Cyber crime and fraud

29
RAMESH SIDH IPCC REG. NO. CRO - 0478387 BATCH COMMENCEMENT DATE: 24-NOV-2014 PROJECT TOPIC: CYBER CRIME AND FRAUD SUBMITTED BY: ITT CENTRE NAME: BIKANER BRANCH OF CIRC OF ICAI 1

Transcript of Cyber crime and fraud

RAMESH SIDH IPCC REG. NO. CRO - 0478387

BATCH COMMENCEMENT DATE: 24-NOV-2014

PROJECT TOPIC: CYBER CRIME AND FRAUD

SUBMITTED BY:

ITT CENTRE NAME: BIKANER BRANCH OF CIRC OF ICAI

1

2

3

CYBER CRIME AND FRAUDCYBER CRIME AND FRAUD

4

5

INDEX

Submitted By :- Ramesh SidhITT Reg No.: Bkn/2014-15/089

6

• Why Should We Know About Cyber Crime?.............................8• What Is Cyber Crime?...............................................................9• History………………………………………………………………………………..10• Definition Of Fraud……………………………………………………………..11• Categories Of Cyber Crime ………………………………………………….12• Weapons Of Cyber Crime And Fraud……………………………………13• Cyber Crimes Against Persons……………………………………………..14• Cyber Crimes Against Property ………………………………………..…15• Cyber Crimes Against Government………………………………….….16• An Instance Of Cyber Terrorism……………………………………..……17• Cyber Crimes Against Society………………………………………………18• Example Of Cyber Crime…………………………………………………….19-26• Conclusion………………………………………………………………………….27• Bibliography……………………………………………………………………….28

Submitted By :- Ramesh SidhItt Reg No.: Bkn/2014-15/089 7

Submitted By :- Ramesh SidhItt Reg No.: Bkn/2014-15/089 8

Why Should we know about Cyber-Crime?

In This Tech-savvy World Of 21st Century Every One Is Engaged With Internet,

Through Whatsapp, Twitter, Facebook, Net-banking & Lots Of Other Platforms Are

There.

And Some Criminal Minded Persons Commit Crimes Here, Which Is Included Under Cyber-

crime.

Submitted By :- Ramesh SidhItt Reg No.: Bkn/2014-15/089

9

WHAT IS CYBER CRIME ?LET ME TELL YOU ?

Cyber Crime Is Nothing But Where The Computer Used As An Object Or Subject Of Crime.

Crime Commited Using Computer And Internet

Criminal Activites That Make Use Of Computers Or Networks.

Submitted By :- Ramesh SidhITT Reg No.: Bkn/2014-15/089 10

•The first recorded cyber crime was recorded in the year 1820.

•The first spam email took place in 1978 when it was sent over the Arpanet.

•The first Virus was installed on an Apple Computer in 1982.

submitted by :- Ramesh SidhITT REG NO.: BKN/2014-15/089 11

Defintion of Fraud

• Black’s Law Dictionary defines fraud as:

– …All Multifarious Means Which Human Ingenuity Can Devise, And Which Are Resorted To By One Individual To Get An Advantage Over Another By False Suggestions Or Suppression Of The Trust. It Includes All Surprise, Trick, Cunning Or Dissembling, And Any Unfair Way By Which Another Is Cheated.

Submitted By :- Ramesh SidhItt Reg No.: Bkn/2014-15/089 12

CATEGORIES OF CYBER CRIME

• Cyber Crimes Against Persons.

• Cyber Crimes Against Property.

• Cyber Crimes Against Government.

• Cyber Crimes Against Society.

• Cyber Crimes Against Organisation

Submitted By :- Ramesh SidhItt Reg No.: Bkn/2014-15/089 13

Weapons of Cyber Crime and Fraud

• Hacking• Data Diddling• Denial Of Service Attack• Email Bombing• Trojan Attack• Web Jacking• Virus/Worm Attacks• Salami Attacks• Phishing• Spamming• Cyber Stalking

submitted by :- Ramesh SidhITT REG NO.: BKN/2014-15/089 14

CYBER CRIMES AGAINST PERSONS

• Harassment Via E-mails• Hacking • E-mail / SMS Spoofing• Carding• Assault By Threat

submitted by :- Ramesh SidhITT REG NO.: BKN/2014-15/089 15

CYBER CRIMES AGAINST PROPERTY

• Intellectual Property Crimes• Cyber Squatting• Cyber Vandalism• Transmitting Virus• Internet Time Thefts

submitted by :- Ramesh SidhITT REG NO.: BKN/2014-15/089 16

Cyber crimes against government

•Hacking into computer systems.•Introducing viruses to vulnerable networks.•Website Defacing.•Denial-of-Service(DoS) attacks.•Terroristic threats made via e-mail.

