Cyber crimes and their prevention

TejasviBhatia 7,417 views 22 slides May 01, 2020
Slide 1
Slide 1 of 22
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22

About This Presentation

CYBER CRIME


Slide Content

CYBER CRIMES AND THEIR
PREVENTION
PRESENTED BY;
TEJASVI BHATIA

CONTENTS
INTRODUCTION TO
CYBER CRIMES
DEFINITION
CAUSES
CYBER CRIMINALS
CLASSIFICATION OF
CYBER CRIMES
PREVENTION OF
CRIME.
REFRENCES

DEFINITION
The act of creating,distributing,altering,
stealing, misusing and destroying
information through the computer without
the use of physical force and against the
will or the interest of the victim.
OR
An unlawful act where the computer is
either a toolor a targetor both.

INTRODUCTION TO CYBER CRIMES
Cyber crime is an necessary
evil having its origin from the
growing dependence on
computers in modern life.
Cyber space creates moral,
civil and criminal wrongs.
Back in 1990, less than
100,000 people were able
to log on to the Internet
worldwide
Now around more than
500 million people are
hooked up to surf the net
around the globe.

CAUSES
Negligenceof victim
To make easy and quick money.
Anonymousnature
Easy accessto internet or cyberspace .
Just for the sake of recognition.
Territorial barriersthat paralyses the
crime investigation.
Absenceof comprehensive laws.
Non reportingof cyber crimes to police.

CYBER CRIMINALS
Organized hackers.
Professional crackers.
Discontented
employees.
Children and
adolescents
Terrorists

Classification
Of Crimes
Against person or property
Against government or organization
Against society at large

Crimes against person or property
Harassment via emails
Cyber stalking
Defamation
Unauthorized control or access over computer
Email spoofing
Transmitting of viruses or worms
Internet time theft
Money laundering.

CRIMES AGAINST GOVERNMENT OR
ORGANIZATIONS
Printing of counterfeit
currency
Possession of
unauthorized
information
Cyber terrorism
Distribution of pirated
software
Hacking
Defacing government
sites

AGAINST SOCIETY AT LARGE
Pornography
Polluting the youth
through indecent
exposure

UNAUTHORIZED CONTROL / ACCESS
OVERCOMPUTERSYSTEM-HACKING
It is the illegal intrusion into a
computer system or network.
Hackers write program while
the crackers use ready-made
program to attack the target
computer.
This is done for personal
monetary gains.
eg. stealing credit card
information and transferring
money from various bank
accounts to their own.

TRANSMITTING VIRUSES / WORMS
VIRUSESare program that
attach themselves to a
computer file or program and
then circulate themselves to
other files or to other
computers on the network.
They affect computer data by
altering or deletingit.eg love
bug virus infected 5% of
computers on globe
WORMSunlike viruses make
functional copies of
themselves without attaching
to host file and they keep on
replicating till theyeat up all
available space in computers
memory

TROJAN ATTACKS
These are unauthorized program which
passively gains controlover another's
system by representing it as an authorized
program.
E.g. a Trojan was installed in the computer of a
lady in the U.S. while chatting. The cyber
criminal through the web cam installed in the
computer obtained her nude photographs. He
further harassed this lady

CYBERTERRORISM
Act of terrorism committed
through computers or user of
cyberspace .The common
form of this attack on the
internet is by distributing hate
websites, hate emails, attack
on sensitive computer
network, denial of service
attack, web jackingto put
public in fear or endangering
the security of country.
MIT web site was hacked by
Pakistani hacker and obscene
matter was placed on it.

PORNOGRAPHY
This includes pornographic websites, magazines
produced using computers (to publish and print
the material) and the internet( to download and
transmit pictures or videos).
The victims are usuallychildren or teenagers.
Eg.Bombay case where two Swiss couple used to
force slum children for obscene photographs.
Mumbai police later arrested them.

PHISHING
The act of sending an email to a user falsely
claming to be an established legitimate enterprise
in an attempt to scam the user to surrender
private information that will be used for identity
theft.
The user is asked to update personal information
such as passwords, credit cards, bank account
numbers etc.

PREVENTION OF CRIMES
The Information Technology Act deals with the various
cyber crimes in chapters IX & XI. The important sections
are Ss. 43,65,66,67
Avoid sending photographs online to chat friends and
strangers.
Use latest and updated anti-virus software's.
Never send credit card number or other personal
information to sites which are not secure.
Use firewalls
Remember: People such as computer hackers and pirates
who hurt others through computer technology are not
"cool." They are breaking the law.
 Even if intruders manage to break through a firewall, the
data on a network can be made safe if it is encrypted. Many
software packages and network programs –Microsoft
Windows NT,

The main threat is not
from the intelligence of
criminals but from our
ignorance and the will
to fight it

REFRENCES
B.R.SHARMA-FORENSIC SCIENCE IN CRIMINAL
INVESTIGATION AND TRIAL.
http://www.naavi.org/pati/pati_cybercrimes_dec
03.htm
cybercrime.planetindia.net/intro.htm
en.wikipedia.org/wiki/Cybercrime
http://

thanks
Tags