seminar on cyber crime

19
SEMINAR ON CYBER CRIME

Upload: likan-patra

Post on 28-Jan-2015

32.551 views

Category:

Technology


0 download

DESCRIPTION

cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.

TRANSCRIPT

Page 1: Seminar on Cyber Crime

SEMINAR ON

CYBER CRIME

Page 2: Seminar on Cyber Crime

Introduction

History of cyber crime

Definition

Categories of cyber crime

Types of cyber crime

Cyber criminals

Prevention

conclusion

Page 3: Seminar on Cyber Crime

INTRODUCTION

The internet in India is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education.

There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.

Page 4: Seminar on Cyber Crime

History of Cyber Crime The first recorded cyber crime took place in the year 1820!

In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!

Page 5: Seminar on Cyber Crime

Defining Cyber Crime

It’s an unlawful act wherein the computer is either a tool or a target or both.

Acts that are punishable by the Information Technology Act.

Cyber space is a virtual space that has become as important as real space for business, politics, and communities .

Page 6: Seminar on Cyber Crime

CATEGORIES OF CYBER CRIME:

Cyber crimes can be basically divided into 3 major categories:

1. Cyber crimes against persons.

2. Cyber crimes against property.

3. Cyber crimes against government

Page 7: Seminar on Cyber Crime

FIRST CATEGORY

Cyber harassment is a distinct Cyber crime. Various kinds of harassment can and do occur in cyberspace, or through the use of cyberspace. Harassment can be sexual, racial, religious, or other.

Page 8: Seminar on Cyber Crime

SECOND CATEGORY

These crimes include computer vandalism (destruction of others' property), transmission of harmful programs, unauthorized trespassing through cyber space, unauthorized possession of computer information.

Page 9: Seminar on Cyber Crime

THIRD CATEGORY

Cyber terrorism is one distinct kind of crime in this category.

The growth of internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country.

Page 10: Seminar on Cyber Crime

Types Of Cyber Crime

Modification of a conventional crime by using computers.

Frequently Used Cyber Crimes.

Page 11: Seminar on Cyber Crime

Modification of a conventional crime by using computers.

Financial crimes

Cyber pornography

Sale of illegal articles

Online gamblingBACK

Page 12: Seminar on Cyber Crime

Intellectual Property crime

Email spoofing

Forgery

Cyber Defamation

Cyber stalking

Page 13: Seminar on Cyber Crime

Frequently Used Cyber Crimes.

Unauthorized access to computer systems or networks

Theft of information contained in electronic form

Email bombing

Data diddling

Salami attacks

Denial of Service attack

BACK

Page 14: Seminar on Cyber Crime

Virus / worm attacks

Logic bombs

Trojan attacks

Internet time thefts

Web jacking

Theft of computer system

Physically damaging a computer system

Page 15: Seminar on Cyber Crime

Cyber CriminalsKids (age group 9-16 etc.)

Organized hacktivists

Disgruntled employees

Professional hackers (corporate espionage)

Page 16: Seminar on Cyber Crime

PREVENTION Disable and log off a specific user account to prevent access. Disable and log off a group of user accounts which access a particular service that is being attacked. Disable and dismount specific (network) devices, for instance disk devices that are being swamped.

Page 17: Seminar on Cyber Crime

Disable specific applications, for example, an e-mail system subjected to a SPAM attack.

Close down an entire system, and divert

processing to an alternative or backup service on a secondary network.

Page 18: Seminar on Cyber Crime

conclusionwithin the law enforcement agencies, a set of rules must be developed to address the various categories of computer crime.

As such, investigators will know what and which materials to search and seize, the electronic evidence to recover, and the chain of custody to maintain .

Page 19: Seminar on Cyber Crime

THANK YOU.