hacking a cause of cyber crime final

18
Hacking a cause of cyber crime

Upload: harsha-matta

Post on 01-Sep-2014

1.751 views

Category:

Education


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Hacking a cause of cyber crime final

Hacking a cause of cyber crime

Page 2: Hacking a cause of cyber crime final

Cyber Crime • In Simple way we can say that cyber crime is unlawful acts where in the computer is either a

tool or a target or both.

• Computers and the Web provide a new environment for fraud, embezzlement, theft, forgery, and industrial espionage.

• Crimes committed with computers and on the Web are more devastating and harder to detect than similar crimes committed without computers.

• A thief who steals a credit card gains access to a much larger amount of money than the thief who stole a wallet in the past with only cash. For eg Criminals can steal, commit fraud, or destroy data from miles away or from another country, by modem.

It is more simpler to stop/destroy the visible enemies then one who is not visible that’s the

reason why cyber crime is more difficult to control because cyber criminals are not visible.

CATEGORIES OF CYBER CRIME:• Cyber-crimes can be basically divided into 3 major categories:

1. Cyber-crimes against persons.2. Cyber-crimes against property.

3. Cyber-crimes against government

Page 3: Hacking a cause of cyber crime final

Types of Cyber Crime

Denial of Service AttackPornographyPhisingSpoofingSalami AttackForgery

Hacking Hackers: enjoy intellectual challenges of overcoming software limitations and how to increase capabilities of systems

Crackers: illegally break into other people’s secure systems and networks

Cyber Terrorists: threaten and attack other people’s computers to further a social or political agenda

Page 4: Hacking a cause of cyber crime final

How do people Hack …?Motivation for Hackers:-

The challenge... ‘because it’s there!’ Ego Espionage Ideology Mischief Money (extortion or theft) Revenge

Page 5: Hacking a cause of cyber crime final

Hacker Characteristics Predominantly male Aged from mid-teens to mid-twenties

Lacking in social skillsUnderachiever in other areas who sees computing as a means of being important or powerful

Page 6: Hacking a cause of cyber crime final

History of Hackers• In December of 1947, the transistor was invented.• Captain Crunch• Steve Jobs• Kevin Mitnick • AT&T• The Worm- Robert Morris• Kevin Poulsen (a.k.a. Dark Dante)• Tsumomu Shimomura • David Smith • Jon Johansen (a.k.a. DVD Jon)

Page 7: Hacking a cause of cyber crime final

Two years jail for UK virus writer who infected 27,000 PCs

Simon Vallor, the twenty-two year old web designer from North Wales who, in December 2002, pleaded guilty to writing and distributing three computer viruses, was sentenced at Southwark Crown Court, London to a two year custodial sentence. His viruses - Gokar, Redesi and Admirer – were proven to have infected 27,000 PCs in 42 countries.

21 January 2003 : -

Page 8: Hacking a cause of cyber crime final

Successful Hackers• Eric McCarty hacks into USC

database• Australian hacker attacks sewage

control computers

Page 9: Hacking a cause of cyber crime final

What are “Hacking” 3 phases?

The three phases of hacking are:

Phase 1—the early years (1960’s and 1970’s), when hacking was a positive term;Phase 2—the period from the 1970’s to the 1990’s, when hacking took on its more negative meanings.Phase 3—beginning in the mid-1990’s with the growth of the Web and of e-commerce and the participation of a large portion of the general public online.

Page 10: Hacking a cause of cyber crime final

Hacking can take several forms:- • Accessing - entering a network which is intended to be private

• Defacing – changing the content of another person’s Web site

• Hijacking – redirecting elsewhere anyone trying to access a particular Web site

• Bombing – overwhelming a site with countless messages to slow down or even crash the server

• Denial of service – running a program which sends thousands of requests to a site simultaneously, frequently from more than one source, so that the relevant server slows down considerably or preferably (from the point of view of the hacker) crashes.

