0% found this document useful (0 votes)
92 views

Community Service Project(Ramya)[1]

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
92 views

Community Service Project(Ramya)[1]

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

CYBER CRIME

COMMUNITY SERVICE PROJECT REPORT


submitted to Jawaharlal Nehru Technological University ,Kakinada

In partial fulfilment of requirement for the award of degree of Bachelor of

Technology

in
INFORMATION TECHNOLOGY
Submitted by : -
CHINTA LAKSHMI RAMYA KEERTHANA -21KE1A1215

DARAM POOJITHA -21KE1A1218

PASALA MEGHANA -21KE1A1246

Under the esteemed Guidance of

V.SUDHAKAR

Professor of the department of


INFORMATION TECHNOLOGY

DEPARTMENT OF INFORMATION TECHNOLOGY


MALINENI LAKSHMAIAH WOMEN’S AND ENGINERRING COLLEGE
(Approved by AICTE& affiliated to Jawaharlal Nehru Technological University Kakinada)
Vatticherukuru (M),Pulladigunta(V),Guntur(DT)_52201)

2021-2025
DEPARTMENT OF INFORMATION TECHNOLOGY

COMMUNITY SERVICE PROJECT REPORT

2021-2025
Vision of the Department

To be a Centre of Excellence in Electronics and


Communication Engineering by providing quality education
and Producing Competent women Engineersto Address Global challenges of the society

Mission of the Department


 To impart a deep thirst for a lifelong learning by employing practical teaching and
learning methodologies.
 To Nurture ethical and socio-economical values amongst the learners through
conducive learning environment.
 To inculcate professional excellence in higher education and research
through industry-institute interaction.
 To strengthen entrepreneurial attitude and soft skills through co-
curricular and extracurricular activities
DEPARTMENT OF
INFORMATION TECHNOLOGY

CERTIFICATE
This is to certify that the community service project report entitled “CYBER CRIMES” is being
submitted by

CHINTA LAKSHMI RAMYA KEERTHANA - 21KE1A1215

DARAM POOJITHA - 21KE1A1218


PASALA MEGHANA - 21KE1A1246
In partial fulfillment for the award of Bachelor of Technology in INFORMATION TECHNOLGY
to the Jawaharlal Nehru Technological University, Kakinada is

a record of bonafide work carried out by them under my guidance and supervision. The
results embodied in this project report have not been submitted to any other University or
Instituted for the award of any degree or diploma.

Signature of Guide Signature of HOD.


Dr.K.SUNITHA
Professor and Head
EXTERNAL EXAMINER

ACKNOWLEDGEMENT
We would like to express a deep sense of the gratitude and thanks
profusely to our guide Dr .K. SUNITHA without wise counsel and able
to guidance, it would have been impossible to complete the project
in this manner.

We also express our gratitude to Dr .K.SUNITHA head of the


department ,for his support and suggestions .

We also express gratitude to Dr .J. Apparao principal of our


college,for his guidance and co-operation during our course of study.
We extend our sinicere thanks to Dr .M. Perumallu,chairman of our
college ,for providing sufficient infrastructure and good enivironment
in the college to complete our course.
Great acknowledgement is expressed to our coordinator ,teachimg
and non- teaching members whose support cannot be ignored in
completing this project in time.

Special thanks to our friends for their co-operation during our course
of study.
Last but not least ,we wish to thank our parentsand family members
without whom it is impossible for us stay at this level.
CHINTA LAKSHMI RAMYA KEERTHANA(21KE1A1215)
DARAM POOJITHA (21KE1A1218)
PASALA MEGHANA (21KE1A1246)

CONTENTS:- Page No:-

Introduction :

Socio ecnomic of cybercrime :

Some common cybercrime :

Cyberlaws in world :
Analysis :

Types of cyber crime : Preventations :

Outcomes :

Recommendations :

Suggestions :

Survey questions :
Conclusion :

