Paper Presentation on "Cyber Security - A Move Against Cyber Crime"
Prepared by : Hiral Bhatt and Madhav Dihora
* Just for Education Purposes all rights reserved by respected authors so do not copy.
The
terms computer crime and cybercrime are prohibited to describing criminal
activity, these terms are also include traditional crimes such as fraud, Server
Attack, Phishing, cyber terrorism, Spoofing and Sniffing, cyber bullying in
which computer devices and networks are used. However, the computers usage has increased.
Computer
crime can be defined as criminal activity with including illegal access (unauthorized access), illegal
interception (means of non-public
transmissions of computer data to, from or within a computer system), data
interference, systems interference, misuse of devices, Duplication (ID theft), and electronic fraud like
credit card scams and carding activities.
Computer
crime issues have become very crucial and sensitive, particularly those
surrounding hacking, copyright infringement, child pornography etc. Also some problems
are occurs in privacy when confidential information is lost.
INTRODUCTION OF CYBER SECURITY
The
internet in INDIA is growing rapidly in every field we can think it is may use
for entertainment, business, sports or education. Everyone is engaged with
internet, through WhatsApp, twitter, Facebook, net banking & lots of other
platforms and social media are there.
But
some criminal minded persons do crimes here, which is included under
cybercrime. So we should be aware about crimes happening around in the
cyber-space and Digital Area.
Cyber
Security is a technology and processes that are used for protect cyber world,
computer devices and confidential data from unauthorised access. In addition to
it is also helps to protect devices from malicious attacks and terrorism.
DEFINITION OF CYBER CRIME
Cybercrime
refers to all the activities done with criminal intent in cyberspace.
Crime
committed using a computer and the internet to steal data or information. Crimes
that involve computers and networks for get unauthorized access and steal the
confidential information. However, it is in two types of categories:
(1)
Crimes that target computer networks or devices directly;
(2)
Crimes facilitated by computer networks or devices, the primary target of which
is independent of the computer network or device.
Examples
of crimes that primarily target computer networks or devices would include,
§
Malware and malicious code
§
Denial-of-service
attacks
§
Computing
viruses
Examples
of crimes that merely use computer networks or devices would include,
§
Cyber
Sniffing and Spoofing
§
Fraud
and identity theft
§
Phishing
scams
§
Information
warfare
SOME COMPUTER CRIMES
Fraud
Computer
fraud means doing something which causes loss. After all, the fraud will result
in obtaining a benefit by:
Spying
on computer input in an unauthorized way. This Process is just requires some
technical experience and expertise for changing using unauthorized processes. Altering,
destroying, suppressing, or stealing output, usually to conceal unauthorized
transactions: this is difficult to detect.
Obscene or offensive content
Websites
and other electronic communications contents are may be unstructured, obscene
or offensive for a variety of reasons. In some ways these communications may be
illegal. Many laws place limits on certain speech and aggressive material that
tends to incite hate crimes.
Harassment
Harassment
Consist bad and offensive comments at specific individuals focusing for example
on gender, race, religion, nationality, sexual orientation. This often occurs
in chat rooms, through newsgroups, and by sending hate e-mail to interested
parties (see cyber bullying, cyber
stalking and harassment by computer). Any comment that may be found
offensive is considered harassment.
Drug trafficking
Drug
traffickers are increasingly taking advantage of the Internet to sell their
illegal things and components using encrypted e-mail and other Internet
Technology. In this both parties cannot know each other by face to face so it
can be easy to grow and expand this business. Furthermore, traditional drugs
are keeping as a secret. But now with this computer technology, this
information is available to anyone with computer access those who are
technically strong.
Cyber terrorism
Government
officials and Information Technology security specialists have registered a ratio
of Internet problems and server scans. A cyber terrorist is someone who bully a
government or organization to his or her objectives by computer-based attack
against computers, network, and on the servers.
There
are also hacking activities can be take placed for individuals, families,
organised by groups within networks, tending to cause fear among people,
demonstrate power, collecting information relevant for robberies, blackmailing
etc.
WHAT IS CYBER CRIME?
In
a simple term, When you purchase a home it comes with a door and a lock. You
always ensure that the door/lock exist and working properly. You may even
purchase security systems.
Well,
why would you not secure your investments?
Likewise,
Your System is your home and security tools are your door/lock and security
tools. So if someone entered into your home’s (System) and accesses all your
personal accounts and your data without permission or authority then it is
known as cybercrime.
HISTORY OF CYBER CRIME
1.
The first recorded cyber-crime took place in 1820.
2.
The first spam email took place in 1978 when it was sent out over the ARPANT.
3.
India is the third-most targeted country for Phishing attacks after the US and
the UK.
4.
India is the number 1 country in the world for generating spam.
5.
The First Virus was installed over the apple computer in 1982.
