SVIMS, Batch 20102010-11 -11
Cyber Crime
Group No. 4 Roll No.
Members
08
Aswita Shetty
17
Jervis Martis
22
Medha Shambhu
23
Mitesh Uchil
34
Prerna Jeswani
46
Savita Shetty
53
Tejashree Nayak
Group No. 4 Roll No.
Members
08
Aswita Shetty
17
Jervis Martis
22
Medha Shambhu
23
Mitesh Uchil
34
Prerna Jeswani
46
Savita Shetty
53
Tejashree Nayak
What is Cyber Space? Cyber Cyber sp space is a worldwide net work work of comput ers ers and the equipment that c that connect th ct them, which by it s very design is free and open t o the
public (the Int erne ernet). Cyberspace is the elect roni ronic medium of comput er er net works, works, in which online communicat ion ion takes place. Weve become increasingly reliant on the net , and it is being used right now t o t ransfer everything from friendly emails t o hypersensit ive ive data.
What is Cybercrime? Cybercrime refers t o any crime that involves a comput er and a
net work, where the comput ers may or may not have played an inst rumental part in the commission of a crime. Issues surrounding this t ype of crime have become highh-profile,
part icularly those surrounding hacking, copyright infringement , child pornography, child grooming, releasing of viruses, ident it y thef t, int ercept ion, access and manipulat ion of non public data and syst ems.
What is Cybercrime? Cybercrime encompasses a broad range of pot ent ially illegal act ivit ies. Generally, however, it may be divided int o one of t wo t ypes of cat egories:
Cybercrime
Crimes that target computer networks or devices directly
Crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device
Why learn about CYBER CRIME ? Everybody is using COMPUTERS. From whit e collar criminals t o t errorist organizat ions and from t eenagers t o adult s.
Convent ional crimes like forgery, ext ort ion, kidnapping etc. are being committ ed with the help off comput ers. New generat ion is growing up with comput ers. MOST IMPORTANT - monetary t ransact ions are moving on t o the INTERNET
Types of Cybercrimes
Hacking
Cyber defamation
Denial of service attack
Threatening hreatening
Virus disseminat ion
Salami attack
Sof t ware piracy
Spam
Pornography
Fraud
IRC crime
Obscene or offensive content
Credit card fraud
Drug trafficking
Net ext ort ion
Cyber terrorism
Phishing
Cyber warfare
Spoofing
Virus/worms
Cyber stalking
Forgery
Hacking The act of gaining unauthorized access t o a comput er syst em or net work and in some cases making unauthorized use of this access. Hacking is also the act by which other forms of cyber-crime (e.g., fraud, t errorism, etc.) are committ ed. Hacking in simple t erms means illegal int rusion int o a comput er syst em without the permission of the comput er owner/user.
Denial of service attack This is an act by the criminal, who floods the bandwidth of the vict ims net work or fills his e-mail box with spam mail depriving him of the services he is ent it led t o access or provide. This involves flooding comput er resources with more request s than it can handle. This causes the resources t o crash thereby denying authorized users the service offered by the resources.
Virus disseminat ion are that attaches it self t o other sof tw are. Malicious sof tw
Eg Eg.. - Virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and ares Bact erium are the malicious sof tw
Sof t ware piracy Sof tw are piracy is thef t of sof tw are through the illegal copying of
genuine programs or the count erfeit ing and dist ribut ion of product s int ended t o pass for the original. Retail revenue losses worldwide are ever increasing due t o this crime.
Piracy can be done in various ways such as end user copying, hard
disk loading, Count erfeit ing, Illegal downloads from the int ernet etc.
Pornography Pornography is the first consist ent ly successful e-commerce product . Pornography has decept ive market ing tact ics and mouse t rapping t echnologies which encourages cust omers t o access their websit es.
Anybody including children can log on t o the int ernet and access websit es with pornographic cont ent s with a click of a mouse. Publishing, t ransmitt ing any mat erial in elect ronic form which is lascivious or appeals t o the prurient int erest is an offence under the ct -2000. provisions of sect ion 67 of I.T. Act -
IRC crimes Int ernet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come t ogether and chat with each other Criminals use it for meet ing co-conspirat ors. Hackers use it for discussing their exploit s / sharing the t echnique. Paedophiles use chat rooms t o allure small children.
Credit card fraud Credit card fraud is a wide-ranging t erm for thef t and fraud committ ed using a credit card or any similar payment mechanism as a fraudulent source of funds in a t ransact ion.
If elect ronic t ransact ions are not secured the credit card numbers can be st olen by the hackers who can misuse this card by impersonat ing the credit card owner.
Net ext ort ion Copying the companys confident ial data in order t o ext ort said company for huge amount .
Phishing In comput ing, phishing is the criminally fraudulent process of att empt ing t o acquire sensit ive informat ion such as usernames,
password and credit card details, by masquerading as a t rust worthy ent it y in an elect ronic communicat ion.
Spoofing The process of decept ion by which an individual or syst em alt ers it s ident it y or creat es addit ional ident it ies, thereby causing another person or syst em t o act incorrect ly. Gett ing one comput er on a net work t o pret end t o have the ident it y of another comput er, usually one with special access privileges, so as t o
obtain access t o the other comput ers on the net work.
Cyber stalking Stalking in General t erms can be referred t o as the repeat ed act s of harassment target ing the vict im such as following the vict im, making harassing phone calls, killing the vict ims pet , vandalizing vict ims
propert y, leaving writt en messages or object s. Cyber Stalking can be defined as the repeat ed act s of harassment or threat ening behaviour of the cyber criminal t owards the vict im by
using int ernet services.
