SlideShare a Scribd company logo
1 of 49
Avinash Rajput
Criminology 2nd Semester
Lok Nayak Jayprakesh Narayana National Institute of

Criminology and Forensic Science
Ministry of Home Affairs
 Harmful acts committed from or against a
computer or network
 Illegal computer-mediated activities that can be
conducted through global electronic networks

 unlawful acts wherein the computer is either a
tool or target or both
 Online or Internet-based illegal acts
 The first recorded cyber crime took place in the
year 1820
 In 1820, Joseph-Marie Jacquard, a textile
manufacturer in France, produced the loom

 This device allowed the repetition of a series of
steps in the weaving of special fabrics
 This resulted in a fear amongst Jacquard's
employees that their traditional employment and
livelihood were being threatened
 The employees committed acts of sabotage to
discourage Jacquard from further use of the new
technology.This is the first recorded cyber crime!
 The first spam email took place in 1978 when it
was sent over the Arpanet
 The first VIRUS was installed on an Apple
computer in 1982
 HACKING

 INTERNET FRAUD

 VIRUS DISSEMINATION

 CYBER TERRORISM

 CYBER THEFT

 PASSWORD
TRAFFICKING

 SOFTWARE PIRACY
 E-MAIL BOMBS
 LOGIC BOMBS

 IDENTITY THEFT

 CRADIT CARD FRAUD
 Activity is commonly referred as unauthorized
access to computer systems or network without
the permission of the computer owner/user
 Hackers write or use ready-made computer
programs to attack the target computer
 Computer hacking includes breaking into a
computer with the intent to steal, damage, modify
or monitor data or settings within the system
 Malicious software that attaches itself to other
software
 Circulate themselves to other files and to other
computers on a network

 Affect the data on a computer, either by altering
or deleting it
 In such crime criminal makes insignificant
changes in such a manner that such changes
would go unnoticed


Criminals makes such program thatdeducts
small amount like Rs. 2.50 per month from the
account of all the customer of the bank and
deposit the same in his account. In this case no
account holder will approach the bank for such
small amount but criminal gains huge amount
 Theft of software through the illegal copying of
genuine programs or the counterfeiting and
distribution of products intended to pass for the
original
 Copying and using computer programs
violation of copyrights and trade secret laws
 Retail revenue losses worldwide
increasing due to this crime

are

in

ever
 It refers to sending large numbers of mail to the
victim, which may be an individual or a company
by ultimately resulting into crashing.
 E-mail "bombing" is characterized by abusers
repeatedly sending an identical email message to
a particular address
 Programs are created to do something only when
a certain event (known as a trigger event) occurs
 Secretly attaches another
company‟s computer system

program

to

a

 Even some viruses may be termed logic bombs
because they lie dormant all through the year and
become active only on a particular date
 Any type of fraud scheme that uses one or more
components of the internet such as chat
rooms, e-mail, message boards, or Web sites - to
present fraudulent solicitations to prospective
victims, to conduct fraudulent transactions, or to
transmit the proceeds of fraud to financial
institutions or to other connected with the scheme
 It is the actual use of computers and Internet
technology to cause intimidation and destruction
 uses the Internet or network to destroy or
damage computers for political reasons

 Cyber terrorist could hack into a pharmaceutical
company‟s computers, changing the formula of
some essential medication and causing
thousands to die
 Misuse and illegal selling of other people‟s
passwords
 Break a company‟s password and misuse the
password or sale that password to another
company or an individual
 Identity theft occurs when somebody steals a
personal name and other personal information for
fraudulent purposes
 Identity theft is a form of identity crime where
somebody uses a false identity to commit a crime
 It involves stealing victims‟ personal information
and credentials, often to make purchases
 You simply have to type cradit card number into
www page of the vendor for online transaction
 If electronic transaction are not secured the
cradit card numbers can be stolen by the hackers
who can misuse this card by impersonating the
cradit card owner
 Silent in Nature
 Global in character
 Non existence of Physical Evidence

