W/O SUNETTE POTGIETER
0825569310
WHAT IS CYBER CRIME?
 Cyber crime encompasses any criminal act dealing
with computers and networks. Additionally, cyber
c...
HOW HAS THINGS CHANGED:
WHERE IS THE EVIDENCE NOW?
PAST: Physical documents
PRESENT: Data contained in:
- Computers
- Cell...
CRIMES
 CARD FRAUD ON INTERNET
 BID OR BUY / EBAY – NON DELIVERY OF
GOODS
 EFT TRANSACTIONS
 PHYSING
 PHARMING
 419 ...
CYBER CRIME TERMINOLOGY
 Phishing:
 A technique whereby the perpetrator impersonates
another individual or business thro...
 Spear phishing
 A targeted form of phishing where e-mails or
Web sites are transmitted to an identified
target of the a...
 Pretexting
 The act of creating and using an invented
scenario (the pretext) to persuade a targeted
victim to release i...
 Spoofing
 A scheme in which a person or program
masquerades as another by falsifying data
resulting in the deception of...
Smishing
A text message is sent to the victim’s
mobile phone that asks the victim to
call a toll-free number.
Once that...
KEY LOGGERS
 A criminal suspect can install key loggers in
public computers (such as cyber cafes,
airport lounges etc) or...
SPYWARE, MALWARE, VIRUSES
 Spyware is a software that aids in gathering
information about a person or organization withou...
 Computer Virus is a type of malware that, when
executed, replicates by inserting copies of itself
(possibly modified) in...
THEFT OF PAYMENT
INFORMATION
 TROJAN HORSE : A hacking program, which gains
privileged access to the operating system whi...
LETS LOOK AT A STUDY DONE BY NORTON
DURING 2012.
And some Internet Security Tips
CYBER CRIME GOES
MOBILE
MOBILE DEVICES
 PC’s Still remain the Primary targets, but cyber
criminals are also finding ways to attack
consumers on m...
SECURITY
 There exists various applications for smartphones
whereby they can remotely locate, lock and even
wipe data fro...
Mobile year in review
Cyber Crime goes Mobile
SAFE GAURDS
 PASSWORDS:
• Passwords protect your stuff
• A good password stops a hacker in his/her tracks
• A good passwo...
POPULAR PASSWORDS
12345
123456
1234567
12345678
123123
111111
Password
Passw0rd
Password1
Abc123
Monkey
Trustn01
Dragon
Ba...
Think Unique
• Not guessable word or phrase
• Different for each site and account
• Some use a few complex passwords and t...
No Dictionary Words
 Avoid using full words you might find in a
dictionary
 Real words can be “edited” for password use
...
No Pet Names
 Children often use their pet’s name
 Friends and siblings hack accounts this way
 Security Questions and ...
Pay Particular Attention to Most
Important Accounts
 Email is most important
 “Forgot your password” link on sites goes ...
Never Share or Show Passwords
 Don’t write them down
 Never email or text them to someone
 If you tell it to someone, c...
INTERNET SECURITY
 Get a security product for all devices:
 Computers
 Mobile phones
 Tablets
 Prevent password-steal...
Secure Mobile Devices with a
Password
 Mobile apps may auto log you in to accounts
 Protect access with a password on ph...
TO SUM UP…
 Create unique passphrase (no dictionary words)
 Nothing others will guess
 Customize for each site
 Focus ...
THANK YOU
Cyber crime
Upcoming SlideShare
Loading in...5
×

Cyber crime

1,159

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,159
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
39
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Cyber crime

