Presented By: Amit Pandit: Pranay Gehlot Yash Raj Soni

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 29

Study on Cyber

Crime
Guided by:
Dr. Deepak Shrivastava

Presented by:
 Amit Pandit
 Pranay Gehlot
 Yash Raj Soni
Introduction to Cyber crime
• Computer Crime, E-Crime, Hi-
Tech Crime or Electronic Crime
is where a computer is the
target of a crime or is the
means adopted to commit a
crime.

• Most of these crimes are not


new. Criminals simply devise
different ways to undertake
standard criminal activities
such as fraud, theft, blackmail,
forgery, and embezzlement
using the new medium, often
involving the Internet.
Why is Computer Vulnerable??
• Computers store huge amounts of data in small
spaces
• Ease of access
• Complexity of technology
• Human error
• One of the key elements that keeps most members of
any society honest is fear of being caught — the
deterrence factor. Cyberspace changes two of those
rules. First, it offers the criminal an opportunity of
attacking his victims from the remoteness of a
different continent and secondly, the results of the
crime are not immediately apparent.
• Need new laws and upgraded technology to combat
cyber crimes
Computer Viruses
Viruses
A computer virus is a
Viruses
computer program that
can infect other computer
programs by modifying
them in such a way as to
include a (possibly
evolved) copy of it. Note
that a program does not
have to perform outright File
Boot and
Boot record
damage (such as deleting infectors infectors
file
or corrupting files) in viruses
order to be called a
"virus".
Types of Cyber crimes

Crime against Government

Crime against property

Crime against persons


Cyber crimes

Denial of
Information E-mail Salami Trojan
Hacking Web jacking Service
Theft bombing attacks attacks
attacks
Fake Profile cases
A fake profile of a woman is created on social
networking site. The profile displays her
correct name and contact information (such
as address, residential phone number, cell
phone number etc). Sometimes it even has
her photograph.
Email Account Hacking
• The victim’s email account password is
stolen and the account is then misused
for sending out malicious code.

• The victim’s email account password is


stolen and the hacker tries to extort
money
from the victim.
Credit Card Fraud

• The victim’s credit card information is


stolen and misused for making online
purchases (e.g. airline tickets, software,
subscription to pornographic websites
etc).
Source Code Theft
• The suspect (usually an employee of
the victim) steals the source code and
sells it to a business rival of the victim.

• The suspect (usually an employee of


the victim) steals the source code and
uses it as a base to make and sell his
own version of the software.
Software Piracy
• The software pirate sells the pirated
software in physical media (usually CD
ROMs) through a close network of
dealers.
• The software pirate sells the pirated
software through electronic downloads
through websites, bulletin boards,
newsgroups, spam emails etc.
Music Piracy
• The music pirate sells the pirated music
in physical media (usually CD ROMs)
through a close network of dealers.
Email Scams
• Criminals are also using emails
extensively for their illicit activities.
Phishing
• The victim receives an email that
appears to have been sent from his
bank. The email urges the victim to
click on the link in the email. When the
victim does so, he is taken to “a secure
page on the bank’s website”
Online Sale of Illegal
Articles
• The suspect posts information about
the illegal sale that he seeks to make.
Potential customers can contact the
seller using the email IDs provided.
Virus Attacks
• The virus is a general “in the wild” virus. This
means that it is spreading all over the world
and is not targeted at any specific
organisation.
• The virus targets a particular organisation.
This type of a virus is not known to anti-virus
companies as it is a new virus created
specifically to target a particular organisation
Combating cyber crimes
• Technological measures-
Digital signatures ,Firewalls etc.

• Cyber investigation- Computer


forensics is the process of
identifying, preserving, analyzing
and presenting digital evidence
in a manner that is legally
acceptable in courts of law.

