cyber crime by ayyappan
TRANSCRIPT
-
7/22/2019 Cyber Crime by AYYAPPAN
1/19
-
7/22/2019 Cyber Crime by AYYAPPAN
2/19
CYBER CRIMEThe Invisible Criminal is dangerous than Visible one.- AYYAPPAN.P
Cyber crime & computer crime have become a terms that we hear in the news with some
frequency. To protect yourself from cyber crime, you must first understand what it is &how it can work against you. With the increasing popularity of shopping websites, online
banking and other sites that require sensitive personal & financial data, cyber crime hasbecome an ever-present threat.
What is meant by CYBE CRIME ?
Cybercrime encompasses any criminal act dealing withcomputersandnetworks(calledhacking). Additionally, cyber crime also includes traditional
crimes conducted through theInternet. For example: Releasing New films,telemarketing and Internet fraud, identity theft, and credit card account thefts
are considered to be cyber crimes when the illegal activities are committedthrough the use of a computer and the Internet.
Cybercrime also includes non-monetary offenses, such as creating anddistributingviruseson other computers or posting confidential business
information on the Internet.
Perhaps the most prominent form of cybercrime is identity theft, in whichcriminals use the Internet to steal personal information from other users. Two of
the most common ways this is done is throughphishingandpharming. Both of
these methods lure users to fake websites (that appear to be legitimate), wherethey are asked to enter personal information. This includeslogininformation,
such as usernames and passwords, phone numbers, addresses, credit card
numbers, bank account numbers, and other information criminals can use to
"STEAL" another person's identity. For this reason, it is smart to always check
theURLor Web address of a site to make sure it is legitimate before entering
your personal information.
http://www.webopedia.com/TERM/C/cyber.htmlhttp://www.webopedia.com/TERM/C/cyber.htmlhttp://www.webopedia.com/TERM/C/cyber.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/H/hacker.htmlhttp://www.webopedia.com/TERM/H/hacker.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.techterms.com/definition/virushttp://www.techterms.com/definition/virushttp://www.techterms.com/definition/virushttp://www.techterms.com/definition/phishinghttp://www.techterms.com/definition/phishinghttp://www.techterms.com/definition/phishinghttp://www.techterms.com/definition/pharminghttp://www.techterms.com/definition/pharminghttp://www.techterms.com/definition/pharminghttp://www.techterms.com/definition/loginhttp://www.techterms.com/definition/loginhttp://www.techterms.com/definition/loginhttp://www.techterms.com/definition/urlhttp://www.techterms.com/definition/urlhttp://www.techterms.com/definition/urlhttp://www.techterms.com/definition/urlhttp://www.techterms.com/definition/loginhttp://www.techterms.com/definition/pharminghttp://www.techterms.com/definition/phishinghttp://www.techterms.com/definition/virushttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/H/hacker.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/cyber.html -
7/22/2019 Cyber Crime by AYYAPPAN
3/19
Because cybercrime covers such a broad scope of criminal activity, theexamples above are only a few of the thousands of crimes that are considered
cybercrimes. While computers and the Internet have made our lives easier in
many ways, it is unfortunate that people also use these technologies to take
advantage of others. Therefore, it is smart to protect yourself by using antivirusand spyware blocking software and being careful where you enter your personal
information.
TYPES OF CYBER CRIME :
-
7/22/2019 Cyber Crime by AYYAPPAN
4/19
HACKING
DENIAL OF SERVICEATTACK
VIRUS DISSEMINATION
SOFTWARE PIRACY
PORNOGRAPHY
IRC CRIME
CREDIT CARD FRAUD
PHISHING
SPOOFING
CYBERSTALKING
CYBERDEFAMATION
THREATENING
SALAMI ATTACK
NET EXTORTION
HACKING
The act of gaining unauthorized access to a computer system or network and in
some cases making unauthorized use of this access. Hacking is also the act bywhich other forms of cyber-crime (e.g., fraud, terrorism, etc.) are committed.Hacking in simple terms means illegal intrusion into a computer system withoutthe permission of the computer owner/user.
