Vardhil Cyber Security Cyber Crime1st

12

Transcript of Vardhil Cyber Security Cyber Crime1st

8/8/2019 Vardhil Cyber Security Cyber Crime1st

http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 1/12

8/8/2019 Vardhil Cyber Security Cyber Crime1st

http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 2/12

Security is necessary for prevention of crime. Andhence, we first need to know what crime is! So first, we

will learn about the word crime and what does the termcyber crime refer to in detail.

Crime is a social and economic phenomenon and is as oldas the human society. Crime is a legal concept and hasthe sanction of the law. Crime or an offence is ´a legalwrong that can be followed by criminal proceedings whichmay result into punishment.µ

The hallmark of criminality is that, it is breach of thecriminal law. Per Lord Atkin ´the criminal quality of anact cannot be discovered by reference to any standard butone: is the act prohibited with penal consequencesµ.

Vardhil Gandhi - Cyber Security - NewDevelopments in IT

8/8/2019 Vardhil Cyber Security Cyber Crime1st

http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 3/12

Cyber crime is the latest and perhaps the mostcomplicated problem in the cyber world. ´Cyber crimemay be said to be those species, of which, genus is theconventional crime, and where either the computer is an

object or subject of the conduct constituting crimeµ

 ́Any criminal activity that uses a computer either as aninstrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crimeµ

A generalized definition of cyber crime may be ´ unlawfulacts wherein the computer is either a tool or target or bothµ

Vardhil Gandhi - Cyber Security - NewDevelopments in IT

8/8/2019 Vardhil Cyber Security Cyber Crime1st

http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 4/12

The Computer as a Target :-using a computerto attack other computers.

e.g. Hacking, Virus/Worm attacks, DOS attacketc.

The computer as a weapon :-using a computerto commit real world crimes.

e.g. Cyber Terrorism, IPR violations, Credit cardfrauds, EFT frauds, Pornography etc.

Vardhil Gandhi - Cyber Security - NewDevelopments in IT

8/8/2019 Vardhil Cyber Security Cyber Crime1st

http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 5/12

Technological advancements have created new possibilities

for criminal activity, in particular the criminal misuse of

information technologies in the following ways:

a. Unauthorized access & Hacking

b. Trojan Attack

c. Virus and Worm attack

d. E-mail & IRC related crimes

1. Email spoofing

2. Email Spamming 3. Email bombing

e. Denial of Service attacks

We will now discuss about them in detail.Vardhil Gandhi - Cyber Security - NewDevelopments in IT

8/8/2019 Vardhil Cyber Security Cyber Crime1st

http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 6/12

Access means gaining entry into, instructing or communicatingwith the logical, arithmetical, or memory function resources of acomputer, computer system or computer network.

Unauthorized access would therefore mean any kind of accesswithout the permission of either the rightful owner or the person

in charge of a computer, computer system or computer network.

Every act committed towards breaking into a computer and/ornetwork is hacking. Hackers write or use ready-made computerprograms to attack the target computer. They possess the desireto destruct and they get the kick out of such destruction. Some

hackers hack for personal monetary gains, such as to stealing thecredit card information, transferring money from various bankaccounts to their own account followed by withdrawal of money.

By hacking web server taking control on another persons websitecalled as web hijacking

Vardhil Gandhi - Cyber Security - NewDevelopments in IT

8/8/2019 Vardhil Cyber Security Cyber Crime1st

http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 7/12

The program that acts like something usefulbut does things that are quiet damping. Theprograms of this kind are called as Trojans.

The name Trojan Horse is popular.

Trojans come in two parts, a Client part and aServer part. When the victim (unknowingly)runs the server on its machine, the attacker willthen use the Client to connect to the Server and

start using the trojan. TCP/IP protocol is the usual protocol type

used for communications, but some functionsof the trojans use the UDP protocol as well.

Vardhil Gandhi - Cyber Security - NewDevelopments in IT

8/8/2019 Vardhil Cyber Security Cyber Crime1st

http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 8/12

A program that has capability to infect otherprograms and make copies of itself and

spread into other programs is called virus.

Programs that multiply like viruses but

spread from computer to computer arecalled as worms.

Vardhil Gandhi - Cyber Security - NewDevelopments in IT

8/8/2019 Vardhil Cyber Security Cyber Crime1st

http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 9/12

1. Email spoofing 

Email spoofing refers to email that appears to havebeen originated from one source when it wasactually sent from another source.

2. Email Spamming Email "spamming" refers to sending email tothousands and thousands of users - similar to achain letter.

3. Sending malicious codes through emailE-mails are used to send viruses, Trojans etcthrough emails as an attachment or by sending alink of website which on visiting downloadsmalicious code.

Vardhil Gandhi - Cyber Security - NewDevelopments in IT

8/8/2019 Vardhil Cyber Security Cyber Crime1st

http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 10/12

4. Email bombing E-mail "bombing" is characterized byabusers repeatedly sending an identical

email message to a particular address. 5. Sending threatening emails

6. Defamatory emails

7. Email frauds 8. IRC related

Three main ways to attack IRC are: ´verbalµattacks, clone attacks, and flood attacks.

Vardhil Gandhi - Cyber Security - NewDevelopments in IT

8/8/2019 Vardhil Cyber Security Cyber Crime1st

http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 11/12

Flooding a computer resource with

more requests than it can handle.This causes the resource to crashthereby denying access of service to

authorized users.

Vardhil Gandhi - Cyber Security - NewDevelopments in IT

8/8/2019 Vardhil Cyber Security Cyber Crime1st

http://slidepdf.com/reader/full/vardhil-cyber-security-cyber-crime1st 12/12

Vardhil Gandhi - Cyber Security - NewDevelopments in IT