Presented By: Shalini Sharma CSE-02 Gimt

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 23

PRESENTED BY:

SHALINI SHARMA
CSE-02
GIMT
CONTENTS
• Introduction
• Reasons for Cyber Crime
• Cyber Criminals
• Modes and Manner of Committing Cyber
Crime
• Types of Cyber Crime
• Prevention
• Detection
• Conclusion
INTRODUCTION

• Computer crime or cybercrime, refers to any


crime that involves a computer and a network.
The computer may have been used in the
commission of a crime, or it may be the target.
COMPUTER CRIME is any crime where –
 Computer is a target.
 Computer is a tool of crime
 Computer is incidental to crime
REASONS FOR CYBER CRIME

The reasons for the


vulnerability of computers
may be said to be:
1. Capacity to store data in
comparatively small space
2. Easy to access
3. Complex
4. Negligence
5. Loss of Evidence
CYBER CRIMINALS:

The cyber criminals constitute of various


groups/ category. This division may be
justified on the basis of the object that they
have in their mind. The following are the
category of cyber criminals
1. Children and adolescents between the age
group of 6 – 18 years 
2.  Organised hackers
3. Professional hackers / crackers
4. Discontented employees
 
MODE AND MANNER OF COMMITING CYBER CRIME:

1. Unauthorized access to computer systems or


networks / Hacking
2. Theft of information contained in electronic
form-
3. Email bombing
4. Data diddling
5. Salami attacks
6. Denial of Service attack
 
MODE AND MANNER OF COMMITING CYBER CRIME:

7. Virus / worm attacks


8. Logic bombs
9. Trojan attacks
10. Internet time thefts
11. Web jacking
TYPES OF CYBER CRIME

Cyber Crime refers to all activities done with


criminal intent in cyberspace. These fall into
three slots.
• Those against persons.
• Against Business and Non-business
organizations.
• Crime targeting the government
AGAINST INDIVIDUALS
i. Harassment via e-mails.
ii. Cyber-stalking.
iii. Dissemination of obscene material.
iv. Defamation.
v. Unauthorized control/access over computer
system
vi. Indecent exposure
vii. Email spoofing 
viii. Cheating & Fraud
AGAINST ORGANIZATION

i. Unauthorized control/access over computer


system
ii. Possession of unauthorized information
iii. Computer vandalism.
iv. Transmitting virus
v. Distribution of pirated software etc.
Crime targeting the government
A cyber terrorist is the person who uses the computer
system as a means or ends to achieve the following
objectives
(1) putting the public or any section of the public in fear
(2) affecting adversely the harmony between different
religious, racial, language or regional groups or castes
or communities; or
(3) coercing or overawing the government established
by law; or
(4) endangering the sovereignty and integrity of the
nation
PREVENTION
Prevention is always better than cure. It is
always better to take certain precaution while
operating the net. These may include:
• Preventive steps for Individuals
• Preventive steps for Organizations and
Government.
PREVENTIVE STEPS FOR INDIVIDUALS

• CHILDREN: Children should not give out


identifying information such as Name, Home address,
School Name or Telephone Number in a chat room.
• PARENTS: Parent should use content filtering
software on PC to protect children from gambling,
hate speech, emotional blackmail drugs and alcohol.
• GENERAL INFORMATION: Don’t delete harmful
communications (emails, chats etc). They will
provide vital information about system and address of
the person behind these.
PREVENTIVE STEPS FOR
ORGANISATIONS & GOVT.
• PHYSICAL SECURITY: Physical security is most sensitive
component, as prevention from cyber crime Computer
network should be protected from the access of
unauthorized persons
• ACCESS CONTROL: Access Control system is generally
implemented using firewalls
• PASSWORD: The use of passwords in the most common
security for network system including servers, routers and
firewalls
• FINDING THE HOLES IN NETWORK: System managers
should track down the holes before the intruders do.
PREVENTIVE STEPS FOR
ORGANISATIONS & GOVT.
• USING NETWORK SCANNING PROGRAMS:
This utility scans and gathers information about any
host on a network, regardless of which operating
system or services the hosts were running.
• USING INTRUSION ALERT PROGRAMS: There
are some intrusion programs, which identify suspicious
activity and report so that necessary action is taken.
• USING ENCRYPTION: Encryption allows sending
confidential documents by E-mail or save confidential
information on laptop computers without having to fear
that if someone steals it the data will become public.
DETECTION
Some of the Cyber Crimes like network Intrusion are
difficult to detect and investigation even though most
of crimes against individual like cyber stalking, cyber
defamation can be detected and investigated through
following steps:
After receiving such type of mail :
(1) Give command to computer to show full header of
mail.
(2) In full header find out the IP number and time of
delivery of number and this IP number always
different for every mail.
DETECTION
From this IP number we can know who was the
Internet service provider for that system from which
the mail had come.
(3) To know about Internet Service Provider from IP
number take the service of search engine like
nic.com, macffvisualroute.com, apnic.com, arin.com.
(4) After opening the website of any of above
mentioned search engine, feed the IP number and
after some time name of ISP can be obtained.
DETECTION
(5) After getting the name of ISP we can get the
information about the sender from the ISP by
giving them the IP number, date and time of
sender.
(6) ISP will provide the address and phone
number of the system, which was used to send
the mail with bad intention.
OTHER PREVENTIVE MEASURES
1. Avoid disclosing any information pertaining
to oneself. This is as good as disclosing your
identity to strangers in public place.
2. always avoid sending any photograph online
particularly to strangers and chat friends
3. always use latest and up date anti virus
software.
4. always keep back up volumes
5. never send your credit card number to any
site that is not secured
OTHER PREVENTIVE MEASURES
6. always keep a watch on the sites that your children are
accessing.
7. it is better to use a security programme that gives
control over the cookies and send information back to
the site
8. web site owners should watch traffic and check any
irregularity on the site.
9. use of firewalls may be beneficial.
10.web servers running public sites must be physically
separate protected from internal corporate network.
CONCLUSION
 Cyber crime is a multi-billion dollar problem.
 It is criminals activity committed on internet.
 This is a broad term that describes everything from
electronic cracking to denial of service attacks that
cause electronic commerce sites to loss money
 It is not possible to eliminate cyber crime from the
cyber space. But it is quite possible to check them
 The possible step is to make people aware of their
rights and duties and further making the application
of the laws more stringent to check crime.
ANY QUERY

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy