Cyber Crime Project

download Cyber Crime Project

of 23

Transcript of Cyber Crime Project

  • 8/2/2019 Cyber Crime Project

    1/23

    1

    INTRODUCTION

    Cyber crime is the latest and perhaps the most complicated problem in the cyber world.

    Cybercrime is defined as: Any criminal activity that uses a computer either as an

    instrumentality, target or a means for perpetuating further crimes comes within the ambit of

    cyber crime. Computer mediated activities which are either illegal or considered illicit by

    certain parties and which can be conducted through global electronic networks.

    Cybercrime is a form of crime where the internet or computers are used as a medium to commit

    crime.Issues surrounding this type of crime have become high-profile, particularly those

    surrounding hacking, copyright and child grooming.

    The Department of Justice categorizes cyber crime in three ways:

    1. The computer as a target - attacking the computers of others (spreading viruses is anexample).

    2. The computer as a weapon - using a computer to commit "traditional crime" that we seein the physical world (such as fraud or illegal gambling).

    3. The computer as an accessory - using a computer as a "fancy filing cabinet" to storeillegal or stolen information.

    Cybercrime is a growing concern for both law enforcement officials and consumers as a result of

    the rapid expansion of the Internet into all forms of business and commerce. Cybercrime can be

    directed toward persons, property, companies, or government authorities.

  • 8/2/2019 Cyber Crime Project

    2/23

    2

    HISTORY OF CYBER CRIME

    The first recorded cyber crime took place in the year 1820! That is not surprising considering the

    fact that the abacus, which is thought to be the earliest form of a computer, has been around since

    3500 B.C. in India, Japan and China. The era of modern computers, however, began with the

    analytical engine of Charles Babbage.

    In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This

    device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted

    in a fear amongst Jacquard's employees that their traditional employment and livelihood were

    being threatened. They committed acts of sabotage to discourage Jacquard from further use of

    the new technology. This is the first recorded cyber crime!

    1970s: Rootkits

    Came out of the UNIX era in the 70s but the most famous episode was in 2005 it was

    discovered that Sony BMG Music Entertainment had used rootkit techniques to disguise digital

    rights management software that installed itself on consumers' computers when they played a

    Sony CD.

    Rootkits are software that enables continuous, privileged access to a computer while actively

    hiding its presence from administrators. Typically, an attacker installs a rootkit on a computer

    after first obtaining root-level access, either by exploiting a known vulnerability or by obtaining

    a password

    1978: Spam

    The first spam e-mail was sent in 1978 over the ARPAnet, the US Defense Department networkby a Digital Equipment Corp. marketing executive. Today mass mailings are sent via a vast array

    of channels - email, newsgroups, instant messaging, mobile phones - to recipients who have not

    requested them and cannot remove themselves from the mailing list. Spam has grown more

    malevolent, as criminals have made it the carrier for a host of scams.

  • 8/2/2019 Cyber Crime Project

    3/23

    3

    1982: Viruses

    A high school student named Rich Skrenta wrote Elk Cloner for Apple II computers. Hidden on

    a floppy disk necessary to load the operating system on the computer, it spread when users

    unknowingly used an infected disk to boot up.

    A computer virus is a computer program that can copy itself and infect a computer. A true virus

    can spread from one computer to another (in some form of executable code) when its host is

    taken to the target computer. Thus, viruses are spread when a user sends it over a network or the

    Internet, or carries it on a removable medium such as a floppy disk, CD, DVD, or USB drive.

    1988: Worms

    Robert T. Morris, a graduate student at Cornell University, created software that would

    automatically replicate itself on computers hooked up to the government's ARPAnet (the

    precursor to the Internet).

    A computer worm is a self-replicating computer program, which sends copies of itself to other

    nodes over a network. Unlike a computer virus, it does not need to attach itself to an existing

    program. Worms almost always cause at least some harm to the network, even if only by

    consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted

    computer.

    1989: Trojan horse software

    In 1989 (or 87, depending who you speak to), a diskette claiming to be a database of AIDS

    information was mailed to thousands of AIDS researchers and subscribers to a UK computer

    magazine.

