Professional Documents
Culture Documents
E-Commerce: Report: Cyber Crime
E-Commerce: Report: Cyber Crime
E-Commerce: Report: Cyber Crime
Submitted to:
Group Members:
E-Commerce Cyber Crimes
Cyber crime is the most complicated problem in the cyber world. Cyber
crime is an illegal activity committed on the internet. It is a criminal Activity that
uses a computer either as a target or a means for perpetuating further crimes. It
includes all crimes performed or resorted to by abuse of electronic media or
otherwise, with the purpose of influencing the functioning of computer or computer
system.
Because:
Everybody is using computer
From white collar criminals to terrorist organizations and from teenagers to
adults
Conventional crimes like Forgery, Extortion, Kidnapping etc. are being
committed with the help of computers
New generation is growing up with computer
MOST IMPORTANT- Monetary transactions are moving on to the INTERNET
The first recorded cyber crime took place in the year 1820! In 1820, Joseph-
Marie Jacquard, a textile manufacturer in France, produced the loom. This device
allowed the repetition of a series of steps in the weaving of special fabrics. This
resulted in a fear amongst Jacquard's employees that their traditional employment
and livelihood were being threatened. They committed acts of sabotage to
discourage Jacquard from further use of the new technology. This is the first
recorded cyber crime!
Page | 2
E-Commerce Cyber Crimes
Discontented Employees
Teenagers
Professional & Organized Hackers
b
y
C r
e
Business Rivals
Ex-Boy Friend
Divorced Husbands.
m
i
r
g
n
i
a
A t
s
VICTIMS OF CYBER CRIME:
Greedy People
v
i
d
I
n u
d
Unskilled & Inexperienced
a
g
r
e
c
o
O
S z
i
n
y
t
Unlucky People
s
l
t
CLASSIFICATION OF CYBER CRIME:
Page | 3
iv
d
n
s
Ily
V
A
H
T
t
E
D
a
C
S
g u
r
h
m
p
f
e
o
b
k
-c
E-Commerce
AGAINST INDIVIDUALS
Cyber Crimes
Page | 4
a
m
r
o
f
n
A
O
S
D
C
T
IU
P
lg
iw
b
y
th
u
e
s
d
z
E-Commerce
AGAINST ORGANIZATIONS
AGAINST SOCIETY
Cyber Crimes
Page | 5
lik
nA
P
c
S
a
O
F
g
T
y
h
p
te
m
fo
r
b
s
E-Commerce
AGAINST SOCIETY
Page | 6
E-Commerce Cyber Crimes
A) HACKING:
B) CYBER STALKING:
Action: Virus infects other programs and makes copies of itself and spread
into other programs in the same machine. Worms, unlike viruses do not
need the host to attach themselves to. They merely make functional copies of
themselves and do this repeatedly till they eat up all the available space on a
computer's memory.
Case: Use of malicious software like Trojan horse, Time Bomb, Logic Bomb,
Rabbit & Bacterium.
Action: The victim’s credit card information is stolen and misused for
making online purchases. Install key-loggers in public computers. If
electronic transactions are not secured, the credit card number can be
stolen by the hackers who can misuse this card by impersonating the credit
card owner.
Page | 7
E-Commerce Cyber Crimes
E) SALAMI ATTACKS:
F) EMAIL BOMBING:
G) CYBER PORNOGRAPHY:
H) SOFTWARE PIRACY:
Page | 8
E-Commerce Cyber Crimes
I) WEB JACKING:
Action: In these kinds of offences the hacker gains access and control over
the web site of another person or organization. He may even mutilate or
change the information on the site
Case: the site of MIT (Ministry of Information Technology) was hacked by the
Pakistani hackers and some obscene matter was placed therein
K) NET EXTORTION:
L) EMAIL SPOOFING:
Page | 9
E-Commerce Cyber Crimes
that they send, so that these e-mails appear to have been sent by the third
party.
For example:
User1 is sent an infected e-mail and then the e-mail is opened,
triggering propagation
The worm finds the addresses of User2 and User3 within the address
book of User1
From the computer of User1, the worm sends an infected e-mail to
User2, but the e-mail appears to have been sent from User3
This can be particularly problematic in a corporate setting, where e-mail is
sent to organizations with content filtering gateways in place. These
gateways are often configured with default rules that send reply notices for
messages that get blocked, so the example is often followed by: User2 doesn't
receive the message, but instead gets a message telling him that a virus sent
to them has been blocked. User3 receives a message telling him that a virus
sent by them has been blocked. This creates confusion for both User2 and
User3, while User1 remains unaware of the actual infection.
m) CYBER DEFAMATION:
n) EMAIL PHISHING:
Page | 10
E-Commerce Cyber Crimes
My father left me $40 million in his will, but I have to bribe government
officials to get it out
We just sold a bunch of crude oil in Nigeria, but we have to bribe the banker
to get it out.
The Nigerian government overpaid on some contract, and they need a front
man to get it out of the country before the government discovers its error.
Page | 11
E-Commerce Cyber Crimes
Page | 12
E-Commerce Cyber Crimes
To: India
Dear valued ***** Bank Customer! For security purposes your account has
been randomly chosen for verification. To verify your account information we are
asking you to provide us with all the data we are requesting.
Otherwise we will not be able to verify your identity and access to your
account will be denied. Please click on the link below to get to the bank secure page
and verify your account details.
Thank you.
Page | 13
E-Commerce Cyber Crimes
https://infinity.*****bank.co.in/Verify.jsp
Page | 14
E-Commerce Cyber Crimes
O) CYBER TERRORISM:
Page | 15
E-Commerce Cyber Crimes
The following are some common offenses that constitute economic and financial
crimes in the public service.
Corruption
Bribery
Embezzlement
Asset misappropriation
Money laundering
Procurement fraud
Forgery/documents falsification
Cheque fraud
Identity theft
Revenue and vat fraud
Foreign exchange malpractices
Illegal oil bunkering/illegal mining
Illegal arms deal etc.
SAFETY MEASURES:
Page | 16
E-Commerce Cyber Crimes
CONCLUSION:
Page | 17