cyber crime by ayyappan

Upload: ayyappan-paramasivam

Post on 10-Feb-2018

227 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/22/2019 Cyber Crime by AYYAPPAN

    1/19

  • 7/22/2019 Cyber Crime by AYYAPPAN

    2/19

    CYBER CRIMEThe Invisible Criminal is dangerous than Visible one.- AYYAPPAN.P

    Cyber crime & computer crime have become a terms that we hear in the news with some

    frequency. To protect yourself from cyber crime, you must first understand what it is &how it can work against you. With the increasing popularity of shopping websites, online

    banking and other sites that require sensitive personal & financial data, cyber crime hasbecome an ever-present threat.

    What is meant by CYBE CRIME ?

    Cybercrime encompasses any criminal act dealing withcomputersandnetworks(calledhacking). Additionally, cyber crime also includes traditional

    crimes conducted through theInternet. For example: Releasing New films,telemarketing and Internet fraud, identity theft, and credit card account thefts

    are considered to be cyber crimes when the illegal activities are committedthrough the use of a computer and the Internet.

    Cybercrime also includes non-monetary offenses, such as creating anddistributingviruseson other computers or posting confidential business

    information on the Internet.

    Perhaps the most prominent form of cybercrime is identity theft, in whichcriminals use the Internet to steal personal information from other users. Two of

    the most common ways this is done is throughphishingandpharming. Both of

    these methods lure users to fake websites (that appear to be legitimate), wherethey are asked to enter personal information. This includeslogininformation,

    such as usernames and passwords, phone numbers, addresses, credit card

    numbers, bank account numbers, and other information criminals can use to

    "STEAL" another person's identity. For this reason, it is smart to always check

    theURLor Web address of a site to make sure it is legitimate before entering

    your personal information.

    http://www.webopedia.com/TERM/C/cyber.htmlhttp://www.webopedia.com/TERM/C/cyber.htmlhttp://www.webopedia.com/TERM/C/cyber.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/H/hacker.htmlhttp://www.webopedia.com/TERM/H/hacker.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.techterms.com/definition/virushttp://www.techterms.com/definition/virushttp://www.techterms.com/definition/virushttp://www.techterms.com/definition/phishinghttp://www.techterms.com/definition/phishinghttp://www.techterms.com/definition/phishinghttp://www.techterms.com/definition/pharminghttp://www.techterms.com/definition/pharminghttp://www.techterms.com/definition/pharminghttp://www.techterms.com/definition/loginhttp://www.techterms.com/definition/loginhttp://www.techterms.com/definition/loginhttp://www.techterms.com/definition/urlhttp://www.techterms.com/definition/urlhttp://www.techterms.com/definition/urlhttp://www.techterms.com/definition/urlhttp://www.techterms.com/definition/loginhttp://www.techterms.com/definition/pharminghttp://www.techterms.com/definition/phishinghttp://www.techterms.com/definition/virushttp://www.webopedia.com/TERM/I/Internet.htmlhttp://www.webopedia.com/TERM/H/hacker.htmlhttp://www.webopedia.com/TERM/N/network.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/cyber.html
  • 7/22/2019 Cyber Crime by AYYAPPAN

    3/19

    Because cybercrime covers such a broad scope of criminal activity, theexamples above are only a few of the thousands of crimes that are considered

    cybercrimes. While computers and the Internet have made our lives easier in

    many ways, it is unfortunate that people also use these technologies to take

    advantage of others. Therefore, it is smart to protect yourself by using antivirusand spyware blocking software and being careful where you enter your personal

    information.

    TYPES OF CYBER CRIME :

  • 7/22/2019 Cyber Crime by AYYAPPAN

    4/19

    HACKING

    DENIAL OF SERVICEATTACK

    VIRUS DISSEMINATION

    SOFTWARE PIRACY

    PORNOGRAPHY

    IRC CRIME

    CREDIT CARD FRAUD

    PHISHING

    SPOOFING

    CYBERSTALKING

    CYBERDEFAMATION

    THREATENING

    SALAMI ATTACK

    NET EXTORTION

    HACKING

    The act of gaining unauthorized access to a computer system or network and in

    some cases making unauthorized use of this access. Hacking is also the act bywhich other forms of cyber-crime (e.g., fraud, terrorism, etc.) are committed.Hacking in simple terms means illegal intrusion into a computer system withoutthe permission of the computer owner/user.