CYBER CRIME INCLUDES
1. Illegal access
2. Illegal Interrupt
3. System Interference
4. Data Interference
5. Misuse of devices
6. Fraud
TYPES
OF CYBER CRIME
1.
HACKING:
Hacking means an illegal activity into a
computer system or network. It is also known as CRACKING. Government websites are the majorly target of the hackers
due to the get news. Hackers enjoy the media coverage.
Motive behind the crime called hacking power,
publicity, revenge, adventure desire to access forbidden information
destructive mind-set wants to sell network security services.
2.
CHILD PORNOGRAPHY: The Internet is highly used by its abusers to abuse children sexually,
worldwide. As more homes have access to internet, more children would be using
the internet.
How Do They Operate:-
Pedophiles (A person who is
sexually attracted to children) connect children in various chat rooms
which are used by children to interact with other children.
3.
DENIAL OF SERVICE ATTACKS [DDOS Attack]:
This is an act by the criminals who passed the huge flow of the bandwidth into
the victim’s network or fills his E-mail box with spam mail using this service.
4. VIRUS DISSMINITION: Malicious software
that attaches itself to other software. VIRUS, WORMS, TROJAN HORSE, WEB
JACKING, E-MAIL BOMBING etc.
5.
DESTROY DEVICES: Damaging data
rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file
and then circulate.
6. CYBER TERRORISM: As we discussed above,
Terrorist attacks on the Internet is by distributed denial of service attacks
[DDOS], hate websites and hate E-mails, attacks on service network etc.
7.
SOFTWARE PIRACY: Theft of software
through the illegal copying of genuine programs or the counterfeiting and
distribution of products intended to pass for the original.
WHY
SHOUD WE NEED TO TAKE CARE?
It is a criminal activity that is
done on the internet. In cybercrime the main host or computer device it can be
a tool or target.
HOW
CAN WE PROTECT FROM IT?
Read the actual terms and condition
or privacy policy before submit or click on any data through the internet.
Also we need to verify the websites
which are using by us that is encrypted or not because nowadays most of all are
using SSL (secure socket layer) for provide encryption and securing the data.
Try to avoid remote connectivity.
v
India
is on the 10th Position in cybercrime.
Few of cyber-attacks are in measurement of percentage…
•
Financial fraud: 11%
• Disturbance
of data/networks: 17%
• Theft
of proprietary information: 20%
• System
penetration from the outside: 25% [Direct - access]
• Denial
of service [DDOS]: 27%
•
Unauthorized access by insiders: 71%
•
Employee abuse of internet privileges 79%
• Viruses:
85%
CYBER
LAW FOR INDIA
Cybercrime
can consist criminal activities, such as theft, fraud, deformation and
mischief, all of which are subjected to the India Penal code. In simple way we
can say that cybercrime is unlawful acts where in the computer is either a tool
or both. The abuse of computer has also given birth of new age crime that is
addressed by the Information Technology Act, 2000.
ADVANTAGES OF CYBER SECURITY
1. The cyber security will defend us from critical attacks.
2. It helps us to browse the site, website and online documents securely.
3. Internet Security process all the incoming and outgoing data on your
computer.
4. It will defend us from hacks, virus and malicious activity.
5. Application of cyber security used in our PC and it is update every
week.
SAFETY TIPS FOR STAY SAFE FROM THE
CYBER CRIME
• Use antivirus software’s.
• Insert firewalls for more security.
• Uninstall unnecessary software.
• Maintain backup.
• Check security settings.
• Stay anonymous - choose a genderless screen name.
·
Think twice before you click
and submit on any data which are available on the web.
·
Never give your full name or
address to unknown persons.
·
Learn more or in detailed
about internet terms and privacy.
·
Many websites are using SSL
(secure socket layer) for encryption and data security.
CYBERCRIMES BULLYS NATIONAL SECURITY
IN INDIA our former Union home minister Shivraj Patil said that the
rising level of cybercrime is an indication of enormous threat to national
security. On Google’s social networking site Orkut, Facebook, have been puzzling
authorities.
Fan clubs of Underworld Dons and
other are also doing the rounds on orkut. There is huge potential for damage to
national security through cyber-attacks. The internet is a means for money
bounding and funding terrorist attacks in an organized manner.
CONCLUSION
After
all, a system which is totally secure when it is unplugged and switched off. So
there is an only one way to stay secure is pay attention towards the each and
every small instruction and do smart work. We need to think before we click on
each and every component which is available on cyber world.
REFERENCES
I wanted to thank you for this great read!! I definitely enjoying every little bit of it I have you bookmarked to check out new stuff you post. Phishing Testing
ReplyDeleteNice content, Thanks for shear the beautiful content. If anyone want to know What is Network Security you can visit my blog.
ReplyDelete