Cyber Crimes

  • Uploaded by: jaibharath1019
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Cyber Crimes as PDF for free.

More details

  • Words: 780
  • Pages: 26
CYBER CRIMES By C.Gunasekhar,ECE.

PROLOGUE   

 

 

Cyber crime is simply as criminal activity involving the information technology infrastructure. Illegal access - unauthorized access by unauthorized people. Illegal interception - technical means of non-public transmissions of computer data to, from or within a computer system. Data interference - illegal damaging, deleting or alteration of computer data. systems interference - interfering with the functioning of a computer by inputting, transmitting or suppressing computer data. Misuse of devices - usage of unauthorized people. Forgeries - ID theft.

CATEGORIES OF CRIMES

Cyber crimes

Mobiles

Banking

Internet

CRIMES RELATED TO MOBILES Chipping and pinning. Usage of mobiles in cinema theatres to take videos. Irritating an unknown person by continuous sms and phone calls. Taking photos without knowledge of that particular person. Mobile robberies. Blue bugging – unknown persons interruption using blue tooth.

CRIMES RELATED TO BANKING  





Nigerian money offers. Misusing others credit card in the public. Abusing pin numbers of credit cards. Issuing fake cheques.

CRIMES RELATED TO INTERNET ∗ ∗ ∗ ∗ ∗

Sale of duplications. Misusing the information stored on others personal computer or website. Software piracy. Forgeries such as ID theft. Harmful software - attaches itself to other software.

DISTRESS DUE TO SCAMS

    

Irritation caused by unknown callers. Great loss in financial status of public. Future of teenagers being spoiled. Child pornography. Corrupting personal informations.

LACK OF CARE 





People doesn’t care for couple of dollars. After being scammed people doesn’t care. 80 per cent of the cyber crimes are not reported.

OUTCOMES OF THE CRIMES

CYBER LAWS Reserve Bank of India Act, 1934 . IT act – 2000. Tort law. CAT (Cyber action team)

MODE OF INVESTIGATION

CATEGORIES

CYBER CRIMES

FRAUD COMPLAINTS

IDENTITY THEFT COMPLAINTS

ONLINE SCAMS

identity thefts, 36%

frauds, 64%

frauds

identity thefts

FRAUDS COMPLAINTS Auctions – sale of duplications.  Fake cheques – giving blind cheques.  Lotteries – printing same numbers.  Nigerian money offers – getting money with false properties.  General merchandise - goods were never delivered or were misrepresented. 

IDENTITY THEFTS Credit cards – usage of others credit cards.  Advance free loans – misusing loan offers.  Phone fraud.  Employment fraud.  Loan fraud. 

INQUIRY METHODS 

    

Collection of data for evidentiary or verification purpose. Computer files analysis. E-mail tracking and recovery. Detect and prevent intellectual property theft. Recovery of lost or deleted data. Detect sale and distribution of illegal products.

Detection with neural networks

NEURAL NETWORKS As neural networks resembles human brain, the neural fraud management system is completely automated and state-of-the-art integrated system of neural networks helps in detecting the scams.

STEPS INVOLVED 





Supervised clustering-uses a mix of traditional clustering and multi-dimensional histogram analysis with a discrete metric. Statistical analysis- it ranks important features based on the joint distribution per transaction pattern. AMS-automatic modeling system, chooses the important inputs and symbols, train and create clustering and neural network models.

BENEFITS  



 

Reduces loses due to fraud. Identify new fraud methods to reduce fraud loses and minimize false positives. It can work in real time, online or batch modes. Reinforce customer trust. Improves operational efficiencies.

STRUCTURED SETTLEMENT A settlement in which the reward is paid to the applicant over a course of time. An annuity or government bond generally guarantees structured settlement. It needs approval from a judge, coz of a recently enacted federal law.

ADVANTAGE Under structured settlement people get money periodically. Structured settlement funding has many advantages over other mode of settlement in terms of managing larger amounts of cash, tax exemption, flexibility and stability.

DISADVANTAGE Major disadvantage of structured settlement funding are the high commissions on the purchases by the companies and in equal payments. Inflation causes reduction in real value of payments. There are possibilities of getting cheated if approached without a lawyer.

REDUCTION METHODS        

Never reveal personally – identifiable information online Never share your password with other people. Don’t believe everything you read or see online. Don’t respond to inappropriate messages or emails. Don’t use adult sites. Do not provide photocopies of both the sides of the credit card to anyone. While using a credit card for making payments online, check if the website is secure. Do not give any information to persons seeking credit card information over phone.

CONCLUSION Cyber crime is a crime that ruins people financially, personally, professionally often taking years to recover from it unless we people are aware of it. “Let us take part in developing our INDIA without crimes”

THANK YOU

Related Documents

Cyber Crimes
May 2020 27
Cyber Crimes
May 2020 15
Cyber Crimes
May 2020 21
Cyber Crimes - Mod
April 2020 16
Phishing Cyber Crimes
June 2020 11
Evolution Of Cyber Crimes
December 2019 25

More Documents from ""

Cyber Crimes
May 2020 15