Download - Combating-cybercrimes-in-India (1)
-
8/7/2019 Combating-cybercrimes-in-India (1)
1/29
Study on Cyber
CrimeGuided by:
Dr. Deepak Shrivastava
Presented by:
Amit Pandit
Pranay Gehlot
Yash Raj Soni
-
8/7/2019 Combating-cybercrimes-in-India (1)
2/29
Introduction to Cyber crime
Computer Crime, E-Crime, Hi-Tech Crime or Electronic Crimeis where a computer is the
target of a crime or is themeans adopted to commit acrime.
Most of these crimes are notnew. Criminals simply devise
different ways to undertakestandard criminal activitiessuch as fraud, theft, blackmail,forgery, and embezzlementusing the new medium, ofteninvolving the Internet.
-
8/7/2019 Combating-cybercrimes-in-India (1)
3/29
Why is Computer Vulnerable?? Computers store huge amounts of data in small
spaces
Ease of access
Complexity of technology Human error
One of the key elements that keeps most members ofany society honest is fear of being caught thedeterrence factor. Cyberspace changes two of thoserules. First, it offers the criminal an opportunity of
attacking his victims from the remoteness of adifferent continent and secondly, the results of thecrime are not immediately apparent.
Need new laws and upgraded technology to combatcyber crimes
-
8/7/2019 Combating-cybercrimes-in-India (1)
4/29
Computer Viruses
yVirusesA computer virus is acomputer program that caninfect other computerprograms by modifyingthem in such a way as toinclude a (possibly evolved)copy of it. Note that a
program does not have toperform outright damage(such as deleting or corrupting files) in order tobe called a "virus".
Viruses
File
infectors
Boot record
infectors
Boot and
file
viruses
-
8/7/2019 Combating-cybercrimes-in-India (1)
5/29
-
8/7/2019 Combating-cybercrimes-in-India (1)
6/29
Types of Cyber crimes
Crime against persons
Crime against Government
Crime against property
-
8/7/2019 Combating-cybercrimes-in-India (1)
7/29
Cyber crimes
HackingInformation
Theft
E-mail
bombingSalami
attacks
Denial of
Service
attacks
Trojan
attacksWeb jacking
-
8/7/2019 Combating-cybercrimes-in-India (1)
8/29
Fake Profile casesA fake profile of a woman is created on social
networking site. The profile displays her
correct name and contact information (such
as address, residential phone number, cellphone number etc). Sometimes it even has
her photograph.
-
8/7/2019 Combating-cybercrimes-in-India (1)
9/29
Email Account Hacking The victims email account password is
stolen and the account is then misused
for sending out malicious code.
The victims email account password is
stolen and the hacker tries to extort
money
from the victim.
-
8/7/2019 Combating-cybercrimes-in-India (1)
10/29
Credit Card Fraud
The victims credit card information is
stolen and misused for making onlinepurchases (e.g. airline tickets, software,
subscription to pornographic websites
etc).
-
8/7/2019 Combating-cybercrimes-in-India (1)
11/29
Source Code Theft The suspect (usually an employee of
the victim) steals the source code andsells it to a business rival of the victim.
The suspect (usually an employee ofthe victim) steals the source code anduses it as a base to make and sell his
own version of the software.
-
8/7/2019 Combating-cybercrimes-in-India (1)
12/29
Software Piracy
The software pirate sells the pirated
software in physical media (usually CD
ROMs) through a close network ofdealers.
The software pirate sells the pirated
software through electronic downloads
through websites, bulletin boards,
newsgroups, spam emails etc.
-
8/7/2019 Combating-cybercrimes-in-India (1)
13/29
Music Piracy
The music pirate sells the pirated music
in physical media (usually CD ROMs)
through a close network of dealers.
-
8/7/2019 Combating-cybercrimes-in-India (1)
14/29
Email Scams Criminals are also using emails
extensively for their illicit activities.
-
8/7/2019 Combating-cybercrimes-in-India (1)
15/29
Phishing
The victim receives an email that
appears to have been sent from his
bank. The email urges the victim toclick on the link in the email. When the
victim does so, he is taken to a secure
page on the banks website
-
8/7/2019 Combating-cybercrimes-in-India (1)
16/29
Online Sale ofIllegal
Articles
The suspect posts information about
the illegal sale that he seeks to make.
Potential customers can contact theseller using the email IDs provided.
-
8/7/2019 Combating-cybercrimes-in-India (1)
17/29
Virus Attacks The virus is a general in the wild virus. This
means that it is spreading all over the world
and is not targeted at any specificorganisation.
The virus targets a particular organisation.
