Paper Presentation on "Cyber Security - A Move Against Cyber Crime"


Prepared by : Hiral Bhatt and Madhav Dihora

* Just for Education Purposes all rights reserved by respected authors so do not copy.

ABSTRACT:

The terms computer crime and cybercrime are prohibited to describing criminal activity, these terms are also include traditional crimes such as fraud, Server Attack, Phishing, cyber terrorism, Spoofing and Sniffing, cyber bullying in which computer devices and networks are used. However, the computers usage has increased.

Computer crime can be defined as criminal activity with including illegal access (unauthorized access), illegal interception (means of non-public transmissions of computer data to, from or within a computer system), data interference, systems interference, misuse of devices, Duplication (ID theft), and electronic fraud like credit card scams and carding activities.

Computer crime issues have become very crucial and sensitive, particularly those surrounding hacking, copyright infringement, child pornography etc. Also some problems are occurs in privacy when confidential information is lost.



INTRODUCTION OF CYBER SECURITY

The internet in INDIA is growing rapidly in every field we can think it is may use for entertainment, business, sports or education. Everyone is engaged with internet, through WhatsApp, twitter, Facebook, net banking & lots of other platforms and social media are there.

But some criminal minded persons do crimes here, which is included under cybercrime. So we should be aware about crimes happening around in the cyber-space and Digital Area.

Cyber Security is a technology and processes that are used for protect cyber world, computer devices and confidential data from unauthorised access. In addition to it is also helps to protect devices from malicious attacks and terrorism.





DEFINITION OF CYBER CRIME

Cybercrime refers to all the activities done with criminal intent in cyberspace.

Crime committed using a computer and the internet to steal data or information. Crimes that involve computers and networks for get unauthorized access and steal the confidential information. However, it is in two types of categories:

(1) Crimes that target computer networks or devices directly;

(2) Crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.

Examples of crimes that primarily target computer networks or devices would include,

§  Malware and malicious code
§  Denial-of-service attacks
§  Computing viruses

Examples of crimes that merely use computer networks or devices would include,

§  Cyber Sniffing and Spoofing
§  Fraud and identity theft
§  Phishing scams
§  Information warfare

SOME COMPUTER CRIMES
            Fraud
Computer fraud means doing something which causes loss. After all, the fraud will result in obtaining a benefit by:
Spying on computer input in an unauthorized way. This Process is just requires some technical experience and expertise for changing using unauthorized processes. Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions: this is difficult to detect.

Obscene or offensive content
Websites and other electronic communications contents are may be unstructured, obscene or offensive for a variety of reasons. In some ways these communications may be illegal. Many laws place limits on certain speech and aggressive material that tends to incite hate crimes.

Harassment
Harassment Consist bad and offensive comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation. This often occurs in chat rooms, through newsgroups, and by sending hate e-mail to interested parties (see cyber bullying, cyber stalking and harassment by computer). Any comment that may be found offensive is considered harassment.

Drug trafficking
Drug traffickers are increasingly taking advantage of the Internet to sell their illegal things and components using encrypted e-mail and other Internet Technology. In this both parties cannot know each other by face to face so it can be easy to grow and expand this business. Furthermore, traditional drugs are keeping as a secret. But now with this computer technology, this information is available to anyone with computer access those who are technically strong.

Cyber terrorism
Government officials and Information Technology security specialists have registered a ratio of Internet problems and server scans. A cyber terrorist is someone who bully a government or organization to his or her objectives by computer-based attack against computers, network, and on the servers.
There are also hacking activities can be take placed for individuals, families, organised by groups within networks, tending to cause fear among people, demonstrate power, collecting information relevant for robberies, blackmailing etc.

WHAT IS CYBER CRIME?
In a simple term, When you purchase a home it comes with a door and a lock. You always ensure that the door/lock exist and working properly. You may even purchase security systems.
Well, why would you not secure your investments?
Likewise, Your System is your home and security tools are your door/lock and security tools. So if someone entered into your home’s (System) and accesses all your personal accounts and your data without permission or authority then it is known as cybercrime.

HISTORY OF CYBER CRIME
1. The first recorded cyber-crime took place in 1820.
2. The first spam email took place in 1978 when it was sent out over the ARPANT.
3. India is the third-most targeted country for Phishing attacks after the US and the UK.
4. India is the number 1 country in the world for generating spam.
5. The First Virus was installed over the apple computer in 1982.

