Date post: | 10-Apr-2018 |
Category: |
Documents |
Upload: | saadia-s-sadiq |
View: | 228 times |
Download: | 0 times |
of 16
8/8/2019 CYBER CRIME FINAL (nimra)
1/16
CYBER CRIME
1. Cyber Crime
Cyber crime encompasses any criminal act dealing with computers and networks.
Additionally, cyber crime also includes traditional crimes conducted through the
Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft,
and credit card account thefts are considered to be cyber crimes when the illegalactivities are committed through the use of a computer and the Internet.
Cyber crime is any crime that is related to computer , internet and technology(Cyber
crime By Bernadette Hlubik Schell, Clemens Martin).
2.2. TYPES OF CYBER CRIMETYPES OF CYBER CRIME
HACKINGHacking is the act of gaining access to a computer or computer network without legal
authorization.The person who uses any network or computer without any authorization is known as a
hacker.
Types of hacking
1. Website hacking
2. Software hacking3. System hacking
4. E-mail hacking
Malware disseminationMalicious software or code that attaches itself to some other software. It is a software
designed specifically to damage or disrupt a system. For example
I. VirusII. Worms
III. Trojans
IV. Time bombsV. Logic bombs
VI. Rabbit & Baterium
Maleware or virus spread like fire. First a file virus attaches itself to a file, usually an
executable application (e.g. a word processing program or a DOS
program). It is commonly transmitted through e-mail id.They usually affect the data on a computer, either by altering or deleting it. Worms,
unlike viruses do not need the host to attach themselves to. They merely make functional
copies of themselves and do this repeatedly till they eat up all the available space on a
computer's memory.
http://www.webopedia.com/TERM/C/cyber.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/network.htmlhttp://www.webopedia.com/TERM/C/Internet.htmlhttp://www.webopedia.com/TERM/C/cyber.htmlhttp://www.webopedia.com/TERM/C/computer.htmlhttp://www.webopedia.com/TERM/C/network.htmlhttp://www.webopedia.com/TERM/C/Internet.html8/8/2019 CYBER CRIME FINAL (nimra)
2/16
CYBER CRIME
PhishingPhishing is an e-mail fraud method in which the perpetrator sends out legitimate-
looking email in an attempt to gather personal and financial information from
recipients. Typically, the messages appear to come from well known and trustworthyWeb sites. Web sites that are frequently spoofed by phishers include PayPal, eBay,
MSN, Yahoo, BestBuy, and America Online. A phishing expedition, like the fishing
expedition it's named for, is a speculative venture: the phisher puts the lure hoping tofool at least a few of the prey that encounter the bait.
Spoofing
Spoofing is the creation of TCP/IP packets using somebody else's IP addressE-mail spoofing is the forgery of an e-mail header so that the message appears to
have originated from someone or somewhere other than the actual source.
Distributors ofspam often use spoofing in an attempt to get recipients to open, andpossibly even respond to,
Kinds of spoofing
IP spoofing
E-mail spoofing
Content spoofing
Credit TheftYou simply have to type credit card number into www page off the vendor for online
transaction. If electronic transactions are not secured the credit card numbers can be
stolen byte hackers who can misuse this card by impersonating credit card owner the
credit card owner.
http://searchsoa.techtarget.com/sDefinition/0,,sid26_gci927888,00.htmlhttp://whatis.techtarget.com/definition/0,,sid9_gci213411,00.htmlhttp://whatis.techtarget.com/definition/0,,sid9_gci213480,00.htmlhttp://whatis.techtarget.com/definition/0,,sid9_gci213480,00.htmlhttp://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci213031,00.htmlhttp://searchsoa.techtarget.com/sDefinition/0,,sid26_gci927888,00.htmlhttp://whatis.techtarget.com/definition/0,,sid9_gci213411,00.htmlhttp://whatis.techtarget.com/definition/0,,sid9_gci213480,00.htmlhttp://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci213031,00.html8/8/2019 CYBER CRIME FINAL (nimra)
3/16
CYBER CRIME
PornographyPornography means indecent exposure through images or videos( the worst kind ofpornography is child porn).Anybody can view obscene material even children
Pornography industrys revenues larger than the revenues of technology companies
combined: Microsoft, Google, Amazon, eBay, Yahoo!, Apple, etc
2006 Worldwide Pornography Revenues
Pirated softwarePiracy is unauthorized copying of software.Retail programs are licensed for use at
just one computer site or for use by only one user at any time.