Page 11: Hacking a cause of cyber crime final

Some facts on hacking• The Information Security Advisory Group estimates that world-wide there are now some 100,000

hackers or crackers (as they prefer to describe themselves). • Hackers have developed a program called “The Backdoor” which provides them access to

systems running Microsoft Windows.• Company computer systems are usually more difficult to hack because they employ protective

arrangements such as firewalls. • The most infamous group of hackers – operating since 1994 – is an American team which calls

itself “The Cult of the Dead Cow” (CDC). • hacking incidents of recent times occurred in February 2000 when distributed ‘denial of service’

attacks brought down the sites of Yahoo!, CNN, eBay, Buy.com, Amazon, E*Trade, Datek & ZDNet. • hacking into 92 computer networks operated by NASA and the US military (including two break-

ins at the Pentagon).• Western Union closed its web site for five days in September 2001 after a security breach saw

hackers access 15,000 records containing credit and debit card details.

Page 12: Hacking a cause of cyber crime final

The Future

• Hacking by terrorists and by government-sponsored military organizations is likely to increase. The governments

of the U.S., China, and other countries are using or planning such attacks.• The potential for havoc will increase when hackers can control devices, not just for information.

• Hacktivism is the use of hacking to promote a political cause.

• A police detective specializing in financial crime and hacking told that 30% of hackers are government

informers.• Law-enforcement and security personnel continue to update their skills and tools as hackers change theirs.• The Computer Emergency Response Team (CERT), based at Mello University, was established in 1988 in

response to the Internet Worm.(CERT itself was the victim of a denial-of-service attack in 2001, bogging down its Web site for 30 hours.)

Catching HackersHacktivism, or Political Hacking

Page 13: Hacking a cause of cyber crime final

What are the Effects of Computer Hacking

1. It exposes the sensitive data of the user and risks user privacy. 2. Modification of important data with intent to achieve personal gain is another effect

of computer hacking.3. It meant to be an illegal use of someone else's identity for personal use.4. Several key-logging software have been evolved which are capable of tracking and

recording key stroke by the user, causing stealing of passwords and account details.

5. If the information related to national security, confidential government data, information related to national defence and security

6. Hacking can be used to convert computer into zombies.

Page 14: Hacking a cause of cyber crime final

Cyber Crime and Its Causes…!

CYBER LAW

• India has enacted the first I.T.Act, 2000 based on the UNCIRAL model recommended by the general assembly of the United Nations.

Offence Section under IT Act • Tampering with Computer source documents Sec.65 • Hacking with Computer systems, Data alteration Sec.66 • Publishing obscene information Sec.67• Un-authoried access to protected system Sec.70• Breach of Confidentiality and Privacy Sec.72 • Publishing false digital signature certificates Sec.73

Page 15: Hacking a cause of cyber crime final

No Updated Laws (33):Albania, Bulgaria, Burundi, Cuba,

Dominican Republic,Egypt, Ethiopia, Fiji, France, Gambia,

Hungary, Iceland,Iran, Italy, Jordan, Kazakhstan, Latvia,

Lebanon,Lesotho, Malta, Moldova, Morocco,

New Zealand,Nicaragua, Nigeria, Norway, Ro

Partially Updated (9):Brazil, Chile, China, Czech

Republic, Denmark,Malaysia, Poland, Spain,

United Kingdoma

Substantially or Fully Updated (10):

Australia, Canada, Estonia, India,

Japan, Mauritius, Peru, Philippines,

Turkey, United States

Page 16: Hacking a cause of cyber crime final

How can you find out whether your computer has been hacked?

• An unexplained decline in computer performance, • An unexpected increase in file size, • Unexplained modifications to files, • Sudden changes in network settings of the

computer • Frequent disk crashes are some of the warning

signs of a hacked computer.

Page 17: Hacking a cause of cyber crime final

What kind of protection is available?

• Cyber Security – Cyber security standards are security standards which enables organizations to practice safe security techniques to

minimize the number of successful cyber security attacks.• ADVANTAGES OF CYBER SECURITY • It defends us from critical attacks. • It helps us browse safe websites. • It defends us from hacks and virus

• Prevention

Small Things• Tips to secure your Wireless network• Security and Passwords• Protect yourself against viruses• Install a Firewall• Update your Microsoft Systems

Page 18: Hacking a cause of cyber crime final

CONCLUSION • The modern thief can steal more with a

computer than without a gun.• Tomorrow’s terrorists may be able to do more

damage with a keyboard than with a bomb. • Thus hacking is one of the serious cause of

cyber-crime in todays world.Thank you