Professional Documents
Culture Documents
Cyber Crime: By, Shrinidhi K.R
Cyber Crime: By, Shrinidhi K.R
Introduction
What is Cyber Crime?
Unlawful acts wherein the computer is either a tool or a target or both
History
Associated Technologies
Packet Sniffing
Password cracking Buffer overflow
Basic Technology
Unauthorized Access Viruses E- Mail Crime Torjans
Classification
Financial
crimes Cyber pornography Sale of illegal articles Intellectual Property crimes Email spoofing Forgery
Examples
April 2001 Hydrabad case ( Manohar Moss) Oct 1995 Bombay case ( Stamp paper of 34 crore) Active hackers Group LOVE LETTER Virus
Architecture
Attacker Attack Controller/Master Host
ISP
Attack Agents
Attack Agents
Attack Agents
Attack Agents
Attack Agents
Victim
Working Model
CYBER SPACE
Utilities
Smart Cards Password Revelers Sniffing Tools Wireless Technology Biometric Matchers
Application Domains
Email Related
Email
spoofing Sending malicious codes through email Email bombing Sending threatening emails Defamatory emails
Industry Relevance
Packet Sniffing Password Cracking Buffer overflow Viruses
CONVERGENCE OF TECHNOLOGY
Statistics
1000% 800% 600% 400% 200% 0% WAIS
Communication percentage
FTP
Gopher
Email to hostmaster
HTTP
2000000
1997 1998 1999 2000 2001 Total On-line Adults (millions) Total On-line Shoppers (millions)
40 51 66 85 99
1800000 1600000 1400000 1200000 1000000 800000 600000 GOV NET ORG EDU COM
10
15
23
34
43
400000 200000 0
Mar-95 Mar-96 Mar-97 Dec-94 Dec-95 Dec-96 Jun-95 Jun-96 Sep-95 Sep-96 Jun-97 Sep-97
Results:
Stack overflow email Worms Back Orifice Packet Spoofing Sniffers Hijacking Sessions Disabling Audits PasswordC racking PasswordG uessing Exploiting Known Vulnerabilities Back Doors Satan Icmp Tunneling Macro Virus Central exploit Repository
NMAP
1990
1995
2000
Conclusion
Who is affected by Cyber Crime? How to stop What we can Do?