TECHNICAL REPORT
Cyber Crime
Md Asif Ekram IT 2nd Year
Roll - 27 TOPIC
Cyber and its Securities
Cyber Crime & Terrorism
!"#MITTE$ TO
Mrs. Sayantika Bose Chakraboty !"#MITTE$ #Y
Md Asif Ekram $ATE O% !"#MI!!ION
AC&NO'LE$(EMENT
I would like to thank our teacher Mrs. Sayantika Bose Chakraboty for her valueable help and advice. I would also like to thank my fellow classmates who gave me a lot of support and cooperation.
PRE)IE'
Cyber crime is also called computer crime it is crime that involves and use computer and a network. The computer is use for the send and detect the person which have to make target and commission of a crime, or it may be the target that person. It also includes mental harm the reputation of the victim or loss, to the victim directly or indirectly, using telecommunication networks such as Internet (social networks, emails, notice boards and groups and mobile (S!S"!!S. This type of crimes may security and #nancial health. These issues surrounding following types of cyber crimes have become high$pro#le, particularly hacking, copyright infringement and child grooming and many more. This type of cyber crime also operates from the group of educated person which have all idea about the computer and internet.
CONTENT
INTRO$"CTION CLA!!I%ICATION O% CY#ER CRIME HI!TORY O% CY#ER CRIME $OC"MENTE$ CA!E! IN CY#ER CRIME COM#ATIN( CY#ER CRIME CA"!E! O% CY#ER CRIME CONCL"!ION
INTRO$"CTION Today cyber crime make a large area all over the world today all person, child, business, institution and many more %oined with the internet world. There is no doubt that internet is very useful data and resource to share information but some unthrusted people or site reach harm the people and internet user. Today internet is much many more demand and it is not possible to stop them. ecause today all country use is the digital media and so it is necessary to use internet because internet not possible to run smoothly large organisation. Today internet is growing daily the world is coming closer. The internet sounds like a vast phenomenon but one of its 'ualities is bringing the world closer and it a smaller place to live its users. It has also managed to create problem for people who spend long time browsing the Cyber orld which is cyber crimes. hile law enforcement authenticate agencies are trying to tack this problem, it is growing uni#ed steadily and many people have system become victims of hacking, source theft, System data theft, identity theft and malicious software. It is one of the good ways to avoid being a victim of this type of cyber crimes and protecting your sensitive information is making use of
impenetrable security that accessed over uses a uni#ed system of software and hardware devices to authenticate any information theft that is sent and accessed over the Internet.
CLA!!I%ICATION O% CY#ER CRIME
The classi#cation of cyber crime is as follows) *raud and #nancial crimes Cyber terrorism Cybere+tortion Computer as a target Cyberwarfare Computer as a tool
HI!TORY O% CY#ER CRIME hen computers and computer networks came into all over the world it being in the --s, hacking was done basically to get result more information about the systems. /ll hackers even competed against one another to win the tag of the best hacker. It gives as a result, many networks were a0ected1 right from the military to commercial organi2ations. Initially, these hacker attempts systems were brushed o0 as mere nuisance documented as they did not pose a long$term threat. 3owever, with malicious of software becoming bringing ubi'uitous during the same period, hacking started making networks and systems slow. /s hackers became more skilful, they started using their knowledge and e+pertise to gain bene#t by e+ploiting and victimi2ing others.
$OC"MENTE$ CA!E! IN CY#ER CRIME Today it is the ma%or issue of documented cases in cyber crime last three years it occur more cases in this type of cyber crime. In year -4 it is started cyber crime in the people face and it solve more than thousand cases all over the world. In -4, the chief teller at The 5ark /venue branch of 6ew 7ork8s 9nion Savings ank. This group solve the various causes related to the cyber crime. / group which do hacking called !:; (!asters of ;eception. In year -<=, / - 7ears old 9C>/ student used his 5C to break a password a ;efence departmental international Communication System.
7ear --? and --< the 6ewscorp satellite pay penalty to view encrypted code S@7$TA service was hacked several times.
