+ All Categories
Home > Internet > CYBERSPACE & CRIMINAL BEHAVIOR

CYBERSPACE & CRIMINAL BEHAVIOR

Date post: 22-Jan-2018
Category:
Upload: dharmik-navadiya
View: 440 times
Download: 1 times
Share this document with a friend
31
CYBER SECURITY ND
Transcript
Page 1: CYBERSPACE & CRIMINAL BEHAVIOR

CYBER SECURITY

ND

Page 2: CYBERSPACE & CRIMINAL BEHAVIOR

CYBERSPACE & CRIMINAL BEHAVIOR

Enrollment no Name

140760106070 Navadiya Dharmik

140760106079 Patel Kevin

Prepared by:

Guided By:Prof. Mitali H. Desai(B.E.(I.T.),M.E.(CO))

Page 3: CYBERSPACE & CRIMINAL BEHAVIOR

This PowerPoint Template has clean and neutral design that can be adapted to

any content and meets various market segments. With this many slides you

are able to make a complete PowerPoint Presentation that best suit your

needs.

This PowerPoint Template has clean and neutral design that can be adapted to

any content and meets various market segments. With this many slides you

are able to make a complete PowerPoint Presentation that best suit your

needs.

This PowerPoint Template has clean and neutral design that can be adapted to

any content and meets various market segments. With this many slides you

are able to make a complete PowerPoint Presentation that best suit your

needs.

CONTENT

Page 4: CYBERSPACE & CRIMINAL BEHAVIOR

CYBERSPACE

What is cyberspace?

Cyberspace is a domain characterized by the

use of electronics and the electromagnetic spectrum

to store, modify, and exchange data via networked

systems and associated physical infrastructures. In

effect, cyberspace can be thought of as the intercom-

nection of human beings through computers and

telecommunication, without regard to physical

geography.

Page 5: CYBERSPACE & CRIMINAL BEHAVIOR

The word became popular in the 1990s when

the uses of the Internet, networking, and digital

communication were all growing dramatically and the

term "cyberspace" was able to represent the many

new ideas and phenomena that were emerging.

Page 6: CYBERSPACE & CRIMINAL BEHAVIOR

To us, ‘cyberspace’ was

simply about managing spaces.

There was nothing esoteric about it

. Nothing digital, either. It was just

a tool. The space was concrete,

physical.

The parent term of

cyberspace is "cybernetics",

derived from the Ancient Greek

(kybernētēs, steersman, governor,

pilot), a word introduced by Norbert

Wiener for his pioneering work in

electronic communication and con-

trol science.

Page 7: CYBERSPACE & CRIMINAL BEHAVIOR

There are no shared definitions of cyberspace at the scientific level and every government uses a different definition.

“cyberspace is the national environment inwhich digitized information is communicated over computer networks.”

-Dictionary of Militaryand Associated

A global domain within the information environment consisting of the inter dependentnetwork of information technology infrastructures including the Internet, telecommunications networks, computer systems & and embedded processorsand controllers.

Page 8: CYBERSPACE & CRIMINAL BEHAVIOR

TERMS RELATED CYBERSPACE

CYBER POWER:The ability to use cyberspace to create advan

tages and influence events in the other operational environment and across the instruments of power.

INTERNET:A global computer network providing a variet

y of information and communication facilities, consisting of interconnected networks using standardized communication protocols.

Page 9: CYBERSPACE & CRIMINAL BEHAVIOR

CYBER-ATTACK:

Cyber-attack is any type of offensive maneuver

employed by individuals or whole organizations that

targets computer information systems, infrastructures,

computer networks, and/or personal computer devices

by various means of malicious acts usually originating

from an anonymous source that either steals, alters, or

destroys a specified target by hacking into a susceptibl

e system.

Cyber-attacks can range from installing spyware on a PC to attempts to destroy the infrastructure of entire nations. Cyber-attacks have become increasingly sophisticated and dangerous as the Stuxnet worm recently demonstrated.

