SlideShare a Scribd company logo
1 of 29
An overview of different
Cyber Attacks
Cyber Crime
Learning Goal’s
• Demystifying Cyber Crime.
• Common Scenarios in Cyber Crime.
• Cyber Crime in India.
• Cyber Attacks.
• Cyber Laws in India.
• Securing Yourself – Do’s and Don’ts
• DCS – Doubt Clearing Session.
• Salutations.
DEMYSTIFYING CYBER CRIME
Cyber Crime
• “Crimes are not to be measured by the issue of
events, but by the bad intensions of men.”
• “The greatest crimes do
not arise from a want of
feeling for others but from
an over sensibility for
ourselves and an
over indulgence in our own
desires.”
What is Cyber Crime ?
• Cyber Crime is a term used to broadly describe criminal activity in
which computers or computer networks are a tool, a target, or a
place of criminal activity and include everything from electronic
cracking to denial of service attacks. It is also used to include
traditional crimes in which computers or networks are used to
enable the illicit activity.
• Computer crime mainly consists of unauthorized access to computer
systems data alteration, data destruction, theft of intellectual
property.
• Cyber crime in the context of national security may involve hacking,
traditional espionage, or information warfare and related activities.
Unauthorized access: This occurs when a user/hacker
deliberately gets access into someone else’s network either
to monitor or data destruction purposes
Denial of service attack: It involves sending of
disproportionate demands or data to the victims server
beyond the limit that the server is capable to handle and
hence causes the server to crash
Virus, Worms and Trojan attacks: Viruses are basically
programs that are attached to a file which then gets
circulated to other files and gradually to other computers in
the network.
Worms unlike Viruses do not need a host for attachments
they make copies of themselves and do this repeatedly
hence eating up all the memory of the computer.
Trojans are unauthorized programs which functions from
inside what seems to be an authorized program, thereby
concealing what it is actually doing.
Common scenarios in Cyber Crime
Cyber Crimes in India
The major Cyber Crimes reported, in India,
are Denial of Services, Defacement of Websites, Spam, Computer
Virus and Worms, Pornography, Cyber Squatting, Cyber
Stalking and Phishing.
India stands 11th in the ranking for Cyber Crime in the World,
constituting3% of the Global Cyber Crime.
Cyber Crime in India : Statistics
Why India ?
A rapidly growing online user base
 121 Million Internet Users
 65 Million Active Internet Users, up by 28% from 51
million in 2010
 50 Million users shop online on Ecommerce and Online
Shopping Sites
 46+ Million Social Network Users
 346 million mobile users had subscribed to Data Packages.
Source: IAMAI; Juxt; wearesocial 2011
 The majority of cybercrimes are centered on forgery, fraud and
Phishing,
 India is the third-most targeted country for Phishing attacks
after the US and the UK,
 Social networks as well as ecommerce sites are major targets,
 6.9 million bot-infected systems in 2010,
 14,348 website defacements in 2010,
 6,850 .in and 4,150 .com domains were defaced during 2011,
 15,000 sites hacked in 2011,
 India is the number 1 country in the world for generating spam.
Cyber Crime In India
Wednesday, 25 February 2015
Cyber Crime in India
A total number of 90, 119, 252 and 219 Government websites tracked
by the Indian Computer Emergency Response Team (CERT-In) were
hacked / defaced by various hacker groups in the year 2008, 2009,
2010 and Jan–Oct 2011 respectively
CYBER ATTACKS
Think before you Click
Nigerian 419 Fraud Scheme
• It is a type of Confidence trick or using SE (Social
Engineering)
• The term “419 “ comes from the Section of the
Nigerian Penal Code.
• Persuade someone to give out a sum of money using
scam or false promises.
• Methods :-
– False Company Job Scam.
– Online Buy/Sell Goods
– Online Dating Services.
Packet Sniffing
• Packet Sniffing is a method of tapping each packet as
