cyber crime and privacy issues by varun call for assistence 8003498888

23
PRESENTED BY :- varun mathur mba 1 st sem

Upload: varun-mathur

Post on 10-May-2015

1.958 views

Category:

Technology


0 download

DESCRIPTION

powerpoint presentation on cyber crime and privacy issues . my email is [email protected]

TRANSCRIPT

Page 1: cyber crime and privacy issues  by varun call for assistence 8003498888

PRESENTED BY :-varun mathurmba 1st sem

Page 2: cyber crime and privacy issues  by varun call for assistence 8003498888

Cyber crimes and privacy Cyber crimes and privacy issues issues

Page 3: cyber crime and privacy issues  by varun call for assistence 8003498888

AGENDA

• Introduction to cyber crime • Modes and manner • Categories• How to protect

Page 4: cyber crime and privacy issues  by varun call for assistence 8003498888

Cyber crime  refers to any crime that involves a computer and a network . The computer may have been used in the commission of a crime, or it may be the target .

Debarati Halder and Dr. K. Jaishankar defines Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet and mobile phones .

Page 5: cyber crime and privacy issues  by varun call for assistence 8003498888

Categorize of cyber crime

We can categorize cyber crime in two ways.

1. The computer as a target- using a computer to attack other computers via hacking, virus , dos attack .

2. The computer as a weapon – using a computer to commit real world crimes . Ex- cyber terrorism , credit cards frauds, pornography etc .

Page 6: cyber crime and privacy issues  by varun call for assistence 8003498888

Cyber criminals:-Children between age of 12- 19 yearsDissatisfied employeesProfessional hackers & crackersOrganized hackers

Page 7: cyber crime and privacy issues  by varun call for assistence 8003498888

Modes and manners

1. Unauthorized access to computer system and network.

2.Theft of information stored in electronic form

3.Hacking

4.Trojan attacks

5.Web jacking

6.e-mail bombing

Page 8: cyber crime and privacy issues  by varun call for assistence 8003498888

Unauthorized access to computer system –

Unauthorized access to a computer system entails approaching, trespassing within and retrieving data or otherwise intercepting and altering computer resources without consent. It broadly falls into the term 'computer hacking', because it attempts to bypass the security mechanisms of a system.

Page 9: cyber crime and privacy issues  by varun call for assistence 8003498888

Hacking

• Computer hacking is when someone modifies computer hardware or software in a way that alters the creator's original intent. People who hack computers are known as hackers. Hackers are usually real technology buffs who enjoy learning all they can about computers and how they work. Hackers think that what they do is like an art form. They usually have expert-level skills in one specific program. For most hackers, hacking gives them the opportunity to use their problem-solving skills and a chance to show off their abilities. Most of them do not wish to harm others.

Page 10: cyber crime and privacy issues  by varun call for assistence 8003498888

Trojan attack

• A Trojan horse, or Trojan, is a hacking program that is a non-self-replicating type of malware which gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload, often including a backdoor allowing unauthorized access to the target's computer.These backdoors tend to be invisible to average users, but may cause the computer to run slow.

Page 11: cyber crime and privacy issues  by varun call for assistence 8003498888

Web jacking

• The web jacking attack vector is another phishing technique that can be used in social engineering engagements. Attack followed in this attack are creating a fake website and when the victim opens the link a page will appear saying that the website has been moved and they need to click another link. If the victim clicks the link he will be redirected to fake website. 

Page 12: cyber crime and privacy issues  by varun call for assistence 8003498888

E-mail bombing

• In internet  usage, an email bomb is a form of net abuse consisting of sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a denial of service attack .

Page 13: cyber crime and privacy issues  by varun call for assistence 8003498888

Cyber attack can be on following categories

• Cyber crime against person.• Cyber crime against individual property.• Cyber crime against government

Page 14: cyber crime and privacy issues  by varun call for assistence 8003498888

Against person

• Harassment via e-mails• Cyber stalking:-Stalking is a form of mental assault, in which

the perpetrator repeatedly, unwantedly, and disruptively breaks into the life-world of the victim, with whom he has no relationship (or no longer has), with motives that are directly or indirectly traceable to the affective sphere. Moreover, the separated acts that make up the intrusion cannot by themselves cause the mental abuse, but do taken together .

• E-mail spoofing:-Email spoofing is the creation of email messages with a forged sender address - something which is simple to do because the core protocols do no authentiction. spam and phishing emails typically use such spoofing to mislead the recipient about the origin of the message.

Page 15: cyber crime and privacy issues  by varun call for assistence 8003498888

Against individual property

• Computer vandalism – it is a program that performs malicious function such as extracting a user's password or other data or erasing the hard disk. A vandal differs from a virus, which attaches itself to an existing executable program. The vandal is the full executing entity itself which can be downloaded from the Internet in the form of an ActiveX control, Java applet, browser plug-in or e-mail attachment. 

• Transmitting virus - this means intentionally transmission of viruses into other computer to destroy important files and folders .

Page 16: cyber crime and privacy issues  by varun call for assistence 8003498888

Against government

• Cyber terrorism  is the use of internet based attacks in terror activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as viruses . Example – attack on usa defence academy in iraq war , by iraqui hackers .

Page 17: cyber crime and privacy issues  by varun call for assistence 8003498888

Types

• Child pornography • Cyber contraband• Cyber laundering• Cyber stalking• Cyber theft

Page 18: cyber crime and privacy issues  by varun call for assistence 8003498888

India stands 10th in the cyber crime in the world

Page 19: cyber crime and privacy issues  by varun call for assistence 8003498888

cyber privacy

Cyber privacy  involves the right or mandate of personal privacy  concerning the storing, repurposing, provision to third-parties, and displaying of information pertaining to oneself via the internet .

Page 20: cyber crime and privacy issues  by varun call for assistence 8003498888

How to protect ?

• Keep software up to date• Use good passwords• Disable remote connectivity

Page 21: cyber crime and privacy issues  by varun call for assistence 8003498888

• Antivirus and anti spyware :- software-antivirus software consists of computer programme that attempt to identify thwart and eliminate computer virus and other malicious softwares . Anti spywares are used to restrict backdoor programme , trojan and other spywares to be installed on the computer .

• Firewalls :- a firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices , software programme , or a combination of the two .

Page 22: cyber crime and privacy issues  by varun call for assistence 8003498888

Message

• Indian laws are well drafted and are capable of handling all kinds of challenges as posed by cyber criminals , however the enforcement agencies are required to be well versed with the changing technology and laws .

• As internet technology advances so does the threat of cyber crime . In times like these we must protect ourselves from cyber crime . Antivirus software , firewalls and security patches are just the beginning . Never open suspicious e-mails and only navigate through trusted sites .

Page 23: cyber crime and privacy issues  by varun call for assistence 8003498888

Thank YouThank You