0% found this document useful (0 votes)
107 views16 pages

Digital Robbery

Uploaded by

Aakrisht Goel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
107 views16 pages

Digital Robbery

Uploaded by

Aakrisht Goel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

DIGITAL ROBBERY

INDEX
1. Introduction
2. History of digital crime
3. Categories of digital crime
4. Types of cyber crime
5. Cybercrime Threatens National Security
6. Advantages of Cyber Security
7. ADVANTAGES OF DIGITAL SECURITY
8. SAFETY TIPS TO DIGITAL ROBBERY
9. Digital laws of India
10.Conclusion
INTRODUCTION
.
1. Digital crimes or cyber crimes as they are commonly referred, are crimes associated with the
use of digital devices, computers, mobile phones and more.
2. Digital Crime is defined as an offence targeted at computer data and it's related digital
systems, in which unauthorized access, theft, modification, corruption, or disruption is
carried out.
3. A digital crime however can only occur when a vulnerability is detected and exploited, in the
targeted system or application. Therefore vulnerabilities put resources at great risk. A risk is
defined as a potential for data or a system to suffer corruption, loss, theft, damage, disruption
or destruction.
HISTORY OF DIGITAL CRIME
• 2015 — Anthem — Anthem reports theft of personal information on up to 78.8 million current and former customers.
• 2015 — Locker Pin — Locker Pin resets the pin code on Android phones and demands $500 from victims to unlock the device.
• 2016 — DNC Email Leaks — Democratic National Committee emails are leaked to and published by WikiLeaks prior to the 2016 U.S. presidential
election.

• 2017 — Equifax — Equifax, one of the largest U.S. credit bureaus, is hacked, exposing 143 million user accounts. The sensitive leaked data includes
Social Security numbers, birth dates, addresses, driver’s license numbers, and some credit card numbers.

• 2018 – Dub smash - The popular video streaming platform discovered 161.5 million user records were placed for sale on the dark web. Records included
details like name, email address, and encrypted passwords.

• 2019 - Facebook - Information relating to more than 530 million Facebook users is exposed by an unknown hacker including phone numbers, account
names, and Facebook IDs.

• 2020 - SolarWinds - FireEye, a prominent cybersecurity firm, announced they were a victim to a nation-state attack. The security team reported their Red
Team toolkit, containing applications used by ethical hackers in penetration tests, was stolen.

• 2021 - Colonial Pipeline - a ransomware attack forced Colonial Pipeline, a U.S. energy company to shut down its entire fuel distribution pipeline — and
therefore threatened gasoline and jet fuel distribution across the U.S. east coast. Colonial Pipeline paid nearly $5 million to Eastern European hackers to
help restore the country’s largest fuel pipeline.
CATEGORIES OF DIGITAL CRIME

Cybercrime comes in many different strains including identity theft, stalking, financial fraud, online bullying, hacking, and more. At a minimum, cybercrime can
cause major inconvenience and annoyance for its victims, while at worst, cybercrime can result in financial distress or a severe threat to a victim’s reputation or
personal safety.
• Crimes Against Individuals
These crimes are intended towards individuals and can range from cyber harassment and stalking, distribution of child pornography, human trafficking, credit card
fraud, identity theft, email spoofing to online libel, or slander.
• Crimes Against Property
Just like real-life incidents, these cybercrimes are committed against property such as a computer or a server . Phishing scams, DDOS attacks, virus attacks,
computer vandalism, keylogging, cyber and typos quatting are all part of these crimes.
• Crimes Against Government
This type of cybercrime is also commonly known as "Cyber Terrorism". While not as prevalent as the other two categories, this cybercrime targets a nation's
sovereignty .
Cybercrimes against the government may include hacking of websites and military websites, accessing confidential information, cyber warfare, or the distribution of
government propaganda.
TYPES OF CYBER CRIME:

• Identity theft: Identity theft occurs when someone uses another person's personal identifying information, like their
name, identifying number, or credit card number , without their permission, to commit fraud or other crimes. The term
identity theft was coined in 1964.Since that time, the definition of identity theft has been statutorily defined
throughout both the U.K. And the United States as the theft of personally identifiable information.
• Security Hacker : A security hacker is someone who explores methods for breaching defenses and exploiting
weaknesses in a computer system or network .Hackers may be motivated by a multitude of reasons, such as profit,
protest, information gathering ,challenge, recreation , or evaluation of a system weaknesses to assist in formulating
defenses against potential hackers.
• .Phising: Phishing is a type of social enginering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise
deceptive) message designed to trick a human victim into revealing sensitive information to the attacker or to deploy
malicious software on the victim’s infrastructure like ransome ware.
• Malware: Malware (a portmantue for malicious software) is any software intentionally designed to cause disruption to a
computer , server , client, or computer network , leak private information, gain unauthorized access to information or
systems, deprive users access to information or which unknowingly interferes with the user’s computer security and
privacy.
• Cyber Stalking: Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, group,
or organization . It may include false accusions , defamation, slander and libel. It may also include monitoring ,identity
theft threats, vandalism, solicitation for sex, doxing, or black mail.
• Cyberbullying : Cyberbullying or cyber harassment is a form of bullying or harrasment using electronic means.
Cyberbullying and cyber harassment are also known as online bullying. It has become increasingly common, especially
among teenagers, as the digital sphere has expanded and technology has advanced. Cyberbullying is when someone,
typically a teenager, bullies or harasses others on the internet and other digital spaces, particularly on social media sites.
CYBERCRIME THREATENS NATIONAL
SECURITY
• Cybercrime is evolving as a threat to the national Security of several countries, primarily motivated by financial advantage. On the
bright side, these risks are becoming more evident as more victims of cybercrime share their stories. In addition, efforts by
governments to combat these threats are also growing.

