cybercrime and it act
DESCRIPTION
TRANSCRIPT
![Page 1: Cybercrime and IT ACT](https://reader037.vdocument.in/reader037/viewer/2022102700/549205a3ac795934288b469f/html5/thumbnails/1.jpg)
Information Technology
Act - An overview
By: AKSHAY BHARDWAJ
Branch- I.T(C1)
PRESENTATION ONPRESENTATION ON CYBER CRIME CYBER CRIME
![Page 2: Cybercrime and IT ACT](https://reader037.vdocument.in/reader037/viewer/2022102700/549205a3ac795934288b469f/html5/thumbnails/2.jpg)
Cyber Crime – “Is the Internet the new “Wild Wild West?”
![Page 3: Cybercrime and IT ACT](https://reader037.vdocument.in/reader037/viewer/2022102700/549205a3ac795934288b469f/html5/thumbnails/3.jpg)
In the News……. 1 out of 5 children received a
sexual solicitation or approach over the Internet in a one-year period of time (www.missingchildren.com)
California warns of massive ID theft – personal data stolen from computers at University of California, Berkeley (Oct 21, 2004 IDG news service)
Microsoft and Cisco announced a new initiative to work together to increase internet security (Oct 18, 2004 www.cnetnews.com)
![Page 4: Cybercrime and IT ACT](https://reader037.vdocument.in/reader037/viewer/2022102700/549205a3ac795934288b469f/html5/thumbnails/4.jpg)
The New Wild Wild WestMore cyber criminals
than cyber copsCriminals feel “safe”
committing crimes from the privacy of their own homes
Brand new challenges facing law enforcementMost not trained in the
technologiesInternet crimes span
multiple jurisdictionsNeed to retrofit new
crimes to existing laws
![Page 5: Cybercrime and IT ACT](https://reader037.vdocument.in/reader037/viewer/2022102700/549205a3ac795934288b469f/html5/thumbnails/5.jpg)
Computer Crime
Computer used to commit a crimeChild porn, threatening
email, assuming someone’s identity, defamation, spam, phishing
Computer as a target of a crime Viruses, worms, industrial
espionage, software piracy, hacking
![Page 6: Cybercrime and IT ACT](https://reader037.vdocument.in/reader037/viewer/2022102700/549205a3ac795934288b469f/html5/thumbnails/6.jpg)
Computer Forensics What is it?
an autospy of a computer or network to uncover digital evidence of a crime
Evidence must be preserved and hold up in a court of law
Growing field – Many becoming computer forensic savvyFBI, State and Local Police, IRS,
Homeland SecurityDefense attorneys, judges and
prosecutors Independent security agenciesWhite hat or Ethical HackersPrograms offered at major
universities such as URIhttp://homepage.cs.uri.edu/faculty/wolfe/
cf
![Page 7: Cybercrime and IT ACT](https://reader037.vdocument.in/reader037/viewer/2022102700/549205a3ac795934288b469f/html5/thumbnails/7.jpg)
Uncovering Digital EvidenceSmart Criminals don’t use
their own computers
Floppy disks Zip/Jazz disks Tapes Digital cameras Memory sticks Printers CDs PDAs Game boxes Networks Hard drives
![Page 8: Cybercrime and IT ACT](https://reader037.vdocument.in/reader037/viewer/2022102700/549205a3ac795934288b469f/html5/thumbnails/8.jpg)
Digital Evidence
Criminals Hide Evidence
Delete their files and emails
Hide their files by encryption, password protection, or embedding them in unrelated files (dll, os etc)
Use Wi-Fi networks and cyber cafes to cover their tracks
Forensics Uncover Evidence
Restore deleted files and emails – they are still really there!
Find the hidden files through complex password, encryption programs, and searching techniques
Track them down through the digital trail - IP addresses to ISPs to the offender
Not obvious…….it’s most likely hidden on purpose or needs to be unearthed by forensics experts
![Page 9: Cybercrime and IT ACT](https://reader037.vdocument.in/reader037/viewer/2022102700/549205a3ac795934288b469f/html5/thumbnails/9.jpg)
The Crime Scene(with Computer Forensics)
Similar to traditional crime scenes
Must acquire the evidence while preserving the integrity of the evidence
No damage during collection, transportation, or storage
Document everything Collect everything the first time
Establish a chain of custody
But also different…….
Can perform analysis of evidence on exact copy!
Make many copies and investigate them without touching original
Can use time stamping/hash code techniques to prove evidence hasn’t been compromised
![Page 10: Cybercrime and IT ACT](https://reader037.vdocument.in/reader037/viewer/2022102700/549205a3ac795934288b469f/html5/thumbnails/10.jpg)
SpamViruses/Worms
Industrial Espionage and HackersWi-Fi High Jacking
Top Cyber Crimes that Attack Business
![Page 11: Cybercrime and IT ACT](https://reader037.vdocument.in/reader037/viewer/2022102700/549205a3ac795934288b469f/html5/thumbnails/11.jpg)
Spam“Spam accounts for 9 out of every
10 emails in the United States.”
