Cyber Crime

  • Uploaded by: guruprasth
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Cyber Crime as PDF for free.

More details

  • Words: 739
  • Pages: 15
CYBER CRIME & ENFORCEMENT IN INDIA 

-

Seminar on Cyber Crimes on 26th August 2009 at GTEC, Vellore W.S.Guruprasath V.Palaniraja Sri Sankara Arts and Science College, Kanchipuram.

Introduction to Cyber crime 



Computer Crime, ECrime, Hi-Tech Crime or Electronic Crime is where a computer is the target of a crime or is the means adopted to commit a crime. Most of these crimes are not new. Criminals simply devise different ways to undertake standard criminal activities such as fraud, theft, blackmail, forgery, and embezzlement using the new medium, often involving the Internet

Types of Cyber crimes   

 

   

 

Credit card frauds Cyber pornography Sale of illegal articlesnarcotics, weapons, wildlife Online gambling Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code Email spoofing Forgery Defamation Cyber stalking (section 509 IPC) Phising Cyber terrorism

Crime against Government

Crime against property

Crime against persons

Computer Viruses  

Viruses A computer virus is a computer program that can infect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of it. Note that a program does not have to perform outright damage (such as deleting or corrupting files) in order to be called a "virus".

Viruses

File infectors

Boot record infectors

Boot and file viruses

Cyber crimes

Web jacking

Hacking

Information Theft

E-mail bombing

Salami attacks

Denial of Service attacks

Trojan attacks

1. Unauthorized Access

3. Packet Sniffing

5. Tempest Attack

7. Password Cracking

9. Buffer Overflow

Frequency of incidents of Cyber crimes in India

Denial of Service: Section 43 Virus: Section: 66, 43 Data Alteration: Sec. 66 U/A Access: Section 43 Email Abuse: Sec. 67, 500, Other IPC Sections Data Theft: Sec 66, 65

Source: Survey conducted by ASCL

MALWARE 



Malicious Software • Melissa, CIH/Chernobyl, Happy99, Explore Zip • Chews up hard disks, corrupts files, disrupts operations. • Transmitted through the internet via popular e-mail features to propagate itself  Melissa through MS Word 97 and 2000 applications  Happy99.exe Trojan Horse displays “Happy99” and fireworks, and then mails itself to lots of people with addresses on the victim’s browser. Melissa: cost $93 - 385 million in damage! MSIA711.02

8

Protect your Computers! 





Use anti-virus software and firewalls - keep them up to date Keep your operating system up to date with critical security updates and patches Don't open emails or attachments from unknown sources



Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist



Back-up your computer data on disks or CDs often



Don't share access to your computers with strangers



If you have a wi-fi network, password protect it



Disconnect from the Internet when not in use



Reevaluate your security on a regular basis



Make sure your employees and family members know this info too!

Wireless Security Concerns 1) Availability of free WAP detection and logging tools like Netstumbler and Kismet 2) War Driving-where individuals drive (or walk) Around to find unprotected and accessible WAPs 3) Consumer and even system administrators fail to configure their systems adequately

CYBER CRIME INCIDENT HANDLING 1.

2.

3.

4. 5.

Continuing Operations v. Preservation of Evidence Identify the Incident Manager and Team – usually department heads or officers Assess Systems Impaired and Damages Review Adequate Logging/Tracking Note Unusual Activities By Employees or on Computer Network

WORKING WITH LAW ENFORCEMENT 





  



Identify your LOSS, HARM, or DAMAGE – lost asset, revenues, expenses, repair cost Identify Capture or Quarantine Electronic or Computerized Equipment, Logs and Files Maintain a “Chain of Custody” for Evidence Begin a written chronology of events Who may have to testify Identify one or two individuals to be your main point of contact with LEOs Alert Your General Counsel or Attorney

1. Cyber laws punish the Cyber Criminals.

2. The Information Technology Act, 2000 defines all the Cyber laws in India.

6. Unauthorized Access -

8. Computer Hacking

-

2 years of Jail or fine.

3 years of Jail or fine up to Rs. 2,00,000/-

11. Virus Attacks

-

1 year of Jail & fine up to Rs. 2,00,000/-

1. Firms, civil societies, governments should work cooperatively to strengthen legal frameworks for cyber security.

2. Governments should assure that their laws apply to cyber crimes.

3.

Firms should secure their networked information.

QUERIES??

THANK YOU

Related Documents

Cyber Crime
June 2020 22
Cyber Crime
May 2020 24
Cyber Crime
December 2019 33
Cyber Crime
July 2020 25
Cyber Crime
July 2020 20
Cyber Crime
June 2020 16

More Documents from ""

Cyber Crime
May 2020 24