  • 7/22/2019 Cyber Crime by AYYAPPAN

    5/19

    DENIAL OF SERVICE ATTACK

    This is an act by the criminal, who floods the band width of the victims network

    or fills his e-mail box with spam mail depriving him of the services he is entitled toaccess or provide.

    VIRUS DISSEMINATION

    Malicious software that attaches itself to other software. (virus , worms ,TrojanHorse , Time bomb , Logic Bomb , Rabbit and Bacterium are the malicioussoftwares)

    SOFTWARE PIRACY

    Theft of software through the illegal copying of genuine programs or the

    counterfeiting and distribution of products intended to pass for the original. Retailrevenue losses world wide are ever increasing due to this crime Can be done in

    various ways such as end user copying, hard disk loading, Counterfeiting, Illegaldownloads from the internet etc.

    PRONOGRAPHY

    Pornography is the first consistently successful ecommerce product. It was a

    deceptive marketing tactics and mouse trapping technologies. Pronography

    encourage customers to access their websites. Anybody including children can logon to the internet and access website with pronography contents with a click of amouse.

    IRC CRIME

    Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere

    the world can come together and chat with each other Criminals use it for meetingcoconspirators. Hackers use it for discussing their exploits / sharing the techniques

    CREDIT CARD FRAUD

    You simply have to type credit card number into www page off the vendor for

    online transaction If electronic transactions are not secured the credit card numbers

    can be stolen by the hackers who can misuse this card by impersonating the creditcard owner.

  • 7/22/2019 Cyber Crime by AYYAPPAN

    6/19

    PHISHING

    It is technique of pulling out confidential information from the bank/financialinstitutional account holders by deceptive means.

    SPOOFING

    Getting one computer on a network to pretend to have the identity of another

    computer, usually one with special access privileges , so as to obtain access to theother computers on the network.

    CYBER STALKING

    The Criminal follows the victim by sending emails, entering the chat roomsfrequently.

    CYBER DEFAMATION

    The Criminal sends emails containing defamatory matters to all concerned of the

    victim or post the defamatory matters on a website. (disgruntled employee may dothis against boss, ex-boys friend against girl, divorced husband against wife etc..)

    THREATENING

    The Criminal sends threatening email or comes in contact in chat rooms withvictim. (Any one disgruntled may do this against boss, friend or official).

    SALAMI ATTACK

    In such crime criminal makes insignificant changes in such a manner that suchchanges would go unnoticed. Criminal makes such program that deducts small

    amount like 2.50 per month from the account of all the customer of the Bank and

    deposit the same in his account. In this case no account holder will approach thebank for such small amount but criminal gains huge amount.

  • 7/22/2019 Cyber Crime by AYYAPPAN

    7/19

    Cyber Laws in INDIA:

    The IT Act 2000 attempts to change outdated laws and provides ways to deal with cyber

    crimes. We need such laws so that people can perform purchase transactions over the Netthrough credit cards without fear of misuse. The Act offers the much-needed legal

    framework so that information is not denied legal effect, validity or enforceability, solely

    on the ground that it is in the form of electronic records.

    In view of the growth in transactions and communications carried out through electronic

    records, the Act seeks to empower government departments to accept filing, creating andretention of official documents in the digital format. The Act has also proposed a legal

    framework for the authentication and origin of electronic records / communicationsthrough digital signature.

    * From the perspective of e-commerce in India, the IT Act 2000 and its provisions

    contain many positive aspects. Firstly, the implications of these provisions for the e-businesses would be that email would now be a valid and legal form of communication in

    our country that can be duly produced and approved in a court of law.* Companies shall now be able to carry out electronic commerce using the legal

    infrastructure provided by the Act.* Digital signatures have been given legal validity and sanction in the Act.

    * The Act throws open the doors for the entry of corporate companies in the business of

  • 7/22/2019 Cyber Crime by AYYAPPAN

    8/19

    being Certifying Authorities for issuing Digital Signatures Certificates.

