0% found this document useful (0 votes)
41 views35 pages

Cyber Crime and Law: Name: A.Haritha Roll No:17071D7804 Branch:M.Tech (CNIS)

The document discusses various types of cyber crimes including those that target computers directly like computer viruses, denial-of-service attacks, and malware. It describes computer viruses as programs that copy themselves into other computers without consent. Denial-of-service attacks aim to overload systems and prevent legitimate requests from being fulfilled. Malware refers to any harmful software like trojans or logic bombs. The document also covers Indian cybercrime law and categories of cyber crimes.

Uploaded by

haritha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views35 pages

Cyber Crime and Law: Name: A.Haritha Roll No:17071D7804 Branch:M.Tech (CNIS)

The document discusses various types of cyber crimes including those that target computers directly like computer viruses, denial-of-service attacks, and malware. It describes computer viruses as programs that copy themselves into other computers without consent. Denial-of-service attacks aim to overload systems and prevent legitimate requests from being fulfilled. Malware refers to any harmful software like trojans or logic bombs. The document also covers Indian cybercrime law and categories of cyber crimes.

Uploaded by

haritha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 35

Cyber Crime And Law

Name: A.HARITHA
Roll No:17071D7804
Branch:M.Tech(CNIS)
The Modern Thief Can Steal More With A Computer Than With A
Gun. Tomorrow's Terrorist May Be Able To Do More Damage
With A Keyboard Than With A Bomb.
WHAT IS CYBER CRIME?
INTRODUCTION

Cyber crimes are any crimes that involve a computer and a


network. In some cases, the computer may have been used in
order to commit the crime, and in other cases, the computer
may have been the target of the crime.

The first recorded cyber crime was recorded in the year 1820.
CONTENTS

Computer As Targets
Contaminants And Destruction Of Data
Indian IT Act 2000
CATEGORIZATION OF CYBERCRIME

Computer as a target : using a computer to attack other computers.

Computer as a weapon : using a computer to commit real world


crimes.
COMPUTER AS TARGETS

Computers can be the target of a criminal activity, a storage place for data about a
criminal activity and/or the actual tool used to commit a crime (planning criminal
activity). One of the most publicized crimes targeting computers involves
unleashing a virus through email.

A virus is a computer program that disrupts or destroys existing computer systems.

These crimes are committed by a selected group of criminals. Unlike crimes using
the computer as a tool, these crimes require the technical knowledge of the
perpetrators.
 Crimes that primarily target computer networks or
devices include:

• Computer viruses
• Denial-of-service attacks
• Malware (malicious code)
COMPUTER VIRUSES

Computer viruses are computer programs that, when


opened, put copies of themselves into other computers'
hard drives without the users' consent.
• Creating a computer virus and disseminating it is a cyber
crime.
• The virus may steal disk space, access personal
information, ruin data on the computer or send information
out to the other computer user's personal contacts.
Contd…
The most common way for a virus to infect a computer is
by way of an email attachment. An example would be if
you received an email with an attachment.
You open this attachment, and the virus immediately
spreads through your computer system.
In some cases, if the virus is opened by a computer on a
system network, such as your place of employment, the
virus can immediately be spread throughout the network
without needing to be sent via email.
Contd…
 There are numerous reasons that a person would create a virus to send out to
another computer or computers.
 It may be to steal information or money, to sabotage that system or to demonstrate
the flaws that the other computer system has.
 In some cases these viruses are able to be removed from the user's computer
system, and in some cases they are not.
 Therefore, it is easy for us to understand how these viruses cause significant
financial harm every year. The punishment for those who damage or gain
unauthorized access to a protected computer can be prison time and the repayment
of financial losses.
MACRO VIRUS

• Macro virus infect the file that are created from some application or programs which are mainly
contain macro files like doc, ppts, xls, mdb. So basically such virus infect the files with the macros
and also templates and document that are contained in the file. These virus hide in documents that
are shared through network and e-mail.
• Macro virus are relax, bablas , melissa. A, 097m/y2k.
MEMORY RESIDENT VIRUSES
• Resident viruses activated every time the OS runs and end up infecting other opened files. Such virus usually
fix themselves inside the computer memory, hide in RAM. Resident viruses are CMJ, meve, randex,
mrklunky.
OVERWRITE VIRUSES
• Overwrite viruses delete the information from the file partially or completely once it infect a file. It infect only
the file content may be change all the content but the file location and name remains the same, means doesn’t
infect the file name and the location. Overwrite viruses are trj. Reboot, way, trivial.88.D.
DIRECT ACTION VIRUSES

