Sei sulla pagina 1di 44

Cyber Crimes

An Overview
IMRAN MUJADDID RABBANI
M. Phil Computer Science
Instructor IT.
Punjab Judicial Academy

What is ?.

All crimes performed or resorted to by


abuse of electronic media or otherwise,
with the purpose of influencing the
functioning of computer or computer
system.

COMPUTER CRIME is any crime


where

Computer is a target.
Computer is a tool of crime
Computer is incidental to crime

Why?

Everybody is using COMPUTERS..


From white collar criminals to terrorist organizations
And from Teenagers to Adults
Conventional crimes like Forgery,, extortion,
kidnapping etc.. are being committed with the help
of computers
New generation is growing up with computers
MOST IMPORTANT - Monetary transactions are
moving on to the INTERNET

Profile of Cyber Criminal


Disgruntled employees..
Teenagers..
Political Hacktivist
Professional Hackers..
Business Rival..
Ex-Boy / Girl Friend..
Divorced ... etc

Victims
Gullible
Desperados and greedy people
Unskilled & Inexperienced
Unlucky people

40,000,000,000,000,000,000
Bytes of information
goes online
each year

Information Sources

News

The US has twice as many


shopping centers as High
Schools

In

each of past 8 years, more


Americans
have
declared
bankruptcy than graduated from
college
Authors, Affluenza (2005)

The most infamous unsolved

Computer Crimes
(that we know about)

1. The WANK Worm (October 1989)


WANK worm hit NASA offices in
Greenbelt, Maryland. WANK (Worms
Against Nuclear Killers) ran a banner
(pictured) across system computers as
part of a protest to stop the launch of the
plutonium-fueled, Jupiter-bound Galileo
probe.

Conti

Ministry of Defense Satellite Hacked (February


1999)
CD Universe Credit Card Breach
(January 2000)
Military Source Code Stolen
(December 2000)
Anti-DRM Hack (October 2001)

Criminal Devices

CREDIT CARD FRAUD

Types

Types of Cyber Crimes


Email bombing
Data diddling
Salami Attack
Denial of Service attack
Virus / worm attacks
[ Love Bug / ILOVEYOU]

Dear Friend,

This message might meet you in utmost surprise, however,


its just my urgent need for foreign partner that made me to
contact you for this transaction. I am a banker by profession
from Burkina Faso in West Africa and currently holding the
post of Director Auditing and Accounting unit of the bank.
I have the opportunity of transferring the left over funds
($7.2million) of one of my bank clients who died along with
his entire family on 31 July 2000 in a plane crash. You can
confirm the geniuses of the deceased death by clicking on
this web site
http://news.bbc.co.uk/1/hi/world/europe/859479.stm

Hence, I am inviting you for a business deal where this


money can be shared between us in the ratio of 60/40.
send your private phone number to call you, If you agree to
my business proposal. Further details of the transfer will be
forwarded to you as soon as I receive your return mail.
Have a great day.
Your Faithfully
Mr Maher Akoula
Age :58 years.
Home Address:10-12/avenue.Kanazoe.
B:P 1508
Ouaga. Burkina-faso
+ 226 78 34 79 49.
+ 226 78 73 24 34

Yearly Dollar Loss (in millions)

10 most common Complaints Categories

Hacker?
The best criminal hacker is the
one that isn't caughtor even
identified.

Hacking
Hacking in simple terms means illegal
intrusion into a computer system without the
permission of the computer owner/user.

What is Virus?

The virus is basically malevolent computer


program which has the capability to cause
havoc in several ways. The greatest chaos
of computer virus is the loss of precious
information stored on your computer hard
rive.

Virus
Computer virus have become todays
headline news
With the increasing use of the Internet, it
has become easier for virus to spread
Virus show us loopholes in software
Most virus are targeted at the MS
Windows OS

Trojan / Trojan Horse

Has the ability to reproduce infected files


with same or relatively same format.

Areas to Infect
Binary Executable files
Boot Sector
Master Boot Record
Auto run Script Files

How Hacker Works?


Hit & Trial
Stolen
Social Engineering

Social Engineering

First Name
Last Name
Sur Name
Nick Name
Wife Name
Beloved Name
Favorite Place
Date of Birth

Date of Wedding
Vehicle Number
Mobile Number
Last four Digits of
Phone Number
Favorite word
Favorite Phrase
Etc.

Imprisonment
The penalty for illegally accessing a computer system
ranges from 6 months to 5 years.
The penalty for the unofficial modification on a computer
ranges from 5 to 10 years.
The individual who hacks the computer or computer
devices will get an imprisonment up to 3 years or a fine.
Reference:

www.spamlaws.com

Potrebbero piacerti anche