    A Trojan is a destructive program that masquerades as a benign application and is named after

    the Trojan Horse of Greek mythology. The software initially appears to perform a desirable

    function for the user prior to installation and/or execution, but steals information or harms the

    system. Unlike viruses or worms, Trojans do not replicate themselves.

  • 8/2/2019 Cyber Crime Project

    4/23

    4

    1990s: Crimeware

    This evolved from prankware, the kind of software that would install a daft message on your

    computer screen if you opened an infected email. Demand from organised online criminals has

    created a supply of easily downloadable malware packages.

    1996: Phishing

    The term is coined although activity predates this. Phishing attempts to trick Internet users into

    divulging their personal information for use or resale by criminals. Also known as social

    engineering, phishing typically cons users through authentic-looking emails, which link to

    websites that mimic those of respected financial institutions or retailers.

    Spear-phishing was coined a decade later and refers to a more sophisticated online con act that

    targets an individual or an organisation

    1998: Man-in-the-middle attack

    A man in the middle attack was reported by the National Security Agency in 1998, but more

    famous attacks occurred in October 2005, when global banks were targeted.

    Man-in-the-middle depends on interception and has been around since espionage began.

    However technology has given it a whole new momentum. It can be a as simple as snooping on

    someones emails over unencrypted wi-fi in an Internet cafe. More malicious attacks use

    sophisticated Trojans to interrupt banking deals in order to siphon off billions of dollars.

    MITM has recently morphed into the more invidious manin-the-browser. The pernicious

    malware lurks within the victims browser, waits until authenticated procedures have been

    successfully negotiated, before redirecting funds into an illicit bank account. Zeus is the most

    notorious MITB used to circumvent banks multi-factor

    The 00s: Social networking sites take off

  • 8/2/2019 Cyber Crime Project

    5/23

    5

    My Space launches in 2003 and Facebook in 2004, heralding a new era of social networking.

    The medium is also rapidly colonised by criminals and is now a primary conduit for the

    proliferation of malware, and also of social engineering attacks.

    2000: Denial-of-service and distributed denial-of-service attacks

    Canadian hacker MafiaBoy launched a distributed denial-of-service attack that took down

    several high-profile Web sites, including Amazon, CNN and Yahoo!

    A D(D)oS attack makes a computer resource, often a website, unavailable to its intended users.

    A common method of attack involves saturating the target machine with external

    communications requests, such that it cannot respond to legitimate traffic, or responds so slowly

    as to be rendered effectively unavailable

    2003: Botnets

    The SoBig email worm is thought to be the first organised attempt to create large-scale botnets.

    A botnet is a collection of infected computers or bots that have been taken over by hackers and

    are used to perform malicious tasks or functions. A computer becomes a bot when it downloads a

    file that has bot software embedded in it. A botnet takes action without the hackers having to log

    in to the client's computer.

    July 2010: Stuxnet

    A Microsoft Windows computer worm was discovered in July 2010 that targets industrial

    software and equipment. It is the first discovered malware that spies on and subverts industrial

    systems.

    2011: Advanced persistent threat (APT)

    Is the acronym on every cyber security professionals lips. APT usually refers to a group, such as

    a foreign nation state government, with both the capability and the intent to persistently and

  • 8/2/2019 Cyber Crime Project

    6/23

    6

    effectively target a specific entity. The aggressor uses every kind of malware at their disposal in

    a sustained attack on a target that can last months in order to achieve their criminal ends.

    WHY WE HAVE TO LEARN ABOUT CYBER CRIME?

    BECAUSE:

    Everybody is using computers. From white collar criminals to terrorist organizations and from teenagers to adults.

    Conventional crimes like forgery, extortion, kidnapping etc. are being committed with thehelp of computers.

    New generation is growing up with computers. MOST IMPORTANTMonetary transaction are moving on to the internet

  • 8/2/2019 Cyber Crime Project

    7/23

    7

    REASONS FOR CYBER CRIME

    1. Capacity to store data in comparatively small space:The computer has unique characteristic of storing data in a very small space. This affords

    to remove or derive information either through physical or virtual medium makes it much

    more easier.