-
7/22/2019 Cyber Crime by AYYAPPAN
5/19
DENIAL OF SERVICE ATTACK
This is an act by the criminal, who floods the band width of the victims network
or fills his e-mail box with spam mail depriving him of the services he is entitled toaccess or provide.
VIRUS DISSEMINATION
Malicious software that attaches itself to other software. (virus , worms ,TrojanHorse , Time bomb , Logic Bomb , Rabbit and Bacterium are the malicioussoftwares)
SOFTWARE PIRACY
Theft of software through the illegal copying of genuine programs or the
counterfeiting and distribution of products intended to pass for the original. Retailrevenue losses world wide are ever increasing due to this crime Can be done in
various ways such as end user copying, hard disk loading, Counterfeiting, Illegaldownloads from the internet etc.
PRONOGRAPHY
Pornography is the first consistently successful ecommerce product. It was a
deceptive marketing tactics and mouse trapping technologies. Pronography
encourage customers to access their websites. Anybody including children can logon to the internet and access website with pronography contents with a click of amouse.
IRC CRIME
Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere
the world can come together and chat with each other Criminals use it for meetingcoconspirators. Hackers use it for discussing their exploits / sharing the techniques
CREDIT CARD FRAUD
You simply have to type credit card number into www page off the vendor for
online transaction If electronic transactions are not secured the credit card numbers
can be stolen by the hackers who can misuse this card by impersonating the creditcard owner.
-
7/22/2019 Cyber Crime by AYYAPPAN
6/19
PHISHING
It is technique of pulling out confidential information from the bank/financialinstitutional account holders by deceptive means.
SPOOFING
Getting one computer on a network to pretend to have the identity of another
computer, usually one with special access privileges , so as to obtain access to theother computers on the network.
CYBER STALKING
The Criminal follows the victim by sending emails, entering the chat roomsfrequently.
CYBER DEFAMATION
The Criminal sends emails containing defamatory matters to all concerned of the
victim or post the defamatory matters on a website. (disgruntled employee may dothis against boss, ex-boys friend against girl, divorced husband against wife etc..)
THREATENING
The Criminal sends threatening email or comes in contact in chat rooms withvictim. (Any one disgruntled may do this against boss, friend or official).
SALAMI ATTACK
In such crime criminal makes insignificant changes in such a manner that suchchanges would go unnoticed. Criminal makes such program that deducts small
amount like 2.50 per month from the account of all the customer of the Bank and
deposit the same in his account. In this case no account holder will approach thebank for such small amount but criminal gains huge amount.
-
7/22/2019 Cyber Crime by AYYAPPAN
7/19
Cyber Laws in INDIA:
The IT Act 2000 attempts to change outdated laws and provides ways to deal with cyber
crimes. We need such laws so that people can perform purchase transactions over the Netthrough credit cards without fear of misuse. The Act offers the much-needed legal
framework so that information is not denied legal effect, validity or enforceability, solely
on the ground that it is in the form of electronic records.
In view of the growth in transactions and communications carried out through electronic
records, the Act seeks to empower government departments to accept filing, creating andretention of official documents in the digital format. The Act has also proposed a legal
framework for the authentication and origin of electronic records / communicationsthrough digital signature.
* From the perspective of e-commerce in India, the IT Act 2000 and its provisions
contain many positive aspects. Firstly, the implications of these provisions for the e-businesses would be that email would now be a valid and legal form of communication in
our country that can be duly produced and approved in a court of law.* Companies shall now be able to carry out electronic commerce using the legal
infrastructure provided by the Act.* Digital signatures have been given legal validity and sanction in the Act.
* The Act throws open the doors for the entry of corporate companies in the business of
-
7/22/2019 Cyber Crime by AYYAPPAN
8/19
being Certifying Authorities for issuing Digital Signatures Certificates.
