» The first recorded cyber crime took place in 1820.
» That is not surprising considering the fact that the
abacus, which is thought to be the earliest from of a
computer, has been around since 3500 B.c.
» In India, Japan and China, the era of modern
per however, began with the analytical engine
of Charles Babbage.
» The first spam email took place in 1976 when it was
sent out over the ARPANT.
» The first virus was installed on an Apple computer in
1982 when a high school student, Rich skrenta,
developed the ElK Cloner.
CYBER CRIME I!
The expression ‘Crime’ is defined as an act, which subjects the doer to
legal punishment or any offence against morality; social order or any
unjust or shametul act. The “Offence" is defined in the Code of
Criminal Procedure to mean as an act or omission made punishable by
any law for the time being in force.
Cyber Crime is emerging as a serious threat. World wide
governments, police departments and intelligence units have started
to react.
CATEGORIES OF CYBER CRIME
We can categorize cyber crime in two ways.
+ The computer as a target :- using a computer
to attacks other computer, e.g. Hacking,
virus/worms attacks, Dos attack etc.
» The computer as a weapon :- using a
computer to commit real world crime e.g.
cyber terrorism, credit card fraud and
pornography etc.
Cyber Crime is a term used to broadly describe criminal activity in which computers
or computer networks are a tool, a target, or a place of criminal activity and include
everything trom electronic cracking to denial of service attacks. It is also used to
include traditional crimes in which computers or networks are used to enable the
illicit activity.
Computer crime mainly consists of unauthorized access to computer systems data
alteration, data destruction, theft of intellectual property. Cyber crime in the context
of national security may involve hacking, traditional espionage, or information
warfare and related activities,
Pornography, Threatening Email, Assuming someone's Identity, Sexual Harassment,
Defamation, Spam and Phishing are some examples where computers are used to
commit crime, whereas Viruses, Worms and Industrial Espionage, Software Piracy and
Hacking are examples where computers become target of crime.
+ >
=
—
Es
TYPES OF CYBER CRIME _ is
HACKERS
« HACKING :- Hacking in simple terms means an
illegal intrusion info a computer system and/or
network . It is also known as CRACKING.
Government websites are the hot target of the
hackers due to the press coverage, it receives.
Hackers enjoy the media coverage.
Motive behind the crime called HACKERS
Motive behind the crime called hacking greed
power, publicity, revenge, adventure desire to
access forbidden information destructive mindset
wants to sell n/w security services.
Cyber Crime Variants
Hacking
"Hacking" is a crime, which entails cracking
systems and gaining unauthorized access to the
data stored in them. Hacking had witnessed a 37
per cent increase this year.
Cyber Squatting
Cyber Squatting is the act of registering a famous
Domain Name and then selling it for a fortune.
This is an issue that has not been tackled in
IT ACT 2000.
TYPES OF CYBER CRIME = >
»x CHILD PORNOGRAPHY : The Internet is being
highly used by its abusers to reach and abuse
children sexually, worldwide. As more homes
have access to internet, more children would be
using the internet and more are the chances of
falling victim to the aggression of Pedophiles.
How Do They Operate :
How do they operate Pedophiles use false
identity to trap the children , Pedophiles connect
children in various chat rooms which are used
by children to interact with other children.
phishing
Phishing ts just one of the many frauds on
the Internet, trying to fool people into
parting with their money. Phishing refers to
the receipt of unsolicited emails by
customers of Financial Institutions,
requesting them to enter their Username,
Password or other personal information to
access their Account for some reason.
The fraudster then has access to the
customers online bank account and to the 5 Bee
funds contained in that account. LY a at PE
TYPES OF CYBER CRIME
» DENIAL OF SERVICE ATTACKS : This is an act by
the criminals who floods the bandwidth of the victims
network or fills his E-mail box with spam mail
depriving him of the service he is entitled to access or
provide. Many DOS attacks, such as the ping of
death and Tear drop attacks.
» VIRUS DISSMINITION : Malicious software that
attaches itself to other software. VIRUS , WORMS,
TROJAN HORSE ,WEB JACKING, E-MAIL
BOMBING etc.
« COMPUTER VANDALISM : Damaging or destroying
data rather than stealing or misusing them is called
cyber vandalism. These are program that attach
themselves to a file and then circulate.
