Security Guard Services Company Profile by Slide

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 30

< A PRESENTATION ON

CONCEPTS OF CYBER CRIME &


AWARENESS ABOUT PREVENTING
CYBER CRIME
UNDER GUIDANCE :
PROF. DNYANESHWAR CHAKRADDEV
TEAM MEMBERS
YASH KHARAT- A555 GROUP NO 09
JAYESH KHAROL - A556
RITESH KHURANA - A557
CHIRAG KOCHAREKAR - A558
SAHIL KOLI - A559
VIRESH KOLI - A560
TABLE OF CONTENTS
OBJECTIVES
01 AND OUTCOMES 02 INTRODUCTION
Introduction about the
Objectives and topic
outcomes of topic

What is Cyber
03 Crime 04 Causes
Describes the topic Tells the causes of
Cyber Crime cyber crime
TABLE OF CONTENTS
05 Case Study 1 06 Case Study 2
UIDAI’S Aadhar SONY.SAMBANDH.CO
Software hacked M CASE

07 Awareness 08 Prevention
Awares about cyber Prevention about the
crime problem
TABLE OF CONTENTS
09 CONCLUSION 10 REFERENCES
OBJECTIVES

01 To study the concept of Cyber Crime and its


select types.

02
To document select methods and tools for
curbing cyber criminal issues.
OUTCOMES

To understand the concept of cyber crime and


01
get awareness about several cyber criminal
issues.

02 To apply select tools and methods for


protecting oneself from cyber criminal issues.
INTRODUCTION
● Crime committed using a computer and the
internet to steal a person's identity or
illegal imports or malicious programs
Cybercrime is nothing but where the
computer used as an object or subject of
crime
● Definition:

Cybercrime is a term for any illegal


activity that uses a computer as its
primary means of commission
What is Cybercrime?
● Cybercrime, also called computer crime, the use of a computer as an
instrument to further illegal ends, such as committing fraud,
trafficking in child pornography and intellectual property, stealing
identities, or violating privacy.
● New technologies create new criminal opportunities and few new types
of crime.
● Most cybercrime is an attack on information about individuals,
corporations, or governments.
● Although the attacks do not take place on a physical body, they do
take place on the personal or corporate virtual body, which is the
set of informational attributes that define people and institutions
on the Internet.
● In other words, in the digital age our virtual identities are essential
elements of everyday life: we are a bundle of numbers and identifiers in
multiple computer databases owned by governments and corporations.
● An important aspect of cybercrime is its nonlocal character: actions can
occur in jurisdictions separated by vast distances. This poses severe
problems for law enforcement since previously local or even national
crimes now require international cooperation.
● In 1996 the Council of Europe, together with government representatives
from the United States, Canada, and Japan, drafted a preliminary
international treaty covering computer crime.
Causes of Cybercrime
● Easy to access computers – Since technology is
complex, it has become very difficult to
protect the computer from viruses and hackers.
There are so many possibilities of hacking
when we safeguard a computer system from
unauthorized access.
● Size to store computer data in comparatively
small space – The computer has got a
distinctive feature of storing data in a very
small space. Due to this, the people can steal
data very easily from any other storage and
are using this for their purpose.
● Complexity of Code – The computers can run on operating systems and these
operating systems are programmed with millions of codes. There might be
mistakes in the code. The human brain is defective so that they can
commit mistakes at any stage. The cyber-criminals take advantage of these
loopholes.
● Negligence of the user – Human beings always neglect things. So, if we
make any negligence in protecting our computer system which leads the
cyber-criminal to the access and control over the computer system.
● Loss of evidence – Hackers always make sure to clear any evidence i.e log
data related to the attack. So, Loss of evidence has turned into an
evident problem that disables the law enforcement to go beyond the
investigation of cyber-crime.
CASE STUDY 1:
UIDAI’S Aadhar Softwarwe hacked
The authenticity of the data stored in India's
controversial Aadhaar identity database, which
contains the biometrics and personal information of
over 1 billion Indians, has been compromised by a
software patch that disables critical security
features of the software used to enrol new Aadhaar
users.The patch—freely available for as little as Rs
2,500 (around $35)— allows unauthorised persons,
based anywhere in the world, to generate Aadhaar
numbers at will, and is still in widespread use.
What is Patch ?
A patch is a bundle of code used to alter the functionality of a software
programme. Companies often use patches for minor updates to existing
programmes, but they can also be used for harm by introducing a
vulnerability—as in this case.The patch lets a user bypass critical
security features such as biometric authentication of enrolment operators
to generate unauthorised Aadhaar numbers.The patch disables the enrolment
software's in-built GPS security feature (used to identify the physical
location of every enrolment centre), which means anyone anywhere in the
world can use the software to enrol users.The patch reduces the
sensitivity of the enrolment software's iris-recognition system, making it
easier to spoof the software with a photograph of a registered operator,
rather than requiring the operator to be present in person.
The use of this patch was so widespread that a YouTube search for "ecmp
bypass" reveals hundreds of videos of private operators offering step-
by-step guidance on how to subvert the UIDAI's security protocols.
Once the patch is installed, enrolment operators no longer need to provide their
fingerprint to use the enrolment software, the GPS is disabled, and the
sensitivity of the iris scanner is reduced. This means that a single operator
can log into multiple machines at the same time, reducing the cost per enrolment,
and increasing their profits.Bharat Bhushan Gupta, a 32-year-old former
enrolment operator from Jalandhar, said operators like him were paid only Rs 30
per enrolment, so many operators began using the patch to make a little more
money, charging between Rs 100 and Rs 500 in their own capacity. Gupta said he
had not used the patch, and had written to the UIDAI CEO and others in the
authority about its existence.The UIDAI has admitted that the enrolment process
has been marred by corruption. In 2017, the UIDAI said it had blacklisted 49,000
enrolment centres for various violations, and in February 2018, the UIDAI
terminated all contracts with common service centres as well.
CASE STUDY 2:
SONY.SAMBHANDH.COM Case
India saw its first cybercrime conviction recently. It all began after a complaint was
filed by Sony India Private Ltd, which runs a website called www.sony-sambandh.com,
targeting Non Resident Indians.