It can be done in various ways
Illegal internet downloads
Hard disk loading
Counterfeiting
Softlifting or end-user piracy
Denial of services attackThis is an act by the criminal,, who Floods the bandwidth of the victims Network or
fills his e-mail box with Spam mail depriving him of the Services he ibis entitled toaccess or Provide
8/8/2019 CYBER CRIME FINAL (nimra)
4/16
CYBER CRIME
The computer of the victim is flooded with more requests than it can handle which
cause it to crash. Distributed Denial of Service (DDoS) attack is also a type of denial
of service attack, in which the offenders are wide in number and widespread.
Common types of DOS attack
1. Buffer attack2. SYN Attack
3. Teardrop Attack
4. Smurf Attack5. Viruses
6. Physical Infrastructure Attacks
Cyber stalkingCyber stalking is almost always characterized by the stalker relentlessly pursuing
his\her victim online and is much more likely to include some form of offline attack,
as well. This offline aspect makes it a more serious situation as it can easily lead to
dangerous physical contact, if the victims location is known. Different methods ofstalking through computer are as follow
1. E-mail
2. Instant messaging
3. IMs posted on a website
Cyber terrorismCyber terrorism is a use of computing resources to intimidate or coerce others by
terrorists.OR
Use of information technology by terrorist groups and individuals to further their
agenda.
Cyber terrorism is any "premeditated, politically motivated attack againstinformation, computer systems, computer programs, and data which results inviolence against non-combatant targets by sub-national groups or clandestineagents."
Cyber defamationIt is an act of imputing any person with intent to lower the person in the estimation of
the right-thinking members of society generally or to cause him to be shunned or
avoided or to expose him to hatred, contempt or ridicule. Cyber defamation is notdifferent from conventional defamation except the involvement of a virtual medium
Identity TheftObtains key pieces of personal information, such as Social Security or driver's license
numbers, in order to pose as someone else.
8/8/2019 CYBER CRIME FINAL (nimra)
5/16
CYBER CRIME
Salami attacks
In such crime criminal makes insignificant changes to some sites for example onlineshopping sites in such a manner that such changes would go unnoticed.
Criminal makes such program that deducts small amount like Rs. 2.50 per month
from the account of all the customer of the Bank and deposit the same in his account.In this case no account holder will approach the bank for such small amount but
criminal gains huge amount.
IRC Crime
Internet Relay Chat (IRC) servers have chat rooms in which people from anywhere
the world can come togetherand chat with each other Criminals use it for meeting coconspirators.
Hackers use it for discussing their exploits / sharing the techniques
Paedophiles use chat rooms to allure small children
Cyber Stalking - In order to harass a woman her telephone number is given to others
as if she wants to befriend males
Paedophilia
Paedophilia is the slaughter of innocence . Paedophilia is a sexual attraction to children
by an adult. Internet or computer allows paedophiles because of the following reasons
1. Instant access to other predators worldwide;2.Open discussion of their sexual desires; ways to lure victims;
3. Mutual support of their adult child sex philosophies;
4. Instant access to potential child victims worldwide;5 Disguised identities for approaching children, even to the point of presenting as a
member of teen groups;
6. Ready access to "teen chat rooms" to find out how and why to target as potentialvictims;7. Shared ideas about Means to identify and track down home contact information;
8. Ability to build a long-term "Internet" relationship with a potential victim, prior to
attempting to engage the child in physical contact.
8/8/2019 CYBER CRIME FINAL (nimra)
6/16
CYBER CRIME
3. CYBER CRIMINAL
Cyber criminal is a person who performs or commits crime by the abuse of electronic
media or influencing the computer or computer devices. The cyber criminal doesnt need
to be physically at the scene of the crime, it could be somebody operating from anothercomputer .
