presentation topic : cyber crimes and security By ashwini awatare
Contents :- Introduction to cyber crimes History of cyber crimes Categories of cyber crimes Types Impact of cyber crimes Cyber security Cyber laws Prevention Conclusion
Introduction :- The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of— be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime — illegal activity committed on the internet.
What is cyber crime ? Using the Internet to commit a crime. Identity Theft Hacking Viruses Facilitation of traditional criminal activity Stalking Stealing information Child Pornography
Cyber Crimes :- Defining Cyber Crime :-> It’s an unlawful act wherein the computer is either a tool or a target or both. Cyber space is a virtual space that has become as important as real space for business, politics, and communities
History of Cyber Crime The first recorded cyber crime took place in the year 1820 In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard’s - employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
History of cyber crimes :- The first recorded cyber crime took place in 1820. That is not surprising considenng the fact that the abacus, which is thought to be the earliest from of a computer, has been around since 3500 B.c. In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage.
The first spam email took place in 1976 when it was sent out over the AR PANT. The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the ElK Cloner.
Incident due to cyber crimes
Cybercrime Components Computers Cell Phones PDA’s Game Consoles
CATEGORIES OF CYBER CRIME: We can categorize cyber crime in two ways. The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc. The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.
CATEGORIES OF CYBER CRIME: Cyber crimes can be basically divided into 3 major categories: 1. Cyber crimes against persons. 2. Cyber crimes against property. 3. Cyber crimes against government.
FIRST CATEGORY Cyber crimes against persons Cyber harassment is a distinct Cyber crime. Various kinds of harassment can and do occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious, or other.
SECOND CATEGORY Cyber crimes against property These crimes include computer vandalism . (Destruction of others’ property), Transmission of harmful programs, Unauthorized trespassing through cyber space, Unauthorized possession of computer information.
THIRD CATEGORY Cyber crimes against government Cyber terrorism is one distinct kind of crime in this category. The growth of Internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.
STATISTICS AND THEIR IMPACTS
Types Of Cyber Crime Modification of a conventional crime by using computers. Frequently Used Cyber Crimes.
Modification of a conventional crime by using computers. Financial crimes Cyber pornography Sale of illegal articles Online gambling
Intellectual Property crime Email spoofing Forgery Cyber Defamation Cyber stalking — . . . —
Frequently Used Cyber Crimes. Unauthorized access to computer systems or networks Theft of information contained in electronic form Email bombing Data diddling Salami attacks Denial of Service attack
Virus / worm attacks Logic bombs Internet time thefts Web jacking Theft of computer system Physically damaging a computer system
Cyber Criminals Kids (age group 9-16 etc.) Organized hacktivists Disgruntled employees Professional hackers (corporate espionage)
Computer Security Confidentiality Integrity Availability Only those authorized to view information. Integrity Information is correct and hasn’t been altered by unauthorized users or software. Availability Data is accessible to authorized users.
Computer Security
Computer Security - Threats Malware Software that has a malicious purpose Viruses Trojan horse Spyware
Computer Security - Threats Intrusions Any attempt to gain unauthorized access to a system Cracking Hacking Social Engineering War-driving
Computer Security - Threats
Computer Security - Terminology People Hackers White Hat – Good guys. Report hacks/vulnerabilities to appropriate people. Black Hat – Only interested in personal goals, regardless of impact. Gray Hat – Somewhere in between.
Computer Security - Terminology Script Kiddies Someone that calls themselves a ‘hacker’ but really isn’t. Ethical Hacker Someone hired to hack a system to find vulnerabilities and report on them. Also called a ‘sneaker’ .
Computer Security - Terminology Security Devices Firewall Barrier between network and the outside world. Proxy server Sits between users and server. Two main functions are to improve performance and filter requests. Intrusion Detection Systems (IDS) Monitors network traffic for suspicious activity.
Cyber Laws :- • Law governing cyber space • Cyber law encompasses laws relating to: — Cyber Crimes Electronic and Digital Signatures — Intellectual Property — Data Protection and Privacy
Cyber crime: it refers to criminal exploitation of the internet Electronic and Digital signatures : it refers to mathematical scheme for demonstrating the authenticity of digital message or documents
Intellectual property: it refers to legal concept which refers to creations of the mind for which exclusive rights are recognized. Data protection and privacy: it refers to effective legislation helps minimize monitoring by governments , regulate surveillance by information is properly protected.
NEED OF CYBER LAW Cybercriminals ÷ computer technology = difficulties to apply the law. Not only real-world crimes by using computers..
PREVENTION Disable and log off a specific user account to prevent access. Disable and log off a group of user accounts which access a particular service that is being attacked. Disable and dismount specific (network) devices, for instance disk devices that are being swamped.
Disable specific applications, for example, an e-mail system subjected to a SPAM attack. Close down an entire system, and divert processing to an alternative or backup service on a secondary network.
conclusion Within the law enforcement agencies, a set of rules must be developed to address the various categories of computer crime. As such, investigators will know what and which materials to search and seize, the electronic evidence to recover, and the chain of custody to maintain.