Cyber Crime 1
Cyber Crime 1
Group:-5 Ashish Anand Md. Shamshad Ansari Sneha Anand Vineet Shashidharan Vishakha Suri
CONTENTS
WHY LEARN ABOUT CYBER CRIME?
DEFINING CYBER CRIME TYPES OF CYBER CRIME
PREVENTIVE MEASURES
CYBER LAWS
Everybody is using COMPUTERS. From white collar criminals to terrorist organizations and from
teenagers to adults.
Conventional crimes like Forgery, extortion, kidnapping etc. are being committed with the help of computers.
Gathering Trophies (quest to become famous) General Mischief Financial Gain Revenge Protest Criminal activity Identity Theft Forging Documents and Messages
Business Rival.
Ex-Boy Friend. Divorced Husband. etc
Jonathan James
Adrian Lamo Kevin Mitnick Robert Morris
Richard Stallman
PHISHING
SPOOFING
CYBER STALKING CYBER DEFAMATION THREATENING SALAMI ATTACK
IRC CRIME
CREDIT CARD FRAUD NET EXTORTION
HACKING
WHO IS A HACKER?
A
defined as:
One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming.
VIRUS DISSEMINATION
Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious software's)
SOFTWARE PIRACY
the counterfeiting and distribution of products intended to pass for the original.
Retail revenue losses worldwide are ever increasing due to this crime.
End user copying Hard disk loading, Counterfeiting, Illegal downloads from the internet etc.
IRC CRIME
Internet Relay Chat (IRC) servers have chat rooms in which people
from anywhere the world can come together and chat with each
other
Criminals use it for meeting conspirators. Hackers use it for discussing their exploits / sharing the techniques Pedophiles use chat rooms to allure small children
NET EXTORTION
Copying the companys confidential data in order to extort said company for
huge amount.
For e.g. : Crypto virology :
PHISHING
It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means
Phishing methods :
E-mails that redirects to a deceptive website Deceptive website resembles the victims financial institutional website
PHISHING WEBSITE
SPOOFING
Getting one computer on a network to pretend to have the identity off another computer, usually one with special access privileges , so as to obtain access to the other computers on the network. OR It is a situation in which one person or program successfully impersonate as another by falsifying data and thereby gaining an illicit advantage.
E-MAIL SPOOFING
A spoofed email is one that appears to originate from one source but actually has been sent from another source
CYBER STALKING
CYBER DEFAMATION
Sending e-mail
friends
E.g. :
displeased employee may do this against boss, ex-boys friend against girl,
divorced husband against wife etc
SALAMI ATTACK
In such crime criminal makes insignificant changes in such a manner that it would go unnoticed
For e.g. : Criminal makes such program that deducts small amount like Rs. 2.50
per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for
CARD SKIMMER OVER THE ORIGINAL CARD SLOT REPLICATES THE CARD
PAMPHLET HOLDER ATTACHED WITH CAMERA GETS THE VICTIMS PIN CODE
Hidden Camera
PREVENTIVE MEASURES
Preventive steps for children:
Should not give information such as Name, Home Address, School Name or Telephone number in a chat room.
Should not give photographs to anyone on the net. Should not respond to messages, which are suggestive, obscene, belligerent or threatening
guardians
PREVENTIVE MEASURES
Preventive steps for Parents:
should use content filtering software on PC to protect children from pornography, gambling, hate speech, drugs and alcohol.
Install software to establish time controls for use of limpets allowing parents to see which site item children have visited
General Information:
Dont delete harmful communications (emails, chats etc.). They will provide vital information about system and address of the person behind these.
If you feel any immediate physical danger, contact your local police.
Avoid getting into huge arguments online during chat and discussions with other
users.
Be extremely careful about how you share personal information about yourself
online
Be extremely cautious about meeting online introduced person. If you choose to meet, do so in a public place along with a friend.
Save all communications for evidence. Do not edit it in any way. Also, keep a record of your contacts and inform Law Enforcement Officials.
Physical Security Implement Access Control Systems Use Of Password Finding the Holes in Network
Using Encryption
CYBER LAWS
Hierarchy
Law
Evidence Act
IT AMENDMENT ACTS
CONTD
The new amendments have added Identity theft and phishing as cybercrimes .
OFFENCES
Tampering with Computer source documents Hacking with Computer systems, Data alteration Publishing obscene information Un - authorized access to protected system Breach of Confidentiality and Privacy Publishing false digital signature certificates
SECTION 66
Hacking with Computer System (1) If Information residing in a computer resources get :
SECTION 67
Fine of ten lakh rupees as punishment on first conviction In the event of second or subsequent conviction Imprisonment of either description for a term which may extend to seven years and also with fine which may extend to ten lakh rupees.
SECTION 65
Tampering with computer source document: Punishment: Offences are punishable with imprisonment up to 3 yrs. And
SECTION 69
extending 2 yrs.
Section 502A: Publishing, Transmitting images of the private area of a person without his or her consent---2yrs./2 lakh.
A complaint was filed in by Sony India Private Ltd, which runs a website called sony-sambandh.com, targeting Non Resident Indians.
The website enables NRIs to send Sony products to their friends and relatives in India after they pay for it online.
In May 2002,someone logged onto the website under the identity of Barbara Campa and ordered a Sony Colour Television set and a cordless head phone.
A lady gave her credit card number for payment and requested that the
The payment was duly cleared by the credit card agency and the transaction processed.
After following the relevant procedures of due diligence and checking, the
company delivered the items to Arif Azim.
At the time of delivery, the company took digital photographs showing the delivery being accepted by Arif Azim.
The transaction closed at that, but after one and a half months the credit
card agency informed the company that this was an unauthorized transaction as the real owner had denied having made the purchase.
The company lodged a complaint for online cheating at the Central Bureau of Investigation which registered a case under Section 418, 419 and 420 of the Indian Penal Code.
The matter was investigated into and Arif Azim was arrested. Investigations revealed that Arif Azim, while working at a call centre in Noida gained access to the credit card number of an American national which he misused on the companys site.
The CBI recovered the color television and the cordless head phone. The accused admitted his guilt and the court of Shri Gulshan Kumar Metropolitan Magistrate, New Delhi, convicted Arif Azim under Section 418, 419 and 420 of the Indian Penal Code this being the first time that a cyber crime has been convicted.
The court, however, felt that as the accused was a young boy of 24 years and a first-time convict, a lenient view needed to be taken. The court therefore released the accused on probation for one year.
People such as computer hackers and pirates who hurt others through computer technology are not "cool." They are breaking the Law