CYBER CRIMES AND THEIR
PREVENTION
PRESENTED BY;
TEJASVI BHATIA
CONTENTS
INTRODUCTION TO
CYBER CRIMES
DEFINITION
CAUSES
CYBER CRIMINALS
CLASSIFICATION OF
CYBER CRIMES
PREVENTION OF
CRIME.
REFRENCES
DEFINITION
The act of creating,distributing,altering,
stealing, misusing and destroying
information through the computer without
the use of physical force and against the
will or the interest of the victim.
OR
An unlawful act where the computer is
either a toolor a targetor both.
INTRODUCTION TO CYBER CRIMES
Cyber crime is an necessary
evil having its origin from the
growing dependence on
computers in modern life.
Cyber space creates moral,
civil and criminal wrongs.
Back in 1990, less than
100,000 people were able
to log on to the Internet
worldwide
Now around more than
500 million people are
hooked up to surf the net
around the globe.
CAUSES
Negligenceof victim
To make easy and quick money.
Anonymousnature
Easy accessto internet or cyberspace .
Just for the sake of recognition.
Territorial barriersthat paralyses the
crime investigation.
Absenceof comprehensive laws.
Non reportingof cyber crimes to police.
Classification
Of Crimes
Against person or property
Against government or organization
Against society at large
Crimes against person or property
Harassment via emails
Cyber stalking
Defamation
Unauthorized control or access over computer
Email spoofing
Transmitting of viruses or worms
Internet time theft
Money laundering.
CRIMES AGAINST GOVERNMENT OR
ORGANIZATIONS
Printing of counterfeit
currency
Possession of
unauthorized
information
Cyber terrorism
Distribution of pirated
software
Hacking
Defacing government
sites
AGAINST SOCIETY AT LARGE
Pornography
Polluting the youth
through indecent
exposure
UNAUTHORIZED CONTROL / ACCESS
OVERCOMPUTERSYSTEM-HACKING
It is the illegal intrusion into a
computer system or network.
Hackers write program while
the crackers use ready-made
program to attack the target
computer.
This is done for personal
monetary gains.
eg. stealing credit card
information and transferring
money from various bank
accounts to their own.
TRANSMITTING VIRUSES / WORMS
VIRUSESare program that
attach themselves to a
computer file or program and
then circulate themselves to
other files or to other
computers on the network.
They affect computer data by
altering or deletingit.eg love
bug virus infected 5% of
computers on globe
WORMSunlike viruses make
functional copies of
themselves without attaching
to host file and they keep on
replicating till theyeat up all
available space in computers
memory
TROJAN ATTACKS
These are unauthorized program which
passively gains controlover another's
system by representing it as an authorized
program.
E.g. a Trojan was installed in the computer of a
lady in the U.S. while chatting. The cyber
criminal through the web cam installed in the
computer obtained her nude photographs. He
further harassed this lady
CYBERTERRORISM
Act of terrorism committed
through computers or user of
cyberspace .The common
form of this attack on the
internet is by distributing hate
websites, hate emails, attack
on sensitive computer
network, denial of service
attack, web jackingto put
public in fear or endangering
the security of country.
MIT web site was hacked by
Pakistani hacker and obscene
matter was placed on it.
PORNOGRAPHY
This includes pornographic websites, magazines
produced using computers (to publish and print
the material) and the internet( to download and
transmit pictures or videos).
The victims are usuallychildren or teenagers.
Eg.Bombay case where two Swiss couple used to
force slum children for obscene photographs.
Mumbai police later arrested them.
PHISHING
The act of sending an email to a user falsely
claming to be an established legitimate enterprise
in an attempt to scam the user to surrender
private information that will be used for identity
theft.
The user is asked to update personal information
such as passwords, credit cards, bank account
numbers etc.
PREVENTION OF CRIMES
The Information Technology Act deals with the various
cyber crimes in chapters IX & XI. The important sections
are Ss. 43,65,66,67
Avoid sending photographs online to chat friends and
strangers.
Use latest and updated anti-virus software's.
Never send credit card number or other personal
information to sites which are not secure.
Use firewalls
Remember: People such as computer hackers and pirates
who hurt others through computer technology are not
"cool." They are breaking the law.
Even if intruders manage to break through a firewall, the
data on a network can be made safe if it is encrypted. Many
software packages and network programs –Microsoft
Windows NT,
The main threat is not
from the intelligence of
criminals but from our
ignorance and the will
to fight it
REFRENCES
B.R.SHARMA-FORENSIC SCIENCE IN CRIMINAL
INVESTIGATION AND TRIAL.
http://www.naavi.org/pati/pati_cybercrimes_dec
03.htm
cybercrime.planetindia.net/intro.htm
en.wikipedia.org/wiki/Cybercrime
http://