SlideShare a Scribd company logo
Cyber Security
Module 1
1.1 INTRODUCTION
The internet in India is growing rapidly. It has given rise to
new opportunities in every field we can think of be it
entertainment, business, sports or education.
There’re two sides to a coin. Internet also has it’s own
disadvantages is Cyber crime- illegal activity committed on
the internet.
1.2 DEFINING CYBER CRIME
 Crime committed using a computer and the
internet to steal data or information.
 Illegal imports.
 Malicious programs.
Cybercrime
 Cybercrime is not a new phenomena
 The first recorded cybercrime took place in the year
1820.
 In 1820, JosephMarie Jacquard, a textile manufacturer in
France, produced the loom. This device allowed the
repetition of a series of steps in the weaving of special
fabrics. This resulted in a fear amongst Jacquard's
employees that their traditional employment and
livelihood were being threatened. They committed acts of
sabotage to discourage Jacquard from further use of the
new echnology. This is the first recorded cyber crime!
Alternative definitions for cybercrime
 Any illegal act where a special knowledge of computer
technology is essential for its perpetration, investigation
or prosecution
 Any traditional crime that has acquired a new dimension
or order of magnitude through the aid of a computer,
and abuses that have come into being because of
computers
 Any financial dishonesty that takes place in a computer
environment.
 Any threats to the computer itself, such as theft of
hardware or software, sabotage and demands for
ransom
Another definition
 “Cybercrime (computer crime) is any illegal
behavior, directed by means of electronic
operations, that target the security of computer
systems and the data processed by them”.
 Hence cybercrime can sometimes be called as
computer-related crime, computer crime, E-crime,
Internet crime, High-tech crime….
Cybercrime specifically
can be defined
in number of ways…
 A crime committed using a computer and the
internet to steal a person’s identity(identity theft)
or sell contraband or stalk victims or disrupt
operations with malevolent programs.
 Crimes completed either on or with a computer
 Any illegal activity through the Internet or on the
computer.
 All criminal activities done using the medium of
computers, the Internet, cyberspace and the
WWW.
further
 Cybercrime refers to the act of performing a criminal act using
cyberspace as communication vehicle.
 Two types of attacks are common:
 Techno- crime : Active attack
 Techno Crime is usually pre-meditated and results in the
deletion, corruption, alteration, theft or copying of data on an
organization's systems.
 Techno – vandalism: Passive attack
 Techno Vandalism is a term used to describe a hacker or
cracker who breaks into a computer system with the sole
intent of defacing and or destroying its contents.
unit 1. introduction to cyber   crime.ppt
1.3 Cybercrime and information security
 Lack of information security give rise to
cybercrime
 Cybersecurity: means protecting information,
equipment, devices, computer, computer
resource, communication device and
information stored therein from unauthorized
access, use, disclosure, disruption, modification
or destruction.
Challenges for securing data in business
perspective
 Cybercrime occupy an important space in
information security due to their impact.
 Most organizations do not incorporate the cost of
the vast majority of computer security incidents into
their accounting
 The difficulty in attaching a quantifiable monetary
value to the corporate data and yet corporate data
get stolen/lost
 Financial loses may not be detected by the
victimized organization in case of Insider attacks :
such as leaking customer data
Cybercrime trends over years
1.4 Who are Cybercriminals?
 Are those who conduct acts such as:
 Child pornography
 Credit card fraud
 Cyberstalking
 Defaming another online
 Gaining unauthorized access to computer systems
 Ignoring copyrights
 Software licensing and trademark protection
 Overriding encryption to make illegal copies
 Software piracy
 Stealing another’s identity to perform criminal
acts
Categorization of Cybercriminals
 Type 1: Cybercriminals- hungry for recognition
 Hobby hackers
 A person who enjoys exploring the limits of what is
possible, in a spirit of playful cleverness. May
modify hardware/ software
 IT professional(social engineering):
 Ethical hacker
 Politically motivated hackers :
 promotes the objectives of individuals, groups or nations
supporting a variety of causes such as : Anti globalization,
transnational conflicts and protest
 Terrorist organizations
 Cyberterrorism
 Use the internet attacks in terrorist activity
 Large scale disruption of computer networks ,
personal computers attached to internet via viruses
Type 2: Cybercriminals- not interested in recognition
 Psychological perverts
 Express sexual desires, deviates from normal behavior
 Financially motivated hackers
 Make money from cyber attacks
 Bots-for-hire : fraud through phishing, information theft, spam
and extortion
 State-sponsored hacking
 Hacktivists
 Extremely professional groups working for governments
 Have ability to worm into the networks of the media, major
corporations, defense departments
Type 3: Cybercriminals- the insiders
 Disgruntled or former employees seeking
revenge
 Competing companies using employees to
gain economic advantage through damage
and/ or theft.
Motives behind cybercrime
 Greed
 Desire to gain power
 Publicity
 Desire for revenge
 A sense of adventure
 Looking for thrill to access forbidden
information
 Destructive mindset
 Desire to sell network security services
1.5 Classification of cybercrimes
1. Cybercrime against an individual
2. Cybercrime against property
3. Cybercrime against organization
4. Cybercrime against Society
5. Crimes emanating from Usenet
newsgroup
1. Cybercrime against an individual
 Electronic mail spoofing and other online frauds
 Phishing, spear phishing
 spamming
 Cyberdefamation
 Cyberstalking and harassment
 Computer sabotage
 Pornographic offenses
 passwordsniffing
2.Cybercrime against property
 Credit card frauds
 Intellectual property( IP) crimes (stealing
patents, copyrights, trade marks, trade secrets,
logo etc..)
 Internet time theft (Hacking the username and
password of an individual and surfing the internet
at his cost is Internet Time Theft)
3.Cybercrime against organization
 Unauthorized accessing of computer
 Password sniffing
 Denial-of-service attacks (It is a cyber attack in which the network is
chocked and often collapsed by flooding it with useless traffic and
thus preventing the legitimate network traffic.)
 Virus attack/dissemination of viruses
 E-Mail bombing/mail bombs
 Salami attack/ Salami technique (attackers or a hacker typically used
to commit financial crimes)
 Logic bomb
 Trojan Horse
 Data diddling
 Industrial spying/ industrial espionage
 Computer network intrusions
 Software piracy
4.Cybercrime against Society
 Forgery
 Cyberterrorism
 Web jacking (Illegally seeking control
of a website by taking over a domain)
5.Crimes emanating from Usenet newsgroup
 Usenet groups may carry very offensive,
harmful, inaccurate material
 Postings that have been mislabeled or are
deceptive in another way
 Hence service at your own risk
History of Usenet groups
 In 1979 it was developed by two graduate
students from Duke University in North Carolina
(UNC) as a network that allowed users to
exchange quantities of information too large for
mailboxes
 Usenet was designed to facilitate textual
exchanges between scholars.