Cyber def amat ion The Criminal sends emails containing def amat ory matt ers t o all concerned of the vict im or post the def amat ory matt ers on a websit e.
Eg Eg.. - Disgrunt led employee may do this against boss, ex-boys friend against girl, divorced husband against wife etc.
Threat ening The Criminal sends threat ening email or comes in contact in chat rooms with vict im. Any one disgrunt led may do this against boss, friend or official.
Salami attack In such crime criminal makes insignificant changes in such a manner that such changes would go unnot iced.
Criminal makes such program that deduct s small amount like $ 2.50 per month from the account of all the cust omer of the Bank and deposit the same in his account . In this case no account holder will approach the bank for such small amount but criminal gains huge amount .
Spam Spam, or the unsolicit ed sending of bulk email for commercial purposes, is unlawful t o varying degrees. As applied t o email, specific ant i-spam laws are relat ively new, however limit s on unsolicit ed elect ronic communicat ions have
exist ed in some forms for some t ime.
Fraud Comput er fraud is any dishonest misrepresen tat ion of f act int ended t o let another t o do or refrain from doing something which causes
loss.
Drug t rafficking Drug t raffickers are increasingly taking advantage of the Int ernet t o sell their illegal substances through encrypt ed e-mail and other Int ernet Technology. Some drug t raffickers arrange deals at int ernet cafes, use courier Web sit es t o t rack illegal pack ages of pills, and swap recipes for amphetamines in rest rict ed-access chat rooms.
Cyber t errorism
Cyber t errorism in general, can be defined as an act of t errorism committ ed through the use of cyberspace or comput er resources
(Parker 1983).
As such, a simple propaganda in the Int ernet , that there will be bomb attacks during the holidays can be considered cyber t errorism.
As well there are also hacking act ivit ies direct ed t owards individuals, f amilies, organized by groups within net works, t ending t o cause fear among people, demonst rat e power, collect ing informat ion relevant for
ruining peoples' lives, robberies, blackmailing etc.
Cyber warf are The U.S. Depart ment of Defence (DoD (DoD) not es that cyberspace has
emerged as a nat ional-level concern through several recent event s of geo-st rat egic significance. Among those are included the attack on Est onia's infrast ruct ure in 2007, allegedly by Russian hackers.
Cyberwarfare has been defined by government securit y expert
Richard A. Clarke, in his book Cyber War (May 2010), as "act ions by a nat ion-stat e t o penet rat e another nat ion's comput ers or net works for the purposes of causing damage or disrupt ion."
Forgery Count erfeit currency not es, postage and revenue stamps, mark sheet s etc., can be forged using sophist icat ed comput ers, print ers and scanners.
Prevent ive Measures For Individuals Prevent ive measures should be adopt ed by both children as well as parent s. For instance children should not reveal any kind of ident it y while chatt ing etc. are on PC. Parent s should use cont ent filt er sof tw
For any individual, he/she should share any personal informat ion online t o whomsoever it might be.
Prevent ive measures for Government & other organizat ions Physical securit y
Firewalls
Access cont rol
Frequent password changing
Password
Safe surfing
Finding the holes in net work
Frequent virus checks
Using net work scanning programs Email filt ers Using int rusion alert programs
Using encrypt ion
Cyber law India has enact ed the first I.T.Act ,2000 based on the UNCITRAL model.
Chapt er XI of this Act deals with offence/crimes along with certain other provisions scatt ered in this Act s.
Offence Sect ion Under IT Act OFFENCE
SECTION
Tampering with comput er source document s
Sec.65
Hacking with comput er syst ems , Data alt erat ion
Sec.66
Publishing obscene informat ion
Sec.67
Un- authorized access t o prot ect ed Syst em
Sec.70
Breach of Confident ialit y & Privacy
Sec.72
Publishing f alse digital signat ure cert ificat es
Sec.73
Comput ers Relat ed Crimes Covered Under IPC & Special Laws OFFENCE
SECTIONS
Sending threat ening messages by e-mail
Sec 503 IPC
Sending def amat ory messages by e-mail
Sec 499 IPC
Forgery of elect ronic records
Sec 463 IPC
Bogus websit es , cyber frauds
Sec 420 IPC
E-mail spoofing
Sec 463 IPC
Web-Jacking
Sec.383 IPC
E-mail Abuse
Sec.500 IPC
Online sale of Drugs
NDPS Act
Cyber securit y Cyber securit y involves prot ect ion of sensit ive personal and business informat ion through prevent ion, det ect ion and response t o different online attack. Cyber securit y standards are securit y standards which enable organizat ions t o pract ice safe securit y t echniques t o minimize the number of successful cyber securit y attacks. ISO/IEC 27002 BS7799 part I & BS 7799 p art II NIST has also released several publicat ions addressing cyber securit y.
Advantages of cyber securit y It defends us from crit ical attacks. It helps us browse safe websit es. It defends us from hacks and virus. Securit y developers updat e their database every week hence new virus also get s delet ed. Int ernet securit y process all the incoming and out going data on our comput er. r.
Case st udies Pune Cit ibank emphasis Call Cent er Fraud Baazee.com case Andhra Pradesh Tax Case
Conclusion
The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than with a bomb.
Bibliography & Webliography
Informat ion Technology for Management book By E Fraim Turban Dorothy Leiner Ephraim Mclean James Wetherbe
www.cyberlawsindia.net
www.iprfirm.com
www.cybercellmumbai.com
www.cybercrime.planet india.net
www.indiacyberlab.in
www.virt ualpune.com
www.brighthub.com
www.cyberlawclinic.org