    2. Easy to access:The problem encountered in guarding a computer system from unauthorised access is that

    there is every possibility of breach not due to human error but due to the complex

    technology. By secretly implanted logic bomb, key loggers that can steal access codes,

    advanced voice recorders; retina imagers etc. that can fool biometric systems and bypass

    firewalls can be utilized to get past many a security system.

    3. Complex:The computers work on operating systems and these operating systems in turn are

    composed of millions of codes. Human mind is fallible and it is not possible that there

    might not be a lapse at any stage. The cyber criminals take advantage of these lacunas

    and penetrate into the computer system.

    4. Negligence:Negligence is very closely connected with human conduct. It is therefore very probable

    that while protecting the computer system there might be any negligence, which in turn

    provides a cyber criminal to gain access and control over the computer system.

  • 8/2/2019 Cyber Crime Project

    8/23

    8

    5. Loss of evidence:

    Loss of evidence is a very common & obvious problem as all the data are routinely

    destroyed. Further collection of data outside the territorial extent also paralyses this

    system of crime investigation.

  • 8/2/2019 Cyber Crime Project

    9/23

    9

    CYBER CRIMINALS

    1. Children and adolescents between the age group of 618 years:

    The simple reason for this type of delinquent behaviour pattern in children is seen mostly

    due to the inquisitiveness to know and explore the things. Other cognate reason may be

    to prove themselves to be outstanding amongest other children in their group. Further the

    reasons may be psychological even. E.g. theBal Bharati (Delhi) case was the outcome of

    harassment of the delinquent by his friends.

    2. Organised hackers:These kinds of hackers are mostly organised together to fulfil certain objective. The

    reason may be to fulfil their political bias, fundamentalism, etc. The Pakistanis are said to

    be one of the best quality hackers in the world. They mainly target the Indian government

    sites with the purpose to fulfil their political objectives. Further theNASA as well as

    theMicrosoftsites is always under attack by the hackers.

    3. Professional hackers / crackers:

    Their work is motivated by the colour of money. These kinds of hackers are mostly

    employed to hack the site of the rivals and get credible, reliable and valuable information.

    Further they are ven employed to crack the system of the employer basically as a measure

    to make it safer by detecting the loopholes.

    4. Discontented employees:

    This group include those people who have been either sacked by their employer or aredissatisfied with their employer. To avenge they normally hack the system of their

    employee.

  • 8/2/2019 Cyber Crime Project

    10/23

    10

    CATEGORIES OF CYBER CRIME

    Cyber crimes can be basically divided into 3 major categories:

    1. Cyber crimes against persons.

    2. Cyber crimes against property.

    3. Cyber crimes against government.

    1. Cyber crimes against persons:

    Cyber harassment is a distinct Cyber crime. Various kinds of harassment can and do

    occur in cyberspace, or through the use of cyberspace. Harassment can be racial, religious

    or other.

    2. Cyber crimes against property:These crimes include computer vandalism (destruction of others' property), transmission

    of harmful programs.

    3. Cyber crimes against government:Cyber terrorism is one distinct kind of crime in this category. The growth of internet has

    shown that the medium of Cyberspace is being used by individuals and groups to threaten

    the international governments as also to terrorize the citizens of a country.

  • 8/2/2019 Cyber Crime Project

    11/23

    11

    TYPES OF CYBER CRIME

    There are various types of cyber crime, some of which are as follows:

    1. Hacking2. Virus Dissemination3. Spoofing4. Online Fraud5. Cyber Stalking6. Software Piracy7. Salami Attack8.

    Denial Of Service

    1. HACKING:In the truest sense of the word, a "hacker" is a dedicated programming expert who

    believes in sharing his expertise and experiences with other hackers. A hacker does not

    believe in vandalizing or maliciously destroying data, or in stealing data of any kind. A

    "cracker" is a cyber burglar or vandal - an individual or group intent on causing malicious

    harm to a network or computer, or to steal information beneficial to themselves like

    passwords, credit card numbers and the like. For ease of use, the term "hacker" is used

    here to refer to either a hacker or cracker, as someone who enters or tries to enter your

    computer or network without authorization.

