by section provide for a fine up to Rs. one crore by way of remedy. Sec 65 deals with tampering with way of remedy. Sec 65 deals with tampering with computer source documents and provides for computer source documents and provides for imprisonment upto 3 years or fine which may imprisonment upto 3 years or fine which may extend upto 2 years or both. Section 66 deals extend upto 2 years or both. Section 66 deals with hacking with computer system and provides with hacking with computer system and provides for imprisonment upto 3 years or fine which may for imprisonment upto 3 years or fine which may extend upto 2 years or both.extend upto 2 years or both.

Page 12: Cyber crime in WORLD

PREVENTION OF CYBER PREVENTION OF CYBER CRIMECRIME

Prevention is better than cure. It is always better to Prevention is better than cure. It is always better to take certain precaution while operating the net. One take certain precaution while operating the net. One should keep in mind the following:- should keep in mind the following:- 1. To prevent cyber stalking 1. To prevent cyber stalking avoid disclosing any information pertaining to avoid disclosing any information pertaining to oneself. 2. oneself. 2. Always use latest and update antivirus software to Always use latest and update antivirus software to guard against virus attacks. guard against virus attacks. 3. Always avoid sending any 3. Always avoid sending any photograph online particularly to strangers and chat photograph online particularly to strangers and chat friends. 4. Never friends. 4. Never send your credit card numbers to any site that is not send your credit card numbers to any site that is not secured to guard against frauds. secured to guard against frauds. 5. Use of firewalls may be beneficial. 5. Use of firewalls may be beneficial.

Page 13: Cyber crime in WORLD

PREVENTION (CONT)PREVENTION (CONT)

6. Always keep a watch on the sides that 6. Always keep a watch on the sides that your children are accessing to prevent your children are accessing to prevent any kind of harrassmentany kind of harrassment

7. It is better to use a security programme 7. It is better to use a security programme that gives control over the cookies.that gives control over the cookies.

Page 14: Cyber crime in WORLD

CONCLUSIONCONCLUSION

Capacity of human mind is Capacity of human mind is unfathomable. It is not possible to unfathomable. It is not possible to eliminate cyber crime from the eliminate cyber crime from the cyber space. The only possible cyber space. The only possible step is to make people aware of step is to make people aware of their rights and duties and further their rights and duties and further making the application of the laws making the application of the laws more stringent to check crime.more stringent to check crime.

Page 15: Cyber crime in WORLD

THANKSTHANKS

A POWERPOINT A POWERPOINT PRESENTATION PRESENTATION

BYBY

AVASYU GUPTAAVASYU GUPTA

IX DIX D