So, we can easily categories cyber criminals in to the following catogeries
1. Kids & Teenagers (age group 9-16 etc.)2. Disgruntled employees
3. Political hacktivist4. Professional hackers5. Paedophilies (child predators)
6. Business rivals
Kids & Teenagers (age group 9-16 etc.)
Its hard to believe but according to gallop survey most of the hackers are young children
and teenagers. Children who have just enter the world of internet are completely unawareof the seriousness of the situation .Their motive or intentions are merely to impress or
stand out among their friends but its more serious than that because once you have
entered the world of cyber crime nothings seems wrong and it urge us to know more
about the tactics other cyber criminals uses .
Disgruntled employee
Disgruntled employees can sometime give their bosses a really tough time by seekingrevenge from them through cyber crime . It is easier for disgruntled employees to do
more harm to their employers by committing computer related crimes, which can bring
entire systems down.
8/8/2019 CYBER CRIME FINAL (nimra)
7/16
CYBER CRIME
Political hacktivists
Hacktivists are hackers with a particular (mostly political) motive. In other cases thisreason can be social activism, religious activism, etc. The attacks on approximately
200 prominent Indian websites by a group of hackers known as Pakistani Cyber
Warriors are a good example of political hacktivists at work.
Professional hackers (Corporate espionage)
The most dangerous of all the cyber criminals are professional hacker whose basic
motives are to steal personal document , money , personal information, bringcompanies systems down etc.
Paedophiles
Other group of cyber criminals arepaedophiles. Paedophiles are those people who
approach children on internet and tries to built a relationship with them while chatting
and sometimes they also attempts to engage them in a physical relationship.
Business rivalBusiness rivals would attempt to steal the companys confidential documents or
secret by hacking in to the companys computer .
4. VICTIMSOFCYBERCRIMINALSWe can generalize the victims of cyber crime in to three categories:
1. Gullible
2. unskilled , unprofessional people3. desperate and greedy people
5. HOWISCYBERCRIMEDONE?Cyber crime can be done through various methods but the most commonly used methodsare as follow
1. Computer hi-jacking
2. Transmission of virus3. Spywares
4. Key loggers
5. Hacking tools
6. Spam email
6. MOTIVES OF CYBER CRIMINALS
The motives behind cyber crime are as follow
Gathering Trophies (quest to become famous)
General Mischief
Financial Gain
Revenge
Protest
Criminal activity
8/8/2019 CYBER CRIME FINAL (nimra)
8/16
CYBER CRIME
Identity Theft
Forging Documents and Messages
Use of computer spam server
porn sever
hack in to other pcs7. FIRST CYBER CRIME REPORTED
The first recorded cyber crime took place in the year 1820! That is not surprising
considering the fact that the abacus, which is thought to be the earliest form of a
computer, has been around since 3500 B.C. in India, Japan and China. The era of moderncomputers, however, began with the analytical engine of Charles Babbage.
In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom.
This device allowed the repetition of a series of steps in the weaving of special fabrics.
This resulted in a fear amongst Jacquard's employees that their traditional employment
and livelihood were being threatened. They committed acts of sabotage to discourageJacquard from further use of the new technology. This is the first recorded cyber crime.
8. DOCUMENTED CASES OF CYBER CRIMEthe documented cases of cyber crime reported and had vast ranging effects are as follow:
The Yahoo! website was attacked at 10:30 PST on Monday, 7 February2000. The
attack lasted three hours. Yahoo was pinged at the rate of one gigabyte/second.
On 3 August 2000, Canadian federal prosecutors charged MafiaBoy with 54
counts of illegal access to computers, plus a total of ten counts of mischief to data
for his attacks on Amazon.com, eBay, Dell Computer, Outlaw.net, and Yahoo.MafiaBoy had also attacked other websites, but prosecutors decided that a total of
66 counts was enough. MafiaBoy pled not guilty.
About fifty computers at Stanford University, and also computers at the
University of California at Santa Barbara, were amongst the zombie computers
sending pings in DoS attacks.
In 26 March1999, the Melissa worminfected a document on a victim's computer,
then automatically sent that document and copy of the virus via e-mail to other
people.