    Personal information, names address, financial information, even the account information

    for your ISP and passwords, in short anything stored on your computer can be obtained

    by a hacker. A Trojan may record each and every keystroke you make, save the

    information to a hidden file, and automatically upload it to the hacker's computer.

    Purposes of hacking

    Greed

  • 8/2/2019 Cyber Crime Project

    12/23

    12

    Power Publicity Revenge Adventure Desire to access forbidden information Destructive mindset

    Hackers write or use ready-made computer programs to attack the target computer. They

    possess the desire to destruct and they get the kick out of such destruction. Some hackers

    hack for personal monetary gains, such as to stealing the credit card information,

    transferring money from various bank accounts to their own account followed by

    withdrawal of money. They extort money from some corporate giant threatening him topublish the stolen information, which is critical in nature. Government websites are the

    hot targets of the hackers due to the press coverage they receive.

    2. VIRUS DISSEMINATION:A computer virus is a program that can infect other legitimate programs by modifying

    them to include a possibly evolved copy of itself. Viruses can spread themselves,

    without the knowledge or permission of the users, to potentially large numbers of

    programs on many machines. A computer virus passes from computer to computer like a

    biological virus passes from person to person.

    Viruses can also contain instructions that cause damage or annoyance; the combination of

    possibly damaging code with the ability to spread is what makes viruses a considerable

    concern.

    Typical action of a virus

    1.Display a message to prompt an action which may set of the virus2.Erase files3.Scramble data on a hard disk4.Cause erratic screen behavior

  • 8/2/2019 Cyber Crime Project

    13/23

    13

    5.Halt the PC6.Just replicate itself!

    3. SPOOFING:Spoofing is an illegal practice of using someone elses domain name or email address as

    the sender or reply to address on an email note. Spoofing means a hacker logs-in to a

    computer illegally using a different identity than his own.He is able to do this by having

    previously obtained actual password. He creates a new identity by fooling the computer

    into thinking he is the genuine system operator. Hacker then takes control of the system.

    The process of deception by which an individual or system alters its identity or creates

    additional identities, thereby causing another person or system to act incorrectly. Getting

    one computer on a network to pretend to have the identity of another computer, usually

    one with special access privileges , so as to obtain access to the other computer on the

    network.

    If you start getting a large amount of returned mail in your inbox, and we mean large, you

    may be a victim. Our mail spiked to over 1200 returned emails per day. Another signal is

    email from people you do not know asking you to remove them from your list. At first we

    were confused by this, but these notes must be taken seriously. Take a moment and look

    closely at some of the returned mail that you receive. Is your domain name listed as a

    sender?

    Out of the thousands of returned mail that we received, we saw senders names like

    [email protected], [email protected],

    [email protected]. There were permutations of every name possible, but

    what was most disturbing was that our domain name was used with every name and waslisted as the sender and reply to address.

    4. ONLINE FRAUD:The net is a boon for people to conduct business effectively, very quickly. It saves

    businesses a lot of time, money and resources. Unfortunately, the net is also an open

  • 8/2/2019 Cyber Crime Project

    14/23

    14

    invitation to scamsters and fraudsters and online frauds are becoming increasingly

    rampant.

    Fraudsters create authentic looking websites that are actually nothing but a spoof. The

    purpose of these websites is to make the user enter personal information. This

    information is then used to access business and bank accounts. Fraudsters are

    increasingly turning to email to generate traffic to these websites.

    A lot of customers of financial institutions recently received such emails. Such emails

    usually contain a link to a spoof website and mislead users to enter User ids and

    passwords on the pretence that security details can be updated, or passwords changed.

    If you ever get an email containing an embedded link, and a request for you to enter

    secret details, treat it as suspicious. Do not input any sensitive information that might

    help provide access to your accounts, even if the page appears legitimate. No reputable

    company ever sends emails of this type.

