Your SlideShare is downloading. ×
0
History and future cybercrime
History and future cybercrime
History and future cybercrime
History and future cybercrime
History and future cybercrime
History and future cybercrime
History and future cybercrime
History and future cybercrime
History and future cybercrime
History and future cybercrime
History and future cybercrime
History and future cybercrime
History and future cybercrime
History and future cybercrime
History and future cybercrime
History and future cybercrime
History and future cybercrime
History and future cybercrime
History and future cybercrime
History and future cybercrime
History and future cybercrime
History and future cybercrime
History and future cybercrime
History and future cybercrime
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

History and future cybercrime

2,602

Published on

Click Here …

Click Here

http://www.eacademy4u.com/

Online Educational Website For You

Published in: Education, Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,602
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • “I am selling credit cards in batches of 100 pieces”
    “I am buying credit cards”
  • Transcript

    • 1. History And Future Cybercrime
    • 2. Introduction • Cybercrimes can be basically divided into 3 major categories: 1. Cybercrimes against persons. 2. Cybercrimes against property. 3. Cybercrimes against government.
    • 3. • "Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime."
    • 4. what makes a crime a cyber crime?? • when information and communications technology (ICT) systems and intellectual property become targets of exploitation, intrusion, identity and information theft. • when ICT devices are used as means to commit crimes • where the ICT devices are used as mediums of committing crimes. For example, sedition, disharmony or unrest, slandering and instigating at higher scale come under this category
    • 5. Two Threat Categories: 1. Emerging Threats to National Security Computer Intrusions from: • Terrorist Groups • State Actors 2. Traditional Crime Migrating to the Internet Cyber-facilitated: • Hacking Groups • On-line Child Exploitation • Intellectual Property Violations • Internet Fraud • Identity Theft The Cyber Threat EnvironmentThe Cyber Threat Environment
    • 6. National Security • Terrorist Groups • Web-sites • Forums • Bulletin Boards
    • 7. Common Internet Crime Schemes • Credit/Debit Card Fraud • Identity Theft • Phishing • Mortgage Fraud • Investment Fraud • Computer Intrusions • Online Auction Fraud • Non-Delivery of Merchandise • Business Employment Schemes • Freight Forwarding/Reshipping • Fake Escrow Services • Ponzi & Pyramid Schemes
    • 8. Current Environment Carding Among Hackers • Illicit Trafficking in Stolen Credit Card Information • Conducted Openly on Russian-language Hacker Sites Starting in the Late 1990s • Confluence of Events in Late 1990s – Appearance of Domestic Credit Cards in RF – Dot-Com E-commerce Boom – Economic Collapse of 1998 —> Widespread Unemployment in the Nascent IT Sector A Brief History…
    • 9. ……and the Future..?and the Future..? The Present Reality...
    • 10. Early Hacker Postings “Buying / Selling” D0D0: “ I am selling credit cards in batches of 100 pieces ” Khyr: “I am buying credit cards ”
    • 11. Carder Sites
    • 12. Carding Internet Sources WEB SITES, SUCH AS • www.web-hack.ru • Cardingworld.cc ARE AVAILABLE TO ALL WHO WISH A NEW IDENTITY. - Look like legitimate ID/Driver’s License but may contain the word “Novelty” somewhere in small print
    • 13. How They Get Your Info • Spam • Pre-texting/Social Engineering/Fake Sites • Compromised Databases • Skimming • Old Computers
    • 14. Motivation • Show me the money$$$ – Generation of hackers have grown up. – Needs have shifted to accommodate age. – Need to pay for: • Food • Rent • Love life
    • 15. CYBERSLAM ROBY ASHLEY ECHOUAFNI WALKER HALLSCHICHTEL
    • 16. Trends and Predictions • Spear Phishing – Faked “internal” emails • Continued attacks on personal information – Outsourcing to third party businesses – Blogs “Myspace.com” • Continued increase in cross border attacks – Exploiting poor law enforcement cooperation between many countries.
    • 17. Trends and Predictions • WiFi – Easy behind the firewall access to networks • VoIP – DoS against phones or call hijacking – Covert Trojan delivery (researched by some Universities around the world) – SPIT - Voice spam • BIOS (hardware) level rootkits – Can be written in common programming language for cross platform use
    • 18. Trends and Predictions • Attacks continue to get more sophisticated – Difficult to detect – Faster propagation (ie Botnets) • End users more at risk – Shift from servers to clients • Response tools very basic – Tools still very basic
    • 19. Trends and Predictions • Instant message bots – Artificial intelligence software that convinces you to download virus. • Application targeted attacks – Programs that require Internet access to work (Oracle, RealPlayer, iTunes…) • More relevant IDS and network protection – False positive rate currently too high.
    • 20. Case Study …
    • 21. Security Risk For Home User… • Confidentiality • Integrity • Availability
    • 22. Example of Intellectual property theft:- Data crimes • Data Interception: Interception of data in transmission. • Data Modification: Alteration, destruction, or erasing of data. • Data Theft: Taking or copying data, regardless of whether it is protected by

    ×