9. CYBERCRIMETHEFASTGROWINGBUSINESS
"The modern thief can steal more with a computer than with a gun. Tomorrow's terroristmay be able to do more damage with a keyboard than with a bomb".
National Research Council, "Computers at Risk", 1991
http://en.wikipedia.org/wiki/February_7http://en.wikipedia.org/wiki/February_7http://en.wikipedia.org/wiki/2000http://en.wikipedia.org/wiki/2000http://en.wikipedia.org/wiki/August_3http://en.wikipedia.org/wiki/August_3http://en.wikipedia.org/wiki/August_3http://en.wikipedia.org/wiki/2000http://en.wikipedia.org/wiki/2000http://en.wikipedia.org/wiki/MafiaBoyhttp://en.wikipedia.org/wiki/Amazon.comhttp://en.wikipedia.org/wiki/EBayhttp://en.wikipedia.org/wiki/EBayhttp://en.wikipedia.org/wiki/Dell_Computerhttp://en.wikipedia.org/wiki/Dell_Computerhttp://en.wikipedia.org/wiki/Yahoohttp://en.wikipedia.org/wiki/Stanford_Universityhttp://en.wikipedia.org/wiki/Zombie_computerhttp://en.wikipedia.org/wiki/March_26http://en.wikipedia.org/wiki/1999http://en.wikipedia.org/wiki/Melissa_(computer_worm)http://en.wikipedia.org/wiki/Melissa_(computer_worm)http://en.wikipedia.org/wiki/February_7http://en.wikipedia.org/wiki/2000http://en.wikipedia.org/wiki/August_3http://en.wikipedia.org/wiki/2000http://en.wikipedia.org/wiki/MafiaBoyhttp://en.wikipedia.org/wiki/Amazon.comhttp://en.wikipedia.org/wiki/EBayhttp://en.wikipedia.org/wiki/Dell_Computerhttp://en.wikipedia.org/wiki/Yahoohttp://en.wikipedia.org/wiki/Stanford_Universityhttp://en.wikipedia.org/wiki/Zombie_computerhttp://en.wikipedia.org/wiki/March_26http://en.wikipedia.org/wiki/1999http://en.wikipedia.org/wiki/Melissa_(computer_worm)8/8/2019 CYBER CRIME FINAL (nimra)
9/16
CYBER CRIME
Cyber crime is the fastest growing crime around the world and there are various reasons
behind it.
Anonymity of the hacker or cybercriminal
Its easy to hide your crime and not left any loop holes
It cannot be detected
Most of the systems around the world donot have good or no firewalls or securityapplications
Lack of awareness of the user
Internet provides anonymity: This is one of the reasons why criminals try to get away
easily when caught and also give them a chance to commit the crime again. Therefore,
we users should be careful. We should not disclose any personal information on theinternet or use credit cards and if we find anything suspicious in e-mails or if the system
is hacked, it should be immediately reported to the Police officials who investigate cyber-
crimes rather than trying to fix the problem by ourselves.
Computer crime is a multi-billion dollar problem. Law enforcement must seek ways tokeep the drawbacks from overshadowing the great promise of the computer age.Cybercrime is a menace that has to be tackled effectively not only by the official but also
by the users by co-operating with the law. The founding fathers of internet wanted it to be
a boon to the whole world and it is upon us to keep this tool of modernisation as a boon
and not make it a bane to the society.
The picture below shows the increasing rate of cyber crime from jan-june 2002
E-INFOPROMOTINGCYBERCRIMES
8/8/2019 CYBER CRIME FINAL (nimra)
10/16
CYBER CRIME
One of the main reasons why cyber crime is one of the fastest growing business is
because internet is a medium through which other cyber criminals develops interest in
the teenagers and other people to learn and use it . It doesnt seem wrong and looks morelike fun when one thinks of doing it . But invading anyones privacy is a crime.
We can find anything on internet whether it is encrypted music, movies , any kind of data
, porn all you have to do is search for it and you can get all the information that isrequired .
