You are on page 1of 36

Cyber Crime

( Unethical Practices )
Cyberspace
Cyberspace is like a big city. There are libraries,
universities, museums, places to have fun, and
plenty of opportunities to meet wonderful people.
But, like any community, there are also some people
and areas that you need to avoid and others that
you should approach with caution.
Characteristics of Cyber Crime:

Silent in Nature

Global in character

Non existence of Physical Evidence

Creates high Impact

High Potential and Easy to Perpetrate


Three Generic categories
of computer crime

Computer Assisted Crime

Computer specific or
Targeted crime

Incidental Crime
Tools of Cybercrime
Software piracy
Cyber terrorism
Hacking Credit Card Fraud
Child Pornography Unauthorized Access
Cyber Stalking/Harassment
Attacks Using Virus, Worms & Spam
Phishing
Hacking Or
Cracking
A hacker as an "expert or enthusiast of any kind."
Note that a hacker need not be a computer
enthusiast.
e.g., someone can be an astronomy hacker
Cracking in simple terms means an illegal intrusion into a computer

system and/or network. Every act committed towards breaking into a

computer and/or network is Cracking.

“White hat hackers" refers to "innocent" or non-


malicious forms of hacking,
while "black hat hackers" refers roughly to what we
KEVIN MITNICK
Kevin David Mitnick is a controversial computer cracker and
convicted criminal in the United States.

Mitnick broke into his first computer network in 1979 at age 16.

Mitnick was convicted in the late 1990s of illegally gaining access


to computer networks and stealing intellectual property.

Mitnick served five years in prison

Mitnick now runs Mitnick Security Consulting,

a computer security consultancy


Child Pornography
The Internet is being highly used by its abusers
to reach and abuse children sexually,
worldwide crackdowns may catch some
offenders ,but there are still ways to acquire
images of children in varying stages off dress
and performing a variety of sexual acts.
Cyber
Stalking/Harassment
Cyber stalking, the term is used to refer to the use of the
Internet, e-mail, or other electronic communications devices to
stalk another person. Stalking generally involves harassing or
threatening behavior that an individual engages in repeatedly,
such as following a person, appearing at a person’s home or
place of business, making harassing phone calls, leaving
written messages or objects, or vandalizing a person’s property
Contd..
Ritu Kohli (first lady to register the cyber stalking case) is a

victim of cyber-stalking. A friend of her husband gave her phone

number and name on a chat site for immoral purposes. A

computer expert, Kohli was able to trace the culprit. Now, the

latter is being tried for "outraging the modesty of a woman",

under Section 509 of IPC


Attacks Using Virus,
Worms & Spam
Virus is a program that attach it selves to a computer or a file
and then circulate it selves to other files and to other
computers on a network. They usually affect the data on a
computer, either by altering or deleting it. Worms, unlike
viruses do not need the host to attach themselves to. They
merely make functional copies of themselves and do this
repeatedly till they eat up all the available

space on a computer's memory.


Phishing
The act of sending an e-mail to a user falsely claiming to be an
established legitimate enterprise in an attempt to scam the user
into surrendering private information that will be used for identity
theft. The e-mail directs the user to visit a Web site where they
are asked to update personal information, such as passwords and
credit card, social security, and bank account numbers,

that the legitimate organization already has


Software Piracy
Theft of software through the illegal
copying of genuine programs and
distribution of products intended to
pass for the original. These copies
works as a well as the originals, and
sell for significantly less money.
Cyber terrorism
Government officials and IT security
specialists have documented a significant
increase in Internet probes and server
scans since early 2001. A cyber terrorist is
someone who intimidates or coerces a
government or organization to advance his
or her political or social objectives
"The modern thief can steal
more with a computer than
with a gun. Tomorrow's
terrorist may be able to do
more damage with a keyboard
than with a bomb".

– National Research Council


Credit Card Fraud
The unauthorized and illegal use of a credit
card to purchase property. Unauthorized use of
a credit/debit card, or card number, to
fraudulently obtain money or property is
considered credit card fraud. Credit/debit card
numbers can be stolen from unsecured
websites, or can be obtained in an identity theft
scheme.
Credit Card Skimmer
& Writer
ATM machine as usual
Facts and Figures
 Estimated 20 million computers are in control of

hackers
 16% of people who receive fraudulent lottery

emails open them, 10% reply, and 3% lose money


 50% of drugs sold online are counterfeit

 Total amount of money lost due to cybercrime…?


Guidelines..
1. Do not give out personal information.
Address

Phone number

School name or location

Credit card number

Pictures
Guidelines..
2 .Do not agree to get together with someone
you

meet online.
 Chat rooms are the most dangerous area on the
Internet.
 You never know for certain if they are who they
say they are.
 Discuss it with your parents and meet in a public
place with your parents
Guidelines..
3. Do not download or install from Internet
or open e-mail attachments.
 Don’t open e-mail if you don’t know who sent it to
you, you could spread a virus. It would be best to
delete the message.
 It is possible to get a virus from someone you
know. It is best to purchase a virus scanning
software program.
Guidelines..
4. Do not send or display offensive
or

inappropriate messages or pictures.


 Harassment is illegal.
 Respect others.
Computer Related Crimes under IPC
and Special Laws
Sending threatening messages by Sec 503 IPC
email

Sending defamatory messages by Sec 499, 500 IPC


email

Forgery of electronic records Sec 463, 470, 471 IPC

Bogus websites, cyber frauds Sec 420 IPC

Email spoofing Sec 416, 417, 463 IPC


Online sale of Drugs NDPS Act

Web - Jacking Sec. 383 IPC

Online sale of Arms Arms Act


Reporting
Internet Crime
Call your Internet provider.

Call local law enforcement.

Go to www.cybertipline.com

Call 1-800-843-5678
References :-
http://en.wikipedia.org
www.crime-research.org
www.uspto.gov
http://cybercrime.planetindia.net/intro.h
http://www.cyberkeralam.in:8888/berke
Thank You

Dasvidanya

You might also like