Professional Documents
Culture Documents
ENFORCEMENT IN INDIA
- W.S.Guruprasath
- V.Palaniraja
- Sri Sankara Arts and Science College,
Kanchipuram.
Introduction to Cyber crime
Computer Crime, E-
Crime, Hi-Tech Crime
or Electronic Crime is
where a computer is the
target of a crime or is
the means adopted to
commit a crime.
Most of these crimes are
not new. Criminals
simply devise different
ways to undertake
standard criminal
activities such as fraud,
theft, blackmail, forgery,
and embezzlement using
the new medium, often
involving the Internet
Types of Cyber crimes
Credit card frauds
Cyber pornography
Sale of illegal articles- Crime against Government
narcotics, weapons, wildlife
Online gambling
Intellectual Property
crimes- software piracy,
copyright infringement,
trademarks violations, Crime against property
theft of computer source
code
Email spoofing
Forgery
Defamation Crime against persons
Cyber stalking (section 509
IPC)
Phising
Cyber terrorism
Computer Viruses
Viruses
A computer virus is a
computer program Viruses
that can infect other
computer programs by
modifying them in
such a way as to
include a (possibly
evolved) copy of it.
Note that a program
does not have to
perform outright File Boot record
Boot and
file
damage (such as infectors infectors
viruses
deleting or corrupting
files) in order to be
called a "virus".
Cyber crimes
Web jacking
Denial of
Information E-mail Salami Trojan
Hacking Service
Theft bombing attacks attacks
attacks
1. Unauthorized Access
3. Packet Sniffing
5. Tempest Attack
7. Password Cracking
9. Buffer Overflow
Frequency of incidents of Cyber crimes in India
Malicious Software
• Melissa, CIH/Chernobyl, Happy99, Explore Zip
• Chews up hard disks, corrupts files, disrupts
operations.
• Transmitted through the internet via popular e-mail
features to propagate itself
Melissa through MS Word 97 and 2000
applications
Happy99.exe Trojan Horse displays “Happy99”
2) War Driving-where
individuals drive (or walk)
Around to find
unprotected and
accessible WAPs
3) Consumer and even
system administrators
fail to configure their
systems adequately
CYBER CRIME
INCIDENT HANDLING
1. Continuing Operations v.
Preservation of Evidence
2. Identify the Incident Manager and
Team – usually department heads or
officers
3. Assess Systems Impaired and
Damages
4. Review Adequate Logging/Tracking
5. Note Unusual Activities By
Employees or on Computer Network
WORKING WITH LAW
ENFORCEMENT
Identify your LOSS, HARM, or DAMAGE
– lost asset, revenues, expenses,
repair cost
Identify Capture or Quarantine
Electronic or Computerized Equipment,
Logs and Files
Maintain a “Chain of Custody” for
Evidence
Begin a written chronology of events
Who may have to testify
Identify one or two individuals to be
your main point of contact with LEOs
Alert Your General Counsel or Attorney
1. Cyber laws punish the Cyber Criminals.
THANK YOU