it flows across the networks.
• User sniffs data belonging to other users in the
network.
• Packet Sniffers can be used as a hacking tool.
• Network Sniffers can capture passwords and other
sensitive information through the network.
• Tools of Packet Sniffing : Wireshark, tcpdump,
Ettercap etc.
Phishing & Spoofing Attacks
• ‘Spoof’ word came into existence from a game
invented by Arthur Roberts in 19th century.
• Spoofing means personating as some other
authorized vendor to trick
users into believing a system
as legitimate.
• Types –
– Email Spoofing
– IP-Spoofing
– DNS-Spoofing
..contd.
• Spoofing attacks used to trick people into revealing
confidential data is Phishing.
• “Phishing is the attempt to acquire sensitive
information such as usernames, passwords, and
credit card details (and sometimes, indirectly,
money) by masquerading as a trustworthy entity in
an electronic communication.” --- Wikipedia
..contd.
• IP spoofing can be accomplished using proxy servers
and simple PHP scripts that are readily and freely
available.
• Email spoofing is where spammers try to trick spam
filters by making spam look like it comes from a
legitimate address. They do this by manipulating the
email header to display your email in the “from”
address, hence why you get bounces back and others
believe the junk mail is coming from you.
DNS Spoofing
• DNS spoofing (or DNS cache poisoning) is a computer hacking
attack, whereby data is introduced into a Domain Name
System (DNS) resolver's cache, causing the name server to
return an incorrect IP address, diverting traffic to the
attacker's computer (or any other computer).
Piggy Backing
• Access Wireless connection authorized to another
individual without rightful permission.
• It is used as a means to hide illegal activities like
identity theft, pornography etc.
• Piggybacking != Wardriving
• Wardrivers collect info about unsecured wi-fi access
while driving in a vehicle. It involves logging and
mapping of access points.
Software Piracy
• Software Piracy is the illegal distribution,
unauthorized reproduction of software for business
or personal use.
• Its Illegal and Punishable by law.
• Huge impact on global economy.
• In 2007, IT Industry suffered a loss of $39.6 Billion
Anti- copyright infringement organizations
1. Business Software Alliance (BSA)
2. Canadian Alliance Against Software Theft (CAAST)
3. Federation Against Software Theft (FAST) and more …
Pod Slurping
• An act of using a portable data storage device to
facilitate data theft.
• Increasing Security risk.
• Stores malicious code or program that steal
credentials or other personalized data.
Source Code Poisoning
• Embed Malicious Code in chunks in a Software’s
code.
• Software’s can be trojanized.
• Can be done by developers or testers or contributors.
• Prevention is achievable with proper design of
Compilers.
CYBER LAWS IN INDIA
Cyber Laws in India
• The Information Technology Act, 2000
• The Information Technology Amendment Act, 2008
Section 66E - Punishment for violation of privacy.
“Whoever, intentionally or knowingly captures, publishes or
transmits the image of a private area of any person without
his or her consent, under circumstances violating the
privacy of that person, shall be punished with
imprisonment which may extend to three years or with fine
not exceeding two lakh rupees, or with both”
SECURING YOURSELF
DO’S & DON’TS
DO’s
• Install and use a firewall, pop-up blockers and
spyware detectors.
• Use an up-to-date Anti Virus.
• Create backups of important files and folders
• Use Strong Passwords.
• Encrypt the Network traffic. (Use a Paid VPN)
• Change Passwords after some interval.
• Do not store passwords or bank logins in your OS.
• Clear Spams regularly.
Etc. etc.
Don’ts
• Give unnecessary details about your being and
current living status.
• Hand over your credit card to any person.
• Auto Connect to Open Wi-fi
• Save Passwords in web browsers.
• Open Emails if not sure about it.
• Open email Attachments with unsatisfactory details.
QUESTIONS ? DOUBTS ?
THANK YOU