Cyber Stalking is use of the Internet or other
electronic means to stalk someone. This
term is used interchangeably with online
harassment and online abuse. Stalking
generally involves harassing or threatening
behaviour that an individual engages in
repeatedly, such as following a person,
appearing at a person's home or place of
business, making harassing phone calls,
leaving written messages or objects, or
vandalizing a person's property.
TYPES OF CYBER CRIME __
» CYBER TERRORISM : Terrorist attacks on
the Internet is by distributed denial of service
attacks, hate websites and hate E-mails ,
attacks on service network etc.
» SOFTWARE PIRACY : Theft of software
through the illegal copying of genuine
programs or the counterfeiting and
distribution of products intended to pass for
the original.
VISHING
Vishing is the criminal practice of using
social engineering and Voice over IP
(VoIP) to gain access to private personal
and financial information from the
public for the purpose of financial
reward. The term is a combination of
“Voice” and phishing: Vishing exploits
the public's trust in landline telephone
services.
Vishing is typically used to steal credit
card numbers or other information used
in identity theft schemes from
individuals,
CYBER CRIMES THREATENS
- NATIONAL SECURITY
Se
CYBER CRIMES THREATENS NATIONAL SECURITY
ikewise Union home minister Shivraj Pati
said that the rising level of cyber crime is an
indication of enormous threat to national security. On
Google’s social networking site orkut, facebook, have
been perplexing authorities . Fan clubs of Underworld
Dons like Dawood Ibrahim and Chhota Shakeel and
other wanted underworld dons are also doing the
rounds on orkut. There is huge potential for damage
to national security through cyber attacks. The
internet is a means for money bounding and funding
terrorist attacks in an organized manner.
CYBER SECURITY |
Cyber Security : Cyber Security involves protection of
sensitive personal and business information through
prevention, detection and response to different online
attacks. Cyber security actually preventing the attacks,
cyber security.
Privacy Policy : Before submitting your name , e-mail ,
address, on a website look for the sites privacy policy.
Keep Software Up to Date: If the seller reduces patches for
the software operating system your device ,install them as
soon as possible .Installing them will prevent attackers
form being able to take advantage. Use good password
which will be difficult for thieves to guess. Do not choose
option that allows your computer to remember your
passwords.
CYBERSECURITY = = a pa
» DISABLE REMOTE CONNECTIVITY : Some
PDA's and phones are equipped with
wireless technologies, such as Bluetooth,
that can be used to connect to other devices
or computers. You should disable these
features when they are not in use.
ADVANTAGES OF CYBER SECURITY
» The cyber security will defend us from critical
attacks.
- It helps us to browse the site, website.
» Internet Security process all the incoming
and outgoing data on your computer.
» It will defend us from hacks and virus.
» Application of cyber security used in our PC
needs update every week
Cyber crime can involve criminal activities that
are traditional in nature, such as theft, fraud,
deformation and mischief, all of which are
subjected to the India Penal code. In simple way
we can say that cyber crime is unlawful acts
where in the computer is either a tool or both.
The abuse of computer has also given birth of
new age crime that are addressed by the
Information Technology Act, 2000.
Cyber Laws in India
Under The Information
T echnology Act 2000
CHAPTER XI — OFFENCES - 66. Hacking with
computer system.
(1) Whoever with the Intent to cause or knowing
that he is likely to cause Wrongful Loss or
Damage to the public or any person Destroys or
Deletes or Alters any Information Residing in a
Computer Resource or diminishes its value or
utility or affects it injuriously by any means,
commits hack.
(2) Whoever commits hacking shall be punished with imprisonment up to three years, or with
fine which may extend up to two lakh rupees, or with both.
The Internet
&
Cyber Ethics
17,
What is Cyber Ethics?
«the ways that an individual uses a computer that
follows the rules made by the schools and government
N
EC05.01b Analyze legislation concerning Internet security issues 5
CYBER ETHICS IS THE ETHICS APPLIED TO THE
ONLINE ENVIRONMENT. THE TREATMENT OF WHAT
IS AND IS NOT CYBER-ETHICAL BEHAVIOR MAY
VARY FROM PLACE TO PLACE.
