You are on page 1of 30

Computer Project

Laurels School International


2014-2015
Submitted By:
Mustafa Adil
Maam
Class:9th C
Roll Number:9317

Submitted To:
Sonam

CYBER CRIME
AND
SECURITY

CONTENTS

Introduction
History of Cyber threat evolution
Categories of Cyber Crime
Types of Cyber Crime
Reasons of Cyber Crime and people who become victims.
People who are Cyber criminals
Cyber Security
Advantages of Cyber security
Ways of maintaining Cyber security
Cyber law of India
Recent Cyber crimes and discovered threats
Conclusion

Introduction
A generalized definition of cyber crime may
be unlawful acts wherein the computer is
either a tool or target or both .
Any criminal activity that uses a computer
either as an instrumentality, target or a
means for perpetuating further crimes
comes within the ambit of cyber crime
Cyber crime is known by lots of different
names, including computer crime, e-crime,
or electronic crime.

History of Cyber Threat


Evolution
The first recorded cyber crime took place in 1820.
That is not surprising considering the fact that the
abacus, which is thought to be the earliest from of
a computer, has been around since 3500 B.C.
In India, Japan and China, the era of modern
computer, however, began with the analytical
engine of Charles Babbage.
The first spam email took place in 1976 when it
was sent out over the ARPANT.
The first virus was installed on an Apple computer
in 1982 when a high school student, Rich skrenta,
developed the EIK Cloner.

History of Cyber Threat


Evolution
Malicious
Code
(Melissa)

Virus

Advanced Worm /
Trojan (I LOVE
YOU)

Breaking
Web Sites

1977

1995

Identity Theft
(Phishing)

2000

2003-04

Organized Crime
Data Theft, DoS /
DDoS

2005-06

2007-08

Categories of cyber crime


We can categorize cyber crime in two
ways:
The computer as a target :- using a
computer to attacks other computer,
e.g. Hacking, virus/worms attacks, Dos
attack etc.
The computer as a weapon :- using a
computer to commit real world crime
e.g. cyber terrorism, credit card fraud
and pornography etc.

TYPES
OF
CYBER CRIME

Email
Bombing

Data
Diddling

Bots attack

Salami
Attacks

Carding

Denial of
service

Phishing

Types
of
Cyber
Crime

Cyber
Defamation

Hacking

Virus
Disseminati
on

Cyber
Stalking

Cyber
Pornograph
y

Email
Spoofing
Software
Piracy

Intellectual
property
crimes

Types of Cyber Crimes


E-Mail Bombing: Email bombing refers to sending
a large amount of e-mails to the victim resulting in
interruption in the victims e-mail account or mail
servers.

Data Diddling: This kind of an attack involves


altering the raw data just before it is processed by
a computer and then changing it back after the
processing is completed.

Salami Attacks: These attacks are used for the


commission of financial crimes. A bank employee
inserts a program into banks servers, that
deducts a small amount from the account of every

HACKING :Hacking in simple terms means an illegal


intrusion info a computer system and/or network . It is
also known as CRACKING. Government websites are the
hot target of the hackers due to the press coverage, it
receives. Hackers enjoy the media coverage.

Motive behind the crime called HACKERS


Motive behind the crime called hacking greed
power, publicity, revenge, adventure desire to
access forbidden information destructive mindset
wants to sell n/w security services.

software. (virus, worms, Trojan Horse,


Time bomb, Logic Bomb, Rabbit and
Bacterium are the malicious.
Cyber Pornography :This would
include
pornographic
websites;
pornographic magazines produced
using computers. The Internet is
being highly used by its abusers to
reach and abuse children sexually,
worldwide.

Intellectual
Property
Crimes
:Intellectual property (IP) crime is a
generic term used to describe a wide
range of counterfeiting and piracy
offences. These include software

Software

Piracy

:Theft

of
software
through
the
illegal
copying of genuine programs or the
counterfeiting and distribution of
products intended to pass for the
original. The unauthorizedcopying
ofsoftware.

A spoofed email is one that


appears to originate from one
source but actually has been sent
from another source.
Cyber Stalking :The Oxford dictionary defines
stalking as "pursuing stealthily".
Cyber Stalking can be defined as
the repeated acts harassment or
threatening behavior of the cyber
criminal towards the victim by
using internet services.
Email

spoofing

This occurs when defamation takes


place with the help of computers and / or
the Internet. Cyber Defamationis a crime
conducted in cyberspace, usually through
theInternet,
with
the
intention
of
defaming others.
Phishing :The
e-mail directs the user to visit a
Web site where they are asked to update
personal information, such as passwords
and credit card, social security, and bank
account numbers, that the legitimate
organization already has .
Cyber Defamation :

CARDING:Carding is a serious
threat to India, as it does
not require a high degree
of sophistication and is
considered particularly
pernicious by international
financial institutions and ecommerce providers.

BOTS attack:Bots, compromised servers


that may be launching
cyber attacks or sending
Spam.

Reasons for cyber


crimes and their victims
Reasons:-

Capacity to store data in comparatively


small space
Easy access
Complex
Negligence
Victims: Inexperienced
Unlucky people
Desperados
Naive/gullible

People who are Cyber


Criminals
Children and adolescents between
the age group of 6 18 years
Organised hackers
Professional hackers / crackers
Discontented employees

Cyber Security
Cyber Security : Cyber Security involves
protection of sensitive personal and business
information through prevention, detection and
response to different online attacks. Cyber
security actually preventing the attacks, cyber
security.

Keep Software Up to Date: If the seller


reduces patches for the software operating
system your device ,install them as soon as

Privacy Policy : Before submitting


your name , e-mail , address, on a
website look for the sites privacy
policy.

Disable Remote Connectivity : Some


PDAs and phones are equipped with
wireless technologies, such as
Bluetooth, that can be used to
connect to other devices or
computers. You should disable these

Advantages of Cyber
Security
The cyber security will defend us from critical attacks.
It helps us to browse the site, website.
Internet Security process all the incoming and
outgoing data on your computer.
It will defend us from hacks and virus.
Application of cyber security used in our PC needs
update every week

Ways of maintaining
cyber security
Install powerful Anti-virus softwares .
Change your passwords frequently and
use a combination of letters and digits
to make you password strong.
Have Firewall of pc enabled with proper
settings.
Always surf safe sites, install ratings
measurer such as avast site rating
plugin to see ratings of a site.

Configure your antivirus to prevent


opening of malicious sites.
Schedule antivirus scans to check
frequently for viruses.
Turn on Email filters.
Always keep a watch on the sites that
your
children
are
accessing
to
prevent any kind of harassment or
depravation in children

Cyber Law of India


Cyber crime can involve criminal
activities that are traditional in nature,
such as theft, fraud, deformation and
mischief, all of which are subjected to the
India Penal code. In simple way we can
say that cyber crime is unlawful acts
where in the computer is either a tool or
both.
The abuse of computer has also given
birth of new age crime that are addressed
by the Information Technology Act, 2000.

Recent Cyber crimes and


discovered threats

Hacking Gmail App with 92 Percent


Success Rate

A group of security researchers has successfully


discovered a method to hack into six out of
seven popular Smartphone apps,
includingGmailacross all the three platforms
-Android, Windows, and iOS operating systems
- with shockingly high success rate of up to 92
percent.

Facebook Awards $50,000 Under Its


New 'Internet Defense Prize' Program

Facebook and Usenix have together


implemented theInternet Defense Prize an
award recognizing superior quality research
that combines a working prototype with great
contributions to securing the Internet, Facebook
announced Thursday at the annual USENIX
Security Symposium in San Diego.

Samsung To Pay $2.3 Million Fine for


Deceiving the U.S. Government
The United States division of Samsung has been
charged with deceiving the US government into
believing that several of its products met the
necessary US government policies, resulting in
the US government buying
unauthorizedChinese-made electronics.
The South Korean electronics giant has agreed to
pay the Government $2.3 million in fines to settle
the charges of violating trade agreements, the
Justice DepartmentannouncedTuesday.

'AdThief' Chinese Malware Infects Over


75,000 Jailbroken iOS devices
If you have jailbroken your iPhone, iPad, or iPod
touch and have downloaded pirated tweaks from
pirated repositories, then you may be infected
byAdThief malware, a Chinese malwarethat is
now installed on more than
75,000iPhonedevices. According to a recent
researchpaperpublished on Virus Bulletin by the
Security ResearcherAxelle Apvrille, the malware,
also known as "spad," was first discovered by
security researcherClaud Xiaoin March this year.
Till now, AdThief aka Spad malware has hijacked
an estimated 22 million advertisements and
stealing revenue from developers on the iOS
jailbreak community, Axelle Apvrille says.

Google Map Tracks Your Every Move.


Check Your 'Location History' to Verify
It
Google has been involved in several controversies
including among the companies that was claimed
to cooperate with US surveillance agencies on
their global data-mining programs, and just
yesterday the popular Media tycoon Rupert
Murdoch labeledGoogle worse than the NSA,
saying NSA privacy invasion bad, but nothing
compared to Google.
Now another, but already known controversy over
the Internet giant has raised many concerns over
privacy of users who carry their smartphones with
them. We all have sensors in our pockets that
track us everywhere we go i.e. Smartphones.

Grocery Stores 'Supervalu' and


'Albertsons' Hacked for Credit Card
Data
AlbertsonsandSupervalu- Two nations
most popular supermarket store chains
announced last weekend that a data breach
may have revealed thecredit and debit card
informationof their customers at a number
of grocery store locations in more than 18
states. Minnesota-based Supervalu
announced that an unknown number of its
customers who used their payment cards in
around 180 stores between June 22 and July
17 may have had payment card data
compromised by attackers who gained

CONCLUSION
Cyber crime is a multi-billion dollar problem. It is
criminals
activity committed on internet. This is a broad term that
describes everything from electronic cracking to denial
of
service attacks that cause electronic commerce sites to
loss
money.
Cybercrime is indeed getting the recognition it deserves.
However, it is not going to restricted that easily . In fact ,
it is highly likely that cyber crime and its hackers will
continue developing and upgrading to stay ahead of the
law.
So, to make us a safer we must need cyber security.

You might also like