More Related Content

What's hot

Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxNargis Parveen
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trendsShreedeep Rayamajhi
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide Tauhidul islam
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxnikshaikh786
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service AttackDhrumil Panchal
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFAndy Thompson
 

What's hot (20)

What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
Chapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptxChapter1 Cyber security Law & policy.pptx
Chapter1 Cyber security Law & policy.pptx
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Bank security
Bank securityBank security
Bank security
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Botnets
BotnetsBotnets
Botnets
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
Denial of Service Attack
Denial of Service AttackDenial of Service Attack
Denial of Service Attack
 
Application security
Application securityApplication security
Application security
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDF
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Social engineering
Social engineering Social engineering
Social engineering
 

Viewers also liked

Workers’ participation in management
Workers’ participation in managementWorkers’ participation in management
Workers’ participation in managementshyamasundar Tripathy
 
Workers participation in management
Workers participation in management Workers participation in management
Workers participation in management Chandan Raj
 
Cybercrime
CybercrimeCybercrime
Cybercrimepromit
 
Workers participation in management
Workers participation in management Workers participation in management
Workers participation in management parags06
 
Chapter 1 on Entrepreneurship
Chapter 1 on EntrepreneurshipChapter 1 on Entrepreneurship
Chapter 1 on EntrepreneurshipJaisiimman Sam
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
FTC view on Stored Communications Act
FTC view on Stored Communications ActFTC view on Stored Communications Act
FTC view on Stored Communications ActDavid Sweigert
 
Cybersource 2013 Online Fraud Report
Cybersource 2013 Online Fraud ReportCybersource 2013 Online Fraud Report
Cybersource 2013 Online Fraud ReportJoshua Enders
 
Counselors Are Made, Not Born: How to Become a Strategist, Not a Technician
Counselors Are Made, Not Born: How to Become a Strategist, Not a TechnicianCounselors Are Made, Not Born: How to Become a Strategist, Not a Technician
Counselors Are Made, Not Born: How to Become a Strategist, Not a TechnicianForge Communications
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraudblogzilla
 
Common Myths about Entrepreneurs
Common Myths about EntrepreneursCommon Myths about Entrepreneurs
Common Myths about EntrepreneursTarek Fahmy
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce JenVidaB
 
Ch11 - The Cost of Capital
Ch11 - The Cost of CapitalCh11 - The Cost of Capital
Ch11 - The Cost of CapitalMentari Pagi
 

Viewers also liked (20)

Cyberattacksbrown1
Cyberattacksbrown1Cyberattacksbrown1
Cyberattacksbrown1
 
Workers’ participation in management
Workers’ participation in managementWorkers’ participation in management
Workers’ participation in management
 
Workers participation in management
Workers participation in management Workers participation in management
Workers participation in management
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Workers participation in management
Workers participation in management Workers participation in management
Workers participation in management
 
Chapter 1 on Entrepreneurship
Chapter 1 on EntrepreneurshipChapter 1 on Entrepreneurship
Chapter 1 on Entrepreneurship
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
FTC view on Stored Communications Act
FTC view on Stored Communications ActFTC view on Stored Communications Act
FTC view on Stored Communications Act
 
Cybersource 2013 Online Fraud Report
Cybersource 2013 Online Fraud ReportCybersource 2013 Online Fraud Report
Cybersource 2013 Online Fraud Report
 
Counselors Are Made, Not Born: How to Become a Strategist, Not a Technician
Counselors Are Made, Not Born: How to Become a Strategist, Not a TechnicianCounselors Are Made, Not Born: How to Become a Strategist, Not a Technician
Counselors Are Made, Not Born: How to Become a Strategist, Not a Technician
 
83e4 entrepreneur meaning &traits
83e4 entrepreneur meaning &traits83e4 entrepreneur meaning &traits
83e4 entrepreneur meaning &traits
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraud
 
Common Myths about Entrepreneurs
Common Myths about EntrepreneursCommon Myths about Entrepreneurs
Common Myths about Entrepreneurs
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Plant location
Plant locationPlant location
Plant location
 
Ch11 - The Cost of Capital
Ch11 - The Cost of CapitalCh11 - The Cost of Capital
Ch11 - The Cost of Capital
 
Developing An Entrepreneur
Developing An EntrepreneurDeveloping An Entrepreneur
Developing An Entrepreneur
 
Made not born
Made not bornMade not born
Made not born
 

Similar to Cyber Crime

Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Andreaa Viv
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxMayurSapkale7
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber CrimeDivithC
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxPrinceKumar851167
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Parag Deodhar
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfssuserd25aae
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 

Similar to Cyber Crime (20)

Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
Cybercrimeppt 160421074211
Cybercrimeppt 160421074211Cybercrimeppt 160421074211
Cybercrimeppt 160421074211
 
