SlideShare a Scribd company logo
PRESENTATION BY,
R JAYAPRASANTH
V ARAVINDAN
Illegal activity committed using computer
Cyber crime and security
Overview
Abstract
Introduction to Cybercrime
Hacking
Hackers
⚪Code crackers
⚪ Viruses, Worms
⚪Trojan horse
⚪E-mail bombing
Data diddling
Intellectual property crimes
Fake credit card creators
Three categories of Cybercrimes
Various types of Cyber fraud
Cyber security and statergies
Conclusion
Abstract
Cybercrime are more properly restricted to describing criminal activity.
network is a necessary part of the crime.
include traditional crimes, such as fraud, theft, blackmail, forgery.
Computer crime can broadly be defined as criminal activity involving an information
technology infrastructure, including illegal access (unauthorized access), Code cracking,
Spreading viruses and worms, Data diddling, intellectual property crimes, Hacking, Forgery.
There are also problems of privacy when confidential information is lost or intercepted,
lawfully or otherwise.
Introduction to Cybercrime
The purpose of this paper is to understand Cybercrime
And the legal aspects of Cyber security and to help harmorize legal frameworks.
As such, it aims to help better understand the national and international implications of
growing cyber threats.
to assess the requirements of existing national, Regional and international instruments, and to
assist in establishing a sound legal foundation.
It provides a comprehensive overview of the most relevant topics linked to the legal aspects of
Cybercrime.
Hacking
The actual word is “Cracking” and not “Hacking”.
Hacking has been defined as "Deliberately gaining unauthorised access to an information
system.“
They help the government to protect national documents.
A cracker is generally someone who breaks into someone else's computer system, often on a
network, bypasses passwords or licenses in computer programs.
A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or
because the challenge is there.
Hackers
Criminals Can Operate Anonymously Over the Computer Networks. Hackers
Invade Privacy.
Hackers Destroy "Property" in the Form of Computer Files or Records. Hackers
Injure Other Computer Users by Destroying Information Systems.
Code crackers:
They know computers inside out.
They break into computer systems.
It involves breaking the security on software applications.
They combine their in-depth knowledge of the Internet and the mass
telecommunications system.
Contd…
✔Viruses builders
A virus is a programme that mayor may not attach itself to a file an
replicate itself.
It can attack any area: from corrupting the data of the file.
✔Worms
Worms may also invade a computer and steal its resources to replicate
themselves.
"Love bug" is a recent.
Contd…
✔Trojan 🐎
Trojan horse is dicey.
It appears to do one thing but does something else. The system may accept it as one
thing.
it may release a virus, worm or logic bomb.
✔
Email bombing refers to sending a large number of emails to the victim resulting in the
victim’s email account (in case of an individual) or mail servers (in case of a company or an email service provider)
crashing.
Data diddling
This kind of attack involves altering raw data just before it is processed by a computer and then
changing it back after the processing is completed.
The NDMC Electricity Billing Fraud Case that took place in 1996 is a typical example. The
computer network was used for receipt and accounting of electricity bills by the NDMC, Delhi.
Intellectual property crimes
These include software piracy, copyright infringement, trademarks violations, theft of computer
source code etc for e.g Email spoofing.
A spoofed email is one that appears to originate from one source but actually has been sent
from another source.
Fake credit card creators
Cyber terrorism
Three categories of Cybercrime
1.Cyber piracy: using cyber-technology in unauthorized ways to:
a. Reproduce copies of proprietary software and proprietary information
b. Distribute proprietary information (in digital form) across a computer network.
2.Cybertrespass : using cyber-technology to gain or to exceed unauthorized access to:
a. An individual's or an organization's computer system
b. A password-protected Web site.
3.Cybervandalism:using cyber-technology to unleash one or more programs that:
a. Disrupt the transmission of electronic information across one or more computer networks, including the
Internet
b. Destroy data resident in a computer or damage a computer system's resources, or both.
Various types of fraud
There are several types of cyber crimes that are occurring in the networking world some of these are as written below-
1.Financial fraud
2. Sabotage of data and other networks
3. Theft of proprietery information
4. System penetration from outside
5. Denial of service
6. Unauthorised access by insiders
7. Employee use of internet service privileges
8. Viruses
0
10
20
30
40
50
60
70
80
90
Chart Title
Cyber crime & security
Cyber security and statergies
Make sure you have a good anti-virus software which regularly runs scanning programmes for
spy ware, a personal firewall and a spam filter
Never keep passwords stored on your computer, or disclose them to anybody.
If you are accessing banking details from a computer that is used by other people, ensure you do
not click on "save" password, as another user could gain access.
Use Bio-metrics.
Contd…
Conclusion
The cybercrime as a whole refers to Offences that are committed against individuals or groups of individuals.
Such crimes may threaten a nation’s security and financial health. Issues surrounding this type of crime have become
high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming.
A computer can be a source of evidence. Even when a computer is not directly used for criminal purposes,
so the network must be secure as no one can access the information of the computer.
Cyber crime & security