 Slowly, the network structure adapted to allow
the exchange of larger files such as videos or
images.
E-Mail Spoofing
 Email spoofing is a type of cyber attack that targets
businesses by using emails with forged sender
addresses
 Because the recipient trusts the alleged sender, they
are more likely to open the email and interact with its
contents, such as a malicious link or attachment.
 E-mail spoofing is the forgery of an e-mail header so
that the message appears to have originated from
someone or somewhere other than the actual source.
 To send spoofed e-mail, senders insert commands in
headers that will alter message information.
 It is possible to send a message that appears to be
from anyone, anywhere, saying whatever the sender
wants it to say.
E-Mail Spoofing
 Thus, someone could send spoofed e-mail that
appears to be from you with a message that you
didn't write.
 Although most spoofed e-mail falls into the
"nuisance" category and requires little action other
than deletion, the more malicious varieties can cause
serious problems and security risks.
 For example, spoofed e-mail may believably to be
from someone in a position of authority, asking for
sensitive data, such as passwords, credit card
numbers, or other personal information -- any of
which can be used for a variety of criminal purposes.
Spamming
 People who create electronic spam : spammers
 Spam is abuse of electronic messaging systems (email/
advertisements) to send unsolicited bulk messages
indiscriminately
 Spamming may be
 E-Mail Spam
 Instant messaging spam
 Usenet group spam
 Web search engine spam
 Spam in blogs, wiki spam
 Online classified ads spam
 Mobile phone messaging spam
 Internet forum spam
 Junk fax spam
 Social networking spam
……..
Spamming
 Spamming is difficult to control
 Advertisers have no operating costs beyond the
management of their mailing lists
 It is difficult to hold senders accountable for
their mass mailings
 Spammers are numerous
Search engine spamming
 Alteration or creation of a document with the
intent to deceive an electronic catalog or a filing
system
 some web authors use “subversive techniques”
to ensure that their site appears more frequently
or higher number in returned search results.
 subversive techniques -- Establishing front
groups and penetrating and manipulating
existing political parties.
 remedy: permanently exclude from the search
index
Avoid the following web publishing
techniques:
 Repeating keywords
 Use of keywords that do not relate to the content on the site
 Use of fast meta refresh
 change to the new page in few seconds.
 Redirection
 IP cloaking:
 including related links, information, and terms.
 Use of colored text on the same color background
 Tiny text usage
 Duplication of pages with different URLs
 Hidden links
Cyber defamation
Cyber defamation
 The tort of cyber defamation is considered to be
the act of defaming, insulting, offending or
otherwise causing harm through false statements
pertaining to an individual in cyberspace.
 Example: someone publishes
defamatory matter about
someone on a website or sends
an E-mail containing
defamatory information
to all friends of that person.
It may amount to defamation when-
 If imputation (accusation) to a deceased person
would harm the reputation of that person, and is
intended to be hurtful to the feelings of his family or
other near relatives
 An imputation is made concerning a company or an
association or collection of people as such.
 An imputation that directly or indirectly, in the
estimation of others, lowers the moral or
intellectual character of that person, or lowers the
character of that person in respect of his caste or of
his calling, or lowers the credit of that person.
Types of defamation
 Libel : written defamation
 Slander: oral defamation
 The plaintiff must have to show that the
defamatory statements were unlawful and
would indeed injure the person’s or
organization’s reputation.
 When failed to prove, the person who made the
allegations may still be held responsible for
defamation.
Cyber defamation cases
 cyber defamation in India (14 dec 2009),
 the employee of a corporate defamed its reputation and was
sending derogatory and defamatory emails against the company
and its managing directory
 In this case the Court( delhi court) had restrained the defendant
from sending derogatory, defamatory, obscene, vulgar, humiliating
and abusive emails.
 The court passed as important ex-parte injunction.
 In another case, accused posted obscene, defamatory and annoying
message about a divorcee woman and also sent emails to the victim.
 The offender was traced and was held guilty of offences under section 469,
509 IPC and 67 of IT Act, 2000.
 Other defamation cases:
 A malicious customer review by a competitor could destroy a small
business.
 A false accusation of adultery on a social networking site could destroy a
marriage.
 An allegation that someone is a “crook” could be read by a potential
employer or business partner
Internet Time Theft
 Occurs when an unauthorized person uses
the Internet hours paid for by another person
 Comes under hacking
 The person get access to someone else’s user ID and
password, either by hacking or by gaining access to it
by illegal means
 And uses the internet without the other person’s
knowledge
 This theft can be identified when Internet time is
recharged often, despite infrequent usage.
 This comes under “identity theft”
Salami attack/ salami technique
 Are used for committing financial crimes.
 Example: a bank employee inserts a program,
into the bank’s serve, that deduces a small
amount from the account of every customer
every month,
 The unauthorized debit goes unnoticed by the
customers, but the employee will make a sizable
amount every month.
Salami attack: real life examples
 Small
“shavings” for
Big gains!
 The petrol
pump fraud
Data diddling
 Data diddling involves changing data input in a
computer.
 In other words, information is changed from the
way it should be entered by a person typing in the
data.
 For example, a person entering accounting may
change data to show their account, or that or a friend
or family member, is paid in full. By changing or
failing to enter the information, they are able to steal
from the company.
 To deal with this type of crime, a company
must implement policies and internal
controls.
 This may include performing regular audits,
using software with built-in features to
combat such problems, and supervising
employees.
Real life example:
 Electricity board in India have been victims to
data diddling programs inserted when private
parties computerized their systems.
Forgery
 The act of forging something, especially the
unlawful act of counterfeiting a document or
object for the purposes of fraud or deception.
 Something that has been forged, especially a
document that has been copied or remade to
look like the original.
 Example: Counterfeit currency notes, postage,
revenue stamps, mark sheets, etc., can be forged
using sophisticated computers, printers and
scanners.
Real life case:
 Stamp Paper Scam – a racket that flourished on loopholes in the
system
 Abdul Karim Telgi, the mastermind of the multi-crore counterfeiting,
printed fake stamp papers worth thousands of crores of rupees using
printing machines purchased illegally with the help of some
conniving officials of the Central Govt.’s Security Printing Press
(India Security Press) located in Nasik.
 These fake stamp papers penetrated in more than 12 states through a
widespread network of vendors who sold the counterfeits without
any fear and earned hefty commissions.
