Your SlideShare is downloading. ×
  • Like
  • Save


Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.


Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

History and future cybercrime


Click Here …

Click Here

Online Educational Website For You

Published in Education , Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads


Total Views
On SlideShare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide
  • “ I am selling credit cards in batches of 100 pieces” “ I am buying credit cards”


  • 1. History And Future Cybercrime
  • 2. Introduction• Cybercrimes can be basically divided into 3 major categories: 1. Cybercrimes against persons. 2. Cybercrimes against property. 3. Cybercrimes against government.
  • 3. • "Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime."
  • 4. what makes a crime a cyber crime??• when information and communications technology (ICT) systems and intellectual property become targets of exploitation, intrusion, identity and information theft.• when ICT devices are used as means to commit crimes• where the ICT devices are used as mediums of committing crimes. For example, sedition, disharmony or unrest, slandering and instigating at higher scale come under this category
  • 5. The Cyber Threat EnvironmentTwo Threat Categories:3. Emerging Threats to National Security Computer Intrusions from: • Terrorist Groups • State Actors• Traditional Crime Migrating to the Internet Cyber-facilitated: • Hacking Groups • On-line Child Exploitation • Intellectual Property Violations • Internet Fraud • Identity Theft
  • 6. National Security• Terrorist Groups • Web-sites • Forums • Bulletin Boards
  • 7. Common Internet Crime Schemes• Credit/Debit Card Fraud• Identity Theft• Phishing• Mortgage Fraud• Investment Fraud• Computer Intrusions• Online Auction Fraud• Non-Delivery of Merchandise• Business Employment Schemes• Freight Forwarding/Reshipping• Fake Escrow Services• Ponzi & Pyramid Schemes
  • 8. Current EnvironmentCarding Among Hackers• Illicit Trafficking in Stolen Credit Card Information• Conducted Openly on Russian-language Hacker Sites Starting in the Late 1990s• Confluence of Events in Late 1990s – Appearance of Domestic Credit Cards in RF – Dot-Com E-commerce Boom – Economic Collapse of 1998 —> Widespread Unemployment in the Nascent IT Sector A Brief History…
  • 9. The Present Reality... …and the Future..?
  • 10. Early Hacker Postings “Buying / Selling” D0D0: “ I am selling credit cards in batches of 100 pieces ”Khyr: “I am buyingcredit cards ”
  • 11. Carder Sites
  • 12. Carding Internet Sources WEB SITES, SUCH AS•• ARE AVAILABLE TO ALL WHO WISH A NEW IDENTITY. - Look like legitimate ID/Driver’s License but may contain the word “Novelty” somewhere in small print
  • 13. How They Get Your Info• Spam• Pre-texting/Social Engineering/Fake Sites• Compromised Databases• Skimming• Old Computers
  • 14. Motivation• Show me the money$$$ – Generation of hackers have grown up. – Needs have shifted to accommodate age. – Need to pay for: • Food • Rent • Love life
  • 16. Trends and Predictions• Spear Phishing – Faked “internal” emails• Continued attacks on personal information – Outsourcing to third party businesses – Blogs “”• Continued increase in cross border attacks – Exploiting poor law enforcement cooperation between many countries.
  • 17. Trends and Predictions• WiFi – Easy behind the firewall access to networks• VoIP – DoS against phones or call hijacking – Covert Trojan delivery (researched by some Universities around the world) – SPIT - Voice spam• BIOS (hardware) level rootkits – Can be written in common programming language for cross platform use
  • 18. Trends and Predictions• Attacks continue to get more sophisticated – Difficult to detect – Faster propagation (ie Botnets)• End users more at risk – Shift from servers to clients• Response tools very basic – Tools still very basic
  • 19. Trends and Predictions• Instant message bots – Artificial intelligence software that convinces you to download virus.• Application targeted attacks – Programs that require Internet access to work (Oracle, RealPlayer, iTunes…)• More relevant IDS and network protection – False positive rate currently too high.
  • 20. Case Study …
  • 21. Security Risk For Home User…• Confidentiality• Integrity• Availability
  • 22. Example of Intellectual property theft:-Data crimes• Data Interception: Interception of data in transmission.• Data Modification: Alteration, destruction, or erasing of data.• Data Theft: Taking or copying data, regardless of whether it is protected by