 Creates high Impact
 Gain Benefit
 Computer crime could be committed in privacy
without reaching to scene of crime physically i.e.
no eye witnesses. There is no signs of physical
violence or struggle
 No national borders. By sitting comfortably far
away from the country the entire economy of the
country could be destroyed. As digital evidences
are fragile in nature one has to respond quickly
 No physical evidence to indicate that crime has
been committed. Only on a closer look the trained
person could find out the evidences which are not
in the traditional format but are in digital format
 Impact is severe and may be long term. It can
damage the victim system permanently. Loss of
good will
 A software developer who did not get enough
money or good job would turn to criminal world
for their survival. Therefore, the computer crimes
have a potential to increase. Hence organized
mafia may enter into this sector
 Computer as Target
 Computer as Tool
 Computer as incidental to Offence
 Crimes which compromise the confidentiality of a
system, resulting in theft of services or the
release of viruses
 A computer virus is a self-replicating computer
program written to alter the way a computer
operates, without the permission or knowledge of
the user
 Example: Hacking/cracking, computer trespass
 Crimes migrated from the physical world into
cyberspace
such
as
child
pornography, fraud, illegal online sales
 This category include such crimes were either
computers or their contents bare used in
furtherance of crime or those offences which are
committed by manipulating contents of computer
systems
 Example: sending e-mails, credit card frauds
telecommunication frauds, identity theft
 Computer used to facilitate or execute a crime
such as the storing of child pornography or illicit
drug records
 This category includes conventional crimes, and
with the advent of computer the criminal have
started using the technology as an aid for its
perpetuation
 Example: Aid for drug trafficking, money
laundering, child pornography etc
 “Hackers” is a term that is currently used to
identify individuals who break into computers
 Hackers can be any age, creed or nationality
 Hackers have gained a negative image due to
their exploits in the past few years
 Hackers may commit their criminal activity for
excitement, the challenge or monetary reasons
 Hackers tend to be young males who have
extremely high intelligence and curiosity
 There has been an increase in the number of
females that have acquired the skills to break into
computer systems
 The process is based on their experience
acquired through attempting to break into, and
subsequently breaking into computer systems
 What this provides law enforcement is a Modus
Operandi (MO) with patterns that prosecutors and
police can use to build their case
 Law enforcement officials should establish
databases on the MO of cyber criminals in their
sectors
 Cyber criminals will typically need to use a
computer network that is difficult if not impossible
to identify
 This is done to make it difficult for law
enforcement to identify the perpetrator of the
cyber crime
 Cyber criminals will “hack” into a victim computer
or will use cyber café‟s to commit their illegal
activity
 Hackers will initially conduct intelligence
gathering during the first phase of their illegal
activity
 They want to learn network range, extranet
connections, etc
 Hackers next conduct network discovery to
identify the number and operating systems of the
target victim‟s computer network
 Hackers will also conduct host enumeration in
order to identify vulnerabilities that exist of the
system
 The computer‟s vulnerabilities will then be
exploited by the criminal
 Cyber criminals will also install password
crackers on the network. These “crackers” will
allow them to “break” the passwords of the
authorized users
 Once the network has been compromised, cyber
criminals will usually install “sniffers” that allow
them to capture user id/passwords and other
sensitive information
 Hackers may use stegonagraphy in order to hide
important data from law enforcement personnel
 Stegonagraphy is very
automated software

easy

to

use

with
 Computer forensic is evidence produced by a
computer
which
is
supported,conclusive
(convincing), and sufficient to be accepted by the
court
 Computer forensics is the discipline of acquiring,
preserving, identifying and examining digital
media
 It involves retrieving computer data in order to
meet standards for admissibility as evidence in
legal proceedings
 Computer forensic data recovery is the basis for
seizure of evidence in all computer-based
investigations
 Imagine the following
 You didn‟t
information

recognize

critical

evidence

or

 You could not locate vital data

 You could not use any documents or records
 You accidentally destroyed evidence
 You now needed to resolve an allegation or an
issue
 Removable Media: Floppy Disk; Zip Disk
 Hard Drive: IDE; SCSI
 CDROM