    It is a sad fact of life that there are those who enjoy exploiting the concerns of others.

    Many emailed warnings about viruses are hoaxes, designed purely to cause concern and

    disrupt businesses.

    These warnings may be genuine, so don't take them lightly, but always check the story

    out by visiting an anti-virus site such as McAfee, Sophos or Symantec before taking any

    action, including forwarding them to friends and colleagues.

    These are letters or emails, which inform the recipient that he/ she has won a prize in a

    lottery. To get the money, the recipient has to reply. After which another mail is received

    asking for bank details so that the money can be directly transferred. The email also asks

    for a processing fee/ handling fee. Of course, the money is never transferred in this case,

    the processing fee is swindled and the banking details are used for other frauds and

    scams.

  • 8/2/2019 Cyber Crime Project

    15/23

    15

    5. CYBER STALKING:Although there is no universally accepted definition of cyberstalking, the term can be

    used to refer to the use of the Internet, email, or other electronic communications devices

    to stalk another person.

    Stalking generally involves harassing or threatening behavior that an individual engages

    in repeatedly, such as following a person, appearing at a persons home or place of

    business, making harassing telephone calls, leaving written messages or objects, or

    vandalizing a persons property.

    Most stalking laws require that the perpetrator make a credible threat of violence againstthe victim; others include threats against the victims immediate family and still others

    require only that the alleged stalkers course of conduct constitute an implied threat.

    In many cases, the cyber stalker and the victim had a prior relationship, and the cyber

    stalking begins when the victim attempts to break off the relationship. However, there

    also have been many instances of cyber stalking by strangers. Given the enormous

    amount of personal information available through the Internet, a cyber stalker can easily

    locate private information about a potential victim with a few mouse clicks or keystrokes.

    As the Internet becomes an ever more integral part of our personal and professional lives,

    stalkers can take advantage of the ease of communications as well as increased access to

    personal information. In addition, the ease of use and non-confrontational, impersonal,

    and sometimes anonymous nature of Internet communications may remove disincentives

    to cyber stalking.

  • 8/2/2019 Cyber Crime Project

    16/23

    16

    6. SOFTWARE PIRACY:Theft of software through the illegal copying of genuine programs or the counterfeiting

    and distribution of products intended to pass for the original is termed as termed assoftware piracy.

    Breaking security methodsCracking programsCreating a copy and or selling itCreating a copy and giving it to someone else.Creating a copy to serve as a backup.Renting the original software.Reselling the original software.

    There are many ways to pirate software. But it all depends on what security methods are

    being employed.

    Generally:

    Software is made with a key(376347364761374) The key unlocks program The goal of a pirate is how the lock works Then can make there own key Once they make there key they pirated it

    Why Do People Do This:

    For profit To get all there software free Prestige of being the first to hack the program

    EX. The pirating team called Deviance always likes to be first to break the

    program.

  • 8/2/2019 Cyber Crime Project

    17/23

    17

    A consumer of pirated software has a lot to lose

    He gets untested software that may have been copied thousands of times over,potentially containing hard-drive-infecting viruses

    No technical support in case of software failure No warranty protection No legal right to use the product

    7. SALAMI ATTACK:This kind of crime is normally prevalent in the financial institutions or for the purpose of

    committing financial crimes. An important feature of this type of offence is that the

    alteration is so small that it would normally go unnoticed. Eg: the Ziegler case where in

    a logic bomb was introduced in the banks system, which deducted 10 cents from every

    account and deposited it in a particular account.

    In such crime criminal makes insignificant changes in such a manner that such changes

    would go unnoticed. Criminal makes such program that deducts small amount like $2.50

    per month from the account of all the customer of the bank and deposit the same in his

    account. In this case no account holder will approach the bank for such small amount but

    criminal gains huge amount.

    8. DENIAL OF SERVICE:This is an act by the criminal, who floods the bandwidth of the victims network or fills

    his e-mail box with spam mail depriving him of the services he is entitled to access or

    provide. This involves flooding computer resources with more request than it can handle.