ABSTRACT

Cyber crimes are a new class of crimes to India rapidly expanding due to extensive use of Internet.
Dishonest and greedy people take advantage of easy and free access to Internet and perform any
acts to satisfy their needs. The need could be physiological or psychological in nature.2 Online
shopping and wide use of “social media” are root cause of cyber crimes. Much awareness created
for cyber crimes and users were educated. But still people do not complain it to authorities. Even
somebody do it then also police or crime branch unable to clear such complains in reasonable time
period. Delay in justice will lead to NO registration of complain. This is not healthy situation in free
democratic INDIA. The law IT (Information Technology) Act 2000 and several sections of the IPC are
in place but in large population country like China and India, it is very difficult to control crime
caused by cyber world. We need to have self control for better society. We shall evaluate impact of
social media, trends towards shopping online and punishment for cyber attackers in this paper. We
shall also try to prepare road map for Indian and recommend approach suitable for young
generation of India.
INTRODUCTION
 Activity in which computers or networks are a tool, target, or a place of criminal activity.
 cyber crime is a subset of computer crime. In a cyber crime, the computer network can
be;

 The tool of a crime


 The target of a crime
 Used for purpose incidental to a crime
 Cyber crime is also called as computer crime,use of a computer as an instrumento
further illegal ends,such as committing fraud,trafficking in child pornography and
intellectual property,stealing identities or violating privacy.

 Offences that are committed against individuals or group of individuals with a criminal
motive to intentionally harm the reputation of the victim or cause physical or mental
harm to the victim directly or indirectly, using modern telecommunication networks such
as internet .
 Cyber crime is a term for any illegal activity that uses a computer as its primary means of
communication. The U.S. department of Justice expands the definition of cyber crime
and includes any illegal activity that uses a computer for the storage of evidence.
 Cyber crime also stated as any use of a computer as an instrument of further illegal
ends, such as;

Committing fraud
Stealing identities
SOCIO ECONOMIC OF CYBER CRIME

 Offences that are committed against individuals or group of individuals with a criminal
motive to intentionally harm the reputation of the victim or cause physical or mental
harm to the victim directly or indirectly, using modern telecommunication networks
such a s internet.
 Cyber crime is a term for any illegal activity that uses a computer as its primary means of
communication. The U.S. department of Justice expands the definition of cyber crime
and includes any illegal activity that uses a computer for the storage of evidence.
 Cyber crime also stated as any use of a computer as an instrument of further illegal
ends, such as;
 programs or other executable system software causing damage fo the files.

 Phishing: Phishing A computer virus is a computer program or attaches itself to


application occurs when the perpetrator sends fictitious e-mails to individuals with links
to fraudulent websites that appear official and thereby cause the victim to release
personal information to the perpetrator.

 Hacking: The act of penetrating or gaining unauthorized access to or use of data


unavailable in a computer system or a computer network for the purpose of gaining
knowledge, stealing or making unauthorized use of the data.

 Spoofing : Spoofing is the creation of TCP/IP packets using somebody else’s IP address.

Netsplonage: Netsplonage occurs when perpetrators back into online systems or individual
PCs to obtain confidential information for the purpose of selling it to other parties.

SOME COMMON CYBER CRIMES


Cyber stalking: Cyber stalking refers to the use of the internet, email or
other electronic communications device to stalk another person. Iis an
electronic harassmet that involves harassing or threatening over a period of
time. Cyber Terrorism: Cyber terrorism occurs when terrorists cause virtual
destruction in online computer system
• Cyber law is a term used to describe the legal issues related to use of
communication technology, particularly cyber space, i.e. internet.
• Cyber law is an attempt to apply laws designed for the physical world to
human activities on internet.

Cyber laws in world

• Electronic Commerce Act (Ireland)


• Electronic Transactions Act (UK, USA, Australia, New Zealand, Singapore)
• Electronic Transactions Ordinance (Hong Kong)

• Information Technology Act (India)


• Information communication Technology Act (Bangladesh)
Cyber laws in india

 India has enacted the first I.T. Act, 2000 based on the UNCIRAL model
recommended by the general assembly of the United Nations.
 Offences under IT acts are:
• Tampering with computer source document
• Hacking with computer systems, data alterations
• Publishing obscene information
• Un-authorized access to protected systems
• Breach of confidentiality and privacy
• Publishing false digital signature certificates.
• India has entacted the first I.T Act ,2000 based on the UNCIRAL model
recommend by the general assembly of the United nations.

