Download - Cyber Crime
![Page 1: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032522/55cf9025550346703ba34be3/html5/thumbnails/1.jpg)
1
CYBER CRIME
![Page 2: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032522/55cf9025550346703ba34be3/html5/thumbnails/2.jpg)
2
CONTENTS :-
Introduction Definition Categories of cyber crime Role of computer in crime Cyber criminals Prevention IT act 2000 IT act 2008 Conclusion
![Page 3: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032522/55cf9025550346703ba34be3/html5/thumbnails/3.jpg)
3
DEFINITION
It’s an unlawful act in which the computer is either a tool or a target or both.
Acts that are punishable by the Information Technology Act.
Cybercrime is an illegal act is committed using a computer network.
Cyber space is a virtual space that has become as important as real space for business, politics, and communities
![Page 4: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032522/55cf9025550346703ba34be3/html5/thumbnails/4.jpg)
4
CATEGORIES OF CYBER CRIME
Cyber crimes against persons
Cyber crimes against property
Cyber crimes against government
![Page 5: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032522/55cf9025550346703ba34be3/html5/thumbnails/5.jpg)
5
CYBER LAWS DEALS WITH
Cyber Crimes
Electronic or Digital Signatures
Intellectual Property
Data Protection and Privacy
![Page 6: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032522/55cf9025550346703ba34be3/html5/thumbnails/6.jpg)
6
CYBER ATTACKS STATISTICS
![Page 7: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032522/55cf9025550346703ba34be3/html5/thumbnails/7.jpg)
7
ROLE OF COMPUTER IN CRIME
COMPUTER AS TARGET
COMPUTER AS TOOL
COMPUTER AS APPLIANCE
![Page 8: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032522/55cf9025550346703ba34be3/html5/thumbnails/8.jpg)
8
CYBER CRIMINALS
Insider Threats(employees)
Hackers(teenage thrill-seekers
to sophisticated criminals)
Hactivists (overloads e-mail
servers or hack websites to send
political message)
Virus Writers(writes viruses to that
infect systems)
Criminal Groups(attack systems & steal password for financial
gain)
Sensitive Intrusions
(sensitive information is obtained via computer
intrusions) Information
Warfare(alternative to military
attacks)
Terrorists(who have potential to
disrupt government systems with computer
attacks)
Cyber Warfare(attack by sovereigns --- Crime or Declaration of
war)
![Page 9: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032522/55cf9025550346703ba34be3/html5/thumbnails/9.jpg)
9
TYPES OF CYBER ATTACKS
1) Viruses 9) Theft
2) Worms 10) Piracy
3) Trojans 11) Break ins
4) Mail bombs 12) Terrorism
5) Threats
6) Harassment
7) DOS
8) Fraud
![Page 10: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032522/55cf9025550346703ba34be3/html5/thumbnails/10.jpg)
10
PREVENTION
Use strong password. Secure your computer
i. Activate your firewall
ii. Use anti-virus
iii. Block software attacks
Secure your mobile devices. Install latest OS. Secure wireless network. Protect your e-identity.
![Page 11: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032522/55cf9025550346703ba34be3/html5/thumbnails/11.jpg)
11
CASE STUDY The Citadel network – a cybercrime ring responsible for stealing
more than $500 million from consumer and business bank account.
It infected more than 5 million PCs located in 90 countries , including the united states , Australia , Hong Kong , India and large part of Western Europe.
Bank affected by the group’s activities included American Express , Bank Of America , HSBC , Wells Fargo , Paypal and Royal Bank Of Canada.
According to Microsoft, the gang behind the Citadel botnets infected PCs in part by selling pirated versions of the Windows XP operating system that they'd pre-infected with the malware.
![Page 12: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032522/55cf9025550346703ba34be3/html5/thumbnails/12.jpg)
12
CASE STUDY
Citadel blocked victims' access to many legitimate anti-virus/anti-malware sites, making it so people may not have been able to easily remove this threat from their computer.
Microsoft and FBI joint operation, they took down over 1,000 Citadel botnets that were being used to control millions of malware-infected PCs.
This Citadel botnet takedown was part of a larger effort , coordinated by the National Cyber Investigative Joint Task Force (NCIJTF) , which is targeting botnet creators and distributors.
![Page 13: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032522/55cf9025550346703ba34be3/html5/thumbnails/13.jpg)
13
IT ACT 2000
The Information Technology Act, 2000 (IT Act), came into force on 17 October
2000.
The primary purpose of the Act is to provide legal recognition to electronic
commerce and to facilitate filing of electronic records with the Government.
Information Technology Act 2000 consisted of 94 sections segregated into 13
chapters.
![Page 14: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032522/55cf9025550346703ba34be3/html5/thumbnails/14.jpg)
14
IT ACT AMENDMENT 2008 ITA-2008, is a new version of IT Act 2000, has been passed by the parliament on
23rd December 2008. It received the assent of President of India on 5th February, 2009.
Provides additional focus on Information Security.
Added several new sections on offences including Cyber Terrorism and Data Protection.
124 sections and 14 chapters.
![Page 15: Cyber Crime](https://reader030.vdocument.in/reader030/viewer/2022032522/55cf9025550346703ba34be3/html5/thumbnails/15.jpg)
15
CONCLUSION
India needs a good combination of laws and technology, in harmony with the laws of other countries and keeping in mind common security standards.