Professional Documents
Culture Documents
- AYYAPPAN.P
Cyber crime & computer crime have become a terms that we hear in the news with some frequency. To protect yourself from cyber crime, you must first understand what it is & how it can work against you. With the increasing popularity of shopping websites, online banking and other sites that require sensitive personal & financial data, cyber crime has become an ever-present threat.
Cybercrime Perhaps
Because
cybercrime covers such a broad scope of criminal activity, the examples above are only a few of the thousands of crimes that are considered cybercrimes. While computers and the Internet have made our lives easier in many ways, it is unfortunate that people also use these technologies to take advantage of others. Therefore, it is smart to protect yourself by using antivirus and spyware blocking software and being careful where you enter your personal information.
HACKING DENIAL OF SERVICE ATTACK VIRUS DISSEMINATION SOFTWARE PIRACY PORNOGRAPHY IRC CRIME CREDIT CARD FRAUD PHISHING SPOOFING CYBER STALKING CYBER DEFAMATION THREATENING SALAMI ATTACK NET EXTORTION
HACKING The act of gaining unauthorized access to a computer system or some cases making unauthorized use of this access. Hacking is which other forms of cyber-crime (e.g., fraud, terrorism, etc.) Hacking in simple terms means illegal intrusion into a computer the permission of the computer owner/user. network and in also the act by are committed. system without
DENIAL OF SERVICE ATTACK This is an act by the criminal, who floods the band width of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide. VIRUS DISSEMINATION Malicious software that attaches itself to other software. (virus , worms ,Trojan Horse , Time bomb , Logic Bomb , Rabbit and Bacterium are the malicious softwares) SOFTWARE PIRACY Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. Retail revenue losses world wide are ever increasing due to this crime Can be done in various ways such as end user copying, hard disk loading, Counterfeiting, Illegal downloads from the internet etc. PRONOGRAPHY Pornography is the first consistently successful ecommerce product. It was a deceptive marketing tactics and mouse trapping technologies. Pronography encourage customers to access their websites. Anybody including children can log on to the internet and access website with pronography contents with a click of a mouse. IRC CRIME Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other Criminals use it for meeting coconspirators. Hackers use it for discussing their exploits / sharing the techniques CREDIT CARD FRAUD You simply have to type credit card number into www page off the vendor for online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.
PHISHING It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means. SPOOFING Getting one computer on a network to pretend to have the identity of another computer, usually one with special access privileges , so as to obtain access to the other computers on the network. CYBER STALKING The Criminal follows the victim by sending emails, entering the chat rooms frequently. CYBER DEFAMATION The Criminal sends emails containing defamatory matters to all concerned of the victim or post the defamatory matters on a website. (disgruntled employee may do this against boss, ex-boys friend against girl, divorced husband against wife etc..) THREATENING The Criminal sends threatening email or comes in contact in chat rooms with victim. (Any one disgruntled may do this against boss, friend or official). SALAMI ATTACK In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed. Criminal makes such program that deducts small amount like 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.
being Certifying Authorities for issuing Digital Signatures Certificates. * The Act now allows Government to issue notification on the web thus heralding egovernance. * The Act enables the companies to file any form, application or any other document with any office, authority, body or agency owned or controlled by the appropriate Government in electronic form by means of such electronic form as may be prescribed by the appropriate Government. * The IT Act also addresses the important issues of security, which are so critical to the success of electronic transactions. The Act has given a legal definition to the concept of secure digital signatures that would be required to have been passed through a system of a security procedure, as stipulated by the Government at a later date. * Under the IT Act, 2000, it shall now be possible for corporates to have a statutory remedy in case if anyone breaks into their computer systems or network and cause losses damages or copies data. The remedy provided by the Act is in the form of monetary damages, not exceeding Rs. 1 crore.
! http://cybercrimeindia.org/
What is Keylogger?
Keylogger is one of spyware which will what type you through the keyboard and send it to hacker who send the keylogger. Hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential data. So whenever you type the username and password in gmail,online banking sites, it will send the username and password to hacker.
How to Protect?
In order to provide security for your system,you must have
Good AntiVirus: This is basic and best step to protect your system from keylogger. So buy a licensed and best antivirus which is currently in market. My suggestion is Kaspersky, Norton or Mcafee. Don't forget to update regularly. Note: Don't use trial or cracked pack ,it is worthless to use. Good Spyware: Since keyloggers are basically spywares, if you are a frequent user of Internet then you could be exposed to thousands of keyloggers and spywares. So you should use a good antispyware such as NoAdware. Antilogger can be Handy Antiloggers are programs that detect the presence of keyloggers on a given computer. Zemana Antilogger is the best antilogger.
Online Scanning
When ever you receive a suspicious file, you scan it with online scanners such as Multi engine antivirus scanner which scans your file with 24 antivirus engines and reports it back to you if the file is recognized as a virus or spyware. This ensures that none of the malicious programs can escape from being detected as there are 24 different antivirus engines are involved in the scanning process.
Keyscrambler
Keyscrambler is one of the best protection against keyloggers that you can have, Keyscrambler is a small program which encrypts your typed keystrokes so even if the victim has installed a keylogger on your system, he or she will get encrypted keys. Keyscrambler currently supports Firefox, Internet explorer and other applications, however its premium version supports more than 160 applications.
INSTRUCTIONS:
1 Learn about cyber crime and talk to your family about how to identify scams. Never give out your personal information to anyone you do not know on the Web. 2 Use a firewall to protect your computer from hackers. Most security software comes with a firewall. Turn on the firewall that comes with your router as well. 3 Purchase and install anti-virus software such as McAfee or Norton Anti-Virus. AVG offers free anti-virus protection if you do not wish to purchase software. 4 Shop only at secure websites. Look for a Truste or VeriSign seal when checking out. Never give your credit card information to a website that looks suspicious or to someone you don't know. 5 Use strong passwords on your accounts that are difficult to guess. Include both letters and numerals in your passwords. Never use a word that is easy to guess -- like your wife's name. 6 Keep watch over your children and how they use the Internet. Install parental control software to limit where they can surf.
SOLUTIONS :
When investigating computer crimes, investigators and forensic accountants often discover what could have been done to prevent the crimes. The following are some of the most frequently found items. The organizations failed to: Have written policies and security rules for the use of computers and systems. Have temporary employees and independent contractors follow the same security rules as regular employees. Adjust access as people changed responsibilities internally. Keep up with and close security holes in applications, firewalls, and operating systems. Maintain virus protection on a fully updated basis.
Some of the suggestions to improve computer security include implementing the following: More effective policies for security over proprietary information Better interaction between the human resources department, the systems department, and corporate security functions Better internal accounting controls Better supervision of those with sensitive access to systems Better employee instruction in security issues Better computer audit software Better software security Better physical security in the workplace
CONCLUSION:
Never give out your name, address, telephone number, password, school name, parent's name, pictures of yourself, credit cards, or any other personal information to others online. If you are the victim of a cyber crime, the first thing you will have to do is to file a complaint with details of the crime. The subsequent Q & As will familiarize you with the steps to handling a cyber crime. As a general rule, though, we suggest you first contact your local law enforcement authorities (police station) and let them know what happened, depending on the scope of the crime, it will be investigated by special cyber crime investigation cell. This Project is about the cyber crimes across the INDIA & world ,and how to prevent yourself from that.