• Offences under IT acts are:

• Tampering with computersource document

• Hacking with computer systemsdata alterations


• Publishing obsence information

• Unauthorised access to protected systems

• Breach of and confidently and privacy

• Publishing false digital signature certificates

• India has entacted the first I.T Act ,2000 based on the UNCIRAL model
recommend by the general assembly of the United nations.

• Offences under IT acts are:

• Tampering with computersource document

• Hacking with computer systemsdata alterations

• Publishing obsence information

• Unauthorised access to protected systems

• Breach of and confidently and privacy

• Publishing false digital signature certificates

To put it simply, cyber law refers to the body of rules and regulations
governing the use of the internet and other forms of networking and
information technology in accordance with established norms of law, justice,
and ethics. It is relevant to the internet and associated technologies.
In today’s increasingly digital society, cybercrime is on the rise, necessitating
the development of cyber laws to combat it. Cyber laws outline guidelines for
how individuals and businesses should conduct themselves when engaging in
online or digital activities. In addition to reducing the effects of cybercrime,
prevention measures like securing data against hackers and other
unauthorized users can help keep sensitive information like emails, employee
records, and company files safe from prying eyes.
Users of the Internet need to be familiar with the cyber law of their country in
order to make informed decisions about what to do and what not to do online.
In 1986, Congress passed the Computer Fraud and Abuse Act (also known as
CCFA). This law is useful because it both discourages illegal behavior and holds
offenders accountable for their transgressions.

ANALYSIS OF CYBER CRIME

To put it simply, cyber law refers to the body of rules and regulations
governing the use of the internet and other forms of networking
and information technology in accordance with established
norms of law, justice, and ethics. It is relevant to the internet
and associated technologies.
In today’s increasingly digital society, cybercrime is on the rise,
necessitating the development of cyber laws to combat it. Cyber
laws outline guidelines for how individuals and businesses should
conduct themselves when engaging in online or digital activities.
In addition to reducing the effects of cybercrime, prevention
measures like securing data against hackers and other
unauthorized users can help keep sensitive information like
emails, employee records, and company files safe from prying
eyes.
Users of the Internet need to be familiar with the cyber law of
their country in order to make informed decisions about what
to do and what not to do online.
In 1986, Congress passed the Computer Fraud and Abuse Act (also known as
CCFA). This law is useful because it both discourages illegal behavior and holds
offenders accountable for their transgressions.
TYPES OF CIBER CRIME :-
1. Phishing
When a user receives spam emails that contain unauthorized
attachments or URLs luring them to open the same, it is called phishing. The
objective of this act is to gain personal information of users or organizations by
tricking them. Some of them may be flagged but most of them do not show
the signs of any malpractice on the face.

• The cyber criminal may not directly harm the device being used but may
cause financial loss to the user due to credentials shared, data loss due
to website access that results in identity theft, etc. If you are a victim of
phishing, lawyers for mail fraud may help with the legality and how to
proceed to safeguard confidential data in future.

2. Identity Theft
As the term itself suggests, identity theft happens when someone
else impersonates the original user. The cyber criminal steals personal
information of the users for fraudulent purposes.

The other day, someone posted on social media that she got an email
from her boss’ account seeking a handsome amount to be transferred in
a client’s account. Without verification, she transferred the amount and
succeeded as a target of identity theft causing financial fraud. This is an
instant example of identity theft.
3. Social Engineering
When malicious activities are committed through the internet with a
personal touch, it is termed as social engineering. They use
psychological manipulation tricks through calls impersonating an
official to defraud the users so that they share confidential information.
In India, credit card fraud is usually committed in a similar way when
someone calls the users, conveys to be a bank official and asks the users
to share the one time password received on their mobile to safeguard
their financial interests or bank accounts, etc.
4. Denial of Service (DoS)
• There are various websites that provide services online to their
customers. If the website has errors in proper functioning, the services
will be impacted. That is how denial of service (DoS) works. Fraudsters
overwhelm the website with more traffic affecting online networks and
thereby interrupting the services. Sometimes, the attack is distributed
using various compromised computer devices and thus, is termed as
Distributed Denial of Services (DDoS).

