Вы находитесь на странице: 1из 15

WHAT IS CYBER CRIME?

Cyber crime is the most complicated problem in the cyber world.


Cyber crime is an illegal activity committed on the internet. It is a criminal
Activity that uses a computer either as a target or a means for perpetuating
further crimes. It includes all crimes performed or resorted to by abuse of
electronic media or otherwise, with the purpose of influencing the
functioning of computer or computer system.

In short, cyber crime is any crime where:

Ô Computer is a target
Ô Computer is a tool of crime
Ô Computer is incidental to crime

WHY CYBER CRIME IS DANGEROUS?

Because:

Ô Everybody is using computer


Ô urom white collar criminals to terrorist organizations and from
teenagers to adults
Ô Conventional crimes like uorgery, Extortion, Kidnapping etc. are
being committed with the help of computers
Ô New generation is growing up with computer
Ô MOST IMPORTANT- Monetary transactions are moving on to the
INTERNET

uIRST CYBER CRIME:


The first recorded cyber crime took place in the year 1820! I n 1820,
Joseph-Marie Jacquard, a textile manufacturer in urance, produced the loom.
This device allowed the repetition of a series of steps in the weaving of
special fabrics. This resulted in a fear amongst Jacquard's employees that
their traditional employment and livelihood were being threatened. They
committed acts of sabotage to discourage Jacquard from further use of the
new technology. This is the first recorded cyber crime!

c 

REASONS u OR CYBER CRIME:
Ô Capacity of a computer to store data in comparatively low space.
Ô Weakness in operating system
Ô Easy to access
Ô Negligence or lack of awareness in users
Ô  oss of Evidence

P ROuI E Ou CYBER CRIMINA S:


Ô Discontented Employees
Ô Teenagers
Ô Professional & Organized Hackers
Ô Business Rivals
Ô Ex-Boy uriend
Ô Divorced Husbands etc.

V ICTIMS Ou CYBER CRIME:


Ô Desperados & Greedy People
Ô Unskilled & Inexperienced
Ô Unlucky People

C ASSIuICATION Ou CYBER CRIME:

÷ ÷

 
 
 


  
 


c 

AGAINST INDIVIDUA S

Virus
Attack

Cyber-
arassment
Stalking

Against
Individual

Defamation Thefts

Email
spoofing

AGAINST ORGANIZATIONS

Unauthorized
Control
on System

Unauthorized Pirated
Information
Against 
Soft are
Organization
Possessed Distribution

Cyber
AGAINST SOCIETY
Terrorism
c 

AGAINST SOCIETY

Pornography

uinancial
Trafficking crimes

Against
Society

Sale of illegal
uorgery articles

Online
gambling

S OME CYBER CRIME OuuENCES:

Ô Harassment via emails


Ô Dissemination of obscene material/ Indecent exposure
Ô Defamation
Ô Unauthorized control over computer system
Ô Email Spoofing
Ô Computer Vandalism
Ô Transmitting Virus/Worms
Ô Distribution of Pirated Software
Ô Cyber terrorism against Government Organization
Ô Drug Trafficking
Ô uraud & Cheating

c 

MODE & MANNER Ou CYBER CRIMES:

a) HACKING:

Ô Action: Illegal intrusion into a computer system and/or network.


Ô Case: A business rival obtains the information using hacking or social
engineering. He then uses the information for the benefit of his own
business.
Ô  aw: Sections 43, 66 and 67 of Information Technology Act.
Ô Punishment: Provides for imprisonment up to 3 years or fine, which
may extend up to 2 lakh rupees or both.

b) CYBER STA KING:

Ô Action: Posting messages on the bulletin boards, entering the chat -


rooms frequented by the victim. The stalker may post victim·s
personal information on any website .
Ô Case: In order to harass a woman, her telephone number is given to
others as if she wants to befriend males.
Ô  aw: Section 509 of IPC
Ô Punishment: Simple imprisonment for a term which may extend to
one year, or with fine or with both.

c) VIRUS & WORM ATTACK:

Ô Action: Virus infects other programs and makes copies of itself and
spread into other programs in the same machine. Worms, unlike
viruses do not need the host to attach themselves to. They merely
make functional copies of themselves and do this repeatedly till they
eat up all the availab le space on a computer's memory.
Ô Case: Use of malicious software like Trojan horse, Time Bomb,  ogic
Bomb, Rabbit & Bacterium.
Ô  aw: Sections 43 and 66 of Information Technology Act and section
426 of Indian Penal Code
Ô Punishment: Provides for imprisonment up to 3 years or fine, which
may extend up to 2 lakh rupees or both.

