You are on page 1of 65

CYBER CRIME

What is Cybercrime
Crimes committed through the
use of computer or the Internet
or in any other unfair means.
e.g. Drugs, Terrorism,
Money Extortion, Child
Pornography
Cybercrime
Unauthorized Access
Software Piracy
Spreading Virus
Objectionable Materials
Anonymous Mails
SPAM
Hi-Tech Crime
Generally committed by
intelligent, computer literate
and informed individuals
There is a need to amend
current laws in order to
handle the Hi-Tech Crimes
Scope of the Problem
 Cyber crime is a global problem
 Statistics on such crime cannot
accurately highlight it’s gravity .
 Criminals can route their activities
through countries where jurisdictional
process and legal problems can make
investigation difficult.
Cybercrime
Unauthorized Access
 Hacking
– Web sites also can be Hacked
 Breaking of Computer Security
– Breaking Passwords and Access Codes
 Copying Important Information
– Secret Documents
– Software and Source Programs
 Bank Accounts :
– Money Laundering, Credit Card Fraud
Unauthorized Access (contd.)

 Password Sniffers:
– Computer programs that monitor and
record the name and password of
network users as they login, can be
impersonated .
 Spoofing
– Act of disguising one computer
electronically to pretend it to be
another one
Cybercrime
Software Piracy
 Illegal Use, Copy, Distribution or
Sell of Computer Software
 Prohibited by Law
 But few Raids has been made so far
in India
 Software companies are interested
to make a large illegal user legal
rather than taking them to the
courts
Losses Suffered by
Companies
Country % of Piracy Losses (M. Dollar)

Australia 45 160
Brazil 80 91
France 73 1200
Germany 62 1000
India 68 40
Italy 86 550
Japan 92 3000
Korea 82 648
Mexico 85 206
Singapore 41 24
Spain 86 362
United Kingdom 54 685
United States 35 1900
Source : NASSCOM
Remedies to Piracy
 Hardware Lock and Software Lock .
 Educating Users on Perils of Piracy
– Sending Mails
– Stickers : “Copy Software Illegally and you could get
this Hardware Absolutely Free” (with picture of
handcuffs)
– Conducting Seminars
 Surprise Raids (NASSCOM)
 Supplying Legal Software at reasonable
cost
Cybercrime
Virus Attacks
 Self Replicating Program or
Program Segment which normally
harm the functioning of an
otherwise well-behaved Computer
 First virus : C-Brain and Ashar :
were released by two Pakistani
brothers in 1987
Categories of Virus:
Boot Sector Virus
Partition Table Virus
File Virus
Email Virus
Some Common Virus
 Die Hard 2
– Increases each Executable File size by 4000 bytes
 Monkey Virus
– Corrupt the Partition Table
 Charas
– Corrupts the File Allocation Table
 Friday the 13th
– Formats the whole Hard Disk on a Friday, which is also 13th
of a month
 Polymorphic Virus
– Changes Signature on Replicating
Email Virus
 I Love You
(Love bug)
 Happy 99 .
Remedies to Virus
Careful Usage of Floppies
– Use Write-Protect Tags
Use of Legal Software only
Cleaning by recent Vaccines
Live Update of Anti-virus
Software
Some well-known
Vaccines
Norton Anti-Virus
Nash-soft
Smart Dog
AVG
Red Alert
Cybercrime
Objectionable Materials
 Pornography
– Explicit Sexual Materials (Text and/or
Pictures)
– Enters Countries where they are prohibited
by Law
 Hate materials
– Racist Views against some caste, creed,
country or religion
 Remedies : CyberCops .
Cybercrime
Anonymous Mails
 Here the header part of the message is
stripped off
 Originally was created for deserving
candidates
– e.g. for users who wish to criticize/expose some social
evil without disclosing their identity
– victims of abuses of some powerful miscreants
 Being also used by cybercriminals
– e.g. To mail copyrighted books, software programs
Encrypted Messages
 Used by professionals/officers to protect the
secrecy of academic/official documents etc.
 A practical equivalent of using trained secret-
agent couriers
 Being used also by criminals, terrorist
organizations !
 A simple picture file or a music may be
anything starting from a love letter, to a
blackmail note, to a complex money laundering
instruction, to military secrets
Credit Card Fraud
The U.S. secret service
believes that half a billion
dollars may be lost annually
by consumers who have
credit card numbers stolen
from on-line data bases.
Some Incidents:
 1)An engineer working in a large bank
reprograms the bank account handling
computer program, so that each day a trifle sum
of money, say $ 3 is credited from some large
bank account to one kept under a false name,
but actually belonging to him.
 2)The personal secretary to the president of a
successful multinational company decodes all
the passwords and access codes, changes and
encrypts important money related files and
thereafter starts blackmailing the boss.
Some Incidents (contd.):
 3)A nine year old internet user got
hypnotized by his cyber-friend and
cajoled to divulge his father’s credit card
particulars.
 4)In Britain, details of the committal
proceedings in a trial in court were
released in Feb’95 on an Internet
discussion forum. Any newspaper doing
so would be charged with contempt of
court.
Created By : PRAKASH AGARWAL & RAMBALAK SHARMA
DATABASE MANAGEME
SYSTEM
CONTENTS
• INTRODUCTION
• ADVANTAGES OF DATABASE
• EXAMPLES OF DATABASE
• DATA ABSTRACTION
• DATA MODELS
• NORMALIZATION
INTRODUCTION
• A database system is basically a comp
based record keeping system.
• It maintains information that is necess
the decision making processes involve
the management of an organization.
• The intention of a database is that the
collection of data should serve as man
applications as possible.
ADVANTAGES OF DATABAS