5.Ransomare
When someone takes into illegal custody a person or property to threaten
another and seeks financial benefits in return of saving such interests, it is
called ransom money. Among the types of cyber crime, when fraudsters steal
your confidential or personal information and threaten to misuse or delete the
same unless the users transfer a certain amount to safeguard or access such
information/ data, it is called ransomware. Cyber criminals usually extort users
through locking the information and seeking transfer of cryptocurrency.

6. Malware Attacks
People using smartphones with internet connection are sometimes
tracked for location, for their internet searches, the usernames and password
typed on their device, through web cameras, etc.. At times, it could be legal
and informed due to app permissions, but at other times, it may not
bconfidential data. Such an uninformed activity on devices which may sneak e
brought in the user’s knowledge and become a serious threat to personal
information resulting in bigger financial frauds or other threatening acts are
called malware attacks. The targets could be individuals or big organizations or
even the governmental departments.

8. Web Jacking
Digital marketing is the new normal which lured businesses into having
their own websites. More traffic on the website indicates more people
knowing about their goods/ services/ brand. But what if someone else steals
all the traffic from your website using some malware practice? That is how
webjacking works among the serious types of cybercrimes. It could be done by
gaining administrator access to the URL through malicious means thereby
tampering the Domain Name System (DNS) redirecting users to another
webpage.
9. Botnets
Networks from compromised computer devices which are under control
of an external group of remote hackers are known as botnets. It
becomes a tool for such hackers to attack other devices, or act as a
malware for performing malicious activities over the internet.

10. Prohibited Content


When someone shares inappropriate content/ information which proves
to be offensive for the users, they are sharing prohibited content over the
internet. Such prohibited content may consist of sexual activity, child
pornography, violent pictures/ videos, and the list goes on.
PIE CHART OF Cyber
crime
11.Child Pornography:
It is an act of possessing image or video of a minor (under 18),
engaged in sexual conduct.

12. Forgery and Counterfeiting:

It is a use of computer to forgery and


counterfeiting is a document. With the
advancement in the hardware and the software,
it is possible to produce counterfeit which
matches the original document to such an extent
that it is not possible to judge the authenticity of
the document without expert judgement.

13.Software Piracy and Crime related to IPRs:


Software piracy is an illegal reproduction and distribution for
personal use or business. It comes under crime related to IPR
infringement. Some of the other crimes under IPR
infringement are: download of songs, downloading movies,
illegal content, dark web etc.

14. Cyber Terrorism:


It is defined as the use of computer resources to intimidate or
coerce government, the civilian population or any segment
thereof in furtherance of political or social objectives.

15.Computer Vandalism:
It is an act of physical destroying computing resources using
physical force or malicious code.

16. Computer Hacking:


it is a practice of modifying computer hardware and software
to accomplish a goal outside the creator‟s original purpose. The
purpose of hacking a computer system may vary from simply
demonstrations of the technical ability, to sealing, modifying
or destroying information for social, economic or political
reasons. Now the corporate are hiring hackers, a person who is
engaged in hacking computers, to intentionally hack the
computer of an organization to find and fix security
vulnerabilities.

Thehackersmaybeclassifiedas:

• White Hat: white hat hackers are the persons who hack
the system to find the security vulnerabilities of a system
and notify to the organizations so that a preventive
action can be taken to protect the system from outside
hackers. White hat hackers may be paid employee of an
organization who is employed to find the security
loopholes, or may be a freelancer who just wants to
prove his mantle in this field. They are popular known as
ethical hackers.

• Black Hat: in contrast to the white hat, the black hat


hack the system with ill intentions. They may hack the
system for social, political or economically motivated
intentions. They find the security loopholes the system,
and keep the information themselves and exploit the
system for personal or organizational benefits till
organization whose system is compromised is aware of
this, and apply security patches. They are popularly
known as crackers.

• Grey Hat: Grey hat hackers find out the security


vulnerabilities and report to the site administrators and
offer the fix of the security bug for a consultancy fee.

