Presentation is loading. Please wait.

Presentation is loading. Please wait.

CYBER CRIME& SECUIRITY

Similar presentations


Presentation on theme: "CYBER CRIME& SECUIRITY"— Presentation transcript:

1 CYBER CRIME& SECUIRITY
PRESENTED BY:- Pushpal Ganguly

2 What is

3 Crime committed using a computer & internet to steal a person’s identity or illegal imports or malicious programs. Cyber Crime is nothing where the computer used as an object or subject of crime. Online activities are just like vulnerable to crime & can compromise personal safety just as effectively as common everyday crime. Lawmakers and individuals should know how to protect themselves and the persons for which they are responsible.

4 History of cyber crime! First recorded cyber crime took place in 1820 at Joseph-Marie Jacquard a French textile manufacturer. Device allowed repetition series of steps in the weaving of special fabrics . Resulting a fear among employees that there traditional employment & livelihood were being threatened. In India , Japan & China era of modern computers begins with the analytical engine of Charles Babbage. First Spam took place in 1978 at ARPANET (Advanced Research Projects Agency Network) The first virus was installed on an Apple computer in the year 1982 when a high school student R Skrenta develop the Elk Cloner.

5 Categorize OF

6 We can categorize Cyber Crime in two ways :-
The Computer as a target :- Using Computers to attack other computers e.g. Hacking , bombing, Data Dibbling, Virus worm attack etc. The Computer as a Weapon:- Using a computer to commit real world crimes such as cyber terrorism. IPR violations, Credit card frauds, Pornography etc. Cyber Crimes are regulated by cyber laws or internet laws.

7 Types of Cyber Crime 1. HACKING Hacking in simple terms means an
illegal intrusion into a computer system & network. It is also known as CRACKING. Govt websites are the hot targets of hackers due to press coverage. E.G. recent hacking of CBI website by two Pakistani hackers had turn the CBI top boss red-face & nightmare which totally unnerved the Indian Security agencies . Motive behind Hacking Mainly Greed Power Publicity, Revenge Adventure desire to access Forbidden information etc.

8 2. CHILD PORNOGRAPHY The Internet is being highly used by its abusers to sexually abuse children worldwide. As more homes have access to internet so more children are using the net & thus more chance of them falling victim to it. Nowadays it is happening to adult women as well mainly between the age group How they operate :- Using false identity in chat rooms & social networking sites like Orkut & Facebook they trap victims by first making friendship with the victim & then after winning there confidence steal their personal information by hacking into their account.

9 3.DATA DIDDLING Altering raw data just before it is processed by a computer and then changing it back after the processing is completed. Electricity Boards in India have been victims to data diddling programs inserted when private parties were computerizing their systems.

10 4.SALAMI ATTACKS Used for the commission of financial crimes.
Key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. E.g. a bank employee inserts a program, into the bank's servers, that deducts a small amount of money (say Rs. 5 a month) from the account of every customer. No account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month.

11 5.DENIAL OF SERVICE ATTACK
This is the act by criminals who flood the bandwidth of the victims network or fills his box with spam s depriving him of service he is entitle to access or provide.

12 6. CYBER TERRORISM Terrorist attacks on the internet is by distributed denial of service attacks attacking websites, attacking s, attacks on sensitive computer networks etc. Technology Savvy terrorist are using 512 bit encryption which is almost impossible to decrypt by security agency. Terror outfits like Al-Qaida, Laskare-Toiba, Indian Mujahidin etc are using internet as their important tool to conduct their missions. There are many online communities & blogs available through which they carry out their recruiting process spreading the message of Jihad by interpreting it wrongly to innocent minds turning them to dreadful Terrorist.

13 7.VIRUS ATTACKS Programs that attach themselves to a computer or a file Circulate themselves to other files and to other computers on a network Affect the data on a computer, either by altering or deleting it

14 WORM ATTACKS Do not need the host to attach themselves to.
Make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory.

15 WEB JACKING Occurs when someone forcefully takes control of a website (by cracking the password and later changing it).

16 Cyber Crime Threatening National Security
Ex Union Home Minister Shibraj Patil said that the rising level of cyber crime is an indication of an enormous threat to national security. In today's age when everything from small gadgets to nuclear plants are operated by computers cyber crime is threatening ramification . Cyber Crimes are capable of breaching the security of the most vital installations. Social Networking sites like Orkut & Facebook are the main platform for terror outfits to create communities , fan clubs through which they spread the message of terror. Thus it is advisable not to join any communities, fan clubs, pages, without knowing about them in details even if the invitation is send from your near & dear ones.

17 Cyber Security Cyber security involves protection of sensitive personal & business data through prevention, detection & response to different online attacks. Privacy Policy:- Before submitting your name, mail id or any other information on a website look for the sites privacy policy. To protect your information from hackers you should encrypt your data. Many Sites uses SSL layers(secure socket layers) to encrypt information thus protecting your privacy.

18 Protect your Computers
Use anti-virus software and firewalls - keep them up to date Keep your operating system up to date with critical security updates and patches Don't open s or attachments from unknown sources Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist Don’t share access to your PC with strangers. Don’t add unknown friends in Orkut & Facebook keep changing your password in every 6 months .

19 THANKS!!!


Download ppt "CYBER CRIME& SECUIRITY"

Similar presentations


Ads by Google