• Direct action virus activate when the file containing virus is executed. The virus take no
other action unless an infected file is executed again. Most viruses avoid this because this is
not so productive, but such virus damage in the past. Direct action viruses are vienna virus.
DIRECTORY VIRUS

• Directory virus is also known by cluster virus and file system virus. This can infect the
computer’s directory by changing the path by indication the location. Such virus located into
the hard disk but affect the entire directory. Directory viruses are die-2 virus.
WEB SCRIPTING VIRUS

• Mostly web pages contain complex code to make their web page content interactive so that
such code exploit that cause undesirable actions. Such virus originate from browser and web
pages. Web scripting viruses include JS.Fortnight that spread via malicious emails.
MULTIPARTITE VIRUS
• This type of virus spread in multiple ways and the taken action depending upon the type of OS
installed and presence of certain files. Most of the time this virus try to hide in computer’s memory
not to infect the hard disk. Multipartite viruses are flip, invader and tequila.
POLYMORPHIC VIRUS
• Polymorphic virus encode and encrypt themselves every time they are going to infect the computer
system. For that they use different encryption methods and algorithms. Since they use different
encryption method each time which is difficult for antivirus to locate and resolve them.
Polymorphism viruses are marburg, tuareg, satan bug, elkern.
WORM
• Worm is very similar to a virus having a capability to self-replicate which is leading to negative
effect on your system. This consume too much system memory and also affect web servers and
network servers. Worm viruses are lovgate.F, sobig.D, trile.C, pswbugbear.B, mapson.
TROJANS HORSES

• This name comes from a software which is very useful software but later do damage you system after run once. This virus
can track the login details of the users who is online. Example as we all know e-banking is very common, so its
vulnerability of tracing your login details whenever your PC is working without the support of strong antivirus.
EMAIL VIRUS
• This virus is spread via email, this will hide an email when recipient opens the mail.
BOOT INFECTORS
• This virus type will include boot sector and master boot record types. While all the viral codes are separated because they
infect the hard disks or the floppy. It include the viruses like the brain virus which is very first wild virus is to be created.
VIRUS PROTECTION METHODS
• Protection of virus is well designed software program which is used in infected computer systems to prevent
from viruses, worms and trojan horses. The main purpose of using virus protection is to remove any malicious
software code which is already infect a computer. Most of the virus protection utilities now bundle anti-
spyware and anti-malware ability that belong to anti-virus protection. To secure internet that include some
additional capabilities like anti-spam, anti-phishing, firewall, optimization of files and file protection.

DENIAL-OF-SERVICE ATTACKS
• Denial of service attack (dos) is a cyber attack where the perpetrator seeks to make a
machine or network resource unavailable to its intended users by temporarily or
indefinitely disrupting services of host connected to the internet.
• Denial of services is typically accomplished by flooding the targeted machine or resource
with superfluous requests in an attempt to overloaded systems and prevent some or all
legitimate requests from being fulfilled.
• Criminals of dos attacks often target sites or services hosted on high profile webservers
such as banks or credit card payment gateways,revenge,blackmail and activism can
motivate these attacks.
• The systems which are used for attacking are known as Zombie system’s.
TYPES OF DOS ATTACKS
 FLOOD ATTACK

Attacker keeps on flooding victims system with ‘n’ number of pings which result in
huge traffic which the system cannot handle.

 BUFFER OVERFLOW ATTACK

It is a technique used for performing dos attack.

 PING OF DEATH

The attacker sends huge oversize packet to the victim’s system which causes the
system to freeze or crash.
PREVENTION’S FROM DOS ATTACK

Implementing filters
Disable unused network services
Maintain regular backup
Maintain password policies
Tools such as zombie zapper, rid(remote intrusion detector)
MALWARE (MALICIOUS CODE)

Malware, or malicious software, is any program or file that


is harmful to a computer user.
 They are the software's/programmes which gives an
attacker complete or partial access of the system/program.
They are unsafe /vulnerable to system.
They can hamper the performance of the system or even
damage the OS.
TYPES OF MALICIOUS SOFTWARE’S
There are various malicious software’s such as:-
• Trojan horse : It hampers the security mechanism.
• Bacterium : It is a special kind of virus which is not attached to any file.
• Logic bomb : It executes the DoS attack.
• Time bomb : It executes the attack at proper time.
• Rabbits : It replicates itself and exhaust the resources.
• Trapdoor : It is used by intruder/attacker to bypass the security mechanism of
the given network or system.
VIRUS

It is a self-replicating hidden computer program.


