Download presentation
Published byAbel Freeman Modified over 9 years ago
1
presentation topic : cyber crimes and security By ashwini awatare
3
Contents :- Introduction to cyber crimes History of cyber crimes
Categories of cyber crimes Types Impact of cyber crimes Cyber security Cyber laws Prevention Conclusion
4
Introduction :- The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of— be it entertainment, business, sports or education. There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime — illegal activity committed on the internet.
5
What is cyber crime ? Using the Internet to commit a crime.
Identity Theft Hacking Viruses Facilitation of traditional criminal activity Stalking Stealing information Child Pornography
6
Cyber Crimes :- Defining Cyber Crime :->
It’s an unlawful act wherein the computer is either a tool or a target or both. Cyber space is a virtual space that has become as important as real space for business, politics, and communities
8
History of Cyber Crime The first recorded cyber crime took place in the year In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard’s - employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!
9
History of cyber crimes :-
The first recorded cyber crime took place in That is not surprising considenng the fact that the abacus, which is thought to be the earliest from of a computer, has been around since B.c. In India, Japan and China, the era of modern computer, however, began with the analytical engine of Charles Babbage.
10
The first spam email took place in 1976 when it was sent out over the AR PANT.
The first virus was installed on an Apple computer in 1982 when a high school student, Rich skrenta, developed the ElK Cloner.
11
Incident due to cyber crimes
12
Cybercrime Components
Computers Cell Phones PDA’s Game Consoles
13
CATEGORIES OF CYBER CRIME:
We can categorize cyber crime in two ways. The computer as a target :- using a computer to attacks other computer, e.g. Hacking, virus/worms attacks, Dos attack etc. The computer as a weapon :- using a computer to commit real world crime e.g. cyber terrorism, credit card fraud and pornography etc.
14
CATEGORIES OF CYBER CRIME:
Cyber crimes can be basically divided into 3 major categories: 1. Cyber crimes against persons. 2. Cyber crimes against property. 3. Cyber crimes against government.
15
FIRST CATEGORY Cyber crimes against persons
Cyber harassment is a distinct Cyber crime. Various kinds of harassment can and do occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious, or other.
16
SECOND CATEGORY Cyber crimes against property
These crimes include computer vandalism . (Destruction of others’ property), Transmission of harmful programs, Unauthorized trespassing through cyber space, Unauthorized possession of computer information.
17
THIRD CATEGORY Cyber crimes against government
Cyber terrorism is one distinct kind of crime in this category. The growth of Internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.
19
STATISTICS AND THEIR IMPACTS
23
Types Of Cyber Crime Modification of a conventional crime by using computers. Frequently Used Cyber Crimes.
24
Modification of a conventional crime by using computers.
Financial crimes Cyber pornography Sale of illegal articles Online gambling
25
Intellectual Property crime
spoofing Forgery Cyber Defamation Cyber stalking — . . . —
26
Frequently Used Cyber Crimes.
Unauthorized access to computer systems or networks Theft of information contained in electronic form bombing Data diddling Salami attacks Denial of Service attack
27
Virus / worm attacks Logic bombs Internet time thefts Web jacking Theft of computer system Physically damaging a computer system
28
Cyber Criminals Kids (age group 9-16 etc.) Organized hacktivists
Disgruntled employees Professional hackers (corporate espionage)
30
Computer Security Confidentiality Integrity Availability
Only those authorized to view information. Integrity Information is correct and hasn’t been altered by unauthorized users or software. Availability Data is accessible to authorized users.
31
Computer Security
32
Computer Security - Threats
Malware Software that has a malicious purpose Viruses Trojan horse Spyware
34
Computer Security - Threats
Intrusions Any attempt to gain unauthorized access to a system Cracking Hacking Social Engineering War-driving
35
Computer Security - Threats
36
Computer Security - Terminology
People Hackers White Hat – Good guys. Report hacks/vulnerabilities to appropriate people. Black Hat – Only interested in personal goals, regardless of impact. Gray Hat – Somewhere in between.
37
Computer Security - Terminology
Script Kiddies Someone that calls themselves a ‘hacker’ but really isn’t. Ethical Hacker Someone hired to hack a system to find vulnerabilities and report on them. Also called a ‘sneaker’ .
38
Computer Security - Terminology
Security Devices Firewall Barrier between network and the outside world. Proxy server Sits between users and server. Two main functions are to improve performance and filter requests. Intrusion Detection Systems (IDS) Monitors network traffic for suspicious activity.
40
Cyber Laws :- • Law governing cyber space • Cyber law encompasses laws relating to: — Cyber Crimes Electronic and Digital Signatures — Intellectual Property — Data Protection and Privacy
41
Cyber crime: it refers to criminal exploitation of the internet
Electronic and Digital signatures : it refers to mathematical scheme for demonstrating the authenticity of digital message or documents
42
Intellectual property: it refers to legal concept which refers to creations of the mind for which exclusive rights are recognized. Data protection and privacy: it refers to effective legislation helps minimize monitoring by governments , regulate surveillance by information is properly protected.
43
NEED OF CYBER LAW Cybercriminals ÷ computer technology = difficulties to apply the law. Not only real-world crimes by using computers..
44
PREVENTION Disable and log off a specific user account to prevent access. Disable and log off a group of user accounts which access a particular service that is being attacked. Disable and dismount specific (network) devices, for instance disk devices that are being swamped.
45
Disable specific applications, for example, an e-mail system subjected to a SPAM attack.
Close down an entire system, and divert processing to an alternative or backup service on a secondary network.
46
conclusion Within the law enforcement agencies, a set of rules must be developed to address the various categories of computer crime. As such, investigators will know what and which materials to search and seize, the electronic evidence to recover, and the chain of custody to maintain.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.