    This causes the resources to crash there by denying authorized users the service offered

    by the resources.

    The most common and obvious type of DoS attack occurs when an attacker "floods" a

    network with information. When you type a URL for a particular website into your

  • 8/2/2019 Cyber Crime Project

    18/23

    18

    browser, you are sending a request to that site's computer server to view the page. The

    server can only process a certain number of requests at once, so if an attacker overloads

    the server with requests, it can't process your request. This is a "denial of service"

    because you can't access that site.

    An attacker can use spam email messages to launch a similar attack on your email

    account. Whether you have an email account supplied by your employer or one available

    through a free service such as Yahoo or Hotmail, you are assigned a specific quota,

    which limits the amount of data you can have in your account at any given time. By

    sending many, or large, email messages to the account, an attacker can consume your

    quota, preventing you from receiving legitimate messages.

  • 8/2/2019 Cyber Crime Project

    19/23

    19

    PREVENTION OF CYBER CRIME

    Prevention is always better than cure. It is always better to take certain precaution

    while operating the net. A should make them his part of cyber life. Sailesh kumar

    Zarkar, technical advisor and network security consultant to the Mumbai Police

    Cyber crime Cell, advocates the 5P mantra for online security: Precaution,

    Prevention, Protection, Preservation and Perseverance.

    PREVENTIVE STEPS FOR INDIVIDUALS:

    CHILDREN:

    Children should not give out identifying information such as Name, Home address, School

    Name or Telephone Number in a chat room. They should not give photographs to anyone

    on the Net without first checking or informing parents guardians. They should not respond

    to messages, which are suggestive, obscene, belligerent or threatening, and not to arrange

    a face-to face meeting without telling parents or guardians. They should remember that

    people online might not be who they seem.

    PARENTS:

    Parent should use content filtering software on PC to protect children from gambling, hate

    speech, drugs and alcohol. There is also software to establish time controls for use of

    limpets (for example blocking usage after a particulars time) and allowing parents to see

    which site item children have visited. Use this software to keep track of the type of

    activities of children.

    GENERAL INFORMATION:

    1. Dont delete harmful communications (emails, chats etc). They will provide vitalinformation about system and address of the person behind these.

  • 8/2/2019 Cyber Crime Project

    20/23

    20

    2. Avoid getting into huge arguments online during chat and discussions with otherusers.

    3. Remember that all other Internet users are strangers; you do not know who youare chatting with. So be careful.

    4. Be extremely careful about how you share personal information about yourselfonline.

    5. Choose your chatting nickname carefully so as others.6. Do not share personal information in public space online; do not give it to

    strangers.

    7. Be extremely cautious about meeting online introduced person. If you choose tomeet, do so in a public place along with a friend.

    8. If a situation online becomes hostile, log off and if a situation places you in fear,contact local police.

    9. Save all communications for evidence. Do not edit it in any way.10.keep a record of your contacts and inform Law Enforcement Officials.

    PREVENTIVE STEPS FOR ORGANISATIONS AND GOVERNMENT

    PHYSICAL SECURITY: Physical security is most sensitive component, as prevention

    from cyber crime Computer network should be protected from the access of unauthorized

    persons.

    ACCESS CONTROL: Access Control system is generally implemented using firewalls,

    which provide a centralized point from which to permit or allow access. Firewalls allow

    only authorized communications between the internal and external network.

    PASSWORD: Proof of identity is an essential component to identify intruder. The use of

    passwords in the most common security for network system including servers, routers and

    firewalls. Mostly all the systems are programmed to ask for username and password for

  • 8/2/2019 Cyber Crime Project

    21/23

    21

    access to computer system. This provides the verification of user. Password should be

    charged with regular interval of time and it should be alpha numeric and should be

    difficult to judge.

    USING ENCRYPTION: Encryption is able to transform data into a form that makes it

    almost impossible to read it without the right key. This key is used to allow controlled

    access to the information to selected people. The information can be passed on to any one

    but only the people with the right key are able to see the information. Encryption allows

    sending confidential documents by E-mail or save confidential information on laptop

    computers without having to fear that if someone steals it the data will become public.