Page 10: CYBERSPACE & CRIMINAL BEHAVIOR

User behavior analytics and SIEM (Security information and event management) are used toprevent these attacks.

Page 11: CYBERSPACE & CRIMINAL BEHAVIOR

There are a number of techniques to utilize in cyber-attacks and a variety of ways to administer them to individuals or establishments on a broader Scale. Attacks are broken down into two categories, syntactic attacks and semantic attacks.

Syntactic attacks:Syntactic attacks are straight forward; it is co

nsidered malicious software which includes viruses, worms, and Trojan horses.Semantic attacks:

The use of incorrect information to damageThe credibility of target resources or to cause direct or indirect harm.

Page 12: CYBERSPACE & CRIMINAL BEHAVIOR

INDIA AND PAKISTAN CYBER

ATTACKS There were two such instances between India a

nd Pakistan that involved cyberspace conflicts, started i

n 1990s. Earlier cyber attacks came to known as early

as in 1999. Since then, India and Pakistan were engag

ed in a long-term dispute over Kashmir which moved in

to cyberspace. Historical accounts indicated that each

country's hackers have been repeatedly involved in att

acking each other's computing database system. The n

umber of attacks has grown yearly: 45 in 1999, 133 in

2000, 275 by the end of August 2001.

Page 13: CYBERSPACE & CRIMINAL BEHAVIOR

In 2010, Indian hackers

laid a cyber attack at least 36

government database websites

going by the name "Indian Cyber

Army". In 2013, Indian

hackers hacked the official web-

site of Election commission of

Pakistan in an attempt to retrieve

sensitive database information.

In retaliation, Pakistani hackers,

calling themselves "True Cyber

Army" hacked and defaced

~1,059 websites of Indian

election bodies.

Page 14: CYBERSPACE & CRIMINAL BEHAVIOR

Cyber crime:

Cyber crime is an activity done using computers

and internet. We can say that it is an unlawful acts wh

erein the computer either a tool or target or both.

Categories of cyber crime

• The computer as a target :- using a computer to

attacks other computer, e.g. Hacking, virus/worms

attacks, Dos attack etc.

• The computer as a weapon :- using a computer to

commit real world crime e.g. cyber terrorism, credit-

card fraud and pornography etc.

Page 15: CYBERSPACE & CRIMINAL BEHAVIOR

TYPES OF CYBER CRIME• Hacking

• Child pornography

• Denial of service attacks

• Virus dissemination

• Computer vandalism

• Cyber terrorism

• Software piracy

Page 16: CYBERSPACE & CRIMINAL BEHAVIOR

India stands 11th in the ranking for Cyber Crime in the World, constituting 3% of the Global Cyber

Crime.

Page 17: CYBERSPACE & CRIMINAL BEHAVIOR

Technological advances have imp

acted

criminal behavior in three ways:

1. Mass Communication Technology has transformed

media and popular culture into a powerful influence

on offender behavior.

2. Computer Technology has created new avenues

and different opportunities for criminal behavior.

3. Investigative Technology has altered methods used

by offenders and the types of crimes they engage in

.

Page 18: CYBERSPACE & CRIMINAL BEHAVIOR

Hypotheses in the Research

Literature on the

Influence of Mass Media on

Criminal Behavior

• Pop cultural artifacts are criminogenic contribute to

real-life crime.

• Pop cultural artifacts are cathartic – offer an outlet

for natural aggressive impulses.

Page 19: CYBERSPACE & CRIMINAL BEHAVIOR

The Copycat Phenomenon and

Cultural technological changes m

ay be risk

factors for criminal behavior.

• Cultural technological changes may be risk factors

for criminal behavior.

• Relevance of the copycat phenomenon to all types

of criminal behavior should be revisited.

• Integrative theoretical models offer a foundation for

empirical investigation of copycat crime.