 Amount swindled Rs. 172 crores
 Telgi is in jail serving his 13 plus 10 years term
Web jacking
 This term is derived from the term hi jacking.
 In these kinds of offences the hacker gains access and
control over the web site of another.
 He may even change the information on the site.
 The first stage of this crime involves “password sniffing”.
 The actual owner of the website does not have any more
control over what appears on that website
 This may be done for fulfilling political objectives or for
money
Real life examples
 recently the site of MIT (Ministry of Information
Technology) was hacked by the Pakistani hackers
and some obscene matter was placed therein.
 the site of Bombay crime branch was also web
jacked.
Industrial spying/ Industrial Espionage
 Industrial espionage is the covert/secret and
sometimes illegal practice of investigating
competitors to gain a business advantage.
 The target of investigation might be a trade
secret such as a proprietary product specification
or formula, or information about business plans.
 In many cases, industrial spies are simply
seeking any data that their organization can
exploit to its advantage.
Real life case
 A Chinese Trojan horse email campaign targeted some 140 senior
Israeli defense corporation employees (2013) involved in highly
classified, sensitive security projects.
 The email was made to appear as if it came from a known German
company that regularly works with the Israeli defense industry.
 However, it turned out to contain a Trojan horse, which, according
to the report, attempted to funnel information from the recipients'
computers.
 The Trojan horse was noticed by computer defense systems and
shut down.
 The defense establishment then realized how many Israelis
received the email, and reportedly tracked the malicious program
down to Chinese defense industries.
Hacking
Every act committed toward breaking into a
computer and/ or network is hacking.
Purpose
 Greed
 Power
 Publicity
 Revenge
 Adventure
 Desire to access forbidden information
 Destructive mindset
History of hacking
 hacking is any technical effort to manipulate the normal
behavior of network connections and connected systems.
 The term "hacking" historically referred to constructive, clever
technical work that was not necessarily related to computer
systems.
 M.I.T.(ministry of information technology) engineers in the
1950s and 1960s first popularized the term and concept of
hacking.
 the so-called "hacks" perpetrated by these hackers were
intended to be harmless technical experiments and fun
learning activities.
 Later, outside of M.I.T., others began applying the term to less
honorable pursuits. for example, several hackers in the U.S.
experimented with methods to modify telephones for making
free long-distance calls over the phone network illegally.
 As computer networking and the Internet exploded in
popularity, data networks became by far the most common
Hacking vs. Cracking
 Malicious attacks on computer networks are
officially known as cracking ,
 Most non-technical people fail to make this
distinction, however.
 Outside of academia, its extremely common to
see the term "hack" misused and be applied to
cracks as well.
There are 3 types of modern hackers
 Black Hats: Criminal Hackers.
 Possess desire to destruction
 Hack for personal monetary gains : Stealing credit
card information, transferring money from
various bank accounts to their own account, extort
money from corporate giant by threatening.
 White Hats: Ethical Hackers.
 Network Security Specialist.
 Grey Hats: Deals in both of the above (jack of all
trades, master of none).
Real life case:dec 2009
NASA site hacked via SQL Injection
 Two NASA sites recently were hacked by an individual wanting to
demonstrate that the sites are susceptible to SQL injection.
 The websites for NASA's Instrument Systems and Technology Division
and Software Engineering Division were accessed by a researcher,
who posted to his blog screen shots taken during the hack.
 The researcher, using the alias "c0de.breaker," used SQL injection to
hijack the sites.
 SQL injection is an attack process where a hacker adds additional SQL
code commands to a page request and the web server then tries to
execute those commands within the backend database
 The NASA hack yielded the credentials of some 25 administrator
accounts.
 The researcher also gained access to a web portal used for managing
and editing those websites.
 In this particular case, the researcher found the vulnerabilities, made
NASA aware of them, then published findings after the websites had
been fixed.
 An attacker, however, could have tried to use that web server as an
Nadya Suleman’s Website Hacked,
feb 2009
The story..
 LOS ANGELES, CA – Octuplet mom Nadya Suleman
launched a website to solicit donations for her family, but it
was immediately hacked by a group of vigilante mothers!
 The website originally featured photos of all eight octuplets,
a thank you note from Suleman, images of children’s toys
and a large donation button for viewers to send money
through. Suleman also provided an address where people
can send items such as diapers and formula.
 Suleman was perhaps not prepared for the backlash she
was to receive, as the site was hacked and brought down
within hours. The original homepage was left up but
defaced, as seen in the screenshot.
 The site was tagged by the famous hacker group MOD,
also known as the Mothers of Disappointment. The
mysterious group has a history of attacking personal
sites they disapprove of, including Britney Spears
 Weekly World News could not reach any members for
comment, however reporters did receive a short note
from an anonymous e-mail address:
 mod will not tolerate the selfish acts of bad parenting
we will remain true to our mission despite any setbacks
viva la maternity
(call your mother, she misses you)
 The site has since been restored, and Suleman’s PR
representative has stated they are now taking extra
security measures to arm against future attacks.
Online frauds
 Fraud that is committed using the internet is “online fraud.”
Online fraud can involve financial fraud and identity theft.
 Online fraud comes in many forms.
 viruses that attack computers with the goal of retrieving personal
information, to email schemes that lure victims into wiring money
to fraudulent sources,
 “phishing” emails that purport to be from official entities (such as
banks or the Internal Revenue Service) that solicit personal
information from victims to be used to commit identity theft,
 to fraud on online auction sites (such as Ebay) where perpetrators
sell fictional goods.
 E-Mail spoofing to make the user to enter the personal information :
financial fraud
 Illegal intrusion: log-in to a computer illegally by having previously
obtained actual password. Creates a new identity fooling the
computer that the hacker is the genuine operator. Hacker commits
innumerable number of frauds.
E-mail bombing/mail bombs
 In Internet usage, an email bomb is a form of net
abuse consisting of sending huge volumes of
email to an address in an attempt to overflow the
mailbox or overwhelm the server where the
email address is hosted in a denial-of-service
attack.
 Construct a computer to repeatedly send E-mail
to a specified person’s E-mail address.
 Can overwhelm the recipient’s personal account
and potentially shut down the entire system.
Computer network intrusions
 An intrusion to computer network from any where
in the world and steal data, plant viruses, create
backdoors, insert trojan horse or change
passwords and user names.
 An intrusion detection system (IDS) inspects all
inbound and outbound network activity and
identifies suspicious patterns that may indicate a
network or system attack from someone
attempting to break into or compromise a system.
