Docstoc

Cyber Crimes - Studentcubes.com

Document Sample
Cyber Crimes - Studentcubes.com Powered By Docstoc
					Cyber Crimes
               Cyber Crimes

                  Cyber Crimes
Introduction     Facts    Figures   Conclusion
Cyber Crimes

   Cyber Crimes

             Facts

   History

   Types
 Cyber Crimes


       Cyber Crimes

             Facts

Protection       Punishment
  Cyber Crimes


INTRODUCTION
By Syed Faris Yasrab
                Cyber Crimes
Introduction
• A crime or and illegal activity done through computers
  and devices.

• It can be of several types such as:
   – Bank account hacking
   – Credit cards number hacking
   – Virus Spreading
   – Software piracy etc.
                Cyber Crimes
Detailed Introduction of Cyber Crimes
Cyber crimes can be mainly subdivided into two types.




      Cyber Crimes

                      Crimes done to target a node or network

               Crimes done by using computer or a network, or device
                   Cyber Crimes
  Example of crimes done to target a node or
                   network

• Destroying the computer network
  A criminal can destroy the computer network by spreading the
  virus that can cause damage to the hardware or even software.

• Denial of service attacks
  Its is in an activity that basically floods the bandwidth of user
  internet so through this way his/her internet could be made slow.
               Cyber Crimes
    Example of crimes done using nodes or
                    networks
•   Cyber stalking
    The criminal follows the victim by sending emails,
    entering the chat rooms frequently.

•   Information warfare
    Stealing the information from someone’s computer or
    from some website using a computer.
                   Cyber Crimes
Effects of cyber crimes on internet
• World’s biggest network is now a victim of cyber crimes.
• People have stopped shopping over the internet.
• People are afraid of hackers.
• Data in information sharing websites like facebook, orkut and others,
  is now more secure.
• Fact that all of the data in information sharing website is under
  control or accessible by the intelligence agencies.
• Lot of software companies like, Microsoft and Symantec are going
  through great loss.
Cyber Crimes




  FACTS
  Cyber Crimes

History
By Muhammad Farhan Sheikh
               Cyber Crimes
• History of Cyber Crimes and Popular Acts
• This list shows the major events in the use of
  computers and computer networks to commit criminal
  acts, starting in the 1970's to the present day.
• 1973
•     Teller at New York's Dime Savings Bank uses a
  computer to embezzle over $2 million
• 1978
•     First electronic bulletin board system (BBS)
  appears; becomes the primary means of
  communication for the electronic underground..
                    Cyber Crimes
• 1983
         Movie War Games introduces public to the phenomenon of
         hacking (actually war-dialing).
         US Secret Service gets jurisdiction over credit card and
         computer fraud.

• 1985
         Online hacking magazine Phrack established.

• 1986
         Pakistani Brain, the oldest virus created under unauthorized
         circumstances, infects IBM computers.
                    Cyber Crimes
• Section 2 - 1990-2000
  1991
       Kevin Poulsen is captured and indicted for selling military
       secrets.

• 1992
         Dark Avenger releases 1st polymorphic virus.

• 1994
         16-year-old student, nicknamed “Data Stream”, arrested by UK
         police for penetrating computers at the Korean Atomic
         Research Institute, NASA and several US govt. agencies.
                    Cyber Crimes
Section 3 - 2001- Current

• 2001
       Microsoft falls victim of a new type of attack against domain
       name servers, corrupting the DNS paths taking users to
       Microsoft's Web sites. This is a Denial of Service (DoS) attack.
• 2005
       Netcraft survey estimates more than 60M web sites online.
       Paris Hilton’s T-Mobile phone is hacked, and photos and
       celebrity private phone numbers posted on Web (Feb).

• 2008
         FTC settles with “Life is Good” (www.lifeisgood.com), which e
         xposed credit card information due to SQL Injection flaw (Jan)
      Cyber Crimes

TYPES
By Muhammad Farhan Sheikh
                    Cyber Crimes
Types of Cyber Crimes

• HACKING
  Hacking in simple terms means illegal intrusion into a computer
  system without the permission of the computer owner/user.
• DENIAL OF SERVICE ATTACK
  Criminal who floods the bandwidth of the victim’s network or fills his e-
  mail box with spam mail depriving him of the services he is entitled to
  access or provide.
• VIRUS DISSEMINATION
  Malicious software that attaches itself to other software. For example:
  virus, worms, Trojan horse, time bomb, logic bomb, rabbit and
  bacterium are the malicious software.
                 Cyber Crimes
• SOFTWARE PIRACY
  Theft of software through illegal copy of genuine
  programs for counterfeiting and distribution of products
  intended to pass to the original.
• IRC CRIME
  Internet relay chat (IRC) servers have chat rooms in
  which people from anywhere the world can come
  together and chat with each other.
  Criminals use it for meeting co-conspirators.
  Hackers use it for discussing their exploits / sharing the
  techniques.
              Cyber Crimes
• CREDIT CARD FRAUD
  You simply have to type credit card number into
  www page of the vendor for online transaction. If
  electronic transactions are not secured the credit
  card numbers can be stolen by the hackers.
• NET EXTORTION
  Copying the company’s confidential data in
  order to extort said company for huge amount.
                 Cyber Crimes

• PHISHING
  It is technique of pulling out confidential information
  from the bank/financial institutional account holders
  by deceptive means.