 Magnetic Tape
 Electronic Organizers
 Reliability of evidence
 Adherence to accepted protocols and practices
 Use of proven / accepted software

 Ability to testify as to methods and results of
analysis
 Trained and
examiners

certified

computer

forensics

 Proper training is crucial for testimonial purposes
 Separating pertinent evidence from non-pertinent
 There then must be an evaluation of the evidence
for criticality and usability in judicial environment
 There must always be a documentation of actions
taken by the examiner
 Governments have passed a variety of laws to
address the increase of computer crimes
 The first computer crime statutes were passed in
1986

 Local and regional areas have also passed laws
to address cyber crime at their level
 Local and regional laws generally mirror the
national laws
 One nation created a Computer Crime &
Intellectual Property Section (CCIPS) to formulate
policy on computer crime
 CCIPS is responsible for issuing country-wide
guidelines on the search and seizure of digital
data
 Each individual Attorney General‟s Office has a
specially trained prosecutor that is responsible for
the prosecution of crimes where a computer is
utilized
 The Computer Misuse Act (1990)
 The Data Protection Act (1998)
 Information Technology Act, 2000
 Use the latest version of anti-virus
 Use the latest version of the operating system
 Don‟t open e-mail attachments unless you know
the source
 Confirm the site you are doing business with
 Create passwords containing atleast 8 digits
 Use different passwords for different websites
 Send credit card information only to secure sites
 Use a security program that gives you control
over "Cookies" that send information back to
websites
 Use antivirus software‟s
 insert firewalls
 uninstall unnecessary software
 maintain backup
 check security settings
 Stay anonymous - choose a genderless screen name
 Never give your full name or address to strangers
 Learn „inetiquette' - follow it and expect it from
others
 Don't respond to harassing or negative messages
(flames)

 Get out of uncomfortable or hostile situations
quickly
 Save offending messages

 Learn more about Internet privacy
 Spam Blocker
 Anti-Virus Software
 Firewall Protection

 Caution in providing personal information
 Secure shoping
 Avoidence of Scam
 Avast Free Antivirus
 AVG Free Antivirus
 Avira AntiVir Personal

 Kaspersky Antivirus
 Mcafee Antivirus
 Symantec Norton Antivirus
 Quick Heal Antivirus
Cyber Crime

More Related Content

What's hot

What's hot (20)

Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Viewers also liked

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Legal provisions for_senior_citizens
Legal provisions for_senior_citizensLegal provisions for_senior_citizens
Legal provisions for_senior_citizensAvinash Rajput
 
District court vsit report
District court vsit reportDistrict court vsit report
District court vsit reportAvinash Rajput
 
Sample power point
Sample power pointSample power point
Sample power pointEnLipas
 
CliqTags - Funktioner och fördelar
CliqTags - Funktioner och fördelarCliqTags - Funktioner och fördelar
CliqTags - Funktioner och fördelarCliqTags
 
【再放送】バスキュール発!UXデザイン学
【再放送】バスキュール発!UXデザイン学 【再放送】バスキュール発!UXデザイン学
【再放送】バスキュール発!UXデザイン学 schoowebcampus
 
Positive thinking attitudes_and_beliefs_final_ppt_29.09.2011
Positive thinking attitudes_and_beliefs_final_ppt_29.09.2011Positive thinking attitudes_and_beliefs_final_ppt_29.09.2011
Positive thinking attitudes_and_beliefs_final_ppt_29.09.2011Pallavi Jagtap
 
Dma Competencies 2011 12
Dma Competencies 2011 12Dma Competencies 2011 12
Dma Competencies 2011 12danikaolson
 