 The practice of strong password
Password sniffing
 Password sniffers are programs that monitor and
record the name and password of network users
as they login, jeopardizing security at a site.
 through sniffers installed, anyone can
impersonate an authorized user and login to
access restricted documents.
Credit card frauds
 Credit card fraud is a wide-ranging term for
theft and fraud committed using or involving a
payment card, such as a credit card or debit card,
as a fraudulent source of funds in a transaction.
 The purpose may be to obtain goods without
paying, or to obtain unauthorized funds from an
account.
 Credit card fraud is also an adjunct to
identity theft.
Identity theft
 Identity theft is a fraud involving another person’s identity
for an illicit purpose.
 The criminal uses someone else’s identity for his/ her own
illegal purposes.
 Phishing and identity theft are related offenses
 Examples:
 Fraudulently obtaining credit
 Stealing money from victim’s bank account
 Using victim’s credit card number
 Establishing accounts with utility companies
 Renting an apartment
 Filing bankruptcy using the victim’s name
Real life cases
 Dr. Gerald Barnes
Gerald Barnbaum lost his pharmacist license after
committing Medicaid fraud. He stole the identity of Dr.
Gerald Barnes and practiced medicine under his name. A
type 1 diabetic died under his care. “Dr. Barnes” even
worked as a staff physician for a center that gave exams
to FBI agents. He’s currently serving hard time.
 Andrea Harris-Frazier
Margot Somerville lost her wallet on a trolley. Two years
later she was arrested. Andrea Harris-Frazier had
defrauded several banks—using Somerville’s identity—
out of tens of thousands of dollars. The real crook was
caught.
 Abraham Abdallah
A busboy named Abraham Abdallah got into the bank
accounts of Steven Spielberg and other famous people
after tricking his victims via computer, getting sufficient
Cybercrimes: An Indian Perspective
 India has the fourth highest number of internet
users in the world.
 45 million internet users in India
 37% - in cybercafes
 57% are between 18 and 35 years
 The Information Technology (IT) Act, 2000,
specifies the acts which are punishable. Since the
primary objective of this Act is to create an
enabling environment for commercial use of I.T.
Cybercrimes: An Indian Perspective
 217 cases were registered under IT Act during
the year 2007 as compared to 142 cases during
the previous year (2006)
 Thereby reporting an increase of 52.8% in 2007
over 2006.
 22.3% cases (49out of 217 cases) were reported
from Maharashtra followed by Karnataka (40),
Kerala (38) and Andhra Pradesh and Rajasthan
(16 each).
Cybercrimes: An Indian Perspective
Incidence of Cyber Crimes in
Cities
 17 out of 35 mega cities did not report any case of Cyber Crime i.e,
neither under the IT Act nor under IPC Sections) during the year 2007.
 17 mega cities have reported 118 cases under IT Act and 7 megacities
reported 180 cases under various section of IPC.
 There was an increase of 32.6% (from 89 cases in 2006 to 118 cases in
2007) in cases under IT Act as compared to previous year (2006),
 and an increase of 26.8% (from 142 cases in 2006 to 180 cases in
2007) of cases registered under various section of IPC
 Bengaluru (40), Pune (14) and Delhi (10) cities have reported high
incidence of cases (64 out of 118 cases) registered under IT Act,
accounting for more than half of the cases (54.2%) reported under the
Act.
Cybercrime and the Indian ITA 2000
• In India , the Information Technology Act, ITA 2000 was brought
into practice after the United General Assembly Resolution
A/RES/51/162 in Jan 30, 1997 by adopting the Model Law on
Electronic Commerce adopted by the United Nations Commission
on International Trade Law
• This Model Law on Electronic Commerce was the first step
toward the law relating to E-commerce at international level to
regulate an alternative form of commerce and give legal status in
the area of E-commerce
Cybercrime and the Indian ITA 2000…
• It was enacted taking into consideration UNICITRAL
model of Law on Electronic commerce (1996)
• Cybercrimes in India are punishable under 2 categories:
the ITA 2000 and the Indian Panel Code (IPC)
• A total of 207 cases of cyber crime new registered
under the IT Act in 2007 compared to 142 cases
registered in 2006
• Under the IPC too, 339 cases were recorded in 2007 to
311 cases in 2006

More Related Content

PPT
computer Networks Error Detection and Correction.ppt
PDF
Detecting Phishing using Machine Learning
PPTX
PPTX
Digital signature(Cryptography)
PPT
IPSec Overview
computer Networks Error Detection and Correction.ppt
Detecting Phishing using Machine Learning
Digital signature(Cryptography)
IPSec Overview

What's hot (20)

PPTX
Arp and rarp
PDF
Introduction to foot printing
PPTX
OAuth2 + API Security
PPT
Transport layer security.ppt
PDF
Hacking SIP Like a Boss!
PDF
IPsec Basics: AH and ESP Explained
DOCX
What is AES? Advanced Encryption Standards
PPTX
IPSec and VPN
PPTX
Secure Socket Layer (SSL)
PPT
Internet control message protocol
PDF
Transport layer services
PPTX
PPTX
Introduction to Intrusion detection and prevention system for network
PPTX
Presentation on arp protocol
PDF
Computer Security and Intrusion Detection(IDS/IPS)
PPTX
Wireless security
PDF
Cyber Forensics Module 2
PPTX
Cryptography
PDF
Mini Project on Data Encryption & Decryption in JAVA
PDF
IP Security
Arp and rarp
Introduction to foot printing
OAuth2 + API Security
Transport layer security.ppt
Hacking SIP Like a Boss!
