Cyber crime against property

5,241 views 15 slides Jul 03, 2023
Slide 1
Slide 1 of 15
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15

About This Presentation

it is on cyber crime


Slide Content

CYBER CRIME AGAINST PROPERTY

FORMAT OF THE PRESENTATION Before going on the topic cyber crime against property we must know about cyber crime. How it emerged? Then its types. All the types of cyber crime. Then, we will move onto our main topic cyber crime against property. And then its type and prevention.

We are moving from the age of information technology to the age of information security as now we are more concerned about how to secure our information; the reason is the rapid growth in the graph of cyber crimes1 or computer crimes. New methods of connectivity and communications are being developed with the time, and, so are the ways to misuse them. People had started to depend on the machines rather on themselves thus computer databases have taken the place of manual records which need to saved and secured and also should be available at the very time they are required. An E has been added to almost all the major or basic things which we do in our daily life like E-banking, E-shopping, and E-governance 2 etc. Governments are also taking initiative to start and regulate their works via electronic methods or internet . Doing the work on internet is no doubt very convenient, easy and much better way to do but at the same time it needs to be safe and secured. The only thing why people hesitate to do their work online is because due to the lack of trust in the system. We now and then read the news on newspapers or televisions about the frauds that take place on the internet or through the internet. It is easier to break into a database and steal the information on a computer as compared to a thief going and stealing the manual records from an office. Information or the data is the main asset of an organization which we need to make sure that its confidentiality, integrity and availability should be maintained. That is why, now a days companies are making its employees aware about the possible risks and threats of the minor incidents which can lead to a big disaster or attacks on their systems. THE STORY

WHAT IS CYBERCRIME Cyber crimes are the crimes in which a computer is either used as a tool or a target but the main point lies in the fact that what can be described as a computer or what are the things which can fall under the definition of a computer. In India the IT act defines the computer in the definition clause which helps a lot in solving the cyber crimes. Cybercrime  is a type of  crime  involving a  computer  or a  computer network . The computer may have been used in committing the crime, or it may be the target. Cybercrime may harm someone's security or finances. Internationally, both state and non-state actors engage in cybercrimes, including  espionage ,  financial theft , and other cross-border crimes. Cybercrimes crossing international borders and involving the actions of at least one nation-state are sometimes referred to as  cyberwarfare .  Warren Buffett  describes cybercrime as the "number one problem with mankind" and said that it "poses real risks to humanity".

TYPES OF CYBER CRIME Cyber crime against individual This involves targeting a person's computer, data, or identity, such as hacking, phishing, or identity theft. Cyber crime against society This involves harming the public interest, order, or security, such as cyber terrorism, hate speech, etc. Cyber crime against property This involves damaging or stealing a person's or an organization's property, such as malware, ransomware, or piracy. Cyber crime against organization This involves attacking an organization's network, system, or data, such as denial-of-service, espionage, or sabotage.

THE FOUR MAJOR CATEGORIES Cyber crime against individual Cyber crime against society Cyber crime against organization Cyber crime against property

INTRODUCTION TO CYBER CRIME AGAINST PROPERTY

Cybercrime against property is probably the mo st common of the cybercrime classifications. As the name suggests, this kind of crime involv es  cybercriminals targeting property , usually money or other assets. Property cybercrime ca n be as serious as credit card theft or as mundane as copyright infringement. Most cyber criminals out there aren’t trying to a ttack you personally, but to take your money. Even extreme measures like ransomware are ju st attempts to steal or extort cash from people or businesses. That’s what makes cybercrimes against property so prevalent. a Though money is the most significant motivato r for these crimes, it’s not the only one. This classification of cybercrime includes other kind s of property as well, like stealing or destroying intellectual property . Attacks that target your c omputer itself also fit into this category. However, any online activity which basically offends human sensibilities can be regarded as a cybercrime against property.

Cyber crime against property CYBER SQUATTING CYBER TRESPASSI--NG CYBER VANDALISM INTELLECTUAL PROPERTY CRIMES 1st 3rd 2nd 4th

CYBER SQUATTING Cybersquatting , typo squatting or domain squatting  (also known as domain squatting) is the abusive practice of registering and using an internet domain name that is identical or similar to trademarks, service marks, personal names or company names with the bad faith intent of hijacking traffic for financial profit, delivering malware payloads or stealing intellectual property. In popular terms, "cybersquatting" is the term most frequently used to describe the deliberate, bad faith abusive registration of a domain name in violation of trademark rights. However, precisely because of its popular currency, the term has different meanings to different people. Some people, for example, include " warehousing ", or the practice of registering a collection of domain names corresponding to trademarks with the intention of selling the registrations to the owners of the trademarks, within the notion of cybersquatting, while others distinguish between the two terms. In the former definition, the cybersquatter may offer to sell the domain to the person or company who owns a trademark contained within the name at an  inflated price . Similarly, some consider "cyberpiracy" to be interchangeable with "cybersquatting", whereas others consider that the former term relates to violation of copyright in the content of websites, rather than to abusive domain name registrations. Because of the various interpretations of the term, World Intellectual Property Organization ( WIPO ), in a 1999 report, approved by its member states, considered it as the abusive registration of a domain name.