    With the right encryption/decryption software installed, it will hook up to mail program

    and encrypt/decrypt messages automatically without user interaction.

    FINDING THE HOLES IN NETWORK: System managers should track down the

    holes before the intruders do. Many networking product manufactures are not particularly

    aware with the information about security holes in their products. So organization should

    work hard to discover security holes, bugs and weaknesses and report their findings as

    they are confirmed.

    USING INTRUSION ALERT PROGRAMS: As it is important to identify and close

    existing security holes, you also need to put some watchdogs into service. There are some

    intrusion programs, which identify suspicious activity and report so that necessary action is

    taken. They need to be operating constantly so that all unusual behaviour on network is

    caught immediately.

  • 8/2/2019 Cyber Crime Project

    22/23

    22

    CONCLUSION

    As someone rightly said that bytes are replacing bullets in the crime world. The growth of

    cyber crime in India, as all over the world, is on the rise and to curb its scope and complexity is

    the pertinent need today. India ranks fifth in the world for cyber crime, according to a report in

    2010 by the U.S.-based Internet Crime Complaint Center, a partnership between the Federal

    Bureau of Investigation and the National White Collar Crime Center.

    We do not appreciate the need of the hour till the problem takes a precarious dimension. At that

    stage it is always very difficult, if not impossible, to deal with that problem. The scenario of

    Information Technology is also the same. The Cyber laws enforced by the government are goodon papers but they need to be practically implemented. Moreover, the only possible step is to

    make people aware of their rights and duties (to report crime as a collective duty towards the

    society) and further making the application of the laws more stringent to check crime. Further we

    all together do not deny that there is a need to bring changes in the Information Technology Act

    to make it more effective to combat cyber crime.

  • 8/2/2019 Cyber Crime Project

    23/23

    23

    REFERENCES

    1. http://www.pogar.org/publications/ruleoflaw/cybercrime-09e.pdf2. http://www.clusif.asso.fr/fr/production/ouvrages/pdf/CyberCrime2004.pdf3. http://www.cybercitizenship.org/crime/crime.html4. http://www.crime-research.org/analytics/702/5. http://indiacyberlab.in/cybercrimes/types.htm6. http://www.cyberangels.org/security/hacking.pdf7. http://indiacyberlab.in/cybercrimes/virus.htm8. http://indiacyberlab.in/cybercrimes/fraud.htm9. http://indiacyberlab.in/cybercrimes/denial.htm10. http://indiacyberlab.in/cybercrimes/stalking.htm

    http://www.pogar.org/publications/ruleoflaw/cybercrime-09e.pdfhttp://www.clusif.asso.fr/fr/production/ouvrages/pdf/CyberCrime2004.pdfhttp://www.cybercitizenship.org/crime/crime.htmlhttp://www.crime-research.org/analytics/702/http://indiacyberlab.in/cybercrimes/types.htmhttp://www.cyberangels.org/security/hacking.pdfhttp://indiacyberlab.in/cybercrimes/virus.htmhttp://indiacyberlab.in/cybercrimes/fraud.htmhttp://indiacyberlab.in/cybercrimes/denial.htmhttp://indiacyberlab.in/cybercrimes/stalking.htmhttp://indiacyberlab.in/cybercrimes/stalking.htmhttp://indiacyberlab.in/cybercrimes/denial.htmhttp://indiacyberlab.in/cybercrimes/fraud.htmhttp://indiacyberlab.in/cybercrimes/virus.htmhttp://www.cyberangels.org/security/hacking.pdfhttp://indiacyberlab.in/cybercrimes/types.htmhttp://www.crime-research.org/analytics/702/http://www.cybercitizenship.org/crime/crime.htmlhttp://www.clusif.asso.fr/fr/production/ouvrages/pdf/CyberCrime2004.pdfhttp://www.pogar.org/publications/ruleoflaw/cybercrime-09e.pdf