You are on page 1of 19

CYBER CRIME

The Invisible Criminal is dangerous than Visible one.

- AYYAPPAN.P
Cyber crime & computer crime have become a terms that we hear in the news with some frequency. To protect yourself from cyber crime, you must first understand what it is & how it can work against you. With the increasing popularity of shopping websites, online banking and other sites that require sensitive personal & financial data, cyber crime has become an ever-present threat.

What is meant by CYBE CRIME ?


Cyber crime
encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example: Releasing New films, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cyber crimes when the illegal activities are committed through the use of a computer and the Internet. also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet. the most prominent form of cybercrime is identity theft, in which criminals use the Internet to steal personal information from other users. Two of the most common ways this is done is through phishing and pharming . Both of these methods lure users to fake websites (that appear to be legitimate), where they are asked to enter personal information. This includes login information, such as usernames and passwords, phone numbers, addresses, credit card numbers, bank account numbers, and other information criminals can use to "STEAL" another person's identity. For this reason, it is smart to always check the URL or Web address of a site to make sure it is legitimate before entering your personal information.

Cybercrime Perhaps

Because

cybercrime covers such a broad scope of criminal activity, the examples above are only a few of the thousands of crimes that are considered cybercrimes. While computers and the Internet have made our lives easier in many ways, it is unfortunate that people also use these technologies to take advantage of others. Therefore, it is smart to protect yourself by using antivirus and spyware blocking software and being careful where you enter your personal information.

TYPES OF CYBER CRIME :

HACKING DENIAL OF SERVICE ATTACK VIRUS DISSEMINATION SOFTWARE PIRACY PORNOGRAPHY IRC CRIME CREDIT CARD FRAUD PHISHING SPOOFING CYBER STALKING CYBER DEFAMATION THREATENING SALAMI ATTACK NET EXTORTION

HACKING The act of gaining unauthorized access to a computer system or some cases making unauthorized use of this access. Hacking is which other forms of cyber-crime (e.g., fraud, terrorism, etc.) Hacking in simple terms means illegal intrusion into a computer the permission of the computer owner/user. network and in also the act by are committed. system without

DENIAL OF SERVICE ATTACK This is an act by the criminal, who floods the band width of the victims network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide. VIRUS DISSEMINATION Malicious software that attaches itself to other software. (virus , worms ,Trojan Horse , Time bomb , Logic Bomb , Rabbit and Bacterium are the malicious softwares) SOFTWARE PIRACY Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. Retail revenue losses world wide are ever increasing due to this crime Can be done in various ways such as end user copying, hard disk loading, Counterfeiting, Illegal downloads from the internet etc. PRONOGRAPHY Pornography is the first consistently successful ecommerce product. It was a deceptive marketing tactics and mouse trapping technologies. Pronography encourage customers to access their websites. Anybody including children can log on to the internet and access website with pronography contents with a click of a mouse. IRC CRIME Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere the world can come together and chat with each other Criminals use it for meeting coconspirators. Hackers use it for discussing their exploits / sharing the techniques CREDIT CARD FRAUD You simply have to type credit card number into www page off the vendor for online transaction If electronic transactions are not secured the credit card numbers can be stolen by the hackers who can misuse this card by impersonating the credit card owner.

PHISHING It is technique of pulling out confidential information from the bank/financial institutional account holders by deceptive means. SPOOFING Getting one computer on a network to pretend to have the identity of another computer, usually one with special access privileges , so as to obtain access to the other computers on the network. CYBER STALKING The Criminal follows the victim by sending emails, entering the chat rooms frequently. CYBER DEFAMATION The Criminal sends emails containing defamatory matters to all concerned of the victim or post the defamatory matters on a website. (disgruntled employee may do this against boss, ex-boys friend against girl, divorced husband against wife etc..) THREATENING The Criminal sends threatening email or comes in contact in chat rooms with victim. (Any one disgruntled may do this against boss, friend or official). SALAMI ATTACK In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed. Criminal makes such program that deducts small amount like 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount.

Cyber Laws in INDIA:


The IT Act 2000 attempts to change outdated laws and provides ways to deal with cyber crimes. We need such laws so that people can perform purchase transactions over the Net through credit cards without fear of misuse. The Act offers the much-needed legal framework so that information is not denied legal effect, validity or enforceability, solely on the ground that it is in the form of electronic records. In view of the growth in transactions and communications carried out through electronic records, the Act seeks to empower government departments to accept filing, creating and retention of official documents in the digital format. The Act has also proposed a legal framework for the authentication and origin of electronic records / communications through digital signature. * From the perspective of e-commerce in India, the IT Act 2000 and its provisions contain many positive aspects. Firstly, the implications of these provisions for the ebusinesses would be that email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law. * Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. * Digital signatures have been given legal validity and sanction in the Act. * The Act throws open the doors for the entry of corporate companies in the business of

being Certifying Authorities for issuing Digital Signatures Certificates. * The Act now allows Government to issue notification on the web thus heralding egovernance. * The Act enables the companies to file any form, application or any other document with any office, authority, body or agency owned or controlled by the appropriate Government in electronic form by means of such electronic form as may be prescribed by the appropriate Government. * The IT Act also addresses the important issues of security, which are so critical to the success of electronic transactions. The Act has given a legal definition to the concept of secure digital signatures that would be required to have been passed through a system of a security procedure, as stipulated by the Government at a later date. * Under the IT Act, 2000, it shall now be possible for corporates to have a statutory remedy in case if anyone breaks into their computer systems or network and cause losses damages or copies data. The remedy provided by the Act is in the form of monetary damages, not exceeding Rs. 1 crore.

