SlideShare a Scribd company logo
Cyber crime
In 1960s internet was developed for better
communication and research.With
advancement of technology and expansion of
internet every area becomes easy to access
but it also provides a pathway to commit
crimes easily without any effort only sitting
on a system.
Some human minds of criminal nature use
internet as a tool of crime which is now
known as cyber crime committed in all
countries first cyber crime reported in 1820
 Crime is a social and economic phenomenon
 “a legal wrong that can be followed by criminal
proceedings which may result into
punishment.”
definition : Crime is an intentional act of
commission or omission in contravention to
the law of the land and accordingly
punishable when proved in judicial
proceeding
 The term “cyber crime” was first coined by
Barry Collins in 1980’s
 “Any criminal activity that uses a computer
either as an instrumentality, target or a means
for perpetuating further crimes comes within
the ambit of cyber crime”
 A generalized definition of cyber crime may
be “ unlawful acts wherein the computer is
either a tool or target or both”
 Capacity to store data in comparatively small
space
 Easy to access
 Complex
 Negligence
 Loss of evidence
 Money
 Fun
 ego
 The cyber criminals constitute of various
groups/ category.The following are the
category of cyber criminals:
• Children and adolescents between the age
group of 6 – 18 years
• Organised hackers
• Professional hackers / crackers
• Discontented employees
 Conventional and new forms of crime
 White collar crime
 Organized crime
 Victimless crime
 Hacking
 Theft of information
 Packet sniffing
 spyware
 Data diddling
 Virus / worm attacks
 Logic bombs
 Trojan attacks
 Internet time thefts
 Web jacking
Packet Sniffers — Software programs that
monitor’s network traffic. Attackers use packet
sniffers to capture and analyze data
transmitted via a network. Specialized
sniffers capture passwords as they cross a
network
Spyware gathers information without the
users’ knowledge. Spyware is typically bundled
covertly
with another program.The user does not know that
installing one also installs the other. Once installed, the
spyware monitors user activity on the Internet and
transmits that information in the background to
someone else
Virus program or piece of code that
spreads from computer to computer
without the users’ consent.They usually
cause an unexpected and negative event
when run by a computer.Viruses
contaminate legitimate computer
programs
Wormsare wholly contained viruses that travel
through networks, automatically duplicate
themselves and send themselves to other computers
whose addresses are in the host computer.
Viruses are always embedded within
another file or program.Worm
: self-reproducing program which
propagates via the network.
Trojan horse: program which purports to
do one thing, but secretly does
something else; example:
free screen saver installs with a backdoor
Data diddling:This is altering raw
data just before a computer processes it and
then changing it back after the processing is
completed.
Denial of Service attack:The
computer is flooded with more requests
than it can handle which cause it to crash.
Distributed Denial of Service (DDOS) attack
is a example.
Web jacking:This term is derived from
the term hi jacking. In these kinds of offences
the hacker gains access and control over the
web site of another.
Email bombing: It refers to sending large
numbers of mail to the victim, which may be an
individual or a company by ultimately resulting
into crashing.
HackingIntrusion into computer system
without the permission of the computer
owner/user.
. IdentityTheft • A form of fraud in which a person
pretends to be someone else by assuming the other person’s
identity • Undertaken to access resources or obtain credit
and other benefits in the victim’s name .
E-mail spoofing• A technique used by hackers to send
mails in which sender’s address and other parts of the email
are altered. •This method is used to disguise the actual email
address from which phishing and spam messages are sent •
Motive: to trick users into providing personal and
confidential information
SQL injection
The ability to inject SQL commands into the
database engine through an existing application
Internal
Computer
crimes
Virus worms Trojan horses
Tele
communication
crimes
Phone breaking Phone tapping Hacking
Computer
Manipulation
Crimes
Embezzlements Frauds
Support of
Criminal
Enterprises
Data bases to
support drug
Distribution
Data bases to
keep records of
client
transaction
Money laundering
Hardware and
software
Theft
Software piracy Theft of computer
and microchips
Theft of trade
secrets
Classification of cyber crime
1. Against
Individuals
a. their person &
b. their property
of an individual
2. Against
Organization
a. Government
c. Firm, Company,
Group of
Individuals
3. Against Society
at large
 Harassment via e-mails.
 Cyber-stalking.
 Dissemination of obscene material.
 Defamation.
 Unauthorized control/access over computers
 Indecent exposure
 Email spoofing
 Cheating & Fraud
 Computer vandalism.
 Transmitting virus.
 Net trespass
 Unauthorized control/access over computers
 Intellectual Property crimes
 Internet time thefts
 Cyber terrorism against the government
organization.
 Distribution of pirated software etc.
CYBERTERRORISM
Scientific war against
Governments
 Cyber terrorism is the convergence of terrorism
and cyberspace. It is generally understood to
mean unlawful attacks and threats of attack
against computers, networks, and the
information stored therein when done to
intimidate or coerce a government or its people
in furtherance of political or social objectives.
LTTE AUM
Perpetrator Group/Individual Group/Individual
Place Sri
Lanka/London/Australia
Japan/US/Worldwide
Worldwide
Tool Threats/Violence/Recruitm
ent/Education/Strategies
Violence/Recruitment/
Education/Strategies
Target Government
Officials/Recruits
Governments
Motivation Social/PoliticalChange World Domination
 DETERRENCE
 CRIMINAL JUSTICE
 ENHANCED DEFENSE
 NEGOTIATIONS
 Pornography (basically child pornography)
 Polluting the youth through indecent
exposure
 Trafficking
 Financial crimes
 Sale of illegal articles
 Online gambling
 Forgery
Cybercrime 111205224958-phpapp02
Section 43 deals with the unauthorised access, unauthorised
downloading, virus attacks or any contaminant, causes
damage, disruption, denial of access, interference with
the service availed by a person
Section 65 deals with ‘tampering with computer source documents’
and provides for imprisonment up to 3 years or fine
Section 66 deals with ‘hacking with computer system’ and provides
for imprisonment up to 3 years or fine
section 67 deals with publication of obscene material and provides
for imprisonment up to a term of 10 years
.Use antivirus software’s
.Insert firewalls
.uninstall unnecessary software
.maintain backup
.check security settings
.Stay anonymous –
.choose a genderless screen name
.Never give your full name or address to strangers..
 To prevent cyber stalking avoid disclosing any
information pertaining to oneself.This is as good as
disclosing your identity to strangers in public place.
 Always avoid sending any photograph online
particularly to strangers and chat friends as there
have been incidents of misuse of the photographs.
 Always use latest and up date anti virus software to
guard against virus attacks.
 Always keep back up volumes so that one may not
suffer data loss in case of virus contamination
 Never send your credit card number to any site that is
not secured, to guard against frauds.
 Always keep a watch on the sites that your
children are accessing to prevent any kind of
harassment or depravation in children.
 Web site owners should watch traffic and check
any irregularity on the site. Putting host-based
intrusion detection devices on servers may do
this
 Web servers running public sites must be
physically separate protected from internal
corporate network.
 History is the witness that no legislation has
succeeded in totally eliminating crime from the globe.
 The only possible step is to make people aware of
their rights and duties (to report crime as a collective
duty towards the society) and further making the
application of the laws more stringent to check crime.
 Undoubtedly the IT Act is a historical step in the cyber
world. Further I all together do not deny that there is a
need to bring changes in the InformationTechnology
Act to make it more effective to combat cyber crime.