c  

d) CREDIT CARD uRAUD:

Ô Action: The victim·s credit card information is stolen and misused for
making online purchases. Install key-loggers in public computers. If
electronic transactions are not secured, the credit card number can be
stolen by the hackers who can misuse this card by impersonating the
credit card owner.
Ô Case: credit card fraud in a BPO in Chennai.
Ô  aw: Sections 43 and 66 of Information Technology Act and section
420 of Indian Penal Code.
Ô Punishment: Imprisonment of either description for a term which may
extend to seven years, and shall also be liable to fine(420). Provides for
imprisonment up to 3 years or fine, which may extend up to 2 lakh
rupees or both(66).

Credit Card Skimmer Credit Card Writer

How the Credit Card Skimmer & Writer is Used

c 


e) SA AMI ATTACKS:

Ô Action: Small, almost immaterial, amounts of assets are systematically


acquired from a large number of sources. In such crime, criminal
makes insignificant changes in such a manner that such changes would
go unnoticed.
Ô Case: Criminals make such a programme that deducts small amount
like Rs. 2.50 per month from the account of all the customers of the
bank and deposit the same in his account. In this case, no account
holder will approach the bank for such small amount but criminal
gains huge amount.
Ô  aw: Section 66 IT Act
Ô Punishment: Provides for imprisonment up to 3 years or fine, which
may extend up to 2 lakh rupees or both.

f) EMAI  BOMBING:

Ô Action: Email bombing refers to sending a large number of emails to


the victim resulting in the victim·s email account or mail servers
crashing
Ô Case: A foreigner for revenge started sending thousands of mails to the
Simla Housing Board till the SHB·s servers crashed.
Ô  aw: Section 66 Information Technology Act.
Ô Punishment: Provides for imprisonment up to 3 years or fine, which
may extend up to 2 lakh rupees or both.

g) CYBER PORNOGRAPHY:

Ô Action: Cyber pornography includes pornographic websites,


pornographic magazines produced using computers (to publish and
print the material) and the Internet (to download and transmit
pornographic pictures, photos, writings etc.)
Ô Case: Anybody including children can log on to the internet and access
websites with pornographic contents with a click of a mouse.
Ô  aw: Section 67 of Information Technology Act.
Ô Punishment: imprisonment of either description for a term which may
extend to five years and with fine which may extend to one lakh
rupees and in the event of a second or subsequent conviction with
imprisonment of either description for a term which may extend to ten
years and also with fine which may extend to two lakh rupees .

c  

h) SOuTWARE P IRACY:

Ô Action: Pirated software is sold through a network of computer


hardware and software vendors. The suspect registers a domain name
using a fictitious name and then hosts his website
Ô  aw: Sections 43 and 66 of the Information Technology Act, section 63
of Copyright Act
Ô Punishment: there is a minimum jail term of 6 months for copyright
infringement. The section also provides for fines up to Rs. 2,00,000 and
jail term up to three years or both.

i) WEB J ACKING:

Ô Action: In these kinds of offences the hacker gains access and control
over the web site of another person or organization. He may even
mutilate or change the information on the site
Ô Case: the site of MIT (Ministry of Information Technology) was
hacked by the Pakistani hackers and some obscene matter was placed
therein
Ô  aw: Section 383 IPC

j) ON INE SA E Ou I  EGA  ARTIC ES:

Ô Action: Sale of narcotics drugs, weapons, wildlife etc. is being


facilitated by the Internet
Ô Case: In March 2007, the Pune rural police cracked down on an illegal
rave party & arrested hundreds of illegal drug users. The social n/wing
site, Orkut.com, is believed to be one of the modes of communication
for gathering people for the illegal ´drugµ party.
Ô  aw: Depending upon the illegal items being transacted in, provisions
of the Narcotic Drugs and Psychotropic Substances Act, Arms Act,
Indian Penal Code, Wildlife related laws etc may apply .

k) NET EXTORTION:

Ô Coping the company·s confidential information and date in order to


extort said company for huge amount
Ô Ex-employees may do this against the company

c  

l) EMAI  SPOOuING :