CYBER CRIME INCLUDES
1.    Illegal access
2.    Illegal Interrupt
3.   System Interference
4.   Data Interference
5.   Misuse of devices
6.   Fraud
           
TYPES OF CYBER CRIME
1.     HACKING:  Hacking means an illegal activity into a computer system or network. It is also known as CRACKING. Government websites are the majorly target of the hackers due to the get news. Hackers enjoy the media coverage.

Motive behind the crime called hacking power, publicity, revenge, adventure desire to access forbidden information destructive mind-set wants to sell network security services.

2.     CHILD PORNOGRAPHY: The Internet is highly used by its abusers to abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet.
       How Do They Operate:-
Pedophiles (A person who is sexually attracted to children) connect children in various chat rooms which are used by children to interact with other children.

3. DENIAL OF SERVICE ATTACKS [DDOS Attack]: This is an act by the criminals who passed the huge flow of the bandwidth into the victim’s network or fills his E-mail box with spam mail using this service.

4. VIRUS DISSMINITION: Malicious software that attaches itself to other software. VIRUS, WORMS, TROJAN HORSE, WEB JACKING, E-MAIL BOMBING etc.

5. DESTROY DEVICES: Damaging data rather than stealing or misusing them is called cyber vandalism. These are program that attach themselves to a file and then circulate.

            6. CYBER TERRORISM: As we discussed above, Terrorist attacks on the Internet is by                distributed denial of service attacks [DDOS], hate websites and hate E-mails, attacks on service           network etc.

           7. SOFTWARE PIRACY: Theft of software through the illegal copying of genuine programs    or the counterfeiting and distribution of products intended to pass for the original.

WHY SHOUD WE NEED TO TAKE CARE?

It is a criminal activity that is done on the internet. In cybercrime the main host or computer device it can be a tool or target.

HOW CAN WE PROTECT FROM IT?

Read the actual terms and condition or privacy policy before submit or click on any data through the internet.

Also we need to verify the websites which are using by us that is encrypted or not because nowadays most of all are using SSL (secure socket layer) for provide encryption and securing the data.

Try to avoid remote connectivity.

v India is on the 10th Position in cybercrime.

                  
                   Few of cyber-attacks are in measurement of percentage…
               • Financial fraud:                                                    11%
               • Disturbance of data/networks:                            17%
               • Theft of proprietary information:                      20%
               • System penetration from the outside:                25%   [Direct - access]
               • Denial of service [DDOS]:                                   27%
               • Unauthorized access by insiders:                       71%
               • Employee abuse of internet privileges               79%
               • Viruses:                                                                 85%
CYBER LAW FOR INDIA
Cybercrime can consist criminal activities, such as theft, fraud, deformation and mischief, all of which are subjected to the India Penal code. In simple way we can say that cybercrime is unlawful acts where in the computer is either a tool or both. The abuse of computer has also given birth of new age crime that is addressed by the Information Technology Act, 2000.

ADVANTAGES OF CYBER SECURITY
1. The cyber security will defend us from critical attacks.
2. It helps us to browse the site, website and online documents securely.
3. Internet Security process all the incoming and outgoing data on your computer.
4. It will defend us from hacks, virus and malicious activity.
5. Application of cyber security used in our PC and it is update every week.
SAFETY TIPS FOR STAY SAFE FROM THE CYBER CRIME
• Use antivirus software’s.
• Insert firewalls for more security.
• Uninstall unnecessary software.
• Maintain backup.
• Check security settings.
• Stay anonymous - choose a genderless screen name.
·  Think twice before you click and submit on any data which are available on the web.
·  Never give your full name or address to unknown persons.
·  Learn more or in detailed about internet terms and privacy.
·  Many websites are using SSL (secure socket layer) for encryption and data security.
CYBERCRIMES BULLYS NATIONAL SECURITY
IN INDIA our former Union home minister Shivraj Patil said that the rising level of cybercrime is an indication of enormous threat to national security. On Google’s social networking site Orkut, Facebook, have been puzzling authorities.
 Fan clubs of Underworld Dons and other are also doing the rounds on orkut. There is huge potential for damage to national security through cyber-attacks. The internet is a means for money bounding and funding terrorist attacks in an organized manner.

CONCLUSION
   After all, a system which is totally secure when it is unplugged and switched off. So there is an only one way to stay secure is pay attention towards the each and every small instruction and do smart work. We need to think before we click on each and every component which is available on cyber world.

REFERENCES
           http://www.cyagency.com/

Comments

  1. I wanted to thank you for this great read!! I definitely enjoying every little bit of it I have you bookmarked to check out new stuff you post. Phishing Testing

    ReplyDelete
  2. Nice content, Thanks for shear the beautiful content. If anyone want to know What is Network Security you can visit my blog.

    ReplyDelete

Post a Comment