Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cybercrime.

Similar presentations


Presentation on theme: "Cybercrime."— Presentation transcript:

1 Cybercrime

2 Cybercrime: Criminals Can Operate Anonymously Over the Computer Networks. Hackers Invade Privacy. Hackers Destroy "Property" in the Form of Computer Files or Records. Hackers Injure Other Computer Users by Destroying Information Systems. Computer Pirates Steal Intellectual Property.

3 Defining cyber crimes, as “acts that are punishable by the Information Technology Act”
A simple yet sturdy definition of cyber crime would be "unlawful acts wherein the computer is either a tool or a target or both" Defining cyber crimes, as "acts that are punishable by the Information Technology Act" would be unsuitable as the Indian Penal Code also covers many cyber crimes, such as spoofing and cyber defamation, sending threatening s etc. A simple yet sturdy definition of cyber crime would be "unlawful acts wherein the computer is either a tool or a target or both"

4 Cybercrime Hacking credit card numbers…

5 Classification of Cyber Crimes:
The Information Technology Act deals with the following cyber crimes along with others: o Tampering with computer source documents o Hacking o Publishing of information, which is obscene in electronic form o Child Pornography o Accessing protected system o Breach of confidentiality and privacy

6 Cyber crimes other than those mentioned under the IT Act o Cyber Stalking o Cyber squatting o Data Diddling o Cyber Defamation o Trojan Attack o Forgery o Financial crimes o Internet time theft o Virus/worm attack o spoofing o bombing o Salami attack o Web Jacking

7 Cybercrime Terrorism Cyber crime and cyber terrorism are both crimes of the cyber world. Cyber terrorism is a premeditated use of disruptive activities or the threat Cyber crime and cyber terrorism are both crimes of the cyber world. The difference between the two however is with regard to the motive and the intention of the perpetrator. While a cyber crime can be described simply as an unlawful act wherein the computer is either a tool or a target or both, cyber terrorism deserves a more detailed definition. One can define cyber terrorism as a premeditated use of disruptive activities or the threat thereof, in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives.

8

9 Cybercrime Terrorism While Bush is trying to get his rocket-shield installed in the Czech Republic, the threat is not coming out of the air, but from underground, in Estonia. Estonia? Yes. Estonia is an e-country, it is one of the forerunners in Europe using interactive e-governance. In 2005 it was the first country to have legally binding general elections using the internet. But last month Estonia had another premiere, it has been under an unprecedented attack of so called cyberterrorists.

10 Cyber Criminals Any person who commits an illegal act with a guilty intention or commits a crime is a Cyber Criminal. The Cyber Criminals may be children and adolescents aged b/w 6-18 years They may be organized hackers, may be professional hackers or crackers, discontented employees, cheaters or even psychic persons Any person who commits an illegal act with a guilty intention or commits a crime is called an offender or a criminal. In this context, any person who commits a Cyber Crime is known as a Cyber Criminal. The Cyber Criminals may be children and adolescents aged b/w 6-18 years, they may be organized hackers, may be professional hackers or crackers, discontented employees, cheaters or even psychic persons

11 Cyber Ethics Each and everything which is opposed to public policy, against public welfare and which may disturb public tranquility may be termed to be immoral and unethical. The burning issues in the past such as imperialism, colonialism have given way to cyber crime, hacking, ‘cyber-ethics’. Ethics and morality in different circumstances connotes varied and complex meanings. Each and everything which is opposed to public policy, against public welfare and which may disturb public tranquility may be termed to be immoral and unethical. In the past terms such as imperialism, colonialism, apartheid, which were burning issues have given way to cyber crime, hacking, 'cyber-ethics' etc. Today in the present era there is a need to evolve a 'cyber-jurisprudence' based on which 'cyber-ethics' can be evaluated and criticized. Further there is a dire need for evolving a code of Ethics on the Cyber-Space and discipline.

12 Cyber Security Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. These guides provide general outlines as well as specific techniques for implementing cyber security.

13 Since September 11, 2001 research at Pacific Northwest National Laboratory has taken a more proactive approach that addresses their clients current as well as their future needs. It is through the application of state-of-the-art technologies at PNNL that researchers have been working hard to develop capabilities that support both the emerging Intrinsically Secure Computing and traditional security methods.

14 Security Standards ISO 27002 Standard of good practice NERC NIST
RFC 2196 ISO 27002:ISO incorporates both parts of the BS 7799 standard. Sometimes ISO/IEC is referred to as BS 7799 part 1 and sometimes it refers to part 1 and part 2. BS 7799 part 1 provides an outline for cyber security policy; whereas BS 7799 part 2 provides a certification. Standard of good practice:In the 1990s, the Information Security Forum (ISF) published a comprehensive list of best practices for information security, published as the Standard of Good Practice (SoGP). The ISF continues to update the SoGP every two years; NERC:The North America Electric Reliability Corporation (NERC) has created many standards . These standards are used to secure bulk electric systems although NERC has created standards within other areas. NIST:. Specifically it was written for those people in the federal government responsible for handling sensitive systems. Eight principles and fourteen practices are described within this document. This document emphasizes the importance of self assessments as well as risk assessments. ISO 15408:This standard develops what is called the “Common Criteria”. It allows many different software applications to be integrated and tested in a secure way. RFC 2196:RFC 2196 is memorandum published by Internet Engineering Task Force for developing security policies and procedures for information systems connnected on the Internet.

15 Trends In Cybercrime

16 Mobile Banking Mobile banking is a term used for performing balance checks, account transactions, payments etc. via a mobile device such as a mobile phone.

17 Cybercrime in Mobile Banking
Signals Trapped by hackers Mobile Banking password hacked Making new mobile chips as like the original Transacting from new chips Data Packets easily identifiable

18 Web Browser data stealing
Hacking key typed in keyboard Shoulder sniffing Embed their malicious code in Flash files Financial fraud constitutes most expensive cost of $500,000 Virus incidents 49% Insider abuse of networks 44%

19

20 Conclusion The Internet is the medium for huge information and a large base of communications around the world, it is necessary to take certain precautions while operating it. Therefore, in order to prevent cyber crime it is important to educate everyone and practice safe computing. Cont…

21 Increase security level New security standards should be established
Cont… Increase security level New security standards should be established Users manually must change their passwords regularly Firewalls must be configured properly

22 Thank You!!!

23 Queries???


Download ppt "Cybercrime."

Similar presentations


Ads by Google