More Related Content

Cyber crime & security

  • 1. PRESENTATION BY, R JAYAPRASANTH V ARAVINDAN Illegal activity committed using computer Cyber crime and security
  • 2. Overview Abstract Introduction to Cybercrime Hacking Hackers ⚪Code crackers ⚪ Viruses, Worms ⚪Trojan horse ⚪E-mail bombing Data diddling Intellectual property crimes Fake credit card creators Three categories of Cybercrimes Various types of Cyber fraud Cyber security and statergies Conclusion
  • 3. Abstract Cybercrime are more properly restricted to describing criminal activity. network is a necessary part of the crime. include traditional crimes, such as fraud, theft, blackmail, forgery. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, including illegal access (unauthorized access), Code cracking, Spreading viruses and worms, Data diddling, intellectual property crimes, Hacking, Forgery. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.
  • 4. Introduction to Cybercrime The purpose of this paper is to understand Cybercrime And the legal aspects of Cyber security and to help harmorize legal frameworks. As such, it aims to help better understand the national and international implications of growing cyber threats. to assess the requirements of existing national, Regional and international instruments, and to assist in establishing a sound legal foundation. It provides a comprehensive overview of the most relevant topics linked to the legal aspects of Cybercrime.
  • 5. Hacking The actual word is “Cracking” and not “Hacking”. Hacking has been defined as "Deliberately gaining unauthorised access to an information system.“ They help the government to protect national documents. A cracker is generally someone who breaks into someone else's computer system, often on a network, bypasses passwords or licenses in computer programs. A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there.
  • 6. Hackers Criminals Can Operate Anonymously Over the Computer Networks. Hackers Invade Privacy. Hackers Destroy "Property" in the Form of Computer Files or Records. Hackers Injure Other Computer Users by Destroying Information Systems. Code crackers: They know computers inside out. They break into computer systems. It involves breaking the security on software applications. They combine their in-depth knowledge of the Internet and the mass telecommunications system.
  • 7. Contd… ✔Viruses builders A virus is a programme that mayor may not attach itself to a file an replicate itself. It can attack any area: from corrupting the data of the file. ✔Worms Worms may also invade a computer and steal its resources to replicate themselves. "Love bug" is a recent.
  • 8. Contd… ✔Trojan 🐎 Trojan horse is dicey. It appears to do one thing but does something else. The system may accept it as one thing. it may release a virus, worm or logic bomb. ✔ Email bombing refers to sending a large number of emails to the victim resulting in the victim’s email account (in case of an individual) or mail servers (in case of a company or an email service provider) crashing.
  • 9. Data diddling This kind of attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed. The NDMC Electricity Billing Fraud Case that took place in 1996 is a typical example. The computer network was used for receipt and accounting of electricity bills by the NDMC, Delhi.
  • 10. Intellectual property crimes These include software piracy, copyright infringement, trademarks violations, theft of computer source code etc for e.g Email spoofing. A spoofed email is one that appears to originate from one source but actually has been sent from another source.
  • 11. Fake credit card creators
  • 13. Three categories of Cybercrime 1.Cyber piracy: using cyber-technology in unauthorized ways to: a. Reproduce copies of proprietary software and proprietary information b. Distribute proprietary information (in digital form) across a computer network. 2.Cybertrespass : using cyber-technology to gain or to exceed unauthorized access to: a. An individual's or an organization's computer system b. A password-protected Web site. 3.Cybervandalism:using cyber-technology to unleash one or more programs that: a. Disrupt the transmission of electronic information across one or more computer networks, including the Internet b. Destroy data resident in a computer or damage a computer system's resources, or both.
  • 14. Various types of fraud There are several types of cyber crimes that are occurring in the networking world some of these are as written below- 1.Financial fraud 2. Sabotage of data and other networks 3. Theft of proprietery information 4. System penetration from outside 5. Denial of service 6. Unauthorised access by insiders 7. Employee use of internet service privileges 8. Viruses 0 10 20 30 40 50 60 70 80 90 Chart Title
  • 16. Cyber security and statergies Make sure you have a good anti-virus software which regularly runs scanning programmes for spy ware, a personal firewall and a spam filter Never keep passwords stored on your computer, or disclose them to anybody. If you are accessing banking details from a computer that is used by other people, ensure you do not click on "save" password, as another user could gain access. Use Bio-metrics.
  • 18. Conclusion The cybercrime as a whole refers to Offences that are committed against individuals or groups of individuals. Such crimes may threaten a nation’s security and financial health. Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. A computer can be a source of evidence. Even when a computer is not directly used for criminal purposes, so the network must be secure as no one can access the information of the computer.