This type of a virus is not known to anti-virus
companies as it is a new virus createdspecifically to target a particular organisation
-
8/7/2019 Combating-cybercrimes-in-India (1)
18/29
-
8/7/2019 Combating-cybercrimes-in-India (1)
19/29
Computer Crime and Security Survey
Of the organizations suffering security compromises in the lastyear 95% had Firewalls and 61% had IDSs
981009896Anti-virus software
90929389Access Control
%%%%SECURITY TECHNOLOGIES
USED
64626150Encrypted Files
95789181Firewalls
61504235Intrusion Detection Systems
2009200820072006
False sense of security We already have a Firewall
-
8/7/2019 Combating-cybercrimes-in-India (1)
20/29
What is India incs biggest
threat?
Cyber crime is now a bigger threat to India Incthan physical crime. In a recent survey by IBM, agreater number of companies (44%) listed cybercrime as a bigger threat to their profitability than
physical crime (31%).
The cost of cyber crime stems primarily from lossof revenue, loss of market capitalization, damageto the brand, and loss of customers, in that order.
-
8/7/2019 Combating-cybercrimes-in-India (1)
21/29
Civil Wrongs underIT Act ChapterIX ofIT Act, Section 43 Whoever without permission of owner of the
computer Secures access (mere U/A access)
Not necessarily through a network
Downloads, copies, extracts any data
Introduces or causes to be introduced any viruses orcontaminant
Damages or causes to be damaged any computer
resource Destroy, alter, delete, add, modify or rearrange
Change the format of a file
Disrupts or causes disruption of any computer resource
Preventing normal continuance of
-
8/7/2019 Combating-cybercrimes-in-India (1)
22/29
Denies or causes denial of access by any
means Denial of service attacks
Assists any person to do any thing above
Rogue Websites, Search Engines, Insidersproviding vulnerabilities
Charges the services availed by a person tothe account of another person by tampering ormanipulating any computer resource
Credit card frauds, Internet time thefts
Liable to pay damages not exceeding Rs. Onecrore to the affected party
-
8/7/2019 Combating-cybercrimes-in-India (1)
23/29
Section 65: Source Code Most important asset of software
companies
Ingredients Concealment, destruction, alteration
Punishment
imprisonment up to three years and / or fine up to Rs. 2 lakh
-
8/7/2019 Combating-cybercrimes-in-India (1)
24/29
Section 66: Hacking
Ingredients
Destruction, deletion, alteration, diminishing
value or utility or injuriously affectinginformation residing in a computer resource
Punishment imprisonment up to three years, and / or
fine up to Rs. 2 lakh Cognizable, NonBailable,
Section 66 covers data theft as well as data alterationSection 66 covers data theft as well as data alteration
-
8/7/2019 Combating-cybercrimes-in-India (1)
25/29
Sec 69: Decryption of information
Ingredients Controller issues order to Government agency to
intercept any information transmitted through
any computer resource.
Order is issued in the interest of the sovereignty or integrity ofIndia,
the security of the State,
friendly relations with foreign States,
public order or
preventing incitement for commission of a cognizableoffence
Person in charge of the computer resource fails
to extend all facilities and technical assistance to
decrypt the information-punishment upto 7 years.
-
8/7/2019 Combating-cybercrimes-in-India (1)
26/29
Sec 70 Protected System
Acts covered by this section: Switching computer on / off
Using installed software / hardware
Installing software / hardware
Punishment Imprisonment up to 10 years and fine
Cognizable, Non-Bailable, Court of Sessions
-
8/7/2019 Combating-cybercrimes-in-India (1)
27/29
Causes of Non-Reporting of
Cyber Crimes in India
UNAUTHORISED
ACCESS 19%
E-MAIL ABUSE 21%
DATA THEFT 33%
Non Reporting-causes
60% feared negative
publicity 23% did not know
police equipped tohandle cyber crimes
9% feared furthercyber attacks
8% had no awarenessof cyber laws
False arrest concerns
-
8/7/2019 Combating-cybercrimes-in-India (1)
28/29
Instuctions
1) Be cautious about information you share on online communities,especially social sites like myspace, facebook, and twitter. Onlinepredators can use this information to steal your identity, harass you,or stalk you.
2) Create difficult to guess passwords for all online accounts and pinnumbers. Vary your passwords so that if one of your passwords is ever
compromised you won't have to worry about all of your accounts.3) Safe keep all of your personal information including your full name,address, phone number, social security number, account numbers, andpasswords. Do not place such personal information on your multi-media devices such as computers, mp3 players, and cell phones. Shred allpaperwork with such personal information on it.
y4) Check your financial statements monthly to ensure there are no unusual
transactions.5) When you shop online make sure you are using a secure website, like
ones with a url address that begins with "https" and/or businesses that havehad their website certificate verified by companies like Verisign
-
8/7/2019 Combating-cybercrimes-in-India (1)
29/29
THANK YOU