There are millions of sites on internet which not only shows how to hack, make virus,
take over someones computer, even break locks etc is done but also sells the softwareonline.
Hackers being paid
Hacking for fun has evolved into hacking for profit, and created a business model that is
nearly as sophisticated as that of legal software. evolution from hacking and virus writing
for fun to creating malicious code for profit. Security experts are increasingly pointing to
the existence of a "black" or "shadow" cyber-economy, where malware services are sold
online using the same kinds of development methods and guarantees given by legitimatesoftware vendors.
Cyber Crime is Vulnerable (Reporting Cyber Crime)
There are a number of reasons why a cyber crime victim may not report the crime to the
authorities: A feeling that nothing can be done because it
1. is too late to rectify the harm caused
A feeling that there is little chance that the police will identify, detain and
prosecute the offender:2. because the Internet offers relative anonymity and an easy way to shield
identity3. the police have limited resources and expertise4. to tackle cybercrime so may discourage the victim from pursuing a formal
complaint as investigation would be too difficult
5. victims reportthat the police emphasise the futility of making an officialreport or state (wrongly) that the reported conduct is not a criminal offence
in an attempt to dissuade the victim from pursuing the matter
6. Given these issues, it is hardly surprising that officialcrime statistics areregarded as representing only the tip of the iceberg of the totality of
criminal behaviour and that cyber crime, in particular, is massively under-
reported.
8/8/2019 CYBER CRIME FINAL (nimra)
11/16
CYBER CRIME
10. EFFECTS OF CYBER CRIME ECONOMIC EFFECT
National Research Council study that shows computer crime is a drag on the nationaleconomy by billions of dollars. Cyber crime needs to be more of a concern because it
impacts costs that are passed on to consumers. the possibility of criminals gaining access
to systems critical to sectors such as utilities or the banking industry is a national threat .
No group -- from home computer users, to corporations to the government is immune tocybercrime. It may be considered a recession, this is an area that should be of concern
because it affects costs that are passed on to consumers. One national threat, he says, is
the possibility of criminals getting into systems critical to the Department of Defense,utility companies and the banking industry. Although it doesnt effect the consumer
directly but it has vast ranging effect that can collapse our economy.
EFFECTS OF CYBER CRIME ON SOCIETY
INCONVIENIENCE & DEPRESSION
Cyber crime has many harmful effects on society as a whole. Its not only ruining oureconomy but also the inconvenience it causes for the computer users. The inconvenience
and depression the computer users have to go through when their identity is used by
some other person, or when their computer faces a major shutdown due to virus or by
some hacker.
RATIO OF CRIMES
The fast increase in computer crime is directly affecting the crime rate as it is difficult to
detect cyber crime more and more people are entering in to this business, causing the
ratio ofcrime to reach its maximum heights.
PAEDOPHILES (ON CHILDREN)
As we have discussed earlier that paedophiles is the slaughter of innocence and its effects
on minds of young children are vast ranging, base of many psychological diseases.Children suffering from child abuse mostly suffer from mental diseases as lack of
confidence, different kind of phobias that are ever lasting.
PORNOGRAPHY
It should be noted as well that cyber crime is also spreading other vices in our societysuch as porn addiction and is actually polluting the minds of every person around the
8/8/2019 CYBER CRIME FINAL (nimra)
12/16
CYBER CRIME
world. Anyone can access the obscene contents with one click of a mouse including
children.
11.HOW TO STOP CYBER CRIMEThe government and other organization should take strict measures to stop and punishcyber criminals and they have to take the laws seriously and treat it as a regular crime.
Following measures should be brought about by government and police and investigating
agencies.
Research Needs For Computer Crime
Preparation Of Search Warrants For Computer-Related Evidence Excerpts From Computer Search Warrants
PREVENTION OF CYBER CRIME:
INDIVIDUALPRECAUTIONS:
Prevention is always better than cure. It is always better to take certain precaution
while operating the net. A should make them his part of cyber life A netizen
should keep in mind the following things-
1. to prevent cyber stalking avoid disclosing any information
pertaining to oneself. This is as good as disclosing your identity to strangers in
public place.