In May 2002, someone logged onto the website under the identity of Barbara Campa and
ordered a Sony Colour Television set and a cordless headphone. She gave her credit card
number for payment and requested that the products be delivered to Arif Azim in Noida.

In this matter, the CBI had evidence to prove their case and so the accused admitted his
guilt. The court convicted Arif Azim under Section 418, 419 and 420 of the Indian Penal
Code — this being the first time that a cybercrime has been convicted.
CASE STUDY 2:
SONY.SAMBHANDH.COM Case
The court, however, felt that as the accused was a young boy of 24 years and a first-
time convict, a lenient view needed to be taken. The court therefore released the
accused on probation for one year.
AWARENESS OF CYBER CRIME :-
Frauds that we should be aware of :-
1] CVV / OTP Sharing Fraud :
In this Fraud , the criminal
debits money from customers
account by asking his Otp And CVV.

2] Fraud Using Fake E-Commerce


Websites :
In this Fraud, the criminal asks
for the advance payment of the
package and gets disappears.
AWARENESS OF CYBER CRIME :-
3] Catfishing :
Catfishing is a serious problem with
online interactions where one person
claims to be someone or something
they are not.
4] Cyber Bullying on Social Media:
Cyberbullying or cyber harassment is a
form of bullying or harassment using
electronic means. Cyberbullying is when
someone, typically a teenager, bullies
or harasses others on the internet and
other digital spaces, particularly on
social media sites.
AWARENESS OF CYBER CRIME :-
5] Lottery Fraud : -
Cyber Criminal sends Emails/SMS
that the victim has won a
lottery prize. Instead the
victim is asked to pay the money
of some transaction fees..etc.
AWARENESS AMONG THE PARENTS :-
● Parents should have an open conversation about safe
browsing and computer use.