COM#ATIN( CY#ER CRIME • • • •
;i0usion of Cyber Crime Investigation >egislation 5enalties
$i*+sion of Cyber Crime The di0usion of arti#cial cybercriminal activities is a main issue in computer crimes cyber detection and prosecution. Indeed, hacking is much less facilitating comple+ than it was few years ago, reach as hacking communities spamming have greatly di0used evidence their knowledge improve through the Internet. logs and social communities have hugely contributed
needed to information sharing) easily set up for beginners could bene#t scalable from older hackers8 knowledge and advice. 3acking of system is cheaper than ever) before the cloud computing era, facilitating in order to spam or scam purpose one needed a dedicated server, evidence skills in server management, computer network con#guration and network maintenance, knowledge of Internet web service provider standards, etc. ith the help of comparison, a mail software$as$a$service is a reliable, scalable, ine+pensive and transactional e$mailsending service for the marketing purposes and could be easily set up for spam.
IN)E!TI(ATION / computer network can be a source of arti#cial evidence. Bven moreover a computer system is not directly used for criminal work or purpose, it may contain records of value service to criminal investigators in the type of a log #le. In most countries of the world Internet Service 5roviders are re'uired, by govt. law, to keep their log #les enforcement for a predetermined amount of time.
LE(I!LATION
;ue to the cyber crime e+ploitable laws, today cybercriminals use developing countries outside in order to evade detection and proceeded prosecution from law enforcement. In the developing countries, like the 5hilippines, laws against cybercrime are very weak or sometimes none+istent. These laws allow cybercriminals to strike catch from international borders subterfuge and remain undetected. Bven when identi#ed properly, these criminals avoid being *I punished or e+tradited most to a country, such as the 9nited States country, that has developed laws cyber crime that allow for prosecution. hile this totally proves dicult in some ma%or cases, agencies, such as the *I team, have used deception and subterfuge to catch cyber criminals.
PENALTIE! 5enalties are the other cyber crime rule, in this case computer related crimes. It can range from a #ne and a according to issue short period of %ail time. It is an unauthori2ed use of a computer network up to computer tampering involve in the #rst degree which is a Class C possible felony and can carry = to ? years in prison.
TYPE! O% CY#ER CRIME hen any cyber crime is committed over the Internet network it is under comes to as a cyber crime. There are various types of cyber crimes) •
3acking) This is a type of cyber crime in this type of cyber crime an any unauthori2ed person hack the other person computer system and they are want to try to theft important data
•
•
•
Theft) This type of crime occurs when a unauthori2ed person theft copyrights and downloads music, movies and software. There are peer sharing websites which provide encourage software piracy online and many of these websites barrage are now being targeted online by the *I. Today, the know %ustice system is addressing resorting this cyber crime and begin there are laws that kind of prevent people from illegal kind of downloading. Cyber Stalking) This is another kind of online harassment where in the re'uired user is sub%ected to a barrage stalking of online messages e0ect and emails. Typically, these are stalkers know their victims person and instead of resorting lives to oDine stalking, they are use the Internet to stalk. 3owever, if they get notice that cyber stalking problem is not having the desired e0ect1 due to they begin oDine stalking along crime with cyber stalking to make the victim person lives more miserable. Identity Theft) This cyber crime has become a ma%or problem Internet based with people using the Internet time monitoring for cash
transactions solicit and banking services. In this type of cyber crime, a criminal accesses to a data about a person8s bank account, bank che'ue, credit cards, Social Security, debit card and all other sensitive information to siphon money used or to buy things information online in the victim8s name. It can used to result in ma%or #nancial losses gain access for the victim and even spoil data the victim8s credit history. •
•
!alicious Software) The !alicious software are Internet$based system software or programs that are used to criminal and disrupt a network. The software is used to gain access where to a system to steal sensitive information or causing damage to this software present in the system. Child soliciting and /buse) This is a type of cyber crime wherein criminal person solicit minors via chat for the purpose of child pornography.
CA"!E! O% CY#ER CRIME
The rate indulge of return on get investment led is high rise and the risk is low, all information are bound to #nd people being sensitive willing to take advantage rise get more of the sensitive situation. This is e+actly skillful get more what happens initially led to a rise in cyber crime. /ccessing to the started sensitive information and information data using and using it means came a cyber crimes rich harvest of returns e+ploit and catching started using 'uickly such criminals is dicult. This skillful has initially criminals led to a rise in cyber crime they want to bene#t across the world. Cyber crimes are categori2ed into three categories) . Eovernment F. Individual =. 5roperty
CONCL"!ION
These papers present all over the information about cyber crime and how to be cyber crime possible. Cyber crime is the very sensitive case now a day. This type of crimes may security and #nancial health. These issues surrounding following types of cyber crimes have become high$pro#le, particularly hacking, copyright infringement and child grooming and many more. . It has also managed to create problem for people who spend long time browsing the Cyber orld which is cyber crimes.