Ô Action: is a term used to describe (usually fraudulent) e-mail activity


in which the sender address and other parts of the e-mail header are
altered to appear as though the e -mail originated from a different
source.
Ô Case: Because many spammers now use special so ftware to create
random sender addresses, even if the user finds the origin of the e -mail
it is unlikely that the e-mail address will be active. The technique is
now used ubiquitously by mass-mailing worm as a means of
concealing the origin of the propagation. On infection, worms such as
I OVEYOU, Klez and Sober will often try to perform searches for e-
mail addresses within the address book of a mail client, and use those
addresses in the u field of e-mails that they send, so that these e-
mails appear to have been sent by the third party.
Ô uor example:
6 ^  is sent an infected e-mail and then the e-mail is opened,
triggering propagation
6 The worm finds the addresses of ^  and ^  within the
address book of ^ 
6 urom the computer of ^ , the worm sends an infected e-mail
to ^ , but the e-mail appears to have been sent from ^ 
Ô This can be particularly problematic in a corporate setting, where e-
mail is sent to organizations with content filtering gateways in place.
These gateways are often configured with default rules that send reply
notices for messages that get blocked, so the example is often followed
by: ^  doesn't receive the message, but instead gets a message
telling him that a virus sent to them has been blocked. ^  receives a
message telling him that a virus sent by them has been blocked. This
creates confusion for both ^  and ^ , while ^  remains
unaware of the actual infection.

m) CYBER DEuAMATION:

Ô Action: The criminal sends email containing defamatory matters to all


concerned of the victim or post the defamatory matters on a website.
Ô Case: Discontented Employee may do this against boss, ex-boyfriend
against girl, divorced husband against wife.

c  

n) EMAI  P HISHING:

Ô Action: Sending an e-mail to a user falsely claiming to be an


established legitimate enterprise in an attempt to scam the user into
surrendering private information.
Ô Case: Nigeria Mail
Ô  aw: Sections 43 and 66 of Information Technology Act and sections
419, 420 and 468 of Indian Penal Code
Ô Punishment: imprisonment of either description for a term which may
extend to three years and shall also be liable to fine which may extend
to one lakh rupees.

ANATOMY Ou NIGERIAN  ETTER

Ô My father left me $40 million in his will, but I have to bribe


government officials to get it out

Ô The Nigerian National Petroleum Company has discovered


oil, and we as officials of that company want to insider
acquire the land, but we need an Indian front man to purchase
it first for us.

Ô We just sold a bunch of crude oil in Nigeria, but we have to


bribe the banker to get it out.

Ô The Nigerian government overpaid on some contract, and


they need a front man to get it out of the country before the
government discovers its error.

c 

IMAGE Ou NIGERIAN M AI 

c 

ANOTHER EXAMP E Ou PHISHING MAI 

urom: *****Bank [mailto:support@****Bank.com]

Sent: 08 June 2004 03:25

To: India

Subject: Official information from ***** Bank

Dear valued ***** Bank Customer! uor security


purposes your account has been randomly chosen for
verification. To verify your account information we
are asking you to provide us with all the data we are
requesting.

Otherwise we will not be able to verify your


identity and access to your account will be denied.
Please click on the link below to get to the bank
secure page and verify your account details. Thank
you.

https://infinity.*****bank.co.in/Verify.jsp

****** Bank  imited

c 

Actual  ogin Page

Duplicate  ogin Page


c 

O ) C YBER TERRORISM:

Ô Action: Cyberspace used by individuals and groups to threaten,


terrorize citizens, military etc.
Ô Case: On 15th Oct 2007, the Asst. Vice President of NSE received a
threatening e-mail, saying that, ´THIS IS TO INuORM U THAT
WITHIN 48 HRS. NATIONA  STOCK EXCANGE WI   BE
B ASTEDµ.
Ô This information was also sent to BSE
Ô  aw: sec 66(u) of Information Technology act
Ô Punishment: imprisonment which may extend to imprisonment for
life

c 

 OOPHO ES IN THE  OW ENuORCEMENT:

Ô Hurry in passing the legislation.


Ô Cyber Crime is neither comprehensive nor exhaustive.
Ô Ambiguity in the Definition.
Ô Uniform  aw.
Ô  ack of Awareness
Ô Jurisdiction issues.

SAuETY MEASURES:

Ô Monitor your monthly credit card statements.


Ô Make sure a website is secure and reputable before providing private
details.
Ô Keep passwords private.
Ô Remember that people online may not be who they seem.
Ô Delete unknown e-mail attachments, as they may contain viruses.
Ô Viruses scan all files downloaded from the web to your computer.
Ô Never include personal information on social networking Sites.

CONC USION:

Ô It is not possible to eliminate cyber crime.


Ô It is only possible to check them.
Ô History is witness that no legislation has succeeded in totally
eliminating the crime
Ô The only possible is to make people aware of their rights and duties
Ô Make  aws more stringent to check the crime.

c  


Вам также может понравиться