  1. 1. W/O SUNETTE POTGIETER 0825569310
  2. 2. WHAT IS CYBER CRIME?  Cyber crime encompasses any criminal act dealing with computers and networks. Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet Fraud, Identity Theft, and Credit Card Account Thefts are considered to be Cyber Crimes when the illegal activities are committed through the use of a computer and the Internet.
  3. 3. HOW HAS THINGS CHANGED: WHERE IS THE EVIDENCE NOW? PAST: Physical documents PRESENT: Data contained in: - Computers - Cell phones - Tablets PAST: Postal Service PRESENT: WWW (World Wide Web)
  4. 4. CRIMES  CARD FRAUD ON INTERNET  BID OR BUY / EBAY – NON DELIVERY OF GOODS  EFT TRANSACTIONS  PHYSING  PHARMING  419 SCAMS  YOU HAVE WON! SCAMS (RICA)  OVER DEPOSIT SCAMS (TELKOM, SARS)
  5. 5. CYBER CRIME TERMINOLOGY  Phishing:  A technique whereby the perpetrator impersonates another individual or business through the use of e-mail or Web sites that copy (or mimic) legitimate e-mail or Web site characteristics.  How Phishing works  This scam uses email or pop-up messages to trick the victim into disclosing their credit card number, bank account information, password or other sensitive information.  Emails claim to be from a business or organization the victims know - such as a bank or online payment service
  6. 6.  Spear phishing  A targeted form of phishing where e-mails or Web sites are transmitted to an identified target of the activity, as opposed to the use of phishing, designed to ensnare targets that have not been previously identified (i.e., spamming). Spear phishing is a form of social engineering
  7. 7.  Pretexting  The act of creating and using an invented scenario (the pretext) to persuade a targeted victim to release information or perform an action.  Pretexting is typically done over the telephone. It is more than a simple lie, as it often involves some prior research to set up and use the pieces of information (e.g., date of birth) to establish legitimacy and perceived authority in the mind of the target
  8. 8.  Spoofing  A scheme in which a person or program masquerades as another by falsifying data resulting in the deception of the recipient or user.  Spoofing takes many forms. Web page spoofing involves use of a Web page that reproduces the "look and feel" of a legitimate site, but is under the control of another for the purpose of collecting information from a user who believes they are interacting with the trusted site.
  9. 9. Smishing A text message is sent to the victim’s mobile phone that asks the victim to call a toll-free number. Once that call is made, they will ask for personal information such as Account Number, Credit/Debit card number.
  10. 10. KEY LOGGERS  A criminal suspect can install key loggers in public computers (such as cyber cafes, airport lounges etc) or the computers of the victim. Unsuspecting victims would use these compromised computers to make online transactions. The credit card information of the victim would be emailed to the suspect.
  11. 11. SPYWARE, MALWARE, VIRUSES  Spyware is a software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.  Malware, short for malicious software, is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems
  12. 12.  Computer Virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". Viruses often perform some type of harmful activity on infected hosts, such as stealing hard disk space or CPU time, accessing private information, corrupting data, displaying political or humorous messages on the user's screen, spamming their contacts, or logging their keystrokes
  13. 13. THEFT OF PAYMENT INFORMATION  TROJAN HORSE : A hacking program, which gains privileged access to the operating system while appearing to perform a desirable function.  Banking Trojans are the most dangerous kind.  Automatically collects all payment data and sometimes even conducts financial transactions on the victims behalf They capture keystrokes, makes screenshots, bypasses virtual keyboards, changes hosts files and redirects user to fake website
  14. 14. LETS LOOK AT A STUDY DONE BY NORTON DURING 2012. And some Internet Security Tips
  15. 15. CYBER CRIME GOES MOBILE
  16. 16. MOBILE DEVICES  PC’s Still remain the Primary targets, but cyber criminals are also finding ways to attack consumers on mobile devices  McAfee found 13000 different types of Mobile malware in 2012 compared to 2000 in 2011
  17. 17. SECURITY  There exists various applications for smartphones whereby they can remotely locate, lock and even wipe data from a misplaced or lost device  Data can also be backed up to a Cloud  A huge part of our lives are contained in these small devices  More and more personal and valuable information is stored on these devices such as banking particulars, personal particulars, passwords.  Are we really aware of how valuable such information is to a criminal?
  18. 18. Mobile year in review Cyber Crime goes Mobile
  19. 19. SAFE GAURDS  PASSWORDS: • Passwords protect your stuff • A good password stops a hacker in his/her tracks • A good password doesn’t make you crazy trying to remember it • A good password strategy = peace of mind
  20. 20. POPULAR PASSWORDS 12345 123456 1234567 12345678 123123 111111 Password Passw0rd Password1 Abc123 Monkey Trustn01 Dragon Baseball Iloveyou Master Sunshine Qazwsx Superman Michael Football Ashley Bailey Shadow Letmein Blink182 Admin1
  21. 21. Think Unique • Not guessable word or phrase • Different for each site and account • Some use a few complex passwords and then one “master” passwords for accounts considered unimportant • All accounts are important • Not password that anyone else would use
  22. 22. No Dictionary Words  Avoid using full words you might find in a dictionary  Real words can be “edited” for password use  Dictionary becomes  D1(t10nAry (as an example)  But hackers are “on to” common letter replacement tricks like these
  23. 23. No Pet Names  Children often use their pet’s name  Friends and siblings hack accounts this way  Security Questions and Answers should be hard to guess  You can use “fake” answers to “mother’s maiden name” but you’ll need to remember what you used  Better are sites that let you create your own questions
  24. 24. Pay Particular Attention to Most Important Accounts  Email is most important  “Forgot your password” link on sites goes to email  Hacker with access to email can reset all other accounts  Nearly as important is social networking  Hacker can run scams against friends and colleagues  Financial sites and shopping sites with stored credit cards, too
  25. 25. Never Share or Show Passwords  Don’t write them down  Never email or text them to someone  If you tell it to someone, change the password as soon as possible  Legitimate companies NEVER ask for your account password
  26. 26. INTERNET SECURITY  Get a security product for all devices:  Computers  Mobile phones  Tablets  Prevent password-stealing malware from infecting your device
  27. 27. Secure Mobile Devices with a Password  Mobile apps may auto log you in to accounts  Protect access with a password on phone or tablet  Remove apps you don’t use anymore that may have credit cards or financial info store:  Shopping sites  Banking and Investment companies  Travel sites
  28. 28. TO SUM UP…  Create unique passphrase (no dictionary words)  Nothing others will guess  Customize for each site  Focus on email, social, financial sites first  Use password managers  Never share or show passwords  Take action if breached  Use security software  Set passwords on mobiles
  29. 29. THANK YOU
  1. ¿Le ha llamado la atención una diapositiva en particular?

    Recortar diapositivas es una manera útil de recopilar información importante para consultarla más tarde.

×