Professional Documents
Culture Documents
What is Cybercrime
Crimes committed through the
use of computer or the Internet
or in any other unfair means.
e.g. Drugs, Terrorism,
Money Extortion, Child
Pornography
Cybercrime
Unauthorized Access
Software Piracy
Spreading Virus
Objectionable Materials
Anonymous Mails
SPAM
Hi-Tech Crime
Generally committed by
intelligent, computer literate
and informed individuals
There is a need to amend
current laws in order to
handle the Hi-Tech Crimes
Scope of the Problem
Cyber crime is a global problem
Statistics on such crime cannot
accurately highlight it’s gravity .
Criminals can route their activities
through countries where jurisdictional
process and legal problems can make
investigation difficult.
Cybercrime
Unauthorized Access
Hacking
– Web sites also can be Hacked
Breaking of Computer Security
– Breaking Passwords and Access Codes
Copying Important Information
– Secret Documents
– Software and Source Programs
Bank Accounts :
– Money Laundering, Credit Card Fraud
Unauthorized Access (contd.)
Password Sniffers:
– Computer programs that monitor and
record the name and password of
network users as they login, can be
impersonated .
Spoofing
– Act of disguising one computer
electronically to pretend it to be
another one
Cybercrime
Software Piracy
Illegal Use, Copy, Distribution or
Sell of Computer Software
Prohibited by Law
But few Raids has been made so far
in India
Software companies are interested
to make a large illegal user legal
rather than taking them to the
courts
Losses Suffered by
Companies
Country % of Piracy Losses (M. Dollar)
Australia 45 160
Brazil 80 91
France 73 1200
Germany 62 1000
India 68 40
Italy 86 550
Japan 92 3000
Korea 82 648
Mexico 85 206
Singapore 41 24
Spain 86 362
United Kingdom 54 685
United States 35 1900
Source : NASSCOM
Remedies to Piracy
Hardware Lock and Software Lock .
Educating Users on Perils of Piracy
– Sending Mails
– Stickers : “Copy Software Illegally and you could get
this Hardware Absolutely Free” (with picture of
handcuffs)
– Conducting Seminars
Surprise Raids (NASSCOM)
Supplying Legal Software at reasonable
cost
Cybercrime
Virus Attacks
Self Replicating Program or
Program Segment which normally
harm the functioning of an
otherwise well-behaved Computer
First virus : C-Brain and Ashar :
were released by two Pakistani
brothers in 1987
Categories of Virus:
Boot Sector Virus
Partition Table Virus
File Virus
Email Virus
Some Common Virus
Die Hard 2
– Increases each Executable File size by 4000 bytes
Monkey Virus
– Corrupt the Partition Table
Charas
– Corrupts the File Allocation Table
Friday the 13th
– Formats the whole Hard Disk on a Friday, which is also 13th
of a month
Polymorphic Virus
– Changes Signature on Replicating
Email Virus
I Love You
(Love bug)
Happy 99 .
Remedies to Virus
Careful Usage of Floppies
– Use Write-Protect Tags
Use of Legal Software only
Cleaning by recent Vaccines
Live Update of Anti-virus
Software
Some well-known
Vaccines
Norton Anti-Virus
Nash-soft
Smart Dog
AVG
Red Alert
Cybercrime
Objectionable Materials
Pornography
– Explicit Sexual Materials (Text and/or
Pictures)
– Enters Countries where they are prohibited
by Law
Hate materials
– Racist Views against some caste, creed,
country or religion
Remedies : CyberCops .
Cybercrime
Anonymous Mails
Here the header part of the message is
stripped off
Originally was created for deserving
candidates
– e.g. for users who wish to criticize/expose some social
evil without disclosing their identity
– victims of abuses of some powerful miscreants
Being also used by cybercriminals
– e.g. To mail copyrighted books, software programs
Encrypted Messages
Used by professionals/officers to protect the
secrecy of academic/official documents etc.
A practical equivalent of using trained secret-
agent couriers
Being used also by criminals, terrorist
organizations !
A simple picture file or a music may be
anything starting from a love letter, to a
blackmail note, to a complex money laundering
instruction, to military secrets
Credit Card Fraud
The U.S. secret service
believes that half a billion
dollars may be lost annually
by consumers who have
credit card numbers stolen
from on-line data bases.
Some Incidents:
1)An engineer working in a large bank
reprograms the bank account handling
computer program, so that each day a trifle sum
of money, say $ 3 is credited from some large
bank account to one kept under a false name,
but actually belonging to him.
2)The personal secretary to the president of a
successful multinational company decodes all
the passwords and access codes, changes and
encrypts important money related files and
thereafter starts blackmailing the boss.
Some Incidents (contd.):
3)A nine year old internet user got
hypnotized by his cyber-friend and
cajoled to divulge his father’s credit card
particulars.
4)In Britain, details of the committal
proceedings in a trial in court were
released in Feb’95 on an Internet
discussion forum. Any newspaper doing
so would be charged with contempt of
court.
