Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 16

Cyber Crime

By, Shrinidhi K.R.

Introduction
What is Cyber Crime?
Unlawful acts wherein the computer is either a tool or a target or both

History

The case of 1820!. Joseph Marie. The Handloom machine Crime

Associated Technologies

Packet Sniffing
Password cracking Buffer overflow

Basic Technology
Unauthorized Access Viruses E- Mail Crime Torjans

Passwd Torjans Remote Admin Torjan

Classification
Financial

crimes Cyber pornography Sale of illegal articles Intellectual Property crimes Email spoofing Forgery

Examples
April 2001 Hydrabad case ( Manohar Moss) Oct 1995 Bombay case ( Stamp paper of 34 crore) Active hackers Group LOVE LETTER Virus

Architecture
Attacker Attack Controller/Master Host

ISP

Attack Agents

Attack Agents

Attack Agents

Attack Agents

Attack Agents

Victim

Working Model
CYBER SPACE

Subordinate gets the information and plan.

Main Boss issues the commands to the subordinates

And executes the Plan

Utilities
Smart Cards Password Revelers Sniffing Tools Wireless Technology Biometric Matchers

Application Domains

Email Related
Email

spoofing Sending malicious codes through email Email bombing Sending threatening emails Defamatory emails

Industry Relevance
Packet Sniffing Password Cracking Buffer overflow Viruses

CONVERGENCE OF TECHNOLOGY

Computer Languages Password decoders Sniffing utilities

Statistics
1000% 800% 600% 400% 200% 0% WAIS

Communication percentage

Domain registration has increased rapidly, especially in .com.

FTP

Gopher

Email to hostmaster

HTTP

2000000

1997 1998 1999 2000 2001 Total On-line Adults (millions) Total On-line Shoppers (millions)
40 51 66 85 99

1800000 1600000 1400000 1200000 1000000 800000 600000 GOV NET ORG EDU COM

10

15

23

34

43

400000 200000 0
Mar-95 Mar-96 Mar-97 Dec-94 Dec-95 Dec-96 Jun-95 Jun-96 Sep-95 Sep-96 Jun-97 Sep-97

Annual Spending per $235 $316 $345 $358 $400 Person

Results:
Stack overflow email Worms Back Orifice Packet Spoofing Sniffers Hijacking Sessions Disabling Audits PasswordC racking PasswordG uessing Exploiting Known Vulnerabilities Back Doors Satan Icmp Tunneling Macro Virus Central exploit Repository

NMAP

Sweepers Stealth Diagnostics

Self Replicating Code 1980 1985

1990

1995

2000

Conclusion
Who is affected by Cyber Crime? How to stop What we can Do?

Future of Cyber crime


Completely un predictable. WIRELESS Crimes Mobiles will become the common tool for the cyber crime Kids just for fun may hack the whole CBI architecture.

You might also like