    * The Act now allows Government to issue notification on the web thus heralding e-governance.

    * The Act enables the companies to file any form, application or any other document with

    any office, authority, body or agency owned or controlled by the appropriate Governmentin electronic form by means of such electronic form as may be prescribed by the

    appropriate Government.* The IT Act also addresses the important issues of security, which are so critical to the

    success of electronic transactions. The Act has given a legal definition to the concept ofsecure digital signatures that would be required to have been passed through a system of

    a security procedure, as stipulated by the Government at a later date.

    * Under the IT Act, 2000, it shall now be possible for corporates to have a statutoryremedy in case if anyone breaks into their computer systems or network and cause losses

    damages or copies data. The remedy provided by the Act is in the form of monetary

    damages, not exceeding Rs. 1 crore.

    /

    :

    1./.

    ,(report abuse).

    2. .. , ,.

    3.,,

    .

    4. ,, ,, Inbox. .

  • 7/22/2019 Cyber Crime by AYYAPPAN

    9/19

    !http://cybercrimeindia.org/

    How to secure your system from Keyloggers :

    Now a days keylogger is major problem for all. So we should learn to secure ourcomputer from keylogger. This article will help for ethical hackers or who want to protect

    their pc.

    What is Keylogger?

    Keylogger is one of spyware which will what type you through the keyboard and send itto hacker who send the keylogger. Hackers mainly use keyloggers to steal your

    passwords, credit card numbers and other confidential data. So whenever you type the

    username and password in gmail,online banking sites, it will send the username andpassword to hacker.

    How to Protect?

    In order to provide security for your system,you must have

    Good AntiVirus:

    This is basic and best step to protect your system from keylogger. So buy a licensed andbest antivirus which is currently in market. My suggestion is Kaspersky, Norton orMcafee. Don't forget to update regularly.

    Note: Don't use trial or cracked pack ,it is worthless to use.

    Good Spyware:Since keyloggers are basically spywares, if you are a frequent user of Internet then youcould be exposed to thousands of keyloggers and spywares. So you should use a good

    antispyware such as NoAdware.

    Antilogger can be Handy

    Antiloggers are programs that detect the presence of keyloggers on a given computer.

    Zemana Antilogger is the best antilogger.

    http://www.facebook.com/l.php?u=http%3A%2F%2Fcybercrimeindia.org%2F&h=pAQG_IDxNAQG98SycY6OHixpvaXCC4F1qsw7FIlk4claaow&s=1http://www.facebook.com/l.php?u=http%3A%2F%2Fcybercrimeindia.org%2F&h=pAQG_IDxNAQG98SycY6OHixpvaXCC4F1qsw7FIlk4claaow&s=1http://www.facebook.com/l.php?u=http%3A%2F%2Fcybercrimeindia.org%2F&h=pAQG_IDxNAQG98SycY6OHixpvaXCC4F1qsw7FIlk4claaow&s=1http://www.facebook.com/l.php?u=http%3A%2F%2Fcybercrimeindia.org%2F&h=pAQG_IDxNAQG98SycY6OHixpvaXCC4F1qsw7FIlk4claaow&s=1
  • 7/22/2019 Cyber Crime by AYYAPPAN

    10/19

    Online Scanning

    When ever you receive a suspicious file, you scan it with online scanners such as Multi

    engine antivirus scanner which scans your file with 24 antivirus engines and reports it

    back to you if the file is recognized as a virus or spyware. This ensures that none of themalicious programs can escape from being detected as there are 24 different antivirusengines are involved in the scanning process.

    Keyscrambler

    Keyscrambler is one of the best protection against keyloggers that you can have,Keyscrambler is a small program which encrypts your typed keystrokes so even if the

    victim has installed a keylogger on your system, he or she will get encrypted keys.

    Keyscrambler currently supports Firefox, Internet explorer and other applications,however its premium version supports more than 160 applications.