Cyber crime ppt
Cyber crime  pptCyber crime  ppt
Cyber crime ppt
 
CYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptxCYBER CRIME AND SECURITY MAYUR.pptx
CYBER CRIME AND SECURITY MAYUR.pptx
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Chapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptxChapter 1_Cyber Security.pptx
Chapter 1_Cyber Security.pptx
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Cyber security 22-07-29=013
Cyber security 22-07-29=013Cyber security 22-07-29=013
Cyber security 22-07-29=013
 
Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function Cyber Crime - How New Age Criminals Function
Cyber Crime - How New Age Criminals Function
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 

More from Animesh Shaw

Factoid based natural language question generation system
Factoid based natural language question generation systemFactoid based natural language question generation system
Factoid based natural language question generation systemAnimesh Shaw
 
Investigating server logs
Investigating server logsInvestigating server logs
Investigating server logsAnimesh Shaw
 
Email investigation
Email investigationEmail investigation
Email investigationAnimesh Shaw
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 

More from Animesh Shaw (7)

Factoid based natural language question generation system
Factoid based natural language question generation systemFactoid based natural language question generation system
Factoid based natural language question generation system
 
WhatsApp Forensic
WhatsApp ForensicWhatsApp Forensic
WhatsApp Forensic
 
Investigating server logs
Investigating server logsInvestigating server logs
Investigating server logs
 
Flash drives
Flash drivesFlash drives
Flash drives
 
Financial Crimes
Financial CrimesFinancial Crimes
Financial Crimes
 
Email investigation
Email investigationEmail investigation
Email investigation
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 

Recently uploaded

SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationNeilDeclaro1
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 

Recently uploaded (20)

SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 

Cyber Crime

  • 1. An overview of different Cyber Attacks Cyber Crime
  • 2. Learning Goal’s • Demystifying Cyber Crime. • Common Scenarios in Cyber Crime. • Cyber Crime in India. • Cyber Attacks. • Cyber Laws in India. • Securing Yourself – Do’s and Don’ts • DCS – Doubt Clearing Session. • Salutations.
  • 4. Cyber Crime • “Crimes are not to be measured by the issue of events, but by the bad intensions of men.” • “The greatest crimes do not arise from a want of feeling for others but from an over sensibility for ourselves and an over indulgence in our own desires.”
  • 5. What is Cyber Crime ? • Cyber Crime is a term used to broadly describe criminal activity in which computers or computer networks are a tool, a target, or a place of criminal activity and include everything from electronic cracking to denial of service attacks. It is also used to include traditional crimes in which computers or networks are used to enable the illicit activity. • Computer crime mainly consists of unauthorized access to computer systems data alteration, data destruction, theft of intellectual property. • Cyber crime in the context of national security may involve hacking, traditional espionage, or information warfare and related activities.
  • 6. Unauthorized access: This occurs when a user/hacker deliberately gets access into someone else’s network either to monitor or data destruction purposes Denial of service attack: It involves sending of disproportionate demands or data to the victims server beyond the limit that the server is capable to handle and hence causes the server to crash Virus, Worms and Trojan attacks: Viruses are basically programs that are attached to a file which then gets circulated to other files and gradually to other computers in the network. Worms unlike Viruses do not need a host for attachments they make copies of themselves and do this repeatedly hence eating up all the memory of the computer. Trojans are unauthorized programs which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing. Common scenarios in Cyber Crime
  • 7. Cyber Crimes in India The major Cyber Crimes reported, in India, are Denial of Services, Defacement of Websites, Spam, Computer Virus and Worms, Pornography, Cyber Squatting, Cyber Stalking and Phishing.
  • 8. India stands 11th in the ranking for Cyber Crime in the World, constituting3% of the Global Cyber Crime. Cyber Crime in India : Statistics
  • 9. Why India ? A rapidly growing online user base  121 Million Internet Users  65 Million Active Internet Users, up by 28% from 51 million in 2010  50 Million users shop online on Ecommerce and Online Shopping Sites  46+ Million Social Network Users  346 million mobile users had subscribed to Data Packages. Source: IAMAI; Juxt; wearesocial 2011
  • 10.  The majority of cybercrimes are centered on forgery, fraud and Phishing,  India is the third-most targeted country for Phishing attacks after the US and the UK,  Social networks as well as ecommerce sites are major targets,  6.9 million bot-infected systems in 2010,  14,348 website defacements in 2010,  6,850 .in and 4,150 .com domains were defaced during 2011,  15,000 sites hacked in 2011,  India is the number 1 country in the world for generating spam. Cyber Crime In India Wednesday, 25 February 2015
  • 11. Cyber Crime in India A total number of 90, 119, 252 and 219 Government websites tracked by the Indian Computer Emergency Response Team (CERT-In) were hacked / defaced by various hacker groups in the year 2008, 2009, 2010 and Jan–Oct 2011 respectively
  • 13. Nigerian 419 Fraud Scheme • It is a type of Confidence trick or using SE (Social Engineering) • The term “419 “ comes from the Section of the Nigerian Penal Code. • Persuade someone to give out a sum of money using scam or false promises. • Methods :- – False Company Job Scam. – Online Buy/Sell Goods – Online Dating Services.
  • 14. Packet Sniffing • Packet Sniffing is a method of tapping each packet as it flows across the networks. • User sniffs data belonging to other users in the network. • Packet Sniffers can be used as a hacking tool. • Network Sniffers can capture passwords and other sensitive information through the network. • Tools of Packet Sniffing : Wireshark, tcpdump, Ettercap etc.
  • 15. Phishing & Spoofing Attacks • ‘Spoof’ word came into existence from a game invented by Arthur Roberts in 19th century. • Spoofing means personating as some other authorized vendor to trick users into believing a system as legitimate. • Types – – Email Spoofing – IP-Spoofing – DNS-Spoofing
  • 16. ..contd. • Spoofing attacks used to trick people into revealing confidential data is Phishing. • “Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.” --- Wikipedia
  • 17. ..contd. • IP spoofing can be accomplished using proxy servers and simple PHP scripts that are readily and freely available. • Email spoofing is where spammers try to trick spam filters by making spam look like it comes from a legitimate address. They do this by manipulating the email header to display your email in the “from” address, hence why you get bounces back and others believe the junk mail is coming from you.
  • 18. DNS Spoofing • DNS spoofing (or DNS cache poisoning) is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) resolver's cache, causing the name server to return an incorrect IP address, diverting traffic to the attacker's computer (or any other computer).
  • 19. Piggy Backing • Access Wireless connection authorized to another individual without rightful permission. • It is used as a means to hide illegal activities like identity theft, pornography etc. • Piggybacking != Wardriving • Wardrivers collect info about unsecured wi-fi access while driving in a vehicle. It involves logging and mapping of access points.
  • 20. Software Piracy • Software Piracy is the illegal distribution, unauthorized reproduction of software for business or personal use. • Its Illegal and Punishable by law. • Huge impact on global economy. • In 2007, IT Industry suffered a loss of $39.6 Billion Anti- copyright infringement organizations 1. Business Software Alliance (BSA) 2. Canadian Alliance Against Software Theft (CAAST) 3. Federation Against Software Theft (FAST) and more …
  • 21. Pod Slurping • An act of using a portable data storage device to facilitate data theft. • Increasing Security risk. • Stores malicious code or program that steal credentials or other personalized data.
  • 22. Source Code Poisoning • Embed Malicious Code in chunks in a Software’s code. • Software’s can be trojanized. • Can be done by developers or testers or contributors. • Prevention is achievable with proper design of Compilers.
  • 23. CYBER LAWS IN INDIA
  • 24. Cyber Laws in India • The Information Technology Act, 2000 • The Information Technology Amendment Act, 2008 Section 66E - Punishment for violation of privacy. “Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding two lakh rupees, or with both”
  • 26. DO’s • Install and use a firewall, pop-up blockers and spyware detectors. • Use an up-to-date Anti Virus. • Create backups of important files and folders • Use Strong Passwords. • Encrypt the Network traffic. (Use a Paid VPN) • Change Passwords after some interval. • Do not store passwords or bank logins in your OS. • Clear Spams regularly. Etc. etc.
  • 27. Don’ts • Give unnecessary details about your being and current living status. • Hand over your credit card to any person. • Auto Connect to Open Wi-fi • Save Passwords in web browsers. • Open Emails if not sure about it. • Open email Attachments with unsatisfactory details.