More Related Content

PPT
Cyber crime
PPTX
Types of Cyber Crimes
PPTX
Cyber crime: A Quick Survey
PPTX
Cyber crime and its types
PPTX
Cyber crime
PPTX
Cyber crime
PPTX
Cyber Crime
PDF
Cyber Crime Types & Tips
Cyber crime
Types of Cyber Crimes
Cyber crime: A Quick Survey
Cyber crime and its types
Cyber crime
Cyber crime
Cyber Crime
Cyber Crime Types & Tips

What's hot (20)

PPTX
Cyber-crime PPT
PPTX
[Exposicion] Computer and Internet Crime
PPTX
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
PPT
computer crime
PPTX
Types Of Computer Crime
PPT
Cyber Crime & Security
PPTX
Cyber crime
DOC
Assignment of cyber crimes for oumh1203
DOCX
Final Copy Cyber Crime Research Essay
PPTX
Cyber crime lecture one definition and nature
PPTX
Cyber crimes presentation
PPT
Cyber crimes and their prevention
PPTX
2014-09-03 Cybersecurity and Computer Crimes
PPTX
Computer Crimes
PPTX
Power point cybercrime
PPTX
Cyber crime
PDF
Cybercrime And Computer Misuse Cases
PPTX
What constitutes a cyber crime in the country
PPTX
Hacking a cause of cyber crime final
PPTX
Cyber Space
Cyber-crime PPT
[Exposicion] Computer and Internet Crime
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
computer crime
Types Of Computer Crime
Cyber Crime & Security
Cyber crime
Assignment of cyber crimes for oumh1203
Final Copy Cyber Crime Research Essay
Cyber crime lecture one definition and nature
Cyber crimes presentation
Cyber crimes and their prevention
2014-09-03 Cybersecurity and Computer Crimes
Computer Crimes
Power point cybercrime
Cyber crime
Cybercrime And Computer Misuse Cases
What constitutes a cyber crime in the country
Hacking a cause of cyber crime final
Cyber Space
Ad

