it act and cyber crime
DESCRIPTION
cyber crime ,phishin,botnetsTRANSCRIPT
![Page 1: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/1.jpg)
IT ACT AND CYBER CRIME
Presented by Dheeraj Dani7737401991
![Page 2: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/2.jpg)
Contents:IntroductionWhat is Cyber Crime?History of cyber crimeDefinitionCategories of cyber crimeCYBER ATTACKS STATISTICS 2013
Cyber criminalsWhat is IT Law and Cyber LawPhishingBotnetconclusion
![Page 3: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/3.jpg)
INTRODUCTIONThe internet in India is growing rapidly. It has
given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education.
There are two sides to a coin. Internet also has its own disadvantages. One of the major disadvantages is Cyber crime – illegal activity committed on the internet.
![Page 4: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/4.jpg)
What is Cyber crime???• Cyber crime is simply defined as crimes that are
directly related to computers and using computers.
• An increasing number of domestic and international criminal activities are using the Internet. Computers and other electronic devices can be tools to commit crime or are targeted by criminals. A personal computer connected to the Internet without protection may be infected with malicious software in under a minute.
![Page 5: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/5.jpg)
History of Cyber Crime• In the early decades of modern information technology (IT),
computer crimes were largely committed by individual disgruntled and dishonest employees.
• Physical damage to computer systems was a prominent threat until the 1980s.
• Criminals often used unauthorized access to subvert security systems as they modified data for financial gain or destroyed data for revenge.
• As telecommunications technology spread throughout the IT world, programmers began writing malicious software, including self-replicating programs, to interfere with personal computers.
![Page 6: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/6.jpg)
DEFINING CYBER CRIMEIt’s an unlawful act wherein the computer is
either a tool or a target or both.
Acts that are punishable by the Information Technology Act.
Cyber space is a virtual space that has become as important as real space for business, politics, and communities
![Page 7: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/7.jpg)
CATEGORIES OF CIBER CRIME1. Cyber crimes against persons.
2. Cyber crimes against property.
3. Cyber crimes against government
![Page 8: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/8.jpg)
CYBER ATTACKS STATISTICS(2013)
![Page 9: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/9.jpg)
CYBER CRIMINALSInsider Threats (employees)
Hackers (teenage thrill-
seekers to sophisticated
criminals)
Hactivists' (overloads e-mail
servers or hack web sites to send political
message)
Virus writers
(writes viruses to that infect systems)
Criminal groups
(attack systems & steal password for
financial gain)
Sensitive intrusions
(sensitive information is
obtained via computer intrusions)
Information warfare
(alternative to military attacks)
Terrorists (who have potential
to disrupt government systems
with computer attacks)
Cyber Warfare
(attack by sovereigns --- Crime or
Declaration of war)
![Page 10: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/10.jpg)
What is IT Law and Cyber LawIT Law is a set of legal enactments, currently in
existence in several countries, which governs the digital dissemination of both (digitalized) information and software.
Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet. It is less a distinct field of law than intellectual property or contract law, as it is a domain covering many areas of law and regulation. Some leading topics include internet access and usage, privacy, freedom of expression.
![Page 11: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/11.jpg)
PHISHING
A deception designed to steal valuable personal data, such as credit card numbers, passwords, account data, or other information.
![Page 12: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/12.jpg)
GLOBAL PHISHING SURVEY 2012
![Page 13: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/13.jpg)
![Page 14: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/14.jpg)
PEREVENTIONUSE STRONG PASSWORDS
SECURE YOUR COMPUTER1) ACTIVATE YOUR FIREWALL
2) USE ANTI-VIRUS
3) BLOCK SPYWARE ATTACKS
![Page 15: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/15.jpg)
BE SOCIAL –MEDIA SAVVY
SECURE YOUR MOBILR DEVICES.
INSTALL LATEST OS.
SECURE WIRELESS NETWORK.
PROTECT YOUR E-IDENTITY
![Page 16: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/16.jpg)
Why India?
A rapidly growing online user base
121 Million Internet Users 65 Million Active Internet
Users, up by 28% from 51 million in 2010
50 Million users shop online on Ecommerce and Online Shopping Sites
46+ Million Social Network Users
346 million mobile users had subscribed to Data Packages.
![Page 17: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/17.jpg)
The majority of cybercrimes are centered on fraud and Phishing, India is the third-most targeted country for Phishing attacks after
the US and the UK, Social networks as well as ecommerce sites are major targets, 6.9 million bot-infected systems in 2010, 14,348 website defacements in 2010, 6,850 .in and 4,150 .com domains were defaced during 2011, 15,000 sites hacked in 2011, India is the number 1 country in the world for generating spam.
![Page 18: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/18.jpg)
BotnetsA network of compromised computers that
have been infected with malicious code, and can be remotely-controlled through commands sent via the Internet by a botmaster
Used for making money! Who pays: Internet Advertising companies for downloading
adware onto vulnerable PCs Companies who send spam, viruses and other
malwareGoogle (unintentionally, see Clickbot.A
summary)Used for the heck of it
![Page 19: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/19.jpg)
Botnet ThreatBotnets are a major threat to the Internet
because:Consist of a large pool of compromised
computers that are organized by a master.a.k.a., Zombie Armies
Carry out sophisticated attacks to disrupt, gather sensitive data, or increase armies
Armies are in the 1000’s to aggregate computing power
Communication network allows bots to evolve on compromised hosts
![Page 20: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/20.jpg)
Attacking BehaviorsInfecting new hosts
Social engineering and distribution of malicious emails or other electronic communications (i.e. Instant Messaging)
Example - Email sent with botnet diguised as a harmless attachment.
Stealing personal information Keylogger and Network sniffer technology used on
compromised systems to spy on users and compile personal information
Phishing and spam proxy Aggregated computing power and proxy capability make allow
spammers to impact larger groups without being traced. Distributed Denial of Service (DDoS)
Impair or eliminate availability of a network to extort or disrupt business
![Page 21: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/21.jpg)
Communication ProtocolsIn most cases botnets use well defined and
accepted Communication Protocols. Understanding the communication protocols used helps to: Determine the origins of a botnet attack and
the software being used Allow researchers to decode conversations
happening between the bots and the masters
There are two main Communication Protocols used for bot attacks: IRC HTTP
![Page 22: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/22.jpg)
Conclusion Cybercrime greatly affects individuals, businesses,
and national security due to the pervasiveness
ofthe Internet
Different countries should work together and use
legal, organizational, and technological approaches
to combat cybercrime
• To reduce the damage to critical infrastructures
• To protect the Internet from being abused
![Page 23: It act and cyber crime](https://reader033.vdocuments.net/reader033/viewer/2022061300/54c8acbf4a79596d0a8b45a4/html5/thumbnails/23.jpg)