  • 7/22/2019 Cyber Crime by AYYAPPAN

    11/19

  • 7/22/2019 Cyber Crime by AYYAPPAN

    12/19

  • 7/22/2019 Cyber Crime by AYYAPPAN

    13/19

  • 7/22/2019 Cyber Crime by AYYAPPAN

    14/19

  • 7/22/2019 Cyber Crime by AYYAPPAN

    15/19

  • 7/22/2019 Cyber Crime by AYYAPPAN

    16/19

    Safety Tips for Cyber Cafe Visitors:

    Locations that offer wireless Internet access like hotels and airports typically also providethe use of Internet kiosks or public computers for Web access and word processing. This

    is a great benefit for those without their own devices, but can also pose many risks:

    1.Key loggers may be installed.Every keystroke you make may be recordedcomprising any login information, even for

    VPN connections. Use onscreen keyboard to login. Windows default onscreen keyboardcan be accessed from

    Start >> All Programs >> Accessories >> Accessibility >> on-Screen Keyboard

    2.Yourbrowsing history may be cached.

    People can see what Web sites you've visited, and they may be able to view these cachedsites, which may invade your privacy. Newer browsers have facility for private

    browsing(Firefox 3.5, Chrome, Internet Explorer 8 etc.). So when you surf on public PC,use private browsing mode.

    3.Saved login information.

    Any saved login informationsuch as from clicking the well-known "Remember Me"option when logging into a sitemay allow others to access your account(s).

    4.Network Monitoring Tools may be installed.

    Someone can view from LAN what are you doing. There are number of remote accesssoftware for business needs that are used for monitoring employees. These may be

    installed on LAN from where someone can get real time view from your PC while youare using it.

    5.Change Your Password Frequently.One of the best practices for keeping our account safe is to keep changing password.

  • 7/22/2019 Cyber Crime by AYYAPPAN

    17/19

  • 7/22/2019 Cyber Crime by AYYAPPAN

    18/19

    INSTRUCTIONS:

    1Learn about cyber crime and talk to your family about how to identify scams. Never give

    out your personal information to anyone you do not know on the Web.

    2Use a firewall to protect your computer from hackers. Most security software comes with

    a firewall. Turn on the firewall that comes with your router as well.

    3Purchase and install anti-virus software such as McAfee or Norton Anti-Virus. AVG

    offers free anti-virus protection if you do not wish to purchase software.

    4

    Shop only at secure websites. Look for a Truste or VeriSign seal when checking out.Never give your credit card information to a website that looks suspicious or to someoneyou don't know.

    5

    Use strong passwords on your accounts that are difficult to guess. Include both letters andnumerals in your passwords. Never use a word that is easy to guess -- like your wife's

    name.

    6Keep watch over your children and how they use the Internet. Install parental control

    software to limit where they can surf.

    SOLUTIONS :

    When investigating computer crimes, investigators and forensic accountants often

    discover what could have been done to prevent the crimes. The following are some of themost frequently found items. The organizations failed to:

    Have written policies and security rules for the use of computers and systems.

    Have temporary employees and independent contractors follow the same security

    rules as regular employees.

    Adjust access as people changed responsibilities internally. Keep up with and close security holes in applications, firewalls, and operating

    systems. Maintain virus protection on a fully updated basis.

  • 7/22/2019 Cyber Crime by AYYAPPAN

    19/19

    Some of the suggestions to improve computer security include implementing the

    following: More effective policies for security over proprietary information

    Better interaction between the human resources department, the systems

    department, and corporate security functions Better internal accounting controls

    Better supervision of those with sensitive access to systems Better employee instruction in security issues

    Better computer audit software Better software security

    Better physical security in the workplace

    CONCLUSION:

    Never give out your name, address, telephone number, password, school name,parent's name, pictures of yourself, credit cards, or any other personal informationto others online.

    If you are the victim of a cyber crime, the first thing you will have to do is to file acomplaint with details of the crime. The subsequent Q & As will familiarize you

    with the steps to handling a cyber crime.As a general rule, though, we suggest you first contact your local law enforcement

    authorities (police station) and let them know what happened, depending on thescope of the crime, it will be investigated by special cyber crime investigation cell.

    This Project is about the cyber crimes across the INDIA & world ,and how toprevent yourself from that.