CYBER-SECURITY : CYBER-SECURITY Slide 2: WHAT DOES CYBER MEANS?
WHA T DOES SECURITY MEANS? Slide 3: WHAT IS INTERNET????????????? Cyber Crimes : Cyber Crimes HISTORY OF CYBER CRIME : HISTORY OF CYBER CRIME The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage We can categorize Cyber crimes in two ways : We can categorize Cyber crimes in two ways The Computer as a Target :-using a computer to attack other computers.
e.g. Hacking, Virus/Worm attacks, DOS attack etc
The computer as a weapon :-using a computer to commit real world crimes.
e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography etc.Cyber Crime regulated by Cyber Laws or Internet Laws. 1.HACKING : 1.HACKING Hacking in simple terms means an illegal intrusion into a computer system and/or network.
It is also known as CRACKING.
Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage Motive Behind The Crimecalled HACKING : Motive Behind The Crimecalled HACKING Greed
Desire to access forbidden information
Wants to sell n/w security services 2.CHILD PORNOGRAPHY : 2.CHILD PORNOGRAPHY The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide.
. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles How do they Operate : How do they Operate Pedophiles use false identity to trap the children/teenagers
Pedophiles contact children/teens in various chat rooms which are used by children/teen to interact with other children/teen
Befriend the child/teen.
Extract personal information from the child/teen by winning his confidence.
Gets the e-mail address of the child/teen and starts making contacts on the victimâ€™s e-mail address as well.
Starts sending pornographic images/text to the victim including child pornographic images in order to help child/teen shed his inhibitions so that a feeling is created in the mind of the victim that what is being fed to him is normal and that everybody does it.
Extract personal information from child/teen
At the end of it, the pedophile set up a meeting with the child/teen out of the house and then drag him into the net to further sexually assault him or to use him as a sex object 3.DENIAL OF SERVICE ATTACK : 3.DENIAL OF SERVICE ATTACK This is an act by the criminal, who floods the bandwidth of the victimâ€™s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide
. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCp/IP protocols. 4.VIRUS DISSEMINITION : 4.VIRUS DISSEMINITION Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, Time bomb, Logic Bomb, Rabbit and Bacterium are the malicious 5.SOFTWARE PIRACY : 5.SOFTWARE PIRACY Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. CYBERCRIMES THREATENS NATIONAL SECURITY IN “INDIA” : CYBERCRIMES THREATENS NATIONAL SECURITY IN “INDIA” Slide 16: Ex.Union Home Minister Shivraj Patil
said that the rising level of cyber crime is an indication of an enormous threat to national security.
In today’s age when everything from, small gadgets to nuclear plants is being operated through computers, cyber crime has assumed threatening ramifications.
are capable of breaching the security in the information systems of vital installations.
on Google’s social networking site, Orkut, have been perplexing authorities. Fan clubs of underworld dons like Dawood Ibrahim and Chota Shakeel and other wanted underworld dons are also doing the rounds on Orkut.
There is huge potential for damage to national security through cyber attacks. The internet is a means for money laundering and funding terrorist attacks in an organized manner. F.A.q.s releted to cyber crime : F.A.q.s releted to cyber crime What are e-mail headers? How to extract e-mail headers?
What is an I.P. Address?
What information is required to lodge a complaint?
What are the basic precautions I should take while accessing the Internet?
As a parent, what should I do to ensure that my child does not access objectionable websites?
What are the different kinds of online scams, and what should the public do to avoid falling prey to them?
Cyber crime has become a big menace. What is the most common one among these, and how can I keep myself from becoming a victim?
Are people actually coming forward to lodge complaints? CYBER-SECURITY : CYBER-SECURITY Slide 20: 1.What is cyber security?
A method to avoid any sort of descripencies in the proper functioning of any task in the desired direction developed through internet and cyber world Slide 21: 2.What are the risks?
Terroristic activities(26/11 in india,and 9/11 in USA) Slide 22: 3.What can we do?
Cordeal relation and awarnes
Proper implimentation of IT act 2000
Media should come up
All the govt. and private firms shold take initiatives
More laws should be discussed and passed in parliament Slide 24: Cybersecurity in India: An Ignored World Slide 26: India is on the verge of a technology revolution and the driving force behind the same is the acceptance and adoption of Information and Communication Technology (ICT) and its benefits. This technology revolution may, however, fail to bring the desired and much needed result if we do not adopt a sound and country oriented e-governance policy I. Introduction1.it is a double edge sword2.benign or vice intentionII. Cyber Forensics1.it finds out the loopholes in the adopted method2.has given new dimension to criminals laws specially the evidence lawIII. The need of Cyber Forensics1.traditional methods are inadequate(india is 12th country to have its own cyber laws)2.changing face of crime and criminals(use of internet as the platform for illegal activities)IV. Conclusion1.use of ICT can’t be ignored in todays progressive world hence cyber forensic not only help in preventive but also curative : I. Introduction1.it is a double edge sword2.benign or vice intentionII. Cyber Forensics1.it finds out the loopholes in the adopted method2.has given new dimension to criminals laws specially the evidence lawIII. The need of Cyber Forensics1.traditional methods are inadequate(india is 12th country to have its own cyber laws)2.changing face of crime and criminals(use of internet as the platform for illegal activities)IV. Conclusion1.use of ICT can’t be ignored in todays progressive world hence cyber forensic not only help in preventive but also curative CYBER LAW OF INDIA : CYBER LAW OF INDIA Slide 29: In Simple way we can say that cyber crime is unlawful acts wherein the computer is either a tool or a target or both
. The abuse of computers has also given birth to a gamut of new age crimes that are addressed by the Information Technology Act, 2000. THANK-YOU : THANK-YOU Presented by:
AMRIT RAJ RANJAN
RAJEEV RANJAN KUMAR
Ruchi Rani &