IPsec Basics: AH and ESP Explained
What is AES? Advanced Encryption Standards
IPSec and VPN
Secure Socket Layer (SSL)
Internet control message protocol
Transport layer services
Introduction to Intrusion detection and prevention system for network
Presentation on arp protocol
Computer Security and Intrusion Detection(IDS/IPS)
Wireless security
Cyber Forensics Module 2
Cryptography
Mini Project on Data Encryption & Decryption in JAVA
IP Security
Ad

Similar to unit 1. introduction to cyber crime.ppt (20)

PPTX
First Lecture- Cyber Security-Bangladesh.pptx
PPTX
PPTX
Introduction to cybercrime
PPTX
lecture notes Cyber-Crime and software Ergonomic
PPT
Cyber Crime.ppt
PPTX
Cyber Secuirty Fully explained Lecture Notes
PPTX
cybersecurity subject chapter 1 lec 1-5.pptx
PDF
Cyber Law & Forensics
PPTX
Cyber crime
PPSX
Cyber crime and cyber security
PPTX
Cyber crime and security 1
PPTX
introductiontocybercrimvvvvv63702-lva1-app6892.pptx
PPTX
Computer crime
PDF
cybersecurityawareness-presentation-170627121043.pdf
PPSX
Cyber security awareness presentation
PPT
Module 1 cyber security and foundation of security
PPTX
CYBER CRIME sujal education it related ppt. Pptx
PDF
Cyber Crime
PDF
Cyber Security U-1 ONE SHOT (NEW) Notes_c7ff765d-5cc7-4213-b668-842b59eb9ee5.pdf
PPTX
Introduction to cybercrime
First Lecture- Cyber Security-Bangladesh.pptx
Introduction to cybercrime
lecture notes Cyber-Crime and software Ergonomic
Cyber Crime.ppt
Cyber Secuirty Fully explained Lecture Notes
cybersecurity subject chapter 1 lec 1-5.pptx
Cyber Law & Forensics
Cyber crime
Cyber crime and cyber security
Cyber crime and security 1
introductiontocybercrimvvvvv63702-lva1-app6892.pptx
Computer crime
cybersecurityawareness-presentation-170627121043.pdf
Cyber security awareness presentation
Module 1 cyber security and foundation of security
CYBER CRIME sujal education it related ppt. Pptx
Cyber Crime
Cyber Security U-1 ONE SHOT (NEW) Notes_c7ff765d-5cc7-4213-b668-842b59eb9ee5.pdf
Introduction to cybercrime
Ad

More from Dimple Relekar (14)

PPT
cmos Unit 4_ 2024.ppt
PPTX
wireless and mobile communicationunit3 part 2.pptx
PPTX
unit 3 constant envelope modulation part 2.pptx
PPTX
bfsk binary frequency shift keying pp.pptx
PPTX
wc Wireless communication 7th semester .pptx
PPTX
Module -2 VTU Biology for Engineers.pptx
PPTX
unit 5 understanding computer forensics.pptx
PPT
unit 2. cyber offences_how criminals plan them.ppt
PPTX
chap3cellularconcepts-131217025114-phpapp01.pptx
PPTX
FWC- 21.pptx
PPTX
analog cmos vlsi unit 5 ch 2 presentation
PPT
Analog cmos vlsi design Unit 3 2023-24.ppt
PPT
cmos Unit passive and active current mirrors 3 2023-24.ppt
PPT
Unit1 ch-01.ppt
cmos Unit 4_ 2024.ppt
wireless and mobile communicationunit3 part 2.pptx
unit 3 constant envelope modulation part 2.pptx
bfsk binary frequency shift keying pp.pptx
wc Wireless communication 7th semester .pptx
Module -2 VTU Biology for Engineers.pptx
unit 5 understanding computer forensics.pptx
unit 2. cyber offences_how criminals plan them.ppt
chap3cellularconcepts-131217025114-phpapp01.pptx
FWC- 21.pptx
analog cmos vlsi unit 5 ch 2 presentation
Analog cmos vlsi design Unit 3 2023-24.ppt
cmos Unit passive and active current mirrors 3 2023-24.ppt
Unit1 ch-01.ppt

Recently uploaded (20)

PPTX
UNIT 4 Total Quality Management .pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Digital Logic Computer Design lecture notes
DOCX
573137875-Attendance-Management-System-original
PDF
Well-logging-methods_new................
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Geodesy 1.pptx...............................................
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Lecture Notes Electrical Wiring System Components
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
UNIT 4 Total Quality Management .pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
CH1 Production IntroductoryConcepts.pptx
Digital Logic Computer Design lecture notes
573137875-Attendance-Management-System-original
Well-logging-methods_new................
Model Code of Practice - Construction Work - 21102022 .pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Geodesy 1.pptx...............................................
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Lesson 3_Tessellation.pptx finite Mathematics
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
OOP with Java - Java Introduction (Basics)
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Lecture Notes Electrical Wiring System Components
Operating System & Kernel Study Guide-1 - converted.pdf
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx

unit 1. introduction to cyber crime.ppt

  • 2. 1.1 INTRODUCTION The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of be it entertainment, business, sports or education. There’re two sides to a coin. Internet also has it’s own disadvantages is Cyber crime- illegal activity committed on the internet.
  • 3. 1.2 DEFINING CYBER CRIME  Crime committed using a computer and the internet to steal data or information.  Illegal imports.  Malicious programs.
  • 4. Cybercrime  Cybercrime is not a new phenomena  The first recorded cybercrime took place in the year 1820.  In 1820, JosephMarie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new echnology. This is the first recorded cyber crime!
  • 5. Alternative definitions for cybercrime  Any illegal act where a special knowledge of computer technology is essential for its perpetration, investigation or prosecution  Any traditional crime that has acquired a new dimension or order of magnitude through the aid of a computer, and abuses that have come into being because of computers  Any financial dishonesty that takes place in a computer environment.  Any threats to the computer itself, such as theft of hardware or software, sabotage and demands for ransom
  • 6. Another definition  “Cybercrime (computer crime) is any illegal behavior, directed by means of electronic operations, that target the security of computer systems and the data processed by them”.  Hence cybercrime can sometimes be called as computer-related crime, computer crime, E-crime, Internet crime, High-tech crime….
  • 7. Cybercrime specifically can be defined in number of ways…  A crime committed using a computer and the internet to steal a person’s identity(identity theft) or sell contraband or stalk victims or disrupt operations with malevolent programs.  Crimes completed either on or with a computer  Any illegal activity through the Internet or on the computer.  All criminal activities done using the medium of computers, the Internet, cyberspace and the WWW.
  • 8. further  Cybercrime refers to the act of performing a criminal act using cyberspace as communication vehicle.  Two types of attacks are common:  Techno- crime : Active attack  Techno Crime is usually pre-meditated and results in the deletion, corruption, alteration, theft or copying of data on an organization's systems.  Techno – vandalism: Passive attack  Techno Vandalism is a term used to describe a hacker or cracker who breaks into a computer system with the sole intent of defacing and or destroying its contents.
  • 10. 1.3 Cybercrime and information security  Lack of information security give rise to cybercrime  Cybersecurity: means protecting information, equipment, devices, computer, computer resource, communication device and information stored therein from unauthorized access, use, disclosure, disruption, modification or destruction.