• SPOOFING
  Getting one computer on a network to pretend to
  have the identity of another computer, usually one
  with special access privileges, so as to obtain
  access to the other computers on the network.
                    Cyber Crimes
• CYBER STALKING
  The criminal follows the victim by sending emails, entering the chat
  rooms frequently.

• CYBER DEFAMATION
  The criminal sends emails containing defamatory matters to all
  concerned of the victim or post the defamatory matters on a website.
  disgruntled employee may do this against boss).

• THREATENING
  The criminal sends threatening email or comes in contact in chat
  rooms with victims.
  (Any one disgruntled may do this against boss, friend or official).
                   Cyber Crimes
• SALAMI ATTACK
  In such crime criminal makes insignificant changes in such a
  manner that such changes would go unnoticed. Criminal make such
  programs that deducts small amount like RS 2.50 per month from
  the accounts of all the customers of the banks and deposit the same
  in his account. In this case no account holder will approach the bank
  for such small amount but criminal gains huge amount.

• SALE OF NARCOTICS
  Sale and purchase through net. There are websites which offer sale
  and shipment of contrabands drugs. They may use the techniques
  of stenography for hiding the messages
CYBER CRIMES

   By M.QASIM AZAM
       How can we
protect ourselves from
     cyber crimes
        Here we discuss some
    steps use      to taken to
  protect from cyber crimes:
Protection of social sites
Chose difficult passwords
Purchase good antivirus soft
 wares
Profile Protection
Don’t show yours personal
 information

 Checking financial
 statements
Don’t make relations through internet

Make online shopping secure.

Use your email provider's spam
 mail filters.
Keep an eye on your credit
 card transaction



Report about each and
 every crime
Punishment
 of Cyber
Crimes
  Real Cost of Cyber
                   Crime: only destroys the
Cyber crime is a type of crime that not
security system of a country but also its financial system.
One supporter of legislation against cyber crime, Rep.
Lamar Smith (R-Texas), stated,

Our mouse can be just as dangerous
       as a bullet or a bomb.
Cyber attackers should be penalized and punished severely
and most cyber crimes have penalties reflecting the severity
of the crime committed. Although in the past many laws
against cyber crimes were insufficient, law enforcement
agencies and governments have recently proposed many
innovative plans for fighting cyber crimes.
             Punishment
• Cyber crime must be dealt with very
  seriously because it causes a lot of
  damage to businesses and the actual
  punishment should depend on the type
  of fraud used.
• The penalty for illegally accessing a
  computer system ranges from 6
  months to 5 years. The penalty for the
  unofficial modification on a computer
  ranges from 5 to 10 years.
   Its penalties include:
• Telecommunication service theft:

• Communications intercept crime:
Information Technology Act-2000:
  According to this act, different penalties are
available for different crimes. Some of the
penalties are as follows:
• Computer source document tampering


• Computer hacking


• Government protected system
Cyber Crimes


Figures
by Syed Faris Yasrab
Cyber Crimes
             Cyber Crimes
CRIME RATED COUNTRIES(TOP 5)
1.   USA  23%
2.   CHINA  9%
3.   GERMANY 6%
4.   BRITAIN 5%
5.   BRAZIL 4%

                   Source Business Week (Symantec)
Cyber Crimes
Cyber Crimes


Counter
By Syed Faris Yasrab
                   Cyber Crimes
1. HACKING
    Computer networks should be made more secure.
    Fire walls should always be turned on.

2. DENIAL OF SERVICE ATTACK
     Your bandwidth network should be safe and its IPs should be
     hidden so no one can access it.

3. VIRUS DISSEMINATION
     To protect yourself from viruses you should always keep a reliable
     antivirus with latest anti virus definitions.
                   Cyber Crimes
4. SOFTWARE PIRACY
   The security companies should check from shop to shop whether
   the sellers are selling the software legally or not.

5. IRC CRIME
    There should be a check that none of extra presons(hackers) should
    enter the chat rooms.

6. CREDIT CARD FRAUD
   People should stop shopping over the internet through the credit
   cards or the shopping system should be made secure enough.
                 Cyber Crimes
7. NET EXTORTION
   Each of the company should make their database more
   secure( not accessible by others).

8. PHISHING
   Bank’s confidential data is most important to it, so much
   important that it should not be visible to even it’s all of
   employs. Imagine how dangerous it would be when
   hackers would be able to access it. So all of the banks
   should make their banking system and its data more
   private and secure.
                Cyber Crimes
9 SPOOFING
  Network’s privileges must be stricter over the entire network.
  If one computer can pretend to be another computer in a
  network it can visit all of the computers.

10 CYBER STALKING
  Criminals can follow their targets by email s and by
  frequently visiting the chat rooms, so less popular or less
  secure chat rooms should not be visited and less trusted
  sites should not be selected for making email addresses.
                Cyber Crimes
11.CYBER DEFAMATION AND THREATENING
  Email spamming should be stopped over the networks. It’s
  the responsibility of email service providers to keep watch
  on the hackers.

12.SALAMI ATTACK
  Banks should make their online banking systems more
  secure, because deducting such amount wont effect the
  customer but the hacker.

13.SALE OF NARCOTICS
  Intelligence crimes agencies against the sale of narcotics
  should made their detecting more efficient.
Cyber Crimes


QUESTIONS

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:2
posted:12/22/2012
language:Unknown
pages:45