Vous êtes sur la page 1sur 29

| |

 
 |  
 
 | 

 :
:
Prof.Bhavna Sharma Manish Kaushal
Rashmi Thakur
Roopal Tyagi
Abhijeet Pathak
2 
  
All crimes preformed or resorted to by
abuse of electronic media or otherwise,
with the purpose of influencing the
functioning of computer or computer
system.

Computer crime is a crime where:


ë Computer is a target.
ë Computer is a tool of crime.
ë Computer is incidental to crime.
2     
BECAUSE-
BECAUSE-
Everybody is using COMPUTERS.
From white collar criminals to terrorist
organizations and from teenagers to
adults.
Conventions crime like forgery, extortion,
kidnapping etc. are being committed with
the help of computers.
MOST IMPORTANT-
IMPORTANT-Monetary transactions
are moving on the internet.
@     
isgusted employees.
Teenagers
Political hactivist.
Professional hackers.
Business rivals.
Ex--boyfriend/girlfriend.
Ex
ivorced husbands.
2   
—ullible.
—reedy people.
Unskilled and inexperienced.
Unlucky people.
|
    
  
These are because of:

Anonymity
Computer¶s storage capacity.
Weakness in operating
system.
Lack of awareness of user.
`    
Racking
enial of service attack.
Virus dissemination.
Software piracy.
Pornography.
IRC crime.
Credit card fraud.
Phishing.
Spoofing.
| 
Net extortion.
Cyber stalking.
Cyber defamation.
Salami attack.
Threatening.
Π 
Racking is a simple term means illegal
intrusion into a computer system without
the permission of the owner/user.

2] Virus dissemination
Malicious software that attaches itself to
other software.
(virus, worms, trojan horse, logic bomb,
etc«)
6    
This is an act by the criminal, who
floods the bandwidth of the victim¶s
network of fills his e-
e-mail box with
spam mail depriving him of the
services he is entitled to access or
provide.
  !   
Theft of software through the illegal
copying of genuine programs.
Retail revenue losses worldwide are
ever increasing due to this crime.
Can be done in various ways like-
like-
hard disk loading, illegal downloads
from the internet, etc..
- @   
Pornography is first successful e-
e-
commerce product.
Anybody including children can log
on to the internet and access
websites with pornographic contents
with a click of a mouse.
Publishing any material in electronic
form which is lascivious is offence
under the provision of section 67 I.T.
Act--2000.
Act
ÿ  || 
Internet Relay Chat (IRC) servers have
chat rooms wherein people from any part
of the world can come together and chat
with each other.
Rackers use it for discussing their
techniques.
Cyber stalking-
stalking- in order to harass a
woman her telephone no. is given to
others if she wants to have a boyfriends.
Paeodohiles use chat rooms to allure small
children.
D | " " 
"
We simply have to type credit card
no. into www page of the vendor for
online transactions.
If electronic transaction are not
secured then the credit cards no. can
be stolen by the hackers who can
misuse the card.
è #  $ 
Copying the company¶s confidential data
in order to extort company for huge
amount.

9] Phishing
It is the technique of pulling out
confidential information from the bank or
financial institutional account holder by
deceptive means.
|%&2
o CYBER LAW IS A SYSTEM OF
RE—ULATIONS FOR TRE ELECTRONIC
USSA—E OF TRE INTERNET.
o SIMPLY SPEAKIN— ELECTRONIC
CYBER LAW IS A —ENERIC TERM
WRICR REFERS TO ALL LE—AL &
RE—ULATORY ASPECTS OF TRE
INTERNET , WORLS TRANSACTION
SYSTEM & ELECTRONIC COMMERCE
`#'(%|`'#|
|%&2
UE TO ANONYMOUS MATURE OF
TRE INTERNET, IT IS POSSIBLE TO
EN—A—E INTO A VARIETY OF
CRIMINAL ACTIVITIES —ROSSLY
MISUSIN— TRIS ASPECT OF TRE
INTERNET TO PERPETUATE CRIME
ECSPECIALLY IN E-
E-COMMERCE,
SPAM & MONEY TRANSACTION
USIN— TRE ONLINE BANKIN—
SERVICES.
|  

            

        !

  !  "! "!  

"!  #     $


  $
&|#)
There are many definitions of hacking such
as:
A person who practices hacking is called a
hacker.
Racking can be just to find out how it
works without criminal intent.
Racking can be simply to crack a code.
A hacker can be breaking into a
computers that is yours, often not wanted,
now prohibited by law.
`   
Inside jobs.
Rogue access points.
Back doors.
Viruses and worms.
Trojan horses.
enial of services.
Anarchists, crackers and kiddies.
Π " * 
These includes stealing passwords which
hackers then sell or use, causing harm
and committing simple misuses.

2] Rogue access points

These are unsecured wireless access


points that outsiders can easily breech.
Local hackers often advertise rogue AP¶s
to each other.
6 "
Rackers can gain access to a network
by exploiting back doors through
administrative shortcuts,
configuration errors, easily
deciphered passwords and unsecured
dial--ups. With the aid of
dial
computerized searchers, hackers can
easily find any weakness in your
computer.
 2  "
 
These are self replicating programs
that attach themselves to other
programs (viruses) and machines
(worms). These viruses and worms
attempt to shut down network by
flooding them with massive amount
of bogus traffic, usually through e-
e-
mail.
- ` *    
These are the leading cause of all break-
break-
ins. When a user downloads Trojan horse,
the hacked software kicks off the virus,
passwords which gives the hacker the
control of the PC.

6] enial of services
These gives hacker to bring down the
network without gaining internet access.
These attacks from multiple sources. It is
difficult to block because it uses multiple,
changing, source IP addresses.
D &   +  ,"" 
Anarchists are people who just break
stuff. They usually exploit the any
target of opportunity.
Crackers are professional who break
passwords and develop Trojan
horses.
Kiddies are not real hackers. They
are ³wanna-
³wanna-be´ hackers.

Vous aimerez peut-être aussi