  • 11. Challenges for securing data in business perspective  Cybercrime occupy an important space in information security due to their impact.  Most organizations do not incorporate the cost of the vast majority of computer security incidents into their accounting  The difficulty in attaching a quantifiable monetary value to the corporate data and yet corporate data get stolen/lost  Financial loses may not be detected by the victimized organization in case of Insider attacks : such as leaking customer data
  • 13. 1.4 Who are Cybercriminals?  Are those who conduct acts such as:  Child pornography  Credit card fraud  Cyberstalking  Defaming another online  Gaining unauthorized access to computer systems  Ignoring copyrights  Software licensing and trademark protection  Overriding encryption to make illegal copies  Software piracy  Stealing another’s identity to perform criminal acts
  • 14. Categorization of Cybercriminals  Type 1: Cybercriminals- hungry for recognition  Hobby hackers  A person who enjoys exploring the limits of what is possible, in a spirit of playful cleverness. May modify hardware/ software  IT professional(social engineering):  Ethical hacker  Politically motivated hackers :  promotes the objectives of individuals, groups or nations supporting a variety of causes such as : Anti globalization, transnational conflicts and protest  Terrorist organizations  Cyberterrorism  Use the internet attacks in terrorist activity  Large scale disruption of computer networks , personal computers attached to internet via viruses
  • 15. Type 2: Cybercriminals- not interested in recognition  Psychological perverts  Express sexual desires, deviates from normal behavior  Financially motivated hackers  Make money from cyber attacks  Bots-for-hire : fraud through phishing, information theft, spam and extortion  State-sponsored hacking  Hacktivists  Extremely professional groups working for governments  Have ability to worm into the networks of the media, major corporations, defense departments
  • 16. Type 3: Cybercriminals- the insiders  Disgruntled or former employees seeking revenge  Competing companies using employees to gain economic advantage through damage and/ or theft.
  • 17. Motives behind cybercrime  Greed  Desire to gain power  Publicity  Desire for revenge  A sense of adventure  Looking for thrill to access forbidden information  Destructive mindset  Desire to sell network security services
  • 18. 1.5 Classification of cybercrimes 1. Cybercrime against an individual 2. Cybercrime against property 3. Cybercrime against organization 4. Cybercrime against Society 5. Crimes emanating from Usenet newsgroup
  • 19. 1. Cybercrime against an individual  Electronic mail spoofing and other online frauds  Phishing, spear phishing  spamming  Cyberdefamation  Cyberstalking and harassment  Computer sabotage  Pornographic offenses  passwordsniffing
  • 20. 2.Cybercrime against property  Credit card frauds  Intellectual property( IP) crimes (stealing patents, copyrights, trade marks, trade secrets, logo etc..)  Internet time theft (Hacking the username and password of an individual and surfing the internet at his cost is Internet Time Theft)
  • 21. 3.Cybercrime against organization  Unauthorized accessing of computer  Password sniffing  Denial-of-service attacks (It is a cyber attack in which the network is chocked and often collapsed by flooding it with useless traffic and thus preventing the legitimate network traffic.)  Virus attack/dissemination of viruses  E-Mail bombing/mail bombs  Salami attack/ Salami technique (attackers or a hacker typically used to commit financial crimes)  Logic bomb  Trojan Horse  Data diddling  Industrial spying/ industrial espionage  Computer network intrusions  Software piracy
  • 22. 4.Cybercrime against Society  Forgery  Cyberterrorism  Web jacking (Illegally seeking control of a website by taking over a domain)
  • 23. 5.Crimes emanating from Usenet newsgroup  Usenet groups may carry very offensive, harmful, inaccurate material  Postings that have been mislabeled or are deceptive in another way  Hence service at your own risk
  • 24. History of Usenet groups  In 1979 it was developed by two graduate students from Duke University in North Carolina (UNC) as a network that allowed users to exchange quantities of information too large for mailboxes  Usenet was designed to facilitate textual exchanges between scholars.  Slowly, the network structure adapted to allow the exchange of larger files such as videos or images.
  • 25. E-Mail Spoofing  Email spoofing is a type of cyber attack that targets businesses by using emails with forged sender addresses  Because the recipient trusts the alleged sender, they are more likely to open the email and interact with its contents, such as a malicious link or attachment.  E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source.  To send spoofed e-mail, senders insert commands in headers that will alter message information.  It is possible to send a message that appears to be from anyone, anywhere, saying whatever the sender wants it to say.
  • 26. E-Mail Spoofing  Thus, someone could send spoofed e-mail that appears to be from you with a message that you didn't write.  Although most spoofed e-mail falls into the "nuisance" category and requires little action other than deletion, the more malicious varieties can cause serious problems and security risks.  For example, spoofed e-mail may believably to be from someone in a position of authority, asking for sensitive data, such as passwords, credit card numbers, or other personal information -- any of which can be used for a variety of criminal purposes.
  • 27. Spamming  People who create electronic spam : spammers  Spam is abuse of electronic messaging systems (email/ advertisements) to send unsolicited bulk messages indiscriminately  Spamming may be  E-Mail Spam  Instant messaging spam  Usenet group spam  Web search engine spam  Spam in blogs, wiki spam  Online classified ads spam  Mobile phone messaging spam  Internet forum spam  Junk fax spam  Social networking spam ……..
  • 28. Spamming  Spamming is difficult to control  Advertisers have no operating costs beyond the management of their mailing lists  It is difficult to hold senders accountable for their mass mailings  Spammers are numerous
  • 29. Search engine spamming  Alteration or creation of a document with the intent to deceive an electronic catalog or a filing system  some web authors use “subversive techniques” to ensure that their site appears more frequently or higher number in returned search results.  subversive techniques -- Establishing front groups and penetrating and manipulating existing political parties.  remedy: permanently exclude from the search index
  • 30. Avoid the following web publishing techniques:  Repeating keywords  Use of keywords that do not relate to the content on the site  Use of fast meta refresh  change to the new page in few seconds.  Redirection  IP cloaking:  including related links, information, and terms.  Use of colored text on the same color background  Tiny text usage  Duplication of pages with different URLs  Hidden links
  • 32. Cyber defamation  The tort of cyber defamation is considered to be the act of defaming, insulting, offending or otherwise causing harm through false statements pertaining to an individual in cyberspace.  Example: someone publishes defamatory matter about someone on a website or sends an E-mail containing defamatory information to all friends of that person.
  • 33. It may amount to defamation when-  If imputation (accusation) to a deceased person would harm the reputation of that person, and is intended to be hurtful to the feelings of his family or other near relatives  An imputation is made concerning a company or an association or collection of people as such.  An imputation that directly or indirectly, in the estimation of others, lowers the moral or intellectual character of that person, or lowers the character of that person in respect of his caste or of his calling, or lowers the credit of that person.