* The Act now allows Government to issue notification on the web thus heralding e-governance.
* The Act enables the companies to file any form, application or any other document with
any office, authority, body or agency owned or controlled by the appropriate Governmentin electronic form by means of such electronic form as may be prescribed by the
appropriate Government.* The IT Act also addresses the important issues of security, which are so critical to the
success of electronic transactions. The Act has given a legal definition to the concept ofsecure digital signatures that would be required to have been passed through a system of
a security procedure, as stipulated by the Government at a later date.
* Under the IT Act, 2000, it shall now be possible for corporates to have a statutoryremedy in case if anyone breaks into their computer systems or network and cause losses
damages or copies data. The remedy provided by the Act is in the form of monetary
damages, not exceeding Rs. 1 crore.
/
:
1./.
,(report abuse).
2. .. , ,.
3.,,
.
4. ,, ,, Inbox. .
-
7/22/2019 Cyber Crime by AYYAPPAN
9/19
!http://cybercrimeindia.org/
How to secure your system from Keyloggers :
Now a days keylogger is major problem for all. So we should learn to secure ourcomputer from keylogger. This article will help for ethical hackers or who want to protect
their pc.
What is Keylogger?
Keylogger is one of spyware which will what type you through the keyboard and send itto hacker who send the keylogger. Hackers mainly use keyloggers to steal your
passwords, credit card numbers and other confidential data. So whenever you type the
username and password in gmail,online banking sites, it will send the username andpassword to hacker.
How to Protect?
In order to provide security for your system,you must have
Good AntiVirus:
This is basic and best step to protect your system from keylogger. So buy a licensed andbest antivirus which is currently in market. My suggestion is Kaspersky, Norton orMcafee. Don't forget to update regularly.
Note: Don't use trial or cracked pack ,it is worthless to use.
Good Spyware:Since keyloggers are basically spywares, if you are a frequent user of Internet then youcould be exposed to thousands of keyloggers and spywares. So you should use a good
antispyware such as NoAdware.
Antilogger can be Handy
Antiloggers are programs that detect the presence of keyloggers on a given computer.
Zemana Antilogger is the best antilogger.
http://www.facebook.com/l.php?u=http%3A%2F%2Fcybercrimeindia.org%2F&h=pAQG_IDxNAQG98SycY6OHixpvaXCC4F1qsw7FIlk4claaow&s=1http://www.facebook.com/l.php?u=http%3A%2F%2Fcybercrimeindia.org%2F&h=pAQG_IDxNAQG98SycY6OHixpvaXCC4F1qsw7FIlk4claaow&s=1http://www.facebook.com/l.php?u=http%3A%2F%2Fcybercrimeindia.org%2F&h=pAQG_IDxNAQG98SycY6OHixpvaXCC4F1qsw7FIlk4claaow&s=1http://www.facebook.com/l.php?u=http%3A%2F%2Fcybercrimeindia.org%2F&h=pAQG_IDxNAQG98SycY6OHixpvaXCC4F1qsw7FIlk4claaow&s=1 -
7/22/2019 Cyber Crime by AYYAPPAN
10/19
Online Scanning
When ever you receive a suspicious file, you scan it with online scanners such as Multi
engine antivirus scanner which scans your file with 24 antivirus engines and reports it
back to you if the file is recognized as a virus or spyware. This ensures that none of themalicious programs can escape from being detected as there are 24 different antivirusengines are involved in the scanning process.
Keyscrambler
Keyscrambler is one of the best protection against keyloggers that you can have,Keyscrambler is a small program which encrypts your typed keystrokes so even if the
victim has installed a keylogger on your system, he or she will get encrypted keys.
Keyscrambler currently supports Firefox, Internet explorer and other applications,however its premium version supports more than 160 applications.
