Cyber Crime and Cyber Security by Jyoti Lakhani
Cyber Crime and Cyber Security by Jyoti Lakhani
Cyber Crime and Cyber Security by Jyoti Lakhani
Electronic Crime
e-Crime
The first spam email took place in 1978 when it was sent
out over the Arpanet (Advanced Research Projects Agency
Network)
Insider threat
An Insider threat is a malicious threat
to an organization Employees itself
Hackers
A hacker is someone who seeks and
exploits weaknesses in a computer system
or computer network
Cyber-Criminals
Hactivist
(overloads e-mail servers or hack web sites to send
political message)
Cyber-Criminals
Virus writers
(writes viruses to infect systems)
Cyber-Criminals
Criminal groups
(attack systems & steal password for financial
gain)
Cyber-Criminals
Sensitive intrusions
(sensitive information is obtained via
computer intrusions)
Cyber-Criminals
Information warfare
(alternative to military attacks)
Cyber-Criminals
Terrorists
(who have potential to disrupt
government systems with computer
attacks)
Cyber-Criminals
Cyber Warfare
(attack by sovereigns ---
Crime or Declaration of war)
ATTACK
Weapons Cyber Crime
Hacking
Unauthorized access to any
computer systems or networks is
known as ‘HACKING’. That is
accessing the information of
others without proper
authorization.
Weapons of Cyber Crime
Data Diddling
This is altering raw data just
before a computer processes
it and then changing it back
after the processing is
completed.
Weapons of Cyber Crime
Email Bombing
Trojan Attacks
This term has its origin in the word
‘Trojan horse’. In software field this
means an unauthorized program,
which passively gains control over
another’s computer by representing
itself as an authorized program. The
most common form of installing a
Trojan is through e-mail.
Weapons of Cyber Crime
Web Jacking
This term is derived from the term hi jacking. In these kinds of
offences the hacker gains access and control over the website of
another. He may even manipulate or change the information of
the website. This may be done for fulfilling political objectives or
for money.
Weapons of Cyber Crime
Virus Attack
Worm Attacks
Worms unlike viruses do not need the host to attach themselves
to. They merely make functional copies of themselves and do this
repeatedly till they eat up all the available space on the
computer’s memory.
Weapons of Cyber Crime
Salami Attacks
Phishing
Phishing refers to the receipt of unsolicited emails by
customers of Financial Institutions, requesting them to enter
their Username, Password or other personal information to
access their Account for some reason. The fraudster then has
access to the customer’s online bank account and to the
funds contained in that account.
Weapons of Cyber Crime
Spamming
Electronic spamming is the use of electronic messaging
systems to send unsolicited bulk messages (spam),
especially advertising, indiscriminately. The most widely
recognized form of spam is e-mail spam.
Weapons of Cyber Crime
Hacking
Cyber Squatting (is registering, trafficking in, or using a domain name with bad faith
intent to profit from the goodwill of a trademark belonging to someone else.)
Transmitting Virus
Internet Time Thefts - Internet time theft comes under the heading of hacking. It is
the use by an unauthorized person of the Internet hours paid for by another person.
Cyber Crimes Against Government
Cyber Terrorism:
Cyber Terrorism is a phrase
used to describe the use of Internet based
attacks in terrorist activities, including acts of
deliberate, large-scale disruption of computer
networks, especially of personal computers
attached to the Internet, by the means of tools
such as computer viruses.
Cyber crimes Against Society
Cyber Trafficking Drug traffickers are increasingly taking advantage of the Internet"
according to cyber authorities and personnel. to sell their illegal substances through
encrypted
Online Gambling (gambling using the Internet.)
Forgery - person is guilty of forgery if he or she makes a false instrument with the
intention that it shall be used to induce another person to accept it as genuine and,
by reason of so accepting it, to do some act, or to make some omission, to the
prejudice of that person or any other person.
CYBER CRIME
IN
INDIA
Cyber Crime in INDIA
Cyber Crime in India Some Facts
• India is the third-most targeted country for Phishing attacks after the US and the UK
• India : world’s third largest Internet user after China and the US
• Younger Users
Crime: Spoofing
Crime: Pornography