It cannot run on its own , it requires some host to run it.
It infects another program.
PREVENTIONS

• Use software’s from trustworthy sources


• Open safe attachments only
• Keep recovery of important documents
• Use virus scanning routinely
• Backup all system files
• Test the new software on isolated computer
CONTAMINANTS AND DESTRUCTION OF DATA

“Computer contaminant" means any data, information, image, program, signal or


sound that is designed or has the capability to:
• Contaminate, Corrupt, Consume, Damage, Destroy, Disrupt, Modify, Record Or Transmit; Or
• Cause To Be Contaminated, Corrupted, Consumed, Damaged, Destroyed, Disrupted, Modified,
Recorded Or Transmitted.

Any other data, information, image, program, signal or sound contained in a


computer, system or network without the knowledge or consent of the person who
owns the other data, information, image, program, signal or sound or the computer,
system or network.
DESTRUCTION OF DATA
Data destruction is the process of destroying data stored
on tapes, hard disks and other forms of electronic media so that
it is completely unreadable and cannot be accessed or used for
unauthorized purposes.
When data is deleted, it is no longer readily accessible by
the operating system or application that created it. But deleting
a file is not enough; data destruction software must be used
to overwrite the available space/blocks with random data until
it is considered irretrievable.
INDIAN IT ACT 2000
Information technology Act,2000 is the primary Indian law dealing with
cyber crime and e-commerce.
The law is also called ITA-2000 or IT Act.
Notified on 17th October 2000.
Based on the United Nations Model Law on Electronic Commerce 1996
recommended by the UN General Assembly on 30th Jan 1997.
It act overs whole of Indian and recognizes electronic records and digital
signatures.
Framed originally to provide legal infrastructure for e-commerce in
India.
Major amendments where made in 2008 to address issues like cyber
terrorism, data protection, child pornography, Stalking, etc..
Gives authorities the power to intercept, monitor or decrypt any
information through computer resources.
INDIAN IT ACT FEATURES

Formation of Controller of Certifying Authorities to regulate issuance of digital


signatures.
Establishment of Cyber Appellate Tribunal to resolve disputes due to the new law.
Amendment in sections of old laws to make them technology compliant
• Indian Penal Code
• Indian Evidence Act
• Bankers Book Evidence Act
• RBI Act
Information technology act 2000, is based on UNCITRAL (united nations
commission on international trade law) model law.
 Information technology act 2000, has 13 chapters, 94 sections and 4 schedules.
 First 14 sections deals with some legal aspects concerning digital signature.
Further other sections deal with certifying authorities who are licensed to issue
digital signature certificate.
• Sections 43 to 47 provide for penalties and compensation.
• Sections 48 to 64 deals with tribunals a appeal to high court.
• Section 65 to 79 of the act deals with offences.
• Section 80 to 94 deals with miscellaneous of the act.
SECTION 43
If any person uses a computer or system network without permission of
the owner or any other person who is in charge &
• Access, download, copy any data from such computer
• Introduces computer virus into any computer.
• Damages any computer network or computer.
• Changes account settings.
Punishment
• He shall be liable to pay damages by the way of compensation not
exceeding 1 crore to affected person.
SECTION 66

Hacking with computer system


• Information residing in a computer resources must be either:
• Destroyed
• deleted
• Altered
• diminished in value or utility
• Affected injuriously
 Punishment
• 3 yrs. Or fine up to 2 lakh.
Some other sections
Section 65 :
• Tampering with computer source document.

 Punishments
• Offences are punishable with imprisonment up to 3 yrs. And/or fine up to Rs. 2 lakh.
 Section 69:
• Interception, monitoring of any information regarding the integrity, security or defense of India,
friendly relations with foreign countries.

Punishment
• 2 lakh and /or jail not extending 5yrs
Case study –
Extortion of money through Internet
•The complainant has received a threatening email and demanded protection from
unknown person claiming to be the member of halala gang, Dubai. Police registered a
case u/s. 384/506/511 ipc
.•The sender of the email used the email id [email protected] & [email protected] and
signed as Changes Babar.
•Both the email accounts were tracked, details collected from isp’s & locations were
identified.
• The cyber cafes from which the emails has been made were monitored and the accused
person was nabbed red handed.

You might also like