Similar to Cybercrime 111205224958-phpapp02 (20)

PPTX
Cyber crime
PDF
Cyber crime-A burning issue of today's world
PDF
cybercrimeandtypes-19101817340 2.pdf
PPTX
Cyber crime and security 1
DOC
English in written
DOC
Cyber crime final report
PPTX
Introduction to cybercrime
PPTX
CYBER CRIME - A Threat To Internet Users
PPTX
introductiontocybercrimvvvvv63702-lva1-app6892.pptx
PPTX
Typology of Cyber Crime
PPTX
Module vi mis
PPSX
Unit 1
PPTX
Introduction to cybercrime
PPT
Cyber Crime
PPTX
PPT
Cyber crime & security final tapan
PPSX
Cyber Crimes - An Introduction
PDF
Cyber Crime
PPTX
Cyber Crime and Security Presentation
PPT
Cybercrime the emerging threat
Cyber crime
Cyber crime-A burning issue of today's world
cybercrimeandtypes-19101817340 2.pdf
Cyber crime and security 1
English in written
Cyber crime final report
Introduction to cybercrime
CYBER CRIME - A Threat To Internet Users
introductiontocybercrimvvvvv63702-lva1-app6892.pptx
Typology of Cyber Crime
Module vi mis
Unit 1
Introduction to cybercrime
Cyber Crime
Cyber crime & security final tapan
Cyber Crimes - An Introduction
Cyber Crime
Cyber Crime and Security Presentation
Cybercrime the emerging threat
Ad

Recently uploaded (20)

PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Sustainable Sites - Green Building Construction
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Geodesy 1.pptx...............................................
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Well-logging-methods_new................
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
Welding lecture in detail for understanding
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
DOCX
573137875-Attendance-Management-System-original
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Sustainable Sites - Green Building Construction
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Geodesy 1.pptx...............................................
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Lesson 3_Tessellation.pptx finite Mathematics
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Well-logging-methods_new................
CH1 Production IntroductoryConcepts.pptx
Structs to JSON How Go Powers REST APIs.pdf
OOP with Java - Java Introduction (Basics)
Arduino robotics embedded978-1-4302-3184-4.pdf
Internet of Things (IOT) - A guide to understanding
Welding lecture in detail for understanding
CYBER-CRIMES AND SECURITY A guide to understanding
Strings in CPP - Strings in C++ are sequences of characters used to store and...
573137875-Attendance-Management-System-original
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx

Cybercrime 111205224958-phpapp02

  • 2. In 1960s internet was developed for better communication and research.With advancement of technology and expansion of internet every area becomes easy to access but it also provides a pathway to commit crimes easily without any effort only sitting on a system. Some human minds of criminal nature use internet as a tool of crime which is now known as cyber crime committed in all countries first cyber crime reported in 1820
  • 3.  Crime is a social and economic phenomenon  “a legal wrong that can be followed by criminal proceedings which may result into punishment.” definition : Crime is an intentional act of commission or omission in contravention to the law of the land and accordingly punishable when proved in judicial proceeding
  • 4.  The term “cyber crime” was first coined by Barry Collins in 1980’s  “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”  A generalized definition of cyber crime may be “ unlawful acts wherein the computer is either a tool or target or both”
  • 5.  Capacity to store data in comparatively small space  Easy to access  Complex  Negligence  Loss of evidence  Money  Fun  ego
  • 6.  The cyber criminals constitute of various groups/ category.The following are the category of cyber criminals: • Children and adolescents between the age group of 6 – 18 years • Organised hackers • Professional hackers / crackers • Discontented employees
  • 7.  Conventional and new forms of crime  White collar crime  Organized crime  Victimless crime
  • 8.  Hacking  Theft of information  Packet sniffing  spyware  Data diddling  Virus / worm attacks  Logic bombs
  • 9.  Trojan attacks  Internet time thefts  Web jacking
  • 10. Packet Sniffers — Software programs that monitor’s network traffic. Attackers use packet sniffers to capture and analyze data transmitted via a network. Specialized sniffers capture passwords as they cross a network Spyware gathers information without the users’ knowledge. Spyware is typically bundled covertly with another program.The user does not know that installing one also installs the other. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else
  • 11. Virus program or piece of code that spreads from computer to computer without the users’ consent.They usually cause an unexpected and negative event when run by a computer.Viruses contaminate legitimate computer programs Wormsare wholly contained viruses that travel through networks, automatically duplicate themselves and send themselves to other computers whose addresses are in the host computer.
  • 12. Viruses are always embedded within another file or program.Worm : self-reproducing program which propagates via the network. Trojan horse: program which purports to do one thing, but secretly does something else; example: free screen saver installs with a backdoor
  • 13. Data diddling:This is altering raw data just before a computer processes it and then changing it back after the processing is completed. Denial of Service attack:The computer is flooded with more requests than it can handle which cause it to crash. Distributed Denial of Service (DDOS) attack is a example.
  • 14. Web jacking:This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the web site of another. Email bombing: It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing.
  • 15. HackingIntrusion into computer system without the permission of the computer owner/user.
  • 16. . IdentityTheft • A form of fraud in which a person pretends to be someone else by assuming the other person’s identity • Undertaken to access resources or obtain credit and other benefits in the victim’s name . E-mail spoofing• A technique used by hackers to send mails in which sender’s address and other parts of the email are altered. •This method is used to disguise the actual email address from which phishing and spam messages are sent • Motive: to trick users into providing personal and confidential information
  • 17. SQL injection The ability to inject SQL commands into the database engine through an existing application
  • 18. Internal Computer crimes Virus worms Trojan horses Tele communication crimes Phone breaking Phone tapping Hacking Computer Manipulation Crimes Embezzlements Frauds Support of Criminal Enterprises Data bases to support drug Distribution Data bases to keep records of client transaction Money laundering Hardware and software Theft Software piracy Theft of computer and microchips Theft of trade secrets
  • 19. Classification of cyber crime 1. Against Individuals a. their person & b. their property of an individual 2. Against Organization a. Government c. Firm, Company, Group of Individuals 3. Against Society at large
  • 20.  Harassment via e-mails.  Cyber-stalking.  Dissemination of obscene material.  Defamation.  Unauthorized control/access over computers  Indecent exposure  Email spoofing  Cheating & Fraud
  • 21.  Computer vandalism.  Transmitting virus.  Net trespass  Unauthorized control/access over computers  Intellectual Property crimes  Internet time thefts
  • 22.  Cyber terrorism against the government organization.  Distribution of pirated software etc.
  • 24.  Cyber terrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.
  • 25. LTTE AUM Perpetrator Group/Individual Group/Individual Place Sri Lanka/London/Australia Japan/US/Worldwide Worldwide Tool Threats/Violence/Recruitm ent/Education/Strategies Violence/Recruitment/ Education/Strategies Target Government Officials/Recruits Governments Motivation Social/PoliticalChange World Domination
  • 26.  DETERRENCE  CRIMINAL JUSTICE  ENHANCED DEFENSE  NEGOTIATIONS
  • 27.  Pornography (basically child pornography)  Polluting the youth through indecent exposure  Trafficking  Financial crimes  Sale of illegal articles  Online gambling  Forgery
  • 29. Section 43 deals with the unauthorised access, unauthorised downloading, virus attacks or any contaminant, causes damage, disruption, denial of access, interference with the service availed by a person Section 65 deals with ‘tampering with computer source documents’ and provides for imprisonment up to 3 years or fine Section 66 deals with ‘hacking with computer system’ and provides for imprisonment up to 3 years or fine section 67 deals with publication of obscene material and provides for imprisonment up to a term of 10 years
  • 30. .Use antivirus software’s .Insert firewalls .uninstall unnecessary software .maintain backup .check security settings .Stay anonymous – .choose a genderless screen name .Never give your full name or address to strangers..
  • 31.  To prevent cyber stalking avoid disclosing any information pertaining to oneself.This is as good as disclosing your identity to strangers in public place.  Always avoid sending any photograph online particularly to strangers and chat friends as there have been incidents of misuse of the photographs.  Always use latest and up date anti virus software to guard against virus attacks.  Always keep back up volumes so that one may not suffer data loss in case of virus contamination  Never send your credit card number to any site that is not secured, to guard against frauds.
  • 32.  Always keep a watch on the sites that your children are accessing to prevent any kind of harassment or depravation in children.  Web site owners should watch traffic and check any irregularity on the site. Putting host-based intrusion detection devices on servers may do this  Web servers running public sites must be physically separate protected from internal corporate network.
  • 33.  History is the witness that no legislation has succeeded in totally eliminating crime from the globe.  The only possible step is to make people aware of their rights and duties (to report crime as a collective duty towards the society) and further making the application of the laws more stringent to check crime.  Undoubtedly the IT Act is a historical step in the cyber world. Further I all together do not deny that there is a need to bring changes in the InformationTechnology Act to make it more effective to combat cyber crime.