グローバル社会で活躍する人は押さえておくべき、世界のエリートが学ぶ“21世紀スキル”とは?【ディスカヴァービジネス書スクール4限目】
グローバル社会で活躍する人は押さえておくべき、世界のエリートが学ぶ“21世紀スキル”とは?【ディスカヴァービジネス書スクール4限目】グローバル社会で活躍する人は押さえておくべき、世界のエリートが学ぶ“21世紀スキル”とは?【ディスカヴァービジネス書スクール4限目】
グローバル社会で活躍する人は押さえておくべき、世界のエリートが学ぶ“21世紀スキル”とは?【ディスカヴァービジネス書スクール4限目】schoowebcampus
 
Open Geodemographics: Open Tools and the 2011 OAC
Open Geodemographics: Open Tools and the 2011 OACOpen Geodemographics: Open Tools and the 2011 OAC
Open Geodemographics: Open Tools and the 2011 OACChris
 
高勝率是投資致勝的關鍵 0402
高勝率是投資致勝的關鍵 0402高勝率是投資致勝的關鍵 0402
高勝率是投資致勝的關鍵 0402ellen_cat0103
 
Zambia’s Faltering Multi-Party Politics
Zambia’s Faltering Multi-Party PoliticsZambia’s Faltering Multi-Party Politics
Zambia’s Faltering Multi-Party PoliticsNdangwa Noyoo
 
J groll ignite the culture cocktail party 0613
J groll ignite the culture cocktail party 0613J groll ignite the culture cocktail party 0613
J groll ignite the culture cocktail party 0613jgroll06
 
『留学実現!』1限目:カナダにオフィスを持ち数々の留学生をあサポートしてきた佐々木氏へ成功する留学の極意をインタビュー形式でひも解きます。留学のエッセンス...
『留学実現!』1限目:カナダにオフィスを持ち数々の留学生をあサポートしてきた佐々木氏へ成功する留学の極意をインタビュー形式でひも解きます。留学のエッセンス...『留学実現!』1限目:カナダにオフィスを持ち数々の留学生をあサポートしてきた佐々木氏へ成功する留学の極意をインタビュー形式でひも解きます。留学のエッセンス...
『留学実現!』1限目:カナダにオフィスを持ち数々の留学生をあサポートしてきた佐々木氏へ成功する留学の極意をインタビュー形式でひも解きます。留学のエッセンス...schoowebcampus
 

Viewers also liked (19)

Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Legal provisions for_senior_citizens
Legal provisions for_senior_citizensLegal provisions for_senior_citizens
Legal provisions for_senior_citizens
 
District court vsit report
District court vsit reportDistrict court vsit report
District court vsit report
 
Sample power point
Sample power pointSample power point
Sample power point
 
CliqTags - Funktioner och fördelar
CliqTags - Funktioner och fördelarCliqTags - Funktioner och fördelar
CliqTags - Funktioner och fördelar
 
【再放送】バスキュール発!UXデザイン学
【再放送】バスキュール発!UXデザイン学 【再放送】バスキュール発!UXデザイン学
【再放送】バスキュール発!UXデザイン学
 
Positive thinking attitudes_and_beliefs_final_ppt_29.09.2011
Positive thinking attitudes_and_beliefs_final_ppt_29.09.2011Positive thinking attitudes_and_beliefs_final_ppt_29.09.2011
Positive thinking attitudes_and_beliefs_final_ppt_29.09.2011
 
Dma Competencies 2011 12
Dma Competencies 2011 12Dma Competencies 2011 12
Dma Competencies 2011 12
 
