Académique Documents
Professionnel Documents
Culture Documents
The term
High tech crime (HTC), also known as
technology-enabled crime, makes use of information and communications technologies to infringe criminal laws. Online tools are those digital goods or services that can be obtained from the internet.
of Citi Bank
The crime was
committed using "Unauthorized Access" to the "Electronic Account Space" of the customers.
3
threatening email demanding protection from unknown person. Police registered a case u/s. 384/506/511 IPC. The sender of the email used the email ID xyz@yahoo.com & abc@yahoo.com and signed as Chengez Babar.
4
Measures to be taken
1. Avoid disclosing any information pertaining to oneself. 2. Avoid sending any photograph online particularly to strangers and chat friends. 3.Use latest and up date anti virus software to guard against virus attacks. 4.Keep back up volumes so that one may not suffer data loss in case of virus contamination 5. Ever send your credit card number to any site that is not secured. 6. Always keep a watch on the sites that your children are accessing. 7. Use a security programme that gives control over the cookies and send information back to the site . 8. Web site owners should watch traffic and check any irregularity on the site. 9. Use of firewalls may be beneficial. 10. Web servers running public sites must be physically separate protected from internal corporate network.
SPAM
SPAM Its an electronics junk and an unsolicited,
often commercial, message transmitted through the Internet as a mass mailing to a large number of recipients.
Spamming used to spread malicious payloads, phish,
legislation designed to curb spam. The law makes it illegal to send e-mail messages that use deceptive subject lines and false return addresses, providing fines and possible prison terms for violators. The law requires all commercial e-mail messages, solicited or unsolicited, to include a valid postal address and an opt-out mechanism within the body of the text so that recipients can prevent future e-mail solicitations.
10
VIRUS
A self-duplicating computer program that spreads
from computer to computer, interfering with data and software. Some viruses are mere annoyances, but others can do serious damage. Viruses can delete or change files, steal important information, load and run unwanted applications, send documents via electronic mail (e-mail).
11
12
WORMS
A program that propagates itself across computers,
usually by spawning copies of itself in each computer's memory. A worm might duplicate itself in one computer so often that it causes the computer to crash.
Trojans:
Also known as a Trojan horse, this is Software that appears to perform or actually performs a desired task for a user while performing a harmful task without the user's knowledge or consent.
13
INDUSRIAL ESPIONAGE
THEFT OF TRADE SECRET
The secret removal, copying, or recording of confidential or valuable information in a company for use by a competitor.
14
HACKING
Stealing data Deleting data for fun Turning computers into zombies
crimes
15
25 16 10
2000
2003
2005
2007
16
18
Wi-Fi HiJacking
60-70% wireless networks are wide open
Why are the Wi-Fi networks unprotected?
Most people say Our data is boring But criminals look for wireless networks to commit
their crimes And the authorities will come knocking on your door..
19
access San Francisco Giants Stadium Surf the web while catching a game UMass (need to register, but its free) Cambridge, MA Philadelphia, PA just announced entire city by 2006
20
21
Graha Indonesia
22
FBI & Interpol Arrested them and in Feb 1997 sentenced to 3 years in prison and ordered to pay $240,000.00 to Citi-Bank.
Citi-Bank had been warned about lax security, but they ignored the warnings,
23
20%
25% 27% 71% 79% 85%
24
25
CYBER TERRORISM
The use of information technology by terrorist groups and individuals to further their agenda. This can include use of information technology to organize and execute attacks against networks, computer systems and telecommunications infrastructures, or for exchanging information or making threats electronically. Examples are hacking into computer systems, introducing viruses to vulnerable networks, web site defacing, denial-of-service attacks, or terroristic threats made via electronic communication.
26
EFFECTS OF CYBER-TERRORISM
Cyberterrorism can have a serious large-scale influence on significant numbers of people. It can weaken countries' economy greatly, thereby stripping it of its resources and making it more vulnerable to military attack. Cyberterror can also affect internet-based businesses. Like brick and mortar retailers and service providers, most websites that produce income (whether by advertising, monetary exchange for goods or paid services) could stand to lose
27
Make sure your employees and family members know this info too!
28
THANK YOU
29