/ : 1. , 2. , . 3. . 4. , Inbox . , , . , , , , / (report abuse) .. . .

! http://cybercrimeindia.org/

How to secure your system from Keyloggers :


Now a days keylogger is major problem for all. So we should learn to secure our computer from keylogger. This article will help for ethical hackers or who want to protect their pc.

What is Keylogger?
Keylogger is one of spyware which will what type you through the keyboard and send it to hacker who send the keylogger. Hackers mainly use keyloggers to steal your passwords, credit card numbers and other confidential data. So whenever you type the username and password in gmail,online banking sites, it will send the username and password to hacker.

How to Protect?
In order to provide security for your system,you must have

Good AntiVirus: This is basic and best step to protect your system from keylogger. So buy a licensed and best antivirus which is currently in market. My suggestion is Kaspersky, Norton or Mcafee. Don't forget to update regularly. Note: Don't use trial or cracked pack ,it is worthless to use. Good Spyware: Since keyloggers are basically spywares, if you are a frequent user of Internet then you could be exposed to thousands of keyloggers and spywares. So you should use a good antispyware such as NoAdware. Antilogger can be Handy Antiloggers are programs that detect the presence of keyloggers on a given computer. Zemana Antilogger is the best antilogger.

Online Scanning
When ever you receive a suspicious file, you scan it with online scanners such as Multi engine antivirus scanner which scans your file with 24 antivirus engines and reports it back to you if the file is recognized as a virus or spyware. This ensures that none of the malicious programs can escape from being detected as there are 24 different antivirus engines are involved in the scanning process.

Keyscrambler
Keyscrambler is one of the best protection against keyloggers that you can have, Keyscrambler is a small program which encrypts your typed keystrokes so even if the victim has installed a keylogger on your system, he or she will get encrypted keys. Keyscrambler currently supports Firefox, Internet explorer and other applications, however its premium version supports more than 160 applications.

Safety Tips for Cyber Cafe Visitors:


Locations that offer wireless Internet access like hotels and airports typically also provide the use of Internet kiosks or public computers for Web access and word processing. This is a great benefit for those without their own devices, but can also pose many risks: 1.Key loggers may be installed. Every keystroke you make may be recorded comprising any login information, even for VPN connections. Use onscreen keyboard to login. Windows default onscreen keyboard can be accessed from Start >> All Programs >> Accessories >> Accessibility >> on-Screen Keyboard 2.Your browsing history may be cached. People can see what Web sites you've visited, and they may be able to view these cached sites, which may invade your privacy. Newer browsers have facility for private browsing(Firefox 3.5, Chrome, Internet Explorer 8 etc.). So when you surf on public PC, use private browsing mode. 3.Saved login information. Any saved login information such as from clicking the well-known "Remember Me" option when logging into a site may allow others to access your account(s). 4.Network Monitoring Tools may be installed. Someone can view from LAN what are you doing. There are number of remote access software for business needs that are used for monitoring employees. These may be installed on LAN from where someone can get real time view from your PC while you are using it. 5.Change Your Password Frequently. One of the best practices for keeping our account safe is to keep changing password.

INSTRUCTIONS:
1 Learn about cyber crime and talk to your family about how to identify scams. Never give out your personal information to anyone you do not know on the Web. 2 Use a firewall to protect your computer from hackers. Most security software comes with a firewall. Turn on the firewall that comes with your router as well. 3 Purchase and install anti-virus software such as McAfee or Norton Anti-Virus. AVG offers free anti-virus protection if you do not wish to purchase software. 4 Shop only at secure websites. Look for a Truste or VeriSign seal when checking out. Never give your credit card information to a website that looks suspicious or to someone you don't know. 5 Use strong passwords on your accounts that are difficult to guess. Include both letters and numerals in your passwords. Never use a word that is easy to guess -- like your wife's name. 6 Keep watch over your children and how they use the Internet. Install parental control software to limit where they can surf.

SOLUTIONS :
When investigating computer crimes, investigators and forensic accountants often discover what could have been done to prevent the crimes. The following are some of the most frequently found items. The organizations failed to: Have written policies and security rules for the use of computers and systems. Have temporary employees and independent contractors follow the same security rules as regular employees. Adjust access as people changed responsibilities internally. Keep up with and close security holes in applications, firewalls, and operating systems. Maintain virus protection on a fully updated basis.

Some of the suggestions to improve computer security include implementing the following: More effective policies for security over proprietary information Better interaction between the human resources department, the systems department, and corporate security functions Better internal accounting controls Better supervision of those with sensitive access to systems Better employee instruction in security issues Better computer audit software Better software security Better physical security in the workplace

CONCLUSION:

Never give out your name, address, telephone number, password, school name, parent's name, pictures of yourself, credit cards, or any other personal information to others online. If you are the victim of a cyber crime, the first thing you will have to do is to file a complaint with details of the crime. The subsequent Q & As will familiarize you with the steps to handling a cyber crime. As a general rule, though, we suggest you first contact your local law enforcement authorities (police station) and let them know what happened, depending on the scope of the crime, it will be investigated by special cyber crime investigation cell. This Project is about the cyber crimes across the INDIA & world ,and how to prevent yourself from that.

You might also like