2. always avoid sending any photograph online particularly tostrangers and chat friends as there have been incidents of misuse of the
photographs.
3. always use latest and up date anti virus software to guard against
virus attacks.
4. always keep back up volumes so that one may not suffer data lossin case of virus contamination
5. never send your credit card number to any site that is not secured,
to guard against frauds.
6. always keep a watch on the sites that your children are accessing toprevent any kind of harassment or depravation in children.
http://www.crime-research.org/zip/Comprpt2.ziphttp://www.crime-research.org/zip/Ingraham.ziphttp://www.crime-research.org/zip/Cpu_Sw00.ziphttp://www.crime-research.org/zip/Comprpt2.ziphttp://www.crime-research.org/zip/Ingraham.ziphttp://www.crime-research.org/zip/Cpu_Sw00.zip8/8/2019 CYBER CRIME FINAL (nimra)
13/16
CYBER CRIME
7. it is better to use a security programme that gives control over the
cookies and send information back to the site as leaving the cookies unguarded
might prove fatal.
8. web site owners should watch traffic and check any irregularity on
the site. Putting host-based intrusion detection devices on servers may do this.
9. if you have high-speed (broadband) Internet access in your office,
think about getting either a hardware or software firewall to protect yourcomputer system.use of firewalls may be beneficial.
10. web servers running public sites must be physically separate
protected from internal corporate network.
11. Refrain from opening e-mail and e-mail attachments from individuals you
do not know.
12. Do not execute .EXE or unknown files directly from your e-mail.13. Look at purchasing Anti-virus and security software and have it updated
on at least a weekly basis.
GOVERNMENTSROLEINPREVENTIONOFCYBERCRIMELAWS , ACTSANDBILLS
It also commendable that government has done so much to prevent and stop cyber crime
although no worthy result was drawn from it . The very first bill passed against cyber
crime was Privacy protection act of 1980.Below is the short history of laws,bills and acts passed to prevent cyber crime and punish
cyber criminals.
Privacy Protection Act Of 1980, Chapter 21a - Privacy ProtectionSubchapter I--First Amendment Privacy Protection
Communications Privacy Act Of 1986 (Wire And Electronic
Communications Interception And Interception Of Oral Communications)
Copyright felony act (3 oct 1992)
Alabama Computer Crime Act, Computer Crime Statutes, May 1, 1995 -
Counterfeiting And Forgery
United States Code, Title 18 - Crimes And Criminal Procedure (Part I -Crimes),January 1, 1998 - Counterfeiting And Forgery
Federal Guidelines For Searching And Seizing Computers
Code Of Virginia, Crimes Against Property, Computer Crimes
2004 CSI/FBI Computer Crime And Security Survey
2005 CSI/FBI Computer Crime And Security Survey
Cyber-Crime Act of 2007
CYBER-CRIME COURTS
Different Governements have taken this step and introduced a new wing in courts that
deals with cyber crime case USA and UK are one of the best examples.
http://www.crime-research.org/zip/Ppa.ziphttp://www.crime-research.org/zip/Ppa.ziphttp://www.crime-research.org/zip/Ecpawire.ziphttp://www.crime-research.org/zip/Ecpawire.ziphttp://www.crime-research.org/zip/Stcclaws.ziphttp://www.crime-research.org/zip/Stcclaws.ziphttp://www.crime-research.org/zip/18usc.ziphttp://www.crime-research.org/zip/18usc.ziphttp://www.crime-research.org/zip/Doj_Gdl.ziphttp://www.crime-research.org/zip/CCAct2000.ziphttp://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2004.pdfhttp://www.gocsi.com/press/20050714.jhtmlhttp://www.crime-research.org/zip/Ppa.ziphttp://www.crime-research.org/zip/Ppa.ziphttp://www.crime-research.org/zip/Ecpawire.ziphttp://www.crime-research.org/zip/Ecpawire.ziphttp://www.crime-research.org/zip/Stcclaws.ziphttp://www.crime-research.org/zip/Stcclaws.ziphttp://www.crime-research.org/zip/18usc.ziphttp://www.crime-research.org/zip/18usc.ziphttp://www.crime-research.org/zip/Doj_Gdl.ziphttp://www.crime-research.org/zip/CCAct2000.ziphttp://i.cmpnet.com/gocsi/db_area/pdfs/fbi/FBI2004.pdfhttp://www.gocsi.com/press/20050714.jhtml8/8/2019 CYBER CRIME FINAL (nimra)
14/16
CYBER CRIME
Awareness about cyber crimeThrough books
There have been different books published to aware users of the cyber crime and how
they can save themselves from being a victim of cyber crime for e.gCyber crime: how to protect yourself from cyber criminals by Laura.E
Web Stalkers by Stephen andert, Donald k BruelsonPhishing exposed: by Lance James, Joe Stewart, Walter Joseph Stewart
Online Sites
Different organizations government and voluntary are also trying to bring awareness inpeople thorough online sites where you can learn about how to protect yourself from
identity, credit theft and various kind of malaware. You can also report cases of cyber
crime and download or purchase software that protects your identity.