ClaireGentryRESUME1
ClaireGentryRESUME1ClaireGentryRESUME1
ClaireGentryRESUME1
 
Impl slpqp ev-sqp
Impl slpqp ev-sqpImpl slpqp ev-sqp
Impl slpqp ev-sqp
 
グローバル社会で活躍する人は押さえておくべき、世界のエリートが学ぶ“21世紀スキル”とは?【ディスカヴァービジネス書スクール4限目】
グローバル社会で活躍する人は押さえておくべき、世界のエリートが学ぶ“21世紀スキル”とは?【ディスカヴァービジネス書スクール4限目】グローバル社会で活躍する人は押さえておくべき、世界のエリートが学ぶ“21世紀スキル”とは?【ディスカヴァービジネス書スクール4限目】
グローバル社会で活躍する人は押さえておくべき、世界のエリートが学ぶ“21世紀スキル”とは?【ディスカヴァービジネス書スクール4限目】
 
Cerveza programa
Cerveza programaCerveza programa
Cerveza programa
 
Open Geodemographics: Open Tools and the 2011 OAC
Open Geodemographics: Open Tools and the 2011 OACOpen Geodemographics: Open Tools and the 2011 OAC
Open Geodemographics: Open Tools and the 2011 OAC
 
高勝率是投資致勝的關鍵 0402
高勝率是投資致勝的關鍵 0402高勝率是投資致勝的關鍵 0402
高勝率是投資致勝的關鍵 0402
 
Zambia’s Faltering Multi-Party Politics
Zambia’s Faltering Multi-Party PoliticsZambia’s Faltering Multi-Party Politics
Zambia’s Faltering Multi-Party Politics
 
TYPO3 47 release
TYPO3 47 releaseTYPO3 47 release
TYPO3 47 release
 
J groll ignite the culture cocktail party 0613
J groll ignite the culture cocktail party 0613J groll ignite the culture cocktail party 0613
J groll ignite the culture cocktail party 0613
 
『留学実現!』1限目:カナダにオフィスを持ち数々の留学生をあサポートしてきた佐々木氏へ成功する留学の極意をインタビュー形式でひも解きます。留学のエッセンス...
『留学実現!』1限目:カナダにオフィスを持ち数々の留学生をあサポートしてきた佐々木氏へ成功する留学の極意をインタビュー形式でひも解きます。留学のエッセンス...『留学実現!』1限目:カナダにオフィスを持ち数々の留学生をあサポートしてきた佐々木氏へ成功する留学の極意をインタビュー形式でひも解きます。留学のエッセンス...
『留学実現!』1限目:カナダにオフィスを持ち数々の留学生をあサポートしてきた佐々木氏へ成功する留学の極意をインタビュー形式でひも解きます。留学のエッセンス...
 

Similar to Cyber Crime

Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime Anjana Ks
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfKALPITKALPIT1
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism Accenture
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptPraveen362297
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourssuser24dae7
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesVivekanandaGN1
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & ForensicsHarshita Ved
 

Similar to Cyber Crime (20)

Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Introduction to cybercrime
Introduction to cybercrime Introduction to cybercrime
Introduction to cybercrime
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 

More from Avinash Rajput

Victimization of senior_citizens-_a_study_in_Delhi_Metropolis_city_from_Human...
Victimization of senior_citizens-_a_study_in_Delhi_Metropolis_city_from_Human...Victimization of senior_citizens-_a_study_in_Delhi_Metropolis_city_from_Human...
Victimization of senior_citizens-_a_study_in_Delhi_Metropolis_city_from_Human...Avinash Rajput
 
Report on National_Human_Rights_Commission
Report on National_Human_Rights_CommissionReport on National_Human_Rights_Commission
Report on National_Human_Rights_CommissionAvinash Rajput
 
Human rights violation_in_custodial_torture
Human rights violation_in_custodial_tortureHuman rights violation_in_custodial_torture
Human rights violation_in_custodial_tortureAvinash Rajput
 
Criminal Justice System
Criminal Justice SystemCriminal Justice System
Criminal Justice SystemAvinash Rajput
 