submitted by :- Ramesh SidhITT REG NO.: BKN/2014-15/089 17

An Instance of Cyber terrorism Ahmedabad Bomb Blast(26-07-08)

• A Mail With Id Alarbi_gujrat@ Yahoo.Com Was Being Sent By A Group Of Terrorists.

• Person Named Kenneth Haywood’s Unsecured Wifi Router In His House Was Being Misused By Terrorists.

• 3 More Mails Were Sent After The Blast With The Same Misuse Of Unsecured Wifi Routers.

submitted by :- Ramesh SidhITT REG NO.: BKN/2014-15/089 18

CYBER CRIMES AGAINST SOCIETY

• Pornography

• Cyber Trafficking

• Online Gambling

• Forgery

submitted by :- Ramesh SidhITT REG NO.: BKN/2014-15/089 19

Phishing:Phishing Refers To The Receipt Of Unsolicited Emails By Customers Of Financial Institutions, Requesting Them To Enter Their Username, Password Or Other Personal Information To Access Their Account For Some Reason. The Fraudster Then Has Access To The Customer’s Online Bank Account And To The Funds Contained In That Account.

submitted by :- Ramesh SidhItt Reg No.: Bkn/2014-15/089 20

Salami attacks:

•This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. •An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed.

E.G. Criminal Makes Such Program That Deducts Small Amount Like Rs. 2.50 Per Month From The Account Of All The Customer Of The Bank And Deposit The Same In His Account.In This Case No Account Holder Will Approach The Bank For Such Small Amount But Criminal Gains Huge Amount.

submitted by :- Ramesh SidhItt Reg No.: Bkn/2014-15/089 21

Virus/ Worm Attacks:

•They usually affect the data on a computer, either by altering or deleting it.

•Worms unlike viruses do not need the host to attach themselves to.•They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on the computer’s memory.

submitted by :- Ramesh SidhItt Reg No.: Bkn/2014-15/089 22

Hacking:

Unauthorized access to any computer systems or networks is known as ‘HACKING’. That is accessing the information of others without proper authorization.

submitted by :- Ramesh SidhItt Reg No.: Bkn/2014-15/089 23

DENIAL OF SERVICE ATTACK

This is an act by the criminal who floods the bandwidth of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide

Submitted by :- ramesh sidhITT reg no.: Bkn/2014-15/089 24

• The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of

pedophiles.

Submitted By :- Ramesh SidhITT Reg No.: Bkn/2014-15/089 25

This is a kind of online harassment wherein the victim is subjected to a barrage of online messages and emails. Cyber stalking is a technology based attack which can take many forms, including: harassment, embarrassment and humiliation of the victim.

Submitted By :- Ramesh SidhITT Reg No.: Bkn/2014-15/089 26

Trojan Attacks:

This term has it’s origin in the word ‘Trojan Horse’. In software field this means an unauthorised program, which passively gains control over another’s computer by representing itself as an authorized program. The most common form of installing a Trojan is through e-mail.

CONCLUSION

Cybercrime is indeed getting the recognition it deserves. However, it is not going to restricted that easily . In fact , it is highly likely that cyber crime and its hackers will continue developing and upgrading to stay ahead of the law.

So, to make us a safer we must need cyber security.

Submitted By :- Ramesh SidhITT Reg No.: Bkn/2014-15/089 27

Submitted By :- Ramesh SidhITT Reg No.: Bkn/2014-15/089 28

• https://www.google.co.in• http://en.wikipedia.org• http://www.legalindia.in• http://www.e-mudhra.com• Miss sonali jain (ITT Faculty)• Self efforts

submitted by :- Ramesh SidhItt Reg No.: Bkn/2014-15/089 29