Page 20: CYBERSPACE & CRIMINAL BEHAVIOR

Technology-Related Risk Factors

for Criminal Behavior

• Criminologists can no longer ignore the ways in

which media and computer technology shape

criminal behavior.

• Technology breeds false familiarity, blurs fantasy

and reality, and provides a virtual realm that media-

tes conscience. This has important implications for

the study of criminal behavior.

Page 21: CYBERSPACE & CRIMINAL BEHAVIOR

COPYCAT CRIME:

A crime inspired by another

crime that has been publicized in

the news media or fictionally or

artistically represented whereby

the offender incorporates aspects

of the original offense into a new

crime.

Page 22: CYBERSPACE & CRIMINAL BEHAVIOR

Factors that Influence Copycat Crime

• Individual Criminogenic Factors

• Relationship to Media

• Cultural Factors

• Demographic Factors

• Characteristics Of Media Source

Page 23: CYBERSPACE & CRIMINAL BEHAVIOR

EFFECT OF CYBER ATTACKS • DEVIANCE AND CRIMINAL SUBCULTURE IN CYBERSPACE

• Internet Gambling

• PERPETRATORS’ PERSPECTIVES AND OFFENDER USE OF T

HE INTERNET

• Identity Construction Among Hackers

• Virtual Sex Offenders:

• Self-Reported Internet Child Pornography Consumers

• Online Social Networking and Pedophilia

• Adult–Child Sex Advocacy Websites as Learning

Page 24: CYBERSPACE & CRIMINAL BEHAVIOR

• Environments for Crime

• The Internet as a Terrorist’s Tool: A Social Learning • Perspective

• DIGITAL PIRACY

• Value and Choice: Examining Their Roles in Digital

Piracy

• Suing the Genie Back in the Bottle: The Failed RIAA

Strategy to Deter P2P Network Users

• Criminological Predictors of Digital Piracy

• Change of Music Piracy and Neutralization: An Exami

nation Using Short-Term Longitudinal

Page 25: CYBERSPACE & CRIMINAL BEHAVIOR

• Digital File Sharing: An Examination of Neutralization

and Rationalization Techniques Employed by Digital

File Sharers

Page 26: CYBERSPACE & CRIMINAL BEHAVIOR

• CYBER VICTIMIZATION

• Cyber-Routine Activities: Empirical Examination of

Online Lifestyle, Digital Guardians, and Computer

Crime Victimization

• Adolescent Online Victimization and Constructs of

Routine Activities Theory

• Cyber Stalking: Typology, Etiology, and Victims

• Online Social Networking and Women Victims

• Malware Victimization: A Routine Activities

Framework

Page 27: CYBERSPACE & CRIMINAL BEHAVIOR
Page 28: CYBERSPACE & CRIMINAL BEHAVIOR

CYBER SECURITY

RELATIONS BETWEEN THE INTERNET AND

OTHER SEGMENTS OF CYBERSPACE

Cyber security is the protection of info-

rmation systems from theft or damage to the hardware

, the software, and to the information on them, as well

as from disruption or misdirection of the services they

provide.

Cyber security standards which enable organiz-

ations to practice safe security techniques to minimize

the number of successful cyber attacks.

Page 29: CYBERSPACE & CRIMINAL BEHAVIOR

Cyber security refers to the technologies and

processes designed to protect computers, networks

and data from unauthorized access, vulnerabilities and

attacks delivered via the Internet by cyber criminals.

Though, cyber security is important for network,

data and application security.

Page 30: CYBERSPACE & CRIMINAL BEHAVIOR

SAFETY TIPS FOR CYBER CRIME

• Use antivirus software’s.

• Insert firewalls.

• Uninstall unnecessary software

• Maintain backup.

• Check security settings.

• Stay anonymous - choose a genderless screen na

me.

• Never give your full username or passwords to

strangers.

• Learn more about Internet privacy.

Page 31: CYBERSPACE & CRIMINAL BEHAVIOR

Recommended