CYBER ETHICS IS A CODE OF BEHAVIOR FOR USING
THE INTERWET. ONE EASY WAY TO THINK ABOUT
CYBER ETHICS AND TO ADDRESS THE SUBJECT
WITH CHILDREN IS THIS: ACCEPTABLE BEHAVIOR
ON THE INTERNET IS VERY MUCH THE SAME AS
ACCEPTABLE BEHAVIOR IN EVERYDAY LIFE.
CYBER-ETHICS IS THE ETHICS 4
ONLINE ENVIRONMENT. THE TI Whats yer ies? 6 r
IS AND IS MOT CYBER-ETHICAL
VARY FROM PLACE TO PLACE
MAUMEDE ADDI LIEN TA TUE IMTEOMET AUN TUE LICE
How do I know if the computer in my classroom is being
used legally and ethically?
The Department of Justice classifies computer crime
in three ways.........
Computers as a target
sono COMpUTErS as a weapon
\ | | N /l so COMpUTErs as an accessory
EC05.01b Analyze legislation concerning Internet security issues
Schoolwork
Music, videos
and copyright
Use the internet to help
you do the homework. You
can find many information
inside the internet.
Use the internet to learn
about music, video and
games.
Don’t copy other people
works and call it your own.
Do credits to the author or
website.
Don’t use the internet to
download or share
copyrighted material.
E-mail and
instant
messaging (IM)
For Parents
Use the internet to
communicate with friends
and family. But make sure you
know to whom you exchange
your e-mail and IM
Encourage your children to
use the Internet. The Internet
has a lot good things to offer
children.
DON’T
Don't use the internet to
communicate with strangers.
Don’t pretend to be someone
else and don't be rude or use bad
language.
Don't leave your children
unsupervised. Make sure you
know what sites your children
visit when they're on the internet,
and with whom they're
communicating. Look over their
shoulder. Keep track of the
websites they visit.
What can be a crime in the classroom?
Hacking into the school’s main server to change grades?
Using the school website to publish a picture of a
teacher superimposed on a donkey's body?
Copying pictures and oe clips
from
Y! ernet source
use in ahs or digital
book ?
ECUS.01b Analyze legislation concerning Internet ue issues 5
DO NOT USE RUDE OR OFFENSIVE LANGUAGE.
DON'T BE A BULLY ON THE INTERNET. DO NOT
CALL PEOPLE NAMES, LIE ABOUT THEM, SEND
EMBARRASSING PICTURES OF THEM, OR DO
ANY THING ELSE TO TRY TO HURT THEM.
DO NOT COPY INFORMATION FROM THE INTERNET
AND CLAIM IT AS YOURS. THAT IS CALLED
PLAGIARISM.
ADHERE TO COPYRIGHT RESTRICTIONS WHEN
DOWNLOADING MATERIAL INCLUDING SOFTWARE,
GAMES, MOVIES, OR MUSIC FROM THE INTERNET.
DO NOT BREAK INTO SOMEONE ELSE'S
2 APPROPRIATE OTHER PEOPLE'S INTELLECTUAL PROPERTY
(19)
9 IGNORE THE SOCIAL AND LEGAL CONSEQUENCES RELATED
TO THE SOFTWARE PROGRAM ONE IS WRITING OR THE
COMPUTER SYSTEM ONE IS DESIGNING
9 ILLEGALLY COPY OR USE PROPRIETARY SOFTWARE THAT
HAS NOT BEEN PAID FOR OR FOR WHICH CREDIT HAS NOT
BEEN GIVEN
% INTERFERE WITH OTHERS COMPUTER OR ONLINE WORK
9 SNOOP INTO OR ALTER OTHERS COMPUTER FILES OR DATA
9 USE A COMPUTER TO BEAR FALSE WITNESS
9 USE A COMPUTER TO CAUSE HARM TO OTHERS
2 USE OTHERS COMPUTER RESOURCES WITHOUT PRIOR
WHAT HAVE WE LEARNED?
The Internet is an infinite source of educational
information that can enhance the learning
experience.
laws apply to teachers as well as
students.
Fair use is the standard to which educators
and students must follow when
/ deciding if content is
appropriate for reproduction
EC05.01b Analyze legislation concerning Internet security issues 20