“We do not object to the use of this slang term to describe UCE (unsolicited commercial email), although we do object to the use of the word “spam” as a trademark and the use of our product image in association with that term”
![Page 12: Cybercrime and IT ACT](https://reader037.vdocument.in/reader037/viewer/2022102700/549205a3ac795934288b469f/html5/thumbnails/12.jpg)
Can-Spam Act of 2003 Controlling the Assault of Non-Solicited Pornography and
Marketing Act (Can-Spam) Signed into law by President Bush on Dec 16, 2003
Took effect Jan 1, 2004
Unsolicited commercial email must:Be labeled Include Opt-Out instructionsNo false headers
FTC is authorized (but not required) to establish a “do-not-email” registry
www.spamlaws.com –lists all the latest in federal, state, and international laws
![Page 13: Cybercrime and IT ACT](https://reader037.vdocument.in/reader037/viewer/2022102700/549205a3ac795934288b469f/html5/thumbnails/13.jpg)
Spam is Hostile You pay for Spam, not
Spammers Email costs are paid by email
recipients
Spam can be dangerous Never click on the opt-out link!
May take you to hostile web site where mouse-over downloads an .exe
Tells spammers they found a working address
They won’t take you off the list anyway
What should you do? Filter it out whenever possible Keep filters up to date If you get it, just delete the email
![Page 14: Cybercrime and IT ACT](https://reader037.vdocument.in/reader037/viewer/2022102700/549205a3ac795934288b469f/html5/thumbnails/14.jpg)
Viruses and Worms Different types of “ailments” Viruses
software that piggybacks on other software and runs when you run something else
Macro in excel, word Transmitted through sharing
programs on bulletin boards Passing around floppy disks
An .exe, .com file in your email
Wormssoftware that uses computer
networks to find security holes to get in to your computer – usually in Microsoft OS!! But worm for MAC was recently written
![Page 15: Cybercrime and IT ACT](https://reader037.vdocument.in/reader037/viewer/2022102700/549205a3ac795934288b469f/html5/thumbnails/15.jpg)
Hackers are Everywhere
Stealing data Industrial Espionage Identity theft Defamation
Deleting data for fun A lot of bored 16 year olds late
at night Turning computers into
zombies To commit crimes Take down networks Distribute porn Harass someone
Ethical/white hat hackers exist too Help break into networks to
prevent crimes
Mafia Boy
![Page 16: Cybercrime and IT ACT](https://reader037.vdocument.in/reader037/viewer/2022102700/549205a3ac795934288b469f/html5/thumbnails/16.jpg)
Wireless Fidelity (Wi-Fi)Using antennas to create “hot spots”Hotspots – Internet Access (sometimes free)
Newport Harbor - All the boats in Harbor have internet accessSan Francisco Giants Stadium – Surf the web while catching a
gameUMass (need to register, but it’s free)Cambridge, MAPhiladelphia, PA – just announced – entire city by 2006
![Page 17: Cybercrime and IT ACT](https://reader037.vdocument.in/reader037/viewer/2022102700/549205a3ac795934288b469f/html5/thumbnails/17.jpg)
Wi-Fi High Jacking60-70% wireless networks are wide open
Why are the Wi-Fi networks unprotected?Most people say “Our data is boring”But… criminals look for wireless networks to
commit their crimes And… the authorities will come knocking on
your door…..
![Page 18: Cybercrime and IT ACT](https://reader037.vdocument.in/reader037/viewer/2022102700/549205a3ac795934288b469f/html5/thumbnails/18.jpg)
Protect your Computers! Use anti-virus software and
firewalls - keep them up to date
Keep your operating system up to date with critical security updates and patches
Don't open emails or attachments from unknown sources
Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist
Back-up your computer data on disks or CDs often
Don't share access to your computers with strangers
If you have a wi-fi network, password protect it
Disconnect from the Internet when not in use
Reevaluate your security on a regular basis
Make sure your employees and family members know this info too!
![Page 19: Cybercrime and IT ACT](https://reader037.vdocument.in/reader037/viewer/2022102700/549205a3ac795934288b469f/html5/thumbnails/19.jpg)
Web sites of Interesthttp://homepage.cs.uri.edu/faculty/wolfe/cfwww.missingchildren.comwww.spamlaws.com www.netsmartz.orghttp://www.ifccfbi.gov - operation web snare –
latest cyber crimes to be aware ofhttp://www.dcfl.gov/dc3/home.htmhttp://www.cops.org/
![Page 20: Cybercrime and IT ACT](https://reader037.vdocument.in/reader037/viewer/2022102700/549205a3ac795934288b469f/html5/thumbnails/20.jpg)
Thank you!
![Page 21: Cybercrime and IT ACT](https://reader037.vdocument.in/reader037/viewer/2022102700/549205a3ac795934288b469f/html5/thumbnails/21.jpg)
QUERY !