Vous êtes sur la page 1sur 15

CYBER CRIME

CONTENTS :

Introduction

Definition

Categories of cyber crime

Role of computer in crime

Cyber criminals

Prevention

IT act 2000

IT act 2008

Conclusion

DEFINITION

Its an unlawful act in which the computer is either a tool or a target or


both.

Acts that are punishable by the Information Technology Act.

Cybercrime is an illegal act is committed using a computer network.

Cyber space is a virtual space that has become as important as real


space for business, politics, and communities

CATEGORIES OF CYBER CRIME


Cyber crimes against persons

Cyber crimes against property

Cyber crimes against government

CYBER LAWS DEALS WITH

Cyber Crimes

Electronic or Digital Signatures

Intellectual Property

Data Protection and Privacy


5

CYBER ATTACKS STATISTICS

ROLE OF COMPUTER IN CRIME


COMPUTER AS TARGET

COMPUTER AS TOOL
COMPUTER AS APPLIANCE
7

CYBER CRIMINALS
Insider Threats

Hackers

Hactivists

(employees)

(teenage thrill-seekers to
sophisticated criminals)

(overloads e-mail servers or


hack websites to send
political message)

Virus Writers

Criminal Groups

Sensitive Intrusions

(writes viruses to that infect


systems)

(attack systems & steal

(sensitive information is
obtained via computer

password for financial gain)

intrusions)

Information Warfare

Terrorists

Cyber Warfare

(alternative to military

(who have potential to


disrupt government systems
with computer attacks)

(attack by sovereigns ---

attacks)

Crime or Declaration of war)


8

TYPES OF CYBER ATTACKS


1)

Viruses

9) Theft

2)

Worms

10) Piracy

3)

Trojans

11) Break ins

4)

Mail bombs

5)

Threats

6)

Harassment

7)

DOS

8)

Fraud

12) Terrorism

PREVENTION

Use strong password.

Secure your computer


i.

Activate your firewall

ii.

Use anti-virus

iii.

Block software attacks

Secure your mobile devices.

Install latest OS.

Secure wireless network.

Protect your e-identity.


10

CASE STUDY

The Citadel network a cybercrime ring responsible for stealing more than
$500 million from consumer and business bank account.

It infected more than 5 million PCs located in 90 countries , including the


united states , Australia , Hong Kong , India and large part of Western
Europe.

Bank affected by the groups activities included American Express , Bank Of


America , HSBC , Wells Fargo , Paypal and Royal Bank Of Canada.

According to Microsoft, the gang behind the Citadel botnets infected PCs in
part byselling pirated versionsof the Windows XP operating system that
11
they'd pre-infected with the malware.

CASE STUDY

Citadel blocked victims' access to many legitimate anti-virus/anti-malware


sites, making it so people may not have been able to easily remove this threat
from their computer.

Microsoft and FBI joint operation, they took down over 1,000 Citadel botnets
that were being used to control millions of malware-infected PCs.

This Citadel botnet takedown was part of a larger effort , coordinated by the
National Cyber Investigative Joint Task Force(NCIJTF) , which is targeting
botnet creators and distributors.
12

IT ACT 2000

The Information Technology Act, 2000 (IT Act), came into force on
17 October 2000.

The primary purpose of the Act is to provide legal recognition to


electronic commerce and to facilitate filing of electronic records
with the Government.

Information Technology Act 2000 consisted of 94 sections


13

segregated into 13 chapters.

IT ACT AMENDMENT 2008

ITA-2008, is a new version of IT Act 2000, has been passed by the


parliament on
23rd December 2008.

It received the assent of President of India on 5th February, 2009.

Provides additional focus on Information Security.

Added several new sections on offences including Cyber Terrorism


and Data Protection.

124 sections and 14 chapters.

14

CONCLUSION

India needs a good combination of laws and technology, in


harmony with the laws of other countries and keeping in mind
common security standards.

15

Vous aimerez peut-être aussi