• Data redundancy :In database all the d


are kept at one place and all the applic
that require data refer to the centrally
maintained database,thus avoiding
duplication of database.
• Sharing of data : In database individua
pieces of data may be shared among se
different users.
Contd....
• Data security : DBMS ensures data sec
by ensuring that the only means of acc
the database is through proper channel
• Atomicity : DBMS considers all the
transactions as atoms, thus efficiently
handling power failures .
EXAMPLES OF DBMS
• Some examples of DBMS software are
• FoxPro
• Microsoft Access
• Sybase
• Oracle
DATA ABSTRACTION
• Data Abstraction : It is the mechanism
extracting the essential part of the data
suppressing the unnecessary part for th
current environment.
• DBMS provide the users only that muc
information that is required by them an
does not disclose all the details of the
by data abstraction.
LEVELS OF DATABAS
• The various levels of database are :
• Internal Level : At this level , complex
level data structures are described in d
• Conceptual Level : At this level , the
database is described logically in term
simple data structures.
• View Level : At this level , only select
attributes are visible to the user.
DATA MODELS

DATA MODELS

OBJECT BASED LOGICAL RECORD BASED LOGICAL PHYSIC


MODELS MODELS MO
RECORD BASED MODE

Record Based
Models

Relational Model Network Model Hierarchica


RECORD BASED MODE
• The various types of record based logi
models are :
• Relational Model: In this model, data a
relationship among data are represente
a set of tables .
• Network Model : In this model, the the
collection of records are connected to
another by means of links.
Contd...
• Hierarchical Model : In this model, the
records are organized as trees rather th
arbitrary graphs.
NORMALIZATION
• Normalization: It is a database design
technique which is used to minimize
database anomalies.
• 1NF: A relation is said to be in 1NF if
the attributes in it are atomic.
• 2NF: A relation is said to be in 2NF if
in 1NF and all non key attributes are fu
functionally dependent on key attribut
Contd...
• 3NF: A relation is said to be in 3NF if
in 2NF and every non key attribute is n
transitively dependent upon the primar
key.
• BCNF: A relation is said to be in BCN
in 3NF and every determinant in the ta
a candidate key.
SOME DISADVANTAGE
• Some disadvantages of DBMS are :
• Extra hardware may be required.
• System is likely to be complex.
• Performance overhead may be signific
• Security may be compromised withou
controls.
APPLICATIONS OF DBM
• Some applications of DBMS are:
• Educational institutions
• Railway Reservations
• Hospitals
• Offices
THANK YOU