Children protection from sexual assault or harassement act,2012
Children protection from sexual assault or harassement  act,2012Children protection from sexual assault or harassement  act,2012
Children protection from sexual assault or harassement act,2012Avinash Rajput
 
Justice JS Verma Committee Report
Justice JS Verma Committee ReportJustice JS Verma Committee Report
Justice JS Verma Committee ReportAvinash Rajput
 

More from Avinash Rajput (16)

Jail Visit Report
Jail Visit ReportJail Visit Report
Jail Visit Report
 
Women Trafficking
Women TraffickingWomen Trafficking
Women Trafficking
 
Victim's Rights
Victim's RightsVictim's Rights
Victim's Rights
 
Victimization of senior_citizens-_a_study_in_Delhi_Metropolis_city_from_Human...
Victimization of senior_citizens-_a_study_in_Delhi_Metropolis_city_from_Human...Victimization of senior_citizens-_a_study_in_Delhi_Metropolis_city_from_Human...
Victimization of senior_citizens-_a_study_in_Delhi_Metropolis_city_from_Human...
 
Terrorism
TerrorismTerrorism
Terrorism
 
Report on National_Human_Rights_Commission
Report on National_Human_Rights_CommissionReport on National_Human_Rights_Commission
Report on National_Human_Rights_Commission
 
Prayas visit report
Prayas visit reportPrayas visit report
Prayas visit report
 
Police station report
Police station reportPolice station report
Police station report
 
Organized crime
Organized crimeOrganized crime
Organized crime
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
 
Human rights violation_in_custodial_torture
Human rights violation_in_custodial_tortureHuman rights violation_in_custodial_torture
Human rights violation_in_custodial_torture
 
Human rights in_india
Human rights in_indiaHuman rights in_india
Human rights in_india
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
 
Criminal Justice System
Criminal Justice SystemCriminal Justice System
Criminal Justice System
 
Children protection from sexual assault or harassement act,2012
Children protection from sexual assault or harassement  act,2012Children protection from sexual assault or harassement  act,2012
Children protection from sexual assault or harassement act,2012
 
Justice JS Verma Committee Report
Justice JS Verma Committee ReportJustice JS Verma Committee Report
Justice JS Verma Committee Report
 

Recently uploaded

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 

Recently uploaded (20)

THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 

Cyber Crime

  • 1. Avinash Rajput Criminology 2nd Semester Lok Nayak Jayprakesh Narayana National Institute of Criminology and Forensic Science Ministry of Home Affairs
  • 2.  Harmful acts committed from or against a computer or network  Illegal computer-mediated activities that can be conducted through global electronic networks  unlawful acts wherein the computer is either a tool or target or both  Online or Internet-based illegal acts
  • 3.  The first recorded cyber crime took place in the year 1820  In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom  This device allowed the repetition of a series of steps in the weaving of special fabrics  This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened
  • 4.  The employees committed acts of sabotage to discourage Jacquard from further use of the new technology.This is the first recorded cyber crime!  The first spam email took place in 1978 when it was sent over the Arpanet  The first VIRUS was installed on an Apple computer in 1982
  • 5.  HACKING  INTERNET FRAUD  VIRUS DISSEMINATION  CYBER TERRORISM  CYBER THEFT  PASSWORD TRAFFICKING  SOFTWARE PIRACY  E-MAIL BOMBS  LOGIC BOMBS  IDENTITY THEFT  CRADIT CARD FRAUD
  • 6.  Activity is commonly referred as unauthorized access to computer systems or network without the permission of the computer owner/user  Hackers write or use ready-made computer programs to attack the target computer  Computer hacking includes breaking into a computer with the intent to steal, damage, modify or monitor data or settings within the system
  • 7.  Malicious software that attaches itself to other software  Circulate themselves to other files and to other computers on a network  Affect the data on a computer, either by altering or deleting it
  • 8.  In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed  Criminals makes such program thatdeducts small amount like Rs. 2.50 per month from the account of all the customer of the bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount
  • 9.  Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original  Copying and using computer programs violation of copyrights and trade secret laws  Retail revenue losses worldwide increasing due to this crime are in ever
  • 10.  It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing.  E-mail "bombing" is characterized by abusers repeatedly sending an identical email message to a particular address
  • 11.  Programs are created to do something only when a certain event (known as a trigger event) occurs  Secretly attaches another company‟s computer system program to a  Even some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date
  • 12.  Any type of fraud scheme that uses one or more components of the internet such as chat rooms, e-mail, message boards, or Web sites - to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to other connected with the scheme
  • 13.  It is the actual use of computers and Internet technology to cause intimidation and destruction  uses the Internet or network to destroy or damage computers for political reasons  Cyber terrorist could hack into a pharmaceutical company‟s computers, changing the formula of some essential medication and causing thousands to die
  • 14.  Misuse and illegal selling of other people‟s passwords  Break a company‟s password and misuse the password or sale that password to another company or an individual
  • 15.  Identity theft occurs when somebody steals a personal name and other personal information for fraudulent purposes  Identity theft is a form of identity crime where somebody uses a false identity to commit a crime  It involves stealing victims‟ personal information and credentials, often to make purchases
  • 16.  You simply have to type cradit card number into www page of the vendor for online transaction  If electronic transaction are not secured the cradit card numbers can be stolen by the hackers who can misuse this card by impersonating the cradit card owner
  • 17.  Silent in Nature  Global in character  Non existence of Physical Evidence  Creates high Impact  Gain Benefit
  • 18.  Computer crime could be committed in privacy without reaching to scene of crime physically i.e. no eye witnesses. There is no signs of physical violence or struggle
  • 19.  No national borders. By sitting comfortably far away from the country the entire economy of the country could be destroyed. As digital evidences are fragile in nature one has to respond quickly
  • 20.  No physical evidence to indicate that crime has been committed. Only on a closer look the trained person could find out the evidences which are not in the traditional format but are in digital format
  • 21.  Impact is severe and may be long term. It can damage the victim system permanently. Loss of good will
  • 22.  A software developer who did not get enough money or good job would turn to criminal world for their survival. Therefore, the computer crimes have a potential to increase. Hence organized mafia may enter into this sector
  • 23.  Computer as Target  Computer as Tool  Computer as incidental to Offence
  • 24.  Crimes which compromise the confidentiality of a system, resulting in theft of services or the release of viruses  A computer virus is a self-replicating computer program written to alter the way a computer operates, without the permission or knowledge of the user  Example: Hacking/cracking, computer trespass
  • 25.  Crimes migrated from the physical world into cyberspace such as child pornography, fraud, illegal online sales  This category include such crimes were either computers or their contents bare used in furtherance of crime or those offences which are committed by manipulating contents of computer systems  Example: sending e-mails, credit card frauds telecommunication frauds, identity theft