CYBER VANDALISM Cyber vandalism is the deliberate, malicious destruction of digital property. It usually targets websites and other tech products, but it can also be used to threaten individuals or institutions. Cyber vandals use all sorts of tools to deface websites, delete files, take over user accounts, or send spam and viruses. Whereas traditional vandalism commonly involved the vandal leaving his or her mark for everyone to see, cyber vandalism gives the perpetrator virtual anonymity by allowing them to commit their crimes from anywhere at any time with relative impunity. Cyber vandalism can generally be classified into three general types: Disruptive cyber vandalism:   This type of cyber vandalism is designed to cause interruption or interference with the normal functioning of a cyber property e.g. a website. Destructive cyber vandalism:   As the name suggests, this type of cyber vandalism is intended to cause damage or destruction to a property. Defamatory cyber vandalism:  This type of cyber vandalism involves posting false or derogatory information about an individual or organization in an effort to damage their reputation.

COMMON FORMS OF CYBER VANDALISM Website Defacement Hackers maliciously change content and design of an existing website without its owner’s permission. It involves altering web pages to display upsetting, hateful or otherwise distressing messages, images, or videos that flow entirely against the owner’s wishes. Such modifications are typically achieved by exploiting weaknesses in the website's code.  Software Sabotage This involves deliberately introducing bugs and viruses into programs to disrupt activity and can lead to everything from data loss to a complete wiping of the source code of a program. Software sabotage can also involve the intentional distribution of infected or stolen software online which can then be unknowingly installed and used by unsuspecting individuals, leading to further exploitation and damage.  Account Hijacking This is the act of taking over someone else's account for malicious purposes such as to implant malware or post obscene content.  Account hijackers exploit weaknesses in computer systems, networks, and online security protocols for their own benefit, often leaving the victim with damaged reputation or financial losses. It is more common now than ever with increasingly sophisticated technology available at anyone's fingertips. DNS Cache P oisoning DNS cache poisoning corrupts the Domain Name System (DNS) data stored in the DNS server’s cache. This vandalism allows threat actors to manipulate web traffic, as they can redirect users to malicious websites and illicit content. Often, DNS cache poisoning tricks users into visiting false but convincing websites that are specially created by hackers. 

CYBER TRESPASSING In common language the word 'trespass', means to go on another's property without consent. Though it is ordinarily a civil wrong, if trespass is done with criminal intention, it is treated as criminal trespass. Thus, as trespass actions are stranded in the idea of protecting an owner's control over his property and as even the websites should be considered as a species of property. As like in the case of trespass, when just cracking is there by the cracker, it is of a civil nature but once the intention to cause harm or rather damage the system is proved, the liability becomes that of a penal nature. Now it is not just criminal trespass, which can be done by cracking but cracking may also result in many other crimes which are mentioned in the Indian Penal Code, 1860. Like, if a cracker cracks a banking website and transfers money into his own account, this may constitute a crime under Sec.378 of the Penal Code, which in this case may also be termed as Cyber Theft. The IT Act tries to achieve this by providing civil and penal consequences for cracking and other wrongful activities. The development of new-age technology in the form of computers and other such instruments is the cause of rampant tort of cyber-trespass. The computer may be used as a tool in the following kinds of activity, e-mail spoofing, forgery, cyber defamation, cyber stalking. It is necessarily the breach of personal information of a person and his personal identity details, website databases etc. The computer may however be target for unlawful acts in the most of the cases for e.g. unauthorized access to computer/ computer system/ computer networks, theft of information contained in the electronic form, e-mail bombing, data didling, salami attacks, logic bombs, Trojan attacks, internet time thefts, web jacking, theft of computer system, physically damaging the computer system and other such confidential information.

INTELLECTUAL PROPERTY CRIMES Intellectual property crime is committed when someone manufactures, sells or distributes counterfeit or pirated goods, such as patents, trademarks, industrial designs or literary and artistic works, for commercial gain .  Intellectual property (IP) crime also includes using a particular brand, logo, design, piece of music or creative work without the right to do so   Intellectual property is protected by trade marking, patents and copyright.

THANKS BY :- DAKSH MEHTA SCHOOL:- Mother Divine Public School ROLL NO. :- 15 COMPUTER HOLIDAY HOMEWORK
Tags