• Blue hat: A blue hat hacker is someone outside computer


security consulting firms who is used to bug-test a
system prior to its launch, looking for exploits so they can
be closed.

17. Creating and distributing viruses over


internet:

The spreading of an virus can cause business and financial loss


to an organization. The loss includes the cost of repairing the
system, cost associated with the loss of business during
downtime and cost of loss of opportunity. The organization
can sue the hacker, if found, for the sum of more than or
equivalent to the loss borne by the organization.

18. Spamming:
Sending of unsolicited and commercial bulk message over the
internet is known as spamming. An email can be classified as
spam, if it meets following criteria:

• Mass mailing:- the email is not targeted to one particular


person but to a large number of peoples.

• Anonymity:- The real identify of the person not known

• Unsolicited:- the email is neither expected nor requested


for the recipient.
These spams not only irritate the recipients and overload the
network but also waste the time and occupy the valuable
memory space of the mailbox.

19.Email Spoofing:
It is a process of changing the header information of an e-mail
so that its original source is not identified and it appears to an
individual at the receiving end that the email has been
originated from source other than the original source .

20. Data Diddling:


It is a practice of changing the data before its entry into the
computer system. Often, the original data is retained after the
execution on the data is done. For example, DA or the basic
salary of the person is changed in the payroll data of an
individual for pay calculation. Once the salary is calculated and
transferred to his account, the total salary is replaced by his
actual salary in the report.

21.Salami Attack
It is an attack which proceeds with small increments and final
add up to lead to a major attack. The increments are so small
that they remain unnoticed. An example of salami attack is
gaining access to online banking of an individual and
withdrawing amount in such a small amounts that it remains
unnoticed by the owner. Often there is default trigger set in
the banking website and transactions below say, $1000
withdrawal are not reported to the owner of the account.
Withdrawing amount of $1000 over a period of time will lead
to total withdrawal of a large sum.

22. Internet Time Thefts:


Hacking the username and password of ISP of an individual
and surfing the internet at his cost is Internet Time Theft.

23. Denial of Service Attack:


It is a cyber attack in which the network is chocked and often
collapsed by flooding it with useless traffic and thus preventing
the legitimate network traffic.

24. Cyber Squatting


It is an act of reserving the domain names of someone else”s
trademark with intent to sell it afterwards to the
organization who is the owner of the trademark at a higher
price.
SHORT AND LONG TERM PLAN FOR POSSIBLE
SOLUTION
• Initial step of action as SHORT TERM PROBLEM SOLUTION we
conducted

• a workshop in the village with the help volunteers and other supporting
members.

• Explored various cyber attacks in india from past few years as

SIM Swap Scam


• Two hackers from Navi Mumbai were arrested for transferring 4 crore
rupees from

• numerous bank accounts in August 2018. The illegally transferred


money from bank

• accounts of many individuals. By fraudulently gaining SIM card


information, both

• attackers blocked individuals‘ SIM cards and by the help of fake


document posts, they

• carried out transactions via online banking. They also tried to hack
accounts of various

• targeted companies. Aforesaid stats and events of the latest


cyberattacks in India are the

• wake-up call for all those individuals and companies who are still
vulnerable to cyber

• threats. It is very essential for organizations to implement cyber security


measures and

• follow the below-men

ATM System Hacked in Kolkata


• In July 2018 fraudsters hacked into Canara bank ATM servers and wiped
off almost 20

• lakh rupees from different bank accounts. The number of victims was
over 50 and it was

• believed that they were holding the account details of more than 300
ATM users across

• India. The hackers used skimming devices on ATMs to steal the


information of debit

• cardholders and made a minimum transaction of INR 10,000 and the


maximum of INR

• 40,000 ptioned security guidelines

PREVENTIONS OF CYBER CRIME


 Use hard to guess passwords

 Use anti-virus software and firewalls-keep them up to date

 Don’t open email or attachments from unknown sources

 Back up your computer on disk or CD often Use Strong Passwords. ...

 Secure your computer. ...

 Block spyware attacks. ...

 Be Social-Media Savvy. ...

