cyber crime - mis presentation

Upload: amit-kumar-agarwal

Post on 09-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/8/2019 Cyber Crime - MIS Presentation

    1/27

    AKARSH SHARMA (10DM-009)

    DEEPTI GUPTA (10DM-041)

    DHARA JAIN (10DM-042)

    AMIT KUMAR AGARWAL (10FN-011)

  • 8/8/2019 Cyber Crime - MIS Presentation

    2/27

    Any criminal activity that uses a computer either asan instrumentality, target or a means for

    perpetuating further crimes comes within the ambitof cyber crime

    Illegal computer-mediated activities that can be

    conducted through global electronic networks

  • 8/8/2019 Cyber Crime - MIS Presentation

    3/27

    The first recorded cyber crime took place in the year 1820.

    In 1820, Joseph-Marie Jacquard, atextile manufacturerin France, produced

    the loom. This device allowed therepetition of a series of steps inthe weaving of special fabrics,thus threatening to endtraditional employment and the

    livelihood of many employees.

    They committed acts ofsabotage to discourage

    Jacquard from furtheruse of the newtechnology FIRSTcyber crime.

  • 8/8/2019 Cyber Crime - MIS Presentation

    4/27

    One

    Computer as a target of crime

    Two

    Computer as a i strume tality

    Three

    Computer as a i cide tal or other crime

    Four

    Crime associated with the prevale ce of computers

  • 8/8/2019 Cyber Crime - MIS Presentation

    5/27

    Crime

    Physicaldamage

    Theft ofdata

    Destructionof data

    Act ofspreading

    viruses,worms

    Hacking

  • 8/8/2019 Cyber Crime - MIS Presentation

    6/27

    Computers ortheir contentsare used infurtherance ofa crime

    Or offences arecommitted bymanipulating thecontents ofcomputer systems.

    Examples: Sendinge-mails, manipulatingcomputer contents forcredit card frauds ortelecommunication

    frauds

  • 8/8/2019 Cyber Crime - MIS Presentation

    7/27

    With the advent ofcomputers, the criminalshave started using thetechnology as an aid forperpetuation of

    conventional crimes.

    These include use ofcomputers as an aid for crimessuch as drug trafficking, moneylaundering, child pornography

    etc.

  • 8/8/2019 Cyber Crime - MIS Presentation

    8/27

    Include

    One

    Copyright violation

    Two

    Software piracy

    Three

    Component theft

  • 8/8/2019 Cyber Crime - MIS Presentation

    9/27

    Human beings are vulnerable so the rule oflaw is required to protect them

    a quote from The Concept of Law by H.L.A Hart, a legalphilosopher

    In drawing similarity, we may say that computers arevulnerable so rule of law is required to protect and safeguardthem against cyber crime.

  • 8/8/2019 Cyber Crime - MIS Presentation

    10/27

    One

    The capacity to store data in comparatively smallspace.

    Easier to obtain large information in one go

    Two

    Computers are easy to access for those can steal

    Secretly implanted logic bomb, key loggers that can

    steal access codes, advanced voice recorders; Retina imagers etc. that can fool biometric systems

    and bypass firewalls can be utilized to get past many asecurity system.

  • 8/8/2019 Cyber Crime - MIS Presentation

    11/27

    Three

    Complexity causes human errors

    Human mind is fallible and it is not possible that there mightnot be a lapse at any stage.

    Four

    Negligence is a part of human conduct

    Negligence in protecting computer systems gives criminals aneasy access.

    Five

    Loss of evidence

    Easy to destroy any evidence through deletion of data

  • 8/8/2019 Cyber Crime - MIS Presentation

    12/27

    Category 1

    Children and adolescents between the age group of 6 to 18 years

    Due to the inquisitiveness to know and explore the things.

    To prove themselves to be outstanding amongst other children in theirgroup.

    Category 2

    Organized hackers These are organized together to fulfill certain objective.

    The reason may be to fulfill their political bias, fundamentalism etc.

    Recent hacking of Indian Government sites by hackers from Pakistan.

    NASA and Microsoft sites are constantly under attack by the hackers.

  • 8/8/2019 Cyber Crime - MIS Presentation

    13/27

    Category 3

    Professional hackers / crackers

    Their work is motivated by the colour of money.

    These kinds of hackers are mostly employed to hack the site of therivals and get credible, reliable and valuable information.

    They may even be employed to crack the system of the employer ,basically as a measure to make it safer by detecting the loopholes.

    Category 4 Discontented employees

    who have been either sacked by their employer or are dissatisfied withtheir employer.

    Revenge is their only motive

  • 8/8/2019 Cyber Crime - MIS Presentation

    14/27

    Silent in Nature

    Computer crime could be committed in privacy without reaching toscene of crime physically i.e. no eye witnesses. There is no signs ofphysical violence or struggle.