  • 34. Types of defamation  Libel : written defamation  Slander: oral defamation  The plaintiff must have to show that the defamatory statements were unlawful and would indeed injure the person’s or organization’s reputation.  When failed to prove, the person who made the allegations may still be held responsible for defamation.
  • 35. Cyber defamation cases  cyber defamation in India (14 dec 2009),  the employee of a corporate defamed its reputation and was sending derogatory and defamatory emails against the company and its managing directory  In this case the Court( delhi court) had restrained the defendant from sending derogatory, defamatory, obscene, vulgar, humiliating and abusive emails.  The court passed as important ex-parte injunction.  In another case, accused posted obscene, defamatory and annoying message about a divorcee woman and also sent emails to the victim.  The offender was traced and was held guilty of offences under section 469, 509 IPC and 67 of IT Act, 2000.  Other defamation cases:  A malicious customer review by a competitor could destroy a small business.  A false accusation of adultery on a social networking site could destroy a marriage.  An allegation that someone is a “crook” could be read by a potential employer or business partner
  • 36. Internet Time Theft  Occurs when an unauthorized person uses the Internet hours paid for by another person  Comes under hacking  The person get access to someone else’s user ID and password, either by hacking or by gaining access to it by illegal means  And uses the internet without the other person’s knowledge  This theft can be identified when Internet time is recharged often, despite infrequent usage.  This comes under “identity theft”
  • 37. Salami attack/ salami technique  Are used for committing financial crimes.  Example: a bank employee inserts a program, into the bank’s serve, that deduces a small amount from the account of every customer every month,  The unauthorized debit goes unnoticed by the customers, but the employee will make a sizable amount every month.
  • 38. Salami attack: real life examples  Small “shavings” for Big gains!  The petrol pump fraud
  • 39. Data diddling  Data diddling involves changing data input in a computer.  In other words, information is changed from the way it should be entered by a person typing in the data.  For example, a person entering accounting may change data to show their account, or that or a friend or family member, is paid in full. By changing or failing to enter the information, they are able to steal from the company.
  • 40.  To deal with this type of crime, a company must implement policies and internal controls.  This may include performing regular audits, using software with built-in features to combat such problems, and supervising employees.
  • 41. Real life example:  Electricity board in India have been victims to data diddling programs inserted when private parties computerized their systems.
  • 42. Forgery  The act of forging something, especially the unlawful act of counterfeiting a document or object for the purposes of fraud or deception.  Something that has been forged, especially a document that has been copied or remade to look like the original.  Example: Counterfeit currency notes, postage, revenue stamps, mark sheets, etc., can be forged using sophisticated computers, printers and scanners.
  • 43. Real life case:  Stamp Paper Scam – a racket that flourished on loopholes in the system  Abdul Karim Telgi, the mastermind of the multi-crore counterfeiting, printed fake stamp papers worth thousands of crores of rupees using printing machines purchased illegally with the help of some conniving officials of the Central Govt.’s Security Printing Press (India Security Press) located in Nasik.  These fake stamp papers penetrated in more than 12 states through a widespread network of vendors who sold the counterfeits without any fear and earned hefty commissions.  Amount swindled Rs. 172 crores  Telgi is in jail serving his 13 plus 10 years term
  • 44. Web jacking  This term is derived from the term hi jacking.  In these kinds of offences the hacker gains access and control over the web site of another.  He may even change the information on the site.  The first stage of this crime involves “password sniffing”.  The actual owner of the website does not have any more control over what appears on that website  This may be done for fulfilling political objectives or for money
  • 45. Real life examples  recently the site of MIT (Ministry of Information Technology) was hacked by the Pakistani hackers and some obscene matter was placed therein.  the site of Bombay crime branch was also web jacked.
  • 46. Industrial spying/ Industrial Espionage  Industrial espionage is the covert/secret and sometimes illegal practice of investigating competitors to gain a business advantage.  The target of investigation might be a trade secret such as a proprietary product specification or formula, or information about business plans.  In many cases, industrial spies are simply seeking any data that their organization can exploit to its advantage.
  • 47. Real life case  A Chinese Trojan horse email campaign targeted some 140 senior Israeli defense corporation employees (2013) involved in highly classified, sensitive security projects.  The email was made to appear as if it came from a known German company that regularly works with the Israeli defense industry.  However, it turned out to contain a Trojan horse, which, according to the report, attempted to funnel information from the recipients' computers.  The Trojan horse was noticed by computer defense systems and shut down.  The defense establishment then realized how many Israelis received the email, and reportedly tracked the malicious program down to Chinese defense industries.
  • 48. Hacking Every act committed toward breaking into a computer and/ or network is hacking. Purpose  Greed  Power  Publicity  Revenge  Adventure  Desire to access forbidden information  Destructive mindset
  • 49. History of hacking  hacking is any technical effort to manipulate the normal behavior of network connections and connected systems.  The term "hacking" historically referred to constructive, clever technical work that was not necessarily related to computer systems.  M.I.T.(ministry of information technology) engineers in the 1950s and 1960s first popularized the term and concept of hacking.  the so-called "hacks" perpetrated by these hackers were intended to be harmless technical experiments and fun learning activities.  Later, outside of M.I.T., others began applying the term to less honorable pursuits. for example, several hackers in the U.S. experimented with methods to modify telephones for making free long-distance calls over the phone network illegally.  As computer networking and the Internet exploded in popularity, data networks became by far the most common
  • 50. Hacking vs. Cracking  Malicious attacks on computer networks are officially known as cracking ,  Most non-technical people fail to make this distinction, however.  Outside of academia, its extremely common to see the term "hack" misused and be applied to cracks as well.
  • 51. There are 3 types of modern hackers  Black Hats: Criminal Hackers.  Possess desire to destruction  Hack for personal monetary gains : Stealing credit card information, transferring money from various bank accounts to their own account, extort money from corporate giant by threatening.  White Hats: Ethical Hackers.  Network Security Specialist.  Grey Hats: Deals in both of the above (jack of all trades, master of none).