  • 26.  Computer used to facilitate or execute a crime such as the storing of child pornography or illicit drug records  This category includes conventional crimes, and with the advent of computer the criminal have started using the technology as an aid for its perpetuation  Example: Aid for drug trafficking, money laundering, child pornography etc
  • 27.  “Hackers” is a term that is currently used to identify individuals who break into computers  Hackers can be any age, creed or nationality  Hackers have gained a negative image due to their exploits in the past few years  Hackers may commit their criminal activity for excitement, the challenge or monetary reasons
  • 28.  Hackers tend to be young males who have extremely high intelligence and curiosity  There has been an increase in the number of females that have acquired the skills to break into computer systems
  • 29.  The process is based on their experience acquired through attempting to break into, and subsequently breaking into computer systems  What this provides law enforcement is a Modus Operandi (MO) with patterns that prosecutors and police can use to build their case  Law enforcement officials should establish databases on the MO of cyber criminals in their sectors
  • 30.  Cyber criminals will typically need to use a computer network that is difficult if not impossible to identify  This is done to make it difficult for law enforcement to identify the perpetrator of the cyber crime  Cyber criminals will “hack” into a victim computer or will use cyber café‟s to commit their illegal activity
  • 31.  Hackers will initially conduct intelligence gathering during the first phase of their illegal activity  They want to learn network range, extranet connections, etc  Hackers next conduct network discovery to identify the number and operating systems of the target victim‟s computer network
  • 32.  Hackers will also conduct host enumeration in order to identify vulnerabilities that exist of the system  The computer‟s vulnerabilities will then be exploited by the criminal  Cyber criminals will also install password crackers on the network. These “crackers” will allow them to “break” the passwords of the authorized users
  • 33.  Once the network has been compromised, cyber criminals will usually install “sniffers” that allow them to capture user id/passwords and other sensitive information  Hackers may use stegonagraphy in order to hide important data from law enforcement personnel  Stegonagraphy is very automated software easy to use with
  • 34.  Computer forensic is evidence produced by a computer which is supported,conclusive (convincing), and sufficient to be accepted by the court  Computer forensics is the discipline of acquiring, preserving, identifying and examining digital media
  • 35.  It involves retrieving computer data in order to meet standards for admissibility as evidence in legal proceedings  Computer forensic data recovery is the basis for seizure of evidence in all computer-based investigations
  • 36.  Imagine the following  You didn‟t information recognize critical evidence or  You could not locate vital data  You could not use any documents or records  You accidentally destroyed evidence  You now needed to resolve an allegation or an issue
  • 37.  Removable Media: Floppy Disk; Zip Disk  Hard Drive: IDE; SCSI  CDROM  Magnetic Tape  Electronic Organizers
  • 38.  Reliability of evidence  Adherence to accepted protocols and practices  Use of proven / accepted software  Ability to testify as to methods and results of analysis  Trained and examiners certified computer forensics  Proper training is crucial for testimonial purposes
  • 39.  Separating pertinent evidence from non-pertinent  There then must be an evaluation of the evidence for criticality and usability in judicial environment  There must always be a documentation of actions taken by the examiner
  • 40.  Governments have passed a variety of laws to address the increase of computer crimes  The first computer crime statutes were passed in 1986  Local and regional areas have also passed laws to address cyber crime at their level  Local and regional laws generally mirror the national laws
  • 41.  One nation created a Computer Crime & Intellectual Property Section (CCIPS) to formulate policy on computer crime  CCIPS is responsible for issuing country-wide guidelines on the search and seizure of digital data  Each individual Attorney General‟s Office has a specially trained prosecutor that is responsible for the prosecution of crimes where a computer is utilized
  • 42.  The Computer Misuse Act (1990)  The Data Protection Act (1998)  Information Technology Act, 2000
  • 43.  Use the latest version of anti-virus  Use the latest version of the operating system  Don‟t open e-mail attachments unless you know the source  Confirm the site you are doing business with  Create passwords containing atleast 8 digits
  • 44.  Use different passwords for different websites  Send credit card information only to secure sites  Use a security program that gives you control over "Cookies" that send information back to websites
  • 45.  Use antivirus software‟s  insert firewalls  uninstall unnecessary software  maintain backup  check security settings  Stay anonymous - choose a genderless screen name  Never give your full name or address to strangers
  • 46.  Learn „inetiquette' - follow it and expect it from others  Don't respond to harassing or negative messages (flames)  Get out of uncomfortable or hostile situations quickly  Save offending messages  Learn more about Internet privacy
  • 47.  Spam Blocker  Anti-Virus Software  Firewall Protection  Caution in providing personal information  Secure shoping  Avoidence of Scam
  • 48.  Avast Free Antivirus  AVG Free Antivirus  Avira AntiVir Personal  Kaspersky Antivirus  Mcafee Antivirus  Symantec Norton Antivirus  Quick Heal Antivirus