PC's
PC's
PC's
1.Introduction
Today an increasing number of companies are connecting to the Internet to support sales activities or to
provide their employees and customers with faster information and services. The virtual world has taken
over the real one, E-business and E-commerce, which are the new mantras and electronic transactions and
dominate the overall business paradigm. In this rapidly evolving e-world that depends on free flowing
information, security is the major problem to be considered.
SUK-MCA Page 1
Cyber crime
2.Objectives
The objective of the Cybercrime Centre will be to coordinate various efforts pertaining to
cybercrime prevention and regulation. It aims to provide assistance to law-enforcement agencies and
contribute to the fight against cybercrime. It will also aim to act as a centre for the emerging cybercrime
jurisprudence that is evolving. The Cybercrime Centre will also engage in providing training and capacity
building amongst the various stakeholders. It is expected that the Cybercrime Centre will be the focal point
efforts against cybercrime. It will also aim to primarily provide more distinct approaches on how to deal
with emerging cybercrimes. It would also aim to support various law enforcement agencies in India at the
Central and State level in building legal capacity for detection, investigation, and prosecution of
cybercrimes as also for cooperation with various international players.
The Cybercrime Centre will aim to develop the evolving jurisprudence on cybercrimes and also will aim to
look at all kinds of cybercrimes which are targeted against persons, property or nations.The objective of
cybersecurity is to prevent or mitigate harm to—or destruction of—computer networks, applications,
devices, and data. For cybersecurity strategy to succeed, it must continually evolve to keep pace with the
shifting strategies and technologies used by hackers.Cyber crime protects the data and integrity of
computing assets belonging to or connecting to an organization's network. Its purpose is to defend those
assets against all threat actors throughout the entire life cycle of a cyber attack.
SUK-MCA Page 2
Cyber crime
3.Literature Survey
Cyber crime which is considered as the illegal activity committed on the Internet is now a big threat
to the nation. Now a day’s number of internet users is increasing rapidly. As the use of Internet is
increasing by which any information can be accessed easily from anywhere, so various illegal activities
basing upon the internet are also increasing. A report McAfee estimates that the annual damage to the
global economy is at $445 billion; however, a Microsoft report shows that such survey-based estimates are
"hopelessly flawed" and exaggerate the true losses by orders of magnitude. Approximately $1.5 billion was
lost in 2012 to online credit and debit card fraud in the US. In 2016, a study by Juniper Research estimated
that the costs of cybercrime could be as high as 2.1 trillion by 2019. The majority of cyber crimes are
centered on forgery, fraud and phishing. India is the third most targeted country for phishing attack after
the US and the UK.
Social networks as well as e-commerce sites are major targets. India is said to be no.1 country in the
world for generating spam. The cyber crime has various categories where technology acts as instrument
and target . There are number of cyber crimes those categories into the type where technology acts as
instrument. These are as such: Money laundering, mass marketing fraud, child exploitation, cyber bullying,
intellectual property infringement, internet based drug trafficking. Some of the crimes where technology
acts as target are hacking for criminal purposes, malware threats, and distributed denial services.
SUK-MCA Page 3
Cyber crime
4.Methodology
4.1Basic Concept
Cyber crime is defined as Offences that are committed against individuals or groups of
individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or
mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such
as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS). Such crimes
may threaten a nation's security and financial health. Issues surrounding these types of crimes have become
high-profile, particularly those surrounding hacking, copyright infringement, child pornography, and child
grooming. There are also problems of privacy when confidential information is intercepted or disclosed,
lawfully or otherwise.
SUK-MCA Page 4
Cyber crime
4.2How it works
Cybercrime that targets computers often involves viruses and other types of
malware. Cybercriminals may infect computers with viruses and malware to damage devices or stop them
working. They may also use malware to delete or steal data. Then, use them to spread malware to other
machines or throughout a network.
Types of cybercrime
Phishing: using fake email messages to get personal information from internet users;
Misusing personal information (identity theft);
Hacking: shutting down or misusing websites or computer networks;
Spreading hate and inciting terrorism;
Distributing child pornography;
Grooming: making sexual advances to minors.
SUK-MCA Page 5
Cyber crime
4.3Disadvantages:
2) Incorrectly configured firewalls may block users from performing certain actions on the Internet, until
the firewall configured correctly.
4) Need to keep updating the new software in order to keep security up to date.
5. Conclusion
The future of cyber crime will in one sense be like the present: hard to define and potentially unbounded as
digital technologies interact with human beings across virtually all aspects of politics, society, the
economy, and beyond. We built this project on the proposition that both the “cyber” and the “security”
components of the concept “cybersecurity” will be in rapid motion during the back half of the 2010s. That
motion is more likely to accelerate than to decelerate, but its direction varies widely among our scenarios.
That is no artifact of our research process; it is the central point of the work. We hypothesize that, at some
point in the not-so-distant future (if it is not already true at present), cybersecurity will be recognized
widely as the “master problem” of the internet era. That puts it at the top of any list of problems that
societies face, more similar to a nearly existential challenge like climate change than to an operational
concern that technology companies have to manage. That recognition also will bring major changes to how
human beings and digital machines interact.
SUK-MCA Page 6
Cyber crime
References
SUK-MCA Page 7
Cyber crime
SUK-MCA Page 8