  • 52. Real life case:dec 2009 NASA site hacked via SQL Injection  Two NASA sites recently were hacked by an individual wanting to demonstrate that the sites are susceptible to SQL injection.  The websites for NASA's Instrument Systems and Technology Division and Software Engineering Division were accessed by a researcher, who posted to his blog screen shots taken during the hack.  The researcher, using the alias "c0de.breaker," used SQL injection to hijack the sites.  SQL injection is an attack process where a hacker adds additional SQL code commands to a page request and the web server then tries to execute those commands within the backend database  The NASA hack yielded the credentials of some 25 administrator accounts.  The researcher also gained access to a web portal used for managing and editing those websites.  In this particular case, the researcher found the vulnerabilities, made NASA aware of them, then published findings after the websites had been fixed.  An attacker, however, could have tried to use that web server as an
  • 53. Nadya Suleman’s Website Hacked, feb 2009
  • 54. The story..  LOS ANGELES, CA – Octuplet mom Nadya Suleman launched a website to solicit donations for her family, but it was immediately hacked by a group of vigilante mothers!  The website originally featured photos of all eight octuplets, a thank you note from Suleman, images of children’s toys and a large donation button for viewers to send money through. Suleman also provided an address where people can send items such as diapers and formula.  Suleman was perhaps not prepared for the backlash she was to receive, as the site was hacked and brought down within hours. The original homepage was left up but defaced, as seen in the screenshot.
  • 55.  The site was tagged by the famous hacker group MOD, also known as the Mothers of Disappointment. The mysterious group has a history of attacking personal sites they disapprove of, including Britney Spears  Weekly World News could not reach any members for comment, however reporters did receive a short note from an anonymous e-mail address:  mod will not tolerate the selfish acts of bad parenting we will remain true to our mission despite any setbacks viva la maternity (call your mother, she misses you)  The site has since been restored, and Suleman’s PR representative has stated they are now taking extra security measures to arm against future attacks.
  • 56. Online frauds  Fraud that is committed using the internet is “online fraud.” Online fraud can involve financial fraud and identity theft.  Online fraud comes in many forms.  viruses that attack computers with the goal of retrieving personal information, to email schemes that lure victims into wiring money to fraudulent sources,  “phishing” emails that purport to be from official entities (such as banks or the Internal Revenue Service) that solicit personal information from victims to be used to commit identity theft,  to fraud on online auction sites (such as Ebay) where perpetrators sell fictional goods.  E-Mail spoofing to make the user to enter the personal information : financial fraud  Illegal intrusion: log-in to a computer illegally by having previously obtained actual password. Creates a new identity fooling the computer that the hacker is the genuine operator. Hacker commits innumerable number of frauds.
  • 57. E-mail bombing/mail bombs  In Internet usage, an email bomb is a form of net abuse consisting of sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a denial-of-service attack.  Construct a computer to repeatedly send E-mail to a specified person’s E-mail address.  Can overwhelm the recipient’s personal account and potentially shut down the entire system.
  • 58. Computer network intrusions  An intrusion to computer network from any where in the world and steal data, plant viruses, create backdoors, insert trojan horse or change passwords and user names.  An intrusion detection system (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system.  The practice of strong password
  • 59. Password sniffing  Password sniffers are programs that monitor and record the name and password of network users as they login, jeopardizing security at a site.  through sniffers installed, anyone can impersonate an authorized user and login to access restricted documents.
  • 60. Credit card frauds  Credit card fraud is a wide-ranging term for theft and fraud committed using or involving a payment card, such as a credit card or debit card, as a fraudulent source of funds in a transaction.  The purpose may be to obtain goods without paying, or to obtain unauthorized funds from an account.  Credit card fraud is also an adjunct to identity theft.
  • 61. Identity theft  Identity theft is a fraud involving another person’s identity for an illicit purpose.  The criminal uses someone else’s identity for his/ her own illegal purposes.  Phishing and identity theft are related offenses  Examples:  Fraudulently obtaining credit  Stealing money from victim’s bank account  Using victim’s credit card number  Establishing accounts with utility companies  Renting an apartment  Filing bankruptcy using the victim’s name
  • 62. Real life cases  Dr. Gerald Barnes Gerald Barnbaum lost his pharmacist license after committing Medicaid fraud. He stole the identity of Dr. Gerald Barnes and practiced medicine under his name. A type 1 diabetic died under his care. “Dr. Barnes” even worked as a staff physician for a center that gave exams to FBI agents. He’s currently serving hard time.  Andrea Harris-Frazier Margot Somerville lost her wallet on a trolley. Two years later she was arrested. Andrea Harris-Frazier had defrauded several banks—using Somerville’s identity— out of tens of thousands of dollars. The real crook was caught.  Abraham Abdallah A busboy named Abraham Abdallah got into the bank accounts of Steven Spielberg and other famous people after tricking his victims via computer, getting sufficient
  • 63. Cybercrimes: An Indian Perspective  India has the fourth highest number of internet users in the world.  45 million internet users in India  37% - in cybercafes  57% are between 18 and 35 years  The Information Technology (IT) Act, 2000, specifies the acts which are punishable. Since the primary objective of this Act is to create an enabling environment for commercial use of I.T.
  • 64. Cybercrimes: An Indian Perspective  217 cases were registered under IT Act during the year 2007 as compared to 142 cases during the previous year (2006)  Thereby reporting an increase of 52.8% in 2007 over 2006.  22.3% cases (49out of 217 cases) were reported from Maharashtra followed by Karnataka (40), Kerala (38) and Andhra Pradesh and Rajasthan (16 each).
  • 65. Cybercrimes: An Indian Perspective
  • 66. Incidence of Cyber Crimes in Cities  17 out of 35 mega cities did not report any case of Cyber Crime i.e, neither under the IT Act nor under IPC Sections) during the year 2007.  17 mega cities have reported 118 cases under IT Act and 7 megacities reported 180 cases under various section of IPC.  There was an increase of 32.6% (from 89 cases in 2006 to 118 cases in 2007) in cases under IT Act as compared to previous year (2006),  and an increase of 26.8% (from 142 cases in 2006 to 180 cases in 2007) of cases registered under various section of IPC  Bengaluru (40), Pune (14) and Delhi (10) cities have reported high incidence of cases (64 out of 118 cases) registered under IT Act, accounting for more than half of the cases (54.2%) reported under the Act.
  • 67. Cybercrime and the Indian ITA 2000 • In India , the Information Technology Act, ITA 2000 was brought into practice after the United General Assembly Resolution A/RES/51/162 in Jan 30, 1997 by adopting the Model Law on Electronic Commerce adopted by the United Nations Commission on International Trade Law • This Model Law on Electronic Commerce was the first step toward the law relating to E-commerce at international level to regulate an alternative form of commerce and give legal status in the area of E-commerce
  • 68. Cybercrime and the Indian ITA 2000… • It was enacted taking into consideration UNICITRAL model of Law on Electronic commerce (1996) • Cybercrimes in India are punishable under 2 categories: the ITA 2000 and the Indian Panel Code (IPC) • A total of 207 cases of cyber crime new registered under the IT Act in 2007 compared to 142 cases registered in 2006 • Under the IPC too, 339 cases were recorded in 2007 to 311 cases in 2006