• Legal framework-laws &


enforcement
Computer Crime and Security Survey

Of the organizations suffering security compromises in the last


year– 95% had Firewalls and 61% had IDSs

2006 2007 2008 2009


SECURITY TECHNOLOGIES
USED % % % %
Intrusion Detection Systems 35 42 50 61
Firewalls 81 91 78 95
Encrypted Files 50 61 62 64
Anti-virus software 96 98 100 98
Access Control 89 93 92 90

•False sense of security – “We already have a Firewall”


What is India inc’s biggest
threat?
• Cyber crime is now a bigger threat to India Inc
than physical crime. In a recent survey by IBM, a
greater number of companies (44%) listed cyber
crime as a bigger threat to their profitability than
physical crime (31%).

The cost of cyber crime stems primarily from loss


of revenue, loss of market capitalization, damage
to the brand, and loss of customers, in that order.
Civil Wrongs under IT Act
• Chapter IX of IT Act, Section 43
• Whoever without permission of owner of the
computer
• Secures access (mere U/A access)
• Not necessarily through a network
• Downloads, copies, extracts any data
• Introduces or causes to be introduced any viruses or
contaminant
• Damages or causes to be damaged any computer resource
• Destroy, alter, delete, add, modify or rearrange
• Change the format of a file
• Disrupts or causes disruption of any computer resource
• Preventing normal continuance of
• Denies or causes denial of access by any
means
• Denial of service attacks
• Assists any person to do any thing above
• Rogue Websites, Search Engines, Insiders
providing vulnerabilities
• Charges the services availed by a person to
the account of another person by tampering or
manipulating any computer resource
• Credit card frauds, Internet time thefts
• Liable to pay damages not exceeding Rs. One
crore to the affected party
Section 65: Source Code
• Most important asset of software
companies

• Ingredients
• Concealment, destruction, alteration

• Punishment
• imprisonment up to three years and / or
• fine up to Rs. 2 lakh
Section 66: Hacking
• Ingredients

– Destruction, deletion, alteration, diminishing


value or utility or injuriously affecting
information residing in a computer resource
• Punishment
– imprisonment up to three years, and / or
– fine up to Rs. 2 lakh
• Cognizable, Non Bailable,
Section 66 covers data theft as well as data alteration
Sec 69: Decryption of information
• Ingredients
• Controller issues order to Government agency to
intercept any information transmitted through any
computer resource.
• Order is issued in the interest of the
• sovereignty or integrity of India,
• the security of the State,
• friendly relations with foreign States,
• public order or
• preventing incitement for commission of a cognizable offence
• Person in charge of the computer resource fails to
extend all facilities and technical assistance to decrypt
the information-punishment upto 7 years.
Sec 70 Protected System

• Acts covered by this section:


• Switching computer on / off
• Using installed software / hardware
• Installing software / hardware

• Punishment
• Imprisonment up to 10 years and fine
• Cognizable, Non-Bailable, Court of Sessions
Causes of Non-Reporting of
Cyber Crimes in India
• Non Reporting-causes
• 60% feared negative
UNAUTHORISED
ACCESS 19%
publicity
• 23% did not know
police equipped to
E-MAIL ABUSE 21% handle cyber crimes
• 9% feared further cyber
attacks
DATA THEFT 33% • 8% had no awareness
of cyber laws
• False arrest concerns
Instuctions
1) Be cautious about information you share on online communities,
especially social sites like myspace, facebook, and twitter. Online
predators can use this information to steal your identity, harass you,
or stalk you.
2) Create difficult to guess passwords for all online accounts and pin
numbers. Vary your passwords so that if one of your passwords is ever
compromised you won't have to worry about all of your accounts.
3) Safe keep all of your personal information including your full name,
address, phone number, social security number, account numbers, and
passwords. Do not place such personal information on your multi-
media devices such as computers, mp3 players, and cell phones. Shred all
paperwork with such personal information on it.
4) Check your financial statements monthly to ensure there are no unusual
transactions.
5) When you shop online make sure you are using a secure website, like
ones with a url address that begins with "https" and/or businesses that have
had their website certificate verified by companies like Verisign
THANK YOU

You might also like