• Secure your Mobile Devices. ...

 Protect your Data. ...

 Secure your wireless network .


OUTCOMES:
loss to both businesses and individuals. Moreover, the repercuThe ill effects
of cybercrimes often lead to extreme financial ruin and reputation ssions of
cybercrimes can affect society in numerous ways. Cybercrime can take
numerous forms, be it online scams for petty thefts or serious threats like
terrorism

• Each State needs to have a complete mechanism and a cyber crime


department consisting

• of specialized people like Software enAlways beware about the types of


cyber crime prevails in the society.

• The government of India needs to bring stringent punishment to curb this


crime from india.

• We need more people working for cyber crime department of government


having in depth

• knowledge of computergineers, ethical hackers, lawyers, etc.

• Never believe anyone especially a stranger and don’t share your personal
information with them

RECOMMENDATIONS
Fostering Linkages:

 Creation liaison with international community will create sharing of


experiences and good practices.

 The value of fostering co-operation internationally with other


countries/regions and parties needs to be enhanced.

 Co-operation between governments and the private sector in combating


cyber crime.

Building national level partnership and creating awareness:

 Create specialized fourms for exchange of experiences and information


which would entail initiating and promting literary ,technical and
scientific activity.
 Setting up a cyber crime cell consisting of experts to deal with
cybercrime will encourage reporting and evolve into a process online
with the legislature

Training and Awareness Raising :

 Disseminate general awareness of cyber crimes and user laws/rights by


arranging symposia, seminars, lectures, classes, demonstrations, and
presentations, briefings, to educate the society and gain their comfort
level.

 People need to be aware of the appropriate law enforcement


investigative authorities at the local, state, federal, or international
levels.

 It is essential to educate and empower youth to safely and responsibly


take control of their Internet experience.

 With the increasing cyber crimes, the government has also set up cyber
crime police

 station and cells which deals with cyber crimes only.

 The online portal for cyber complaint in India is available.

 There are various NGO’s and institutions working with police


departments to curb the cyber crime.

 There are various portals where we can know the procedures of


complaints to cyber crime.

 Always beware about whom you share your bank details with. Never
entertain any calls

 in the name banks and never share any of your information related to
the bank on

 telephonic conversation or on the internet.

 Beware of fraudulent website who takes your personal information like


credit/debit card details, etc.
 There are several ways in the browser to retain control over data access
so that it can be personalized.

 Suggestions

 Using anti-virus or a comprehensive internet security solution like


Kaspersky Total Security is a smart way to protect your system from
attacks. Anti-virus software allows you to scan, detect and remove
threats before they become a problem.

 Cyber-attacks negatively impact governments,

 corporations, and individuals on a daily basis. One of the many reasons


for our ongoing

 vulnerability is that we lack a cohesive approach for defending indian


interests against cyber

 threats. It has become painfully clear that neither the government nor
the private sector can solve

 the problem on its own. There must be a joint effort in protecting our
country‘s national interest

 in terms of cyber security


SURVEY QUESTIONARIES

• What is cyber crime?


• What are the various modes or manners of committing Cybercrime?
• What are the various types of cyber crimes?
• What is an I.P address?
• What is an IP spoofing?
• What do you mean by phishing?
• What is a domain name?
• Can we register the Domain name? And where.
CONCLUSION:-
Though not all people are victims to cyber crimes, they are still at risk. Crimes
by computer vary, and they don’t always occur behind the computer, but they
executed by computer. The hacker’s identity is ranged between 12 years young
to 67years old. The hacker could live three continents away from its victim, and
they wouldn’t even know they were being hacked. Crimes done behind the
computer are the 21st century’s problem. With the technology increasing,
criminals don’t have to rob banks, nor do they have to be outside in order to
commit any crime. They have everything they need on their lap. Their weapons
aren’t guns anymore; they attack with mouse cursors and passwords.

Cybercrime is criminal activity that either targets or uses a


computer, a computer network or a networked device. Most
cybercrime is committed by cybercriminals or hackers who want to
make money. However, occasionally cybercrime aims to damage
computers or networks for reasons other than profit.

You might also like