-
7/22/2019 Cyber Crime by AYYAPPAN
11/19
-
7/22/2019 Cyber Crime by AYYAPPAN
12/19
-
7/22/2019 Cyber Crime by AYYAPPAN
13/19
-
7/22/2019 Cyber Crime by AYYAPPAN
14/19
-
7/22/2019 Cyber Crime by AYYAPPAN
15/19
-
7/22/2019 Cyber Crime by AYYAPPAN
16/19
Safety Tips for Cyber Cafe Visitors:
Locations that offer wireless Internet access like hotels and airports typically also providethe use of Internet kiosks or public computers for Web access and word processing. This
is a great benefit for those without their own devices, but can also pose many risks:
1.Key loggers may be installed.Every keystroke you make may be recordedcomprising any login information, even for
VPN connections. Use onscreen keyboard to login. Windows default onscreen keyboardcan be accessed from
Start >> All Programs >> Accessories >> Accessibility >> on-Screen Keyboard
2.Yourbrowsing history may be cached.
People can see what Web sites you've visited, and they may be able to view these cachedsites, which may invade your privacy. Newer browsers have facility for private
browsing(Firefox 3.5, Chrome, Internet Explorer 8 etc.). So when you surf on public PC,use private browsing mode.
3.Saved login information.
Any saved login informationsuch as from clicking the well-known "Remember Me"option when logging into a sitemay allow others to access your account(s).
4.Network Monitoring Tools may be installed.
Someone can view from LAN what are you doing. There are number of remote accesssoftware for business needs that are used for monitoring employees. These may be
installed on LAN from where someone can get real time view from your PC while youare using it.
5.Change Your Password Frequently.One of the best practices for keeping our account safe is to keep changing password.
-
7/22/2019 Cyber Crime by AYYAPPAN
17/19
-
7/22/2019 Cyber Crime by AYYAPPAN
18/19
INSTRUCTIONS:
1Learn about cyber crime and talk to your family about how to identify scams. Never give
out your personal information to anyone you do not know on the Web.
2Use a firewall to protect your computer from hackers. Most security software comes with
a firewall. Turn on the firewall that comes with your router as well.
3Purchase and install anti-virus software such as McAfee or Norton Anti-Virus. AVG
offers free anti-virus protection if you do not wish to purchase software.
4
Shop only at secure websites. Look for a Truste or VeriSign seal when checking out.Never give your credit card information to a website that looks suspicious or to someoneyou don't know.
5
Use strong passwords on your accounts that are difficult to guess. Include both letters andnumerals in your passwords. Never use a word that is easy to guess -- like your wife's
name.
6Keep watch over your children and how they use the Internet. Install parental control
software to limit where they can surf.
SOLUTIONS :
When investigating computer crimes, investigators and forensic accountants often
discover what could have been done to prevent the crimes. The following are some of themost frequently found items. The organizations failed to:
Have written policies and security rules for the use of computers and systems.
Have temporary employees and independent contractors follow the same security
rules as regular employees.
Adjust access as people changed responsibilities internally. Keep up with and close security holes in applications, firewalls, and operating
systems. Maintain virus protection on a fully updated basis.
-
7/22/2019 Cyber Crime by AYYAPPAN
19/19
Some of the suggestions to improve computer security include implementing the
following: More effective policies for security over proprietary information
Better interaction between the human resources department, the systems
department, and corporate security functions Better internal accounting controls
Better supervision of those with sensitive access to systems Better employee instruction in security issues
Better computer audit software Better software security
Better physical security in the workplace
CONCLUSION:
Never give out your name, address, telephone number, password, school name,parent's name, pictures of yourself, credit cards, or any other personal informationto others online.
If you are the victim of a cyber crime, the first thing you will have to do is to file acomplaint with details of the crime. The subsequent Q & As will familiarize you
with the steps to handling a cyber crime.As a general rule, though, we suggest you first contact your local law enforcement
authorities (police station) and let them know what happened, depending on thescope of the crime, it will be investigated by special cyber crime investigation cell.
This Project is about the cyber crimes across the INDIA & world ,and how toprevent yourself from that.