BY PRAKASH & RA
GENERATION
OF
COMPUTERS
ABACUS
• Abacus is the first
calculating device .
• This device was
developed in China
during 5000 B.C.
• Abacus has a frame
with beads strung on
wire rods .
• Arithmetic
calculations are
performed by
manipulating the
beads .
NAPIER’
NAPIER’S BONES
• It was devised by John
Napier in 1617 .
• It consist of a set of
eleven bones , each
bone has four faces
with numbers
inscribed on them .
• It could calculate
products and
quotients of large
numbers .
PASCAL’
PASCAL’S ARITHMETIC
ENGINE
• It was devised by Blaise Pascal in
• It had a complex arrangement of w
and gears and windows for display
numbers .
• It was the first successful mechan
calculator .
BABBAGE’
BABBAGE’S ANALYTICAL
ENGINE
• It was designed by Charles
Babbage its design all the
fundamental concepts of digital
computers .
• It had a great significance in the
history of computer because it had
in its design all the fundamental
concepts of digital computers .
• This made Babbage earn the name
“Father Of Modern Computer”
Computer” .
FIRST GENERATION ( 1945-
1945-19
• Characteristics of First
Generation of computers : -
• Vacuum-
Vacuum-tube circuits .
• Punched cards .
• Required machine language
programming
• Generated considerable heat .
• Limited internal storage capacity .
• Eg. ENIAC , EDVAC , EDSAC , UNIVAC I
SECOND GENERATION ( 1959
• Characteristics of Second
Generation of Computers:-
Computers:-
• Transistor circuits .
• Magnetic-
Magnetic-core primary
storage .
• High-
High-level procedural
languages .
• Less heat generated .
• Development of magnetic disk
storage .
• Eg. IBM-
IBM-700 , IBM-
IBM-1401 , ICL 1901
THIRD GENERATION ( 1966-
1966-1
• Characteristics of Third
Generation of Computers :- :-
• Integrated circuits .
• Better storage devices (tapes) .
• Faster than previous
generations .
• Multi programming operating
system .
• Development of mini computers .
• Eg. IBM 360 , IBM 370 , NCR 395 .
FOURTH GENERATION ( 1981-
1981-
• Characteristics of Fourth
Generation of Computers :-:-
• SSI/LSI/VLSI .
• Semi-
Semi-conductor primary
storage .
• Development of electronic
spreadsheets .
• Microprocessors used .
• Faster speed of processing .
• Eg.
Eg. PENTIUM , POWER PC .
FUTURE GENERATION

• Characteristics of Future Generati


Computers :-:-
• Use of semi-
semi-conductors .
• Parallel processing .
INTRODUCTION

• MANY OF US DO NOT KNOW OUR OWN


BIRTHDAY & OTHER IMPORTANT
DAYS .
• THIS METHOD ENABLES US TO FIND
THE DAY OF ANY DESIRED DATE BY
USING YEAR, MONTH, & WEEK CODES.
PERIODICITY

• ALL CALENDARS ARE PERIODIC IN


NATURE .
• EVERY 29th YEAR REPEATS 1st YEAR
BASIC FORMULA
• THE BASIC FORMULA FOR IT IS :
• STEP I - MATCH THE YEAR CODE
• STEP II - MATCH MONTH CODE AND DIVIDE IT
BY 7 (Constant) .
• THE DAY IS DETERMINED ACCORDING TO THE
REMAINDER .
210 CALENDARS
YEARS ALONG WITH YEAR CODE
YEAR Y.C* YEAR Y.C YEAR Y.C YEAR Y.C YEAR Y.C YEAR Y.C YEAR Y.C

1801 5 1831 7 1861 3 1891 5 1921 7 1951 2 1981 5


1802 6 1832 1 1862 4 1892 6 1922 1 1952 3 1982 6
1803 7 1833 3 1863 5 1893 1 1923 2 1953 5 1983 7
1804 1 1834 4 1864 6 1894 2 1924 3 1954 6 1984 1
1805 3 1835 5 1865 1 1895 3 1925 5 1955 7 1985 3
1806 4 1836 6 1866 2 1896 4 1926 6 1956 1 1986 4
1807 5 1837 1 1867 3 1897 6 1927 7 1957 3 1987 5
1808 6 1838 2 1868 4 1898 7 1928 1 1958 4 1988 6
1809 1 1839 3 1869 6 1899 1 1929 3 1959 5 1989 1
1810 2 1840 4 1870 7 1900 2 1930 4 1960 6 1990 2
1811 3 1841 6 1871 1 1901 3 1931 5 1961 1 1991 3
1812 4 1842 7 1872 2 1902 4 1932 6 1962 2 1992 4
1813 6 1843 1 1873 4 1903 5 1933 1 1963 3 1993 6
1814 7 1844 2 1874 5 1904 6 1934 2 1964 4 1994 7
1815 1 1845 4 1875 6 1905 1 1935 3 1965 6 1995 1
1816 2 1846 5 1876 7 1906 2 1936 4 1966 7 1996 2
1817 4 1847 6 1877 2 1907 3 1937 6 1967 1 1997 4
1818 5 1848 7 1875 3 1908 4 1938 7 1968 2 1998 5
1819 6 1849 2 1879 4 1909 6 1939 1 1969 4 1999 6
1820 7 1850 3 1880 5 1910 7 1940 2 1970 5 2000 7
1821 2 1851 4 1881 7 1911 1 1941 4 1971 6 2001 2
1822 3 1852 5 1882 1 1912 2 1942 5 1972 7 2002 3
1823 4 1853 7 1883 2 1913 4 1943 6 1973 2 2003 4
1824 5 1854 1 1884 3 1914 5 1944 7 1974 3 2004 5
1825 7 1855 2 1885 5 1915 6 1945 2 1975 4 2005 7
1826 1 1856 3 1886 6 1916 7 1946 3 1976 5 2006 1
1827 2 1857 5 1887 7 1917 2 1947 4 1977 7 2007 2
1828 3 1858 6 1888 1 1918 3 1948 5 1978 1 2008 3
1829 5 1859 7 1889 3 1919 4 1949 7 1979 2 2009 5
1830 6 1860 1 1890 4 1920 5 1950 1 1980 3 2010 6
CODES FOR EVERY MONTH AND WEEK
MONTH CODES

