You are on page 1of 26

CYBER CRIME & SECURITY

“Your computer is the crime scene”

Seminar Guide: Presented By:


Mr. SUDEEP ELAYIDOM SUNNY KUMAR ADITYA
12080088
 HISTORY

 DEFINITION

 CLASSIFICATION

 DETECTION

 PREVENTION

Outline
 Thefirst recorded cyber crime took place in the
year 1820!
 Theloom allowed the repetition of a series of
steps in the weaving of special fabrics.
 Thisresulted in a fear amongst employees that
their traditional employment was being
threatened.
 They committed acts of sabotage to discourage
further use of the new technology.

HISTORY
 Internet
has offered us a much more convenient
way to share information across time and place.

 Cyberspace also opened a new venue for criminal


activities.

 Theanonymity of cyberspace makes identity


tracing a significant problem which hinders
investigations.

 Uninformed and misguided users .

Introduction
1.Computer as Target

2.Computer as an instrumentality

3.Computer as an incidental or other crime

4.Crime associated with the prevalence of


computers.

CLASSIFICATION OF CYBERCRIME
 Physical damage

 Theft or destruction of information (data).

 The spread of viruses , Trojans and worms .

 Software piracy, hacking etc.

COMPUTER AS A TARGET OF A CRIME


Crimes were either computers or their
contents bare used in furtherance of crime

Thoseoffences which are committed by


manipulating contents of computer systems.

Include sending e-mails, ransom notes ,


credit card frauds, telecommunication frauds
or theft.

Computer as an instrumentality.
With the advent of computer the criminal
have started using the technology as an
aid for its perpetuation.

They include use of computers as an aid


for drug trafficking, money laundering, etc

Means of coordinating .

Computer as Incidental
 Copyright violation
◦ Sharing of copyright material – Torrents

 Software piracy
◦ Selling material protected by copyrights

 Component theft

Crime with Prevalence of computers.


 Financial
crimes -cheating, credit card frauds, money laundering
Forgery etc.

 Sale of illegal articles:

 Online gambling:

 Intellectual Property crimes

 Theft of information contained in electronic form

 Email bombing

Types of cyber crime


 Data Diddling

 Salami attacks

 Email spoofing

 Cyber Defamation

 Cyber stalking

 Hacking

Types of cyber crime


 Denial of Service attack

 Virus / worm attacks

 Logic bombs

 Trojan attacks

 Internet time theft

 Web jacking

 Phishing

Types of cyber crime


Sending huge volumes of e-mail

To an address or server in an attempt to overflow


the mailbox or overwhelm the server

Zip Bombing

Methods of email bombing


 Mass Mailing
Link Listing

Email Bombing
Denial of Service - works by flooding the access
routers with bogus traffic.

Distributed DoSs (DDoS5) : coordinated DoS


attacks from multiple sources.

Difficult
to block because it uses multiple,
changing, source IP addresses.

Denial of Service
Changing of data before or during entry into the
computer system

Forging or counterfeiting documents used for data


entry

Exchanging valid disks and tapes with modified


replacements.

Prevention:
◦ Regular Audits
◦ Supervising employees

Data Diddling
A series of minor attacks that together results in a larger
attack

Used for financial crimes in which criminals steal money or


resources a bit at a time from a system

Prevention:
◦ Find indications of an attack
◦ Random audits
◦ Don't ignore what appear to be errors in computer-based financial
systems.

Salami Attack
The sender address and other parts of the e-mail
header are altered .

From, Return-Path and Reply-To fields

Although the e-mail appears to come from the address


indicated in the From field it actually comes from
another source.

Prevention
 Antivirus
 Use cryptographic signatures

E-mail Spoofing
Is a piece of code intentionally inserted
into a software system

That will set off a malicious function when


specified conditions are met

Prevention:
◦ Monitoring system
◦ Application logs are the keys to identifying
unwarranted activity

Logic Bomb
Unauthorizedremote computer break-ins via a
communication networks such as the Internet

Categories of hackers
◦ White hat or Ethical Hacker
◦ Grey hat
◦ Blue hat
◦ Black hat
◦ Elite
◦ Script kiddie

H4CK1NG
 It is not possible to eliminate cyber crime from the cyber space.

 It is quite possible to check them.

 Awareness is the first step in protecting yourself.

 Invest in Anti-virus, Firewall, and SPAM blocking software for your home PC.

 Passwords
◦ Change passwords on a regular basis
◦ Use complex passwords

 Do not automatically check boxes before reading the contents of any


agreement etc

What can I do?


Avoiding use of Unauthorized software

Avoid opening of unknown email.

Use internet filtering software.

Data Level Security


◦ Using encrypting softwares

What can I do?

You might also like