Online Videos and DocumentariesWe can also update ourselves and get guidance from online videos. These videosencourages people to purchase or download anti viruses and report cyber crime cases.
FACTS AND FIGURES 1 in 8 adults are victims of identity theft. ( FTC) 10 million in 2005 i.e 1 every 3
seconds.
40 million cases of credit card abuse - Master Card
7 in 10 odds of becoming victim of computer security breach (NCSA)
172,000 PCs lose control to hackers every year.
100% of computers are infected
91% with dangerous spyware
19 million known cyber hackers, more than all of the armies in the world coming.
National Research Council study that shows computer crime is a drag on the
national economy by billions of dollars
US is the largest mass producer of cyber attacks, according to security expert
Riptech, with Israel producing the most attacks per capita.
12. CONCLUSION
Computer crime is a multi-billion dollar problem. Law enforcement must seekways to keep the drawbacks from overshadowing the great promise of thecomputer age. Cyber crime is a menace that has to be tackled effectively notonly by the official but also by the users by co-operating with the law. The
8/8/2019 CYBER CRIME FINAL (nimra)
15/16
CYBER CRIME
founding fathers of internet wanted it to be a boon to the whole world and it isupon us to keep this tool of modernization as a boon and not make it a bane tothe society.
BIBLIOGRAPHY
Sites
http://www.webopedia.com
http://www.bitpipe.com/tlist/http://www.crime-research.org/analytics/702/
http://www.cybercitizenship.org/crime/crime.html
http://www.vnunet.com/vnunet/news/http://cybercrime.planetindia.net/intro.htm
http://www.legalserviceindia.com/article/l262-Cyber-Crimes-and-General-
Principles.html
http://books.google.com.pk/books?id=vz0AAAACAAJ&dq=cyber+crime
BooksCyber crime By Bernadette Hlubik Schell, Clemens Martin
http://www.webopedia.com/http://www.bitpipe.com/tlist/http://www.crime-research.org/analytics/702/http://www.cybercitizenship.org/crime/crime.htmlhttp://www.vnunet.com/vnunet/news/http://cybercrime.planetindia.net/intro.htmhttp://www.legalserviceindia.com/article/l262-Cyber-Crimes-and-General-Principles.htmlhttp://www.legalserviceindia.com/article/l262-Cyber-Crimes-and-General-Principles.htmlhttp://books.google.com.pk/books?id=v-z0AAAACAAJ&dq=cyber+crimehttp://www.webopedia.com/http://www.bitpipe.com/tlist/http://www.crime-research.org/analytics/702/http://www.cybercitizenship.org/crime/crime.htmlhttp://www.vnunet.com/vnunet/news/http://cybercrime.planetindia.net/intro.htmhttp://www.legalserviceindia.com/article/l262-Cyber-Crimes-and-General-Principles.htmlhttp://www.legalserviceindia.com/article/l262-Cyber-Crimes-and-General-Principles.htmlhttp://books.google.com.pk/books?id=v-z0AAAACAAJ&dq=cyber+crime8/8/2019 CYBER CRIME FINAL (nimra)
16/16
CYBER CRIME