Created By : PRAKASH AGARWAL & RAMBALAK SHARMA
DATABASE MANAGEME
SYSTEM
CONTENTS
• INTRODUCTION
• ADVANTAGES OF DATABASE
• EXAMPLES OF DATABASE
• DATA ABSTRACTION
• DATA MODELS
• NORMALIZATION
INTRODUCTION
• A database system is basically a comp
based record keeping system.
• It maintains information that is necess
the decision making processes involve
the management of an organization.
• The intention of a database is that the
collection of data should serve as man
applications as possible.
ADVANTAGES OF DATABAS
DATA MODELS
Record Based
Models
BY PRAKASH & RA
GENERATION
OF
COMPUTERS
ABACUS
• Abacus is the first
calculating device .
• This device was
developed in China
during 5000 B.C.
• Abacus has a frame
with beads strung on
wire rods .
• Arithmetic
calculations are
performed by
manipulating the
beads .
NAPIER’
NAPIER’S BONES
• It was devised by John
Napier in 1617 .
• It consist of a set of
eleven bones , each
bone has four faces
with numbers
inscribed on them .
• It could calculate
products and
quotients of large
numbers .
PASCAL’
PASCAL’S ARITHMETIC
ENGINE
• It was devised by Blaise Pascal in
• It had a complex arrangement of w
and gears and windows for display
numbers .
• It was the first successful mechan
calculator .
BABBAGE’
BABBAGE’S ANALYTICAL
ENGINE
• It was designed by Charles
Babbage its design all the
fundamental concepts of digital
computers .
• It had a great significance in the
history of computer because it had
in its design all the fundamental
concepts of digital computers .
• This made Babbage earn the name
“Father Of Modern Computer”
Computer” .
FIRST GENERATION ( 1945-
1945-19
• Characteristics of First
Generation of computers : -
• Vacuum-
Vacuum-tube circuits .
• Punched cards .
• Required machine language
programming
• Generated considerable heat .
• Limited internal storage capacity .
• Eg. ENIAC , EDVAC , EDSAC , UNIVAC I
SECOND GENERATION ( 1959
• Characteristics of Second
Generation of Computers:-
Computers:-
• Transistor circuits .
• Magnetic-
Magnetic-core primary
storage .
• High-
High-level procedural
languages .
• Less heat generated .
• Development of magnetic disk
storage .
• Eg. IBM-
IBM-700 , IBM-
IBM-1401 , ICL 1901
THIRD GENERATION ( 1966-
1966-1
• Characteristics of Third
Generation of Computers :- :-
• Integrated circuits .
• Better storage devices (tapes) .
• Faster than previous
generations .
• Multi programming operating
system .
• Development of mini computers .
• Eg. IBM 360 , IBM 370 , NCR 395 .
FOURTH GENERATION ( 1981-
1981-
• Characteristics of Fourth
Generation of Computers :-:-
• SSI/LSI/VLSI .
• Semi-
Semi-conductor primary
storage .
• Development of electronic
spreadsheets .
• Microprocessors used .
• Faster speed of processing .
• Eg.
Eg. PENTIUM , POWER PC .
FUTURE GENERATION
CALENDAR JAN FEB MAR APR MAY JUNE JULY AUG SEPTOCT NOV DEC
1 6 2 2 5 0 3 5 1 4 6 2 4
2 0 3 3 6 1 4 6 2 5 0 3 5
3 1 4 4 0 2 5 0 3 6 1 4 6
4 2 5 5 1 3 6 1 4 0 2 5 0
5 3 6 6 2 4 0 2 5 1 3 6 1
6 4 0 0 3 5 1 3 6 2 4 0 2
7 5 1 1 4 6 2 4 0 3 5 1 3
WEEK CODES
SUNDAY : 0
MONDAY : 1
TUESDAY : 2
WEDNESDAY : 3
THURSDAY : 4
FRIDAY : : 5
SATURDAY : 6
CALCULATIONS WITH EXAMPLES
• EXAMPLE 1
• 15th AUGUST 1947
• YEAR CODE=4
• MONTH CODE=4
• SO, ( 15+4 ) / 7
• REMAINDER= 5
REMAINDER=
• THEREFORE, IT IS FRIDAY . (Contd.)
(Contd.)
• EXAMPLE 2
• 23/01/1897 (NETAJI’
(NETAJI’S DATE OF BIRTH)
• YEAR CODE=06
• MONTH CODE=04
• SO ( 23+04)/ 7
• REMAINDER 06
REMAINDER=06
• THEREFORE, IT IS SATURDAY .
(Contd.)
• EXAMPLE 3
• 24/04/1973 ( BIRTHDAY OF
LITTLE MASTER , SACHIN
TENDULKAR )
• YEAR CODE=02
• MONTH CODE=06
• SO, (24+6)/ 7
REMAINDER=2
• REMAINDER=2
• THEREFORE, IT IS TUESDAY .
(Contd.)
• EXAMPLE 4
• 14/11/1889 ( BIRTHDAY
OF CHACHAJI )
• YEAR CODE = 03
• MONTH CODE=04
• SO, (14+04)/ 7
• REMAINDER=4
REMAINDER=4
• THEREFORE, IT IS
THURSDAY .
NOTE