    Global in character

    No national borders. By sitting comfortably far away from the countrythe entire economy of the country could be destroyed. As digitalevidences are fragile in nature one has to respond quickly.

    Non existence of Physical Evidence

    No physical evidence to indicate that crime has been committed. Onlyon a closer look the trained person could find out the evidences whichare not in the traditional format but are in digital format.

  • 8/8/2019 Cyber Crime - MIS Presentation

    15/27

    Creates high Impact

    Impact is severe and may be long term. It can damage

    the victim system permanently. Loss of good will.

    High Potential and Easy to Perpetrate

    A software developer who did not get enough money

    or good job would turn to criminal world for theirsurvival. Therefore, the computer crimes have apotential to increase. Hence organized mafia may enterinto this sector.

  • 8/8/2019 Cyber Crime - MIS Presentation

    16/27

    1

    Harassment via e-mails

    Bombarding with threatening e-mails

    2

    Cyber stalking

    Posting messages on the bulletin boards frequented by thevictim, or entering the chat-rooms frequented by the victim,constantly bombarding the victim with emails etc.

    3

    Dissemination of obscene material

    Pornography is one of the biggest industries

    4

    Defamation

    Growing tool in brand wars

    Example: Blogging negatively about someone

  • 8/8/2019 Cyber Crime - MIS Presentation

    17/27

  • 8/8/2019 Cyber Crime - MIS Presentation

    18/27

  • 8/8/2019 Cyber Crime - MIS Presentation

    19/27

    India enacted its first IT Act in 2000.

    The following provisions were provided under the act:

    (1) Offence Section under IT Act

    Tampering with Computer source documents Sec.65

    Hacking with Computer systems, Data alteration Sec.66

    Publishing obscene information Sec.67

    Un-authorised access to protected system Sec.70

    Breach of Confidentiality and Privacy Sec.72

    Publishing false digital signature certificates Sec.73

  • 8/8/2019 Cyber Crime - MIS Presentation

    20/27

    (2) Computer Related Crimes Covered under IPC (Indian Penal Code) and SpecialLaws

    Sending threatening messages by email Sec 503 IPC

    Sending defamatory messages by email Sec 499 IPC

    Forgery of electronic records Sec 463 IPC

    Bogus websites, cyber frauds Sec 420 IPC

    Email spoofing Sec 463 IPC

    Web-Jacking Sec. 383 IPC

    E-MailAbuse Sec.500 IPC

    Online sale of Drugs NDPS Act

    Online sale of Arms Arms Act

  • 8/8/2019 Cyber Crime - MIS Presentation

    21/27

    WHAT STEPS DO BUSINESSFIRMS NEED TO TAKE TOPREVENT CYBER CRIME?

  • 8/8/2019 Cyber Crime - MIS Presentation

    22/27

    Precaution

    Prevention

    ProtectionPreservation

    Perseverance

  • 8/8/2019 Cyber Crime - MIS Presentation

    23/27

    PHYSICAL SECURITY

    Computer network should be protected from the access of unauthorized persons.

    ACCESS CONTROL

    Firewalls allow only authorized communications between the internal and external network.

    PASSWORD PROTECTION

    Proof of identity is an essential component to identify intruder.

    The use of passwords in the most common security for network system including servers,

    routers and firewalls.

    Password should be charged with regular interval of time and it should be alpha numeric and

    should be difficult to judge.

    USING ENCRYPTION

    Encryption is able to transform data into a form that makes it almost impossible to read it

    without the right key.

  • 8/8/2019 Cyber Crime - MIS Presentation

    24/27

    FINDING THE HOLES IN NETWORK

    System managers should track down the holes before the intruders do.

    So organization should work hard to discover security holes, bugs and weaknesses and report theirfindings as they are confirmed.

    USING NETWORK SCANNING PROGRAMS

    Network tool, UNIX, scans and gathers information about any host on a network, regardless ofwhich operating system or services the hosts were running.

    It checks the known vulnerabilities include bugs, security weakness, inadequate passwordprotection and so on.

    There is another product available called COPS (Computer Oracle and Password System). It scansfor poor passwords and dangerous file permissions

    USING INTRUSION ALERT PROGRAMS:

    Need to put some watchdogs into service. There are some intrusion programs, which identifysuspicious activity and report so that necessary action is taken. They need to be operatingconstantly so that all unusual behaviour on network is caught immediately.

  • 8/8/2019 Cyber Crime - MIS Presentation

    25/27

  • 8/8/2019 Cyber Crime - MIS Presentation

    26/27

    http://www.crime-research.org/analytics/702/2

    http://www.naavi.org/pati/pati_cybercrimes_dec03.htm

    http://www.basearticles.com/Art/180332/288/ POPULAR-CYBER-CRIME-

    CASES-OF-INDIA.html

    http://www.cyberlawsindia.net/cases.html

    http://us.norton.com/cybercrime/definition.jsp

  • 8/8/2019 Cyber Crime - MIS Presentation

    27/27