• These are the key findings of the 2021 edition of Microsoft’s Digital Defence Report regarding the current status of cybercrime. The
study was based on more than 24 trillion daily cybersecurity signals on Microsoft cloud, endpoints, and smart edges. It gathered
information from more than 8,500 experts from 77 countries, including insights into the evolution of ransomware, malicious emails,
malware, and other cyber pests.

• Other aspects covered in detail by the research were current threats to nationstates; the security of vendor ecosystems, Internet of
things(IOT)and Operational Technologies (OT); the hybrid workforce; and misinformation. Also presented were learnings and practical
recommendations compiled by Microsoft over the course of the study.
• By 2021, cybercrime has become more sophisticated, more widespread, and ruthless, targeting critical
infrastructure in healthcare, IT, financial services, and energy. In addition, the cybercrime chain is maturing, with
the formation of marketplaces in which anyone, even without much technical expertise, can acquire the tools
necessary to carry out criminal actions in cyberspace. By nature, these cybercriminal groups have a global
presence, meaning that an individual in a certain country can buy, for example, phishing kits from a vendor in
another nation.
• The ransomware business model has evolved significantly and become much smarter. According to Microsoft,
there is prior research into victim profiles and the appropriate ransom demand amount. Criminals already know
which documents to hijack, understanding the penalties associated with violating the local laws of each sector and
country. Not only do they threaten to encrypt files that are fundamental for the victims’ business, but also to
publicly disclose customer data, which would mortally affect the reputation of the invaded companies
ADVANTAGES OF CYBER SECURITY:

1. It protects the personal and sensitive data of an individual and organizations from being stolen.
2. The main advantage that could be achieved with the utilization of these effective cyber-security mechanisms is the
protection of networks from various false nodes which try to gain unauthorized access to the network.
3. The most important aspect is that it enhances the security of the system in cyberspace.
4. It eliminates the risk of computers being hacked, thus mitigating the risk of system freezes and crashes
5. It enhances overall security mechanisms of the business with the use of an improved information framework and
results in smooth business management activities.
6. It identifies the vulnerabilities and weak entities that can aid an attacker to attack the system or the server. These
vulnerabilities upon identification can help the teams to secure the systems in order to prevent such attacks from
happening
7. It protects the system against spyware, virus, malicious codes, trojan horses, worms, and several other
unwanted infectious programs
8. It protects the system against spyware, virus, malicious codes, trojan horses, worms, and several other
unwanted infectious programs.
9. It gives the much-wanted privacy to a user and the organizations as it protects their personal
information which might hurt their sentiments if leaked.
10. Enhanced stakeholder support in the effective security mechanisms applied in the business.
11. More reliable company credentials with a compelling security framework in the business.
12. More reliable company credentials with a compelling security framework in the business
• Digital security offers protection from all kinds of virus attacks, malware
attacks, spyware etc.
• The application of cyber security used in our pc needs update every week.
• Internet security process all the incoming and outgoing data on our computer.
• Cyber security protects us from hackers and protects our system and network
from being hacked.
SAFETY TIPS TO DIGITAL ROBBERY

• Don’t respond to harassing or negative message.


• Get out of uncomfortable situations quickly.
• Save offending messages.
• Learn more about internet privacy.
DIGITAL LAWS OF INDIA

• Under the information technology act ,2000 whoever with the intent to cause
wrongful loss or damage to the public or any person destroys or deletes or
alters any information residing in a computer resource or diminishes its value
or utility or affects it injuriously by any means, commits hack
• Whoever commits hacking shall be punished with imprisonment up to three
years or with fine which may extend up to two lakh rupees, or with both.
CONCLUSION

• Though not all people are victims to cyber crimes, they are still at risk. Crimes by
computer vary, and they don't always occur behind the computer, but they executed by
computer. The hacker's identity is ranged between 12 years young to 67years old. The
hacker could live three continents away from its victim, and they wouldn't even know
they were being hacked. Crimes done behind the computer are the 21st century's
problem. With the technology increasing, criminals don't have to rob banks, nor do they
have to be outside in order to commit any crime. They have everything they need on their
lap. Their weapons aren't guns anymore; they attack with mouse cursors and passwords.
MADE BY -:

SHRUTI SHARMA
SANDEEP ADHIKARI
DEEP JOSHI
AAKRISHT GOEL

You might also like