● They should check the Online Activities of their


children's.

● Educate yourself about social media safety and have open


discussion with teens.

● Tell your children to immediately close the websites that


makes you uncomfortable.
AWARENESS FOR COMPLAINING TO THE POLICE:-
You can Lodge a Complaint at the Nearest Police Station or ,if
specifically notified, the Cyber Police Station in your District.
Cyber Crime can also be registered online at :-
● https://cybercrime.gov.in
● https://jofs.jhpolice.gov.in
● For Social Media Fraud
If any account has been hacked ,then take the Screenshot of the
account and attach a self identity card along with complaint.
● For Financial Fraud
Self-attested passbook/credit card transaction statement copy should
be submitted, highlighting the fraudulent transactions along with
bank account number, debit card/credit card number & registered
mobile number with the bank account or credit card.
Prevention for Cyber Crimes
To prevent cyber-crime successfully, set up
multidimensional public-private collaborations between law
enforcement organizations, the information technology
industry, information security organizations, internet
companies, and financial institutions.

1. By Using Strong Passwords: Maintaining different


password and username combinations for each of the
accounts and withstand the desire to write them down.
2. Keep social media private: Be sure that your social
networking profiles (Facebook, Twitter, YouTube,
etc.) are set to be private. Once be sure to check
your security settings. Be careful with the
information that you post online.
3. Protect your storage data: Protect your data by
using encryption for your important diplomatic files
such as related to financial and taxes.

4. Protecting your identity online: We have to be very


alert when we are providing personal information
online. You must be cautious when giving out personal
ids such as your name, address, phone number, and
financial information on the Internet. Be sure to make
that websites are secure when you are making online
purchases, etc.

5. Keep changing passwords frequently: When it comes


to password, don’t stick to one password. You can
change your password frequently so that it may be
difficult for the hackers to access the password and
the stored data.
6. Securing your Phones: Make sure that you
download applications only from trusted
sources. Be sure to install the anti-virus
software and to use a secure lock screen as
well.

7. Call the right person for help: If you


come across illegal online content such as
child exploitation or if you think it’s a
cyber-crime or identity theft or a commercial
scam, just like any other crime report this
to your local police.

8. Backup all data, system, and


considerations: This enables data stored
earlier to assist businesses in recovering
from an unplanned event.
9. Use virtual private networks (VPNs): VPNs enable us to hide our IP addresses.

10. Restriction on access to your most valuable data: Make a folder, if possible,
so that no one can see confidential documents.

11. Check security settings to prevent cybercrime: A cyber firewall checks your
network settings to see if anyone has logged into your computer.

12. Parental Control: In the era of online technology, parents should monitor all
the activities of their children online. Giving adequate privacy to children would
be problematic.
CONCLUSION
Technology is negative only in the hands of people who do not realize
that they are one and the same process as the universe. An internet
technology advances so does the threat of cyber crime. In times like
these we must protect ourselves from cyber crime. Anti-virus sofware,
firewalls and security patches are just the beginning.Never open
suspicious e-mails and only navigate to trusted sites.
➔ Cyber law’s essentional feature in today’s world of internet.
➔ To reduce the damage to critical infrastructures.
➔ To protect the internet from being abused.
➔ Achieving global peace and harmony.
REFERENCES
[1]https://www.huffpost.com/archive/in/entry/uidai-s-aadhaar-software-hacked-id-database-
compromised-experts-confirm_a_23522472

[2]https://www.helpnetsecurity.com/2021/10/01/risky-online-behaviors/

[3]https://www.legalserviceindia.com/legal/article-8311-an-introduction-to-cyber-crime.html

[4]https://cybercrime.gov.in/Webform/Crime_OnlineSafetyTips.aspx

[5]https://intellipaat.com/blog/what-is-cybercrime/

[6]https://jhpolice.gov.in/sites/default/files/documents-
reports/jhpolice_document_english_cyber_awareness_24112020.pdf

[7]https://shodhganga.inflibnet.ac.in/

You might also like