CALENDAR JAN FEB MAR APR MAY JUNE JULY AUG SEPTOCT NOV DEC
1 6 2 2 5 0 3 5 1 4 6 2 4
2 0 3 3 6 1 4 6 2 5 0 3 5
3 1 4 4 0 2 5 0 3 6 1 4 6
4 2 5 5 1 3 6 1 4 0 2 5 0
5 3 6 6 2 4 0 2 5 1 3 6 1
6 4 0 0 3 5 1 3 6 2 4 0 2
7 5 1 1 4 6 2 4 0 3 5 1 3

WEEK CODES
SUNDAY : 0
MONDAY : 1
TUESDAY : 2
WEDNESDAY : 3
THURSDAY : 4
FRIDAY : : 5
SATURDAY : 6
CALCULATIONS WITH EXAMPLES
• EXAMPLE 1
• 15th AUGUST 1947
• YEAR CODE=4
• MONTH CODE=4
• SO, ( 15+4 ) / 7
• REMAINDER= 5
REMAINDER=
• THEREFORE, IT IS FRIDAY . (Contd.)
(Contd.)
• EXAMPLE 2
• 23/01/1897 (NETAJI’
(NETAJI’S DATE OF BIRTH)
• YEAR CODE=06
• MONTH CODE=04
• SO ( 23+04)/ 7
• REMAINDER 06
REMAINDER=06
• THEREFORE, IT IS SATURDAY .
(Contd.)
• EXAMPLE 3
• 24/04/1973 ( BIRTHDAY OF
LITTLE MASTER , SACHIN
TENDULKAR )
• YEAR CODE=02
• MONTH CODE=06
• SO, (24+6)/ 7
REMAINDER=2
• REMAINDER=2
• THEREFORE, IT IS TUESDAY .
(Contd.)
• EXAMPLE 4
• 14/11/1889 ( BIRTHDAY
OF CHACHAJI )
• YEAR CODE = 03
• MONTH CODE=04
• SO, (14+04)/ 7
• REMAINDER=4
REMAINDER=4
• THEREFORE, IT IS
THURSDAY .
NOTE

• THE DAYS FROM 1-


1-5 OF THE FIRST
WEEK OF A MONTH CANNOT BE
FOUND OUT BY THIS METHOD,
HOWEVER IT CAN BE CALCULATED
BY USING THE LAST DAY OF
PREVIOUS MONTH .
AN EXAMPLE
• 02/10/1869 ( BAPUJI’
BAPUJI’S DATE OF BIRTH )
• HERE WE HAVE TO FIRST FIND OUT 30th SEPTEMBER
• YEAR CODE=06
• MONTH CODE=02
• SO, (30+2)/ 7
• REMAINDER=4
REMAINDER=4
• THEREFORE,30th SEPTEMBER IS THURSDAY
• AND 2nd OCTOBER IS SATURDAY .
FOR LEAP YEARS
• IN THIS CASE 1 WILL BE ADDED TO THE MONTH CODE
FROM THE MONTH OF MARCH .
• EXAMPLE
• 16th DECEMBER 2004
• YEAR CODE=05
• MONTH CODE=1+1 ( LEAP YEAR )
• SO, (16+2)/ 7
• REMAINDER=4
REMAINDER=4
• THEREFORE IT IS THURSDAY .
NOW TRY YOURSELF
• YOUR DATE =
• YEAR CODE =
• MONTH CODE =
• SO, ( + ) / 7
• REMAINDER =
• THEREFORE ,IT IS …………. .

You might also like